JATIT

Displaying 41-80 of 208 results

  • White Papers // Dec 2012

    Security Analysis for Internet of Ships

    With the development of water shipping technology, research and construction of the waterway information technology has received much more attention. However, smart shipping system still faces many problems, such as the shipping management is sufficiently sophisticated the services are not comprehensive, the people who travelling is not humanistic, and the...

    Provided By JATIT

  • White Papers // Dec 2012

    A Queue Scheduling and Management System Based on Ixp2400 Network Processor

    Multidimensional queue management and scheduling system based on IXP2400 network processor, is used for network flow of many attribute to manage and schedule. The system has N queues as well as the number of network package attribute. Each queue set as equal Mi queue as i attribute value, reached the...

    Provided By JATIT

  • White Papers // Dec 2012

    Magnetic Current Distribution Analysis of CPW FED Arrow Shaped Uwb Antenna

    An investigation of magnetic current distribution of CPW fed arrow shaped UWB antenna is reported. This enables the precise prediction of working principle of UWB antenna, since the traditional UWB antenna simulations ignore important details. The computation was performed numerically for an arrow shaped antenna at different resonant frequencies at...

    Provided By JATIT

  • White Papers // Nov 2012

    A Novel Framework for Efficient Congestion Control Protocol and QoS Enhancement in Adhoc Wireless Networks

    Internet with its wide application has contributed a lot to the fast growth of the world and there are many limitations in ad hoc networks. There are two main failures that occur in the network namely wireless packet loss and congestion. The performance of SCTP in wireless network is considered...

    Provided By JATIT

  • White Papers // Nov 2012

    Adaptive Velocity and Distance Based Routing Protocol for MANET

    A Mobile Ad-hoc NETwork (MANET) is a collection of wireless mobile nodes communicating without any infrastructure. Due to the availability of small and inexpensive wireless communicating nodes, the MANET field has attracted a lot of attention from industry and academia. MANETs can be used in various applications such as mobile...

    Provided By JATIT

  • White Papers // Nov 2012

    A Digital Predistortion Theory Based on Self-Adaptive Algorithm

    In this paper, the author researches the problem of the analysis and optimization of broadband digital pre-distortion. In the development process of mobile communication system, improving the transmission quality and spectral efficiency always acts as a main research focus. As the traditional multi-carrier modulation system has broadband linear modulating signals...

    Provided By JATIT

  • White Papers // Nov 2012

    Analysis on the TMNP-Scheduling Algorithm for Industrial Wireless Network

    In order to improve real-time in industrial wireless network, the TMNP-scheduling algorithm (scheduling algorithm based on throughput maximization of non-periodic communication tasks) is proposed in this paper. The basic principles of TMNP-scheduling algorithm are analyzed, and a theory proof has been finished. The theory proof shows that TMNP-scheduling algorithm optimizes...

    Provided By JATIT

  • White Papers // Nov 2012

    A Multi-Channel Signal Sources Based on FPGA and DDS

    In the field of test & control instrument, multi-channel signal sources are needed as the excitation in the electrical parameters measurement. This paper presents a realization method of multiplexed signal source which combined the advantages of DDS principle with high speed programmable logic device FPGA, fully reflect the characteristics of...

    Provided By JATIT

  • White Papers // Nov 2012

    Dynamic Topology Algorithm for P2P Networks

    In order to improve the peer-to-peer network resource allocation efficiency, and to isolate the malicious nodes, this paper has presented a new method named Dynamic Topology Algorithm (DTA), suitable for unstructured P2P network. As the neighbor node sets variable Time-To-Live (TTL) values, and in the interaction according to the neighbor...

    Provided By JATIT

  • White Papers // Nov 2012

    Intelligent Logistics System Based on Three-Tier Architecture and RFID

    Radio Frequency IDentification technology (RFID) is a non-contact intelligent identification system, its main advantage lies in the wide range of recognition, information capacity, security, excellent resistance to abrasion, reusable. It can take place of the traditional bar code recognition technology, and be applied to the area of modern intelligence logistics...

