International Journal of Computer Technology and Applications

Displaying 241-280 of 306 results

  • White Papers // Aug 2011

    Resource Management in Distributed System

    Resource management in distributed environment is concerned with a system in which the main aim is to make sure that a user/client can access the remote resources with as much ease as it can access the local resources. The basis of resource management in the distributed system is also resource...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    Formal Methods of Software Testing and Terminology

    Software provides a complete set of application development tools for building stand-alone, client-server, and Internet-enabled applications. But making it easy to build applications can be a two-edged sword. Not only can developers build powerful, sophisticated applications, but they can also build applications that frustrate users, waste computer resources, and damage...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    Secure Routing Protocol for Multi-Hop Wireless Networks

    Most recent ad hoc network research has focused on providing routing services without considering security. The authors detail security threats against ad hoc routing protocols, specifically examining AODV and DSR. In light of these threats, they identify three different environments with distinct security requirements. They propose a solution to one,...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    Evolution of the 4th Generation Mobile Communication Network: LTE-Advanced

    Mobile communication network experiences dramatic advances and changes over the last two decades. With the growing demand, the development of the design and optimization of radio access technologies and a further evolution of the existing system, the Third Generation Partnership Project (3GPP) had laid down the foundation of the future...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    An Index Based Congestion Aware Routing Protocol for Wireless Sensor Networks

    Energy efficient protocol is very important in Wireless Sensor Networks (WSNs) because the nodes in WSNs are usually battery operated sensing devices with limited energy resources and replacing the batteries is usually not an option. Thus energy efficiency is one of the most important issues in WSNs. Routing protocols which...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    Congestion Control Avoidance in Adhoc Network Using Queuing Model

    Mobile ad hoc network is an emerging standard or wireless communication. Due to the impendence in infrastructure dependencies these networks are rapidly emerging. These networks are since evolving has to develop methodologies for the compatibility of current services in such an environment. Various services compatibilities were studied and methodologies were...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    Reliable Software Development With Proposed Quality Oriented Software Testing Metrics

    For an effective test measurement, a software tester requires a testing metrics that could measure the quality and productivity of software development process along with increasing its reusability, correctness and maintainability. Until now, the understanding of measuring software quality is not yet sophisticated enough and is still far away from...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    Sec.AODV for MANETs Using MD5 With Cryptography

    Mobile Ad hoc NETworks (MANETs) characteristics present major vulnerabilities in security. The threats which thought-out in MANETs are due to maliciousness that intentionally disrupts the network by using variety of attacks and due to insecure routing protocols (e.g. AODV), which were developed without considering security in mind. Due to lack...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    Concept of Privacy Protection in Data Mining

    In this paper, the authors address the issue of privacy preserving data mining. Specifically, they consider a scenario in which two parties owning confidential databases wish to run a data mining algorithm on the union of their databases, without revealing any unnecessary information. Their work is motivated by the need...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    A Conceptual Usability Framework for Mobile Service Consumers

    Variation and count of mobile devices accrue each day and Service Oriented Architecture (SOA) decompose the systems into loosely coupled and platform independent software services that facilitate integration of mobile devices to enterprise systems as a service consumer or provider. The prosperity of interactive systems is relayed on the realization...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    A Signcryption Scheme Based on Elliptic Curve Cryptography

    In Public key cryptography a message is sent after applying the digital signature and encryption techniques by the sender. These techniques are used so that the message properties such as confidentiality, integrity and unforgeability are maintained and the non-repudiation can be ensured at the receiving end. The digital signatures and...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    A Review on Cryptography Mechanisms

    In today's information age, communications play an important role which is becoming widespread as well. The same aspects of cryptography that make it useful for security and privacy make it particularly troublesome for law enforcement. The use of cryptography by criminals can prevent law enforcement from obtaining information needed for...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    Performance Evaluation of EFCI and ERICA Schemes for ATM Networks

    Rate based congestion control promises effective traffic management for ABR service class suitable to data communications in ATM networks. The rate based congestion control algorithm dynamically regulates transmission rate of source end system according to feedback information from the network. In this paper, the authors described two rate based congestion...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    Implementation of Data Integration Using Distributed Systems: A Review

