International Journal of Computer Technology and Applications

Displaying 1-40 of 306 results

  • White Papers // Apr 2015

    Recommender System for E-Shopping Using Users' Tipping Point

    E-commerce is one of the rapidly growing fields now-a-days. With today's trend, attraction of users towards online shopping is increased. In the field of online shopping, previously it was considered that users make the purchase decisions depending on their own choice. But the extensive studies have proved that the decision...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Apr 2015

    Microcontroller Based Design of Power Meter

    In this paper, the authors present a design of an affordable and convenient means for consumers to accurately measure the power consumption of the electrical devices. If a consumer is able to measure the AC power drawn from a particular household circuit, then they would be able to calculate the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2014

    Scheduling Tasks in Embedded Systems Based on NoC Architecture

    In this paper, the author presents a new method to generate and schedule task in the architecture of embedded systems based on the simulated annealing. This novel method takes into account the attribute of divisibility of tasks. A proposal of represent the process in the form of trees. Despite the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2014

    Crucial Concepts and Applications of Data Mining - - An Overview

    Generally, data mining (sometimes called data or knowledge discovery) is the process of analyzing data from different perspectives and summarizing it into useful information that can be used to increase revenue, cuts costs or both. Data mining software is one of a number of analytical tools for analyzing data. It...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2014

    Lock-Less Shared Memory Read/Write Using Message Passing

    Current thread synchronization methods Mutex, Semaphore, Monitorsare based on locks and software transactional memory is based on the database transactions. Locks have disadvantages including contention and dead lock. Software transactional memories can result in a lot of rolling back of transactions, if number of transactions and threads increases. This leads...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2014

    Design of 32-Bit ALU Using Low Power Energy Efficient Full Adder Circuits

    With the advancement of technology, Integrated Chip (IC) has achieved smaller chip size with more functions integrated. Through the usage of more transistors, it has lead to an increase of power dissipation and undesired noise. As the design gets more complex, this results in slower speed. Hence, the demand for...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2014

    Privacy Preservation of Frequent Dataset to be Distributed

    Distributed data mining provides computational strength as it can share effectively the large amount of data among its various computational resources connected in a network. In order to design the accurate data models, this huge amount of precise information must be distributed among various computational clients to perform data mining...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2013

    An Effective Algorithm of Encryption and Decryption of Images Using Random Number Generation Technique and Huffman Coding

    Data security has become most important aspect while transmission of data and storage. The transmission and exchange of image also needs a high security. Cryptography is used to maintain security. In this paper, the authors implemented security for image. They have considered an image, read its pixels and convert it...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2013

    Study on Improving Web Security Using SAML Token

    Web service is the most important word which is most commonly used by all computer professionals. Web services are mainly used for communicating different platform within a network connection. Web services are created based on SOA architecture. SOA platform is most popularly used in distributed systems. When using in distributed...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2013

    A Novel Hybrid Feature Selection and Intrusion Detection Based on PCNN and Support Vector Machine

    In this paper, the authors proposed a hybrid model for feature selection and intrusion detection. Feature selection is important issue in intrusion detection. The selection of feature in attack attribute and normal traffic attribute is challenging task. The selection of known and unknown attack is also faced a problem of...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2013

    Improved Network Security Through Retinal Biometric Based Authentication

    Security and authentication are challenging problems due to the sprawling growth of Internet in today's environment. Therefore, the security of the network users has become an essential factor. There are various techniques available in the literature which make use of passwords, smart cards etc., to provide network related security. But...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2013

    Outsourcing and Discovering Storage Inconsistencies in Cloud Through TPA

    Cloud computing has changed the way computing takes place. It is the technology that enables outsourcing of computing and storage to a public cloud maintained by cloud service providers. Cloud users can use cloud storage and other facilities without capital investment in pay-as-you-use fashion. As the data is stored in...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Apr 2013

    A Questionnaire of Student Satisfaction from College Using Data Mining

    Today, a questionnaire of student satisfaction is adopted by universities and very high level colleges but many medium level colleges are unable to decide upon proper implementation of student satisfaction. Although, data mining has been successful implemented in the business world for some time now, its use in higher education...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Apr 2013

