International Journal of Computer Technology and Applications

Displaying 241-280 of 288 results

  • White Papers // Aug 2011

    Evolution of the 4th Generation Mobile Communication Network: LTE-Advanced

    Mobile communication network experiences dramatic advances and changes over the last two decades. With the growing demand, the development of the design and optimization of radio access technologies and a further evolution of the existing system, the Third Generation Partnership Project (3GPP) had laid down the foundation of the future...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jul 2011

    UEP Based on Proximity Pilot Subcarriers With FEC in OFDM

    A novel UEP (Unequal Error Protection) method is proposed that utilizes the subcarrier positions relative to pilot subcarriers in an OFDM multicarrier frame along with FEC (Forward Error Correction) schemes. With the available physical layer techniques, a prioritized encoding strategy based on the characteristics of the channel fading effects on...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    A Novel Approach for Cheating Prevention Through Visual Cryptographic Analysis

    Confidentiality is probably the most common aspect of information security and the authors need to protect their valuable information and it has become an inseparable issue as information technology is ruling the world now. Cryptography is the study of integer mathematical techniques related aspects of Information Security such as confidentiality,...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    An Efficient Approach to Access Database in J2ME Applications

    Application development for mobile devices has been very challenging. Distributed applications for mobile devices should have uninterrupted data access. Though most of the mobile phones have CLDC configuration, Java provides no standard JDBC driver and API for mobile devices with CLDC configuration. Relational database in J2ME can be used with...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Image Cipher Technique for Covert and Low Bandwidth Channels

    Security of images during the transmission over covert low bandwidth channel has importance in today's image communications for confidential, integrated and secure real time communication. The major security problems during communication over covert and low bandwidth channel is to reduce no of bits, efficient and secure cryptographic techniques such that...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    A Fuzzy QOS Key Base Secured MANET Routing With Multipath Data Fragmentation (FQKSMR)

    MANET or Mobile Adhoc Network has drawn considerable research attention and application over the last few years. With the increase of applicability, and adaptability of the network in Private virtual network or wireless personal area network, the attacks and intrusion of MENT data has also increased which has lead to...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Applying Object Oriented Metrics to C#(C Sharp) Programs

    Object-oriented technology is becoming increasingly popular in industrial software development environments. This technology helps in the development of a software product of higher quality and lower maintenance costs. Since the traditional software metrics aims at the procedure-oriented software development so it cannot fulfill the requirement of the object-oriented software, as...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    A Simulation Study Between the Random Based Synthetic Entity Mobility Models in Ad Hoc Networks

    A Mobile Ad-hoc NETwork (MANET) is a network formed without any central administration which consists of mobile nodes that use a wireless interface to send packet data. MANETs are extremely flexible and each node is free to move independently, in any random direction. Each node in MANET maintains continuously the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    The Importance of QoS & QoE Management in Wireless Communication System

    Now-a-day, wireless communication systems are popular due to its wide advantages. In the customer's point of view, the authors can say the most of the customer requirements related to communication from one place to another place are fulfilled up to the most extent using these systems. The initiation to these...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Cryptography and Steganography - A Survey

    Digital communication has become an essential part of infrastructure now-a-days, a lot of applications are Internet-based and it is important that communication be made secret. As a result, the security of information passed over an open channel has become a fundamental issue and therefore, the confidentiality and data integrity are...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Writing Software Requirements Specification Quality Requirements: An Approach to Manage Requirements Volatility

    Quality requirements, that form a major sub-category of requirements, define a broad set system-wide attributes such as security, performance, usability and scalability. Unfortunately, many organizations pay less attention to quality requirements & assume that the necessary qualities are implicitly understood & will naturally emerge as the product is developed. In...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    A Comparative Study of the Available Solutions to Minimize Denial of Service Attacks in Wireless LAN

    Denial of Service (DoS) attack is a major attack in Wireless Local Area Network. This paper studies the available solutions for Denial of Service (DoS) attacks and compares them with each other in a wireless infrastructure network. All these methods are used to minimize the DoS attacks. It discusses the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Network Intrusion Forensic Analysis Using Intrusion Detection System

    The need for computer intrusion forensics arises from the alarming increase in the number of computer crimes that are committed annually. After a computer system has been breached and an intrusion has been detected, there is a need for a computer forensics investigation to follow. Computer forensics is used to...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Multicast Security Attacks and Its Counter Measures for Puma Protocol

