JATIT

Displaying 1-40 of 264 results

  • White Papers // May 2013

    IP Multimedia Subsystem: Security Evaluation

    The IMS (IP Multimedia Subsystem) as network controller includes effective mechanisms for new services, regardless of the access technology. The network regroups all existing access IP-based technologies that unify access and minimize costs of service deployment. However, such architecture poses significant security challenges at network access and services providing. Indeed,...

    Provided By JATIT

  • White Papers // May 2013

    Scheduling Research Based on Genetic Algorithm and Qos Constraints of Cloud Computing Resources

    Cloud computing is a new business model based on Internet and aims to provide information service for users. Resource scheduling is one of the key technologies of Cloud Computing. Analyzing the representative achievement of cloud computing resources scheduling, and then according to the problem that there are large gap between...

    Provided By JATIT

  • White Papers // Apr 2013

    Monitor System Based on GSM Short Message for Unmanned Computer Room

    Based on the limitation of the traditional alarming system, the authors propose a monitor system based on GSM short message for unmanned computer room. Firstly, they design the monitor system structure. Secondly, they combine the dynamic and static information and proposed an information Publish-Subscribe platform. Finally, this platform supports message...

    Provided By JATIT

  • White Papers // Apr 2013

    Lossless Network Compression Based on Topology Potential Community Discovery

    research of lossless network compression is carried out. To meet the different needs, two approaches of lossless network compression are proposed in this research. One approach, judging importance of the nodes according to their roles playing in the community composition, quantifies the importance of every node in communities, and achieves...

    Provided By JATIT

  • White Papers // Apr 2013

    Research on Security Issues and Solutions of IEC 61850 Communication Protocol Architecture

    IEC 61850 Communication Protocol Architecture is widely used in China's electricity system for communication between the substation automatic systems. Due to the lacking of corresponding security specification, the standards cannot guarantee the confidentiality, integrity as well as authentication in communication. This paper proposes a solution for this problem. The improved...

    Provided By JATIT

  • White Papers // Apr 2013

    Algorithm on Embedded Fingerprint Identification System

    Fingerprint identification technology is a kind of important biological identity recognition technology; it is also the most mature branch of biological recognition technology development. Comparing with other biometric identification technology, fingerprint identification technology has high efficiency, low cost, convenient collection etc advantages. Now the development of the fingerprint recognition system...

    Provided By JATIT

  • White Papers // Apr 2013

    Analysis of ICSGD and OSSDL Localization Algorithms in WSN

    In the authors' papers before, two three-dimensional localization schemes which are called Iterative Calculation of Secondary Grid Division localization scheme (ICSGD) and a range free Three Dimensional Optimum Space Step Distance Localization scheme (3D-OSSDL) are proposed respectively. In ICSGDLS scheme, forty beacon nodes and five hundred unknown sensor nodes were...

    Provided By JATIT

  • White Papers // Apr 2013

    Dynamic Group Signature Scheme Based on Non-Interactive Proof

    Combined with identity-based signature technology and non-interactive proof, a dynamic group signature scheme was built based on the standard group scheme model. This scheme overcame the shortcoming of static property of standard scheme and was of strong Non-frameability. New members could dynamically join in group without updating the group public...

    Provided By JATIT

  • White Papers // Apr 2013

    An Efficient Protocol for Restricted Adaptive Oblivious Transfer

    Restricted adaptive oblivious transfer was introduced by Herranz in 2011, which is the main approach to protect user privacy in e-transactions involving operations on digital confidential data or sensitive information. There are many practical applications for restricted adaptive oblivious transfer, such as medical or financial data access, pay-per-view TV, and...

    Provided By JATIT

  • White Papers // Apr 2013

    A Clustering Technique Based on Energy Balancing Algorithm for Routing in Wireless Sensor Networks

    A Wireless Sensor Network (WSN) is a collection of large number of tiny sensor nodes deployed in a field to survey the surroundings phenomena. Since, energy consumption is the crucial challenge in those networks, exploiting judiciously the energy reserve of nodes is the key for designing protocols. Distributing the energy...