    Data integration in the distributed data system is introduced to solve the problem that data model has. The data integration in the distributional systems can be supported effectively. Data conversion is still a challenge in distributed system integration. Community based system is used for distributed data integration. It comprises of...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jul 2011

    UEP Based on Proximity Pilot Subcarriers With FEC in OFDM

    A novel UEP (Unequal Error Protection) method is proposed that utilizes the subcarrier positions relative to pilot subcarriers in an OFDM multicarrier frame along with FEC (Forward Error Correction) schemes. With the available physical layer techniques, a prioritized encoding strategy based on the characteristics of the channel fading effects on...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    A Novel Approach for Cheating Prevention Through Visual Cryptographic Analysis

    Confidentiality is probably the most common aspect of information security and the authors need to protect their valuable information and it has become an inseparable issue as information technology is ruling the world now. Cryptography is the study of integer mathematical techniques related aspects of Information Security such as confidentiality,...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    An Efficient Approach to Access Database in J2ME Applications

    Application development for mobile devices has been very challenging. Distributed applications for mobile devices should have uninterrupted data access. Though most of the mobile phones have CLDC configuration, Java provides no standard JDBC driver and API for mobile devices with CLDC configuration. Relational database in J2ME can be used with...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    A Fuzzy QOS Key Base Secured MANET Routing With Multipath Data Fragmentation (FQKSMR)

    MANET or Mobile Adhoc Network has drawn considerable research attention and application over the last few years. With the increase of applicability, and adaptability of the network in Private virtual network or wireless personal area network, the attacks and intrusion of MENT data has also increased which has lead to...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Applying Object Oriented Metrics to C#(C Sharp) Programs

    Object-oriented technology is becoming increasingly popular in industrial software development environments. This technology helps in the development of a software product of higher quality and lower maintenance costs. Since the traditional software metrics aims at the procedure-oriented software development so it cannot fulfill the requirement of the object-oriented software, as...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    A Simulation Study Between the Random Based Synthetic Entity Mobility Models in Ad Hoc Networks

    A Mobile Ad-hoc NETwork (MANET) is a network formed without any central administration which consists of mobile nodes that use a wireless interface to send packet data. MANETs are extremely flexible and each node is free to move independently, in any random direction. Each node in MANET maintains continuously the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Image Cipher Technique for Covert and Low Bandwidth Channels

    Security of images during the transmission over covert low bandwidth channel has importance in today's image communications for confidential, integrated and secure real time communication. The major security problems during communication over covert and low bandwidth channel is to reduce no of bits, efficient and secure cryptographic techniques such that...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    The Importance of QoS & QoE Management in Wireless Communication System

    Now-a-day, wireless communication systems are popular due to its wide advantages. In the customer's point of view, the authors can say the most of the customer requirements related to communication from one place to another place are fulfilled up to the most extent using these systems. The initiation to these...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Writing Software Requirements Specification Quality Requirements: An Approach to Manage Requirements Volatility

    Quality requirements, that form a major sub-category of requirements, define a broad set system-wide attributes such as security, performance, usability and scalability. Unfortunately, many organizations pay less attention to quality requirements & assume that the necessary qualities are implicitly understood & will naturally emerge as the product is developed. In...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Cryptography and Steganography - A Survey

    Digital communication has become an essential part of infrastructure now-a-days, a lot of applications are Internet-based and it is important that communication be made secret. As a result, the security of information passed over an open channel has become a fundamental issue and therefore, the confidentiality and data integrity are...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    A Comparative Study of the Available Solutions to Minimize Denial of Service Attacks in Wireless LAN

    Denial of Service (DoS) attack is a major attack in Wireless Local Area Network. This paper studies the available solutions for Denial of Service (DoS) attacks and compares them with each other in a wireless infrastructure network. All these methods are used to minimize the DoS attacks. It discusses the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Network Intrusion Forensic Analysis Using Intrusion Detection System

    The need for computer intrusion forensics arises from the alarming increase in the number of computer crimes that are committed annually. After a computer system has been breached and an intrusion has been detected, there is a need for a computer forensics investigation to follow. Computer forensics is used to...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Multicast Security Attacks and Its Counter Measures for Puma Protocol

    A Mobile Ad hoc NETwork (MANETs) is a continuously changing wireless network that can be created without any pre-existing infrastructure in which each node can operate as a router. MANETs has no clear line of control, so it is accessible to both legitimate network users and malicious attackers. The main...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Secure Measures for the Vulnerabilities in MAODV

