International Journal of Computer Technology and Applications

Displaying 1-40 of 288 results

  • White Papers // Dec 2013

    An Effective Algorithm of Encryption and Decryption of Images Using Random Number Generation Technique and Huffman Coding

    Data security has become most important aspect while transmission of data and storage. The transmission and exchange of image also needs a high security. Cryptography is used to maintain security. In this paper, the authors implemented security for image. They have considered an image, read its pixels and convert it...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2013

    Study on Improving Web Security Using SAML Token

    Web service is the most important word which is most commonly used by all computer professionals. Web services are mainly used for communicating different platform within a network connection. Web services are created based on SOA architecture. SOA platform is most popularly used in distributed systems. When using in distributed...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2013

    A Novel Hybrid Feature Selection and Intrusion Detection Based on PCNN and Support Vector Machine

    In this paper, the authors proposed a hybrid model for feature selection and intrusion detection. Feature selection is important issue in intrusion detection. The selection of feature in attack attribute and normal traffic attribute is challenging task. The selection of known and unknown attack is also faced a problem of...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2013

    Improved Network Security Through Retinal Biometric Based Authentication

    Security and authentication are challenging problems due to the sprawling growth of Internet in today's environment. Therefore, the security of the network users has become an essential factor. There are various techniques available in the literature which make use of passwords, smart cards etc., to provide network related security. But...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2013

    Outsourcing and Discovering Storage Inconsistencies in Cloud Through TPA

    Cloud computing has changed the way computing takes place. It is the technology that enables outsourcing of computing and storage to a public cloud maintained by cloud service providers. Cloud users can use cloud storage and other facilities without capital investment in pay-as-you-use fashion. As the data is stored in...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2012

    Performance Analysis of Shortest Path Energy Efficient Routing Protocol in Wireless Sensor Networks Using NSRS Algorithm

    Wireless Sensor Network is an up-and-coming technology that shows great promise for various innovative applications both for public and military. Wireless Sensor Networks (WSNs) are Ad-hoc wireless networks of typically consists of hundreds or even thousands of small low-cost sensor nodes that communicate in a wireless way. A sensor node...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2012

    Fast and Efficient IP Network Recovery using Multiple Routing Configuration

    Internet plays a vital role in the peoples communications infrastructure, due to slow convergence of routing protocols after network failure become a growing problem. To guarantee fast recovery from link and node failure in networks, the authors propose a new recovery scheme called Multiple Routing Configuration (MRC). Their proposed scheme...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2012

    Robust Aggregation in Sensor Network: An Efficient Frequent Itemset and Number of Occurrence Counting

    Sensor networks are collection of sensor nodes which co-operatively send sensed data to base station. As sensor nodes are battery driven, an efficient utilization of power is essential in order to use networks for long duration hence it is needed to reduce data traffic inside sensor networks, reduce amount of...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2012

    Design and development of Middleware Gateway IP Multimedia System and Web Services

    Rapid growth in Internet (Web) applications and usage of mobile in telecommunication is present trends in communication. In Web 2.0 web services architecture is become versatile tool for enterprise solutions in distributed environment systems. To provide an enterprise solution it is not possible to get professional solution at one place....

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Nov 2012

    Secure Data Transmission in MANET Routing Protocol

    Information exchange in a network of mobile and wireless nodes without any infrastructure support such networks are called as Ad-hoc networks. A Mobile Ad hoc NETwork (MANET) is mobile, multi-hop, infrastructure less wireless network which is capable of autonomous operation. In this paper the authors have discussed some of the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Nov 2012

    Energy-Efficient Reliable Routing in Wireless Multimedia Sensor Networks

    Wireless Multimedia Sensor Networks (WMSN) can handle different traffic classes of multimedia content (video, audio streams and still images) as well as scalar data over the network. Use of general and efficient routing protocols for WMSN is of crucial significance. Similar to other traditional networks, in WMSN a noticeable proportion...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Nov 2012

    Construction of Power Efficient Fault Tolerant Wireless Network Using Cone Based Algorithm

    Fault tolerant topology control for all to one communication holds significance in dynamic wireless networks with asymmetric wireless links. In this paper the author Investigates the various aspects of the problem mentioned above using the cone based distributed topology control algorithm. The topology of a wireless multi-hop network can be...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Priority Based Scheduling Algorithm Using Time and Transmission Length in 802.11 Networks

