International Journal of Computer Technology and Applications

Displaying 161-200 of 288 results

  • White Papers // Dec 2011

    Implementation of Unified Power Flow Controller (UPFC) for Power Quality Improvement in IEEE 14-Bus System

    In this paper the performance of Unified Power Flow Controller (UPFC) is investigated in controlling the flow of power over the transmission line. This research deals with digital simulation of standard IEEE 14-bus power system using UPFC to improve the real and reactive power flow control through a transmission line...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    Blind Channel Equalization Based on Constant Power Criterion

    In present digital communications, the transmission effects such as multipath propagation and limited bandwidth produces linear distortion in the emitted signal, causing Inter symbol Interferences at the receiver sensor output. To enable the recovery of input symbols, channel equalization is used. Channel equalization is used to compensate the distortion effects...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    Wireless Health Monitoring System for Smart Structures Using Embedded Real-Time Damage Detection and Identification Algorithms

    In this paper, a complex wireless sensing unit is designed for application in structural health monitoring systems. Fabricated from advanced embedded system technologies, the fundamental building block of the system is a wireless sensing unit capable of employing a spread-spectrum wireless modem for peer-to-peer communication between sensing units and a...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    An Efficient Load Balancing Algorithm for a Distributed Computer System

    This load balancing algorithm puts forward a new proposal to balance the server load. The load balancing system is a set of substitute buffer to share the server load, when their load exceeds its limit. The proposed technique gives an effective way to overcome the load balancing problem. Serving to...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    Proactive Secret Sharing Scheme for Mobile Ad-Hoc Networks

    Threshold cryptography is a novel cryptographic technique sharing secret among members. It divides a secret key into multiple shares by a cryptographic operation. This technique is useful to provide a shared secret key to master nodes in a infrastructure-less Mobile Ad-hoc NETwork (MANET). As an additional component, Proactive Secret Sharing...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    Survey on Architecture of Peer-to-Peer Network

    In recent times peer-to-peer networking has gained popularity since users can share files without having to communicate with a dedicated server. Peer-to-peer network have a scalable and fault-tolerant system that can locate nodes on a network with no need to maintain routing state having a lot of information. As the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    Searching an XML File and Its Context in a Folder

    This paper consists of answering a query on the XML database. In this the authors consider that the searching is done by using the context driven techniques and the usage the algorithm as sort merge algorithm. In which first, they determine the relation between different unified entities. The unified entity...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    Security Conformance for the Dynamically Routed Data

    Secure transmission of data plays a crucial role in the networks. To improve the security many methodologies have been proposed till now, like cryptographic designs, intrusion detection, dynamic routing etc. In this paper, the authors consider that the data transmission is done by using the concept of dynamic routing. Sometimes...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    Testing of Network Intrusion Detection System

    Network based intrusion detection system use the models of attacks to identify intrusive behavior ability of systems to detect attacks by quality of models which are called signatures. Some attacks exploits in different ways. For this reason the authors use testing tools that able to detect goodness of signatures. This...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    Iris Recognition: An Emerging Security Environment for Human Identification

    Unlike other biometrics such as fingerprints and face, the distinct aspect of iris comes from randomly distributed features. This leads to its high reliability for personal identification and at the same time, the difficulty in effectively representing such details in an image. Iris is a protected internal organ whose random...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    A Genetic Based Non-Invertible Cryptographic Key Generation From Cancelable Biometric in MANET

    Mission critical applications uses mobile ad hoc network. Security is required to protect this data while transmitting in network. Biometric characteristic such as face, fingerprint, voice, iris, and retina can be potential alternative to generate a cryptographic key and enhance the security. In this paper non-invertible key generation using cancelable...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    Analysis of Ber Degradation for Transmitted Downlink DSCDMA Signals

    A Pre-Distorter-High Power Amplifier (PD-HPA) pair has become a common practice in wireless communication to compensate for nonlinear distortion due to HPA. However, the PD-HPA pair still produces severe signal distortion when the input signal exceeds the PD-HPA's saturation level. The effects of such distortion on Bit Error Rate (BER)...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    Elasticity Variation Under Rest State Environment in Case of Internet Traffic Sharing in Computer Network

    The traffic sharing problem was introduced by Naldi (2002) in the form of a probability model using Markov Chains. This model was extended by Shukla and Thakur (2010) by introducing a rest state. The importance of new state was that user does not leave to the place of working and...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    Improvement of Performance of Mobile Ad Hoc Network Using K- Path Splittable Traffic Flow Scheme