    Mobile Adhoc NETworks (MANETs) is a highly challenged network environment due to its special characteristics such as decentralization, dynamic topology and neighbor based routing. Most important application for ad-hoc networks is group oriented in nature and can therefore benefit from a multicast communication services. Most of the multicast routing protocols...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Transmission and System Control in Quantum Cryptography

    Quantum cryptography provides security using the laws of quantum mechanics. Currently, several types of protocols of Quantum Key Distribution (QKD) have been established. Some QKD protocols have been certified by proofs of unconditional security. QKD protocols have been confirmed to be resistant to any possible attack. Along with the progress...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Performance Evaluation of MANET Routing Protocols Under CBR and FTP Traffic Classes

    Understanding the performance of routing protocols in ad hoc networks is a key feature to determine which routing protocol is best suited for which type of network scenario. From the literature survey it was found that there is a lot of work done on evaluating the performance of various MANET...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Hybrid Video Stabilization Technique for Hand Held Mobile Videos

    The videos taken from hand held mobile cameras suffer from different undesired slow motions like track, boom or pan. Hence it is desired to synthesis a new stabilized video sequence, by removing the undesired motion between the successive frames. Most of the previous methods assumes the camera motion model hence...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    The Technology Journey From Floppy Disk to Cloud Storage

    Data storage and backup needs have evolved over the years necessitating the need for evolution of data storage methods and devices. The needs for a higher storage capacity as well as versatility of storage devices and the need for technologically advanced storage devices became apparent. Once upon a time, storage...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Performance Analysis of Intrusion Detection in MANET

    A mobile ad hoc network is a collection of autonomous nodes or terminals which communicate with each other by forming a multi-hop radio network without the aid of any established infrastructure or centralized administration such as a base station. The ad hoc network provides lack of secure boundaries. At present,...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Studying the Importance and Feasibility of Software Testing

    Software testing is a critical element of software quality assurance and represents the ultimate review of specification, design and coding. Software testing is the process of testing the functionality and correctness of software by running it. Software testing is usually performed for one of two reasons: defect detection, and reliability...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    A New Paradigm for the Next Generation Wireless Optimization Cross Layer Design

    Cross-Layer Design (CLD) is a new paradigm that allows the optimization of communication network architectures across the traditional layer boundaries, but does not imply a change of the present layered architecture. Cross-Layer optimization is used in multi media application this is also used in run this type of applications parallel...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Design Approach for Fault Tolerance Algorithm in FPGA Architecture With BIST in Hardware Controller

    Redundancy based hardening techniques are applied at the pre-synthesis or synthesis level. To provide solutions for increasing the fault-tolerance capabilities with algorithms able to reduce sensitive configuration memory bits of FPGAs the authors use BIST method. While these systems frequently contain hardware redundancy to allow for continued operation in the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Threats in Optical Burst Switched Network

    Optical network is a viable network for future communication, which transmits data at an average rate of 50Tb/s. Optical Burst Switching is a trusted mechanism used for Optical network. There is a good amount of research done in the area of security in Optical networks. In addition, the issues related...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Design and Interfacing of High Speed Model of FPGA Using I2C Protocol

    Once the I2C protocol is being designed for interfacing the devices with each other (i.e. FPGA with OV7620) over a serial data line for getting high speed without data loss, as compare to any other communication methodology. The main purpose for developing the protocol is not only high speed communication...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Analysis and Design of Enhanced HTTP Proxy Cashing Server

    A proxy acts as an intermediary agent between its clients and the servers which they want to access, performing functions directed towards a variety of purposes, like security, caching, etc, in its capacity as an intermediary. A server is anything that has some resource that can be shared. A server...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Identity Based Color Image Cryptography

    An Identity based cryptography based on visual cryptography scheme was proposed for protecting color image. A color image to be protected and authentic entities such as account number, password, signature image are given as input. The binary key image is obtained by distributing the digital signature of obtained authentic entities....