    The fairness of IEEE 802.11 wireless networks is rigid to forecast and organize since it constructed based on uncertainty and difficulty of the MAC conflicts and dynamics. So, there is a great extent of packet data to be met in a network traffic jam and the packet data was collapsed...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Optimizing and Enhancing Parallel Multi Storage Backup Compression for Real-Time Database Systems

    One of the big challenges in the world was the amount of data being stored, especially in Data Warehouses. Data stored in databases keep growing as a result of businesses requirements for more information. A big portion of the cost of keeping large amounts of data is in the cost...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    A Strategy for Package Transformation for Linux Environment

    A Linux operating system is composed of a large number of software packages. Among packages there exist a variety of complex dependency relations, and their management is the foundation of building and maintaining Linux operating system. And the premise of the management is the dependency relations' extraction. Based on the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Emerging Trends in Quantum Cryptography - A Survey

    Privacy is paramount when communicating sensitive information in today's increasingly networked world. Both the business and government sectors have ever-more demanding secure communication needs. Conventional information assurance methods face increasing technological challenges and future threats, including unanticipated advances in mathematics, high-performance computing, and the possibility of large-scale quantum computation. Quantum...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    A Survey on Cloud Computing Architecture

    Cloud computing is Internet-based computing, whereby shared resources, software and information are provided to computers and other devices on demand. Users don't need expertise in or control over the technology infrastructure "In the cloud". Typical cloud computing providers deliver common business applications online that are accessed from another Web service...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Implementation of New Cell Site in Telecom Sector

    This paper revaluates the basic requirements for the installation and implementation of new cell site in telecom sector and will discuss the impact of various physical and environmental conditions on the installation process. In simple terms, a cell site depicts a place where antennas and electronic communications equipment are located,...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Efficient Routing Strategy for Prioritized Messages in Mobile WSN Using Geographic Forwarding Protocol

    The current work represents a new routing protocol considering the environment of wireless sensor network with dynamic mobility. The approach addresses the issues for both real time and non-real time data dissemination from the mobile sensors to the sink. The prime target of this approach is to resolve the issues...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Energy-Efficient Cooperative Protocol for Wireless Networks

    In cooperative networks, transmitting and receiving nodes recruit neighboring nodes to help in communication. The authors model a cooperative transmission link in wireless networks and then it forms a cluster at transmitter end and a receiver end. In this paper, they propose a cooperative communication protocol for formation of these...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Measurement of Real Time Information Using GPU

    Parallel programming is about performance, for otherwise the authors would write a sequential program. A problem is where to find truly parallel hardware that can be dedicated to the task, One answer is Graphical Processing Units (GPUs), which can have hundreds of cores and are found in millions of desktop...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Analysis of Relay Stations in WiMAX Networks

    The demand for broadband services is growing IEEE sharply today. The traditional solutions to provide high speed broadband access is to use wired access technologies such as cable modem, Digital Subscriber Line (DSL), Ethernet and fiber optics. It is too difficult and expensive for carriers to build and maintain wired...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    A Survey: On Generation of Wireless Telephony Technology

    Wireless communication is the transfer of information over a distance without the use of enhanced electrical conductors or "Wires". The distances involved may be short (a few meters as in television remote control) or long (thousands or millions of kilometres for radio communications). When the context is clear, the term...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Energy Efficient Routing Protocols in Mobile Ad Hoc Networks

    In wireless network can classified in two way one is infrastructure network and another is infrastructure less. Infrastructure less wireless network is known as Ad-hoc network. An ad-hoc network is a Local Area Network (LAN) that is built spontaneously as devices connect. Instead of relying on a base station to...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    A Performance Analysis Between AODV & DSR Routing Protocol

    Mobile Ad hoc NETwork (MANET) is an autonomous system of mobile nodes connected by wireless links. Each node operates not only as an end system, but also as a router to forward packets. The nodes are free to move about and organize themselves into a network. These nodes change position...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    A Study and Detection of TCP SYN Flood Attacks With IP Spoofing and Its Mitigations

    Flooding attacks are major threats on TCP/IP protocol suite these days; Maximum attacks are launched through TCP and exploit the resources and bandwidth of the machine. Flooding attacks are DDOS (Distributed Denial Of Service) attacks and utilize the weakness of the network protocols. SYN flood exploits the 3-way handshaking of...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Communication With Less Hardware

