International Journal of Computer Technology and Applications

Displaying 201-240 of 288 results

  • White Papers // Oct 2011

    Analyzing Performance of Proactive and Reactive Routing Protocols for Manets

    Mobile ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized administration number of routing protocols like Proactive and Reactive protocols have been implemented. Various research communities are working in field of MANET and trying...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Dynamic Service Composition in SOA and QoS Related Issues

    Service Oriented Architecture (SOA) is a modern approach to build distributed application and greatly reduce the time, effort and cost to develop the software projects. SOA provides the dynamic paradigm for composing distributed application even in heterogeneous environments. The dynamic composition feature in SOA makes evaluation of a QoS a...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Secure Digital Signature Scheme for Image Authentication Over Wireless Channels

    The introduction of 3G wireless communication systems, together with the invasive distribution of digital images and the growing concern on their originality triggers an emergent need of authenticating images received by unreliable channels, such as public Internet and wireless networks. To meet this need, a content-based image authentication scheme that...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Privacy Enhancing and Breach Reduction

    Hiding the information without getting it revealed to others while publishing in a network is a major task now a days. For example an individual who wants to share his personal information like hospitalized or banking data to a researcher for his future enhancement or for his benefit, how much...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Hardware Enhancement Association Rule With Privacy Preservation

    In recent days Data mining techniques have been widely used in various applications. One of the most important applications in data mining is association rule mining. For hardware implementation of Apriori-based association rule mining the authors have to load candidate item sets and a database into the hardware. As the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Review: Competitive Learning Algorithm of Neural Network

    This paper deals mainly with the development of new learning algorithms and the study of the dynamics of neural networks. This paper will cover issues about the unsupervised competitive learning as well as some of its variances like hard competitive learning and soft competitive learning. After introducing of unsupervised learning...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Dynamic Job Scheduling in Cloud Computing Based on Horizontal Load Balancing

    Cloud computing is a latest new computing paradigm where applications, data and IT services are provided across dynamic and geographically dispersed organization. How to improve the global throughput and utilize Cloud computing resources proficiently and gain the maximum profits with job scheduling system is one of the Cloud computing service...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    One Time Password Security Through Cryptography for Mobile Banking

    Electronic banking-which provides the economic services through internet-changed the business trade of banks drastically, also decreasing the cost and improving the ease for the user. Highly usage of phones in which internet is enabled makes the change of banking operations to mobile phones from desktop computers - a reasonable growth...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Performance Evaluation & Application of Smart Antenna in Sensor Networks

    This paper provides a method for forming a communications link of Wireless Sensor Networks (WSN) by enabling each WSN to act as a smart antenna. Each WSN is simulated as a set of randomly placed sensor nodes within a planar area. The proposed method involves a searching WSN, a receiving...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Dynamic Threshold Based Secret Sharing Scheme Using Polynomial Function

    In this paper, the authors will study the question of performing arbitrary updates in secret sharing schemes when shares of unaffected parties shall remain unchanged. They will introduce a zonal transformation matrix in the lifetime of secret sharing schemes to simplify constructions of multi-time secret sharing schemes and propose management...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Enhanced EFCI Congestion Control Scheme for ATM Networks

    Traffic management and congestion control are key issues in ATM networks. Congestion control schemes promises effective traffic management and it uses feedback information from the network to specify the maximum rate at which each source can transmit cells in to the network. In this paper, the authors considered an Explicit...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks

    Previous research on sensor network security mainly considers homogeneous sensor networks, where all sensor nodes have the same capabilities. Research has shown that homogeneous ad hoc networks have poor performance and scalability. The many-to-one traffic pattern dominates in sensor networks, and hence a sensor may only communicate with a small...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Link Adaptation & Recursive Estimation for GPRS Wireless Networks

    In most of the mobile or cellular systems, the height of the mobile antenna may be much lower than the surrounding structures. Thus, the existence of a direct or line of sight path between the transmitter and the receiver is highly unlikely. In such a case, propagation is mainly due...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    DADI: Data Access by Data Intrusion

    The mining is a source for the data base as it requires several elements and techniques for the retrieval operations. Some techniques and their corresponding technologies have an important role in the database which is required in large amounts for data access. The primary method is to retrieve the relevant...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    A Client Level Tool for Concluding Router Packet Forwarding Priority

