JATIT

Displaying 1-40 of 198 results

  • White Papers // May 2013

    IP Multimedia Subsystem: Security Evaluation

    The IMS (IP Multimedia Subsystem) as network controller includes effective mechanisms for new services, regardless of the access technology. The network regroups all existing access IP-based technologies that unify access and minimize costs of service deployment. However, such architecture poses significant security challenges at network access and services providing. Indeed,...

    Provided By JATIT

  • White Papers // May 2013

    Scheduling Research Based on Genetic Algorithm and Qos Constraints of Cloud Computing Resources

    Cloud computing is a new business model based on Internet and aims to provide information service for users. Resource scheduling is one of the key technologies of Cloud Computing. Analyzing the representative achievement of cloud computing resources scheduling, and then according to the problem that there are large gap between...

    Provided By JATIT

  • White Papers // Apr 2013

    Monitor System Based on GSM Short Message for Unmanned Computer Room

    Based on the limitation of the traditional alarming system, the authors propose a monitor system based on GSM short message for unmanned computer room. Firstly, they design the monitor system structure. Secondly, they combine the dynamic and static information and proposed an information Publish-Subscribe platform. Finally, this platform supports message...

    Provided By JATIT

  • White Papers // Apr 2013

    Lossless Network Compression Based on Topology Potential Community Discovery

    research of lossless network compression is carried out. To meet the different needs, two approaches of lossless network compression are proposed in this research. One approach, judging importance of the nodes according to their roles playing in the community composition, quantifies the importance of every node in communities, and achieves...

    Provided By JATIT

  • White Papers // Apr 2013

    Research on Security Issues and Solutions of IEC 61850 Communication Protocol Architecture

    IEC 61850 Communication Protocol Architecture is widely used in China's electricity system for communication between the substation automatic systems. Due to the lacking of corresponding security specification, the standards cannot guarantee the confidentiality, integrity as well as authentication in communication. This paper proposes a solution for this problem. The improved...

    Provided By JATIT

  • White Papers // Apr 2013

    Algorithm on Embedded Fingerprint Identification System

    Fingerprint identification technology is a kind of important biological identity recognition technology; it is also the most mature branch of biological recognition technology development. Comparing with other biometric identification technology, fingerprint identification technology has high efficiency, low cost, convenient collection etc advantages. Now the development of the fingerprint recognition system...

    Provided By JATIT

  • White Papers // Apr 2013

    Analysis of ICSGD and OSSDL Localization Algorithms in WSN

    In the authors' papers before, two three-dimensional localization schemes which are called Iterative Calculation of Secondary Grid Division localization scheme (ICSGD) and a range free Three Dimensional Optimum Space Step Distance Localization scheme (3D-OSSDL) are proposed respectively. In ICSGDLS scheme, forty beacon nodes and five hundred unknown sensor nodes were...

    Provided By JATIT

  • White Papers // Apr 2013

    Dynamic Group Signature Scheme Based on Non-Interactive Proof

    Combined with identity-based signature technology and non-interactive proof, a dynamic group signature scheme was built based on the standard group scheme model. This scheme overcame the shortcoming of static property of standard scheme and was of strong Non-frameability. New members could dynamically join in group without updating the group public...

    Provided By JATIT

  • White Papers // Apr 2013

    An Efficient Protocol for Restricted Adaptive Oblivious Transfer

    Restricted adaptive oblivious transfer was introduced by Herranz in 2011, which is the main approach to protect user privacy in e-transactions involving operations on digital confidential data or sensitive information. There are many practical applications for restricted adaptive oblivious transfer, such as medical or financial data access, pay-per-view TV, and...

    Provided By JATIT

  • White Papers // Apr 2013

    A Clustering Technique Based on Energy Balancing Algorithm for Routing in Wireless Sensor Networks

    A Wireless Sensor Network (WSN) is a collection of large number of tiny sensor nodes deployed in a field to survey the surroundings phenomena. Since, energy consumption is the crucial challenge in those networks, exploiting judiciously the energy reserve of nodes is the key for designing protocols. Distributing the energy...