    Software Defined Radio is an emerging technology in the field of communication. In this paper, two applications based on SDR are discussed. First, the authors discuss the weather satellite image decoding using a SDR receiver, FUNCube Dongle (FCD). Second, Sudden Ionospheric Disturbances (SID)are studied with Software Defined Radio (SDR) and...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Isolation of Malicious Node in Dos Scenario in Manet

    MANETs are extensively used these days for communication and there are various communication networks with different standards and computing techniques and as days are passing by the size of MANET is increasing day by day and its expansion is inevitable due to its high penetration and popularity for the usage...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Low Power Analysis of Network-Level On-Chip Communication Using Asynchronous AMBA Protocol

    Network on-Chip (NoC) is a novel structural design template, which can be defied for complicated system level on-chip design. NoC has a potential to limit and present the bus-based communication. In this paper, the crisis to discuss is Low power consumption in an Asynchronous Network on-chip (NoC) level communication. NoC...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    An LMS Based Data Reduction Technique for Energy Conservation in Wireless Sensor Network (WSN)

    In preceding existence, Wireless Sensor Networks (WSNs) have gained an amplified attention from the research community and extended its boundaries in commercial, industrial and medical domains. The tailback in WSN based application development is the inadequate energy source. As sensor nodes are generally battery-powered devices, the critical aspect is to...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Detection of Rogue Base Stations in Wimax/IEEE802.16 Using Sensors

    This paper considers the problem of detecting rogue base station in Wimax/802.16 networks. IEEE 802.16 is an emerging standard for broadband wireless communications that is receiving a lot of attention. Security support is mandatory for any communication networks. For wireless systems, security support is even more important to protect the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Implementation of Concurrent Online MBIST for RFID Memories

    Concurrent online testing is a memory test mechanism where the memory can be tested concurrently with the system operation. Thus, it has instant error detection. Radio Frequency IDentification (RFID) devices relies on the correct operation of their memory for identification of objects and delivery of transponder's information. This paper presents...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Simulation and Analysis of Receiver-Receiver Time Synchronization in Wireless Sensor Networks

    Wireless sensor networks were initially deployed for military applications. Gradually researchers found them to be very useful in applications like weather monitoring, target tracking, agriculture, industrial applications, and recently smart homes and kindergartens. All the WSN applications need partial or full time synchronization. Applications like acoustic ranging, target tracking or...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Grid Computing for Different Applications

    Grid Computing delivers on the potential in the growth and abundance of network connected systems and bandwidth: computation, collaboration and communication over the Advanced Web. At the heart of Grid Computing is a computing infrastructure that provides dependable, consistent, pervasive and inexpensive access to computational capabilities. The use of grid...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Improved Diffie-Hellman Algorithm for Network Security Enhancement

    Communication is the important part in any type of network for making it possible to transfer data from one node to another. Communication needs quality and security for better performance and for acceptance of users and client companies. Quality is dependent on size and some other factors of network but...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Agile Plus - Comprehensive Model for Software Development

    In today's changing environment the main priority of a customer is software that executes 100% requirements of customer. In addition there should be some scope so that existing software must adopt future requirements too, that is, it should be flexible enough that can accommodate future requirements, within budget and timely...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Performance of AODV Against Black Hole Attacks in Mobile Ad-Hoc Networks

    Wireless Mobile Ad hoc NETwork (MANET) is a self-configuring network which is composed of several movable mobile nodes. These mobile nodes communicate with each other without any infrastructure. As wireless ad-hoc networks lack an infrastructure, they are exposed to a lot of attacks. One of these attacks is the Black...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    Efficient Use of Bidirectional Communication to Increase Communication Capabilities in Distributed VANET

    Intelligent Transportation System (ITS) is the need for today's luxurious life where the traffic is unavoidable part of the people life. Vehicular Ad hoc NETwork (VANET) is a wireless network that is formed on the fly between collections of cars connected by wireless links. In ITS the different cars flying...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    A Novel Approach of AODV for Stability and Energy Efficient Routing for Manet Using IPV6

    In a Mobile Ad hoc NETwork (MANET), the topology of the network may change rapidly and unexpectedly due to mobility of nodes. Thus, setting up routes that meet high reliability is a very challenging issue. Another important problem in the MANETs is the energy consumption of nodes. This paper presents...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    Scheduler in Cloud Computing Using Open Source Technologies