    Provided By JATIT

  • White Papers // Nov 2012

    An Energy-Efficient Maximization Based Path Selection and Resource Allocation Scheme in OFDMA-Based Two-Hop Relay Cellular Networks

    In this paper, the authors investigate the energy efficiency problem in downlink transmission of the OFDMA-based two-hop relay cellular networks. Most of the researches on energy efficiency focus on the transmission in traditional cellular system, especially for the uplink transmission. Their objective is to maximize the system energy efficiency for...

    Provided By JATIT

  • White Papers // Nov 2012

    An Efficient MAC Protocol for Supporting QoS in Wireless Sensor Networks

    Wireless sensor network can be employed in wide range of application areas, such as target detection and tracking, military, and environmental monitoring. Media access control protocol is one of the most critical issues for wireless sensor network. A lot of efforts have been dedicated to MAC protocol and many MAC...

    Provided By JATIT

  • White Papers // Nov 2012

    Publish/subscribe Network Infrastructure Based on Web Service Notification

    To accommodate real-time dynamic large scale service composition requirements, Event-Driven Service Oriented Architecture (EDSOA) is introduced to solve the shortcomings of Service Oriented Architecture (SOA). The authors' EDSOA service execution platform is built on Web Service Notification based distributed topic-based publish/subscribe infrastructure services. This paper presents their innovations at system...

    Provided By JATIT

  • White Papers // Nov 2012

    Design and Implementation of P2P Trust Model Based on the Classic Bayesian Networks Theory

    Based on Bayesian network theorem, the paper proposed the novel trust model of P2P network named Trust-BT. The novel new Trust-BT model is based on the P2P network nodes' history of all types of transactions, prior experience, the use of Bayesian statistical analysis methods calculate the global trust value of...

    Provided By JATIT

  • White Papers // Nov 2012

    A Lightweight Cooperative Detection Framework of DDOS/DOS Attacks Based on Counting Bloom Filter

    Detection and trace-back of Distributed Denial of Service (DDoS/DoS) attacks have become a challenge for network security. In this paper, the authors propose a lightweight cooperative detection framework (CCBFF) based on counting bloom filter to detect and trace DDoS/DoS attack online. The CCBFF contains 2 counting bloom filters CBF1 and...

    Provided By JATIT

  • White Papers // Nov 2012

    A Restricted-Scope Lookup Service in Peer-to-Peer Network

    Consistent hashing-based P2P networks, which scalability is indicated by efficiency of query and maintenance cost, take the hashing algorithm as mapping relation between the data and the identifier of every node in the network. By analyzing some main characters in structured P2P network, the authors introduce the Restricted Scope Lookup...

    Provided By JATIT

  • White Papers // Nov 2012

    Applications of Local-Range Network Theory in Designed P2P Routing Algorithm

    Peer-to-peer file sharing has a great prospect, peer-to-peer search problems have become the academic focus of one of the research questions. Already distributed P2P systems for the lack of caching mechanism unorganized navigation capacity of the lack of global routing algorithm, is a disorderly search this end, this paper proposes...

    Provided By JATIT

  • White Papers // Nov 2012

    A Traffic Network Design Scheme Based on Travel Time Reliability

    On the basis of travel time reliability, this paper puts forward the concepts of absolute reliability and relative reliability to better assess road network; simultaneously, regional traffic road network reliability formula is deducted according to series and parallel connection of link, OD pair and road network. Finally, a bi-level programming...

    Provided By JATIT

  • White Papers // Nov 2012

    A Prevention Model Against SIP Flooding Attacks

    Through deeply analyzing on the principle, mode, character of SIP DoS and the flooding attacks faced by SIP network, the prevention model to combine a dynamic threshold adjustment with real-time dynamic prevention for SIP flooding attacks was proposed. This model included logically chi-square traffic judgement model, cumulative statistics model and...

