International Journal of Computer Theory and Engineering (IJCTE)

Displaying 1-40 of 187 results

  • White Papers // Apr 2015

    Skeletal Algorithms: Sequential Pattern Mining

    The basic idea behind the skeletal algorithm is to express a problem in terms of congruence's on a structure, build an initial set of congruence's, and improve it by taking limited unions/intersections, until a suitable condition is reached. Skeletal algorithms naturally arise in the context of data/process mining, where the...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Apr 2015

    Improving Capacity of Smart Grid Wireless Backhauls with Deadline Ordered Scheduler and Packet Concatenation

    Many applications in the smart grid generate packets with small data payload and may lead to low channel efficiency. In addition, some types of information exchanging from the smart meters to the control center is useful only within the predefined delay constraint. Hence, given that the concentrators are assigned a...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Apr 2015

    Simulation of VICTOR Algorithm for Fault-Diagnosis of Digital Circuits

    Of a multitude of algorithms used for fault diagnosis and testing of digital circuits, VICTOR (VLSI Identifier of Controllability, Testability, Observability and Redundancy) stands out because of its multi-step approach to determine the test vectors needed for detection of a particular fault. In this paper, the authors have presented the...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jan 2015

    Low Power Circuit Design Techniques: A Survey

    In this paper, the authors present a detail on various techniques to realize low voltage low power circuit. The techniques discussed are conventional Gate-Driven (GD), Floating Gate (FG), Quasi-Floating Gate (QFG), Bulk-Driven (BD), and BD-QFG. The comparative analysis results in best performance achieved by BD-QFG approach. As BD circuits are...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jan 2015

    Design of a Workflow-Based Grid Framework

    In this paper, the authors present the design of the grid collaborative framework which has been proposed in one of their previous work. Grid infrastructure for resources sharing is somewhat stable with the wide acceptance of the Open Grid Services Architecture (OGSA) and Web Services Resource Framework (WSRF), but grid...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jan 2015

    Monitoring and Notification System Based on Risk Analysis Using Map-Reduce Framework

    In this paper, the authors present a monitoring and notification system based on risk analysis using map-reduce framework that can do risk prediction using big data. By using social media and access records of their users, the proposed system determines their risks. Also, it monitors the restricted area through setting...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jan 2015

    End User Satisfaction and Individual Performance Assessments in E-Procurement Systems

    End user satisfaction and individual performance have been identified by many researchers as critical determinants of the success of information systems. As an escalating number of organizations now utilize e-procurement systems, there is a desire to understand their effect on individual end-user's performance. Therefore, this paper attempts to empirically examine...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jan 2015

    Web-Oriented Architecture (WOA) Enabled Customer-Centric Collaborative Commerce Platform (WCCP)

    Traditional Service-Oriented Architecture (SOA) has consistently promised more than it has delivered, but Web-Oriented Architecture (WOA) promises to deliver the robust outcomes formerly expected of SOA. WOA extends SOA to web-based applications. The architecture hides the protocol complexity in the application state and provides simpler methods for the deployment of...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jan 2015

    A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm

    In this paper, the authors present a Modified Best Fit Decreasing algorithm (MBFD algorithm) for virtual machines dynamic migration scheduling model. The model uses the bin packing problem classical approximation algorithm idea, designs a new algorithm to deal with virtual machines dynamic migrating scheduling. It finds out load hot-spot hosts...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jan 2015

    Genetic Algorithm based Bi-Objective Task Scheduling in Hybrid Cloud Platform

    Hybrid cloud is a type of the general cloud computing platform, which is composed of both public and private cloud. Scheduling plays a key role in the efficient use of hybrid cloud resources. In this paper, focus is on a scheduling algorithm for hybrid cloud that tries to optimize both...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jan 2015

    Application and Significance of Web Usage Mining in the 21st Century: A Literature Review