    Cloud Computing utilities are coming to be omnipresent, and then are beginning to serve as the essential root of computing capacity for both undertakings and private computing requisitions. Any request comes to cloud will be provided by cloud in terms of Virtual Machine. On which basis, Virtual Machine will be...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Apr 2012

    The IRUV Protocol: Intelligent Routing Protocol in Urban Environment for Vanet

    Future Intelligent Transportation Systems require fast and reliable communication between cars (Vehicle-To-Vehicle V2V) or between a car and a road side unit (vehicle-to-infrastructure). The fundamental component for the success of Vehicular Ad-hoc NETworks (VANET) applications is routing. In this paper, the authors propose a VANET routing protocol that is especially...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    A Comparative Study of Cryptosystems With Elliptic Curve Cryptography Using Digital Signature

    Elliptic Curve Cryptography (ECC) is coming forth as an attractive public key cryptosystem for mobile/wireless environments compared to conventional cryptosystems like RSA and DSA. ECC provides better security with smaller key sizes, which results in faster computations, lower power consumption, as well as memory and bandwidth savings. However, the true...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Information Retrieval Through Multi-Agent System With Data Mining in Cloud Computing

    Problem solving solutions like Multi-Agent System (MAS) capitalizes on its multiple intelligent agents to receive precepts from the environment, process the information and produce the desired result for the environment. The wide scope of capabilities of an MAS permits the user to resolve functional, methodic, algorithmic or procedural query to...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    The Application of Wireless Sensor Network in the Irrigation Area Automatic System

    In the irrigation area automatic system, high-performance embedded micro-controller and low-power technology is used to design the water wireless sensor network. The sensor node gathers the hydrographic information such as water-level, gate position and rainfall. The sink node receives the real-time data; the information center stores and processes those data...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Performance Evaluation of AODV and ADV Protocols in VANET Scenarios

    This paper presents a comparative test of two protocols namely-AODV and ADV in various mobility scenarios of Vehicular Ad-hoc NETworks (VANETs). In order to make comparison three performance criterions are selected which include number of packet drop, throughput and total time taken by NCTUns-6.0 to simulate the given network. To...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Node Selection Based Broadcast in Manets to Improve the Efficiency

    In this paper, the issue of broadcasting in Mobile Ad hoc NETworks (MANETs) is considered. A node equipped with directional antenna can divide the Omni directional transmission range into several sectors and turn some of them "On" for transmission. In the proposed scheme using a directional antenna, forwarding nodes selected...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    MySQL and MATLAB Interfacing for Biometric Template Protection With Encryption

    A new approach for biometric database management is presented with enhanced security features. This paper attempts to improve the security of biometric database system by interfacing with MySQL server. The signature templates are acquired for the database using digital pen tablet, encrypted using a simple pseudo noise based algorithm and...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Elite: A New Component-Based Software Development Model

    Component Based Software Engineering (CBSE) approach is based on the idea to develop software systems by selecting appropriate components and then to assemble them with a well-defined software architecture. In this evolving era of Information Technology, there is lot of pressure on software research community to reduce development cost as...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Study and Analysis of Bandwidth Flow Estimation Techniques for Wired/Wireless Networks

    In this topic, an analysis will be made on bandwidth flow estimation technique which comes under networking domain. Correct bandwidth constrained applications and tools are required for proper bandwidth estimation. A proper monitoring of available bandwidth is required during execution to avoid degradation in performance. A several measurement tools have...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    An Efficient Search Algorithm in Decentralized Peer-to-Peer Networks

    To Design efficient search algorithms is a key challenge in decentralized peer-to-peer networks. Flooding and Random Walk (RW) are two previous search algorithms. Flooding searches aggressively and covers the most nodes. However, it generates a large amount of query messages and, thus, does not scale. On the contrary, RW searches...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Security Enhancements in Dynamic Telecast Routing

    Wireless network has no stationary infrastructure. It provides several advantages such as fast and easy deployment, little or no reliance on a pre-existing infrastructure and cost-effectiveness. One of the major issues for data communication over wired and wireless networks is security .Different from the past work on the designs of...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    A MAC Technique for VoIP Services Using Back Off Algorithm in IEEE 802.11e Networks

    In the advent of emerging information super highway, voice over Internet Protocol has become a vital service with the demand for high quality of requirements in Wireless Local Area Network (WLANs). The IEEE 802.11e Standard has been recently introduced to mark the Quality of Service (QoS) competence in the ever...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    A Natural Language Query Processor for Database Interface

