International Journal of Computer Technology and Applications

Displaying 241-280 of 306 results

  • White Papers // Aug 2011

    Formal Methods of Software Testing and Terminology

    Software provides a complete set of application development tools for building stand-alone, client-server, and Internet-enabled applications. But making it easy to build applications can be a two-edged sword. Not only can developers build powerful, sophisticated applications, but they can also build applications that frustrate users, waste computer resources, and damage...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    Secure Routing Protocol for Multi-Hop Wireless Networks

    Most recent ad hoc network research has focused on providing routing services without considering security. The authors detail security threats against ad hoc routing protocols, specifically examining AODV and DSR. In light of these threats, they identify three different environments with distinct security requirements. They propose a solution to one,...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    Evolution of the 4th Generation Mobile Communication Network: LTE-Advanced

    Mobile communication network experiences dramatic advances and changes over the last two decades. With the growing demand, the development of the design and optimization of radio access technologies and a further evolution of the existing system, the Third Generation Partnership Project (3GPP) had laid down the foundation of the future...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    A Conceptual Usability Framework for Mobile Service Consumers

    Variation and count of mobile devices accrue each day and Service Oriented Architecture (SOA) decompose the systems into loosely coupled and platform independent software services that facilitate integration of mobile devices to enterprise systems as a service consumer or provider. The prosperity of interactive systems is relayed on the realization...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    A Signcryption Scheme Based on Elliptic Curve Cryptography

    In Public key cryptography a message is sent after applying the digital signature and encryption techniques by the sender. These techniques are used so that the message properties such as confidentiality, integrity and unforgeability are maintained and the non-repudiation can be ensured at the receiving end. The digital signatures and...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    A Review on Cryptography Mechanisms

    In today's information age, communications play an important role which is becoming widespread as well. The same aspects of cryptography that make it useful for security and privacy make it particularly troublesome for law enforcement. The use of cryptography by criminals can prevent law enforcement from obtaining information needed for...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    Performance Evaluation of EFCI and ERICA Schemes for ATM Networks

    Rate based congestion control promises effective traffic management for ABR service class suitable to data communications in ATM networks. The rate based congestion control algorithm dynamically regulates transmission rate of source end system according to feedback information from the network. In this paper, the authors described two rate based congestion...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    A New Approach to Mine Frequent Pattern in Spatial Database Using TFP-Tree

    Today there are several skilled algorithms to mine frequent patterns. Frequent item set mining provides the associations and correlations among items in large transactional or relational database. In this paper a new approach to mine frequent pattern in spatial database using TFP-tree is proposed. The proposed approach generates a TFP-tree...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    A Review of Various Security Protocols in Wireless Sensor Network

    Sensor networks are highly distributed networks of small, lightweight wireless sensor nodes, deployed in large numbers to monitor the environment or system by the measurement of physical parameters such as temperature, pressure, or relative humidity, sound, vibration, motion or pollutants, at different locations. A WSN is composed of a large...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    Protection of Web User's Privacy by Securing Browser from Web Privacy Attacks

    The Internet and World Wide Web being an essential part of everyone's life, the users have become more conscious about their privacy. The user's web privacy unfortunately, is not focused much by the current browsers. This paper focuses on the attacks which compromises user's anonymity, grab user's private data. It...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    Heap Base Coordinator Finding With Fault Tolerant Method in Distributed Systems

    Coordinator finding in wireless networks is a very important problem, and this problem is solved by suitable algorithms. The main goals of coordinator finding are synchronizing the processes at optimal using of the resources. Many different algorithms have been presented for coordinator finding. The most important leader election algorithms are...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    Reletive Distance Mobile Ad Hoc Networks (RDMAR)

    Ad hoc networks are characterized by wireless connectivity, continuous changing topology, distributed operation and ease of deployment routing in Ad hoc networks is a challenge due to mobility and thus is a current area of research. In context of Mobile Ad hoc NETworks (MANET) the authors can say that Mobile...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    Resource Management in Distributed System

    Resource management in distributed environment is concerned with a system in which the main aim is to make sure that a user/client can access the remote resources with as much ease as it can access the local resources. The basis of resource management in the distributed system is also resource...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    Implementation of Data Integration Using Distributed Systems: A Review