    Provided By JATIT

  • White Papers // Apr 2013

    VOIP Applications Over Manet: Codec Performance Enhancement by Tuning Routing Protocol Parameters

    Voice over Internet Protocol (VoIP) may provide good services through Mobile Ad hoc Networks (MANets) platform. It may cover many application scenarios range from safety to comfort related services. However, these networks introduce many challenges for supporting voice with QoS requirements. In this paper, the authors take the first step...

    Provided By JATIT

  • White Papers // Apr 2013

    Business Intelligence Architecture Based on Internet of Things

    On the basis of the analysis of the operating characteristics of new intelligent network - Internet of things, the paper holds that the combination of the Internet of things and cloud computing is the design to cope with massive data in the future. The core of business intelligence lies in...

    Provided By JATIT

  • White Papers // Apr 2013

    A Network Control System for Scene Adaptive Semiconductor Lighting

    This paper presents a design for intelligent control system of scene adaptive semiconductor lighting. The new design contains the host computer and the terminal in a control network. The lighting effect patterns are edited by the software on the host computer, then the lighting scene data is transported to the...

    Provided By JATIT

  • White Papers // Apr 2013

    An Improved Fair Guard Band Allocation Scheme in Cognitive Networks

    In this paper, an improved fair dynamic channel algorithm allocation based on guard band scheme is presented. The adoption of the channel strategy in wireless communication has been ensuring the normal communication of important systems, such as coal mine wireless emergency support entity. But future study shows that the secondary...

    Provided By JATIT

  • White Papers // Apr 2013

    Research on a Heuristic Searching Algorithm for Energy-Aware Routing in Wireless Sensor Networks

    Because cluster-head nodes in wireless sensor networks may be far away from the base station, or there exists many obstacles in deployment environments of wireless sensor networks to affect the data transmission performance, they would consume excessive energy in the process of the massive data transmission, which may lead to...

    Provided By JATIT

  • White Papers // Apr 2013

    Maximal Profit Service Task Partition and Allocation in Computer Grid Considering Service Reliability and Security

    The paper considers grid computing systems in which the Resource Management Systems (RMS) divides a service tasks into Execution Blocks (EBs) and sends these blocks to different available resources. The service cost comprises the task execution cost, communication cost and security measures cost and depends on the resources assigned to...

    Provided By JATIT

  • White Papers // Mar 2013

    Low Energy Mapping Technique for Hierarchical Network-on-Chip

    Intellectual Property (IP) core-to-node mapping is an important but intractable optimization problem in Network-on-Chip (NoC) application design. In this paper, the authors present an approach to map cores onto hierarchical NoC architecture which consists of two levels. The top-level interconnection network is realized by a 2D mesh of communicating routers,...

    Provided By JATIT

  • White Papers // Jan 2013

    Narrow Band Interference Mitigation in DS-UWB Systems Using the Wavelet Transform and FFT

    Because of its importance, DS-UWB communication is an open research area, particularly in the context of its coexistence with OFDM based systems. In this paper, the authors present an analysis of the effect of the Narrow Band Interference of OFDM WLAN 802.11a systems, on the performance of BPSK-DS -UWB in...

    Provided By JATIT

  • White Papers // Jan 2013

    Web Service Description Framework and Selection Mechanism Towards Balanced Perceptions of FQOS and QOS

    With the growing expansion of web services resources on the internet, more and more users come to appreciate the difficulty of searching self-gratification information from the mass information. This paper analyzes functional attributes and un-functional attributes of Web service resources, builds the mapping relationship between FQoS and QoS, and defines...