    With the increasing amount of information available on the Internet one of the most challenging tasks is to provide search interfaces that are easy to use without having to learn a specific syntax. Hence, the authors present a query interface exploiting the intuitiveness of natural language for the largest web-based...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Personal Authentication System Using Hand Vein Biometric

    With an increasing emphasis on security, automated personal identification using hand vein biometric feature is becoming a very active topic in both research and practical applications. The objective of this work is to present a biometric authentication system for high security physical access control based on hand vein pattern. Hand...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    An Efficient Paging Scheme for IP-Based Cellular Networks Using Mobility Management Protocol

    In interworked fixed and mobile networks, both Terminal Mobility (TM) and Personal Mobility (PM) should be supported and interworked to provide seamless universal mobility to mobile users. TM supports movement between different locations with the same Mobile Terminal (MT). In TM management, an MT updates its location when it changes...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    A Robust Routing Strategy for Density Spanner Based Wireless Ad Hoc Networks

    An important problem for wireless ad hoc networks has been to design overlay networks that allow time- and energy-efficient routing. Many local-control strategies for maintaining such overlay networks have already been suggested, but most of them are based on an oversimplified wireless communication model. The authors address cooperative caching in...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Intrusion Detection Systems in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are a new technology foreseen to be used increasingly in the near future due to their data acquisition and data processing abilities. Security for WSNs is an area that needs to be considered in order to protect the functionality of these networks, the data they convey...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Online Intrusion Alert Based on Aggregation and Correlation

    Traditional Intrusion Detection Systems (IDSs) focus on low-level attacks or anomalies, and raise alerts independently, though there may be logical connections between them. In situations where there are intensive attacks, not only will actual alerts be mixed with false alerts, but the amount of alerts will also become unmanageable. As...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Algorithms for XML Tree Pattern Matching and Query Processing

    XML Tree Pattern Query (TPQ) processing is a research stream within XML data management that focuses on efficient TPQ answering. With the increasing popularity of XML for data representation, there is a lot of interest in query processing over data that conforms to a tree-structured data model. Queries on XML...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Fault Free Randomized Intrusion Tolerant Protocols

    Much of th people critical infrastructure is controlled by large software systems whose participants are distributed across the Internet. As the people dependence on these critical systems continues to grow, it becomes increasingly important that they meet strict availability and performance requirements, even in the face of malicious attacks, including...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Hierarchical Multicast Protocol for Multicasting Over Mobile Ad Hoc Networks

    In mobile ad hoc networks, an application scenario requires mostly collaborative mobility behavior. The key problem of those applications is scalability with regard to the number of multicast members as well as the number of the multicast group. To enhance efficiency and scalability with group mobility, the authors have proposed...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Delay Reduction and Scheduling in Multihop Wireless Networks

    In this paper, the authors analyze the delay performance of a multi-hop wireless network in which the routes between source-destination pairs are fixed. However, its delay performance may be quite poor even when the traffic load is not close to network capacity due to the following reason, each node has...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    High Dimensional Indexing in Image Databases With Adaptive Cluster Distance Bounding

    The authors consider approaches for exact similarity search in a high dimensional space of correlated features representing image datasets, based on principles of clustering and vector quantization. They develop an adaptive cluster distance bound based on separating hyper-planes that complements their index in selectively retrieving clusters that contain data entries...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Query and Update Load Shedding With MobiQual

    Freshness and accuracy are two key measures of Quality of Service (QoS) in location-based, mobile Continual Queries (CQs). However, it is often difficult to provide both fresh and accurate CQ results due to limited resources in computing and communication and fast-changing load conditions caused by continuous mobile node movement. Thus...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Integration of GIS and SAP - Improves Business Processes

    Technology is an important factor to improve business processes. In previous trend businesses have been striving to optimize their processes and improve efficiency by using SAP systems for workflow management and GIS for location based information management. Many advances have been observed in both fields but no direct integration was...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Vulnerability Centric Exploitation Attempts in Open Source Software Systems

    There's been a lot of debate by security practitioners about the impact of open source approaches on security. One of the key issues is that open source exposes the source code to examination by everyone, both the attackers and defenders, and reasonable people disagree about the ultimate impact of this...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Performance Analysis of Manet Before and After Black Hole Attack

    A mobile ad-hoc network is a temporary network set up by wireless mobile computers (or nodes) moving arbitrary in the places that have no network infrastructure. Due to security vulnerabilities of the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious nodes. One of the prominent attacks...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    A Monitoring Approach for Surface Reconstruction From 3D Point Cloud

