International Journal of Computing Technology and Information Security

Displaying 1-16 of 16 results

  • White Papers // Dec 2011

    Efficient Parsing Methods for NLP Applications and Augmenting Generic Computer Language Design

    Parsing is a major activity of all Natural Language Processing (NLP) systems. Different strategies of parsing are used according to the NLP application in hand. A broad classification of parsers is due to two types mainly used. They are "Top-down" and "Bottom-up" methods, of which Bottom-up is the choice of...

    Provided By International Journal of Computing Technology and Information Security

  • White Papers // Dec 2011

    A Simplified Approach for IT Learning

    This paper presents the experiments and makes a research on combining 3D animation with Sound material for effective learning of Information Technology subject among the adult learners between the ages 20 to 30. This paper proposes to make use of Autodesk 3D Studio Max animation software technologies to learn IT...

    Provided By International Journal of Computing Technology and Information Security

  • White Papers // Dec 2011

    A Comprehensive Review on Network Security

    Internet network security is both fascinating and complex. Network security measures are needed to protect the data during their transmission. This paper briefly reviews some of the methods and applications of security systems. Security is one of the interesting research areas in Computer Networks. It has received a tremendous amount...

    Provided By International Journal of Computing Technology and Information Security

  • White Papers // Dec 2011

    Enhanced Selective Encryption Algorithm for Wireless Ad Hoc Networks

    This paper is to implement the concept of selective encryption algorithm for wireless ad hoc network with the Quadrature Mirror Filters and Lossless compression Techniques. First Section presents the principles of Selective encryption algorithm such as Toss-A-coin selective encryption algorithm and Probabilistic selective encryption algorithm. In a Toss-A - coin...

    Provided By International Journal of Computing Technology and Information Security

  • White Papers // Dec 2011

    An Effective Analysis of Object Oriented Metrics in Software Quality

    Successful Software is one which should have good quality. Certain set of software quality metric must be defined and follow to develop good quality software. The metrics for object oriented design focus on measurements that are applied to the class and design characteristics. Various flaws and inconsistencies have been observed...

    Provided By International Journal of Computing Technology and Information Security

  • White Papers // Dec 2011

    Bio-Metrics: Hearty Welcome to Authorized Users

    Biometrics identify Human's genuine identity with the help of individual anatomy or Physiology, some kind of special skill of an individual, some behavioral or the combination of both. But in recent technologies saw the emergence of biometrics using the heart beat of an individual to identify the person and enable...

    Provided By International Journal of Computing Technology and Information Security

  • White Papers // Dec 2011

    Designing the Conceptual Model of a Data Warehouse Using UML

    A Data Warehouse (DW) is an integrated and time varying collection of data derived from operational data and primarily used in strategic decision making by means of On-Line Analytical Processing (OLAP) tools. Data warehousing and OLAP technologies are now considered mature. Current research has lead to new developments in all...

    Provided By International Journal of Computing Technology and Information Security

  • White Papers // Dec 2011

    Face Recognition Using Passion Back Propagation Neural Networks

    Face recognition is a task of automatically identifying or verifying a person from a stored image. Even though a number of techniques have been developed for recognizing human faces, none of them considered the way how human classify faces. This paper presents a novel approach for face recognition, which classifies...

    Provided By International Journal of Computing Technology and Information Security

  • White Papers // Mar 2011

    Cloud-Based Greener and Smarter Service Environments

    Now-a-days ICT has strongly seeped into homes and buildings. That is, building and sustaining automated, aware, adaptive, and active homes and buildings have been gaining immense momentum with the faster emergence and evolution of home and building automation and integration technologies, infrastructures, devices, services, and processes. The prevailing trend is...

    Provided By International Journal of Computing Technology and Information Security

  • White Papers // Mar 2011

    Advanced Testable Architecture for Distributed Services

    The development of distributed systems and applications is a complex activity with a large number of quality factors involved in defining success. Despite the fact that inductive modeling is scientifically thorough for analyzing and building quality engineered systems, it brings additional cost into the development life cycle. Hence, a development...

    Provided By International Journal of Computing Technology and Information Security

  • White Papers // Mar 2011

    AIMM-I46: Addressing, Inter-Mobility and Interoperability Between IPv4 and IPv6 Networks

    Mobility is becoming ubiquitous now-a-days; there have been tremendous advances in the next generation mobile communication systems recently, thereby, engendering the need to support all the advancements arising from new theories, algorithms, architectures, standards and protocols. Mobility management has been a growing concern in IPv6 with numerous problems originating from...

