International Journal of Computer Technology and Applications

Displaying 201-240 of 288 results

  • White Papers // Oct 2011

    Quantitative Analysis of DSR Routing Algorithm for Carrying Packet Telephony

    It has been difficult for researchers to realize Packet Telephony over Mobile Ad-hoc Networks due to the peculiar characteristics of these networks including dynamic nature of nodes. The nodes keep on changing their location and hence re-routing is frequently required. So a robust routing algorithm is prerequisite for successful implementation...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Design of Multiuser CDMA Systems in Fading Channels

    In this paper, the authors examine the effect of channel estimation errors on the performance of Multiple-Input - Multiple-Output (MIMO) systems that employ Code-Division Multiple-Access (CDMA) transmission. Channel estimation based on training techniques has widely been considered throughout the literature. However, employing these training techniques in MIMO-CDMA systems degrades system...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Identification and Analysis of Hard Disk Drive in Digital Forensic

    The dramatic increase in crime relating to the Internet and computers has caused a growing need for computer forensics. Computer forensic tools have been developed to assist computer forensic investigators in conducting a proper investigation into digital crimes. Digital forensics is a growing and important fields of research for current...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks

    Previous research on sensor network security mainly considers homogeneous sensor networks, where all sensor nodes have the same capabilities. Research has shown that homogeneous ad hoc networks have poor performance and scalability. The many-to-one traffic pattern dominates in sensor networks, and hence a sensor may only communicate with a small...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Analyzing Cognitive Radio Physical Layer on BER Performance Over Rician Fading Channel

    This paper analyzes the Bit Error Rate performance of Cognitive Radio Physical layer over Rician channel with AWGN noise under different channel encoding schemes, digital modulation schemes and channel conditions. The system outperforms with Reed Solomon along with convolution encoding for BPSK modulation technique as compared to other digital modulation...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Techniques for Efficiently Ensuring Data Storage Security in Cloud Computing

    The Cloud Computing is the next generation architecture of IT Enterprise. It moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. Here, focus is on cloud data storage security, an important aspect of quality of...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Link Adaptation & Recursive Estimation for GPRS Wireless Networks

    In most of the mobile or cellular systems, the height of the mobile antenna may be much lower than the surrounding structures. Thus, the existence of a direct or line of sight path between the transmitter and the receiver is highly unlikely. In such a case, propagation is mainly due...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    DADI: Data Access by Data Intrusion

    The mining is a source for the data base as it requires several elements and techniques for the retrieval operations. Some techniques and their corresponding technologies have an important role in the database which is required in large amounts for data access. The primary method is to retrieve the relevant...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    A Client Level Tool for Concluding Router Packet Forwarding Priority

    Packet Forwarding Prioritization (PFP) in routers is one of the mechanisms commonly available to network operators. PFP can have a significant impact on the accuracy of network measurements, the performance of applications and the effectiveness of network troubleshooting procedures. Despite its potential impacts, no information on PFP settings is readily...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Dynamic Telecast Routing With Security Intensification

    Security has become one of the major issues for data communication over wired and wireless networks. Different from the past work on the designs of network security algorithms and system infrastructures, the authors will propose a dynamic broadcast routing algorithm that could randomize delivery paths for data transmission. The algorithm...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Versions of 802.16

    Worldwide Interoperability for Microwave Access (WIMAX) which is currently employed in some parts of the world is the new era of communication. It is approved by IEEE 802.16 group and is the latest technology which is a standard for point-to-multipoint wireless networking. To deliver "Last mile" broadband connectivity to home...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Analysis of Frequent Item Set Mining on Variant Datasets

    Over the last two decades, with advances in storage media technology, storage devices have become larger and more economically viable. As a result, businesses, large corporations, etc., have started storing and archiving various types of data in the form of large databases. The purpose of storing data is two-fold: first,...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Analysis of Coaxial Feeding and Strip Line Feeding on the Performance of the Square Patch Antenna

    Microstrip patch antennas have different feeding techniques. They can be divided based on power transfer mechanism from feed line to patch. This paper focuses on the design, model and simulation of a microstrip patch antenna by applying two well known and mostly used feeding techniques. Those are coaxial feeding and...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    High Performance Ordering Scheme for MIMO Transmission