    Provided By JATIT

  • White Papers // Apr 2013

    VOIP Applications Over Manet: Codec Performance Enhancement by Tuning Routing Protocol Parameters

    Voice over Internet Protocol (VoIP) may provide good services through Mobile Ad hoc Networks (MANets) platform. It may cover many application scenarios range from safety to comfort related services. However, these networks introduce many challenges for supporting voice with QoS requirements. In this paper, the authors take the first step...

    Provided By JATIT

  • White Papers // Apr 2013

    Business Intelligence Architecture Based on Internet of Things

    On the basis of the analysis of the operating characteristics of new intelligent network - Internet of things, the paper holds that the combination of the Internet of things and cloud computing is the design to cope with massive data in the future. The core of business intelligence lies in...

    Provided By JATIT

  • White Papers // Apr 2013

    A Network Control System for Scene Adaptive Semiconductor Lighting

    This paper presents a design for intelligent control system of scene adaptive semiconductor lighting. The new design contains the host computer and the terminal in a control network. The lighting effect patterns are edited by the software on the host computer, then the lighting scene data is transported to the...

    Provided By JATIT

  • White Papers // Apr 2013

    An Improved Fair Guard Band Allocation Scheme in Cognitive Networks

    In this paper, an improved fair dynamic channel algorithm allocation based on guard band scheme is presented. The adoption of the channel strategy in wireless communication has been ensuring the normal communication of important systems, such as coal mine wireless emergency support entity. But future study shows that the secondary...

    Provided By JATIT

  • White Papers // Apr 2013

    Research on a Heuristic Searching Algorithm for Energy-Aware Routing in Wireless Sensor Networks

    Because cluster-head nodes in wireless sensor networks may be far away from the base station, or there exists many obstacles in deployment environments of wireless sensor networks to affect the data transmission performance, they would consume excessive energy in the process of the massive data transmission, which may lead to...

    Provided By JATIT

  • White Papers // Apr 2013

    Maximal Profit Service Task Partition and Allocation in Computer Grid Considering Service Reliability and Security

    The paper considers grid computing systems in which the Resource Management Systems (RMS) divides a service tasks into Execution Blocks (EBs) and sends these blocks to different available resources. The service cost comprises the task execution cost, communication cost and security measures cost and depends on the resources assigned to...

    Provided By JATIT

  • White Papers // Mar 2013

    Low Energy Mapping Technique for Hierarchical Network-on-Chip

    Intellectual Property (IP) core-to-node mapping is an important but intractable optimization problem in Network-on-Chip (NoC) application design. In this paper, the authors present an approach to map cores onto hierarchical NoC architecture which consists of two levels. The top-level interconnection network is realized by a 2D mesh of communicating routers,...

    Provided By JATIT

  • White Papers // Jan 2013

    Narrow Band Interference Mitigation in DS-UWB Systems Using the Wavelet Transform and FFT

    Because of its importance, DS-UWB communication is an open research area, particularly in the context of its coexistence with OFDM based systems. In this paper, the authors present an analysis of the effect of the Narrow Band Interference of OFDM WLAN 802.11a systems, on the performance of BPSK-DS -UWB in...

    Provided By JATIT

  • White Papers // Jan 2013

    Web Service Description Framework and Selection Mechanism Towards Balanced Perceptions of FQOS and QOS

    With the growing expansion of web services resources on the internet, more and more users come to appreciate the difficulty of searching self-gratification information from the mass information. This paper analyzes functional attributes and un-functional attributes of Web service resources, builds the mapping relationship between FQoS and QoS, and defines...

    Provided By JATIT

  • White Papers // Dec 2012

    A Ca Model of Culture Information Dissemination in the Network Era and the Simulation of Its Dynamic Character

    Through analyzing the characteristics of the culture information dissemination of the network era, the complex network theory is used to study it deeply. It shows that the process of network information dissemination has typical network topology structure. The kind of network structure has both small world and scale-free features, and...