    Data integration in the distributed data system is introduced to solve the problem that data model has. The data integration in the distributional systems can be supported effectively. Data conversion is still a challenge in distributed system integration. Community based system is used for distributed data integration. It comprises of...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jul 2011

    UEP Based on Proximity Pilot Subcarriers With FEC in OFDM

    A novel UEP (Unequal Error Protection) method is proposed that utilizes the subcarrier positions relative to pilot subcarriers in an OFDM multicarrier frame along with FEC (Forward Error Correction) schemes. With the available physical layer techniques, a prioritized encoding strategy based on the characteristics of the channel fading effects on...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    A Novel Approach for Cheating Prevention Through Visual Cryptographic Analysis

    Confidentiality is probably the most common aspect of information security and the authors need to protect their valuable information and it has become an inseparable issue as information technology is ruling the world now. Cryptography is the study of integer mathematical techniques related aspects of Information Security such as confidentiality,...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    An Efficient Approach to Access Database in J2ME Applications

    Application development for mobile devices has been very challenging. Distributed applications for mobile devices should have uninterrupted data access. Though most of the mobile phones have CLDC configuration, Java provides no standard JDBC driver and API for mobile devices with CLDC configuration. Relational database in J2ME can be used with...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    A Simulation Study Between the Random Based Synthetic Entity Mobility Models in Ad Hoc Networks

    A Mobile Ad-hoc NETwork (MANET) is a network formed without any central administration which consists of mobile nodes that use a wireless interface to send packet data. MANETs are extremely flexible and each node is free to move independently, in any random direction. Each node in MANET maintains continuously the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Image Cipher Technique for Covert and Low Bandwidth Channels

    Security of images during the transmission over covert low bandwidth channel has importance in today's image communications for confidential, integrated and secure real time communication. The major security problems during communication over covert and low bandwidth channel is to reduce no of bits, efficient and secure cryptographic techniques such that...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    A Fuzzy QOS Key Base Secured MANET Routing With Multipath Data Fragmentation (FQKSMR)

    MANET or Mobile Adhoc Network has drawn considerable research attention and application over the last few years. With the increase of applicability, and adaptability of the network in Private virtual network or wireless personal area network, the attacks and intrusion of MENT data has also increased which has lead to...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Applying Object Oriented Metrics to C#(C Sharp) Programs

    Object-oriented technology is becoming increasingly popular in industrial software development environments. This technology helps in the development of a software product of higher quality and lower maintenance costs. Since the traditional software metrics aims at the procedure-oriented software development so it cannot fulfill the requirement of the object-oriented software, as...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    The Importance of QoS & QoE Management in Wireless Communication System

    Now-a-day, wireless communication systems are popular due to its wide advantages. In the customer's point of view, the authors can say the most of the customer requirements related to communication from one place to another place are fulfilled up to the most extent using these systems. The initiation to these...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Cryptography and Steganography - A Survey

    Digital communication has become an essential part of infrastructure now-a-days, a lot of applications are Internet-based and it is important that communication be made secret. As a result, the security of information passed over an open channel has become a fundamental issue and therefore, the confidentiality and data integrity are...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Writing Software Requirements Specification Quality Requirements: An Approach to Manage Requirements Volatility

    Quality requirements, that form a major sub-category of requirements, define a broad set system-wide attributes such as security, performance, usability and scalability. Unfortunately, many organizations pay less attention to quality requirements & assume that the necessary qualities are implicitly understood & will naturally emerge as the product is developed. In...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    A Comparative Study of the Available Solutions to Minimize Denial of Service Attacks in Wireless LAN

    Denial of Service (DoS) attack is a major attack in Wireless Local Area Network. This paper studies the available solutions for Denial of Service (DoS) attacks and compares them with each other in a wireless infrastructure network. All these methods are used to minimize the DoS attacks. It discusses the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Network Intrusion Forensic Analysis Using Intrusion Detection System

    The need for computer intrusion forensics arises from the alarming increase in the number of computer crimes that are committed annually. After a computer system has been breached and an intrusion has been detected, there is a need for a computer forensics investigation to follow. Computer forensics is used to...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Multicast Security Attacks and Its Counter Measures for Puma Protocol

    A Mobile Ad hoc NETwork (MANETs) is a continuously changing wireless network that can be created without any pre-existing infrastructure in which each node can operate as a router. MANETs has no clear line of control, so it is accessible to both legitimate network users and malicious attackers. The main...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Secure Measures for the Vulnerabilities in MAODV