    The QR-OSIC receiver design for the transmitter-side power allocated MIMO system. Based on the properties of the function and ordering results, the authors develop the efficient ordering algorithms in combination with the PA scheme. From the convexity of the -function, they derive the ordering strategy that makes the channel gains...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    An Analytical Model to Evaluate the Approaches of Mobility Management

    Now-a-day's efficient mobility management for mobile users in wireless networking is a crucial issue. To maintain global mobility in IP networking the Mobile internet protocol has been proposed. To reduce the signaling traffic related to the Mobile Terminals (MTs) registration with the Home Agents (HAs), whenever their Care-of-Addresses (CoAs) change...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    An Appliance Approach: RTST to Reduce Cost & Time

    A new framework has been developed for Regression Test Selection Technique (RTST) to reduce cost & time. Now, the authors find how it works with some and provide relevant result with data. In RTST, to check the validity of modified software, they select test case from existing test set and....

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Rotation, Scaling and Translation Analysis of Biometric Signature Templates

    Biometric authentication systems that make use of signature verification methods often render optimum performance only under limited and restricted conditions. Such methods utilize several training samples so as to achieve high accuracy. Moreover, several constraints are imposed on the end-user so that the system may work optimally, and as expected....

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Reliable and Efficient Flooding Algorithm for Broadcasting in VANET

    In MANETs, each node is equipped with a wireless transmitter and receiver and is typically free to move around in an arbitrary fashion. The self-configuration ability of MANETs makes them suitable for a wide variety of applications. VANET research concentrates on roads, more so on roads with some reasonable node...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Data Tagging and Data Locating in Cloud Based SOA

    Cloud computing technology is a new concept of providing dramatically scalable and virtualized resources. It implies a service oriented architecture, reduced information technology overhead for the end-user, great flexibility, reduced total cost of ownership, on-demand services and many other things. When the Software as a Service Provider or Infrastructure as...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Framework to Measure and Maintain the Quality of Software Using the Concept of Code Readability

    Present day's software industry is using software metrics to estimate the complexity of software systems to find software cost estimation, software development control, software testing, software assurance and software maintenance. The relationship between a simple set of local code features and human concept of readability can be derived by collecting...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Sep 2011

    Review of Solutions for Securing the Vehicular Networks

    The successful introduction of vehicular communication has to posses the design of robust security architecture that should be able to cope with security threats. Ad hoc networks are a new wireless networking paradigm for mobile hosts. Vehicular networks are likely to become the most relevant form of mobile ad hoc...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Sep 2011

    Trustworthy Computing Under Identity-Based Encryption

    The authors propose a fully functional Identity-Based Encryption scheme (IBE). The scheme has chosen cipher text security in the random oracle model assuming a variant of the computational Diffie-Hellman problem. Their system is based on bilinear maps between groups. The Weil pairing on elliptic curves is an example of such...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    The Role of Quality Assurance in Software Development Projects: Project Failures and Business Performance

    Despite rapid advances in all facets of technology, the software industry still struggles with the formidable task of developing software applications that meet quality standards, and budget constraints. The need for software to be error-free remained a challenge to the IT industry. Therefore, the primary purpose of this study is...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    An Index Based Congestion Aware Routing Protocol for Wireless Sensor Networks

    Energy efficient protocol is very important in Wireless Sensor Networks (WSNs) because the nodes in WSNs are usually battery operated sensing devices with limited energy resources and replacing the batteries is usually not an option. Thus energy efficiency is one of the most important issues in WSNs. Routing protocols which...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    Congestion Control Avoidance in Adhoc Network Using Queuing Model

    Mobile ad hoc network is an emerging standard or wireless communication. Due to the impendence in infrastructure dependencies these networks are rapidly emerging. These networks are since evolving has to develop methodologies for the compatibility of current services in such an environment. Various services compatibilities were studied and methodologies were...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    Reliable Software Development With Proposed Quality Oriented Software Testing Metrics

    For an effective test measurement, a software tester requires a testing metrics that could measure the quality and productivity of software development process along with increasing its reusability, correctness and maintainability. Until now, the understanding of measuring software quality is not yet sophisticated enough and is still far away from...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    Sec.AODV for MANETs Using MD5 With Cryptography