    Modern Research Trends in Association Data Mining Techniques

    Extracting needful information from the large pool of information is a primary task before predicting. Especially from a huge amount of incomplete, noisy, redundant and randomly scattered data. Data mining provides a framework that automatically discovers required patterns from dataset which will be using these predict future occurrence in analogous...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Apr 2013

    Impact of Service Oriented Architecture on ERP Implementations in Technical Education

    These days, technical education is spreading all over the world (rural as well as urban areas) very rapidly and gradually application of ERP system in technical institutes is becoming common. But, with very fast changing technology there is a continued need to enhance the efficiency of operations in ERP system...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2012

    Performance Analysis of Shortest Path Energy Efficient Routing Protocol in Wireless Sensor Networks Using NSRS Algorithm

    Wireless Sensor Network is an up-and-coming technology that shows great promise for various innovative applications both for public and military. Wireless Sensor Networks (WSNs) are Ad-hoc wireless networks of typically consists of hundreds or even thousands of small low-cost sensor nodes that communicate in a wireless way. A sensor node...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2012

    Fast and Efficient IP Network Recovery using Multiple Routing Configuration

    Internet plays a vital role in the peoples communications infrastructure, due to slow convergence of routing protocols after network failure become a growing problem. To guarantee fast recovery from link and node failure in networks, the authors propose a new recovery scheme called Multiple Routing Configuration (MRC). Their proposed scheme...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2012

    Robust Aggregation in Sensor Network: An Efficient Frequent Itemset and Number of Occurrence Counting

    Sensor networks are collection of sensor nodes which co-operatively send sensed data to base station. As sensor nodes are battery driven, an efficient utilization of power is essential in order to use networks for long duration hence it is needed to reduce data traffic inside sensor networks, reduce amount of...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2012

    Design and development of Middleware Gateway IP Multimedia System and Web Services

    Rapid growth in Internet (Web) applications and usage of mobile in telecommunication is present trends in communication. In Web 2.0 web services architecture is become versatile tool for enterprise solutions in distributed environment systems. To provide an enterprise solution it is not possible to get professional solution at one place....

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Nov 2012

    Secure Data Transmission in MANET Routing Protocol

    Information exchange in a network of mobile and wireless nodes without any infrastructure support such networks are called as Ad-hoc networks. A Mobile Ad hoc NETwork (MANET) is mobile, multi-hop, infrastructure less wireless network which is capable of autonomous operation. In this paper the authors have discussed some of the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Nov 2012

    Construction of Power Efficient Fault Tolerant Wireless Network Using Cone Based Algorithm

    Fault tolerant topology control for all to one communication holds significance in dynamic wireless networks with asymmetric wireless links. In this paper the author Investigates the various aspects of the problem mentioned above using the cone based distributed topology control algorithm. The topology of a wireless multi-hop network can be...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Nov 2012

    Energy-Efficient Reliable Routing in Wireless Multimedia Sensor Networks

    Wireless Multimedia Sensor Networks (WMSN) can handle different traffic classes of multimedia content (video, audio streams and still images) as well as scalar data over the network. Use of general and efficient routing protocols for WMSN is of crucial significance. Similar to other traditional networks, in WMSN a noticeable proportion...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Priority Based Scheduling Algorithm Using Time and Transmission Length in 802.11 Networks

    The fairness of IEEE 802.11 wireless networks is rigid to forecast and organize since it constructed based on uncertainty and difficulty of the MAC conflicts and dynamics. So, there is a great extent of packet data to be met in a network traffic jam and the packet data was collapsed...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Simulation and Analysis of Receiver-Receiver Time Synchronization in Wireless Sensor Networks

    Wireless sensor networks were initially deployed for military applications. Gradually researchers found them to be very useful in applications like weather monitoring, target tracking, agriculture, industrial applications, and recently smart homes and kindergartens. All the WSN applications need partial or full time synchronization. Applications like acoustic ranging, target tracking or...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Grid Computing for Different Applications

    Grid Computing delivers on the potential in the growth and abundance of network connected systems and bandwidth: computation, collaboration and communication over the Advanced Web. At the heart of Grid Computing is a computing infrastructure that provides dependable, consistent, pervasive and inexpensive access to computational capabilities. The use of grid...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Improved Diffie-Hellman Algorithm for Network Security Enhancement