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    A Survey on Cloud Computing Architecture

    Cloud computing is Internet-based computing, whereby shared resources, software and information are provided to computers and other devices on demand. Users don't need expertise in or control over the technology infrastructure "In the cloud". Typical cloud computing providers deliver common business applications online that are accessed from another Web service...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Implementation of New Cell Site in Telecom Sector

    This paper revaluates the basic requirements for the installation and implementation of new cell site in telecom sector and will discuss the impact of various physical and environmental conditions on the installation process. In simple terms, a cell site depicts a place where antennas and electronic communications equipment are located,...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Efficient Routing Strategy for Prioritized Messages in Mobile WSN Using Geographic Forwarding Protocol

    The current work represents a new routing protocol considering the environment of wireless sensor network with dynamic mobility. The approach addresses the issues for both real time and non-real time data dissemination from the mobile sensors to the sink. The prime target of this approach is to resolve the issues...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Energy-Efficient Cooperative Protocol for Wireless Networks

    In cooperative networks, transmitting and receiving nodes recruit neighboring nodes to help in communication. The authors model a cooperative transmission link in wireless networks and then it forms a cluster at transmitter end and a receiver end. In this paper, they propose a cooperative communication protocol for formation of these...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Measurement of Real Time Information Using GPU

    Parallel programming is about performance, for otherwise the authors would write a sequential program. A problem is where to find truly parallel hardware that can be dedicated to the task, One answer is Graphical Processing Units (GPUs), which can have hundreds of cores and are found in millions of desktop...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Analysis of Relay Stations in WiMAX Networks

    The demand for broadband services is growing IEEE sharply today. The traditional solutions to provide high speed broadband access is to use wired access technologies such as cable modem, Digital Subscriber Line (DSL), Ethernet and fiber optics. It is too difficult and expensive for carriers to build and maintain wired...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    A Survey: On Generation of Wireless Telephony Technology

    Wireless communication is the transfer of information over a distance without the use of enhanced electrical conductors or "Wires". The distances involved may be short (a few meters as in television remote control) or long (thousands or millions of kilometres for radio communications). When the context is clear, the term...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Energy Efficient Routing Protocols in Mobile Ad Hoc Networks

    In wireless network can classified in two way one is infrastructure network and another is infrastructure less. Infrastructure less wireless network is known as Ad-hoc network. An ad-hoc network is a Local Area Network (LAN) that is built spontaneously as devices connect. Instead of relying on a base station to...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    A Performance Analysis Between AODV & DSR Routing Protocol

    Mobile Ad hoc NETwork (MANET) is an autonomous system of mobile nodes connected by wireless links. Each node operates not only as an end system, but also as a router to forward packets. The nodes are free to move about and organize themselves into a network. These nodes change position...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    A Study and Detection of TCP SYN Flood Attacks With IP Spoofing and Its Mitigations

    Flooding attacks are major threats on TCP/IP protocol suite these days; Maximum attacks are launched through TCP and exploit the resources and bandwidth of the machine. Flooding attacks are DDOS (Distributed Denial Of Service) attacks and utilize the weakness of the network protocols. SYN flood exploits the 3-way handshaking of...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Communication With Less Hardware

    Software Defined Radio is an emerging technology in the field of communication. In this paper, two applications based on SDR are discussed. First, the authors discuss the weather satellite image decoding using a SDR receiver, FUNCube Dongle (FCD). Second, Sudden Ionospheric Disturbances (SID)are studied with Software Defined Radio (SDR) and...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Isolation of Malicious Node in Dos Scenario in Manet

    MANETs are extensively used these days for communication and there are various communication networks with different standards and computing techniques and as days are passing by the size of MANET is increasing day by day and its expansion is inevitable due to its high penetration and popularity for the usage...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Low Power Analysis of Network-Level On-Chip Communication Using Asynchronous AMBA Protocol

    Network on-Chip (NoC) is a novel structural design template, which can be defied for complicated system level on-chip design. NoC has a potential to limit and present the bus-based communication. In this paper, the crisis to discuss is Low power consumption in an Asynchronous Network on-chip (NoC) level communication. NoC...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    An LMS Based Data Reduction Technique for Energy Conservation in Wireless Sensor Network (WSN)

    In preceding existence, Wireless Sensor Networks (WSNs) have gained an amplified attention from the research community and extended its boundaries in commercial, industrial and medical domains. The tailback in WSN based application development is the inadequate energy source. As sensor nodes are generally battery-powered devices, the critical aspect is to...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Detection of Rogue Base Stations in Wimax/IEEE802.16 Using Sensors

