International Journal of Computer Theory and Engineering (IJCTE)

Displaying 1-40 of 156 results

  • White Papers // Jun 2014

    Trade-off between Accuracy and Longevity in Wireless Sensor Networks

    Two major controversial metrics that determine the stability period of a Wireless Sensor Network (WSN) are accuracy and longevity. In this paper, the authors analyze the trade-off between accuracy and longevity in WSNs. They investigate different types of WSNs routing techniques together with their applications and state of the art...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jun 2014

    Secure Multi Agent Information Filtering

    As the amount of accessible information is overwhelming, the intelligent information filtering systems provide helpful methods to access. The main problems are that the relevant information is spread over a big number of sources and useful information is hidden under the huge amount of useless data. The authors proposed a...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jun 2014

    A Numerical Evaluation of an Infill Sampling Criterion in Artificial Neural Network-Based Optimization

    Surrogate models can be used to replace expensive computer simulations for the purposes of optimization. In this paper, the authors propose an optimization approach based on Artificial Neural Network (ANN) surrogate models and Infill Sampling Criteria (ISC) strategy to evaluate design variables. The criterion for infill sample selection is a...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Apr 2014

    An improved K-Means Algorithm Based on Association Rules

    With the rapid development of clustering analysis technology, there have been many application-specific clustering algorithms, such as text clustering. K-means algorithm, as one of the classic algorithms of clustering algorithms, and a textual document clustering algorithms commonly used in the analysis process, is widely used because of its simple and...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Apr 2014

    Clustering Analysis with Combination of Artificial Bee Colony Algorithm and k-Means Technique

    Clustering is a popular data analysis and data mining technique. Among different proposed methods, k-means is an efficient clustering technique to cluster datasets, but this method highly depends on the initial state and usually converges to local optimum solution. This paper takes the advantage of a novel evolutionary algorithm, called...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Apr 2014

    Associative Classification Based on Incremental Mining (ACIM)

    Associative Classification (AC) is an approach in data mining that uses association rule to build classification systems that are easy to interpret by end-user. When different data operations (adding, deleting and updating) are applied against certain training data set, the majority of current AC algorithms must scan the complete training...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Apr 2014

    On the Design of a Reconfigurable Radio Processor Using FPGA

    High performance DSP processors are unable to meet the speed requirements of Software Defined Radio (SDR) and System-on-Chips (SoCs) are also not suitable because of their limited flexibility. Recently dynamically reconfigurable FPGAs have emerged as high performance programmable hardware to execute highly parallel, computationally intensive signal processing functions efficiently. Since...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Feb 2014

    How Data Mining Techniques Can Improve Simulation Studies

    Researchers take years and even decades of observation in order to analyze socio-economic phenomenon. Whereas the Agent-Based Modeling Simulation (ABMS) provides a new issue by offering the possibility to create virtual societies in which individuals and organizations are directly represented with their observed interactions. As it is known simulation generates...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Feb 2014

    On the Problem of Modeling Structured Data with the MinSOD Representative

    The possibility to face pattern recognition problems directly on structured domains (e.g., multimedia data, strings and graphs) is fundamental to the effective solution of many interesting applications. In this paper, the authors deal with a clustering problem defined in the string domain, focusing on the problem of cluster representation in...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jan 2014

    Moving Object Databases-Indexing Algorithms

    In order to effectively use knowledge - one of the most significant elements of the authors' era; it must be managed well and made useful. Until today, classical databases enabled people to share data, reduce unnecessary data and provide data security, etc. more easily. However, they also lacked to use...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jan 2014

    A Comparison of Efficiency of Data Transfer by Using Rsync, Rsync+SSH and Dropbox

    Technology and the Internet are becoming popular. They are widely used in homes and offices through local area networks or wireless local area networks. This paper presents a comparison of data transfer by using three protocols: Rsync, Rsync+SSH and Dropbox on Ubuntu. The efficiency or the speed of the data...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jan 2014