    Packet Forwarding Prioritization (PFP) in routers is one of the mechanisms commonly available to network operators. PFP can have a significant impact on the accuracy of network measurements, the performance of applications and the effectiveness of network troubleshooting procedures. Despite its potential impacts, no information on PFP settings is readily...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Dynamic Telecast Routing With Security Intensification

    Security has become one of the major issues for data communication over wired and wireless networks. Different from the past work on the designs of network security algorithms and system infrastructures, the authors will propose a dynamic broadcast routing algorithm that could randomize delivery paths for data transmission. The algorithm...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Versions of 802.16

    Worldwide Interoperability for Microwave Access (WIMAX) which is currently employed in some parts of the world is the new era of communication. It is approved by IEEE 802.16 group and is the latest technology which is a standard for point-to-multipoint wireless networking. To deliver "Last mile" broadband connectivity to home...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Analysis of Frequent Item Set Mining on Variant Datasets

    Over the last two decades, with advances in storage media technology, storage devices have become larger and more economically viable. As a result, businesses, large corporations, etc., have started storing and archiving various types of data in the form of large databases. The purpose of storing data is two-fold: first,...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Analyzing Cognitive Radio Physical Layer on BER Performance Over Rician Fading Channel

    This paper analyzes the Bit Error Rate performance of Cognitive Radio Physical layer over Rician channel with AWGN noise under different channel encoding schemes, digital modulation schemes and channel conditions. The system outperforms with Reed Solomon along with convolution encoding for BPSK modulation technique as compared to other digital modulation...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Techniques for Efficiently Ensuring Data Storage Security in Cloud Computing

    The Cloud Computing is the next generation architecture of IT Enterprise. It moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. Here, focus is on cloud data storage security, an important aspect of quality of...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Sep 2011

    Review of Solutions for Securing the Vehicular Networks

    The successful introduction of vehicular communication has to posses the design of robust security architecture that should be able to cope with security threats. Ad hoc networks are a new wireless networking paradigm for mobile hosts. Vehicular networks are likely to become the most relevant form of mobile ad hoc...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Sep 2011

    Trustworthy Computing Under Identity-Based Encryption

    The authors propose a fully functional Identity-Based Encryption scheme (IBE). The scheme has chosen cipher text security in the random oracle model assuming a variant of the computational Diffie-Hellman problem. Their system is based on bilinear maps between groups. The Weil pairing on elliptic curves is an example of such...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    The Role of Quality Assurance in Software Development Projects: Project Failures and Business Performance

    Despite rapid advances in all facets of technology, the software industry still struggles with the formidable task of developing software applications that meet quality standards, and budget constraints. The need for software to be error-free remained a challenge to the IT industry. Therefore, the primary purpose of this study is...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    An Index Based Congestion Aware Routing Protocol for Wireless Sensor Networks

    Energy efficient protocol is very important in Wireless Sensor Networks (WSNs) because the nodes in WSNs are usually battery operated sensing devices with limited energy resources and replacing the batteries is usually not an option. Thus energy efficiency is one of the most important issues in WSNs. Routing protocols which...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    Congestion Control Avoidance in Adhoc Network Using Queuing Model

    Mobile ad hoc network is an emerging standard or wireless communication. Due to the impendence in infrastructure dependencies these networks are rapidly emerging. These networks are since evolving has to develop methodologies for the compatibility of current services in such an environment. Various services compatibilities were studied and methodologies were...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    Reliable Software Development With Proposed Quality Oriented Software Testing Metrics

    For an effective test measurement, a software tester requires a testing metrics that could measure the quality and productivity of software development process along with increasing its reusability, correctness and maintainability. Until now, the understanding of measuring software quality is not yet sophisticated enough and is still far away from...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    Sec.AODV for MANETs Using MD5 With Cryptography

    Mobile Ad hoc NETworks (MANETs) characteristics present major vulnerabilities in security. The threats which thought-out in MANETs are due to maliciousness that intentionally disrupts the network by using variety of attacks and due to insecure routing protocols (e.g. AODV), which were developed without considering security in mind. Due to lack...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    Concept of Privacy Protection in Data Mining