    Mobile Adhoc NETworks (MANETs) is a highly challenged network environment due to its special characteristics such as decentralization, dynamic topology and neighbor based routing. Most important application for ad-hoc networks is group oriented in nature and can therefore benefit from a multicast communication services. Most of the multicast routing protocols...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Transmission and System Control in Quantum Cryptography

    Quantum cryptography provides security using the laws of quantum mechanics. Currently, several types of protocols of Quantum Key Distribution (QKD) have been established. Some QKD protocols have been certified by proofs of unconditional security. QKD protocols have been confirmed to be resistant to any possible attack. Along with the progress...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Identity Based Color Image Cryptography

    An Identity based cryptography based on visual cryptography scheme was proposed for protecting color image. A color image to be protected and authentic entities such as account number, password, signature image are given as input. The binary key image is obtained by distributing the digital signature of obtained authentic entities....

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    A Robust Zone Disjoint Multipath Routing Protocol

    A new multipath routing protocol which is disjoint at the zone level is proposed. The proposed routing protocol is based on the hybrid Zone based Hierarchical Link State Routing Protocol (ZHLS). The proposed work establishes multiple zone disjoint paths between the source and the destination zones. The establishment of multiple...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Performance Evaluation of MANET Routing Protocols Under CBR and FTP Traffic Classes

    Understanding the performance of routing protocols in ad hoc networks is a key feature to determine which routing protocol is best suited for which type of network scenario. From the literature survey it was found that there is a lot of work done on evaluating the performance of various MANET...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Hybrid Video Stabilization Technique for Hand Held Mobile Videos

    The videos taken from hand held mobile cameras suffer from different undesired slow motions like track, boom or pan. Hence it is desired to synthesis a new stabilized video sequence, by removing the undesired motion between the successive frames. Most of the previous methods assumes the camera motion model hence...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    The Technology Journey From Floppy Disk to Cloud Storage

    Data storage and backup needs have evolved over the years necessitating the need for evolution of data storage methods and devices. The needs for a higher storage capacity as well as versatility of storage devices and the need for technologically advanced storage devices became apparent. Once upon a time, storage...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Performance Analysis of Intrusion Detection in MANET

    A mobile ad hoc network is a collection of autonomous nodes or terminals which communicate with each other by forming a multi-hop radio network without the aid of any established infrastructure or centralized administration such as a base station. The ad hoc network provides lack of secure boundaries. At present,...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Studying the Importance and Feasibility of Software Testing

    Software testing is a critical element of software quality assurance and represents the ultimate review of specification, design and coding. Software testing is the process of testing the functionality and correctness of software by running it. Software testing is usually performed for one of two reasons: defect detection, and reliability...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    A New Paradigm for the Next Generation Wireless Optimization Cross Layer Design

    Cross-Layer Design (CLD) is a new paradigm that allows the optimization of communication network architectures across the traditional layer boundaries, but does not imply a change of the present layered architecture. Cross-Layer optimization is used in multi media application this is also used in run this type of applications parallel...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Design Approach for Fault Tolerance Algorithm in FPGA Architecture With BIST in Hardware Controller

    Redundancy based hardening techniques are applied at the pre-synthesis or synthesis level. To provide solutions for increasing the fault-tolerance capabilities with algorithms able to reduce sensitive configuration memory bits of FPGAs the authors use BIST method. While these systems frequently contain hardware redundancy to allow for continued operation in the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Threats in Optical Burst Switched Network

    Optical network is a viable network for future communication, which transmits data at an average rate of 50Tb/s. Optical Burst Switching is a trusted mechanism used for Optical network. There is a good amount of research done in the area of security in Optical networks. In addition, the issues related...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Design and Interfacing of High Speed Model of FPGA Using I2C Protocol

    Once the I2C protocol is being designed for interfacing the devices with each other (i.e. FPGA with OV7620) over a serial data line for getting high speed without data loss, as compare to any other communication methodology. The main purpose for developing the protocol is not only high speed communication...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Implementation of Concurrent Online MBIST for RFID Memories

    Concurrent online testing is a memory test mechanism where the memory can be tested concurrently with the system operation. Thus, it has instant error detection. Radio Frequency IDentification (RFID) devices relies on the correct operation of their memory for identification of objects and delivery of transponder's information. This paper presents...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    Leader Election Algorithm in Wireless Environments Using Fibonacci Heap Structure

