JATIT

Displaying 121-160 of 221 results

  • White Papers // Feb 2011

    A Conceptualized Model for Enhancing Non-repudiation in University E-Form Processing

    Most organizations use one form of online registration or another. Since these registration forms are structured to be open and available to users, many of them do not afford or seem to require basic security measures like access control measures or even basic passwords. This however implies that the authenticity...

    Provided By JATIT

  • White Papers // Feb 2011

    The Impact of Change Management in ERP System: A Case Study of Madar

    This paper discusses Enterprise Resource Planning (ERP) - change management. A review of the research literature has been presented that focuses on the ERP change management factors. The literature is further classified and the major outcomes of each study have been addressed in this paper. The discussion is supported by...

    Provided By JATIT

  • White Papers // Feb 2011

    A Review of Issue Analysis in Open Source Software Development

    A software development methodology was initiated from the concept of sharing the source code. In 1998 it was named as open source software development. It is a complete software development methodology, in which all the participants are connected through internet. It has great promises to produce high quality software projects...

    Provided By JATIT

  • White Papers // Jan 2011

    Real Time Warning System Design for Web Deface Based on Short Message Service

    Currently the internet is becoming more important in many aspects of human life. The number of people who use the internet in daily activities is also increasing. The rapid growing of computer networks and the interconnection among them has entailed some security problems. There are a growing number of bad-intentioned...

    Provided By JATIT

  • White Papers // Jan 2011

    Comprehensive Analysis of Complex Data Structures for Graph Data Mining

    Various methods and techniques are prevailing for processing data to extract useful knowledge; nevertheless they are accounted for business transaction databases. Much data exists in non-business domains also, where there is an ardent need of extracting knowledge. Knowledge is useful for understanding data concisely or comprehending the concepts in a...

    Provided By JATIT

  • White Papers // Jan 2011

    An Enhanced Three Levels Security Policy

    Design and implementation of intrusion detection systems remain an important research issue in order to maintain proper network security. Despite the undeniable progress in the area of computer security there is still much to be done to improve security of today's computer systems and so many mechanisms have been developed...

    Provided By JATIT

  • White Papers // Jan 2011

    Best Target Platform for Application Migration

    According to the latest surveys about programming language popularity, most companies deciding to develop an enterprise application preferred to use one of the cross-platform programming languages for development. Most of the reasons given for using cross-platform programming language are related to their prominent features such as flexibility and portability. Furthermore,...

    Provided By JATIT

  • White Papers // Jan 2011

    Electronic Toll Collection System Using Passive RFID Technology

    This paper focuses on an Electronic Toll Collection (ETC) system using Radio Frequency IDentification (RFID) technology. Research on ETC has been around since 1992, during which RFID tags began to be widely used in vehicles to automate toll processes. The proposed RFID system uses tags that are mounted on the...

    Provided By JATIT

  • White Papers // Jan 2011

    On the Security of Firewall Policy Deployment

    Due to the sensitive nature of information transmitted during a policy deployment, the communication between management tool and firewall should be confidential. Confidentiality can be achieved by using encrypted communication protocols such as SSH, SSL and IPSec. Much research has already addressed the specification of policies, conflict detection and optimization,...

    Provided By JATIT

  • White Papers // Jan 2011

    QoS Formal Specification of Engineering Language

    Distributed systems can be very large and complex and the many different considerations which influence their design can result in a substantial body of specification, which needs a structuring framework if it is to be managed successfully. The purpose of the RM-ODP is to define such a framework. The Reference...

    Provided By JATIT

  • White Papers // Dec 2010

    Semantic Web Security and Privacy

    The Semantic Web aims at enabling sophisticated and autonomic machine to machine interactions without human intervention, by providing machines not only with data but also with its meaning (semantics). In the Semantic Web, any two strangers can interact with each other automatically and therefore this assumption does not hold. In...

    Provided By JATIT

  • White Papers // Dec 2010

    Application of Structured Queuing Networks in QoS Estimition of Telecommunication Service

    The authors present the structured queuing network as effective mathematical model of telecommunication system; this model is oriented on the analysis of delay in telecommunication networks. A set of special components are identified for providing structurization of such models. QoS parameters: the average delivery time and the utilization coefficient are...

