JATIT

Displaying 201-221 of 221 results

  • White Papers // Nov 2009

    Analysing the Impact of Issues' Kinds on Negotiation Features in Autonomous E-Commerce Contexts

    Negotiation is being known as a main form of communication in contexts including multiple autonomous agents. One of these fundamental contexts would be autonomous e-commerce contexts in which human traders will be substituted by trader agents. In spite of ignorance of its role in previous researches, a prominent factor that...

    Provided By JATIT

  • White Papers // Nov 2009

    To Improve Bit Error Rate of Turbo Coded OFDM Transmission Over Noisy Channel

    Orthogonal Frequency Division Multiplexing (OFDM) has become a popular modulation method in high speed wireless communications. By partitioning a wideband fading channel into flat narrowband channels, OFDM is able to mitigate the detrimental effects of multipath fading using a simple one-tap equalizer. There is a growing need to quickly transmit...

    Provided By JATIT

  • White Papers // Nov 2009

    Performance Measures of a Computer Network System

    This paper analyses the reliability of computer network system consists of a server and two subsystems connected in parallel. In this way whole system will down only when both the subsystems are down or server fails. By supplementary variable technique it is concluded that Steady state transition probability is around...

    Provided By JATIT

  • White Papers // Nov 2009

    Optial Web Service Composition Using Hybrid GA-TABU Search

    Web services are autonomous software systems identified by URIs which can be advertised, located, and accessed through messages encoded according to XMLbased standards (e.g., SOAP, WSDL, and UDDI) and transmitted using Internet protocols. Web services encapsulate application functionality and information resources and make them available through programmatic interfaces, as opposed...

    Provided By JATIT

  • White Papers // Mar 2010

    Implementation of BB84 Protocol on UDP 802.11i

    Cryptography nowadays is looking for a secure and trusted channel especially in key distribution between two legitimate parties without being intercepted or deciphered by intruders either in wireless or wired communication medium. The invention of Quantum Cryptography as part of quantum mechanics has solved the key distribution problem in cryptosystem...

    Provided By JATIT

  • White Papers // Dec 2009

    GPU Programming Paradigm

    Using the Graphics Processing Unit (GPU) to accelerate general-purpose computations has become an important technique in scientific research. However, the development complexity is significantly higher than for CPU-based solutions, due to the mainly graphics-oriented concepts and development tools for GPU-programming. As a consequence, general-purpose computations on the GPU are mainly...

    Provided By JATIT

  • White Papers // Dec 2009

    Study of Different Attacks on Multicast Mobile Ad Hoc Network

    Multicast network support is becoming an increasingly important technology for both military and commercial distributed and group based applications. The security services such as confidentiality, authenticity and data integrity are necessary for both wired and wireless networks to protect basic applications. In this paper the authors present a simulation based...

    Provided By JATIT

  • White Papers // Jan 2010

    Comparison of BER Between Uncoded Signal and Coded Signal (using Convolution Code) Over Slow Rayleigh Fading Channel

    Fading problem is a major impairment of the wireless communication channel. To mitigate the fading problem and to have reliable communications in wireless channel, channel coding technique is often employed. In this paper the BER (Bit Error Rate) performances are shown from analytically and by means of simulation for Rayleigh...

    Provided By JATIT

  • White Papers // Jan 2010

    New Approximation for Handoff Rate and Number of Handoff Probability in Cellular Systems Under General Distributions of Call Holding Time and Cell Residence Time

    In cellular networks, quantities such as number of handoff probability and handoff rate are very important parameters in the cellular system performance analysis. In previous literature, several techniques were introduced to evaluate these parameters; however, there are some limitations in the introduced techniques. In this paper, the authors approximate number...

    Provided By JATIT

  • White Papers // Apr 2010

    Capacity and V-Blast Techniques for MIMO Wireless Channel

    In wireless communications, spectrum is a scarce resource and hence imposes a high cost on the high data rate transmission. Fortunately, the emergence of multiple antenna system has opened another very resourceful dimension - space, for information transmission in the air. It has been demonstrated that multiple antenna system provides...