    Mobile Ad hoc NETwork (MANET) is a set of wireless mobile computer forming a temporary network with out any wired infrastructure, due to dynamic nature of topology and other constraints transmission routing is a challenging task in MANET. k path split-table routing establish at most k paths between single source...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    IEEE 802.11x, and WEP, EAP,WPA/WPA2

    This paper is a brief survey of IEEE 802.11i based WPA2 or Wi-Fi protected Mode protocol popularly called as Wi-Fi Protected Access (WPA) Mode Protocol. In this paper, the authors tried their best to include all possible information about WPA from trusted sources in a very precise manner. Apart from...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    Hierarchial Key Management Scheme in Mobile Ad Hoc Networks

    The authors investigate performance characteristics of secure Group Communication Systems (GCSs) in mobile ad hoc networks that employ intrusion detection techniques for dealing with insider attacks tightly coupled with rekeying techniques for dealing with outsider attacks. The objective is to identify optimal settings including the best intrusion detection interval and...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    A Review of Various Attacks on Biometrics System and Their Known Solutions

    In the current digital world the people have various authentication systems which identify an individual. For example biometrics authentication system, knowledge based authentication system, token based authentication system. These systems have their own advantages and disadvantages. One system removes the disadvantages of other. A biometrics system is known as one...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    Handoff Management Scheme Using PHMIPv6 in Mobile ADHOC Networks

    Fast handoff management in mobile IPv6 environment has been a research subject for a long time. The Key concept behind cooperative diversity based protocol is Partner-based Hierarchical MIPv6 (PHMIPv6) promises an acceleration of the handoff management operation by relaying some signaling over a selected partner node prior to the actual...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    High Throughput AES Encryption Algorithm Implementation on FPGA

    This paper describes an efficient hardware realization of the Advanced Encryption Standard (AES) algorithm using FPGA. The AES also known as the Rijndael algorithm was selected as a Standard on October 2, 2000 by National Institute of Standards and Technology (NIST). Encryption algorithms are used to ensure security of transmission...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    A Novel Processor Architecture for Pairing Based Cryptography Applications

    Cryptographic pairing (bilinear mapping) is a core algorithm for various cryptography protocols. It is computationally expensive and inefficiently computed with general purpose processors. Although there has been previous work looking into efficient hardware designs for pairing, most of these systems use small characteristic curves which are incompatible with practical software...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    Network Resilience Through Multiple Routing Configurations

    The authors propose the use of Multi-Topology (MT) routing for network resilience against link and node failures. They describe the multi-topologies by an n-dimensional vector of different link costs for all links in the network. It is the base for the calculation of n shortest path trees from any node...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    Improving Quantitative Measurements Using Different Segmantation Techniques for Satellite Images

    Image segmentation is the most practical approach among all virtually automated image recognition systems. Feature extraction and recognition have numerous applications on telecommunication, weather forecasting, environment exploration and medical diagnosis. This paper deals with different image segmentation algorithms. The quality of satellite image is affected by atmosphere, temperature, etc. By...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    Information Security Using Blend of Steganography and Cryptography

    In this paper, information security is achieved using the combination of both cryptography and steganography techniques. Firstly preprocessing of data is done by using data dictionary module and then encryption and compression of data before sending it to receiver using Gray Level Modification (GLM) technique. Matrix and coding technique has...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Performance Comparison of Single and Multipath Routing Protocols in Adhoc Networks

    In a Mobile Ad hoc NETwork (MANET), Mobile nodes communicate with each other using multi-hop wireless links. There is no stationery infrastructure, for instance there is no base station. Each node in the network also acts as a router, forwarding data packets for other nodes an ad hoc network can...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Analyzing Performance of Proactive and Reactive Routing Protocols for Manets

    Mobile ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized administration number of routing protocols like Proactive and Reactive protocols have been implemented. Various research communities are working in field of MANET and trying...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Dynamic Service Composition in SOA and QoS Related Issues

    Service Oriented Architecture (SOA) is a modern approach to build distributed application and greatly reduce the time, effort and cost to develop the software projects. SOA provides the dynamic paradigm for composing distributed application even in heterogeneous environments. The dynamic composition feature in SOA makes evaluation of a QoS a...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Secure Digital Signature Scheme for Image Authentication Over Wireless Channels