    SaNTEA: Stopwatch Petri Net Based Tool for Embedded Systems Analysis

    In this paper the authors describe the first version of a reliability analysis tool that implements a new version of feared scenarios generation algorithm. SaNTEA (Stopwatch petri Net based Tool for Embedded systems Analysis) allows the representation of the suspension and resumption of task execution and the extraction of feared...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jan 2014

    Data Mining in Semantic Web Data

    Semantic web is popular in a variety of different applications, but research in data mining in semantic web data, appears less. As open source software for data mining in semantic web open source is minimal, and data model of the semantic web requires RDF or OWL format. These specific formats...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jan 2014

    Top-k Ranking with Membership Function for Deductive Database

    The top-k ranking in the queries those are ambiguous. In this paper the authors demonstrate their query answering strategy for ranking world population for deductive data base. The cause of most problems are wrong ranking because some questions have ambiguity such as \"Find the country which have the population between...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jan 2014

    An Effective Preprocessing Method for Web Usage Mining

    Web Usage Mining (WUM) is one of the categories of data mining technique that identifies usage patterns of the web data, so as to perceive and better serve the requirements of the web applications. The working of WUM involves three steps - preprocessing, pattern discovery and analysis. The first step...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jan 2014

    An e-Learning System Based on EGL and Web 2.0

    Aiming at the existing problems of e-learning system application architecture, in the analysis of the relationship between EGL and Web 2.0 technologies, application architecture of e-learning system based on EGL and integrating Web 2.0 technology is proposed in this paper. Through the process of design and implementation of an e-learning...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jan 2014

    Network Simulation: Tasks and Methods of Their Solution

    Simulation of networks is an actual task for different areas of informational technologies. It may be used for network control algorithms evaluation, for software validation, for network performance estimation etc. Task of network simulation is usually reduced to the task of network protocols implementation. Peculiarity of network simulation is that...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jan 2014

    A Survey on Current Underwater Acoustic Sensor Network Applications

    Terrestrial and airborne wireless sensor networks rely on radio frequencies as their communication medium for transmitting data and information. However, sensing and subsequent transmission in sub-sea environment e.g. deep sea exploration requires all together a different approach for communication that has to be done under water. There's no escaping the...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jan 2014

    Visualization of Mapped Security Standards for Analysis and Use Optimisation

    There are many security standards which the company can use. While security standards can differ in purpose and covered area, more than one standard can be used at the same time which leads to overlap and potential conflicts in requirements of different standards. In such cases, deep analysis of used...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jan 2014

    Computational Analysis of Encrypted Database to Provide Confidentiality

    Cloud computing, is network based model used to illustrate a variety of computing concepts that involves a large number of computers connected through a synchronized communicational network such as the Internet. Cloud users demands security to their data which are stored in data repositories of cloud service provider. Thus the...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jan 2014

    Asynchronous 10MS/s 10-Bit SAR ADC for Wireless Network

    In this paper, the authors present a low power asynchronous 10-bit Successive Approximation Register (SAR) ADC implemented in 0.18 CMOS process. The ADC is realized fully differentially with a split capacitor array to lower power cost and improve the speed. To further enhance power efficiency and high speed for a...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jan 2014

    Enhanced Intensive Indexing (I2D) De-Duplication for Space Optimization in Private Cloud Storage Backup

    Cloud storage provide users with abundant storage space and make user friendly for immediate acquiring of data, which is the foundation of all kinds of cloud applications. However, there is a lack of deep studies on how to optimize cloud storage aiming at improvement of data access performance. With the...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jan 2014

    Design of a Non-Overlapping Clock Generator for RFID Transponder EEPROM

    A Non-Overlapping Clock (NOC) generator circuit is designed for the successful operation of High Voltage Generator (HVG) implementation in low-power applications like Radio Frequency IDentification (RFID) tag EEPROM. The NOC generator has been implemented in 0.18 CMOS process. The designed NOC can generate two stable anti-phase clock signals as output,...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jan 2014