    Provided By JATIT

  • White Papers // Dec 2012

    A Dynamic Customizable Architecture for SaaS Based Platform

    The characteristics of multi associations business coordination among the enterprises in industry chain is firstly analyzed, and the demand of customizable business of SaaS (Software as a Service) based platform supporting the industry chain coordination (in brief, PLATFORM) is intensively analyzed. Based on these, customizable business-oriented PLATFORM architecture based on...

    Provided By JATIT

  • White Papers // Dec 2012

    Multi-Beam Antenna-Based Topology Control Algorithm in Ad Hoc Networks

    Multi-beam antenna is drawing attention due to its power-saving and interference-reducing. A topology control algorithm K-DRNG based on multi-beam antenna in heterogeneous wireless ad hoc network is proposed. The algorithm is mainly composed of three phases. In the stage of information collection, each node collects information of neighborhood by adjusting...

    Provided By JATIT

  • White Papers // Dec 2012

    A Wireless Sensor Network Routing Algorithm Based on Ant Colony Algorithm

    In this paper, the authors proposed one kind based on the ant colony algorithm routing algorithm in wireless sensor networks. According to the election of cluster head node energy, and the use of ant colony algorithm is simple and easy to implement, support for multiple path characteristics, through the adjacent...

    Provided By JATIT

  • White Papers // Dec 2012

    Analysis of Security Mechanism in Wireless Campus Network

    With the rising number of schools going to built wireless campus networks, the current wireless campus networks cannot protect from increasing illegal network intrusion. This paper presented an improved security mechanism for wireless campus networks. It is based on the analysis of the shortages of current for security mechanism for...

    Provided By JATIT

  • White Papers // Dec 2012

    An Improved Alamouti Strategy With Energy-Efficiency in Wireless Sensor Networks

    Sensor nodes usually operate on small batteries with restricted sources of energy in the Wireless Sensor Networks (WSNs). Energy efficiency is one of the most critical concerns for it. Clustered topology schedule is important method of saving energy with some advantages of managing conveniently, using the energy efficiently, and fusing...

    Provided By JATIT

  • White Papers // Dec 2012

    Successive Interference Cancellation Decoding for the K -User Cyclic Interference Channel

    The K -user cyclic interference channel can model one scenario in vehicular networks, where all the base stations are arranged along a highway. The k th user is interfered only by the ((k +1) mod K) th user in the K -user cyclic interference channel. The Han-Kobayashi scheme based rate...

    Provided By JATIT

  • White Papers // Dec 2012

    Advanced Passive Clustering-Threshold a Maintenance Mechanism of the Cluster Structure

    A Wireless Sensor Network (WSN) is a set of nodes communicating through wireless links to observe a given phenomenon. Wireless sensor network is deployed over a geographical area to collect information in hostile environments. The capacity of sensors is limited by the lifetime of their batteries, so the energy is...

    Provided By JATIT

  • White Papers // Dec 2012

    A Development Model for Domain-Oriented Information Service Based on Cloud Computing Infrastructure

    For the diversity of users demand for information services in converged network environment, a solution was proposed with the combination of cloud computing technology and domain engineering, in which three stages starting from the domain engineering include service-oriented domain analysis and modeling, domain architecture design based on cloud computing infrastructure...

    Provided By JATIT

  • White Papers // Dec 2012

    Profit-Driven Dynamic Spectrum Allocation in Wireless Networks

    At present, dynamic spectrum allocation methods in wireless networks can meet the spectrum resource allocation requirements within a certain rang. They are mainly based on the change of the spectrum resources in terms of time and geographical distribution. Relatively speaking, these allocation methods to make efficient use of spectrum resources...