    A Mobile Ad hoc NETwork (MANETs) is a continuously changing wireless network that can be created without any pre-existing infrastructure in which each node can operate as a router. MANETs has no clear line of control, so it is accessible to both legitimate network users and malicious attackers. The main...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Secure Measures for the Vulnerabilities in MAODV

    Mobile Adhoc NETworks (MANETs) is a highly challenged network environment due to its special characteristics such as decentralization, dynamic topology and neighbor based routing. Most important application for ad-hoc networks is group oriented in nature and can therefore benefit from a multicast communication services. Most of the multicast routing protocols...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Transmission and System Control in Quantum Cryptography

    Quantum cryptography provides security using the laws of quantum mechanics. Currently, several types of protocols of Quantum Key Distribution (QKD) have been established. Some QKD protocols have been certified by proofs of unconditional security. QKD protocols have been confirmed to be resistant to any possible attack. Along with the progress...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Identity Based Color Image Cryptography

    An Identity based cryptography based on visual cryptography scheme was proposed for protecting color image. A color image to be protected and authentic entities such as account number, password, signature image are given as input. The binary key image is obtained by distributing the digital signature of obtained authentic entities....

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Performance Evaluation of MANET Routing Protocols Under CBR and FTP Traffic Classes

    Understanding the performance of routing protocols in ad hoc networks is a key feature to determine which routing protocol is best suited for which type of network scenario. From the literature survey it was found that there is a lot of work done on evaluating the performance of various MANET...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Hybrid Video Stabilization Technique for Hand Held Mobile Videos

    The videos taken from hand held mobile cameras suffer from different undesired slow motions like track, boom or pan. Hence it is desired to synthesis a new stabilized video sequence, by removing the undesired motion between the successive frames. Most of the previous methods assumes the camera motion model hence...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    The Technology Journey From Floppy Disk to Cloud Storage

    Data storage and backup needs have evolved over the years necessitating the need for evolution of data storage methods and devices. The needs for a higher storage capacity as well as versatility of storage devices and the need for technologically advanced storage devices became apparent. Once upon a time, storage...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Performance Analysis of Intrusion Detection in MANET

    A mobile ad hoc network is a collection of autonomous nodes or terminals which communicate with each other by forming a multi-hop radio network without the aid of any established infrastructure or centralized administration such as a base station. The ad hoc network provides lack of secure boundaries. At present,...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Studying the Importance and Feasibility of Software Testing

    Software testing is a critical element of software quality assurance and represents the ultimate review of specification, design and coding. Software testing is the process of testing the functionality and correctness of software by running it. Software testing is usually performed for one of two reasons: defect detection, and reliability...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    A New Paradigm for the Next Generation Wireless Optimization Cross Layer Design

    Cross-Layer Design (CLD) is a new paradigm that allows the optimization of communication network architectures across the traditional layer boundaries, but does not imply a change of the present layered architecture. Cross-Layer optimization is used in multi media application this is also used in run this type of applications parallel...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Design Approach for Fault Tolerance Algorithm in FPGA Architecture With BIST in Hardware Controller

    Redundancy based hardening techniques are applied at the pre-synthesis or synthesis level. To provide solutions for increasing the fault-tolerance capabilities with algorithms able to reduce sensitive configuration memory bits of FPGAs the authors use BIST method. While these systems frequently contain hardware redundancy to allow for continued operation in the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Threats in Optical Burst Switched Network

    Optical network is a viable network for future communication, which transmits data at an average rate of 50Tb/s. Optical Burst Switching is a trusted mechanism used for Optical network. There is a good amount of research done in the area of security in Optical networks. In addition, the issues related...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Design and Interfacing of High Speed Model of FPGA Using I2C Protocol

    Once the I2C protocol is being designed for interfacing the devices with each other (i.e. FPGA with OV7620) over a serial data line for getting high speed without data loss, as compare to any other communication methodology. The main purpose for developing the protocol is not only high speed communication...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Analysis and Design of Enhanced HTTP Proxy Cashing Server

    A proxy acts as an intermediary agent between its clients and the servers which they want to access, performing functions directed towards a variety of purposes, like security, caching, etc, in its capacity as an intermediary. A server is anything that has some resource that can be shared. A server...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    A Robust Zone Disjoint Multipath Routing Protocol