    Provided By JATIT

  • White Papers // Oct 2012

    Research on Performance Modeling of Transactional Cloud Applications

    As cloud computing has gained a lot of attention recently, performance modeling of cloud applications would be very important for various management issues, such as capacity planning and resource provisioning for the cloud providers. This paper conducts research on several performance modeling approaches of transactional cloud applications. Steady-state models are...

    Provided By JATIT

  • White Papers // Oct 2012

    Research on Authentication and Accounting Systems Based on 802.1x

    The CERNET scale of construction continues to expand, universities and secondary schools in succession through CERNET access the Internet. CERNET-sharing traffic costs for vast majority of schools, in addition, the user also need to pay the substantial costs of the DDN lines, and network systems operation and maintenance. Therefore, the...

    Provided By JATIT

  • White Papers // Oct 2012

    A Dynamic Bandwidth Allocation Algorithm in EPON Networks

    With the rapid development of Internet technology, there have been many new services which require high bandwidth. EPON (Ethernet Passive Optical Network) has become one of the best technologies in the next generation broadband access network because of their high-bandwidth and low-cost. Dynamic Bandwidth Allocation (DBA) is one of the...

    Provided By JATIT

  • White Papers // Oct 2012

    A WS-Rewiring Evolving Model of Scale-Free Network

    The authors can describe the relationships of the world as a network, such as molecular interactions, the interaction between the protein and the organism, the energy conversion between objects, dating relationships between people and food chain relations. The real-world complex system can be abstracted into a complex network whose vertices...

    Provided By JATIT

  • White Papers // Oct 2012

    Integrated Optimization and Deployment Mechanism of Information Resources in Complex Manufacturing Collaborative Logistics Network

    Information resources integration in collaborative logistics network makes use of superior resources in network, achieves the purpose of sharing network resources by technical means. It mainly virtual integrates the resources which have competitive advantages and geospatial discrete distribution in network, strengthens cohesive relations, improves resource response speed and reduces resource...

    Provided By JATIT

  • White Papers // Oct 2012

    Routing Optimization for Forces Based on Traffic Matrix

    The research of the ForCES technology has made a great progress. However current research of ForCES mainly focuses on architecture and techniques. In order to ensure ForCES architecture network works well, it is significant to take account of routing optimization for ForCES architecture. In this paper, the authors will introduce...

    Provided By JATIT

  • White Papers // Oct 2012

    Model and Simulation of Information Diffusion Based on Network Dimension-Force

    The superiority dimension-forces which network has make information diffusion in realistic space change in the nature through information coupling. It means that information diffusion in realistic space is no longer affected by geography, volume and time constraints. Under the promoting of network dimension-force, the source information can reach any sink...

    Provided By JATIT

  • White Papers // Sep 2012

    Geometrical Features for Multiclass Vehicle Type Recognition Using MLP Network

    Vision-based vehicle type (model) recognition is a hot topic in the domain of intelligent transportation systems. But it is difficult to recognize the exact type (model) of a vehicle due to the influence of some factors, for example, the view variations. In this paper, the authors present a robust system...

    Provided By JATIT

  • White Papers // Sep 2012

    Information Security, 4th Wave

    Applications today, information can be viewed as a commodity, like electricity, without which many companies and organizations cannot function. However, in the interconnected world the people live in, information is much more vulnerable than other commodities. While it is highly unlikely that the actions of a disgruntled teenager on another...

    Provided By JATIT

  • White Papers // Sep 2012

    Yagi Antenna Design for Signal Phone Jammer

    Usage of mobile communications continues to increase along the development of variety of new technologies are increasingly powerful. One of the most widely used today is the mobile phone. Almost everyone has this advanced technology even some consumers have more than one mobile phone. Indeed, this technology is very useful...