    This paper considers the problem of detecting rogue base station in Wimax/802.16 networks. IEEE 802.16 is an emerging standard for broadband wireless communications that is receiving a lot of attention. Security support is mandatory for any communication networks. For wireless systems, security support is even more important to protect the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Implementation of Concurrent Online MBIST for RFID Memories

    Concurrent online testing is a memory test mechanism where the memory can be tested concurrently with the system operation. Thus, it has instant error detection. Radio Frequency IDentification (RFID) devices relies on the correct operation of their memory for identification of objects and delivery of transponder's information. This paper presents...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    Leader Election Algorithm in Wireless Environments Using Fibonacci Heap Structure

    Today is an era of wireless communication systems. The day is not so far when the whole distributed system of the world will goes wireless. Leader in a distributed system plays a vital role in various computing environments like wireless networks etc. The main focus of researchers is on electing...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    An Efficient Transmission of Data for MANETs Using Human Based Recommendation Exchange Protocol

    This paper analyzes a trust model for mobile ad hoc networks. The authors provide nodes with a mechanism to build a trust relationship with its neighbors. The proposed model considers the recommendation of trustworthy neighbors and the experience of the node itself. In order to give trust value beyond the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    An Analysis of Distributed Computer Network Administration

    Computer Networking is necessary to human beings. People needed to share ideas, research knowledge, and the way of life to their friends. In the modern time, the role of computer networks became dreamy. Analyzing, accessing, sharing and storing of data and information are very easy with help of distributing computer...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Performance Evaluation of Improved Algorithm for Wireless Sensor Networks

    Wireless sensor networks have recently come into prominence because they hold the potential to revolutionize many segments of the economy and life, from environmental monitoring and conservation, to manufacturing and business asset management, to automation in the transportation and health-care industries. Information collected by and transmitted on a sensor network...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    A Novel Approach for Securing Mobile Ad Hoc Network With an Enhanced Trust Calculation Method

    A Mobile Adhoc Network is a group of wireless mobile computers in which nodes cooperate by forwarding packets for each other to allow them to communicate beyond direct wireless transmission range. Due to wide-ranging characteristics of the Ad Hoc Networks like decentralization, dynamic topology and neighbor based routing, it is...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    A Trust, Privacy and Security Infrastructure for the Inter-Cloud

    Cloud Computing is one of the most important security challenges to manage and assure a secure usage over multi-provider Inter-Cloud environments with dedicated communication infrastructures, security mechanisms, processes and policies. Based on the collection of various Inter-Cloud usecases and scenarios within the private and public sector like DMTF (Distributed Management...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Open Source in Cloud Computing

    Cloud computing is emerging as the latest BUZZ word in Information Technology. There is going to be a great shift from traditional network computing to cloud computing. The features of Cloud computing - Pay as you go and Virtualization has made it a long run in advance technologies. This paper...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Type of Security Threats and It's Prevention

    Security is a branch of computer technology known as information security as applied to computers and networks. The objective of online security includes protection of information and property from theft, corruption, or threats attack, while allowing the information and property to remain accessible and productive to its intended users. The...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Cloud Computing Security With Nymble Technology

    Misbehave blacklisting schemes allow online service provide in cloud computer to prevent Misbehave access by abusive users while preserving the privacy of all Misbehave users (both abusive and non-abusive). The scheme proposed for this purpose was Nymble, an extremely efficient scheme based only on symmetric primitives; however, Nymble relies on...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    3-D Graphical Password Used For Authentication

    In today's world, security is important aspect in day to day life. So, everyone used various ways for security purpose. People use passwords for their security. Generally, everyone uses textual password. Textual password is combination of alphabets and numbers. People keep textual password as name of their favorite things, actors...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Interpretation of Formal Proof for Cryptographic Protocols into Computational Model

    Cryptography is the spinal cord for all security measures involved in computing field so a lot of emphasis is required to be given to make it strong enough to deal all the transition of the security industry. The authors present a general method to prove security properties of multiple cryptographic...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Automatically Communication Path Creation and Reconfiguration in Dynamic Network Environment for Optimizing Performance to Network Applications