    The introduction of 3G wireless communication systems, together with the invasive distribution of digital images and the growing concern on their originality triggers an emergent need of authenticating images received by unreliable channels, such as public Internet and wireless networks. To meet this need, a content-based image authentication scheme that...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Privacy Enhancing and Breach Reduction

    Hiding the information without getting it revealed to others while publishing in a network is a major task now a days. For example an individual who wants to share his personal information like hospitalized or banking data to a researcher for his future enhancement or for his benefit, how much...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Hardware Enhancement Association Rule With Privacy Preservation

    In recent days Data mining techniques have been widely used in various applications. One of the most important applications in data mining is association rule mining. For hardware implementation of Apriori-based association rule mining the authors have to load candidate item sets and a database into the hardware. As the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Review: Competitive Learning Algorithm of Neural Network

    This paper deals mainly with the development of new learning algorithms and the study of the dynamics of neural networks. This paper will cover issues about the unsupervised competitive learning as well as some of its variances like hard competitive learning and soft competitive learning. After introducing of unsupervised learning...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Dynamic Job Scheduling in Cloud Computing Based on Horizontal Load Balancing

    Cloud computing is a latest new computing paradigm where applications, data and IT services are provided across dynamic and geographically dispersed organization. How to improve the global throughput and utilize Cloud computing resources proficiently and gain the maximum profits with job scheduling system is one of the Cloud computing service...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    One Time Password Security Through Cryptography for Mobile Banking

    Electronic banking-which provides the economic services through internet-changed the business trade of banks drastically, also decreasing the cost and improving the ease for the user. Highly usage of phones in which internet is enabled makes the change of banking operations to mobile phones from desktop computers - a reasonable growth...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Performance Evaluation & Application of Smart Antenna in Sensor Networks

    This paper provides a method for forming a communications link of Wireless Sensor Networks (WSN) by enabling each WSN to act as a smart antenna. Each WSN is simulated as a set of randomly placed sensor nodes within a planar area. The proposed method involves a searching WSN, a receiving...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Dynamic Threshold Based Secret Sharing Scheme Using Polynomial Function

    In this paper, the authors will study the question of performing arbitrary updates in secret sharing schemes when shares of unaffected parties shall remain unchanged. They will introduce a zonal transformation matrix in the lifetime of secret sharing schemes to simplify constructions of multi-time secret sharing schemes and propose management...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Enhanced EFCI Congestion Control Scheme for ATM Networks

    Traffic management and congestion control are key issues in ATM networks. Congestion control schemes promises effective traffic management and it uses feedback information from the network to specify the maximum rate at which each source can transmit cells in to the network. In this paper, the authors considered an Explicit...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Improvement in Software Development Process and Software Product Through Knowledge Management

    Software engineering is a complex business in which processes, used to build product, have to go through many phases with involvement of many people. All these phases required different knowledge expertise to work together and apply innovative ideas to return successful outcome without missing the quality and reliability factors from...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Three Party Quantum Authenticated Key Distribution Protocol Using Superposition States

    This paper presents a Quantum authenticated key distribution protocol that can perform key distribution and also ensure that the participants of the communication are authentic, both implicitly and explicitly. This protocol provides new directions in Classical cryptography and Quantum cryptography. The Participants of the protocol trust the third party regarding...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Micro Strip Patch Antenna and Its Applications: A Survey

    The study of microstrip patch antennas has made great progress in recent years. Compared with conventional antennas, microstrip patch antennas have more advantages and better prospects. They are lighter in weight, low volume, low cost, low profile, smaller in dimension and ease of fabrication and conformity. Moreover, the microstrip patch...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    An Overview of on Demand Wireless Adhoc Networks Protocols: DSR and TORA

    Wireless network are becoming popular now a days due their features like easy setup without the need of cabling. Wireless ad-hoc networks are a collection of mobile/semi-mobile nodes with no pre-established infrastructure, forming a temporary network. Each node in the network has a wireless Interface and communicates with each other...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Wide-Area Traffic: IP Multicast Receiver Handover for Mobile IP Networks

    Network arrivals are often modeled as Poisson processes for analytic simplicity, even though a number of traffic studies have shown that packet inter-arrivals are not exponentially distributed. The authors evaluate 24 wide-area traces, investigating a number of wide-area TCP arrival processes (session and connection arrivals, FTP data connection arrivals within...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    Searching an XML File and Its Context in a Folder