    Communication is the important part in any type of network for making it possible to transfer data from one node to another. Communication needs quality and security for better performance and for acceptance of users and client companies. Quality is dependent on size and some other factors of network but...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Agile Plus - Comprehensive Model for Software Development

    In today's changing environment the main priority of a customer is software that executes 100% requirements of customer. In addition there should be some scope so that existing software must adopt future requirements too, that is, it should be flexible enough that can accommodate future requirements, within budget and timely...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Performance of AODV Against Black Hole Attacks in Mobile Ad-Hoc Networks

    Wireless Mobile Ad hoc NETwork (MANET) is a self-configuring network which is composed of several movable mobile nodes. These mobile nodes communicate with each other without any infrastructure. As wireless ad-hoc networks lack an infrastructure, they are exposed to a lot of attacks. One of these attacks is the Black...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Optimizing and Enhancing Parallel Multi Storage Backup Compression for Real-Time Database Systems

    One of the big challenges in the world was the amount of data being stored, especially in Data Warehouses. Data stored in databases keep growing as a result of businesses requirements for more information. A big portion of the cost of keeping large amounts of data is in the cost...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    A Strategy for Package Transformation for Linux Environment

    A Linux operating system is composed of a large number of software packages. Among packages there exist a variety of complex dependency relations, and their management is the foundation of building and maintaining Linux operating system. And the premise of the management is the dependency relations' extraction. Based on the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Emerging Trends in Quantum Cryptography - A Survey

    Privacy is paramount when communicating sensitive information in today's increasingly networked world. Both the business and government sectors have ever-more demanding secure communication needs. Conventional information assurance methods face increasing technological challenges and future threats, including unanticipated advances in mathematics, high-performance computing, and the possibility of large-scale quantum computation. Quantum...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    A Survey on Cloud Computing Architecture

    Cloud computing is Internet-based computing, whereby shared resources, software and information are provided to computers and other devices on demand. Users don't need expertise in or control over the technology infrastructure "In the cloud". Typical cloud computing providers deliver common business applications online that are accessed from another Web service...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Implementation of New Cell Site in Telecom Sector

    This paper revaluates the basic requirements for the installation and implementation of new cell site in telecom sector and will discuss the impact of various physical and environmental conditions on the installation process. In simple terms, a cell site depicts a place where antennas and electronic communications equipment are located,...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Efficient Routing Strategy for Prioritized Messages in Mobile WSN Using Geographic Forwarding Protocol

    The current work represents a new routing protocol considering the environment of wireless sensor network with dynamic mobility. The approach addresses the issues for both real time and non-real time data dissemination from the mobile sensors to the sink. The prime target of this approach is to resolve the issues...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Energy-Efficient Cooperative Protocol for Wireless Networks

    In cooperative networks, transmitting and receiving nodes recruit neighboring nodes to help in communication. The authors model a cooperative transmission link in wireless networks and then it forms a cluster at transmitter end and a receiver end. In this paper, they propose a cooperative communication protocol for formation of these...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Measurement of Real Time Information Using GPU

    Parallel programming is about performance, for otherwise the authors would write a sequential program. A problem is where to find truly parallel hardware that can be dedicated to the task, One answer is Graphical Processing Units (GPUs), which can have hundreds of cores and are found in millions of desktop...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Analysis of Relay Stations in WiMAX Networks

    The demand for broadband services is growing IEEE sharply today. The traditional solutions to provide high speed broadband access is to use wired access technologies such as cable modem, Digital Subscriber Line (DSL), Ethernet and fiber optics. It is too difficult and expensive for carriers to build and maintain wired...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    A Survey: On Generation of Wireless Telephony Technology

    Wireless communication is the transfer of information over a distance without the use of enhanced electrical conductors or "Wires". The distances involved may be short (a few meters as in television remote control) or long (thousands or millions of kilometres for radio communications). When the context is clear, the term...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Energy Efficient Routing Protocols in Mobile Ad Hoc Networks

    In wireless network can classified in two way one is infrastructure network and another is infrastructure less. Infrastructure less wireless network is known as Ad-hoc network. An ad-hoc network is a Local Area Network (LAN) that is built spontaneously as devices connect. Instead of relying on a base station to...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    A Performance Analysis Between AODV & DSR Routing Protocol