    Web mining is an exciting discipline in the domain of data mining as well as in classification/clustering. Identifying the usage patterns of users is very important in utilizing the vast information available in the World Wide Web. Web usage mining entails identifying usage pattern and has many practical applications. It...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jan 2015

    Development Method for Shariah Compliant E-Commerce Payment Processing

    In this paper, the authors proposed a response to rapid uptake of online transactions that encompasses the secure transactions that comply with the Shariah principles. The algorithm in the paper proposed the inclusion of Intermediate Shariah Transaction Party (ISTP) as an intermediary for communications between merchant and customers before the...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Dec 2014

    An Improved Multi-Bit Threshold Flipping LDPC Decoding Algorithm

    In this paper, the authors consider error probability of much larger absolute value symbols about Reliability Rate Based Weighted Bit-Flipping (RRWBF) algorithm of Low Density Parity-check Code (LDPC). RRWBF owns better performance and effective practicability, compared with Weighted Bit Flipping algorithm (WBF). This paper proposes a modified version of this...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Aug 2014

    Design of Two-Rail Checker Using a New Parity Preserving Reversible Logic Gate

    Reversible logic is one of the basis of future computing system that promises zero energy dissipation. It has applications in various fields such as low power VLSI, fault tolerant designs, quantum computing, nanotechnology, DN A computing, optical computing, cryptography and informatics. To make reversible logic circuits reliable, they must incorporate...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jun 2014

    Trade-off between Accuracy and Longevity in Wireless Sensor Networks

    Two major controversial metrics that determine the stability period of a Wireless Sensor Network (WSN) are accuracy and longevity. In this paper, the authors analyze the trade-off between accuracy and longevity in WSNs. They investigate different types of WSNs routing techniques together with their applications and state of the art...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jun 2014

    Secure Multi Agent Information Filtering

    As the amount of accessible information is overwhelming, the intelligent information filtering systems provide helpful methods to access. The main problems are that the relevant information is spread over a big number of sources and useful information is hidden under the huge amount of useless data. The authors proposed a...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jun 2014

    A Numerical Evaluation of an Infill Sampling Criterion in Artificial Neural Network-Based Optimization

    Surrogate models can be used to replace expensive computer simulations for the purposes of optimization. In this paper, the authors propose an optimization approach based on Artificial Neural Network (ANN) surrogate models and Infill Sampling Criteria (ISC) strategy to evaluate design variables. The criterion for infill sample selection is a...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Apr 2014

    On the Design of a Reconfigurable Radio Processor Using FPGA

    High performance DSP processors are unable to meet the speed requirements of Software Defined Radio (SDR) and System-on-Chips (SoCs) are also not suitable because of their limited flexibility. Recently dynamically reconfigurable FPGAs have emerged as high performance programmable hardware to execute highly parallel, computationally intensive signal processing functions efficiently. Since...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Apr 2014

    Associative Classification Based on Incremental Mining (ACIM)

    Associative Classification (AC) is an approach in data mining that uses association rule to build classification systems that are easy to interpret by end-user. When different data operations (adding, deleting and updating) are applied against certain training data set, the majority of current AC algorithms must scan the complete training...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Apr 2014

    Clustering Analysis with Combination of Artificial Bee Colony Algorithm and k-Means Technique

    Clustering is a popular data analysis and data mining technique. Among different proposed methods, k-means is an efficient clustering technique to cluster datasets, but this method highly depends on the initial state and usually converges to local optimum solution. This paper takes the advantage of a novel evolutionary algorithm, called...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Apr 2014

    An improved K-Means Algorithm Based on Association Rules

    With the rapid development of clustering analysis technology, there have been many application-specific clustering algorithms, such as text clustering. K-means algorithm, as one of the classic algorithms of clustering algorithms, and a textual document clustering algorithms commonly used in the analysis process, is widely used because of its simple and...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Feb 2014

    On the Problem of Modeling Structured Data with the MinSOD Representative

    The possibility to face pattern recognition problems directly on structured domains (e.g., multimedia data, strings and graphs) is fundamental to the effective solution of many interesting applications. In this paper, the authors deal with a clustering problem defined in the string domain, focusing on the problem of cluster representation in...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Feb 2014