    This paper consists of answering a query on the XML database. In this the authors consider that the searching is done by using the context driven techniques and the usage the algorithm as sort merge algorithm. In which first, they determine the relation between different unified entities. The unified entity...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    Security Conformance for the Dynamically Routed Data

    Secure transmission of data plays a crucial role in the networks. To improve the security many methodologies have been proposed till now, like cryptographic designs, intrusion detection, dynamic routing etc. In this paper, the authors consider that the data transmission is done by using the concept of dynamic routing. Sometimes...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    Testing of Network Intrusion Detection System

    Network based intrusion detection system use the models of attacks to identify intrusive behavior ability of systems to detect attacks by quality of models which are called signatures. Some attacks exploits in different ways. For this reason the authors use testing tools that able to detect goodness of signatures. This...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    Iris Recognition: An Emerging Security Environment for Human Identification

    Unlike other biometrics such as fingerprints and face, the distinct aspect of iris comes from randomly distributed features. This leads to its high reliability for personal identification and at the same time, the difficulty in effectively representing such details in an image. Iris is a protected internal organ whose random...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    A Genetic Based Non-Invertible Cryptographic Key Generation From Cancelable Biometric in MANET

    Mission critical applications uses mobile ad hoc network. Security is required to protect this data while transmitting in network. Biometric characteristic such as face, fingerprint, voice, iris, and retina can be potential alternative to generate a cryptographic key and enhance the security. In this paper non-invertible key generation using cancelable...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    Analysis of Ber Degradation for Transmitted Downlink DSCDMA Signals

    A Pre-Distorter-High Power Amplifier (PD-HPA) pair has become a common practice in wireless communication to compensate for nonlinear distortion due to HPA. However, the PD-HPA pair still produces severe signal distortion when the input signal exceeds the PD-HPA's saturation level. The effects of such distortion on Bit Error Rate (BER)...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    Elasticity Variation Under Rest State Environment in Case of Internet Traffic Sharing in Computer Network

    The traffic sharing problem was introduced by Naldi (2002) in the form of a probability model using Markov Chains. This model was extended by Shukla and Thakur (2010) by introducing a rest state. The importance of new state was that user does not leave to the place of working and...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    Improvement of Performance of Mobile Ad Hoc Network Using K- Path Splittable Traffic Flow Scheme

    Mobile Ad hoc NETwork (MANET) is a set of wireless mobile computer forming a temporary network with out any wired infrastructure, due to dynamic nature of topology and other constraints transmission routing is a challenging task in MANET. k path split-table routing establish at most k paths between single source...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    IEEE 802.11x, and WEP, EAP,WPA/WPA2

    This paper is a brief survey of IEEE 802.11i based WPA2 or Wi-Fi protected Mode protocol popularly called as Wi-Fi Protected Access (WPA) Mode Protocol. In this paper, the authors tried their best to include all possible information about WPA from trusted sources in a very precise manner. Apart from...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    Hierarchial Key Management Scheme in Mobile Ad Hoc Networks

    The authors investigate performance characteristics of secure Group Communication Systems (GCSs) in mobile ad hoc networks that employ intrusion detection techniques for dealing with insider attacks tightly coupled with rekeying techniques for dealing with outsider attacks. The objective is to identify optimal settings including the best intrusion detection interval and...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    A Review of Various Attacks on Biometrics System and Their Known Solutions

    In the current digital world the people have various authentication systems which identify an individual. For example biometrics authentication system, knowledge based authentication system, token based authentication system. These systems have their own advantages and disadvantages. One system removes the disadvantages of other. A biometrics system is known as one...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    Handoff Management Scheme Using PHMIPv6 in Mobile ADHOC Networks

    Fast handoff management in mobile IPv6 environment has been a research subject for a long time. The Key concept behind cooperative diversity based protocol is Partner-based Hierarchical MIPv6 (PHMIPv6) promises an acceleration of the handoff management operation by relaying some signaling over a selected partner node prior to the actual...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    High Throughput AES Encryption Algorithm Implementation on FPGA

    This paper describes an efficient hardware realization of the Advanced Encryption Standard (AES) algorithm using FPGA. The AES also known as the Rijndael algorithm was selected as a Standard on October 2, 2000 by National Institute of Standards and Technology (NIST). Encryption algorithms are used to ensure security of transmission...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    A Novel Processor Architecture for Pairing Based Cryptography Applications