    Mobile Ad hoc NETworks (MANETs) characteristics present major vulnerabilities in security. The threats which thought-out in MANETs are due to maliciousness that intentionally disrupts the network by using variety of attacks and due to insecure routing protocols (e.g. AODV), which were developed without considering security in mind. Due to lack...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    Concept of Privacy Protection in Data Mining

    In this paper, the authors address the issue of privacy preserving data mining. Specifically, they consider a scenario in which two parties owning confidential databases wish to run a data mining algorithm on the union of their databases, without revealing any unnecessary information. Their work is motivated by the need...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    A Conceptual Usability Framework for Mobile Service Consumers

    Variation and count of mobile devices accrue each day and Service Oriented Architecture (SOA) decompose the systems into loosely coupled and platform independent software services that facilitate integration of mobile devices to enterprise systems as a service consumer or provider. The prosperity of interactive systems is relayed on the realization...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    A Signcryption Scheme Based on Elliptic Curve Cryptography

    In Public key cryptography a message is sent after applying the digital signature and encryption techniques by the sender. These techniques are used so that the message properties such as confidentiality, integrity and unforgeability are maintained and the non-repudiation can be ensured at the receiving end. The digital signatures and...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    A Review on Cryptography Mechanisms

    In today's information age, communications play an important role which is becoming widespread as well. The same aspects of cryptography that make it useful for security and privacy make it particularly troublesome for law enforcement. The use of cryptography by criminals can prevent law enforcement from obtaining information needed for...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    Performance Evaluation of EFCI and ERICA Schemes for ATM Networks

    Rate based congestion control promises effective traffic management for ABR service class suitable to data communications in ATM networks. The rate based congestion control algorithm dynamically regulates transmission rate of source end system according to feedback information from the network. In this paper, the authors described two rate based congestion...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    A New Approach to Mine Frequent Pattern in Spatial Database Using TFP-Tree

    Today there are several skilled algorithms to mine frequent patterns. Frequent item set mining provides the associations and correlations among items in large transactional or relational database. In this paper a new approach to mine frequent pattern in spatial database using TFP-tree is proposed. The proposed approach generates a TFP-tree...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    A Review of Various Security Protocols in Wireless Sensor Network

    Sensor networks are highly distributed networks of small, lightweight wireless sensor nodes, deployed in large numbers to monitor the environment or system by the measurement of physical parameters such as temperature, pressure, or relative humidity, sound, vibration, motion or pollutants, at different locations. A WSN is composed of a large...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    Protection of Web User's Privacy by Securing Browser from Web Privacy Attacks

    The Internet and World Wide Web being an essential part of everyone's life, the users have become more conscious about their privacy. The user's web privacy unfortunately, is not focused much by the current browsers. This paper focuses on the attacks which compromises user's anonymity, grab user's private data. It...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    Heap Base Coordinator Finding With Fault Tolerant Method in Distributed Systems

    Coordinator finding in wireless networks is a very important problem, and this problem is solved by suitable algorithms. The main goals of coordinator finding are synchronizing the processes at optimal using of the resources. Many different algorithms have been presented for coordinator finding. The most important leader election algorithms are...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    Reletive Distance Mobile Ad Hoc Networks (RDMAR)

    Ad hoc networks are characterized by wireless connectivity, continuous changing topology, distributed operation and ease of deployment routing in Ad hoc networks is a challenge due to mobility and thus is a current area of research. In context of Mobile Ad hoc NETworks (MANET) the authors can say that Mobile...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    Resource Management in Distributed System

    Resource management in distributed environment is concerned with a system in which the main aim is to make sure that a user/client can access the remote resources with as much ease as it can access the local resources. The basis of resource management in the distributed system is also resource...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    Formal Methods of Software Testing and Terminology

    Software provides a complete set of application development tools for building stand-alone, client-server, and Internet-enabled applications. But making it easy to build applications can be a two-edged sword. Not only can developers build powerful, sophisticated applications, but they can also build applications that frustrate users, waste computer resources, and damage...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    Secure Routing Protocol for Multi-Hop Wireless Networks

    Most recent ad hoc network research has focused on providing routing services without considering security. The authors detail security threats against ad hoc routing protocols, specifically examining AODV and DSR. In light of these threats, they identify three different environments with distinct security requirements. They propose a solution to one,...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    Security Threats in Volunteer Computing Environments Using the Berkeley Open Infrastructure for Network Computing (BOINC)