    Provided By JATIT

  • White Papers // Dec 2012

    Advanced Passive Clustering-Threshold a Maintenance Mechanism of the Cluster Structure

    A Wireless Sensor Network (WSN) is a set of nodes communicating through wireless links to observe a given phenomenon. Wireless sensor network is deployed over a geographical area to collect information in hostile environments. The capacity of sensors is limited by the lifetime of their batteries, so the energy is...

    Provided By JATIT

  • White Papers // Dec 2012

    A Development Model for Domain-Oriented Information Service Based on Cloud Computing Infrastructure

    For the diversity of users demand for information services in converged network environment, a solution was proposed with the combination of cloud computing technology and domain engineering, in which three stages starting from the domain engineering include service-oriented domain analysis and modeling, domain architecture design based on cloud computing infrastructure...

    Provided By JATIT

  • White Papers // Dec 2012

    Profit-Driven Dynamic Spectrum Allocation in Wireless Networks

    At present, dynamic spectrum allocation methods in wireless networks can meet the spectrum resource allocation requirements within a certain rang. They are mainly based on the change of the spectrum resources in terms of time and geographical distribution. Relatively speaking, these allocation methods to make efficient use of spectrum resources...

    Provided By JATIT

  • White Papers // Dec 2012

    Mobile Robot-Based Virtual V-Blast MIMO Transmission Scheme in Distributed Wireless Sensor Networks

    Aiming at the requirements of high-speed data transmission and low energy consumption in energy constrained Wireless Sensor Networks (WSNs), a mobile robot-based virtual V-BLAST cooperative MIMO transmission scheme and an efficient approximate Maximum Likelihood (ML) detection algorithm are proposed in this paper. Mobility of robot can reduce the communication distance...

    Provided By JATIT

  • White Papers // Dec 2012

    A Ca Model of Culture Information Dissemination in the Network Era and the Simulation of Its Dynamic Character

    Through analyzing the characteristics of the culture information dissemination of the network era, the complex network theory is used to study it deeply. It shows that the process of network information dissemination has typical network topology structure. The kind of network structure has both small world and scale-free features, and...

    Provided By JATIT

  • White Papers // Dec 2012

    A Dynamic Customizable Architecture for SaaS Based Platform

    The characteristics of multi associations business coordination among the enterprises in industry chain is firstly analyzed, and the demand of customizable business of SaaS (Software as a Service) based platform supporting the industry chain coordination (in brief, PLATFORM) is intensively analyzed. Based on these, customizable business-oriented PLATFORM architecture based on...

    Provided By JATIT

  • White Papers // Dec 2012

    Multi-Beam Antenna-Based Topology Control Algorithm in Ad Hoc Networks

    Multi-beam antenna is drawing attention due to its power-saving and interference-reducing. A topology control algorithm K-DRNG based on multi-beam antenna in heterogeneous wireless ad hoc network is proposed. The algorithm is mainly composed of three phases. In the stage of information collection, each node collects information of neighborhood by adjusting...

    Provided By JATIT

  • White Papers // Dec 2012

    A Wireless Sensor Network Routing Algorithm Based on Ant Colony Algorithm

    In this paper, the authors proposed one kind based on the ant colony algorithm routing algorithm in wireless sensor networks. According to the election of cluster head node energy, and the use of ant colony algorithm is simple and easy to implement, support for multiple path characteristics, through the adjacent...

    Provided By JATIT

  • White Papers // Dec 2012

    Analysis of Security Mechanism in Wireless Campus Network

    With the rising number of schools going to built wireless campus networks, the current wireless campus networks cannot protect from increasing illegal network intrusion. This paper presented an improved security mechanism for wireless campus networks. It is based on the analysis of the shortages of current for security mechanism for...

    Provided By JATIT

  • White Papers // Dec 2012

    An Improved Alamouti Strategy With Energy-Efficiency in Wireless Sensor Networks

    Sensor nodes usually operate on small batteries with restricted sources of energy in the Wireless Sensor Networks (WSNs). Energy efficiency is one of the most critical concerns for it. Clustered topology schedule is important method of saving energy with some advantages of managing conveniently, using the energy efficiently, and fusing...