    Provided By JATIT

  • White Papers // Dec 2010

    A Novel Ultra Wide Band Yagi Microstrip Antenna for Wireless Applications

    This paper presents an Ultra Wide Band Microstrip Yagi antenna with very good performance at four main operating frequencies (0.85, 2.4, 3.5 and 5.2) GHz. Numerical simulation results of the authors design show more than (-20 to -40) dB return loss at the bands of (0.85, 2.4, 3.5, 4.5 and...

    Provided By JATIT

  • White Papers // Dec 2010

    A Comparative Study on Manual and Automated System for Wireless Networks

    VNR Vignana Jyothi Institute of Engineering and Technology-have an existing network of outdated equipment purchased on an as-needed basis with limited planning and support. A portion of the outdated equipment was reaching End-Of-Life (EOL). The network was unmanaged & a lot of its equipment was outdated and underperforming, however, the...

    Provided By JATIT

  • White Papers // Dec 2010

    Software Risks and Mitigation in Global Software Development

    The Global Software Development is becoming so much complex and challengeable as the scope of the problem domain of the user increases day by day advancement. In today's modern world of engineering development, almost all projects suffer from some unwanted threats called risks which can seriously affect the quality, cost...

    Provided By JATIT

  • White Papers // Jun 2010

    A New Lossless Method of Image Compression and Decompression Using Huffman Coding Techniques

    The need for an efficient technique for compression of Images ever increasing because the raw images need large amounts of disk space seems to be a big disadvantage during transmission & storage. Even though there are so many compression technique already present a better technique which is faster, memory efficient...

    Provided By JATIT

  • White Papers // May 2010

    An Algorithm to Determine Energy-Aware Maximal Leaf Nodes Data Gathering Tree for Wireless Sensor Networks

    The authors propose an Energy-aware Maximal Leaf Nodes Data Gathering (EMLN-DG) algorithm for periodic data collection and transmission in wireless sensor networks. For each round of data gathering, an EMLNDG tree spanning the entire sensor network is formed based on the residual energy level available at the nodes and the...

    Provided By JATIT

  • White Papers // May 2010

    Requirements Based Static Class Diagram Constructor (SCDC) Case Tool

    Object-oriented development methodology is currently the main trend in software industry. Many tools were introduced to aid in the analysis and design phases of the object-oriented development methodology. However, tools that can aid in the requirements phase of the object-oriented development methodology and that can generate class diagrams as a...

    Provided By JATIT

  • White Papers // May 2010

    Diversity Schemes for Wireless Communication-A Short Review

    Now-a-days the requirements of wireless communication are to have high voice quality, high data rates, multimedia features, lightweight communication devices etc. But the wireless communication channel suffers from much impairment .One of them is fading which is due to the effect of multiple propagation paths, and the rapid movement of...

    Provided By JATIT

  • White Papers // May 2010

    A Methodology for Estimation of Performance in Real Time Distributed Embedded Systems

    As embedded systems become increasingly networked, and interact with the physical world, Real Time Distributed Embedded Systems are emerging. This paper mainly focuses on the performance estimation and analysis of Real Time Distributed embedded systems. Performance evaluation is one of the key challenges in the system analysis. Major design parameters...

    Provided By JATIT

  • White Papers // May 2010

    Spanning Tree Based Variable Length Dynamic Address Autoconfiguration in Mobile Ad Hoc Wireless Networks

    A Mobile Ad hoc NETwork (MANET) is an infrastructure-less, spontaneous, and arbitrary multi-hop wireless network, consisting of group of mobile nodes. The topology of the network changes randomly due to unpredictable mobility of nodes. In order to allow truly spontaneous and infrastructure-less networking, a protocol for dynamic allocation of unique...

    Provided By JATIT

  • White Papers // May 2010

    Performance Analysis of Different M-ARY Modulation Techniques in Fading Channels Using Different Diversity

    The comparison of Symbol Error Probability (SEP) for different M-ary modulation techniques over slow, flat, identically independently distributed Rician fading channel is presented in this paper. Because fading is one of the major limitations in wireless communication, so modulation technique with diversity is used to transmit message signal efficiently. Exact...

    Provided By JATIT

  • White Papers // May 2010

    Evolution of Power Efficient Data Fusion Assurance Scheme for Wireless Sensor Networks

    Wireless sensor networks processing sensitive data are facing the risks of data manipulation, data fraud and sensor destruction or replacement. However, the practical deployment of sensor networks faces many challenges imposed by real-world demands. Sensors are deployed in open environments, and hence are vulnerable to physical attacks, potentially sensor networks...