    Volunteer Computing is a low cost and easy deployable solution for scientific projects that require large amounts of computational power. Volunteer computing public access capabilities comes with several security threats to the projects, thus, this projects must be designed and focused towards security in order to be able to stand...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    An Analysis of Distributed Computer Network Administration

    Computer Networking is necessary to human beings. People needed to share ideas, research knowledge, and the way of life to their friends. In the modern time, the role of computer networks became dreamy. Analyzing, accessing, sharing and storing of data and information are very easy with help of distributing computer...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Performance Evaluation of Improved Algorithm for Wireless Sensor Networks

    Wireless sensor networks have recently come into prominence because they hold the potential to revolutionize many segments of the economy and life, from environmental monitoring and conservation, to manufacturing and business asset management, to automation in the transportation and health-care industries. Information collected by and transmitted on a sensor network...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    A Novel Approach for Securing Mobile Ad Hoc Network With an Enhanced Trust Calculation Method

    A Mobile Adhoc Network is a group of wireless mobile computers in which nodes cooperate by forwarding packets for each other to allow them to communicate beyond direct wireless transmission range. Due to wide-ranging characteristics of the Ad Hoc Networks like decentralization, dynamic topology and neighbor based routing, it is...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    A Trust, Privacy and Security Infrastructure for the Inter-Cloud

    Cloud Computing is one of the most important security challenges to manage and assure a secure usage over multi-provider Inter-Cloud environments with dedicated communication infrastructures, security mechanisms, processes and policies. Based on the collection of various Inter-Cloud usecases and scenarios within the private and public sector like DMTF (Distributed Management...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Open Source in Cloud Computing

    Cloud computing is emerging as the latest BUZZ word in Information Technology. There is going to be a great shift from traditional network computing to cloud computing. The features of Cloud computing - Pay as you go and Virtualization has made it a long run in advance technologies. This paper...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Type of Security Threats and It's Prevention

    Security is a branch of computer technology known as information security as applied to computers and networks. The objective of online security includes protection of information and property from theft, corruption, or threats attack, while allowing the information and property to remain accessible and productive to its intended users. The...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Cloud Computing Security With Nymble Technology

    Misbehave blacklisting schemes allow online service provide in cloud computer to prevent Misbehave access by abusive users while preserving the privacy of all Misbehave users (both abusive and non-abusive). The scheme proposed for this purpose was Nymble, an extremely efficient scheme based only on symmetric primitives; however, Nymble relies on...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    3-D Graphical Password Used For Authentication

    In today's world, security is important aspect in day to day life. So, everyone used various ways for security purpose. People use passwords for their security. Generally, everyone uses textual password. Textual password is combination of alphabets and numbers. People keep textual password as name of their favorite things, actors...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Interpretation of Formal Proof for Cryptographic Protocols into Computational Model

    Cryptography is the spinal cord for all security measures involved in computing field so a lot of emphasis is required to be given to make it strong enough to deal all the transition of the security industry. The authors present a general method to prove security properties of multiple cryptographic...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Automatically Communication Path Creation and Reconfiguration in Dynamic Network Environment for Optimizing Performance to Network Applications

    Accessing network services across a wide area network still remains a challenging task and the difficulty mainly comes from the heterogeneous and constantly changing network environment, which usually causes undesirable user experience for network-oblivious applications. A promising approach to address this is to provide network awareness in communication paths. Many...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Consideration With Dynamic Routing Security

    One of the major issues for data communication over wired and wireless networks is the security. the past work is on the designs of cryptography algorithms and system infrastructures. Dynamic routing algorithm called improved dynamic routing with security consideration, which is based on the concept of Zone Routing Protocol (ZRP)...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Simulation Based: Study and Analysis of Routing Protocol in Vehicular Ad-Hoc Network Environment

    A Vehicular Ad hoc NETwork (VANET) consists of vehicles which communicate with each other and exchange data via wireless communication links available between the vehicles which are in communication ranges of vehicles to improve the road safety in city. The communication between vehicles is used to provide road safety, comfort...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    A Quantitative Study and Comparison of Secure OLSR Routing Protocol