    In this paper, the authors address the issue of privacy preserving data mining. Specifically, they consider a scenario in which two parties owning confidential databases wish to run a data mining algorithm on the union of their databases, without revealing any unnecessary information. Their work is motivated by the need...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    A Conceptual Usability Framework for Mobile Service Consumers

    Variation and count of mobile devices accrue each day and Service Oriented Architecture (SOA) decompose the systems into loosely coupled and platform independent software services that facilitate integration of mobile devices to enterprise systems as a service consumer or provider. The prosperity of interactive systems is relayed on the realization...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    A Signcryption Scheme Based on Elliptic Curve Cryptography

    In Public key cryptography a message is sent after applying the digital signature and encryption techniques by the sender. These techniques are used so that the message properties such as confidentiality, integrity and unforgeability are maintained and the non-repudiation can be ensured at the receiving end. The digital signatures and...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    A Review on Cryptography Mechanisms

    In today's information age, communications play an important role which is becoming widespread as well. The same aspects of cryptography that make it useful for security and privacy make it particularly troublesome for law enforcement. The use of cryptography by criminals can prevent law enforcement from obtaining information needed for...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    Performance Evaluation of EFCI and ERICA Schemes for ATM Networks

    Rate based congestion control promises effective traffic management for ABR service class suitable to data communications in ATM networks. The rate based congestion control algorithm dynamically regulates transmission rate of source end system according to feedback information from the network. In this paper, the authors described two rate based congestion...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    A New Approach to Mine Frequent Pattern in Spatial Database Using TFP-Tree

    Today there are several skilled algorithms to mine frequent patterns. Frequent item set mining provides the associations and correlations among items in large transactional or relational database. In this paper a new approach to mine frequent pattern in spatial database using TFP-tree is proposed. The proposed approach generates a TFP-tree...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    A Review of Various Security Protocols in Wireless Sensor Network

    Sensor networks are highly distributed networks of small, lightweight wireless sensor nodes, deployed in large numbers to monitor the environment or system by the measurement of physical parameters such as temperature, pressure, or relative humidity, sound, vibration, motion or pollutants, at different locations. A WSN is composed of a large...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    Protection of Web User's Privacy by Securing Browser from Web Privacy Attacks

    The Internet and World Wide Web being an essential part of everyone's life, the users have become more conscious about their privacy. The user's web privacy unfortunately, is not focused much by the current browsers. This paper focuses on the attacks which compromises user's anonymity, grab user's private data. It...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    Heap Base Coordinator Finding With Fault Tolerant Method in Distributed Systems

    Coordinator finding in wireless networks is a very important problem, and this problem is solved by suitable algorithms. The main goals of coordinator finding are synchronizing the processes at optimal using of the resources. Many different algorithms have been presented for coordinator finding. The most important leader election algorithms are...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    Reletive Distance Mobile Ad Hoc Networks (RDMAR)

    Ad hoc networks are characterized by wireless connectivity, continuous changing topology, distributed operation and ease of deployment routing in Ad hoc networks is a challenge due to mobility and thus is a current area of research. In context of Mobile Ad hoc NETworks (MANET) the authors can say that Mobile...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    Resource Management in Distributed System

    Resource management in distributed environment is concerned with a system in which the main aim is to make sure that a user/client can access the remote resources with as much ease as it can access the local resources. The basis of resource management in the distributed system is also resource...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    Formal Methods of Software Testing and Terminology

    Software provides a complete set of application development tools for building stand-alone, client-server, and Internet-enabled applications. But making it easy to build applications can be a two-edged sword. Not only can developers build powerful, sophisticated applications, but they can also build applications that frustrate users, waste computer resources, and damage...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    Secure Routing Protocol for Multi-Hop Wireless Networks

    Most recent ad hoc network research has focused on providing routing services without considering security. The authors detail security threats against ad hoc routing protocols, specifically examining AODV and DSR. In light of these threats, they identify three different environments with distinct security requirements. They propose a solution to one,...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2012

    Performance Analysis of Shortest Path Energy Efficient Routing Protocol in Wireless Sensor Networks Using NSRS Algorithm