    Provided By JATIT

  • White Papers // Dec 2012

    Mobile Robot-Based Virtual V-Blast MIMO Transmission Scheme in Distributed Wireless Sensor Networks

    Aiming at the requirements of high-speed data transmission and low energy consumption in energy constrained Wireless Sensor Networks (WSNs), a mobile robot-based virtual V-BLAST cooperative MIMO transmission scheme and an efficient approximate Maximum Likelihood (ML) detection algorithm are proposed in this paper. Mobility of robot can reduce the communication distance...

    Provided By JATIT

  • White Papers // Dec 2012

    Joint Time and Location Mobility Prediction Algorithm for Heterogeneous Wireless Networks

    Mobility prediction algorithm is the significant aspect to improve QoS (Quality of Service) for heterogeneous wireless networks because it can accurately predict user' s trajectory, decrease handoff latency and preserve resources in arriving cell for user. Considering inaccurate description of existing mobility prediction algorithms for mobile user's location in heterogeneous...

    Provided By JATIT

  • White Papers // Dec 2012

    Throughput Optimization for MIMO Systems Based on Cross-Layer Design

    Based on cross-layer design, an optimization method was proposed, which combined the adaptive modulation and coding with symbol rate at the physical layer, and the packet size and sub-packet number at the data link layer. The parameters were jointly optimized to maximize the MIMO system throughput in the Rayleigh fading...

    Provided By JATIT

  • White Papers // Dec 2012

    An Evaluation Optimization Approach of IaaS Resource Distribution Based on Genetic Algorithm

    In cloud computing, IaaS (Infrastructure as a Service) is the foundation of cloud service applications. It enables problems like resource allocation scheduling and bearing capacity to be further optimally solved. Therefore, a genetic optimized IaaS resource optimization evaluation approach is presented. This approach abstractly defines its 7 factors (properties) including...

    Provided By JATIT

  • White Papers // Dec 2012

    A Dynamic Data Fusion Method and Its Application

    Data fusion involves multi-sources or multi-presentations of a single source to perform inferences which are more comprehensive and accurate than those of any single method. Thus, data fusion makes it possible to create a synergistic process in which the consolidation of individual data creates a combined resource with a productive...

    Provided By JATIT

  • White Papers // Dec 2012

    Isolated Distributed Architecture for Cloud-Storage Services Based on Structured Strategy

    Cloud Security threats have greatly hindered the development of Cloud Computing and the promotion of cloud application, so how to protect the data stored in the cloud is not only the core issue of security, but also the biggest challenge of development. As these problems above, a trust-control architecture based...

    Provided By JATIT

  • White Papers // Dec 2012

    An ID-Based Multi-Receiver Signcryption Scheme in MANET

    In Mobile ad hoc network (Manet), to solve the problems of the message receiver privacy exposure and signcryption (decryption) unfairness in existing signcryption schemes, a new ID- based multi-receiver signcryption scheme based on bilinear pairings is proposed. The authors also analyzed its security and efficiency. The result shows that the...

    Provided By JATIT

  • White Papers // Dec 2012

    An Improved Information Hiding Algorithm

    Hiding technology is a newly developed discipline that concludes many subjects and covers many fields, and it hides the transferring information in the carrier, which greatly increases the safety of information transmission. In order to hide and transfer information more effectively, the paper researched the cloud algorithm in the model...

    Provided By JATIT

  • White Papers // Dec 2012

    A Multi-Hop Routing Scheme Based on Different Spatial Density of Nodes in WSNS

    In this paper, the operating principle of SEP in Wireless Sensor Networks (WSNs) is analyzed, and a Multi-Hop Routing Scheme (MH-SEP) is proposed based on different spatial density of nodes. The network is to be divided into different sizes of areas according to the multi-hop routing scheme, the cluster heads...

    Provided By JATIT

  • White Papers // Dec 2012

    Energy-Saving Model on Distributed Random Nodes in Wireless Sensor Networks

    The purpose of the authors' study is to try to extend the life of the sensor network, without affecting the uses functions in wireless sensor networks. As their method reduces the amount of data communications and reduces the energy consumption of wireless sensor networks significantly, the compression problem in the...