    A new multipath routing protocol which is disjoint at the zone level is proposed. The proposed routing protocol is based on the hybrid Zone based Hierarchical Link State Routing Protocol (ZHLS). The proposed work establishes multiple zone disjoint paths between the source and the destination zones. The establishment of multiple...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2011

    Buffer Overflow Attack Blocker Using Sigfree Concept

    SigFree - online signature-free out-of-the-box application-layer method for blocking code-injection buffer overflow attack messages targeting at various Internet services such as web service. Motivated by the observation that buffer overflow attacks typically contain executables whereas legitimate client requests never contain executables in most Internet services, SigFree blocks attacks by detecting...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2011

    Low Read Equivalent Stress Fault Detection in CMOS SRAMs Using MARCH Algorithm

    This paper outlines the reduction of Read Equivalent Stress (RES) during test of SRAM memories and demonstrates that the modified pre-charge activity reduces RES because of the predictable addressing sequence. The authors exploit this observation in order to show minimization of power dissipation during test by eliminating the unnecessary power...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2011

    Hybridization of Advance Technologies in the Field of WLAN

    Wireless communication is the transfer of information over a distance without the use of enhanced electrical conductors or "Wires". The distances involved may be short (a few meters as in television remote control) or long (thousands or millions of kilometers for radio communications). Wireless wide area cellular network solutions have...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2011

    A Compressed Anti IP Spoofing Mechanism Using Cryptography

    Internet becomes a backbone of every sector, which gives essential information of each domain like education, concerns, entertainment etc. Data stealing and data theft is the well known thing in networks. IP spoofing is one of the techniques of data stealing in the form of malicious IP address. Spoofed packet...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2011

    Web Data Mining Using an Intelligent Information System Design

    To use the large amounts of information efficiently on the Web to make the information processing intelligent, personalized and automatic is the most important applications of the current data mining technology. Model Driven Architecture (MDA) which is used for code generation has many benefits over traditional software development methods. An...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2011

    A Checklist Based Framework for Software Security Risk Management

    As security of software systems is becoming more and more important in the current era of e-commerce and e-governance, traditional approaches for software development should be supplanted with a formal approach to security in the software life cycle. Both a software security checklist and assessment tools should be incorporated into...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2011

    Proficient Cluster-Based Routing Protocol Using EBSA and Leach Approaches

    In this paper, the authors deal with Delay-Tolerant Networking (DTN) where they seek to address the technical issues in heterogeneous networks along with the homogeneous networks that may lack continuous network connectivity. The main objective is to distributively group mobile nodes into a cluster, which can then interchangeably share their...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2011

    A Security Approach in System Development Life Cycle

    Many software organizations today are confronted with challenge of building secure software systems. Traditional software engineering principles place little emphasis on security. These principles tend to tread security as one of a long list of quality factors that are expected from all professionally developed software. As software systems of today...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jan 2011

    Efficient Cryptographic Key Generation Using Biometrics

    Biometrics gives a lot of methods in high-secure applications while using natural, user-friendly and fast authentication. Cryptography is intended to ensure the secrecy and authenticity of message. The cryptographic key will be long, so it is difficult to remember, protecting the confidentiality of the cryptographic keys is one of the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jan 2011

    FPGA Based Kalman Filter for Wireless Sensor Networks

    A Wireless Sensor Network (WSN) is a set of tiny and low-cost devices equipped with different kind of sensors, a small microcontroller and a radio transceiver, typically powered by batteries. Target tracking is one of the very important applications of such a network system. Traditionally, KF (Kalman Filtering) and its...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jan 2011

    Comparison of Compaction Techniques in VLSI Physical Design

    The rapid growth in integration technology has been made possible by the automation of various steps involved in the design and fabrication of VLSI chips. The main factors which decide the quality of any chip are power consumption, area and performance of the chip. The demand of light weighted &...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jan 2011

    Low Power at Different Levels of VLSI Design and Clock Distribution Schemes

    Low power chip requirement in the VLSI industry is main considerable field due to the reduction of chip dimension day by day and environmental factors. In this paper various low power techniques at Gate level, Architecture level and different tradeoffs between different clock distribution schemes like as single driver clock...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    A Performance Analysis Between AODV & DSR Routing Protocol