    Cryptographic pairing (bilinear mapping) is a core algorithm for various cryptography protocols. It is computationally expensive and inefficiently computed with general purpose processors. Although there has been previous work looking into efficient hardware designs for pairing, most of these systems use small characteristic curves which are incompatible with practical software...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    Network Resilience Through Multiple Routing Configurations

    The authors propose the use of Multi-Topology (MT) routing for network resilience against link and node failures. They describe the multi-topologies by an n-dimensional vector of different link costs for all links in the network. It is the base for the calculation of n shortest path trees from any node...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    Improving Quantitative Measurements Using Different Segmantation Techniques for Satellite Images

    Image segmentation is the most practical approach among all virtually automated image recognition systems. Feature extraction and recognition have numerous applications on telecommunication, weather forecasting, environment exploration and medical diagnosis. This paper deals with different image segmentation algorithms. The quality of satellite image is affected by atmosphere, temperature, etc. By...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    Information Security Using Blend of Steganography and Cryptography

    In this paper, information security is achieved using the combination of both cryptography and steganography techniques. Firstly preprocessing of data is done by using data dictionary module and then encryption and compression of data before sending it to receiver using Gray Level Modification (GLM) technique. Matrix and coding technique has...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Link Adaptation & Recursive Estimation for GPRS Wireless Networks

    In most of the mobile or cellular systems, the height of the mobile antenna may be much lower than the surrounding structures. Thus, the existence of a direct or line of sight path between the transmitter and the receiver is highly unlikely. In such a case, propagation is mainly due...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    DADI: Data Access by Data Intrusion

    The mining is a source for the data base as it requires several elements and techniques for the retrieval operations. Some techniques and their corresponding technologies have an important role in the database which is required in large amounts for data access. The primary method is to retrieve the relevant...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    A Client Level Tool for Concluding Router Packet Forwarding Priority

    Packet Forwarding Prioritization (PFP) in routers is one of the mechanisms commonly available to network operators. PFP can have a significant impact on the accuracy of network measurements, the performance of applications and the effectiveness of network troubleshooting procedures. Despite its potential impacts, no information on PFP settings is readily...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Dynamic Telecast Routing With Security Intensification

    Security has become one of the major issues for data communication over wired and wireless networks. Different from the past work on the designs of network security algorithms and system infrastructures, the authors will propose a dynamic broadcast routing algorithm that could randomize delivery paths for data transmission. The algorithm...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Versions of 802.16

    Worldwide Interoperability for Microwave Access (WIMAX) which is currently employed in some parts of the world is the new era of communication. It is approved by IEEE 802.16 group and is the latest technology which is a standard for point-to-multipoint wireless networking. To deliver "Last mile" broadband connectivity to home...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Analysis of Frequent Item Set Mining on Variant Datasets

    Over the last two decades, with advances in storage media technology, storage devices have become larger and more economically viable. As a result, businesses, large corporations, etc., have started storing and archiving various types of data in the form of large databases. The purpose of storing data is two-fold: first,...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Analysis of Coaxial Feeding and Strip Line Feeding on the Performance of the Square Patch Antenna

    Microstrip patch antennas have different feeding techniques. They can be divided based on power transfer mechanism from feed line to patch. This paper focuses on the design, model and simulation of a microstrip patch antenna by applying two well known and mostly used feeding techniques. Those are coaxial feeding and...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    High Performance Ordering Scheme for MIMO Transmission

    The QR-OSIC receiver design for the transmitter-side power allocated MIMO system. Based on the properties of the function and ordering results, the authors develop the efficient ordering algorithms in combination with the PA scheme. From the convexity of the -function, they derive the ordering strategy that makes the channel gains...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    An Analytical Model to Evaluate the Approaches of Mobility Management

    Now-a-day's efficient mobility management for mobile users in wireless networking is a crucial issue. To maintain global mobility in IP networking the Mobile internet protocol has been proposed. To reduce the signaling traffic related to the Mobile Terminals (MTs) registration with the Home Agents (HAs), whenever their Care-of-Addresses (CoAs) change...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    An Appliance Approach: RTST to Reduce Cost & Time

    A new framework has been developed for Regression Test Selection Technique (RTST) to reduce cost & time. Now, the authors find how it works with some and provide relevant result with data. In RTST, to check the validity of modified software, they select test case from existing test set and....