    Provided By JATIT

  • White Papers // May 2010

    Specifying Behavioral Concepts by Engineering Language of RM-ODP

    Distributed systems can be very large and complex and the many different considerations which influence their design can result in a substantial body of specification, which needs a structuring framework if it is to be managed successfully. The purpose of the RM-ODP is to define such a framework. The Reference...

    Provided By JATIT

  • White Papers // May 2010

    Capacity Considerations in MIMO Systems and Impact of Transmit-Side Spacial Fading Correlation on the Performance of Non-orthogonal Space Time Codes

    High data rates are a primary concern for wireless system designers today. It is likely that future breakthroughs in wireless communications will be driven mainly by the demand for high data rate applications. Streaming video for example, requires two to three orders of magnitude higher data rates than speech. A...

    Provided By JATIT

  • White Papers // May 2010

    Neuro-Fuzzy Approach for Fault Location and Diagnosis Using Online Learning System

    In a power system, faults, dynamic operations, or nonlinear loads often cause various types of power quality disturbances such as voltage sags, voltage swells, switching transients, impulses, notches, flickers, harmonics, etc. On the other hand, the increased use of sensitive electronic circuitry by industrial and residential customers, as well as...

    Provided By JATIT

  • White Papers // May 2010

    Beyond Information Retrieval: A Survey

    The days of the traditional abstracting and indexing services are waning, as abstracts and bibliographic data become a commodity. However, there are tremendous opportunities for those organizations willing to look beyond the status quo to the new possibilities enabled by the latest wave of advanced technologies. Features like automatic extraction...

    Provided By JATIT

  • White Papers // May 2010

    Measuring Quality of Web Site Navigation

    The primary goal of this paper is to identify the elements involved in quality assessment of website structure. Always quality of website structure is based on its navigability, average number of clicks and structural complexity. The web tool PowerMapper is used to establish the sitemap for the website, path length...

    Provided By JATIT

  • White Papers // May 2010

    A Pragmatic Approach to Software Reuse

    Software reuse has become a topic of much interest in the software community due to its potential benefits, which include increased product quality and decreased product cost and schedule. The most substantial benefits derive from a product line approach, where a common set of reusable software assets act as a...

    Provided By JATIT

  • White Papers // May 2010

    Utran Cryptrographic Algorithms Operation and Complexity Study

    The Universal Mobile Telecommunications System (UMTS) offers panoply of 3G services that require a high protection of the transmitted information. In the present paper, the authors are interested by network access security, especially the protection of the data integrity and the provisioning of data encryption. A special interest will be...

    Provided By JATIT

  • White Papers // May 2010

    Test Scheduling Optimization for Embedded Core Testing

    Test scheduling is crucially important for optimal SoC test automation in allocating the limited available test resources. To assign test resource, this paper introduces a fuzzy based engine. Test pipelining is used to minimize the time of testing the SoC. The power consumption during the test process should be under...

    Provided By JATIT

  • White Papers // May 2010

    An Agent-Oriented Executive Model for Service Choreography

    Quick changes in requirements and opportunities in world market need different levels of cross-organizational collaboration for integrating distributed information systems, information sharing and coordination of organizational processes. Nowadays, Web Services are the most common technology to meet these requirements. Web Services Choreography Description Language (WS-CDL), a World Wide Web Consortium...

    Provided By JATIT

  • White Papers // Apr 2010

    Using Replicated Data to Reduce Backup Cost in Distributed Databases

    A backup server needs to be added to each primary server in the network for increasing the fault tolerance in the distributed database. It is also imperative to ensure that the primary and backup servers are interconnected. This paper seeks to come up with solutions to the problem of high...

    Provided By JATIT

  • White Papers // Apr 2010

    Capacity and V-Blast Techniques for MIMO Wireless Channel

    In wireless communications, spectrum is a scarce resource and hence imposes a high cost on the high data rate transmission. Fortunately, the emergence of multiple antenna system has opened another very resourceful dimension - space, for information transmission in the air. It has been demonstrated that multiple antenna system provides...

    Provided By JATIT

  • White Papers // Apr 2010

    Model Based Object-Oriented Software Testing

    Testing is an important phase of quality control in Software development. Software testing is necessary to produce highly reliable systems. The use of a model to describe the behavior of a system is a proven and major advantage to test. In this paper, the authors focus on model-based testing. The...