    Adapting Distance Based Clustering Concept to a Heterogeneous Network

    The authors propose an improved energy consumption model for a heterogeneous network by adapting an existing distance based clustering concept to it. They assume that if the distance based clustering concept has improved a homogeneous network; the same concept if applied to a heterogeneous network will improve the latter. A...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jan 2014

    A Pricing Policy to Mitigate Interference Management in Femtocell Network

    Recently, the concepts of game theory have attracted the attention of researcher for self-governing decision making to study the performance of wireless network. There has been growing interest in accepting game theoretic method to wireless systems. The problem of interference management in femtocell network is approached from the prospective of...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Dec 2013

    Quad-Core MPSoC Architecture for PID-Based Embedded Control Systems

    Modern embedded control systems require new techniques to fulfill the rapid increase in control requirements and constraints. Multiprocessor systems have been proposed as a promising solution for modern digital control systems. Embedded control systems need to meet hard real-time deadlines, while conducting additional tasks like tuning of control parameters or...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Dec 2013

    Secure Remote Data Processing in Cloud Computing

    Cloud computing provides solutions as a service to meet customers' needs such as massive data storage and a lot of computing resources to process customer data efficiently. To fully utilize such services, data need to be outsourced to Cloud Service Providers (CSPs). However, outsourcing precious data to the CSPs could...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Dec 2013

    Customer Segmentation Using Clustering and Data Mining Techniques

    Clustering technique is critically important step in data mining process. It is a multivariate procedure quite suitable for segmentation applications in the market forecasting and planning research. This paper is a comprehensive report of k-means clustering technique and SPSS tool to develop a real time and online system for a...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Oct 2013

    Modeling and Simulating Network-on-Chip Designs: A Case Study of Fat Tree Interconnection Architecture

    In this paper the authors describe a fat-tree based Network-On-Chip (NOC) system that composed of processing nodes and communication switches. The IP node contains message generator and buffering. The switch uses wormhole technique which improved by virtual channel mechanism. The switch includes the following essential units: the router, input/output link...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Oct 2013

    Comparative Study of High-Speed TCP Variants in Multi-Hop Wireless Networks

    Multi-hop wireless networks have evolved as a key and promising wireless technology for a large variety of applications ranging from home networking to transportation systems, defense and medical systems. Transmission Control Protocol (TCP) is a widely deployed transport protocol and its congestion control mechanisms guarantee reliable delivery of data and...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Aug 2013

    A Bidimensional Poisson Stochastic Process Perspective of the Result Sets Cardinalities in Random Database Queries

    In this paper, the authors present the research which led them to the poisson estimation of the probability distribution of the cardinality of the result set of the approximate join operation. Then, they will approach the distribution of the cardinalities values of the result set of a ε-join operation by...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jun 2013

    Data Mining Using Hierarchical Agglomerative Clustering Algorithm in Distributed Cloud Computing Environment

    Today increase in worldwide business led to offices distributed across geographical location. Hence data are loosely distributed across regionalized large scale databases across regionalized offices. To perform data mining it is required to merge distributed data and perform data mining algorithm on it. Cloud computing poses a diversity of challenges...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jun 2013

    Register File Customization for Embedded Multi-Threaded Pipelined Processors

    Pipelined processor design is an effective solution to exploit instruction-level parallelism. Multi-threading pipelined processor design enables high performance of a single processor core by exploiting both thread-level and instruction-level parallelism. However, when it is applied to embedded systems, it's demanding for large register file, hence high resource overhead and energy...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jun 2013

    An Optimized and Efficient Multi Parametric Scheduling Approach for Multi-Core Systems

    Multi-core processor technologies have become pervasive and mainstream. Several types of multi-core CPUs, including symmetric and asymmetric models, are emerging. A multi-core processor architecture may be defined as: on-chip clusters of heterogeneous functionality modules (processors), cooperating in the implementation of multiple concurrent applications. On these platforms, developing applications that truly...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Apr 2013