    Provided By JATIT

  • White Papers // Dec 2012

    A Real-Time Information Oriented Service-Aware Routing Algorithm

    The mobile nodes perceive the real-time routing information of different sections, and analyze the reliability of the movement direction of nodes, data exchange, and transmission delay and path failure. By combining movement direction, speed and locations, the routing path is adaptively updated according to the network states of the sections...

    Provided By JATIT

  • White Papers // Mar 2011

    Wireless Sensor Network Simulation of the Energy Consumption by a Multi Agents System

    A Wireless Sensor Network (WSN) is one that is in continual interaction with its environment, and executes at a pace determined by that environment. The use of rigorous formal method in specification and validation can help designers to limit the introduction of potentially faulty components during the construction of the...

    Provided By JATIT

  • White Papers // Mar 2011

    Mining Techniques in Health Care: A Survey of Immunization

    Data mining has been used intensively and broadly by several organizations. The applications can greatly benefit all parties involved in the healthcare industry. The healthcare background is generally supposed as being information more yet knowledge less. There is a affluence of information obtainable within the healthcare systems. However, there is...

    Provided By JATIT

  • White Papers // Mar 2011

    Classification of Herbal Gardens in India Using Data Mining

    Medicinal plants are nature's wonderful gift to the mankind. The relationship between the human beings and the plants is as old as the history of the mankind itself. Since time immemorial, human beings have been utilizing plants for basic curative health care. The use of plants as a source of...

    Provided By JATIT

  • White Papers // Apr 2011

    Efficient Method for Securely Managing Passwords

    A password is a secret string that is used for security and authentication purposes and to provide access to a resource. Therefore it is more vulnerable to attacks such as hacking, phishing, identity theft, Cyber stalking and website cloning. But it is difficult for humans to remember large no of...

    Provided By JATIT

  • White Papers // Apr 2011

    Actionable Filtering Themes in Executive Information Systems for Managing Information Overload

    Executives are subjected to relentless onslaught of information. Many strategies have been suggested in the past to negotiate the torrents of information flows confronting executives. This paper recommends modifying the structure of information flows reaching the executives as an effective strategy to manage information overload. Such a strategy will enhance...

    Provided By JATIT

  • White Papers // Apr 2011

    Designing and Implementation of Electronic Payment Gateway for Developing Countries

    In this paper a brief overview of electronic payment gateway is provided. This paper addresses the requirements for an electronic payment gateway from both the customers' and the merchants' point of view. Most of the population doesn't trust on the local existing online payment gateway because it is not very...

    Provided By JATIT

  • White Papers // Apr 2011

    Uniplanar Quasi Yagi Antenna for Channel Measurements at X Band

    Uniplanar quasi yagi antenna has gained considerable attention recently as a method of producing a broad bandwidth antenna array with a well defined end-fire radiation pattern. An important advantage of the novel quasi-yagi antenna designed in x-band is its ability to be scaled linearly to any frequency band. This paper...

    Provided By JATIT

  • White Papers // Apr 2011

    Performance Evaluation of Microstrip Square Patch Antenna on Different Substrate Materials

    The demand of small size electronic systems has been increasing for several decades. The physical size of systems is reduced due to advancements in integrated circuits. With reduction in size of electronic systems, there is also an increasing demand of small and low cost antennas. Patch antennas are one of...

    Provided By JATIT

  • White Papers // Apr 2011

    An Implementation of ODBC Web Service

    Web applications built using .NET technologies usually access relational databases via ODBC API. This requires a database system specific ODBC driver to be installed on the application side. On the other hand, a paradigm shift is taking place in web application architectures. Future web applications will be built around Service-Oriented...

    Provided By JATIT

  • White Papers // Apr 2011

    The Directs Impact to Pre-Filtering Process to Weather Dataset

    Monitoring through of data near real-time (dynamic data), in this paper, the authors address the issue of efficiently monitoring the satisfaction of sequential process to receive on the way to data storage. The research question then they is answer is how is it possible to monitor and efficiently fulfill the...