    Today is an era of wireless communication systems. The day is not so far when the whole distributed system of the world will goes wireless. Leader in a distributed system plays a vital role in various computing environments like wireless networks etc. The main focus of researchers is on electing...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    An Efficient Transmission of Data for MANETs Using Human Based Recommendation Exchange Protocol

    This paper analyzes a trust model for mobile ad hoc networks. The authors provide nodes with a mechanism to build a trust relationship with its neighbors. The proposed model considers the recommendation of trustworthy neighbors and the experience of the node itself. In order to give trust value beyond the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    Highly Secured Crypto-IRIS Based Authentication System

    Now-a-days bio-metric authentication systems are widely used in order to provide authentication without possessing any physical materials. Bio-metric authentication systems are mainly concentrating on security, revocability, privacy, and accuracy. In this paper, the authors propose a provably two way secured biometric authentication system, which addresses the concerns of user's privacy,...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    Investigation of It Auditing and Checklist Generation Approach to Assure a Secure Cloud Computing Framework

    Recently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However, there are still some concerns about the security provided by the cloud environment are raises. In this paper, the authors are conducting the investigation...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    Next Generation Mobile Application in Cloud Computing Using RESTful Web Services

    Mobile devices, especially smart mobile devices, becoming very popular nowadays. Web services that are used to provide a service for an application running on smart mobile devices also becoming very popular. There are some limitations of the current smart mobile devices, such as limited storage capacity, low processor speed, limited...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    Provable Secure Certificateless Generalized Signcryption Scheme

    Generalized signcryption is a new cryptographic primitive, which works as a signcryption scheme, a signature scheme and an encryption scheme as per need. It is more suitable for some storage constrained environments, e.g. smart cards, WSN (Wireless Sensor Networks) etc. Recently, Ji et al. proposed a security model for certificateless...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    A New Model for Software Risk Management

    In the modern time of software engineering, the development of software in static and dynamic environment results in several vulnerabilities that need to be handled so that they do not step in with the clear defined project goals. Previous studies show that the wide variety of different risk analysis strategies...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    A Model and Framework for Reality-Oriented Web Services

    Mobile devices that use information from sensors such as GPS and accelerometers are becoming widespread today, and web services using a variety of sensor information have appeared. This paper refers to these web services as reality-oriented web services. Since existing frameworks not designed to handle sensor information are useless when...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    An Improvement in AOMDV With Randomization

    Mobile Ad hoc NETworks (MANETs) consist of a collection of wireless mobile nodes which dynamically exchange data among themselves without the reliance on a fixed base station or a wired back-bone network. Multipath routing allows the establishment of multiple paths between a single source and single destination node. It is...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Nov 2012

    Energy-Efficient Reliable Routing in Wireless Multimedia Sensor Networks

    Wireless Multimedia Sensor Networks (WMSN) can handle different traffic classes of multimedia content (video, audio streams and still images) as well as scalar data over the network. Use of general and efficient routing protocols for WMSN is of crucial significance. Similar to other traditional networks, in WMSN a noticeable proportion...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Nov 2012

    Construction of Power Efficient Fault Tolerant Wireless Network Using Cone Based Algorithm

    Fault tolerant topology control for all to one communication holds significance in dynamic wireless networks with asymmetric wireless links. In this paper the author Investigates the various aspects of the problem mentioned above using the cone based distributed topology control algorithm. The topology of a wireless multi-hop network can be...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Nov 2012

    Secure Data Transmission in MANET Routing Protocol

    Information exchange in a network of mobile and wireless nodes without any infrastructure support such networks are called as Ad-hoc networks. A Mobile Ad hoc NETwork (MANET) is mobile, multi-hop, infrastructure less wireless network which is capable of autonomous operation. In this paper the authors have discussed some of the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2012

    Design and development of Middleware Gateway IP Multimedia System and Web Services

    Rapid growth in Internet (Web) applications and usage of mobile in telecommunication is present trends in communication. In Web 2.0 web services architecture is become versatile tool for enterprise solutions in distributed environment systems. To provide an enterprise solution it is not possible to get professional solution at one place....