    Powering and Cooling of a Server Room Using a Hybrid Trigeneration System

    In this paper the authors analyze the potential of feeding a Server Room through hybrid trigeneration plant supplying electricity and cooling. The system is made up of a solar concentrating collector, combined with a single stage lithium bromide absorber machine. Such a system is able to provide the three energy...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Apr 2013

    An Efficient and Robust Genetic Algorithm for Multiprocessor Task Scheduling

    The general problem of multiprocessor scheduling can be stated as scheduling a task graph onto a multiprocessor system so that schedule length can be optimized. Task scheduling in multiprocessor system is a NP-complete problem. In literature, several heuristic methods have been developed that obtain suboptimal solutions in less than the...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Apr 2013

    Low Power FPGA Implementation of Digital FIR Filter Based on Low Power Multiplexer Base Shift/Add Multiplier

    In this paper, the authors present implementation of a low power and low area digital Finite Impulse Response (FIR) filter. The authors method for reduce dynamic power consumption of a digital FIR filter is use of low power multiplexer based on shift/add multiplier without clock pulse and they applied it...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Apr 2013

    Multi-Level Kick Start Server

    To set up an operating system on hundreds of machines is a daunting task. To automate this process the concept of a kick start server may be used. While this system has its merits it fails in a large scale environment where high performance and availability is required. This paper...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Apr 2013

    ZEF Framework for e-Government Applications: Featuring SOA and BPM Alignment

    A change is a challenge since it is unpredictable and can happen anytime. The enterprise systems have to be responsive to changes. The change will cause alteration in the application and/or existing database if it is not supported by flexible system and adaptable environment. Service Oriented Architecture (SOA) supports a...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Feb 2013

    Mobile Multimedia Development: Flash Mobile Game with MySQL Database

    In this paper the authors describe how to develop a coloring game for children that can be run on a mobile device. There are three steps to develop the coloring game, that are inputting data, playing the game and storing data. The input text with the score of the game...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Apr 2009

    Probability Analysis of Channel Collision Between IEEE 802.15.4 and IEEE 802.11b Using Qualnet Simulation for Various Topologies

    Coexistent heterogeneous wireless networks may interfere with each other and result in significant performance degradation when devices are collocated in the same environment. With the increasingly deployed Wireless Personal Area Network (WPAN) and Wireless Local Area Network (WLAN) devices, channel conflict has become very frequent and severe when one WPAN...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Oct 2012

    Impact of Threats on Vehicular Adhoc Network Security

    A Vehicular Ad-hoc NETwork (VANET) is a new type of ad hoc network that is becoming even more popular than the original ad hoc concept. The structure of a VANET is built on mobile connectivity between car drivers and automobile equipment that informs the drivers about road status or other...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jun 2010

    Read Range of UHF Passive RFID

    This paper is an attempt to find a general expression for the Read Range of UHF passive RFID System for any EIRP or ERP, at a given frequency. This paper presents a generalized derivation to measure the Read Range of UHF RFID. It also presents the experimental results related to...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jun 2009

    Performance Analysis of Wireless Local Area Networks

    In an infrastructure based wireless network, Access Point (AP) is the central authority which controls all the registered nodes and relaying traffic in the network. Even though all traffic is routed through AP, the open nature of the underlying medium is prone to environmental factors, etc. which degrade the performance...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Aug 2009

    Energy Efficiency of Encryption Schemes for Wireless Devices

    Encryption algorithms are known to be computationally intensive. They play a main role in information security systems. On the other side, those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. This paper tries to present a fair comparison between the most common...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Oct 2009

    Analyzing the Energy Consumption of Security Algorithms for Wireless LANs

    Security in wireless networks is of paramount importance. Due to the broadcast nature of the wireless radio signals, wireless networks are implicitly vulnerable to several network attacks. Anyone within the wireless transmission range of a device (including malicious users or attackers) is able to passively listen to or eavesdrop on...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Aug 2009