    Provided By JATIT

  • White Papers // Dec 2012

    Successive Interference Cancellation Decoding for the K -User Cyclic Interference Channel

    The K -user cyclic interference channel can model one scenario in vehicular networks, where all the base stations are arranged along a highway. The k th user is interfered only by the ((k +1) mod K) th user in the K -user cyclic interference channel. The Han-Kobayashi scheme based rate...

    Provided By JATIT

  • White Papers // Dec 2012

    An ID-Based Multi-Receiver Signcryption Scheme in MANET

    In Mobile ad hoc network (Manet), to solve the problems of the message receiver privacy exposure and signcryption (decryption) unfairness in existing signcryption schemes, a new ID- based multi-receiver signcryption scheme based on bilinear pairings is proposed. The authors also analyzed its security and efficiency. The result shows that the...

    Provided By JATIT

  • White Papers // Dec 2012

    An Improved Information Hiding Algorithm

    Hiding technology is a newly developed discipline that concludes many subjects and covers many fields, and it hides the transferring information in the carrier, which greatly increases the safety of information transmission. In order to hide and transfer information more effectively, the paper researched the cloud algorithm in the model...

    Provided By JATIT

  • White Papers // Dec 2012

    A Multi-Hop Routing Scheme Based on Different Spatial Density of Nodes in WSNS

    In this paper, the operating principle of SEP in Wireless Sensor Networks (WSNs) is analyzed, and a Multi-Hop Routing Scheme (MH-SEP) is proposed based on different spatial density of nodes. The network is to be divided into different sizes of areas according to the multi-hop routing scheme, the cluster heads...

    Provided By JATIT

  • White Papers // Dec 2012

    Energy-Saving Model on Distributed Random Nodes in Wireless Sensor Networks

    The purpose of the authors' study is to try to extend the life of the sensor network, without affecting the uses functions in wireless sensor networks. As their method reduces the amount of data communications and reduces the energy consumption of wireless sensor networks significantly, the compression problem in the...

    Provided By JATIT

  • White Papers // Dec 2012

    A Real-Time Information Oriented Service-Aware Routing Algorithm

    The mobile nodes perceive the real-time routing information of different sections, and analyze the reliability of the movement direction of nodes, data exchange, and transmission delay and path failure. By combining movement direction, speed and locations, the routing path is adaptively updated according to the network states of the sections...

    Provided By JATIT

  • White Papers // Dec 2012

    Security Analysis for Internet of Ships

    With the development of water shipping technology, research and construction of the waterway information technology has received much more attention. However, smart shipping system still faces many problems, such as the shipping management is sufficiently sophisticated the services are not comprehensive, the people who travelling is not humanistic, and the...

    Provided By JATIT

  • White Papers // Dec 2012

    A Queue Scheduling and Management System Based on Ixp2400 Network Processor

    Multidimensional queue management and scheduling system based on IXP2400 network processor, is used for network flow of many attribute to manage and schedule. The system has N queues as well as the number of network package attribute. Each queue set as equal Mi queue as i attribute value, reached the...

    Provided By JATIT

  • White Papers // Dec 2012

    Magnetic Current Distribution Analysis of CPW FED Arrow Shaped Uwb Antenna

    An investigation of magnetic current distribution of CPW fed arrow shaped UWB antenna is reported. This enables the precise prediction of working principle of UWB antenna, since the traditional UWB antenna simulations ignore important details. The computation was performed numerically for an arrow shaped antenna at different resonant frequencies at...

    Provided By JATIT

  • White Papers // Dec 2012

    Joint Time and Location Mobility Prediction Algorithm for Heterogeneous Wireless Networks

    Mobility prediction algorithm is the significant aspect to improve QoS (Quality of Service) for heterogeneous wireless networks because it can accurately predict user' s trajectory, decrease handoff latency and preserve resources in arriving cell for user. Considering inaccurate description of existing mobility prediction algorithms for mobile user's location in heterogeneous...