    How Data Mining Techniques Can Improve Simulation Studies

    Researchers take years and even decades of observation in order to analyze socio-economic phenomenon. Whereas the Agent-Based Modeling Simulation (ABMS) provides a new issue by offering the possibility to create virtual societies in which individuals and organizations are directly represented with their observed interactions. As it is known simulation generates...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jan 2014

    Design of a Non-Overlapping Clock Generator for RFID Transponder EEPROM

    A Non-Overlapping Clock (NOC) generator circuit is designed for the successful operation of High Voltage Generator (HVG) implementation in low-power applications like Radio Frequency IDentification (RFID) tag EEPROM. The NOC generator has been implemented in 0.18 CMOS process. The designed NOC can generate two stable anti-phase clock signals as output,...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jan 2014

    A Pricing Policy to Mitigate Interference Management in Femtocell Network

    Recently, the concepts of game theory have attracted the attention of researcher for self-governing decision making to study the performance of wireless network. There has been growing interest in accepting game theoretic method to wireless systems. The problem of interference management in femtocell network is approached from the prospective of...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jan 2014

    Adapting Distance Based Clustering Concept to a Heterogeneous Network

    The authors propose an improved energy consumption model for a heterogeneous network by adapting an existing distance based clustering concept to it. They assume that if the distance based clustering concept has improved a homogeneous network; the same concept if applied to a heterogeneous network will improve the latter. A...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jan 2014

    Computational Analysis of Encrypted Database to Provide Confidentiality

    Cloud computing, is network based model used to illustrate a variety of computing concepts that involves a large number of computers connected through a synchronized communicational network such as the Internet. Cloud users demands security to their data which are stored in data repositories of cloud service provider. Thus the...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jan 2014

    Enhanced Intensive Indexing (I2D) De-Duplication for Space Optimization in Private Cloud Storage Backup

    Cloud storage provide users with abundant storage space and make user friendly for immediate acquiring of data, which is the foundation of all kinds of cloud applications. However, there is a lack of deep studies on how to optimize cloud storage aiming at improvement of data access performance. With the...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jan 2014

    Asynchronous 10MS/s 10-Bit SAR ADC for Wireless Network

    In this paper, the authors present a low power asynchronous 10-bit Successive Approximation Register (SAR) ADC implemented in 0.18 CMOS process. The ADC is realized fully differentially with a split capacitor array to lower power cost and improve the speed. To further enhance power efficiency and high speed for a...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jan 2014

    A Survey on Current Underwater Acoustic Sensor Network Applications

    Terrestrial and airborne wireless sensor networks rely on radio frequencies as their communication medium for transmitting data and information. However, sensing and subsequent transmission in sub-sea environment e.g. deep sea exploration requires all together a different approach for communication that has to be done under water. There's no escaping the...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jan 2014

    Visualization of Mapped Security Standards for Analysis and Use Optimisation

    There are many security standards which the company can use. While security standards can differ in purpose and covered area, more than one standard can be used at the same time which leads to overlap and potential conflicts in requirements of different standards. In such cases, deep analysis of used...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jan 2014

    An e-Learning System Based on EGL and Web 2.0

    Aiming at the existing problems of e-learning system application architecture, in the analysis of the relationship between EGL and Web 2.0 technologies, application architecture of e-learning system based on EGL and integrating Web 2.0 technology is proposed in this paper. Through the process of design and implementation of an e-learning...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jan 2014

    Network Simulation: Tasks and Methods of Their Solution

    Simulation of networks is an actual task for different areas of informational technologies. It may be used for network control algorithms evaluation, for software validation, for network performance estimation etc. Task of network simulation is usually reduced to the task of network protocols implementation. Peculiarity of network simulation is that...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jan 2014