    Secured Routing Scheme for Adhoc Networks

    A recent trend in Ad Hoc network routing is the reactive on-demand philosophy where routes are established only when required. Most of the protocols in this category are not incorporating proper security features. The ad hoc environment is accessible to both legitimate network users and malicious attackers. It has been...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Oct 2009

    A Novel Method of Fingerprint Classification Using Image Parameters on ANFIS

    Numerous algorithms have been developed to improve the speed of fingerprint recognition and this assumes prime importance when dealing with a large database of fingerprint images. This paper proposes a novel technique of using the image parameters like mean, median, variance, standard deviation and root mean square value to train...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Feb 2010

    Validation Of Temporary Delegation And Revocation Of Roles With UML And OCL

    Organizations having a large number of employees face several difficulties to separate job assignments to individual users. The situation becomes more complex when job assignments are delegated to those users who fulfill some explicit conditions. The delegation models developed so far discuss various issues regarding delegation of roles, but no...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Apr 2009

    Efficient Job Scheduling in Grid Computing With Modified Artificial Fish Swarm Algorithm

    One of the open issues in grid computing is efficient job scheduling. Job scheduling is known to be NP-complete. Therefore, the use of non-heuristics is the de facto approach in order to cope in practice with its difficulty. In this paper, the authors propose a Modified Artificial Fish Swarm Algorithm...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jun 2009

    Intelligent Frame Work for Increasing Life Time of Peer to Peer Networks

    In a peer-to-peer network each computer acts as both a server and a client - supplying and receiving files - with bandwidth and processing distributed among all members of the network. Such a decentralized network uses resources more efficiently than a traditional network and is less vulnerable to systemic failure....

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jun 2009

    DWT-AES Processor for a Reconfigurable Secure Image Coding

    In this paper, the authors proposed a reconfigurable secure image codec based on the Discrete Wavelet Transformation (DWT) and the Advanced Encryption Standard (AES) processor. Either, use of image coding with DWT or encryption using AES is well-known. However, linking these two designs to achieve secure image coding is leading....

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Oct 2009

    Resource Reservation Pricing Pitch for Prioritized Traffic in MANETs and Statistical Verification for Its Hypothetical Measurements

    In this paper, the authors have given pricing pitch for resource reservation about prioritized traffic in MANETs. This scheme is for use of MANETs in commercial production, emergencies, mission critical and broadcasting scenarios where real time transmission requires guaranteed QoS. Some hypothetical measurements are performed on some experimental data and...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Sep 2009

    UML Design for Performance Evaluation of Object Oriented Programs on Dual Core Processors

    In today's scenario, high performance computing is needed to solve the complex scientific problems. In this regards the Multi-core technology is one of the major technologies. Intel's Dual Core processors improve the performance of applications by executing multiple programs at a time. The objective of the present paper is to...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Feb 2010

    Implementation of Routing Security Aspects in AODV

    Security has become a primary concern in order to provide protected communication between mobile nodes in a hostile environment. Unlike the wireline networks, the unique characteristics of mobile ad hoc networks pose a number of nontrivial challenges to security design, such as open peer-to-peer network architecture, shared wireless medium, stringent...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Feb 2010

    Dynamic Route Selection: An Artificial Intelligence Based Approach

    In this paper, the authors have pointed out new trends for efficient routing strategies. Firstly they have introduced the concept of fuzzy rule during path detection. Secondly they have depicted another technique of routing based on application specific operational models. In this paper, they have shown the delivery schemes of...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Feb 2010

    Grid Operating System: Making Dynamic Virtual Services in Organizations

    The structure of a grid system should be such that even a small personal computer can avail the facility of many supercomputers at a time. A grid is formulated by the number of supercomputers are used and participated in the computations. Grid computing has no straightforward way to control and...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Feb 2010

    Image Compression Using New Entropy Coder

    Digital images contain large amount of information that need evolving effective techniques for storing and transmitting the ever increasing volumes of data. Image compression addresses the problem by reducing the amount of data required to represent a digital image. Image compression is achieved by removing data redundancy while preserving information...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Apr 2010