    Provided By International Journal of Computing Technology and Information Security

  • White Papers // Mar 2011

    Secure and Effective Humanitarian Access Using Fingerprint

    Biometric based applications guarantee for resolving numerous security hazards. One among them, fingerprint recognition is most popular and successful method used for user identification. There are numerous methods available for person verification such as PIN/password, smart cards and so on. However, this knowledge based, token based security methods have crucial...

    Provided By International Journal of Computing Technology and Information Security

  • White Papers // Mar 2011

    Adopting Cloud Computing for Distributed Auto Synchronized POS Applications

    The POS applications can be either as online or offline model. The POS online application requires moderate or high rate data connectivity to provide the services for the users. However, when the POS terminal sends a request to centralized corporate database over online model, it takes some time to complete...

    Provided By International Journal of Computing Technology and Information Security

  • White Papers // Mar 2011

    Detection and Classification of Network Intrusion Using ILACR

    The frequent changes in network environments, managing and updating the rule-based system has become a very challenging task for the administrator. Usually, rule-based systems work to make sense of a huge amount of alerts generated by the Intrusion Detection Systems (IDSs) every minute. Intrusion detection faces a number of challenges;...

    Provided By International Journal of Computing Technology and Information Security

  • White Papers // Mar 2011

    Intelligent Layer for the Design of Software Architectures

    Despite recent developments there are still many challenges in the application of intelligent control systems, as intelligent decision-making providers are constructing many software architectures which are required in many applications particularly in service-oriented computing. In this paper, the authors are particularly interested with the use of intelligent decision making mechanisms...

    Provided By International Journal of Computing Technology and Information Security

  • White Papers // Mar 2011

    A New Approach on Secure Mobile Banking Using Public Key Infrastructure

    The developments in mobile commerce applications make a revolutionary change in the banking services offering anytime, anywhere banking. Mobile phones become a part in the life of a common man. Today, with the technological advancements in mobile communication and internet, the common man's day-to-day requirements are met at his door...

    Provided By International Journal of Computing Technology and Information Security

  • White Papers // Dec 2011

    Bio-Metrics: Hearty Welcome to Authorized Users

    Biometrics identify Human's genuine identity with the help of individual anatomy or Physiology, some kind of special skill of an individual, some behavioral or the combination of both. But in recent technologies saw the emergence of biometrics using the heart beat of an individual to identify the person and enable...

    Provided By International Journal of Computing Technology and Information Security

  • White Papers // Dec 2011

    Designing the Conceptual Model of a Data Warehouse Using UML

    A Data Warehouse (DW) is an integrated and time varying collection of data derived from operational data and primarily used in strategic decision making by means of On-Line Analytical Processing (OLAP) tools. Data warehousing and OLAP technologies are now considered mature. Current research has lead to new developments in all...

    Provided By International Journal of Computing Technology and Information Security

  • White Papers // Dec 2011

    Face Recognition Using Passion Back Propagation Neural Networks

    Face recognition is a task of automatically identifying or verifying a person from a stored image. Even though a number of techniques have been developed for recognizing human faces, none of them considered the way how human classify faces. This paper presents a novel approach for face recognition, which classifies...

    Provided By International Journal of Computing Technology and Information Security

  • White Papers // Mar 2011

    Cloud-Based Greener and Smarter Service Environments

    Now-a-days ICT has strongly seeped into homes and buildings. That is, building and sustaining automated, aware, adaptive, and active homes and buildings have been gaining immense momentum with the faster emergence and evolution of home and building automation and integration technologies, infrastructures, devices, services, and processes. The prevailing trend is...

    Provided By International Journal of Computing Technology and Information Security

  • White Papers // Mar 2011

    Advanced Testable Architecture for Distributed Services

    The development of distributed systems and applications is a complex activity with a large number of quality factors involved in defining success. Despite the fact that inductive modeling is scientifically thorough for analyzing and building quality engineered systems, it brings additional cost into the development life cycle. Hence, a development...