    Provided By JATIT

  • White Papers // Apr 2011

    Single Repository for Software Component Selection (SRSCS): A Reusable Software Component Selection Technique

    This paper contributes a novel approach for selection of reusable components based on Functional Requirements using SRSCS (Single Repository for Software Component Selection) mechanism. Different repositories are available for reusable components and to select the best qualifying component from those repositories, customers must visit all those one by one and...

    Provided By JATIT

  • White Papers // Apr 2011

    Performance Evaluation of Page Removal Policies

    Web caching is an important technique to scale the Internet. One important performance factor of Web caches is the page replacement policies. Due to specific characteristics of the World Wide Web, there exist a huge number of proposals for cache replacement. Furthermore, the paper discusses the importance of cache replacement...

    Provided By JATIT

  • White Papers // Apr 2011

    Integrating ICT With Education: Designing an Educational Computer Game for Teaching Functions in Undergraduate Mathematics

    This paper seeks to look into the design process that promotes the development of an educational computer game that supports teaching and learning processes. The paper specifically looks at the design of an educational computer game for teaching and learning of the topic of functions. The topic is essential in...

    Provided By JATIT

  • White Papers // Apr 2011

    Recent Trust Models in Grid

    A grid is a framework providing services to access and manage distributed hardware and software resources. A thorough authentication is required before any requested access or operation is allowed on any resource of the grid. In particular, much risk is involved when the grid is used for e-commerce where it...

    Provided By JATIT

  • White Papers // Mar 2011

    Parallel Matrix Multiplication Implementation in Distributed Environment Through RMI

    This paper proposes to solve the parallel matrix multiplication implementation in a distributed environment through RMI based on JAVA threads. The application distributes the products of rows and columns on different machines. One server and two clients are run to find the product of matrix multiplication. The server distributes the...

    Provided By JATIT

  • White Papers // Mar 2011

    Increasing Information Security Inside Organizations Through Awareness Learning for Employees

    Social Engineering is the use of non-technical means to gain unauthorized access to information or systems. Instead of using vulnerabilities and exploit scripts, the hacker uses human nature. Social Engineering provides the potential for the most complete penetration of a target, but it does take time and talent. Generally, it...

    Provided By JATIT

  • White Papers // Mar 2011

    Modeling and Scheduling Intelligent Method's Application in Increasing Hospitals' Efficiency

    Every human cost of each hospital as the greatest presenter the health care and treatment to all people, the main sources and credits allocated to the health and treatment of a country. Determining the optimal number of employees for each ward of hospital, because of its importance in quality of...

    Provided By JATIT

  • White Papers // Mar 2011

    A New Approach for Generating Strong Key in Rivestcipher4 Algorithm

    In the era of digital transaction, in order to transact the data in a more secured manner the need for a cryptographic algorithm is inevitable. There are numerous numbers of cryptographic algorithms which makes the system invulnerable from the attacks of intruders and eavesdroppers. RivestCipher4 algorithm is one such cryptographic...

    Provided By JATIT

  • White Papers // Mar 2011

    Design and Analysis of Speech Processing Using Kalman Filtering

    Speech processing is used widely in every day's applications that most people take for granted, such as network wire lines, cellular telephony, telephony system and telephone answering machines. Due to its popularity and increasing of demand, engineers are trying various approaches of improving the process. One of the methods for...

    Provided By JATIT

  • White Papers // Mar 2010

    Design of a Quality of Service-Based Multicast Routing Protocol for Mobile Ad Hoc Networks

    Authors propose a Quality-of-Service (QoS)-based multicast routing protocol, referred to as QoS-MR, for mobile ad hoc networks (MANETs). QoS-MR is a receiver-initiated mesh-based multicast routing protocol and can work for both combinatorially stable and unstable networks. Authors explain in detail the procedures for mesh construction (initiation by the source, propagation...