    Mobile Ad hoc NETwork (MANET) is an autonomous system of mobile nodes connected by wireless links. Each node operates not only as an end system, but also as a router to forward packets. The nodes are free to move about and organize themselves into a network. These nodes change position...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Probablistic Clustering based on Web Documents

    Web search engine are often forced to pass through long ordered list of documents called snippets. Snippets are web document attributes. These snippets are returned by search engines. The basis of document clustering is an alternative method of organizing retrieval results. Clustering yet needed to be deployed for the search...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Minimizing Response Time and Effective Utilization of I/O-Bound Processes Using \"Approximate Zero Response Algorithm\"

    Various scheduling algorithm are available for the operating system to improve CPU utilization. Different scheduling algorithms have different properties that work on different scheduling criteria's and the choice of a particular algorithm may favor one class of processes over another. SJF gives minimum average waiting time for a given set...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Implementing KQML Performatives for Outsourcing Management System

    An agent is a computer system, situated in some environment that is capable of flexible autonomous action in order to meet its design objectives this is the commonly accepted definition for agents. Agents are autonomous, social, proactive, reactive, and communicate to achieve common goal. The Knowledge Query Manipulation Language (KQML)...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    Sequential Pattern Mining with Various Constraints: An Enhanced Approach

    Sequential pattern mining is to find sequential purchasing behaviors for most customers from a large amount of customer transactions. Historical transaction data can be analyzed to discover customer purchasing habits. However, the size of the transaction database can be very large. It is very time consuming to find all the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2013

    An Effective Algorithm of Encryption and Decryption of Images Using Random Number Generation Technique and Huffman Coding

    Data security has become most important aspect while transmission of data and storage. The transmission and exchange of image also needs a high security. Cryptography is used to maintain security. In this paper, the authors implemented security for image. They have considered an image, read its pixels and convert it...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2013

    Study on Improving Web Security Using SAML Token

    Web service is the most important word which is most commonly used by all computer professionals. Web services are mainly used for communicating different platform within a network connection. Web services are created based on SOA architecture. SOA platform is most popularly used in distributed systems. When using in distributed...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2013

    A Novel Hybrid Feature Selection and Intrusion Detection Based on PCNN and Support Vector Machine

    In this paper, the authors proposed a hybrid model for feature selection and intrusion detection. Feature selection is important issue in intrusion detection. The selection of feature in attack attribute and normal traffic attribute is challenging task. The selection of known and unknown attack is also faced a problem of...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2013

    Improved Network Security Through Retinal Biometric Based Authentication

    Security and authentication are challenging problems due to the sprawling growth of Internet in today's environment. Therefore, the security of the network users has become an essential factor. There are various techniques available in the literature which make use of passwords, smart cards etc., to provide network related security. But...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2013

    Outsourcing and Discovering Storage Inconsistencies in Cloud Through TPA

    Cloud computing has changed the way computing takes place. It is the technology that enables outsourcing of computing and storage to a public cloud maintained by cloud service providers. Cloud users can use cloud storage and other facilities without capital investment in pay-as-you-use fashion. As the data is stored in...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Apr 2015

    Recommender System for E-Shopping Using Users' Tipping Point

    E-commerce is one of the rapidly growing fields now-a-days. With today's trend, attraction of users towards online shopping is increased. In the field of online shopping, previously it was considered that users make the purchase decisions depending on their own choice. But the extensive studies have proved that the decision...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Apr 2015

    Microcontroller Based Design of Power Meter

    In this paper, the authors present a design of an affordable and convenient means for consumers to accurately measure the power consumption of the electrical devices. If a consumer is able to measure the AC power drawn from a particular household circuit, then they would be able to calculate the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2014

    Privacy Preservation of Frequent Dataset to be Distributed

    Distributed data mining provides computational strength as it can share effectively the large amount of data among its various computational resources connected in a network. In order to design the accurate data models, this huge amount of precise information must be distributed among various computational clients to perform data mining...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2014

    Lock-Less Shared Memory Read/Write Using Message Passing

    Current thread synchronization methods Mutex, Semaphore, Monitorsare based on locks and software transactional memory is based on the database transactions. Locks have disadvantages including contention and dead lock. Software transactional memories can result in a lot of rolling back of transactions, if number of transactions and threads increases. This leads...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2014