    This paper describes the surface reconstruction from 3D point cloud. The vertices of point cloud build a network of triangles using Delaunay Triangulation for 3D surface. DT plays an important role due to its guaranteed quality of triangular mesh generation. The process monitoring is emerging as a valuable tool and...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    The Effectiveness of a Proposed System Based on Desktop Virtual Reality to Promote the Basic Concepts of Computer Security

    Teaching information security faces a lot of problems because, it has many abstract concepts which are difficult to understand and imagine in the traditional methods of teaching. In this paper, the authors have designed a proposed system based on desktop virtual reality to promote the basic concepts of computer security...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    An Approach to Improve Task Scheduling in a Decentralized Cloud Computing Environment

    Cloud computing has emerged as a promising platform that grants users with direct yet shared access to computing resources and services without worrying about the internal complex infrastructure. As a cloud must provide services to many users at the same time and different users have different QoS requirements, the scheduling...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Session Fixation Vulnerability in Web-Based Application

    Many web-based applications employ some kind of session management to create a user-friendly environment. Sessions are stored on server and associated with respective users by session IDentifiers (IDs). Naturally, session IDs present an attractive target for attackers, who, by obtaining them, effectively hijack users' identities. Knowing that, web servers are...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Development of Virtual Experiment on 7-Segment Display Decoder Using Virtual Intelligent SoftLab

    The authors use the decimal code to represent numbers. Digital electronic circuits in computers and calculators use general the binary code to represents numbers. A common task of decoding from machine language to decimal numbers is encoding. A very common output device to display decimal numbers is the seven segment...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    A Study on Cloud Security Issues and Challenges

    Cloud computing is one of the today's most exciting technology because of its cost-reducing associated with computing while increasing flexibility and scalability for computer processes. In the past few years, cloud computing has growing from being a promising business idea to one of the fastest growing parts of the IT...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Mining Unstructured Data From Web Using Soft Computing

    Copious material is available from the World Wide Web (WWW) in response to any user-provided query. It becomes tedious for the user to manually extract real required information from this material. Large document collections, such as those delivered by Internet search engines, are difficult and time-consuming for users to read...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    V2V Communication Survey - (Wireless Technology)

    This paper presents the specific application of wireless communication, Automotive Wireless Communication - also called as Vehicle-to-Vehicle Communication. The paper first gives an introduction to the Automotive Wireless Communication. It explains the technology used for Automotive Wireless Communication along with the various automotive applications relying on wireless communication. Automotive Wireless...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Forest Fire Prevention Using Wireless Sensor Networks

    Because of the rapid development of sensors, microprocessors, and network technology, a reliable technological condition has been provided for the authors' automatic real-time monitoring of forest fires control. This paper presents a new type of early warning systems which use a wireless sensor network to collect the information of forest...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Query Driven Architecture for Programmable Network Measurement

    Accurate and real-time traffic measurement is becoming increasingly critical for large variety of applications including accounting, bandwidth provisioning and security analysis. Existing network measurement techniques, however, have major difficulty dealing with large number of flows in today's high-speed networks and offer limited scalability with increasing link speeds. Consequently, the current...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    A Study of Multimedia Broadcast and Multicast Service

    Multicast and Broadcast Service (MBS), or Multimedia Broadcast/Multicast Services (MBMS), is one of the important services to be supported by the next generation cellular systems. MBMS is an IP DataCast (IPDC) type of service that can be offered via existing GSM and UMTS cellular networks. The infrastructure gives the possibility...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Inter Cell Interference Management and Intra Cell User Scheduling in Multi Cell Networks

    To achieve high spatial capacity, wireless cellular networks consider the dense deployment of Base Stations (BSs) that cover small cells. As a consequence, Inter-Cell Interference (ICI) from neighboring BSs becomes a major source of performance degradation and the portion of users whose capacity is naturally limited by ICI grows. In...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Secure Anonymous Route Discovery Protocol for Ad Hoc Routing in Ad Hoc Wireless Networks

    Ad-hoc networks are a new paradigm of wireless communication for mobile hosts. There are various challenges that are faced in the Ad-hoc environment. These are mostly due to the resource poorness of these networks. They are usually set up in situations of emergency, for temporary operations or simply if there...

    Provided By International Journal of Computer Technology and Applications