    Provided By JATIT

  • White Papers // Dec 2012

    Throughput Optimization for MIMO Systems Based on Cross-Layer Design

    Based on cross-layer design, an optimization method was proposed, which combined the adaptive modulation and coding with symbol rate at the physical layer, and the packet size and sub-packet number at the data link layer. The parameters were jointly optimized to maximize the MIMO system throughput in the Rayleigh fading...

    Provided By JATIT

  • White Papers // Dec 2010

    Software Risks and Mitigation in Global Software Development

    The Global Software Development is becoming so much complex and challengeable as the scope of the problem domain of the user increases day by day advancement. In today's modern world of engineering development, almost all projects suffer from some unwanted threats called risks which can seriously affect the quality, cost...

    Provided By JATIT

  • White Papers // Jan 2011

    Electronic Toll Collection System Using Passive RFID Technology

    This paper focuses on an Electronic Toll Collection (ETC) system using Radio Frequency IDentification (RFID) technology. Research on ETC has been around since 1992, during which RFID tags began to be widely used in vehicles to automate toll processes. The proposed RFID system uses tags that are mounted on the...

    Provided By JATIT

  • White Papers // Jan 2011

    On the Security of Firewall Policy Deployment

    Due to the sensitive nature of information transmitted during a policy deployment, the communication between management tool and firewall should be confidential. Confidentiality can be achieved by using encrypted communication protocols such as SSH, SSL and IPSec. Much research has already addressed the specification of policies, conflict detection and optimization,...

    Provided By JATIT

  • White Papers // Jan 2011

    QoS Formal Specification of Engineering Language

    Distributed systems can be very large and complex and the many different considerations which influence their design can result in a substantial body of specification, which needs a structuring framework if it is to be managed successfully. The purpose of the RM-ODP is to define such a framework. The Reference...

    Provided By JATIT

  • White Papers // Jan 2011

    Real Time Warning System Design for Web Deface Based on Short Message Service

    Currently the internet is becoming more important in many aspects of human life. The number of people who use the internet in daily activities is also increasing. The rapid growing of computer networks and the interconnection among them has entailed some security problems. There are a growing number of bad-intentioned...

    Provided By JATIT

  • White Papers // Jan 2011

    Comprehensive Analysis of Complex Data Structures for Graph Data Mining

    Various methods and techniques are prevailing for processing data to extract useful knowledge; nevertheless they are accounted for business transaction databases. Much data exists in non-business domains also, where there is an ardent need of extracting knowledge. Knowledge is useful for understanding data concisely or comprehending the concepts in a...

    Provided By JATIT

  • White Papers // Jan 2011

    An Enhanced Three Levels Security Policy

    Design and implementation of intrusion detection systems remain an important research issue in order to maintain proper network security. Despite the undeniable progress in the area of computer security there is still much to be done to improve security of today's computer systems and so many mechanisms have been developed...

    Provided By JATIT

  • White Papers // Jan 2011

    Best Target Platform for Application Migration

    According to the latest surveys about programming language popularity, most companies deciding to develop an enterprise application preferred to use one of the cross-platform programming languages for development. Most of the reasons given for using cross-platform programming language are related to their prominent features such as flexibility and portability. Furthermore,...

    Provided By JATIT

  • White Papers // Feb 2011

    A Conceptualized Model for Enhancing Non-repudiation in University E-Form Processing

    Most organizations use one form of online registration or another. Since these registration forms are structured to be open and available to users, many of them do not afford or seem to require basic security measures like access control measures or even basic passwords. This however implies that the authenticity...

    Provided By JATIT

  • White Papers // Feb 2011

    The Impact of Change Management in ERP System: A Case Study of Madar

    This paper discusses Enterprise Resource Planning (ERP) - change management. A review of the research literature has been presented that focuses on the ERP change management factors. The literature is further classified and the major outcomes of each study have been addressed in this paper. The discussion is supported by...