    Design of 32-Bit ALU Using Low Power Energy Efficient Full Adder Circuits

    With the advancement of technology, Integrated Chip (IC) has achieved smaller chip size with more functions integrated. Through the usage of more transistors, it has lead to an increase of power dissipation and undesired noise. As the design gets more complex, this results in slower speed. Hence, the demand for...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2014

    Scheduling Tasks in Embedded Systems Based on NoC Architecture

    In this paper, the author presents a new method to generate and schedule task in the architecture of embedded systems based on the simulated annealing. This novel method takes into account the attribute of divisibility of tasks. A proposal of represent the process in the form of trees. Despite the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2014

    Crucial Concepts and Applications of Data Mining - - An Overview

    Generally, data mining (sometimes called data or knowledge discovery) is the process of analyzing data from different perspectives and summarizing it into useful information that can be used to increase revenue, cuts costs or both. Data mining software is one of a number of analytical tools for analyzing data. It...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Apr 2013

    A Questionnaire of Student Satisfaction from College Using Data Mining

    Today, a questionnaire of student satisfaction is adopted by universities and very high level colleges but many medium level colleges are unable to decide upon proper implementation of student satisfaction. Although, data mining has been successful implemented in the business world for some time now, its use in higher education...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Apr 2013

    Modern Research Trends in Association Data Mining Techniques

    Extracting needful information from the large pool of information is a primary task before predicting. Especially from a huge amount of incomplete, noisy, redundant and randomly scattered data. Data mining provides a framework that automatically discovers required patterns from dataset which will be using these predict future occurrence in analogous...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Apr 2013

    Impact of Service Oriented Architecture on ERP Implementations in Technical Education

    These days, technical education is spreading all over the world (rural as well as urban areas) very rapidly and gradually application of ERP system in technical institutes is becoming common. But, with very fast changing technology there is a continued need to enhance the efficiency of operations in ERP system...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jan 2011

    Intelligence Ingrained Data Mining Engine Architecture

    Information plays vital role in every field. To take complete advantage of data; it requires a tool for automatic summarization of data extraction of the essence of information stored and the discovery of patterns in raw data. "Data mining" is a tool to accomplish the above mentioned needs. Several attempts...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Nov 2010

    FPGA Based Design of Digital Wave Generator Using CORDIC Algorithm

    In this paper, an efficient approach is presented to design and implement a high speed and area efficient digital sine and cosine wave generator for wireless applications like SDR and GSM. The implementation is based on CO-ordinate Rotation DIgital Computer (CORDIC) algorithm which uses shifts, additions and a very small...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2011

    General Purpose AHB-DMA Controller

    In this paper, the authors reviewed the design of a general purpose AHB-DMA controller which has two channels to perform read/write operations between the memory and customizable interface (SPI, I2C, USB or SDIO, etc.). Each DMA channel enables movement of data from a source AHB address to the IP or...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    A Data Mining Approach to Generation of Persistent Data Using Relative Data Analysis

    Traditional association rule mining method mines association rules only for the items bought by the customer. However, an actual transaction consists of the items bought by the customer along with the quantity of items bought. This paper reconsiders the traditional database by taking into account both items as well as...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Comparative Performance of ARM and FARM on a Normalised Datasets

    Association rule mining is basically used to generate association rules on a real life datasets. A well-known algorithm called Apriori is used to generate the frequent pattern item-sets for a given transaction. Since, real life dataset consist of nominal, continuous and integer attribute fields, to convert it into binary format...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    Implementation of Data Integration Using Distributed Systems: A Review

    Data integration in the distributed data system is introduced to solve the problem that data model has. The data integration in the distributional systems can be supported effectively. Data conversion is still a challenge in distributed system integration. Community based system is used for distributed data integration. It comprises of...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Performance Anaysis of Embedded Zero Tree and Set Partitioning in Hierarchical Tree

    Compressing an image is significantly different than compressing raw binary data. For this different compression algorithm are used to compress images. Discrete wavelet transform has been widely used to compress the image. Wavelet transform are very powerful compared to other transform because its ability to describe any type of signals...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Data Clustering Method for Very Large Databases Using Entropy-Based Algorithm