    Wireless Sensor Network is an up-and-coming technology that shows great promise for various innovative applications both for public and military. Wireless Sensor Networks (WSNs) are Ad-hoc wireless networks of typically consists of hundreds or even thousands of small low-cost sensor nodes that communicate in a wireless way. A sensor node...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Priority Based Scheduling Algorithm Using Time and Transmission Length in 802.11 Networks

    The fairness of IEEE 802.11 wireless networks is rigid to forecast and organize since it constructed based on uncertainty and difficulty of the MAC conflicts and dynamics. So, there is a great extent of packet data to be met in a network traffic jam and the packet data was collapsed...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2012

    Underwater Acoustic Sensor Networks: A Survey on MAC and Routing Protocols

    In this paper, a detailed survey on the current protocols for medium access control layer and routing layer in the area underwater acoustic sensor networks are given. This survey is on some of the best MAC protocols and routing protocols and also it compares them based on some critical parameters...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    Security Threats in Volunteer Computing Environments Using the Berkeley Open Infrastructure for Network Computing (BOINC)

    Volunteer Computing is a low cost and easy deployable solution for scientific projects that require large amounts of computational power. Volunteer computing public access capabilities comes with several security threats to the projects, thus, this projects must be designed and focused towards security in order to be able to stand...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2013

    An Effective Algorithm of Encryption and Decryption of Images Using Random Number Generation Technique and Huffman Coding

    Data security has become most important aspect while transmission of data and storage. The transmission and exchange of image also needs a high security. Cryptography is used to maintain security. In this paper, the authors implemented security for image. They have considered an image, read its pixels and convert it...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2013

    Study on Improving Web Security Using SAML Token

    Web service is the most important word which is most commonly used by all computer professionals. Web services are mainly used for communicating different platform within a network connection. Web services are created based on SOA architecture. SOA platform is most popularly used in distributed systems. When using in distributed...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2013

    A Novel Hybrid Feature Selection and Intrusion Detection Based on PCNN and Support Vector Machine

    In this paper, the authors proposed a hybrid model for feature selection and intrusion detection. Feature selection is important issue in intrusion detection. The selection of feature in attack attribute and normal traffic attribute is challenging task. The selection of known and unknown attack is also faced a problem of...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2013

    Improved Network Security Through Retinal Biometric Based Authentication

    Security and authentication are challenging problems due to the sprawling growth of Internet in today's environment. Therefore, the security of the network users has become an essential factor. There are various techniques available in the literature which make use of passwords, smart cards etc., to provide network related security. But...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2013

    Outsourcing and Discovering Storage Inconsistencies in Cloud Through TPA

    Cloud computing has changed the way computing takes place. It is the technology that enables outsourcing of computing and storage to a public cloud maintained by cloud service providers. Cloud users can use cloud storage and other facilities without capital investment in pay-as-you-use fashion. As the data is stored in...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    An Analysis of Distributed Computer Network Administration

    Computer Networking is necessary to human beings. People needed to share ideas, research knowledge, and the way of life to their friends. In the modern time, the role of computer networks became dreamy. Analyzing, accessing, sharing and storing of data and information are very easy with help of distributing computer...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Performance Evaluation of Improved Algorithm for Wireless Sensor Networks

    Wireless sensor networks have recently come into prominence because they hold the potential to revolutionize many segments of the economy and life, from environmental monitoring and conservation, to manufacturing and business asset management, to automation in the transportation and health-care industries. Information collected by and transmitted on a sensor network...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    A Novel Approach for Securing Mobile Ad Hoc Network With an Enhanced Trust Calculation Method

    A Mobile Adhoc Network is a group of wireless mobile computers in which nodes cooperate by forwarding packets for each other to allow them to communicate beyond direct wireless transmission range. Due to wide-ranging characteristics of the Ad Hoc Networks like decentralization, dynamic topology and neighbor based routing, it is...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    A Trust, Privacy and Security Infrastructure for the Inter-Cloud

    Cloud Computing is one of the most important security challenges to manage and assure a secure usage over multi-provider Inter-Cloud environments with dedicated communication infrastructures, security mechanisms, processes and policies. Based on the collection of various Inter-Cloud usecases and scenarios within the private and public sector like DMTF (Distributed Management...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Open Source in Cloud Computing

    Cloud computing is emerging as the latest BUZZ word in Information Technology. There is going to be a great shift from traditional network computing to cloud computing. The features of Cloud computing - Pay as you go and Virtualization has made it a long run in advance technologies. This paper...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Type of Security Threats and It's Prevention