    Provided By JATIT

  • White Papers // Feb 2011

    A Review of Issue Analysis in Open Source Software Development

    A software development methodology was initiated from the concept of sharing the source code. In 1998 it was named as open source software development. It is a complete software development methodology, in which all the participants are connected through internet. It has great promises to produce high quality software projects...

    Provided By JATIT

  • White Papers // Jul 2008

    Practical Development and Deployment of Covert Communication in IPV4

    Steganography is the science of hiding information or transmitting secret messages in a given host carrier for the purpose of enhancing value through undetectable covers. The paper focuses on the existent methods used with ipv4 and studies the various algorithms. Transfer of data over the internet crosses the different layers...

    Provided By JATIT

  • White Papers // Sep 2008

    Watermarking Using Neural Network and Hiding the Trained Network Within the Cover Image

    The major source of communication in present world is digital media. As it is quite easy to manipulate a digital media, it becomes essential to protect the digital information by legitimate means. Digital Watermarking has evolved as one of the latest technologies for digital media protection. Many techniques based on...

    Provided By JATIT

  • White Papers // Jul 2008

    Computer Aided Design of Brushless Synchronous Generator Using Matlab

    Magnetic and electric field analysis of a brushless synchronous generator is presented in this paper. This kind of machine has armature windings which are connected to the diodes. The static magnetic field generated by additional field windings induces speed electromotive force in the closed armature windings, connected diodes rectify alternating...

    Provided By JATIT

  • White Papers // Jul 2008

    A New Technique for Energy Reduction in Induction Motor Drives Using Artificial Neural Network

    A new controller based on Artificial Neural Network (ANN) for induction machines is introduced and implemented. The introduced controller is designed for efficiency maximization. The Artificial Neural Network (ANN) is used for commanding optimum voltage and frequency that maximizes the drive efficiency. To provide the required data to train and...

    Provided By JATIT

  • White Papers // Jul 2008

    Compact GPS Microstrip Patch Antenna

    In this paper, the effect of shorting wall length on the circular polarization of shorted microstrip patch antenna is examined. The theoretical analysis is based on the High Frequency Software Simulator (HFSS). A designed antenna for the GPS application at the civilian GPS frequency (1.575 GHz) has been fabricated and...

    Provided By JATIT

  • White Papers // Jul 2008

    Design of Virtual Learning Environment Using Scorm Standards

    E-learners can experience the best learning when the web based material provides interactive communication; and information is presented in different ways with the control over learning. This expectation shifted the E-learning course delivery from simple presentation of learning content to learning objects with the power of E-learning standards. The feasibility...

    Provided By JATIT

  • White Papers // Jul 2008

    Mechanisms for Parallel Query Execution

    Parallel query processing has attained a lot of attention in the database community because customer applications on databases are growing in size and complexity with an ever increasing demand for performance. The main objective of parallel query processing is to achieve speedup, scaleup and high throughput. Earlier bracket model was...

    Provided By JATIT

  • White Papers // Sep 2008

    WAN Cloud Access Link Utilizations for Compressed Video

    There are a number of different video compression standards. Most of them are variations of the work of two different committees. The International Telephony Union's Specialist Group on Coding for Visual Telephony and the International Standards Organization's motion picture expert group, known as MPEG. The most popular standards are the...

    Provided By JATIT

  • White Papers // Sep 2008

    Deriving Cluster Knowledge Using Rough Set Theory

    Clustering algorithms gives general description of the clusters listing, number of clusters, and member entities in those clusters. It lacks in generating cluster description in the form of pattern. Deriving pattern from clusters along with grouping of data into clusters is important from data mining perspective. In the proposed approach...