    Moving Object Databases-Indexing Algorithms

    In order to effectively use knowledge - one of the most significant elements of the authors' era; it must be managed well and made useful. Until today, classical databases enabled people to share data, reduce unnecessary data and provide data security, etc. more easily. However, they also lacked to use...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jan 2014

    Top-k Ranking with Membership Function for Deductive Database

    The top-k ranking in the queries those are ambiguous. In this paper the authors demonstrate their query answering strategy for ranking world population for deductive data base. The cause of most problems are wrong ranking because some questions have ambiguity such as \"Find the country which have the population between...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jan 2014

    Data Mining in Semantic Web Data

    Semantic web is popular in a variety of different applications, but research in data mining in semantic web data, appears less. As open source software for data mining in semantic web open source is minimal, and data model of the semantic web requires RDF or OWL format. These specific formats...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jan 2014

    SaNTEA: Stopwatch Petri Net Based Tool for Embedded Systems Analysis

    In this paper the authors describe the first version of a reliability analysis tool that implements a new version of feared scenarios generation algorithm. SaNTEA (Stopwatch petri Net based Tool for Embedded systems Analysis) allows the representation of the suspension and resumption of task execution and the extraction of feared...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jan 2014

    A Comparison of Efficiency of Data Transfer by Using Rsync, Rsync+SSH and Dropbox

    Technology and the Internet are becoming popular. They are widely used in homes and offices through local area networks or wireless local area networks. This paper presents a comparison of data transfer by using three protocols: Rsync, Rsync+SSH and Dropbox on Ubuntu. The efficiency or the speed of the data...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jan 2014

    An Effective Preprocessing Method for Web Usage Mining

    Web Usage Mining (WUM) is one of the categories of data mining technique that identifies usage patterns of the web data, so as to perceive and better serve the requirements of the web applications. The working of WUM involves three steps - preprocessing, pattern discovery and analysis. The first step...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Dec 2013

    Secure Remote Data Processing in Cloud Computing

    Cloud computing provides solutions as a service to meet customers' needs such as massive data storage and a lot of computing resources to process customer data efficiently. To fully utilize such services, data need to be outsourced to Cloud Service Providers (CSPs). However, outsourcing precious data to the CSPs could...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Aug 2009

    Energy Efficiency of Encryption Schemes for Wireless Devices

    Encryption algorithms are known to be computationally intensive. They play a main role in information security systems. On the other side, those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. This paper tries to present a fair comparison between the most common...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Oct 2009

    Analyzing the Energy Consumption of Security Algorithms for Wireless LANs

    Security in wireless networks is of paramount importance. Due to the broadcast nature of the wireless radio signals, wireless networks are implicitly vulnerable to several network attacks. Anyone within the wireless transmission range of a device (including malicious users or attackers) is able to passively listen to or eavesdrop on...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Aug 2009

    Secured Routing Scheme for Adhoc Networks

    A recent trend in Ad Hoc network routing is the reactive on-demand philosophy where routes are established only when required. Most of the protocols in this category are not incorporating proper security features. The ad hoc environment is accessible to both legitimate network users and malicious attackers. It has been...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Oct 2009

    A Novel Method of Fingerprint Classification Using Image Parameters on ANFIS

    Numerous algorithms have been developed to improve the speed of fingerprint recognition and this assumes prime importance when dealing with a large database of fingerprint images. This paper proposes a novel technique of using the image parameters like mean, median, variance, standard deviation and root mean square value to train...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Feb 2010

    Validation Of Temporary Delegation And Revocation Of Roles With UML And OCL

    Organizations having a large number of employees face several difficulties to separate job assignments to individual users. The situation becomes more complex when job assignments are delegated to those users who fulfill some explicit conditions. The delegation models developed so far discuss various issues regarding delegation of roles, but no...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Feb 2011

    Role Based Authentication Schemes for Security Automation

    Academy automation implies to the various different computing hardware and software that can be used to digitally create, manipulate, collect, store, and relay academy information needed for accomplishing basic operations like admissions and registration to finance, student and faculty interaction, online library, medical and business development. Raw data storage, electronic...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Oct 2009