    Security is a branch of computer technology known as information security as applied to computers and networks. The objective of online security includes protection of information and property from theft, corruption, or threats attack, while allowing the information and property to remain accessible and productive to its intended users. The...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Cloud Computing Security With Nymble Technology

    Misbehave blacklisting schemes allow online service provide in cloud computer to prevent Misbehave access by abusive users while preserving the privacy of all Misbehave users (both abusive and non-abusive). The scheme proposed for this purpose was Nymble, an extremely efficient scheme based only on symmetric primitives; however, Nymble relies on...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    3-D Graphical Password Used For Authentication

    In today's world, security is important aspect in day to day life. So, everyone used various ways for security purpose. People use passwords for their security. Generally, everyone uses textual password. Textual password is combination of alphabets and numbers. People keep textual password as name of their favorite things, actors...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Interpretation of Formal Proof for Cryptographic Protocols into Computational Model

    Cryptography is the spinal cord for all security measures involved in computing field so a lot of emphasis is required to be given to make it strong enough to deal all the transition of the security industry. The authors present a general method to prove security properties of multiple cryptographic...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Automatically Communication Path Creation and Reconfiguration in Dynamic Network Environment for Optimizing Performance to Network Applications

    Accessing network services across a wide area network still remains a challenging task and the difficulty mainly comes from the heterogeneous and constantly changing network environment, which usually causes undesirable user experience for network-oblivious applications. A promising approach to address this is to provide network awareness in communication paths. Many...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    Investigation of It Auditing and Checklist Generation Approach to Assure a Secure Cloud Computing Framework

    Recently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However, there are still some concerns about the security provided by the cloud environment are raises. In this paper, the authors are conducting the investigation...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    Next Generation Mobile Application in Cloud Computing Using RESTful Web Services

    Mobile devices, especially smart mobile devices, becoming very popular nowadays. Web services that are used to provide a service for an application running on smart mobile devices also becoming very popular. There are some limitations of the current smart mobile devices, such as limited storage capacity, low processor speed, limited...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    Provable Secure Certificateless Generalized Signcryption Scheme

    Generalized signcryption is a new cryptographic primitive, which works as a signcryption scheme, a signature scheme and an encryption scheme as per need. It is more suitable for some storage constrained environments, e.g. smart cards, WSN (Wireless Sensor Networks) etc. Recently, Ji et al. proposed a security model for certificateless...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    A New Model for Software Risk Management

    In the modern time of software engineering, the development of software in static and dynamic environment results in several vulnerabilities that need to be handled so that they do not step in with the clear defined project goals. Previous studies show that the wide variety of different risk analysis strategies...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    A Model and Framework for Reality-Oriented Web Services

    Mobile devices that use information from sensors such as GPS and accelerometers are becoming widespread today, and web services using a variety of sensor information have appeared. This paper refers to these web services as reality-oriented web services. Since existing frameworks not designed to handle sensor information are useless when...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    An Improvement in AOMDV With Randomization

    Mobile Ad hoc NETworks (MANETs) consist of a collection of wireless mobile nodes which dynamically exchange data among themselves without the reliance on a fixed base station or a wired back-bone network. Multipath routing allows the establishment of multiple paths between a single source and single destination node. It is...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    A Study of Viterbi Decoder Algorithm for Wireless LANs

    Viterbi Decoders are commonly used to decode convolutional codes in communications systems. This Viterbi Decoder is a fully parallel implementation which gives fast data throughput. The decoder is targeted for WiMAX and Wireless LAN applications. Input symbol metric pairs are decoded into output data bits by the maximum likelihood Viterbi...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    A Novel Approach: Security Measures and Concerns of Cloud Computing

    Cloud computing is one of the coming forth as well as the buzzword concept nowadays. Cloud computing serves various advancement in the field of IT industry such as Google, Microsoft, Amazon and distinguish various data and information resources from a given infrastructure in order to enhance the services provided to...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    Efficient Use of Bidirectional Communication to Increase Communication Capabilities in Distributed VANET