    This paper presents the comparison of the secure OLSR (Optimized Link State Routing Protocol) in mobile ad-hoc network with other approach. The authors compare the security from the different approach and their effect on the existing OLSR. The main aim of this paper is to study the various securities and...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    A New Routing Algorithm in MANETS: Location Aided Hybrid Routing

    In this paper, the authors propose a new hybrid routing protocol for MANET called Location Aided Hybrid Routing Protocol for MANET (LAHRP). The proposed routing algorithm not only aims to optimize bandwidth usage of MANETs by reducing the routing overload but also extend battery life of the mobile devices by...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Runtime CPU Scheduler Customization Framework for Real Time Operating System

    Most of the embedded systems have real-time requirements about the use of Real-Time Operating Systems able of satisfying the embedded system requirements. So, in embedded application where the real-time operating systems are noted are been called as the Real Time Embedded Operating Systems (REOS). Main features of that of real-time...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Performance of MIMO With Cyclic Coded OSTBC Using OFDM

    Wireless designers constantly seek to improve the spectrum efficiency/capacity, coverage of wireless networks, and link reliability. Space-time wireless technology that uses multiple antennas along with appropriate signalling and receiver techniques offers a powerful tool for improving wireless performance Space-time block codes were designed to achieve the maximum diversity order for...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Efficient and Fair Exchange of Digital Signatures Based on RSA Algorithm

    A fair contract-signing protocol allows two potentially mistrusted parities to exchange their commitments (i.e., digital signatures) to an agreed contract over the Internet in a fair way, so that either each of them obtains the other's signature, or neither party does. Based on the RSA signature scheme, a new digital...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Performance Analysis of Mesh and Position Based Hybrid Routing In MANETS: A Comprehensive Study

    Mobile Ad hoc NETworks (MANETs) are autonomously self-organized networks without infrastructure support. In a mobile ad hoc network, nodes move arbitrarily; therefore, the network may experience rapid and unpredictable topology changes. Because nodes in a MANET normally have limited transmission ranges, some nodes cannot communicate directly with each other. Hence,...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    RCP Supporting Emergency Applications of WSN

    Wireless Sensor Networks (WSN) can be used to monitor the people environment, objects in that environment and interactions of objects with each other. Use of WSN for emergency applications includes fire detection system in forest, soil motion detection, monitoring historical and public places, volcano monitoring etc. In WSN errors or...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Optimization Technique for Multi-Join Operation in Active Data Warehouse

    In current scenario of fast changing data content in most dynamic heterogeneous application, data format transformation and data updates needs to be handled in traditional data ware housing. Many researches have been made under active data warehousing which keep the latest updates of more dynamic large multi-format data warehouses. Previous...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Apr 2012

    A Framework for Implementing e-Attendance System Using Near Field Communication in Android Os

    Education system in India has been changing widely in last 10 years due to the development of the technology. Smart class, E-learning, Video conferencing are some of them. The core idea of this paper is to implement some of the emerging technologies like mobile computing and near field communications and...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Sep 2011

    Review of Solutions for Securing the Vehicular Networks

    The successful introduction of vehicular communication has to posses the design of robust security architecture that should be able to cope with security threats. Ad hoc networks are a new wireless networking paradigm for mobile hosts. Vehicular networks are likely to become the most relevant form of mobile ad hoc...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Sep 2011

    Trustworthy Computing Under Identity-Based Encryption

    The authors propose a fully functional Identity-Based Encryption scheme (IBE). The scheme has chosen cipher text security in the random oracle model assuming a variant of the computational Diffie-Hellman problem. Their system is based on bilinear maps between groups. The Weil pairing on elliptic curves is an example of such...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Simulation and Analysis of Receiver-Receiver Time Synchronization in Wireless Sensor Networks

    Wireless sensor networks were initially deployed for military applications. Gradually researchers found them to be very useful in applications like weather monitoring, target tracking, agriculture, industrial applications, and recently smart homes and kindergartens. All the WSN applications need partial or full time synchronization. Applications like acoustic ranging, target tracking or...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Grid Computing for Different Applications

    Grid Computing delivers on the potential in the growth and abundance of network connected systems and bandwidth: computation, collaboration and communication over the Advanced Web. At the heart of Grid Computing is a computing infrastructure that provides dependable, consistent, pervasive and inexpensive access to computational capabilities. The use of grid...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Improved Diffie-Hellman Algorithm for Network Security Enhancement