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2012

    Robust Aggregation in Sensor Network: An Efficient Frequent Itemset and Number of Occurrence Counting

    Sensor networks are collection of sensor nodes which co-operatively send sensed data to base station. As sensor nodes are battery driven, an efficient utilization of power is essential in order to use networks for long duration hence it is needed to reduce data traffic inside sensor networks, reduce amount of...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2012

    Fast and Efficient IP Network Recovery using Multiple Routing Configuration

    Internet plays a vital role in the peoples communications infrastructure, due to slow convergence of routing protocols after network failure become a growing problem. To guarantee fast recovery from link and node failure in networks, the authors propose a new recovery scheme called Multiple Routing Configuration (MRC). Their proposed scheme...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2012

    Performance Analysis of Shortest Path Energy Efficient Routing Protocol in Wireless Sensor Networks Using NSRS Algorithm

    Wireless Sensor Network is an up-and-coming technology that shows great promise for various innovative applications both for public and military. Wireless Sensor Networks (WSNs) are Ad-hoc wireless networks of typically consists of hundreds or even thousands of small low-cost sensor nodes that communicate in a wireless way. A sensor node...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Priority Based Scheduling Algorithm Using Time and Transmission Length in 802.11 Networks

    The fairness of IEEE 802.11 wireless networks is rigid to forecast and organize since it constructed based on uncertainty and difficulty of the MAC conflicts and dynamics. So, there is a great extent of packet data to be met in a network traffic jam and the packet data was collapsed...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2012

    Underwater Acoustic Sensor Networks: A Survey on MAC and Routing Protocols

    In this paper, a detailed survey on the current protocols for medium access control layer and routing layer in the area underwater acoustic sensor networks are given. This survey is on some of the best MAC protocols and routing protocols and also it compares them based on some critical parameters...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    Security Threats in Volunteer Computing Environments Using the Berkeley Open Infrastructure for Network Computing (BOINC)

    Volunteer Computing is a low cost and easy deployable solution for scientific projects that require large amounts of computational power. Volunteer computing public access capabilities comes with several security threats to the projects, thus, this projects must be designed and focused towards security in order to be able to stand...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Sep 2011

    Review of Solutions for Securing the Vehicular Networks

    The successful introduction of vehicular communication has to posses the design of robust security architecture that should be able to cope with security threats. Ad hoc networks are a new wireless networking paradigm for mobile hosts. Vehicular networks are likely to become the most relevant form of mobile ad hoc...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Sep 2011

    Trustworthy Computing Under Identity-Based Encryption

    The authors propose a fully functional Identity-Based Encryption scheme (IBE). The scheme has chosen cipher text security in the random oracle model assuming a variant of the computational Diffie-Hellman problem. Their system is based on bilinear maps between groups. The Weil pairing on elliptic curves is an example of such...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Runtime CPU Scheduler Customization Framework for Real Time Operating System

    Most of the embedded systems have real-time requirements about the use of Real-Time Operating Systems able of satisfying the embedded system requirements. So, in embedded application where the real-time operating systems are noted are been called as the Real Time Embedded Operating Systems (REOS). Main features of that of real-time...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Performance of MIMO With Cyclic Coded OSTBC Using OFDM

    Wireless designers constantly seek to improve the spectrum efficiency/capacity, coverage of wireless networks, and link reliability. Space-time wireless technology that uses multiple antennas along with appropriate signalling and receiver techniques offers a powerful tool for improving wireless performance Space-time block codes were designed to achieve the maximum diversity order for...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Efficient and Fair Exchange of Digital Signatures Based on RSA Algorithm

    A fair contract-signing protocol allows two potentially mistrusted parities to exchange their commitments (i.e., digital signatures) to an agreed contract over the Internet in a fair way, so that either each of them obtains the other's signature, or neither party does. Based on the RSA signature scheme, a new digital...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Performance Analysis of Mesh and Position Based Hybrid Routing In MANETS: A Comprehensive Study

    Mobile Ad hoc NETworks (MANETs) are autonomously self-organized networks without infrastructure support. In a mobile ad hoc network, nodes move arbitrarily; therefore, the network may experience rapid and unpredictable topology changes. Because nodes in a MANET normally have limited transmission ranges, some nodes cannot communicate directly with each other. Hence,...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    RCP Supporting Emergency Applications of WSN