    Provided By JATIT

  • White Papers // Sep 2012

    Private Cloud - Does It Really a Savior of Your Money? Facts Analyzed

    Organizations with the infrastructure and skills to implement highly virtualized IT operations may consider a private cloud - a multi-tenant, highly scalable and automated infrastructure - part of the enterprise data center's natural evolution. But before the user commit to a private cloud, they need to understand associated costs and...

    Provided By JATIT

  • White Papers // Sep 2012

    The Specification of Quality of Service in Open Distributed Processing: Formalism Used in Mechatronic System

    The paper discusses two approaches for designing mechatronic systems. the first one is based on using Reference Model for Open Distributed Processing (RM-ODP), to specify any kind of mechatronic systems, RM-ODP is a reference model in computer science, which provides a co-ordinating framework for the standardization of Open Distributed Processing...

    Provided By JATIT

  • White Papers // Sep 2012

    Detection Method for Network Penetrating Behavior Based on Communication Fingerprint

    In order to monitor the use of network transmission software, the network penetrating technique based on encrypted proxy is discussed. By comparing the behavior of related penetration software, the concept of communication fingerprint is introduced to expand the extension of the communication features. The fingerprints database of encrypted proxy software...

    Provided By JATIT

  • White Papers // Aug 2012

    Modified Dynamic Subcarrier Bandwidth (MDSB) OFDM Systems for Energy Efficient Transmission in High Mobility Applications

    Orthogonal Frequency Division Multiplexing (OFDM) is a fast growing technology which is frequently used in all high data rate applications. The standards like Long Term Evaluation (LTE) promise to offer a good data rate at high mobility. But the high mobility destroys the orthogonality of OFDM systems and also reduces...

    Provided By JATIT

  • White Papers // Aug 2012

    Throughput Utility Enhancement of Cognitive Wimax With Femto-Cells

    WiMAX with femtocells is a cost effective and spectrally efficient next generation broadband wireless communication systems. Femtocells are perceived as having a strong potential to provide high data-rate services with increased coverage at low cost. Femtocells will allow new services and business models to be offered to indoor users. Almost...

    Provided By JATIT

  • White Papers // Aug 2012

    Communication Among Hardware and Software Engineers by Technical Notations

    Hardware and software engineers need to cooperate with each other in developing and building hardware/software systems. Any cooperation among engineers requires a convenient and efficient communication. There is a gap between hardware and software engineers that makes the communication difficult among them. They have difficulty in understanding each other's language...

    Provided By JATIT

  • White Papers // Aug 2012

    Multiuser Detection Based Timing Offset Estimation for Uplink Mobile Wimax

    The approval of the new mobile WiMAX helps in realizing the real time wireless broadband networks with large coverage area and high data rate. In mobile WiMAX whenever a subscriber comes into the cell radius of Base Station (BS), it has to get synchronized; this process in mobile WiMAX is...

    Provided By JATIT

  • White Papers // Aug 2012

    A New Generic Taxonomy of Malware Behavioural Detection and Removal Techniques

    Modern malware has become a major threat to today's Internet communications. The threat can infiltrate hosts using a variety of methods, such as attacks against known software vulnerabilities, hidden functionality in regular programs, drive-by download from unsafe web sites, and so forth. Matching a file stream against a known virus...

    Provided By JATIT

  • White Papers // Aug 2012

    Delay Analysis of Three ARQ Protocols in GEOM/G/1 Queue Model

    In this paper, the authors study the performance of the classical SW-ARQ, multichannel SW-ARQ and GBN-ARQ in discrete-time Geom./G/1 queue with setup mechanism. Based on the method of embedded Markov chain, the expressions of the packet average waiting delay, system average delay and channel utilization are respectively obtained. Finally, by...

    Provided By JATIT

  • White Papers // Aug 2012

    A Routing Attack Detection Method for Cluster Wireless Sensor Networks

    Wireless sensor networks have been widely used in many applications such as military monitoring, target tracking and surveillance. Security issue is need to more concern. Routing protocol is the core technology of the network layer in wireless sensor networks. Many attackers disrupt the network with routing attack, which will do...