    Provided By JATIT

  • White Papers // Apr 2010

    Provably Secured Two Server Hash Password Authentication

    The techniques of Secured Socket Layer (SSL) with client-side certificates for commercial web sites rely on a relatively weak form of password authentication. Browser sends a user's plaintext password to a remote web server using SSL is vulnerable to attack. In common password attacks, hackers exploit the fact that web...

    Provided By JATIT

  • White Papers // Mar 2010

    Design of a Quality of Service-Based Multicast Routing Protocol for Mobile Ad Hoc Networks

    Authors propose a Quality-of-Service (QoS)-based multicast routing protocol, referred to as QoS-MR, for mobile ad hoc networks (MANETs). QoS-MR is a receiver-initiated mesh-based multicast routing protocol and can work for both combinatorially stable and unstable networks. Authors explain in detail the procedures for mesh construction (initiation by the source, propagation...

    Provided By JATIT

  • White Papers // Mar 2010

    Implementation of BB84 Protocol on UDP 802.11i

    Cryptography nowadays is looking for a secure and trusted channel especially in key distribution between two legitimate parties without being intercepted or deciphered by intruders either in wireless or wired communication medium. The invention of Quantum Cryptography as part of quantum mechanics has solved the key distribution problem in cryptosystem...

    Provided By JATIT

  • White Papers // Mar 2010

    Ontology-Based and Automatic Generation of Service Interfaces From Several Choreographies

    Service Oriented Architecture (SOA) is a paradigm for developing distributed and heterogeneous software applications within and across organizational boundaries. Choreography is a coordination model of SOA in which service collaborations to achieve a common goal are described from global point of view. One of the most important issues in SOA...

    Provided By JATIT

  • White Papers // Mar 2010

    On the Use of Web Services Technology in E-Health Applications

    This paper takes a study on the Web Services - a technology that has come to change the future of Computing and e-commerce. Web Services is a distributed computing technology that offers interaction and collaboration among vendors and customers, with the vision of providing ubiquitous computing. When one plug an...

    Provided By JATIT

  • White Papers // Dec 2012

    Throughput Optimization for MIMO Systems Based on Cross-Layer Design

    Based on cross-layer design, an optimization method was proposed, which combined the adaptive modulation and coding with symbol rate at the physical layer, and the packet size and sub-packet number at the data link layer. The parameters were jointly optimized to maximize the MIMO system throughput in the Rayleigh fading...

    Provided By JATIT

  • White Papers // Dec 2012

    An Evaluation Optimization Approach of IaaS Resource Distribution Based on Genetic Algorithm

    In cloud computing, IaaS (Infrastructure as a Service) is the foundation of cloud service applications. It enables problems like resource allocation scheduling and bearing capacity to be further optimally solved. Therefore, a genetic optimized IaaS resource optimization evaluation approach is presented. This approach abstractly defines its 7 factors (properties) including...

    Provided By JATIT

  • White Papers // Dec 2012

    A Dynamic Data Fusion Method and Its Application

    Data fusion involves multi-sources or multi-presentations of a single source to perform inferences which are more comprehensive and accurate than those of any single method. Thus, data fusion makes it possible to create a synergistic process in which the consolidation of individual data creates a combined resource with a productive...

    Provided By JATIT

  • White Papers // Nov 2012

    Dynamic Topology Algorithm for P2P Networks

    In order to improve the peer-to-peer network resource allocation efficiency, and to isolate the malicious nodes, this paper has presented a new method named Dynamic Topology Algorithm (DTA), suitable for unstructured P2P network. As the neighbor node sets variable Time-To-Live (TTL) values, and in the interaction according to the neighbor...

    Provided By JATIT

  • White Papers // Nov 2012

    Intelligent Logistics System Based on Three-Tier Architecture and RFID

    Radio Frequency IDentification technology (RFID) is a non-contact intelligent identification system, its main advantage lies in the wide range of recognition, information capacity, security, excellent resistance to abrasion, reusable. It can take place of the traditional bar code recognition technology, and be applied to the area of modern intelligence logistics...

    Provided By JATIT

  • White Papers // Dec 2012

    Isolated Distributed Architecture for Cloud-Storage Services Based on Structured Strategy

    Cloud Security threats have greatly hindered the development of Cloud Computing and the promotion of cloud application, so how to protect the data stored in the cloud is not only the core issue of security, but also the biggest challenge of development. As these problems above, a trust-control architecture based...