    Provided By JATIT

  • White Papers // May 2009

    Bi Directional Associative Memory Neural Network Method in the Character Recognition

    Pattern recognition techniques are associated a symbolic identity with the image of the pattern. In this paper the authors will analyze different neural network methods in pattern recognition. This problem of replication of patterns by machines (computers) involves the machine printed patterns. The pattern recognition is better known as optical...

    Provided By JATIT

  • White Papers // May 2009

    Genetic Algorithms, TABU Search and Simulated Annealing: A Comparison Between Three Approaches for the Cryptanalysis of Transposition Cipher

    Due to increasing incidents of cyber attacks, the demand for effective internet security is increasing. Cryptology is the science and study of systems for secret communication. It consists of two complementary fields of study: cryptography and cryptanalysis. In this paper, the authors propose a cryptanalysis method based on genetic algorithm,...

    Provided By JATIT

  • White Papers // May 2010

    Performance Analysis of Different M-ARY Modulation Techniques in Fading Channels Using Different Diversity

    The comparison of Symbol Error Probability (SEP) for different M-ary modulation techniques over slow, flat, identically independently distributed Rician fading channel is presented in this paper. Because fading is one of the major limitations in wireless communication, so modulation technique with diversity is used to transmit message signal efficiently. Exact...

    Provided By JATIT

  • White Papers // May 2010

    Evolution of Power Efficient Data Fusion Assurance Scheme for Wireless Sensor Networks

    Wireless sensor networks processing sensitive data are facing the risks of data manipulation, data fraud and sensor destruction or replacement. However, the practical deployment of sensor networks faces many challenges imposed by real-world demands. Sensors are deployed in open environments, and hence are vulnerable to physical attacks, potentially sensor networks...

    Provided By JATIT

  • White Papers // May 2010

    Measuring Quality of Web Site Navigation

    The primary goal of this paper is to identify the elements involved in quality assessment of website structure. Always quality of website structure is based on its navigability, average number of clicks and structural complexity. The web tool PowerMapper is used to establish the sitemap for the website, path length...

    Provided By JATIT

  • White Papers // May 2010

    A Pragmatic Approach to Software Reuse

    Software reuse has become a topic of much interest in the software community due to its potential benefits, which include increased product quality and decreased product cost and schedule. The most substantial benefits derive from a product line approach, where a common set of reusable software assets act as a...

    Provided By JATIT

  • White Papers // May 2010

    Utran Cryptrographic Algorithms Operation and Complexity Study

    The Universal Mobile Telecommunications System (UMTS) offers panoply of 3G services that require a high protection of the transmitted information. In the present paper, the authors are interested by network access security, especially the protection of the data integrity and the provisioning of data encryption. A special interest will be...

    Provided By JATIT

  • White Papers // May 2010

    Test Scheduling Optimization for Embedded Core Testing

    Test scheduling is crucially important for optimal SoC test automation in allocating the limited available test resources. To assign test resource, this paper introduces a fuzzy based engine. Test pipelining is used to minimize the time of testing the SoC. The power consumption during the test process should be under...

    Provided By JATIT

  • White Papers // May 2010

    An Agent-Oriented Executive Model for Service Choreography

    Quick changes in requirements and opportunities in world market need different levels of cross-organizational collaboration for integrating distributed information systems, information sharing and coordination of organizational processes. Nowadays, Web Services are the most common technology to meet these requirements. Web Services Choreography Description Language (WS-CDL), a World Wide Web Consortium...

    Provided By JATIT

  • White Papers // Mar 2010

    A New Method of Fingerprint Authentication Using 2D Wavelets

    A new approach for fingerprint verification, based on wavelets and Pseudo Zernike Moments (PZMs), is discussed. PZMs are robust to noisy images, invariant to rotation and have a good image reconstruction capability. PZMs have been used for global analysis and so they are used to extract global features (the shape...