    Resource Reservation Pricing Pitch for Prioritized Traffic in MANETs and Statistical Verification for Its Hypothetical Measurements

    In this paper, the authors have given pricing pitch for resource reservation about prioritized traffic in MANETs. This scheme is for use of MANETs in commercial production, emergencies, mission critical and broadcasting scenarios where real time transmission requires guaranteed QoS. Some hypothetical measurements are performed on some experimental data and...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Sep 2009

    UML Design for Performance Evaluation of Object Oriented Programs on Dual Core Processors

    In today's scenario, high performance computing is needed to solve the complex scientific problems. In this regards the Multi-core technology is one of the major technologies. Intel's Dual Core processors improve the performance of applications by executing multiple programs at a time. The objective of the present paper is to...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Oct 2010

    Quality Metrics Tool for Object Oriented Programming

    Metrics measure certain properties of a software system by mapping them to numbers (or to other symbols) according to well-defined, objective measurement rules. Design Metrics are measurements of the static state of the project's design and also used for assessing the size and in some cases the quality and complexity...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Dec 2010

    Realization of Threats and Countermeasure in Semantic Web Services

    Semantic Web Services (SWS) are worn by large number of companies as they render products and services to customers and business partners throughout the Internet and corporate extranets. The security necessities for these service providers are of supreme importance. Platform-based security services are provided by operating system. Internet Information Services...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Dec 2010

    State of the Art of Data Dissemination in VANETs

    In VANETs (Vehicular Ad-hoc NETworks), RSUs (Road Side Units) and vehicles disseminate safety and non safety messages. The aim of VANETs is to enable dissemination of traffic information and road conditions as detected by independently moving vehicles. For VANETs applications, it is important to disseminate data from an information source...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Oct 2010

    Template Based Mole Detection for Face Recognition

    Face recognition is used for personal identification. The Template based Mole Detection for Face Recognition (TBMDFR) algorithm is proposed to verify authentication of a person by detection and validation of prominent moles present in the skin region of a face. Normalized Cross Correlation (NCC) matching, complement of Gaussian template and...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Dec 2010

    Soft Decision Parallel Interference Cancellation for Scrambled/Unscrambled DS-CDMA System

    A soft decision linear parallel interference cancellation for the direct sequence spread spectrum CDMA systems which can accommodate more users (K = N+M >N) than the processing gain of the system is analyzed in this paper. The proposed technique accommodates N users without any mutual interference and a number of...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jun 2010

    Mutual Authentication Tracking Loop Technique for 3-G Mobile Communications

    Hacking and threats are increasing day by day. Authentication of mobile subscribers and network is an important criterion to the researchers. Now mobile communication system (3-G or advanced) has been developed to speed up the data communication. 3-G mobile communication uses two different switching techniques: circuit switching for voice and...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Aug 2010

    Secured Back Up Routing Protocol for Adhoc Networks

    Adhoc mobile networks are very dynamic, self organizing, self healing distributed networks which support data networking without an infrastructure. The user can use the network services efficiently and securely while moving, by using the proposed protocol. This protocol is used to store secured backup routes from multiple routes available between...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Aug 2010

    A Dynamic Location Management Scheme for Wireless Networks Using Cascaded Correlation Neural Network

    In this paper, the authors propose a novel intelligent technique for reducing the location update and paging cost. This paper focuses on the location management procedure, which is the process that allows the network to identify the exact location of a Mobile Terminal (MT) for a call delivery. Location management...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Aug 2010

    Face Recognition Using Wavelet Based Kernel Locally Discriminating Projection

    Locality Preserving Projection (LPP) aims to preserve the local structure of the image space, while Principal Component Analysis (PCA) aims to preserve the global structure of the image space; LPP is linear, while Isomap, LLE, and Laplacian Eigenmap are nonlinear methods, so they yield maps that are defined only on...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Aug 2010