    Provided By JATIT

  • White Papers // Nov 2012

    An Energy-Efficient Maximization Based Path Selection and Resource Allocation Scheme in OFDMA-Based Two-Hop Relay Cellular Networks

    In this paper, the authors investigate the energy efficiency problem in downlink transmission of the OFDMA-based two-hop relay cellular networks. Most of the researches on energy efficiency focus on the transmission in traditional cellular system, especially for the uplink transmission. Their objective is to maximize the system energy efficiency for...

    Provided By JATIT

  • White Papers // Nov 2012

    An Efficient MAC Protocol for Supporting QoS in Wireless Sensor Networks

    Wireless sensor network can be employed in wide range of application areas, such as target detection and tracking, military, and environmental monitoring. Media access control protocol is one of the most critical issues for wireless sensor network. A lot of efforts have been dedicated to MAC protocol and many MAC...

    Provided By JATIT

  • White Papers // Dec 2012

    An ID-Based Multi-Receiver Signcryption Scheme in MANET

    In Mobile ad hoc network (Manet), to solve the problems of the message receiver privacy exposure and signcryption (decryption) unfairness in existing signcryption schemes, a new ID- based multi-receiver signcryption scheme based on bilinear pairings is proposed. The authors also analyzed its security and efficiency. The result shows that the...

    Provided By JATIT

  • White Papers // Dec 2012

    An Improved Information Hiding Algorithm

    Hiding technology is a newly developed discipline that concludes many subjects and covers many fields, and it hides the transferring information in the carrier, which greatly increases the safety of information transmission. In order to hide and transfer information more effectively, the paper researched the cloud algorithm in the model...

    Provided By JATIT

  • White Papers // Dec 2012

    A Multi-Hop Routing Scheme Based on Different Spatial Density of Nodes in WSNS

    In this paper, the operating principle of SEP in Wireless Sensor Networks (WSNs) is analyzed, and a Multi-Hop Routing Scheme (MH-SEP) is proposed based on different spatial density of nodes. The network is to be divided into different sizes of areas according to the multi-hop routing scheme, the cluster heads...

    Provided By JATIT

  • White Papers // Dec 2012

    Energy-Saving Model on Distributed Random Nodes in Wireless Sensor Networks

    The purpose of the authors' study is to try to extend the life of the sensor network, without affecting the uses functions in wireless sensor networks. As their method reduces the amount of data communications and reduces the energy consumption of wireless sensor networks significantly, the compression problem in the...

    Provided By JATIT

  • White Papers // Dec 2012

    A Real-Time Information Oriented Service-Aware Routing Algorithm

    The mobile nodes perceive the real-time routing information of different sections, and analyze the reliability of the movement direction of nodes, data exchange, and transmission delay and path failure. By combining movement direction, speed and locations, the routing path is adaptively updated according to the network states of the sections...

    Provided By JATIT

  • White Papers // Feb 2011

    The Impact of Change Management in ERP System: A Case Study of Madar

    This paper discusses Enterprise Resource Planning (ERP) - change management. A review of the research literature has been presented that focuses on the ERP change management factors. The literature is further classified and the major outcomes of each study have been addressed in this paper. The discussion is supported by...

    Provided By JATIT

  • White Papers // Feb 2011

    A Review of Issue Analysis in Open Source Software Development

    A software development methodology was initiated from the concept of sharing the source code. In 1998 it was named as open source software development. It is a complete software development methodology, in which all the participants are connected through internet. It has great promises to produce high quality software projects...

    Provided By JATIT

  • White Papers // Dec 2012

    A Wireless Sensor Network Routing Algorithm Based on Ant Colony Algorithm

    In this paper, the authors proposed one kind based on the ant colony algorithm routing algorithm in wireless sensor networks. According to the election of cluster head node energy, and the use of ant colony algorithm is simple and easy to implement, support for multiple path characteristics, through the adjacent...

    Provided By JATIT

  • White Papers // Dec 2012

    Analysis of Security Mechanism in Wireless Campus Network

    With the rising number of schools going to built wireless campus networks, the current wireless campus networks cannot protect from increasing illegal network intrusion. This paper presented an improved security mechanism for wireless campus networks. It is based on the analysis of the shortages of current for security mechanism for...