    Provided By JATIT

  • White Papers // Aug 2012

    Modified Dynamic Subcarrier Bandwidth (MDSB) OFDM Systems for Energy Efficient Transmission in High Mobility Applications

    Orthogonal Frequency Division Multiplexing (OFDM) is a fast growing technology which is frequently used in all high data rate applications. The standards like Long Term Evaluation (LTE) promise to offer a good data rate at high mobility. But the high mobility destroys the orthogonality of OFDM systems and also reduces...

    Provided By JATIT

  • White Papers // Aug 2012

    Throughput Utility Enhancement of Cognitive Wimax With Femto-Cells

    WiMAX with femtocells is a cost effective and spectrally efficient next generation broadband wireless communication systems. Femtocells are perceived as having a strong potential to provide high data-rate services with increased coverage at low cost. Femtocells will allow new services and business models to be offered to indoor users. Almost...

    Provided By JATIT

  • White Papers // Aug 2012

    Communication Among Hardware and Software Engineers by Technical Notations

    Hardware and software engineers need to cooperate with each other in developing and building hardware/software systems. Any cooperation among engineers requires a convenient and efficient communication. There is a gap between hardware and software engineers that makes the communication difficult among them. They have difficulty in understanding each other's language...

    Provided By JATIT

  • White Papers // Aug 2012

    Multiuser Detection Based Timing Offset Estimation for Uplink Mobile Wimax

    The approval of the new mobile WiMAX helps in realizing the real time wireless broadband networks with large coverage area and high data rate. In mobile WiMAX whenever a subscriber comes into the cell radius of Base Station (BS), it has to get synchronized; this process in mobile WiMAX is...

    Provided By JATIT

  • White Papers // Aug 2012

    A New Generic Taxonomy of Malware Behavioural Detection and Removal Techniques

    Modern malware has become a major threat to today's Internet communications. The threat can infiltrate hosts using a variety of methods, such as attacks against known software vulnerabilities, hidden functionality in regular programs, drive-by download from unsafe web sites, and so forth. Matching a file stream against a known virus...

    Provided By JATIT

  • White Papers // Aug 2012

    Delay Analysis of Three ARQ Protocols in GEOM/G/1 Queue Model

    In this paper, the authors study the performance of the classical SW-ARQ, multichannel SW-ARQ and GBN-ARQ in discrete-time Geom./G/1 queue with setup mechanism. Based on the method of embedded Markov chain, the expressions of the packet average waiting delay, system average delay and channel utilization are respectively obtained. Finally, by...

    Provided By JATIT

  • White Papers // Sep 2012

    Information Security, 4th Wave

    Applications today, information can be viewed as a commodity, like electricity, without which many companies and organizations cannot function. However, in the interconnected world the people live in, information is much more vulnerable than other commodities. While it is highly unlikely that the actions of a disgruntled teenager on another...

    Provided By JATIT

  • White Papers // Sep 2012

    Yagi Antenna Design for Signal Phone Jammer

    Usage of mobile communications continues to increase along the development of variety of new technologies are increasingly powerful. One of the most widely used today is the mobile phone. Almost everyone has this advanced technology even some consumers have more than one mobile phone. Indeed, this technology is very useful...

    Provided By JATIT

  • White Papers // Sep 2012

    Private Cloud - Does It Really a Savior of Your Money? Facts Analyzed

    Organizations with the infrastructure and skills to implement highly virtualized IT operations may consider a private cloud - a multi-tenant, highly scalable and automated infrastructure - part of the enterprise data center's natural evolution. But before the user commit to a private cloud, they need to understand associated costs and...

    Provided By JATIT

  • White Papers // Sep 2012

    The Specification of Quality of Service in Open Distributed Processing: Formalism Used in Mechatronic System

    The paper discusses two approaches for designing mechatronic systems. the first one is based on using Reference Model for Open Distributed Processing (RM-ODP), to specify any kind of mechatronic systems, RM-ODP is a reference model in computer science, which provides a co-ordinating framework for the standardization of Open Distributed Processing...