    Provided By JATIT

  • White Papers // Aug 2012

    Cloud Application Automation - A Review of Various Cloud Automation Tools

    Virtualization of applications, desktops and servers has taken off in the past few years because of the convenience and cost savings. Organizations are rolling these virtual servers out in the form of private cloud, public cloud, or hybrid cloud services. Many experts say automated application deployment tools are a requirement...

    Provided By JATIT

  • White Papers // Dec 2010

    Semantic Web Security and Privacy

    The Semantic Web aims at enabling sophisticated and autonomic machine to machine interactions without human intervention, by providing machines not only with data but also with its meaning (semantics). In the Semantic Web, any two strangers can interact with each other automatically and therefore this assumption does not hold. In...

    Provided By JATIT

  • White Papers // Dec 2010

    Application of Structured Queuing Networks in QoS Estimition of Telecommunication Service

    The authors present the structured queuing network as effective mathematical model of telecommunication system; this model is oriented on the analysis of delay in telecommunication networks. A set of special components are identified for providing structurization of such models. QoS parameters: the average delivery time and the utilization coefficient are...

    Provided By JATIT

  • White Papers // Dec 2010

    A Novel Ultra Wide Band Yagi Microstrip Antenna for Wireless Applications

    This paper presents an Ultra Wide Band Microstrip Yagi antenna with very good performance at four main operating frequencies (0.85, 2.4, 3.5 and 5.2) GHz. Numerical simulation results of the authors design show more than (-20 to -40) dB return loss at the bands of (0.85, 2.4, 3.5, 4.5 and...

    Provided By JATIT

  • White Papers // Dec 2010

    A Comparative Study on Manual and Automated System for Wireless Networks

    VNR Vignana Jyothi Institute of Engineering and Technology-have an existing network of outdated equipment purchased on an as-needed basis with limited planning and support. A portion of the outdated equipment was reaching End-Of-Life (EOL). The network was unmanaged & a lot of its equipment was outdated and underperforming, however, the...

    Provided By JATIT

  • White Papers // Dec 2010

    Software Risks and Mitigation in Global Software Development

    The Global Software Development is becoming so much complex and challengeable as the scope of the problem domain of the user increases day by day advancement. In today's modern world of engineering development, almost all projects suffer from some unwanted threats called risks which can seriously affect the quality, cost...

    Provided By JATIT

  • White Papers // Jan 2011

    Electronic Toll Collection System Using Passive RFID Technology

    This paper focuses on an Electronic Toll Collection (ETC) system using Radio Frequency IDentification (RFID) technology. Research on ETC has been around since 1992, during which RFID tags began to be widely used in vehicles to automate toll processes. The proposed RFID system uses tags that are mounted on the...

    Provided By JATIT

  • White Papers // Jan 2011

    On the Security of Firewall Policy Deployment

    Due to the sensitive nature of information transmitted during a policy deployment, the communication between management tool and firewall should be confidential. Confidentiality can be achieved by using encrypted communication protocols such as SSH, SSL and IPSec. Much research has already addressed the specification of policies, conflict detection and optimization,...

    Provided By JATIT

  • White Papers // Feb 2011

    A Conceptualized Model for Enhancing Non-repudiation in University E-Form Processing

    Most organizations use one form of online registration or another. Since these registration forms are structured to be open and available to users, many of them do not afford or seem to require basic security measures like access control measures or even basic passwords. This however implies that the authenticity...

    Provided By JATIT

  • White Papers // Feb 2011

    The Impact of Change Management in ERP System: A Case Study of Madar

    This paper discusses Enterprise Resource Planning (ERP) - change management. A review of the research literature has been presented that focuses on the ERP change management factors. The literature is further classified and the major outcomes of each study have been addressed in this paper. The discussion is supported by...