    CAD Design of Operational Amplifiers With Noise Power Balance for SoC Application

    Advances in integrated circuit technology have led to the birth and proliferation of a wide variety of integrated circuits, including but not limited to Application Specific Integrated Circuits (ASIC), various types of microcontrollers and processors. Many applications such as communication devices (VoIP, MoIP, wireless) require chip speeds that may be...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Aug 2010

    SASMS: Spectrum Allocation Scheme Under Multi-Transceiver Structure in CogMesh Network

    A novel spectrum allocation scheme in a centralized scenario with the support of multi-transceiver structure of CMR (Cognitive Mesh Router) in CogMesh network is proposed. Traditional MR (Mesh Router) in WMN (Wireless Mesh Network) is no longer met the demand of the development of wireless communication in the field of...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Aug 2010

    Sensor Set Selection for Cooperative Spectrum Sensing Based on Confidence Detection

    Recently the radio spectrum is becoming exhausted because of the growing demands for the radio spectrum. In this regard, the paradigm shifts from the conventional exclusive use of frequency resources by the fixed allocation to the dynamic frequency utilization is indispensable for the future wireless networks. Cognitive Radio (CR) can...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Apr 2010

    Performance Analysis of Coexistent Heterogeneous Networks for Various Routing Protocols Using Qualnet Simulation

    As the explosive growth of the ISM band usage continues, there are many scenarios where different systems operate in the same place at the same time. One of growing concerns is the coexistence of wireless systems. In heterogeneous networks, mobility, traffic and node density are main network conditions that significantly...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jun 2010

    An Innovative Approach to Enhance the Security of Data Encryption Scheme

    In this paper, the authors proposed a new scheme to enhance the security of data encryption scheme. With cascading of data encryption standard in three times, they become able to counter the famous meet in middle attack in double and triple data encryption standard. They show how the random key...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jun 2010

    Artificial Intelligence Based Authentication Technique With Three Attributes in Vehicular Ad Hoc Network

    Vehicular Ad Hoc NETwork (VANET) is one of the wireless ad hoc networks which are based on IEEE 802.11 wireless standard enabling vehicle to vehicle and vehicle to roadside communications through air interface. Information (voice, message, data, image etc) are routed in the cells or networks, any node or person...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Apr 2009

    Efficient Job Scheduling in Grid Computing With Modified Artificial Fish Swarm Algorithm

    One of the open issues in grid computing is efficient job scheduling. Job scheduling is known to be NP-complete. Therefore, the use of non-heuristics is the de facto approach in order to cope in practice with its difficulty. In this paper, the authors propose a Modified Artificial Fish Swarm Algorithm...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Feb 2010

    Grid Operating System: Making Dynamic Virtual Services in Organizations

    The structure of a grid system should be such that even a small personal computer can avail the facility of many supercomputers at a time. A grid is formulated by the number of supercomputers are used and participated in the computations. Grid computing has no straightforward way to control and...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Feb 2010

    Image Compression Using New Entropy Coder

    Digital images contain large amount of information that need evolving effective techniques for storing and transmitting the ever increasing volumes of data. Image compression addresses the problem by reducing the amount of data required to represent a digital image. Image compression is achieved by removing data redundancy while preserving information...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Feb 2010

    Implementation of Routing Security Aspects in AODV

    Security has become a primary concern in order to provide protected communication between mobile nodes in a hostile environment. Unlike the wireline networks, the unique characteristics of mobile ad hoc networks pose a number of nontrivial challenges to security design, such as open peer-to-peer network architecture, shared wireless medium, stringent...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Feb 2010

    Dynamic Route Selection: An Artificial Intelligence Based Approach

    In this paper, the authors have pointed out new trends for efficient routing strategies. Firstly they have introduced the concept of fuzzy rule during path detection. Secondly they have depicted another technique of routing based on application specific operational models. In this paper, they have shown the delivery schemes of...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jan 2014