    Provided By JATIT

  • White Papers // Dec 2012

    An Improved Alamouti Strategy With Energy-Efficiency in Wireless Sensor Networks

    Sensor nodes usually operate on small batteries with restricted sources of energy in the Wireless Sensor Networks (WSNs). Energy efficiency is one of the most critical concerns for it. Clustered topology schedule is important method of saving energy with some advantages of managing conveniently, using the energy efficiently, and fusing...

    Provided By JATIT

  • White Papers // Dec 2012

    Successive Interference Cancellation Decoding for the K -User Cyclic Interference Channel

    The K -user cyclic interference channel can model one scenario in vehicular networks, where all the base stations are arranged along a highway. The k th user is interfered only by the ((k +1) mod K) th user in the K -user cyclic interference channel. The Han-Kobayashi scheme based rate...

    Provided By JATIT

  • White Papers // Jul 2009

    Adaptive Slot Management for OFDMA Based Cellular Wireless Networks in TDD Mode

    The next generation of mobile networks is expected to support real-time multimedia applications with different classes of traffic and diverse bandwidth requirements. The Orthogonal Frequency Division Multiple Access (OFDMA) system with time division duplex mode, employing asymmetric slot allocation between uplink and downlink, is a good solution for mixed realistic...

    Provided By JATIT

  • White Papers // Oct 2009

    Does External Knowledge Enhance Competitive Advantage?: A Research Agenda on IT Outsourcing Practices

    Since last two decades offshore outsourcing gaining fast momentum and now this new evolution of business process has achieved its maturity. Standardization of manufacturing sector is almost matured and now this sector is on the automation mode. Western firms in the service sector are very much eager to standardize their...

    Provided By JATIT

  • White Papers // Nov 2009

    Business Intelligence: Concepts, Components, Techniques and Benefits

    Business intelligence (BI) has two basic different meanings related to the use of the term intelligence. The primary, less frequently, is the human intelligence capacity applied in business affairs/activities. Intelligence of Business is a new field of the investigation of the application of human cognitive faculties and artificial intelligence technologies...

    Provided By JATIT

  • White Papers // Apr 2010

    Using Replicated Data to Reduce Backup Cost in Distributed Databases

    A backup server needs to be added to each primary server in the network for increasing the fault tolerance in the distributed database. It is also imperative to ensure that the primary and backup servers are interconnected. This paper seeks to come up with solutions to the problem of high...

    Provided By JATIT

  • White Papers // Feb 2010

    Electron Government Affairs System Based on VPN Technology

    In the course of carrying out its mission the primary challenge facing e-gov is how to deliver secure online services to businesses and citizens. For this paper, the Virtual Private Network (VPN) will be the solution selected to deal with this challenge. VPN can resolve these issues by simplifying and...

    Provided By JATIT

  • White Papers // Mar 2010

    Design of a Quality of Service-Based Multicast Routing Protocol for Mobile Ad Hoc Networks

    Authors propose a Quality-of-Service (QoS)-based multicast routing protocol, referred to as QoS-MR, for mobile ad hoc networks (MANETs). QoS-MR is a receiver-initiated mesh-based multicast routing protocol and can work for both combinatorially stable and unstable networks. Authors explain in detail the procedures for mesh construction (initiation by the source, propagation...

    Provided By JATIT

  • White Papers // Apr 2011

    Efficient Method for Securely Managing Passwords

    A password is a secret string that is used for security and authentication purposes and to provide access to a resource. Therefore it is more vulnerable to attacks such as hacking, phishing, identity theft, Cyber stalking and website cloning. But it is difficult for humans to remember large no of...

    Provided By JATIT

  • White Papers // Apr 2011

    Actionable Filtering Themes in Executive Information Systems for Managing Information Overload

    Executives are subjected to relentless onslaught of information. Many strategies have been suggested in the past to negotiate the torrents of information flows confronting executives. This paper recommends modifying the structure of information flows reaching the executives as an effective strategy to manage information overload. Such a strategy will enhance...

    Provided By JATIT

  • White Papers // Apr 2011

    Designing and Implementation of Electronic Payment Gateway for Developing Countries

    In this paper a brief overview of electronic payment gateway is provided. This paper addresses the requirements for an electronic payment gateway from both the customers' and the merchants' point of view. Most of the population doesn't trust on the local existing online payment gateway because it is not very...