    Provided By JATIT

  • White Papers // Mar 2011

    A New Reachability Based Algorithm for Outlier Detection in Multidimensional Dataset

    The quality of data is major role to detect novel results from the large voluminous databases. So the outlier detection is important process in KDD. It is another important area of data mining research. Maximum of the outlier are due to human errors. Many types of outlier detection algorithms are...

    Provided By JATIT

  • White Papers // Mar 2011

    Architecture for Integration of Point of Sale Terminals With Financial Institutions Through Web Services

    With the conventional POS payment transaction method, vendors are bound to a payment institute in their region and can only use relatively expensive dedicated or slow dial-up lines to their financial institute. This paper report covers the work to produce an architecture and a prototype that supports Point of Sales...

    Provided By JATIT

  • White Papers // Mar 2011

    Optimized Test Scheduling With Reduced Wrapper Cell for Embedded Core Testing

    The increasing Design for Test (DfT) area overhead and potential performance degradation is caused due to wrapping all the embedded cores for modular System-on-Chip (SoC) testing. This paper proposes a solution for reducing the number of Wrapper Boundary Register (WBR) cells. By utilizing the WBRs of the surrounding cores to...

    Provided By JATIT

  • White Papers // May 2010

    An Algorithm to Determine Energy-Aware Maximal Leaf Nodes Data Gathering Tree for Wireless Sensor Networks

    The authors propose an Energy-aware Maximal Leaf Nodes Data Gathering (EMLN-DG) algorithm for periodic data collection and transmission in wireless sensor networks. For each round of data gathering, an EMLNDG tree spanning the entire sensor network is formed based on the residual energy level available at the nodes and the...

    Provided By JATIT

  • White Papers // May 2010

    Requirements Based Static Class Diagram Constructor (SCDC) Case Tool

    Object-oriented development methodology is currently the main trend in software industry. Many tools were introduced to aid in the analysis and design phases of the object-oriented development methodology. However, tools that can aid in the requirements phase of the object-oriented development methodology and that can generate class diagrams as a...

    Provided By JATIT

  • White Papers // May 2010

    Diversity Schemes for Wireless Communication-A Short Review

    Now-a-days the requirements of wireless communication are to have high voice quality, high data rates, multimedia features, lightweight communication devices etc. But the wireless communication channel suffers from much impairment .One of them is fading which is due to the effect of multiple propagation paths, and the rapid movement of...

    Provided By JATIT

  • White Papers // May 2010

    A Methodology for Estimation of Performance in Real Time Distributed Embedded Systems

    As embedded systems become increasingly networked, and interact with the physical world, Real Time Distributed Embedded Systems are emerging. This paper mainly focuses on the performance estimation and analysis of Real Time Distributed embedded systems. Performance evaluation is one of the key challenges in the system analysis. Major design parameters...

    Provided By JATIT

  • White Papers // May 2010

    Spanning Tree Based Variable Length Dynamic Address Autoconfiguration in Mobile Ad Hoc Wireless Networks

    A Mobile Ad hoc NETwork (MANET) is an infrastructure-less, spontaneous, and arbitrary multi-hop wireless network, consisting of group of mobile nodes. The topology of the network changes randomly due to unpredictable mobility of nodes. In order to allow truly spontaneous and infrastructure-less networking, a protocol for dynamic allocation of unique...

    Provided By JATIT

  • White Papers // Dec 2010

    Semantic Web Security and Privacy

    The Semantic Web aims at enabling sophisticated and autonomic machine to machine interactions without human intervention, by providing machines not only with data but also with its meaning (semantics). In the Semantic Web, any two strangers can interact with each other automatically and therefore this assumption does not hold. In...

    Provided By JATIT

  • White Papers // Dec 2010

    Application of Structured Queuing Networks in QoS Estimition of Telecommunication Service

    The authors present the structured queuing network as effective mathematical model of telecommunication system; this model is oriented on the analysis of delay in telecommunication networks. A set of special components are identified for providing structurization of such models. QoS parameters: the average delivery time and the utilization coefficient are...

    Provided By JATIT