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Rotation, Scaling and Translation Analysis of Biometric Signature Templates

    Biometric authentication systems that make use of signature verification methods often render optimum performance only under limited and restricted conditions. Such methods utilize several training samples so as to achieve high accuracy. Moreover, several constraints are imposed on the end-user so that the system may work optimally, and as expected....

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Reliable and Efficient Flooding Algorithm for Broadcasting in VANET

    In MANETs, each node is equipped with a wireless transmitter and receiver and is typically free to move around in an arbitrary fashion. The self-configuration ability of MANETs makes them suitable for a wide variety of applications. VANET research concentrates on roads, more so on roads with some reasonable node...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Data Tagging and Data Locating in Cloud Based SOA

    Cloud computing technology is a new concept of providing dramatically scalable and virtualized resources. It implies a service oriented architecture, reduced information technology overhead for the end-user, great flexibility, reduced total cost of ownership, on-demand services and many other things. When the Software as a Service Provider or Infrastructure as...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Framework to Measure and Maintain the Quality of Software Using the Concept of Code Readability

    Present day's software industry is using software metrics to estimate the complexity of software systems to find software cost estimation, software development control, software testing, software assurance and software maintenance. The relationship between a simple set of local code features and human concept of readability can be derived by collecting...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Nov 2012

    Energy-Efficient Reliable Routing in Wireless Multimedia Sensor Networks

    Wireless Multimedia Sensor Networks (WMSN) can handle different traffic classes of multimedia content (video, audio streams and still images) as well as scalar data over the network. Use of general and efficient routing protocols for WMSN is of crucial significance. Similar to other traditional networks, in WMSN a noticeable proportion...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Nov 2012

    Construction of Power Efficient Fault Tolerant Wireless Network Using Cone Based Algorithm

    Fault tolerant topology control for all to one communication holds significance in dynamic wireless networks with asymmetric wireless links. In this paper the author Investigates the various aspects of the problem mentioned above using the cone based distributed topology control algorithm. The topology of a wireless multi-hop network can be...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Nov 2012

    Secure Data Transmission in MANET Routing Protocol

    Information exchange in a network of mobile and wireless nodes without any infrastructure support such networks are called as Ad-hoc networks. A Mobile Ad hoc NETwork (MANET) is mobile, multi-hop, infrastructure less wireless network which is capable of autonomous operation. In this paper the authors have discussed some of the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2012

    Design and development of Middleware Gateway IP Multimedia System and Web Services

    Rapid growth in Internet (Web) applications and usage of mobile in telecommunication is present trends in communication. In Web 2.0 web services architecture is become versatile tool for enterprise solutions in distributed environment systems. To provide an enterprise solution it is not possible to get professional solution at one place....

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2012

    Robust Aggregation in Sensor Network: An Efficient Frequent Itemset and Number of Occurrence Counting

    Sensor networks are collection of sensor nodes which co-operatively send sensed data to base station. As sensor nodes are battery driven, an efficient utilization of power is essential in order to use networks for long duration hence it is needed to reduce data traffic inside sensor networks, reduce amount of...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2012

    Fast and Efficient IP Network Recovery using Multiple Routing Configuration

    Internet plays a vital role in the peoples communications infrastructure, due to slow convergence of routing protocols after network failure become a growing problem. To guarantee fast recovery from link and node failure in networks, the authors propose a new recovery scheme called Multiple Routing Configuration (MRC). Their proposed scheme...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2012

    Performance Analysis of Shortest Path Energy Efficient Routing Protocol in Wireless Sensor Networks Using NSRS Algorithm

    Wireless Sensor Network is an up-and-coming technology that shows great promise for various innovative applications both for public and military. Wireless Sensor Networks (WSNs) are Ad-hoc wireless networks of typically consists of hundreds or even thousands of small low-cost sensor nodes that communicate in a wireless way. A sensor node...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Priority Based Scheduling Algorithm Using Time and Transmission Length in 802.11 Networks

    The fairness of IEEE 802.11 wireless networks is rigid to forecast and organize since it constructed based on uncertainty and difficulty of the MAC conflicts and dynamics. So, there is a great extent of packet data to be met in a network traffic jam and the packet data was collapsed...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2012

    Underwater Acoustic Sensor Networks: A Survey on MAC and Routing Protocols

    In this paper, a detailed survey on the current protocols for medium access control layer and routing layer in the area underwater acoustic sensor networks are given. This survey is on some of the best MAC protocols and routing protocols and also it compares them based on some critical parameters...

    Provided By International Journal of Computer Technology and Applications