    Finding useful patterns in large datasets has attracted considerable interest recently and one of the most widely studied problems in this area is the identification of clusters, or densely populated regions, in a multi-dimensional dataset. Prior work does not adequately address the problem of large datasets and minimization of I/O...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    An Analysis of Distributed Computer Network Administration

    Computer Networking is necessary to human beings. People needed to share ideas, research knowledge, and the way of life to their friends. In the modern time, the role of computer networks became dreamy. Analyzing, accessing, sharing and storing of data and information are very easy with help of distributing computer...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Performance Evaluation of Improved Algorithm for Wireless Sensor Networks

    Wireless sensor networks have recently come into prominence because they hold the potential to revolutionize many segments of the economy and life, from environmental monitoring and conservation, to manufacturing and business asset management, to automation in the transportation and health-care industries. Information collected by and transmitted on a sensor network...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    A Novel Approach for Securing Mobile Ad Hoc Network With an Enhanced Trust Calculation Method

    A Mobile Adhoc Network is a group of wireless mobile computers in which nodes cooperate by forwarding packets for each other to allow them to communicate beyond direct wireless transmission range. Due to wide-ranging characteristics of the Ad Hoc Networks like decentralization, dynamic topology and neighbor based routing, it is...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    A Trust, Privacy and Security Infrastructure for the Inter-Cloud

    Cloud Computing is one of the most important security challenges to manage and assure a secure usage over multi-provider Inter-Cloud environments with dedicated communication infrastructures, security mechanisms, processes and policies. Based on the collection of various Inter-Cloud usecases and scenarios within the private and public sector like DMTF (Distributed Management...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Open Source in Cloud Computing

    Cloud computing is emerging as the latest BUZZ word in Information Technology. There is going to be a great shift from traditional network computing to cloud computing. The features of Cloud computing - Pay as you go and Virtualization has made it a long run in advance technologies. This paper...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Type of Security Threats and It's Prevention

    Security is a branch of computer technology known as information security as applied to computers and networks. The objective of online security includes protection of information and property from theft, corruption, or threats attack, while allowing the information and property to remain accessible and productive to its intended users. The...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Cloud Computing Security With Nymble Technology

    Misbehave blacklisting schemes allow online service provide in cloud computer to prevent Misbehave access by abusive users while preserving the privacy of all Misbehave users (both abusive and non-abusive). The scheme proposed for this purpose was Nymble, an extremely efficient scheme based only on symmetric primitives; however, Nymble relies on...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    3-D Graphical Password Used For Authentication

    In today's world, security is important aspect in day to day life. So, everyone used various ways for security purpose. People use passwords for their security. Generally, everyone uses textual password. Textual password is combination of alphabets and numbers. People keep textual password as name of their favorite things, actors...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Interpretation of Formal Proof for Cryptographic Protocols into Computational Model

    Cryptography is the spinal cord for all security measures involved in computing field so a lot of emphasis is required to be given to make it strong enough to deal all the transition of the security industry. The authors present a general method to prove security properties of multiple cryptographic...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Automatically Communication Path Creation and Reconfiguration in Dynamic Network Environment for Optimizing Performance to Network Applications

    Accessing network services across a wide area network still remains a challenging task and the difficulty mainly comes from the heterogeneous and constantly changing network environment, which usually causes undesirable user experience for network-oblivious applications. A promising approach to address this is to provide network awareness in communication paths. Many...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Consideration With Dynamic Routing Security

    One of the major issues for data communication over wired and wireless networks is the security. the past work is on the designs of cryptography algorithms and system infrastructures. Dynamic routing algorithm called improved dynamic routing with security consideration, which is based on the concept of Zone Routing Protocol (ZRP)...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Simulation Based: Study and Analysis of Routing Protocol in Vehicular Ad-Hoc Network Environment

    A Vehicular Ad hoc NETwork (VANET) consists of vehicles which communicate with each other and exchange data via wireless communication links available between the vehicles which are in communication ranges of vehicles to improve the road safety in city. The communication between vehicles is used to provide road safety, comfort...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    A Quantitative Study and Comparison of Secure OLSR Routing Protocol

    This paper presents the comparison of the secure OLSR (Optimized Link State Routing Protocol) in mobile ad-hoc network with other approach. The authors compare the security from the different approach and their effect on the existing OLSR. The main aim of this paper is to study the various securities and...

    Provided By International Journal of Computer Technology and Applications