    Provided By International Journal of Computing Technology and Information Security

  • White Papers // Mar 2011

    AIMM-I46: Addressing, Inter-Mobility and Interoperability Between IPv4 and IPv6 Networks

    Mobility is becoming ubiquitous now-a-days; there have been tremendous advances in the next generation mobile communication systems recently, thereby, engendering the need to support all the advancements arising from new theories, algorithms, architectures, standards and protocols. Mobility management has been a growing concern in IPv6 with numerous problems originating from...

    Provided By International Journal of Computing Technology and Information Security

  • White Papers // Mar 2011

    Secure and Effective Humanitarian Access Using Fingerprint

    Biometric based applications guarantee for resolving numerous security hazards. One among them, fingerprint recognition is most popular and successful method used for user identification. There are numerous methods available for person verification such as PIN/password, smart cards and so on. However, this knowledge based, token based security methods have crucial...

    Provided By International Journal of Computing Technology and Information Security

  • White Papers // Mar 2011

    Adopting Cloud Computing for Distributed Auto Synchronized POS Applications

    The POS applications can be either as online or offline model. The POS online application requires moderate or high rate data connectivity to provide the services for the users. However, when the POS terminal sends a request to centralized corporate database over online model, it takes some time to complete...

    Provided By International Journal of Computing Technology and Information Security

  • White Papers // Mar 2011

    Detection and Classification of Network Intrusion Using ILACR

    The frequent changes in network environments, managing and updating the rule-based system has become a very challenging task for the administrator. Usually, rule-based systems work to make sense of a huge amount of alerts generated by the Intrusion Detection Systems (IDSs) every minute. Intrusion detection faces a number of challenges;...

    Provided By International Journal of Computing Technology and Information Security

  • White Papers // Mar 2011

    Intelligent Layer for the Design of Software Architectures

    Despite recent developments there are still many challenges in the application of intelligent control systems, as intelligent decision-making providers are constructing many software architectures which are required in many applications particularly in service-oriented computing. In this paper, the authors are particularly interested with the use of intelligent decision making mechanisms...

    Provided By International Journal of Computing Technology and Information Security

  • White Papers // Mar 2011

    A New Approach on Secure Mobile Banking Using Public Key Infrastructure

    The developments in mobile commerce applications make a revolutionary change in the banking services offering anytime, anywhere banking. Mobile phones become a part in the life of a common man. Today, with the technological advancements in mobile communication and internet, the common man's day-to-day requirements are met at his door...

    Provided By International Journal of Computing Technology and Information Security

  • White Papers // Dec 2011

    Efficient Parsing Methods for NLP Applications and Augmenting Generic Computer Language Design

    Parsing is a major activity of all Natural Language Processing (NLP) systems. Different strategies of parsing are used according to the NLP application in hand. A broad classification of parsers is due to two types mainly used. They are "Top-down" and "Bottom-up" methods, of which Bottom-up is the choice of...

    Provided By International Journal of Computing Technology and Information Security

  • White Papers // Dec 2011

    A Simplified Approach for IT Learning

    This paper presents the experiments and makes a research on combining 3D animation with Sound material for effective learning of Information Technology subject among the adult learners between the ages 20 to 30. This paper proposes to make use of Autodesk 3D Studio Max animation software technologies to learn IT...

    Provided By International Journal of Computing Technology and Information Security

  • White Papers // Dec 2011

    A Comprehensive Review on Network Security

    Internet network security is both fascinating and complex. Network security measures are needed to protect the data during their transmission. This paper briefly reviews some of the methods and applications of security systems. Security is one of the interesting research areas in Computer Networks. It has received a tremendous amount...

    Provided By International Journal of Computing Technology and Information Security

  • White Papers // Dec 2011

    Enhanced Selective Encryption Algorithm for Wireless Ad Hoc Networks

    This paper is to implement the concept of selective encryption algorithm for wireless ad hoc network with the Quadrature Mirror Filters and Lossless compression Techniques. First Section presents the principles of Selective encryption algorithm such as Toss-A-coin selective encryption algorithm and Probabilistic selective encryption algorithm. In a Toss-A - coin...

    Provided By International Journal of Computing Technology and Information Security

  • White Papers // Dec 2011

    An Effective Analysis of Object Oriented Metrics in Software Quality

    Successful Software is one which should have good quality. Certain set of software quality metric must be defined and follow to develop good quality software. The metrics for object oriented design focus on measurements that are applied to the class and design characteristics. Various flaws and inconsistencies have been observed...

    Provided By International Journal of Computing Technology and Information Security