    Performance Analysis of Coexistent Heterogeneous Networks for Various Routing Protocols Using Qualnet Simulation

    As the explosive growth of the ISM band usage continues, there are many scenarios where different systems operate in the same place at the same time. One of growing concerns is the coexistence of wireless systems. In heterogeneous networks, mobility, traffic and node density are main network conditions that significantly...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jun 2010

    An Innovative Approach to Enhance the Security of Data Encryption Scheme

    In this paper, the authors proposed a new scheme to enhance the security of data encryption scheme. With cascading of data encryption standard in three times, they become able to counter the famous meet in middle attack in double and triple data encryption standard. They show how the random key...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jun 2010

    Artificial Intelligence Based Authentication Technique With Three Attributes in Vehicular Ad Hoc Network

    Vehicular Ad Hoc NETwork (VANET) is one of the wireless ad hoc networks which are based on IEEE 802.11 wireless standard enabling vehicle to vehicle and vehicle to roadside communications through air interface. Information (voice, message, data, image etc) are routed in the cells or networks, any node or person...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Jun 2010

    Mutual Authentication Tracking Loop Technique for 3-G Mobile Communications

    Hacking and threats are increasing day by day. Authentication of mobile subscribers and network is an important criterion to the researchers. Now mobile communication system (3-G or advanced) has been developed to speed up the data communication. 3-G mobile communication uses two different switching techniques: circuit switching for voice and...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Aug 2010

    Secured Back Up Routing Protocol for Adhoc Networks

    Adhoc mobile networks are very dynamic, self organizing, self healing distributed networks which support data networking without an infrastructure. The user can use the network services efficiently and securely while moving, by using the proposed protocol. This protocol is used to store secured backup routes from multiple routes available between...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Aug 2010

    A Dynamic Location Management Scheme for Wireless Networks Using Cascaded Correlation Neural Network

    In this paper, the authors propose a novel intelligent technique for reducing the location update and paging cost. This paper focuses on the location management procedure, which is the process that allows the network to identify the exact location of a Mobile Terminal (MT) for a call delivery. Location management...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Aug 2010

    Face Recognition Using Wavelet Based Kernel Locally Discriminating Projection

    Locality Preserving Projection (LPP) aims to preserve the local structure of the image space, while Principal Component Analysis (PCA) aims to preserve the global structure of the image space; LPP is linear, while Isomap, LLE, and Laplacian Eigenmap are nonlinear methods, so they yield maps that are defined only on...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Aug 2010

    CAD Design of Operational Amplifiers With Noise Power Balance for SoC Application

    Advances in integrated circuit technology have led to the birth and proliferation of a wide variety of integrated circuits, including but not limited to Application Specific Integrated Circuits (ASIC), various types of microcontrollers and processors. Many applications such as communication devices (VoIP, MoIP, wireless) require chip speeds that may be...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Aug 2010

    SASMS: Spectrum Allocation Scheme Under Multi-Transceiver Structure in CogMesh Network

    A novel spectrum allocation scheme in a centralized scenario with the support of multi-transceiver structure of CMR (Cognitive Mesh Router) in CogMesh network is proposed. Traditional MR (Mesh Router) in WMN (Wireless Mesh Network) is no longer met the demand of the development of wireless communication in the field of...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Aug 2010

    Sensor Set Selection for Cooperative Spectrum Sensing Based on Confidence Detection

    Recently the radio spectrum is becoming exhausted because of the growing demands for the radio spectrum. In this regard, the paradigm shifts from the conventional exclusive use of frequency resources by the fixed allocation to the dynamic frequency utilization is indispensable for the future wireless networks. Cognitive Radio (CR) can...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Oct 2010

    Quality Metrics Tool for Object Oriented Programming

    Metrics measure certain properties of a software system by mapping them to numbers (or to other symbols) according to well-defined, objective measurement rules. Design Metrics are measurements of the static state of the project's design and also used for assessing the size and in some cases the quality and complexity...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Oct 2010