    Communication is the important part in any type of network for making it possible to transfer data from one node to another. Communication needs quality and security for better performance and for acceptance of users and client companies. Quality is dependent on size and some other factors of network but...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Agile Plus - Comprehensive Model for Software Development

    In today's changing environment the main priority of a customer is software that executes 100% requirements of customer. In addition there should be some scope so that existing software must adopt future requirements too, that is, it should be flexible enough that can accommodate future requirements, within budget and timely...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Performance of AODV Against Black Hole Attacks in Mobile Ad-Hoc Networks

    Wireless Mobile Ad hoc NETwork (MANET) is a self-configuring network which is composed of several movable mobile nodes. These mobile nodes communicate with each other without any infrastructure. As wireless ad-hoc networks lack an infrastructure, they are exposed to a lot of attacks. One of these attacks is the Black...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Optimizing and Enhancing Parallel Multi Storage Backup Compression for Real-Time Database Systems

    One of the big challenges in the world was the amount of data being stored, especially in Data Warehouses. Data stored in databases keep growing as a result of businesses requirements for more information. A big portion of the cost of keeping large amounts of data is in the cost...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    A Strategy for Package Transformation for Linux Environment

    A Linux operating system is composed of a large number of software packages. Among packages there exist a variety of complex dependency relations, and their management is the foundation of building and maintaining Linux operating system. And the premise of the management is the dependency relations' extraction. Based on the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Emerging Trends in Quantum Cryptography - A Survey

    Privacy is paramount when communicating sensitive information in today's increasingly networked world. Both the business and government sectors have ever-more demanding secure communication needs. Conventional information assurance methods face increasing technological challenges and future threats, including unanticipated advances in mathematics, high-performance computing, and the possibility of large-scale quantum computation. Quantum...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    A Survey on Cloud Computing Architecture

    Cloud computing is Internet-based computing, whereby shared resources, software and information are provided to computers and other devices on demand. Users don't need expertise in or control over the technology infrastructure "In the cloud". Typical cloud computing providers deliver common business applications online that are accessed from another Web service...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Implementation of New Cell Site in Telecom Sector

    This paper revaluates the basic requirements for the installation and implementation of new cell site in telecom sector and will discuss the impact of various physical and environmental conditions on the installation process. In simple terms, a cell site depicts a place where antennas and electronic communications equipment are located,...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Efficient Routing Strategy for Prioritized Messages in Mobile WSN Using Geographic Forwarding Protocol

    The current work represents a new routing protocol considering the environment of wireless sensor network with dynamic mobility. The approach addresses the issues for both real time and non-real time data dissemination from the mobile sensors to the sink. The prime target of this approach is to resolve the issues...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Energy-Efficient Cooperative Protocol for Wireless Networks

    In cooperative networks, transmitting and receiving nodes recruit neighboring nodes to help in communication. The authors model a cooperative transmission link in wireless networks and then it forms a cluster at transmitter end and a receiver end. In this paper, they propose a cooperative communication protocol for formation of these...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Measurement of Real Time Information Using GPU

    Parallel programming is about performance, for otherwise the authors would write a sequential program. A problem is where to find truly parallel hardware that can be dedicated to the task, One answer is Graphical Processing Units (GPUs), which can have hundreds of cores and are found in millions of desktop...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Analysis of Relay Stations in WiMAX Networks

    The demand for broadband services is growing IEEE sharply today. The traditional solutions to provide high speed broadband access is to use wired access technologies such as cable modem, Digital Subscriber Line (DSL), Ethernet and fiber optics. It is too difficult and expensive for carriers to build and maintain wired...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    A Survey: On Generation of Wireless Telephony Technology

    Wireless communication is the transfer of information over a distance without the use of enhanced electrical conductors or "Wires". The distances involved may be short (a few meters as in television remote control) or long (thousands or millions of kilometres for radio communications). When the context is clear, the term...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Energy Efficient Routing Protocols in Mobile Ad Hoc Networks

    In wireless network can classified in two way one is infrastructure network and another is infrastructure less. Infrastructure less wireless network is known as Ad-hoc network. An ad-hoc network is a Local Area Network (LAN) that is built spontaneously as devices connect. Instead of relying on a base station to...

    Provided By International Journal of Computer Technology and Applications