    Provided By JATIT

  • White Papers // Feb 2011

    A Review of Issue Analysis in Open Source Software Development

    A software development methodology was initiated from the concept of sharing the source code. In 1998 it was named as open source software development. It is a complete software development methodology, in which all the participants are connected through internet. It has great promises to produce high quality software projects...

    Provided By JATIT

  • White Papers // Jan 2011

    QoS Formal Specification of Engineering Language

    Distributed systems can be very large and complex and the many different considerations which influence their design can result in a substantial body of specification, which needs a structuring framework if it is to be managed successfully. The purpose of the RM-ODP is to define such a framework. The Reference...

    Provided By JATIT

  • White Papers // Jan 2011

    Real Time Warning System Design for Web Deface Based on Short Message Service

    Currently the internet is becoming more important in many aspects of human life. The number of people who use the internet in daily activities is also increasing. The rapid growing of computer networks and the interconnection among them has entailed some security problems. There are a growing number of bad-intentioned...

    Provided By JATIT

  • White Papers // Jan 2011

    Comprehensive Analysis of Complex Data Structures for Graph Data Mining

    Various methods and techniques are prevailing for processing data to extract useful knowledge; nevertheless they are accounted for business transaction databases. Much data exists in non-business domains also, where there is an ardent need of extracting knowledge. Knowledge is useful for understanding data concisely or comprehending the concepts in a...

    Provided By JATIT

  • White Papers // Jan 2011

    An Enhanced Three Levels Security Policy

    Design and implementation of intrusion detection systems remain an important research issue in order to maintain proper network security. Despite the undeniable progress in the area of computer security there is still much to be done to improve security of today's computer systems and so many mechanisms have been developed...

    Provided By JATIT

  • White Papers // Jan 2011

    Best Target Platform for Application Migration

    According to the latest surveys about programming language popularity, most companies deciding to develop an enterprise application preferred to use one of the cross-platform programming languages for development. Most of the reasons given for using cross-platform programming language are related to their prominent features such as flexibility and portability. Furthermore,...

    Provided By JATIT

  • White Papers // May 2009

    Bi Directional Associative Memory Neural Network Method in the Character Recognition

    Pattern recognition techniques are associated a symbolic identity with the image of the pattern. In this paper the authors will analyze different neural network methods in pattern recognition. This problem of replication of patterns by machines (computers) involves the machine printed patterns. The pattern recognition is better known as optical...

    Provided By JATIT

  • White Papers // May 2009

    Genetic Algorithms, TABU Search and Simulated Annealing: A Comparison Between Three Approaches for the Cryptanalysis of Transposition Cipher

    Due to increasing incidents of cyber attacks, the demand for effective internet security is increasing. Cryptology is the science and study of systems for secret communication. It consists of two complementary fields of study: cryptography and cryptanalysis. In this paper, the authors propose a cryptanalysis method based on genetic algorithm,...

    Provided By JATIT

  • White Papers // May 2010

    Performance Analysis of Different M-ARY Modulation Techniques in Fading Channels Using Different Diversity

    The comparison of Symbol Error Probability (SEP) for different M-ary modulation techniques over slow, flat, identically independently distributed Rician fading channel is presented in this paper. Because fading is one of the major limitations in wireless communication, so modulation technique with diversity is used to transmit message signal efficiently. Exact...

    Provided By JATIT

  • White Papers // May 2010

    Evolution of Power Efficient Data Fusion Assurance Scheme for Wireless Sensor Networks

    Wireless sensor networks processing sensitive data are facing the risks of data manipulation, data fraud and sensor destruction or replacement. However, the practical deployment of sensor networks faces many challenges imposed by real-world demands. Sensors are deployed in open environments, and hence are vulnerable to physical attacks, potentially sensor networks...

    Provided By JATIT

  • White Papers // May 2010

    Measuring Quality of Web Site Navigation

    The primary goal of this paper is to identify the elements involved in quality assessment of website structure. Always quality of website structure is based on its navigability, average number of clicks and structural complexity. The web tool PowerMapper is used to establish the sitemap for the website, path length...