    An Effective Preprocessing Method for Web Usage Mining

    Web Usage Mining (WUM) is one of the categories of data mining technique that identifies usage patterns of the web data, so as to perceive and better serve the requirements of the web applications. The working of WUM involves three steps - preprocessing, pattern discovery and analysis. The first step...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Dec 2009

    Scavenging Idle CPU Cycles for Creation of Inexpensive Supercomputing Power

    Grid computing is often regarded as a means for creating inexpensive \"Super-computing.\" With grid computing organizations can optimize computing and data resources, pool such resources to support massive, compute intensive loads. This paper demonstrates the experiences gained during aggregation of large computational power acquired from idle workstations connected on the...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jan 2014

    Design of a Non-Overlapping Clock Generator for RFID Transponder EEPROM

    A Non-Overlapping Clock (NOC) generator circuit is designed for the successful operation of High Voltage Generator (HVG) implementation in low-power applications like Radio Frequency IDentification (RFID) tag EEPROM. The NOC generator has been implemented in 0.18 CMOS process. The designed NOC can generate two stable anti-phase clock signals as output,...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jan 2014

    A Pricing Policy to Mitigate Interference Management in Femtocell Network

    Recently, the concepts of game theory have attracted the attention of researcher for self-governing decision making to study the performance of wireless network. There has been growing interest in accepting game theoretic method to wireless systems. The problem of interference management in femtocell network is approached from the prospective of...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jan 2014

    Adapting Distance Based Clustering Concept to a Heterogeneous Network

    The authors propose an improved energy consumption model for a heterogeneous network by adapting an existing distance based clustering concept to it. They assume that if the distance based clustering concept has improved a homogeneous network; the same concept if applied to a heterogeneous network will improve the latter. A...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jun 2014

    Trade-off between Accuracy and Longevity in Wireless Sensor Networks

    Two major controversial metrics that determine the stability period of a Wireless Sensor Network (WSN) are accuracy and longevity. In this paper, the authors analyze the trade-off between accuracy and longevity in WSNs. They investigate different types of WSNs routing techniques together with their applications and state of the art...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jan 2014

    Computational Analysis of Encrypted Database to Provide Confidentiality

    Cloud computing, is network based model used to illustrate a variety of computing concepts that involves a large number of computers connected through a synchronized communicational network such as the Internet. Cloud users demands security to their data which are stored in data repositories of cloud service provider. Thus the...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jan 2014

    Enhanced Intensive Indexing (I2D) De-Duplication for Space Optimization in Private Cloud Storage Backup

    Cloud storage provide users with abundant storage space and make user friendly for immediate acquiring of data, which is the foundation of all kinds of cloud applications. However, there is a lack of deep studies on how to optimize cloud storage aiming at improvement of data access performance. With the...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jan 2014

    Asynchronous 10MS/s 10-Bit SAR ADC for Wireless Network

    In this paper, the authors present a low power asynchronous 10-bit Successive Approximation Register (SAR) ADC implemented in 0.18 CMOS process. The ADC is realized fully differentially with a split capacitor array to lower power cost and improve the speed. To further enhance power efficiency and high speed for a...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jan 2014

    A Survey on Current Underwater Acoustic Sensor Network Applications

    Terrestrial and airborne wireless sensor networks rely on radio frequencies as their communication medium for transmitting data and information. However, sensing and subsequent transmission in sub-sea environment e.g. deep sea exploration requires all together a different approach for communication that has to be done under water. There's no escaping the...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jan 2014

    Visualization of Mapped Security Standards for Analysis and Use Optimisation

    There are many security standards which the company can use. While security standards can differ in purpose and covered area, more than one standard can be used at the same time which leads to overlap and potential conflicts in requirements of different standards. In such cases, deep analysis of used...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jun 2014

    Secure Multi Agent Information Filtering

    As the amount of accessible information is overwhelming, the intelligent information filtering systems provide helpful methods to access. The main problems are that the relevant information is spread over a big number of sources and useful information is hidden under the huge amount of useless data. The authors proposed a...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)