    Accessing network services across a wide area network still remains a challenging task and the difficulty mainly comes from the heterogeneous and constantly changing network environment, which usually causes undesirable user experience for network-oblivious applications. A promising approach to address this is to provide network awareness in communication paths. Many...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Consideration With Dynamic Routing Security

    One of the major issues for data communication over wired and wireless networks is the security. the past work is on the designs of cryptography algorithms and system infrastructures. Dynamic routing algorithm called improved dynamic routing with security consideration, which is based on the concept of Zone Routing Protocol (ZRP)...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Simulation Based: Study and Analysis of Routing Protocol in Vehicular Ad-Hoc Network Environment

    A Vehicular Ad hoc NETwork (VANET) consists of vehicles which communicate with each other and exchange data via wireless communication links available between the vehicles which are in communication ranges of vehicles to improve the road safety in city. The communication between vehicles is used to provide road safety, comfort...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    A Quantitative Study and Comparison of Secure OLSR Routing Protocol

    This paper presents the comparison of the secure OLSR (Optimized Link State Routing Protocol) in mobile ad-hoc network with other approach. The authors compare the security from the different approach and their effect on the existing OLSR. The main aim of this paper is to study the various securities and...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    A New Routing Algorithm in MANETS: Location Aided Hybrid Routing

    In this paper, the authors propose a new hybrid routing protocol for MANET called Location Aided Hybrid Routing Protocol for MANET (LAHRP). The proposed routing algorithm not only aims to optimize bandwidth usage of MANETs by reducing the routing overload but also extend battery life of the mobile devices by...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Runtime CPU Scheduler Customization Framework for Real Time Operating System

    Most of the embedded systems have real-time requirements about the use of Real-Time Operating Systems able of satisfying the embedded system requirements. So, in embedded application where the real-time operating systems are noted are been called as the Real Time Embedded Operating Systems (REOS). Main features of that of real-time...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Performance of MIMO With Cyclic Coded OSTBC Using OFDM

    Wireless designers constantly seek to improve the spectrum efficiency/capacity, coverage of wireless networks, and link reliability. Space-time wireless technology that uses multiple antennas along with appropriate signalling and receiver techniques offers a powerful tool for improving wireless performance Space-time block codes were designed to achieve the maximum diversity order for...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Efficient and Fair Exchange of Digital Signatures Based on RSA Algorithm

    A fair contract-signing protocol allows two potentially mistrusted parities to exchange their commitments (i.e., digital signatures) to an agreed contract over the Internet in a fair way, so that either each of them obtains the other's signature, or neither party does. Based on the RSA signature scheme, a new digital...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Performance Analysis of Mesh and Position Based Hybrid Routing In MANETS: A Comprehensive Study

    Mobile Ad hoc NETworks (MANETs) are autonomously self-organized networks without infrastructure support. In a mobile ad hoc network, nodes move arbitrarily; therefore, the network may experience rapid and unpredictable topology changes. Because nodes in a MANET normally have limited transmission ranges, some nodes cannot communicate directly with each other. Hence,...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    RCP Supporting Emergency Applications of WSN

    Wireless Sensor Networks (WSN) can be used to monitor the people environment, objects in that environment and interactions of objects with each other. Use of WSN for emergency applications includes fire detection system in forest, soil motion detection, monitoring historical and public places, volcano monitoring etc. In WSN errors or...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Optimization Technique for Multi-Join Operation in Active Data Warehouse

    In current scenario of fast changing data content in most dynamic heterogeneous application, data format transformation and data updates needs to be handled in traditional data ware housing. Many researches have been made under active data warehousing which keep the latest updates of more dynamic large multi-format data warehouses. Previous...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Apr 2012

    A Framework for Implementing e-Attendance System Using Near Field Communication in Android Os

    Education system in India has been changing widely in last 10 years due to the development of the technology. Smart class, E-learning, Video conferencing are some of them. The core idea of this paper is to implement some of the emerging technologies like mobile computing and near field communications and...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Probablistic Clustering based on Web Documents

    Web search engine are often forced to pass through long ordered list of documents called snippets. Snippets are web document attributes. These snippets are returned by search engines. The basis of document clustering is an alternative method of organizing retrieval results. Clustering yet needed to be deployed for the search...

    Provided By International Journal of Computer Technology and Applications