    Provided By JATIT

  • White Papers // May 2010

    A Pragmatic Approach to Software Reuse

    Software reuse has become a topic of much interest in the software community due to its potential benefits, which include increased product quality and decreased product cost and schedule. The most substantial benefits derive from a product line approach, where a common set of reusable software assets act as a...

    Provided By JATIT

  • White Papers // May 2010

    Utran Cryptrographic Algorithms Operation and Complexity Study

    The Universal Mobile Telecommunications System (UMTS) offers panoply of 3G services that require a high protection of the transmitted information. In the present paper, the authors are interested by network access security, especially the protection of the data integrity and the provisioning of data encryption. A special interest will be...

    Provided By JATIT

  • White Papers // May 2010

    Test Scheduling Optimization for Embedded Core Testing

    Test scheduling is crucially important for optimal SoC test automation in allocating the limited available test resources. To assign test resource, this paper introduces a fuzzy based engine. Test pipelining is used to minimize the time of testing the SoC. The power consumption during the test process should be under...

    Provided By JATIT

  • White Papers // May 2010

    An Agent-Oriented Executive Model for Service Choreography

    Quick changes in requirements and opportunities in world market need different levels of cross-organizational collaboration for integrating distributed information systems, information sharing and coordination of organizational processes. Nowadays, Web Services are the most common technology to meet these requirements. Web Services Choreography Description Language (WS-CDL), a World Wide Web Consortium...

    Provided By JATIT

  • White Papers // Mar 2010

    A New Method of Fingerprint Authentication Using 2D Wavelets

    A new approach for fingerprint verification, based on wavelets and Pseudo Zernike Moments (PZMs), is discussed. PZMs are robust to noisy images, invariant to rotation and have a good image reconstruction capability. PZMs have been used for global analysis and so they are used to extract global features (the shape...

    Provided By JATIT

  • White Papers // Mar 2010

    An Adaptive Decision Support Station for Real Estate Portfolio Management

    The paper proposes an adaptive decision station to create real estate portfolios. The decision station would be useful for investors interested in real estate investment and for environments where data needs to be constantly updated by using the internet. The Findlay model was selected for the portfolio management engine of...

    Provided By JATIT

  • White Papers // Mar 2010

    Ontology-Based and Automatic Generation of Service Interfaces From Several Choreographies

    Service Oriented Architecture (SOA) is a paradigm for developing distributed and heterogeneous software applications within and across organizational boundaries. Choreography is a coordination model of SOA in which service collaborations to achieve a common goal are described from global point of view. One of the most important issues in SOA...

    Provided By JATIT

  • White Papers // Mar 2010

    On the Use of Web Services Technology in E-Health Applications

    This paper takes a study on the Web Services - a technology that has come to change the future of Computing and e-commerce. Web Services is a distributed computing technology that offers interaction and collaboration among vendors and customers, with the vision of providing ubiquitous computing. When one plug an...

    Provided By JATIT

  • White Papers // Mar 2010

    A Group Key Management Approach for Multicast Cryptosystems

    The security in the multicast communication in the large groups is the major obstacles for effectively controlling access to the transmitting data. The IP Multicast itself does not provide any specific mechanisms to control the intruders in the group communication. Group key management is mainly addresses upon the trust model...

    Provided By JATIT

  • White Papers // Mar 2010

    SS7 Routing Logic to Support Load-Sharing and Reliability of SCCP Messages Using Routes of Heterogeneous Link Types

    Worldwide mobile telephony has shown exponential growth during last few years. Apart from basic and supplementary services, service providers are always in pursuit for increasing mobile penetration, customer satisfaction and newer means of revenue generation. Value added services such as roaming, international roaming, intelligent network services, SMS etc., are significant...