    Mobile Ad hoc NETwork (MANET) is an autonomous system of mobile nodes connected by wireless links. Each node operates not only as an end system, but also as a router to forward packets. The nodes are free to move about and organize themselves into a network. These nodes change position...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    A Study and Detection of TCP SYN Flood Attacks With IP Spoofing and Its Mitigations

    Flooding attacks are major threats on TCP/IP protocol suite these days; Maximum attacks are launched through TCP and exploit the resources and bandwidth of the machine. Flooding attacks are DDOS (Distributed Denial Of Service) attacks and utilize the weakness of the network protocols. SYN flood exploits the 3-way handshaking of...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Communication With Less Hardware

    Software Defined Radio is an emerging technology in the field of communication. In this paper, two applications based on SDR are discussed. First, the authors discuss the weather satellite image decoding using a SDR receiver, FUNCube Dongle (FCD). Second, Sudden Ionospheric Disturbances (SID)are studied with Software Defined Radio (SDR) and...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Isolation of Malicious Node in Dos Scenario in Manet

    MANETs are extensively used these days for communication and there are various communication networks with different standards and computing techniques and as days are passing by the size of MANET is increasing day by day and its expansion is inevitable due to its high penetration and popularity for the usage...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Low Power Analysis of Network-Level On-Chip Communication Using Asynchronous AMBA Protocol

    Network on-Chip (NoC) is a novel structural design template, which can be defied for complicated system level on-chip design. NoC has a potential to limit and present the bus-based communication. In this paper, the crisis to discuss is Low power consumption in an Asynchronous Network on-chip (NoC) level communication. NoC...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    An LMS Based Data Reduction Technique for Energy Conservation in Wireless Sensor Network (WSN)

    In preceding existence, Wireless Sensor Networks (WSNs) have gained an amplified attention from the research community and extended its boundaries in commercial, industrial and medical domains. The tailback in WSN based application development is the inadequate energy source. As sensor nodes are generally battery-powered devices, the critical aspect is to...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Detection of Rogue Base Stations in Wimax/IEEE802.16 Using Sensors

    This paper considers the problem of detecting rogue base station in Wimax/802.16 networks. IEEE 802.16 is an emerging standard for broadband wireless communications that is receiving a lot of attention. Security support is mandatory for any communication networks. For wireless systems, security support is even more important to protect the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Implementation of Concurrent Online MBIST for RFID Memories

    Concurrent online testing is a memory test mechanism where the memory can be tested concurrently with the system operation. Thus, it has instant error detection. Radio Frequency IDentification (RFID) devices relies on the correct operation of their memory for identification of objects and delivery of transponder's information. This paper presents...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    Leader Election Algorithm in Wireless Environments Using Fibonacci Heap Structure

    Today is an era of wireless communication systems. The day is not so far when the whole distributed system of the world will goes wireless. Leader in a distributed system plays a vital role in various computing environments like wireless networks etc. The main focus of researchers is on electing...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    Efficient Use of Bidirectional Communication to Increase Communication Capabilities in Distributed VANET

    Intelligent Transportation System (ITS) is the need for today's luxurious life where the traffic is unavoidable part of the people life. Vehicular Ad hoc NETwork (VANET) is a wireless network that is formed on the fly between collections of cars connected by wireless links. In ITS the different cars flying...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    A Novel Approach of AODV for Stability and Energy Efficient Routing for Manet Using IPV6

    In a Mobile Ad hoc NETwork (MANET), the topology of the network may change rapidly and unexpectedly due to mobility of nodes. Thus, setting up routes that meet high reliability is a very challenging issue. Another important problem in the MANETs is the energy consumption of nodes. This paper presents...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    Scheduler in Cloud Computing Using Open Source Technologies

    Cloud Computing utilities are coming to be omnipresent, and then are beginning to serve as the essential root of computing capacity for both undertakings and private computing requisitions. Any request comes to cloud will be provided by cloud in terms of Virtual Machine. On which basis, Virtual Machine will be...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    Anonymous and Adoptable Key Management Scheme for Multicast and Broadcast Services

    The popularity of group-oriented applications, secure and efficient communication among all group members has become a major issue. Another major issue is that to provide dynamic rekeying for all the users that join and leave the group. For the rekeying of the group key all members of the group should...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    Integrating Data Warehouses With Web Data for OLAP Using Semantic Data Clustering Techniques