    Provided By JATIT

  • White Papers // Apr 2010

    Model Based Object-Oriented Software Testing

    Testing is an important phase of quality control in Software development. Software testing is necessary to produce highly reliable systems. The use of a model to describe the behavior of a system is a proven and major advantage to test. In this paper, the authors focus on model-based testing. The...

    Provided By JATIT

  • White Papers // Apr 2010

    Provably Secured Two Server Hash Password Authentication

    The techniques of Secured Socket Layer (SSL) with client-side certificates for commercial web sites rely on a relatively weak form of password authentication. Browser sends a user's plaintext password to a remote web server using SSL is vulnerable to attack. In common password attacks, hackers exploit the fact that web...

    Provided By JATIT

  • White Papers // May 2010

    Performance Analysis of Different M-ARY Modulation Techniques in Fading Channels Using Different Diversity

    The comparison of Symbol Error Probability (SEP) for different M-ary modulation techniques over slow, flat, identically independently distributed Rician fading channel is presented in this paper. Because fading is one of the major limitations in wireless communication, so modulation technique with diversity is used to transmit message signal efficiently. Exact...

    Provided By JATIT

  • White Papers // May 2010

    Evolution of Power Efficient Data Fusion Assurance Scheme for Wireless Sensor Networks

    Wireless sensor networks processing sensitive data are facing the risks of data manipulation, data fraud and sensor destruction or replacement. However, the practical deployment of sensor networks faces many challenges imposed by real-world demands. Sensors are deployed in open environments, and hence are vulnerable to physical attacks, potentially sensor networks...

    Provided By JATIT

  • White Papers // May 2010

    Measuring Quality of Web Site Navigation

    The primary goal of this paper is to identify the elements involved in quality assessment of website structure. Always quality of website structure is based on its navigability, average number of clicks and structural complexity. The web tool PowerMapper is used to establish the sitemap for the website, path length...

    Provided By JATIT

  • White Papers // May 2010

    A Pragmatic Approach to Software Reuse

    Software reuse has become a topic of much interest in the software community due to its potential benefits, which include increased product quality and decreased product cost and schedule. The most substantial benefits derive from a product line approach, where a common set of reusable software assets act as a...

    Provided By JATIT

  • White Papers // May 2010

    Utran Cryptrographic Algorithms Operation and Complexity Study

    The Universal Mobile Telecommunications System (UMTS) offers panoply of 3G services that require a high protection of the transmitted information. In the present paper, the authors are interested by network access security, especially the protection of the data integrity and the provisioning of data encryption. A special interest will be...

    Provided By JATIT

  • White Papers // May 2010

    Test Scheduling Optimization for Embedded Core Testing

    Test scheduling is crucially important for optimal SoC test automation in allocating the limited available test resources. To assign test resource, this paper introduces a fuzzy based engine. Test pipelining is used to minimize the time of testing the SoC. The power consumption during the test process should be under...

    Provided By JATIT

  • White Papers // May 2010

    An Agent-Oriented Executive Model for Service Choreography

    Quick changes in requirements and opportunities in world market need different levels of cross-organizational collaboration for integrating distributed information systems, information sharing and coordination of organizational processes. Nowadays, Web Services are the most common technology to meet these requirements. Web Services Choreography Description Language (WS-CDL), a World Wide Web Consortium...

    Provided By JATIT

  • White Papers // Mar 2010

    A New Method of Fingerprint Authentication Using 2D Wavelets

    A new approach for fingerprint verification, based on wavelets and Pseudo Zernike Moments (PZMs), is discussed. PZMs are robust to noisy images, invariant to rotation and have a good image reconstruction capability. PZMs have been used for global analysis and so they are used to extract global features (the shape...

    Provided By JATIT

  • White Papers // May 2010

    An Algorithm to Determine Energy-Aware Maximal Leaf Nodes Data Gathering Tree for Wireless Sensor Networks

    The authors propose an Energy-aware Maximal Leaf Nodes Data Gathering (EMLN-DG) algorithm for periodic data collection and transmission in wireless sensor networks. For each round of data gathering, an EMLNDG tree spanning the entire sensor network is formed based on the residual energy level available at the nodes and the...

    Provided By JATIT