    Template Based Mole Detection for Face Recognition

    Face recognition is used for personal identification. The Template based Mole Detection for Face Recognition (TBMDFR) algorithm is proposed to verify authentication of a person by detection and validation of prominent moles present in the skin region of a face. Normalized Cross Correlation (NCC) matching, complement of Gaussian template and...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Dec 2010

    Soft Decision Parallel Interference Cancellation for Scrambled/Unscrambled DS-CDMA System

    A soft decision linear parallel interference cancellation for the direct sequence spread spectrum CDMA systems which can accommodate more users (K = N+M >N) than the processing gain of the system is analyzed in this paper. The proposed technique accommodates N users without any mutual interference and a number of...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Dec 2010

    Realization of Threats and Countermeasure in Semantic Web Services

    Semantic Web Services (SWS) are worn by large number of companies as they render products and services to customers and business partners throughout the Internet and corporate extranets. The security necessities for these service providers are of supreme importance. Platform-based security services are provided by operating system. Internet Information Services...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Dec 2010

    State of the Art of Data Dissemination in VANETs

    In VANETs (Vehicular Ad-hoc NETworks), RSUs (Road Side Units) and vehicles disseminate safety and non safety messages. The aim of VANETs is to enable dissemination of traffic information and road conditions as detected by independently moving vehicles. For VANETs applications, it is important to disseminate data from an information source...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Apr 2012

    Extended Balanced Space-Time Block Coding: Full Rate Full Diversity Wireless Multicasting

    Multicasting is a spectrally efficient method of supporting group communication by allowing transmission of packets to multiple destinations using fewer resources. To incorporate Multi-Input Multi-Output diversity, Extended Balanced Space-Time Block Codes (EBSTBCs) have been proposed providing full diversity when one or more feedback bits are sent back via feedback channel....

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Apr 2012

    A Personalized Product Based Recommendation System Using Web Usage Mining and Semantic Web

    To be globally competent and competitive a successful presence on the web is necessary to sustain and retain itself in the market. The WWW is an interesting area for data mining because of abundance of information. Web users exhibit a variety of navigational interests through clicking a sequence of web...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Apr 2012

    Security Issues in Smart Card Authentication Scheme

    To secure information from unauthorized access, various authentication schemes have been deployed. Among these, password based authentication schemes using smart card are widely used for various applications such as remote user login, online banking, ID verification, access control and e-commerce. It provides mutual authentication between user and server. This paper...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Apr 2012

    Performance Comparison of RAPID, Epidemic and Prophet Routing Protocols for Delay Tolerant Networks

    These opportunistic networks or DTN are the class of networks where the nodes do not have contemporaneous connections, but intermittent connections. In DTN, the main characteristic of packet delivery is large end-to-end path latency and a DTN routing protocols has to cope with frequent disconnections. The lifetime of packet would...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Aug 2012

    A Rule Framework for Automatic Generation of Web Forms

    This paper proposes the use of common sense rules and domain specific rules rulebases using Reaction RuleML format in conjunction with database metadata rule that can be used to support the development of automated web forms. Database metadata can be extracted from system catalogue tables in typical relational database systems...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Aug 2012

    The Rain Attenuation on Real-Time Video Streaming Via Satellite Links

    Now-a-days the application of multimedia networks is rapidly growing due to the high demand for the real-time video transmission. The live video streaming via satellite is an ideal solution for people who want to share an event with others who cannot be there in person. However, the video transmission via...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)

  • White Papers // Aug 2012

    Designs of Access Mechanisms in IEEE 802.16e Mobile Systems

    In this paper, the authors first propose a call admission control algorithm for IEEE 802.16e mobile WiMAX system. They then design the handover mechanism according to the general handover procedure specified by the IEEE 802.16e-2005 standard. Performance evaluations via simulations are conducted to compare the system performance for the network...

    Provided By International Journal of Computer Theory and Engineering (IJCTE)