    Provided By JATIT

  • White Papers // Mar 2011

    The Working Model of an E-Payment System

    In this paper, the authors propose an Internet payment system which uses a payment gateway to handle the credit card payment transaction between customers, merchants and banks. To test and evaluate the payment system, they build an online travel agency called E-Travel, which simulates a real-life E-Payment application. On-line travel...

    Provided By JATIT

  • White Papers // Nov 2009

    Optial Web Service Composition Using Hybrid GA-TABU Search

    Web services are autonomous software systems identified by URIs which can be advertised, located, and accessed through messages encoded according to XMLbased standards (e.g., SOAP, WSDL, and UDDI) and transmitted using Internet protocols. Web services encapsulate application functionality and information resources and make them available through programmatic interfaces, as opposed...

    Provided By JATIT

  • White Papers // Mar 2010

    Implementation of BB84 Protocol on UDP 802.11i

    Cryptography nowadays is looking for a secure and trusted channel especially in key distribution between two legitimate parties without being intercepted or deciphered by intruders either in wireless or wired communication medium. The invention of Quantum Cryptography as part of quantum mechanics has solved the key distribution problem in cryptosystem...

    Provided By JATIT

  • White Papers // Dec 2009

    GPU Programming Paradigm

    Using the Graphics Processing Unit (GPU) to accelerate general-purpose computations has become an important technique in scientific research. However, the development complexity is significantly higher than for CPU-based solutions, due to the mainly graphics-oriented concepts and development tools for GPU-programming. As a consequence, general-purpose computations on the GPU are mainly...

    Provided By JATIT

  • White Papers // Dec 2009

    Study of Different Attacks on Multicast Mobile Ad Hoc Network

    Multicast network support is becoming an increasingly important technology for both military and commercial distributed and group based applications. The security services such as confidentiality, authenticity and data integrity are necessary for both wired and wireless networks to protect basic applications. In this paper the authors present a simulation based...

    Provided By JATIT

  • White Papers // Jan 2010

    Comparison of BER Between Uncoded Signal and Coded Signal (using Convolution Code) Over Slow Rayleigh Fading Channel

    Fading problem is a major impairment of the wireless communication channel. To mitigate the fading problem and to have reliable communications in wireless channel, channel coding technique is often employed. In this paper the BER (Bit Error Rate) performances are shown from analytically and by means of simulation for Rayleigh...

    Provided By JATIT

  • White Papers // Jan 2010

    New Approximation for Handoff Rate and Number of Handoff Probability in Cellular Systems Under General Distributions of Call Holding Time and Cell Residence Time

    In cellular networks, quantities such as number of handoff probability and handoff rate are very important parameters in the cellular system performance analysis. In previous literature, several techniques were introduced to evaluate these parameters; however, there are some limitations in the introduced techniques. In this paper, the authors approximate number...

    Provided By JATIT

  • White Papers // Nov 2009

    To Improve Bit Error Rate of Turbo Coded OFDM Transmission Over Noisy Channel

    Orthogonal Frequency Division Multiplexing (OFDM) has become a popular modulation method in high speed wireless communications. By partitioning a wideband fading channel into flat narrowband channels, OFDM is able to mitigate the detrimental effects of multipath fading using a simple one-tap equalizer. There is a growing need to quickly transmit...

    Provided By JATIT

  • White Papers // Nov 2009

    Performance Measures of a Computer Network System

    This paper analyses the reliability of computer network system consists of a server and two subsystems connected in parallel. In this way whole system will down only when both the subsystems are down or server fails. By supplementary variable technique it is concluded that Steady state transition probability is around...

    Provided By JATIT

  • White Papers // Feb 2010

    Modified Concentric Circular Microstrip Array Configurations for WIMAX Base Stations

    As the increasing demand for higher capacity, better coverage and higher transmission quality rises, array antennas are used in mobile communication systems. For WiMAX application different microstrip antenna array configurations such as uniform circular, uniform concentric and modified uniform concentric circular arrays are studied for 3.3 GHz frequency band. Based...

    Provided By JATIT