    Now-a-days, Information retrieval plays an important role in the web. Many researches presented techniques for information retrieval process from databases. The previous work presented extended tree pattern clustering process for XML massive storages. This paper presents a new technique termed Semantic Data Clustering (SDC) technique for combining the Data warehouse...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    A Proposed Service Broker Policy for Data Center Selection in Cloud Environment With Implementation

    Cloud Services may be offered as public or private or combined. There is the demand of timely, repeatable, and controllable methodologies for evaluation of algorithms, applications, and policies before actual development of cloud products. Using simulation, the authors can study the behavior of them in cloud environment. Cloud-Analyst, the Cloud-Sim...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    An Improved Ant Colony Optimization Algorithm for Multiple QoS Routing to Find Multiple Feasible Paths for Packet Switched Network

    In recent years, Ant-based algorithms were used to solve classical routing problems such as: traveling salesman problem, vehicle routing problem, quadratic assignment problem, connection-oriented/connectionless routing, sequential ordering, graph coloring and shortest common super-sequence. In this paper, the authors propose an ant colony optimization based, QoS routing algorithm to find multiple...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    Multipath Extension of AODV to Improve End to End Delay

    This paper describes improvement in standard routing protocol AODV for mobile ad-hoc networks. The authors' mechanism setups multiple paths based on less hop count. It allows to store multiple paths based on threshold. At time of link failure, it will switch to next available path. To set up multiple path,...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    Embedded Text Based Image Retrieval System Using Semantic Web

    The revolutionary internet and digital technologies have imposed a need to have a system to organize abundantly available digital images for easy categorization and retrieval. The authors' aim is to provide a semantic web based image search engine. Here the searching is based on the overlay text embedded in images....

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    Ontology of Cloud Computing

    Cloud Computing is one contemporary technology in which the research community has recently embarked. Manifesting itself as the descendant of several other computing research areas such as Service-Oriented Architecture, distributed and grid computing, and virtualization, cloud computing inherits their advancements and limitations. Towards the end-goal of a thorough comprehension of...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    Improve Intrusion Detection Using Decision Tree With Sampling

    Intrusion detection system used to discover illegitimate and unnecessary behavior at accessing or manipulating computer systems. The present paper aims to improve accuracy Rate of intrusion detection using decision tree algorithm. Intrusion detection systems aim to identify attacks with a high detection rate and a low Error rate. In this...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    Cloud Market Cogitation and Techniques to Averting SQL Injection for University Cloud

    Cloud Computing is playing a game changer role in field of Information Technology which is not only impacting the way computing services are and will be delivered but also the way in which user will use IT. Cloud computing is a significant alternative in today's educational perspective. The technology gives...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    A Comparative analysis of coding schemes in Low power baseband Transceiver IC for WBAN

    In this paper, the authors present a low complexity ultra low power baseband transceiver IC for wireless body area network applications. Specified transceiver architecture for PHYsical layer (PHY) is proposed and system performance is optimized. The Transceiver IC architecture is simulated in 0.12-?m CMOS technology, the baseband chip consumes 32.75W...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    Cross Layer Design Proposals for Wireless Networks: A Perspective and Detailed Study

    Wireless communication has emerged as one of the most buzzword field from the research point of view over the last few years. Explosive and increased growth of wireless technologies has resulted in increasing demand of better quality of service to the end users. Various cross layer design proposals of wireless...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    FPGA Implementation of a MIPS RISC Processor

    This paper targets the implementation design of a MIPS (Microprocessor without Interlocked Pipeline Stages) RISC (Reduced Instruction Set Computer) Processor using VHDL (Very high speed integrated circuit Hardware Description Language). In this paper MIPS instruction format, instruction data path, decoder modules are analyzed. Furthermore, the authors design Instruction Fetch (IF)...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    Efficient Cluster Based Multicast Using Fair Key and Resource Scheduler for Social Network Communication in MANET

    A MANET (Mobile Ad-hoc NETwork) is defined as a wireless medium transmitting the message from source to destination without using any infrastructure framework. To achieve a group communication in MANET, multicasting is used. The process of integrating the MANET with multicasting improves the privacy level of users and widens the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    Performance Enhancement of Transport Protocol for Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are deployed with large number of small sensor devices which are highly distributed. The sensor nodes are able to organize flexibly into a multi-hop ad-hoc network. The major task of sensor nodes is to sense physical data and transmit the gathered information to one or more...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    Security in Cloud Computing Using File Encryption