    Provided By JATIT

  • White Papers // Apr 2011

    Uniplanar Quasi Yagi Antenna for Channel Measurements at X Band

    Uniplanar quasi yagi antenna has gained considerable attention recently as a method of producing a broad bandwidth antenna array with a well defined end-fire radiation pattern. An important advantage of the novel quasi-yagi antenna designed in x-band is its ability to be scaled linearly to any frequency band. This paper...

    Provided By JATIT

  • White Papers // Apr 2011

    Performance Evaluation of Microstrip Square Patch Antenna on Different Substrate Materials

    The demand of small size electronic systems has been increasing for several decades. The physical size of systems is reduced due to advancements in integrated circuits. With reduction in size of electronic systems, there is also an increasing demand of small and low cost antennas. Patch antennas are one of...

    Provided By JATIT

  • White Papers // Apr 2011

    An Implementation of ODBC Web Service

    Web applications built using .NET technologies usually access relational databases via ODBC API. This requires a database system specific ODBC driver to be installed on the application side. On the other hand, a paradigm shift is taking place in web application architectures. Future web applications will be built around Service-Oriented...

    Provided By JATIT

  • White Papers // Apr 2011

    The Directs Impact to Pre-Filtering Process to Weather Dataset

    Monitoring through of data near real-time (dynamic data), in this paper, the authors address the issue of efficiently monitoring the satisfaction of sequential process to receive on the way to data storage. The research question then they is answer is how is it possible to monitor and efficiently fulfill the...

    Provided By JATIT

  • White Papers // Apr 2011

    Single Repository for Software Component Selection (SRSCS): A Reusable Software Component Selection Technique

    This paper contributes a novel approach for selection of reusable components based on Functional Requirements using SRSCS (Single Repository for Software Component Selection) mechanism. Different repositories are available for reusable components and to select the best qualifying component from those repositories, customers must visit all those one by one and...

    Provided By JATIT

  • White Papers // Apr 2011

    Performance Evaluation of Page Removal Policies

    Web caching is an important technique to scale the Internet. One important performance factor of Web caches is the page replacement policies. Due to specific characteristics of the World Wide Web, there exist a huge number of proposals for cache replacement. Furthermore, the paper discusses the importance of cache replacement...

    Provided By JATIT

  • White Papers // Nov 2009

    A Conceptual Framework for Supply Chain Coordination in Fuzzy Environment

    Supply chain management is concerned with the coordination of material, information and financial flows within and across often legally separated organizational units. With the recent advances in information technology, real time data exchange has become feasible and affordable. As a result, an equally (if not more) important issue for supply...

    Provided By JATIT

  • White Papers // Nov 2009

    An Algorithm to Select the Optimal Composition of the Services

    Because of providing services to the users in the heterogeneous distributed environments, service oriented systems are very important. Most of the time, the individual services do not have the sufficient conditions to provide any services to the users. In order to resolve the aforementioned problem, one may compose several individual...

    Provided By JATIT

  • White Papers // Nov 2009

    Analysing the Impact of Issues' Kinds on Negotiation Features in Autonomous E-Commerce Contexts

    Negotiation is being known as a main form of communication in contexts including multiple autonomous agents. One of these fundamental contexts would be autonomous e-commerce contexts in which human traders will be substituted by trader agents. In spite of ignorance of its role in previous researches, a prominent factor that...

    Provided By JATIT

  • White Papers // Nov 2009

    To Improve Bit Error Rate of Turbo Coded OFDM Transmission Over Noisy Channel

    Orthogonal Frequency Division Multiplexing (OFDM) has become a popular modulation method in high speed wireless communications. By partitioning a wideband fading channel into flat narrowband channels, OFDM is able to mitigate the detrimental effects of multipath fading using a simple one-tap equalizer. There is a growing need to quickly transmit...

    Provided By JATIT

  • White Papers // Nov 2009

    Performance Measures of a Computer Network System

    This paper analyses the reliability of computer network system consists of a server and two subsystems connected in parallel. In this way whole system will down only when both the subsystems are down or server fails. By supplementary variable technique it is concluded that Steady state transition probability is around...

    Provided By JATIT

  • White Papers // Nov 2009

    Optial Web Service Composition Using Hybrid GA-TABU Search

    Web services are autonomous software systems identified by URIs which can be advertised, located, and accessed through messages encoded according to XMLbased standards (e.g., SOAP, WSDL, and UDDI) and transmitted using Internet protocols. Web services encapsulate application functionality and information resources and make them available through programmatic interfaces, as opposed...

    Provided By JATIT