    Provided By JATIT

  • White Papers // Sep 2012

    Detection Method for Network Penetrating Behavior Based on Communication Fingerprint

    In order to monitor the use of network transmission software, the network penetrating technique based on encrypted proxy is discussed. By comparing the behavior of related penetration software, the concept of communication fingerprint is introduced to expand the extension of the communication features. The fingerprints database of encrypted proxy software...

    Provided By JATIT

  • White Papers // Oct 2012

    A WS-Rewiring Evolving Model of Scale-Free Network

    The authors can describe the relationships of the world as a network, such as molecular interactions, the interaction between the protein and the organism, the energy conversion between objects, dating relationships between people and food chain relations. The real-world complex system can be abstracted into a complex network whose vertices...

    Provided By JATIT

  • White Papers // Oct 2012

    Integrated Optimization and Deployment Mechanism of Information Resources in Complex Manufacturing Collaborative Logistics Network

    Information resources integration in collaborative logistics network makes use of superior resources in network, achieves the purpose of sharing network resources by technical means. It mainly virtual integrates the resources which have competitive advantages and geospatial discrete distribution in network, strengthens cohesive relations, improves resource response speed and reduces resource...

    Provided By JATIT

  • White Papers // Oct 2012

    Routing Optimization for Forces Based on Traffic Matrix

    The research of the ForCES technology has made a great progress. However current research of ForCES mainly focuses on architecture and techniques. In order to ensure ForCES architecture network works well, it is significant to take account of routing optimization for ForCES architecture. In this paper, the authors will introduce...

    Provided By JATIT

  • White Papers // Sep 2012

    Geometrical Features for Multiclass Vehicle Type Recognition Using MLP Network

    Vision-based vehicle type (model) recognition is a hot topic in the domain of intelligent transportation systems. But it is difficult to recognize the exact type (model) of a vehicle due to the influence of some factors, for example, the view variations. In this paper, the authors present a robust system...

    Provided By JATIT

  • White Papers // Oct 2012

    Model and Simulation of Information Diffusion Based on Network Dimension-Force

    The superiority dimension-forces which network has make information diffusion in realistic space change in the nature through information coupling. It means that information diffusion in realistic space is no longer affected by geography, volume and time constraints. Under the promoting of network dimension-force, the source information can reach any sink...

    Provided By JATIT

  • White Papers // Oct 2012

    Research on Performance Modeling of Transactional Cloud Applications

    As cloud computing has gained a lot of attention recently, performance modeling of cloud applications would be very important for various management issues, such as capacity planning and resource provisioning for the cloud providers. This paper conducts research on several performance modeling approaches of transactional cloud applications. Steady-state models are...

    Provided By JATIT

  • White Papers // Oct 2012

    Research on Authentication and Accounting Systems Based on 802.1x

    The CERNET scale of construction continues to expand, universities and secondary schools in succession through CERNET access the Internet. CERNET-sharing traffic costs for vast majority of schools, in addition, the user also need to pay the substantial costs of the DDN lines, and network systems operation and maintenance. Therefore, the...

    Provided By JATIT

  • White Papers // Oct 2012

    A Dynamic Bandwidth Allocation Algorithm in EPON Networks

    With the rapid development of Internet technology, there have been many new services which require high bandwidth. EPON (Ethernet Passive Optical Network) has become one of the best technologies in the next generation broadband access network because of their high-bandwidth and low-cost. Dynamic Bandwidth Allocation (DBA) is one of the...

    Provided By JATIT

  • White Papers // Nov 2012

    Publish/subscribe Network Infrastructure Based on Web Service Notification

    To accommodate real-time dynamic large scale service composition requirements, Event-Driven Service Oriented Architecture (EDSOA) is introduced to solve the shortcomings of Service Oriented Architecture (SOA). The authors' EDSOA service execution platform is built on Web Service Notification based distributed topic-based publish/subscribe infrastructure services. This paper presents their innovations at system...

    Provided By JATIT