    Wireless Sensor Networks (WSN) can be used to monitor the people environment, objects in that environment and interactions of objects with each other. Use of WSN for emergency applications includes fire detection system in forest, soil motion detection, monitoring historical and public places, volcano monitoring etc. In WSN errors or...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Optimization Technique for Multi-Join Operation in Active Data Warehouse

    In current scenario of fast changing data content in most dynamic heterogeneous application, data format transformation and data updates needs to be handled in traditional data ware housing. Many researches have been made under active data warehousing which keep the latest updates of more dynamic large multi-format data warehouses. Previous...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Apr 2012

    A Framework for Implementing e-Attendance System Using Near Field Communication in Android Os

    Education system in India has been changing widely in last 10 years due to the development of the technology. Smart class, E-learning, Video conferencing are some of them. The core idea of this paper is to implement some of the emerging technologies like mobile computing and near field communications and...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    An Analysis of Distributed Computer Network Administration

    Computer Networking is necessary to human beings. People needed to share ideas, research knowledge, and the way of life to their friends. In the modern time, the role of computer networks became dreamy. Analyzing, accessing, sharing and storing of data and information are very easy with help of distributing computer...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Performance Evaluation of Improved Algorithm for Wireless Sensor Networks

    Wireless sensor networks have recently come into prominence because they hold the potential to revolutionize many segments of the economy and life, from environmental monitoring and conservation, to manufacturing and business asset management, to automation in the transportation and health-care industries. Information collected by and transmitted on a sensor network...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    A Novel Approach for Securing Mobile Ad Hoc Network With an Enhanced Trust Calculation Method

    A Mobile Adhoc Network is a group of wireless mobile computers in which nodes cooperate by forwarding packets for each other to allow them to communicate beyond direct wireless transmission range. Due to wide-ranging characteristics of the Ad Hoc Networks like decentralization, dynamic topology and neighbor based routing, it is...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    A Trust, Privacy and Security Infrastructure for the Inter-Cloud

    Cloud Computing is one of the most important security challenges to manage and assure a secure usage over multi-provider Inter-Cloud environments with dedicated communication infrastructures, security mechanisms, processes and policies. Based on the collection of various Inter-Cloud usecases and scenarios within the private and public sector like DMTF (Distributed Management...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Open Source in Cloud Computing

    Cloud computing is emerging as the latest BUZZ word in Information Technology. There is going to be a great shift from traditional network computing to cloud computing. The features of Cloud computing - Pay as you go and Virtualization has made it a long run in advance technologies. This paper...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Type of Security Threats and It's Prevention

    Security is a branch of computer technology known as information security as applied to computers and networks. The objective of online security includes protection of information and property from theft, corruption, or threats attack, while allowing the information and property to remain accessible and productive to its intended users. The...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Cloud Computing Security With Nymble Technology

    Misbehave blacklisting schemes allow online service provide in cloud computer to prevent Misbehave access by abusive users while preserving the privacy of all Misbehave users (both abusive and non-abusive). The scheme proposed for this purpose was Nymble, an extremely efficient scheme based only on symmetric primitives; however, Nymble relies on...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    3-D Graphical Password Used For Authentication

    In today's world, security is important aspect in day to day life. So, everyone used various ways for security purpose. People use passwords for their security. Generally, everyone uses textual password. Textual password is combination of alphabets and numbers. People keep textual password as name of their favorite things, actors...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Interpretation of Formal Proof for Cryptographic Protocols into Computational Model

    Cryptography is the spinal cord for all security measures involved in computing field so a lot of emphasis is required to be given to make it strong enough to deal all the transition of the security industry. The authors present a general method to prove security properties of multiple cryptographic...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Automatically Communication Path Creation and Reconfiguration in Dynamic Network Environment for Optimizing Performance to Network Applications

    Accessing network services across a wide area network still remains a challenging task and the difficulty mainly comes from the heterogeneous and constantly changing network environment, which usually causes undesirable user experience for network-oblivious applications. A promising approach to address this is to provide network awareness in communication paths. Many...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Consideration With Dynamic Routing Security

    One of the major issues for data communication over wired and wireless networks is the security. the past work is on the designs of cryptography algorithms and system infrastructures. Dynamic routing algorithm called improved dynamic routing with security consideration, which is based on the concept of Zone Routing Protocol (ZRP)...

    Provided By International Journal of Computer Technology and Applications