    Intelligent Transportation System (ITS) is the need for today's luxurious life where the traffic is unavoidable part of the people life. Vehicular Ad hoc NETwork (VANET) is a wireless network that is formed on the fly between collections of cars connected by wireless links. In ITS the different cars flying...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    A Novel Approach of AODV for Stability and Energy Efficient Routing for Manet Using IPV6

    In a Mobile Ad hoc NETwork (MANET), the topology of the network may change rapidly and unexpectedly due to mobility of nodes. Thus, setting up routes that meet high reliability is a very challenging issue. Another important problem in the MANETs is the energy consumption of nodes. This paper presents...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    Scheduler in Cloud Computing Using Open Source Technologies

    Cloud Computing utilities are coming to be omnipresent, and then are beginning to serve as the essential root of computing capacity for both undertakings and private computing requisitions. Any request comes to cloud will be provided by cloud in terms of Virtual Machine. On which basis, Virtual Machine will be...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    Anonymous and Adoptable Key Management Scheme for Multicast and Broadcast Services

    The popularity of group-oriented applications, secure and efficient communication among all group members has become a major issue. Another major issue is that to provide dynamic rekeying for all the users that join and leave the group. For the rekeying of the group key all members of the group should...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    Integrating Data Warehouses With Web Data for OLAP Using Semantic Data Clustering Techniques

    Now-a-days, Information retrieval plays an important role in the web. Many researches presented techniques for information retrieval process from databases. The previous work presented extended tree pattern clustering process for XML massive storages. This paper presents a new technique termed Semantic Data Clustering (SDC) technique for combining the Data warehouse...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    A Proposed Service Broker Policy for Data Center Selection in Cloud Environment With Implementation

    Cloud Services may be offered as public or private or combined. There is the demand of timely, repeatable, and controllable methodologies for evaluation of algorithms, applications, and policies before actual development of cloud products. Using simulation, the authors can study the behavior of them in cloud environment. Cloud-Analyst, the Cloud-Sim...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    An Improved Ant Colony Optimization Algorithm for Multiple QoS Routing to Find Multiple Feasible Paths for Packet Switched Network

    In recent years, Ant-based algorithms were used to solve classical routing problems such as: traveling salesman problem, vehicle routing problem, quadratic assignment problem, connection-oriented/connectionless routing, sequential ordering, graph coloring and shortest common super-sequence. In this paper, the authors propose an ant colony optimization based, QoS routing algorithm to find multiple...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    Multipath Extension of AODV to Improve End to End Delay

    This paper describes improvement in standard routing protocol AODV for mobile ad-hoc networks. The authors' mechanism setups multiple paths based on less hop count. It allows to store multiple paths based on threshold. At time of link failure, it will switch to next available path. To set up multiple path,...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    Embedded Text Based Image Retrieval System Using Semantic Web

    The revolutionary internet and digital technologies have imposed a need to have a system to organize abundantly available digital images for easy categorization and retrieval. The authors' aim is to provide a semantic web based image search engine. Here the searching is based on the overlay text embedded in images....

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    Ontology of Cloud Computing

    Cloud Computing is one contemporary technology in which the research community has recently embarked. Manifesting itself as the descendant of several other computing research areas such as Service-Oriented Architecture, distributed and grid computing, and virtualization, cloud computing inherits their advancements and limitations. Towards the end-goal of a thorough comprehension of...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    Improve Intrusion Detection Using Decision Tree With Sampling

    Intrusion detection system used to discover illegitimate and unnecessary behavior at accessing or manipulating computer systems. The present paper aims to improve accuracy Rate of intrusion detection using decision tree algorithm. Intrusion detection systems aim to identify attacks with a high detection rate and a low Error rate. In this...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    Cloud Market Cogitation and Techniques to Averting SQL Injection for University Cloud

    Cloud Computing is playing a game changer role in field of Information Technology which is not only impacting the way computing services are and will be delivered but also the way in which user will use IT. Cloud computing is a significant alternative in today's educational perspective. The technology gives...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Consideration With Dynamic Routing Security

    One of the major issues for data communication over wired and wireless networks is the security. the past work is on the designs of cryptography algorithms and system infrastructures. Dynamic routing algorithm called improved dynamic routing with security consideration, which is based on the concept of Zone Routing Protocol (ZRP)...

    Provided By International Journal of Computer Technology and Applications