    In cloud computing, Security of file or data is provided to the end user in the private cloud environment. The main concern is to provide the security to end user to protect files or data from unauthorized user. Difference is that the research is done in cloud, but security related...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    Adaptive STBC Coded MIMO System With Near Full Multiplexing Gain Using CSI

    When compared to Single-Input Single-Output system (SISO), the multiple-input multiple-output system have a better and larger channel capacity. With this, it is succeeded of having a better multiplexing gain. To approach the channel capacity the Adaptive Modulation technique is a better technique which is utilized by channel state information at...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Software Engineering Challenges of Migration Projects

    Organizations often face the challenges of migration from legacy systems to new target systems. Such migration efforts represent a complex engineering problem. This paper describes migration planning, identifies influencing factors, outlines a set of migration planning activities and offers a set of guidelines for the migration planning. Many organizations face...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    An Efficient Transmission of Data for MANETs Using Human Based Recommendation Exchange Protocol

    This paper analyzes a trust model for mobile ad hoc networks. The authors provide nodes with a mechanism to build a trust relationship with its neighbors. The proposed model considers the recommendation of trustworthy neighbors and the experience of the node itself. In order to give trust value beyond the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    Highly Secured Crypto-IRIS Based Authentication System

    Now-a-days bio-metric authentication systems are widely used in order to provide authentication without possessing any physical materials. Bio-metric authentication systems are mainly concentrating on security, revocability, privacy, and accuracy. In this paper, the authors propose a provably two way secured biometric authentication system, which addresses the concerns of user's privacy,...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    Investigation of It Auditing and Checklist Generation Approach to Assure a Secure Cloud Computing Framework

    Recently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However, there are still some concerns about the security provided by the cloud environment are raises. In this paper, the authors are conducting the investigation...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    Next Generation Mobile Application in Cloud Computing Using RESTful Web Services

    Mobile devices, especially smart mobile devices, becoming very popular nowadays. Web services that are used to provide a service for an application running on smart mobile devices also becoming very popular. There are some limitations of the current smart mobile devices, such as limited storage capacity, low processor speed, limited...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    Provable Secure Certificateless Generalized Signcryption Scheme

    Generalized signcryption is a new cryptographic primitive, which works as a signcryption scheme, a signature scheme and an encryption scheme as per need. It is more suitable for some storage constrained environments, e.g. smart cards, WSN (Wireless Sensor Networks) etc. Recently, Ji et al. proposed a security model for certificateless...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    A New Model for Software Risk Management

    In the modern time of software engineering, the development of software in static and dynamic environment results in several vulnerabilities that need to be handled so that they do not step in with the clear defined project goals. Previous studies show that the wide variety of different risk analysis strategies...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    A Model and Framework for Reality-Oriented Web Services

    Mobile devices that use information from sensors such as GPS and accelerometers are becoming widespread today, and web services using a variety of sensor information have appeared. This paper refers to these web services as reality-oriented web services. Since existing frameworks not designed to handle sensor information are useless when...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    An Improvement in AOMDV With Randomization

    Mobile Ad hoc NETworks (MANETs) consist of a collection of wireless mobile nodes which dynamically exchange data among themselves without the reliance on a fixed base station or a wired back-bone network. Multipath routing allows the establishment of multiple paths between a single source and single destination node. It is...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    A Study of Viterbi Decoder Algorithm for Wireless LANs

    Viterbi Decoders are commonly used to decode convolutional codes in communications systems. This Viterbi Decoder is a fully parallel implementation which gives fast data throughput. The decoder is targeted for WiMAX and Wireless LAN applications. Input symbol metric pairs are decoded into output data bits by the maximum likelihood Viterbi...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    A Novel Approach: Security Measures and Concerns of Cloud Computing

    Cloud computing is one of the coming forth as well as the buzzword concept nowadays. Cloud computing serves various advancement in the field of IT industry such as Google, Microsoft, Amazon and distinguish various data and information resources from a given infrastructure in order to enhance the services provided to...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2013

    An Effective Algorithm of Encryption and Decryption of Images Using Random Number Generation Technique and Huffman Coding

    Data security has become most important aspect while transmission of data and storage. The transmission and exchange of image also needs a high security. Cryptography is used to maintain security. In this paper, the authors implemented security for image. They have considered an image, read its pixels and convert it...

    Provided By International Journal of Computer Technology and Applications