JATIT

Displaying 241-257 of 257 results

  • White Papers // Oct 2008

    Review and Implications of Time Division Multiple Access Techniques for Wireless Environment Services and Applications

    Time Division Multiple Access (TDMA) is a channel access method for shared medium (usually radio) networks. It allows several users to share the same frequency channel by dividing the signal into different timeslots. The users transmit in rapid succession, one after the other, each using his own timeslot. This allows...

    Provided By JATIT

  • White Papers // Oct 2008

    The Effects of Global Positioning System for Reliable Positioning, Navigation and Timing Services

    The Global Positioning System (GPS) is a U.S. space-based radionavigation system that provides reliable positioning, navigation, and timing services to civilian users on a continuous worldwide basis - freely available to all. GPS provides specially coded satellite signals that can be processed in a GPS receiver, enabling the receiver to...

    Provided By JATIT

  • White Papers // Oct 2008

    The Implementation and Evaluation of an Online Course Authoring Tool (OCATLO)

    This paper presents the development of bilingual e-learning system and reports on its usability on a set of computing courses according to a specific e-content development methodology. The system is organized into five layers. The selection of layers and their inter-dependencies is intended to make the functional responsibility clearer and...

    Provided By JATIT

  • White Papers // Oct 2008

    Genetic Zone Routing Protocol

    In multi-hop wireless networks such as ad hoc networks, mobile users need to communicate where there is no fixed networking infrastructure or no time to create such an infrastructure. The idea of ad hoc networking is sometimes also called infrastructure-less networking. Mobile Ad hoc NETworks (MANETs) are created dynamically. The...

    Provided By JATIT

  • White Papers // Sep 2008

    Watermarking Using Neural Network and Hiding the Trained Network Within the Cover Image

    The major source of communication in present world is digital media. As it is quite easy to manipulate a digital media, it becomes essential to protect the digital information by legitimate means. Digital Watermarking has evolved as one of the latest technologies for digital media protection. Many techniques based on...

    Provided By JATIT

  • White Papers // Sep 2008

    WAN Cloud Access Link Utilizations for Compressed Video

    There are a number of different video compression standards. Most of them are variations of the work of two different committees. The International Telephony Union's Specialist Group on Coding for Visual Telephony and the International Standards Organization's motion picture expert group, known as MPEG. The most popular standards are the...

    Provided By JATIT

  • White Papers // Sep 2008

    Deriving Cluster Knowledge Using Rough Set Theory

    Clustering algorithms gives general description of the clusters listing, number of clusters, and member entities in those clusters. It lacks in generating cluster description in the form of pattern. Deriving pattern from clusters along with grouping of data into clusters is important from data mining perspective. In the proposed approach...

    Provided By JATIT

  • White Papers // Sep 2008

    A Reinforced Evolution-Based Approach to Multi-Resource Load Balancing

    A fundamental goal in computer science is to provide an algorithm which would determine an optimal solution in acceptable time. Computational Complexity Theory is the field which studies the efficiency of computation; its major goals are to find efficient algorithms for natural problems or to show that no efficient solutions...

    Provided By JATIT

  • White Papers // Sep 2008

    Agent Based University Planning of Sakarya University: "CAWIS" Project

    The core aim of Agent Based University Planning project of Sakarya University is designing and implementation of a system that is based on Distributed Artificial Intelligence technique for scheduling and planning to face the problems that often takes place in a university administration division. This paper particularly focuses on course...

    Provided By JATIT

  • White Papers // Sep 2008

    Voice Based Hardware Controller

    The day is not far away, where, computer peripherals will perform tasks by taking commands from the most natural form of communication: the human voice. Yes, this idea of developing a voice operable hardware device by using the speech recognition technology is to develop a basic application which demonstrates a...

    Provided By JATIT

  • White Papers // Aug 2008

    Performance Analysis of DWDM

    Dense Wavelength Division Multiplexing (DWDM) is a key component of the world's communications infrastructure. The tremendous growth in telecommunications services is possible today in part through optical networks, where DWDM systems allow much greater bandwidth over existing optical systems. Telecommunication companies have sought out such technologies to help respond to...

    Provided By JATIT

  • White Papers // Aug 2008

    Multiscale Feature and Single Neural Network Based Face Recognition

    This research paper deals with the implementation of face recognition using neural network (recognition classifier) on multi-scale features of face (such as eyes, nose, mouth and remaining portions of face). The proposed system contains three parts, preprocessing, multi scale feature extraction and face classification using neural network. The basic idea...

    Provided By JATIT

  • White Papers // Aug 2008

    An Agent Based Intelligent Tutoring System for Parameter Passing in Java Programming

    The authors have developed an agent based intelligent tutoring system for the parameter passing mechanisms in computer science, an introductory Java programming language, in Al-Azhar University in Gaza. The agent based intelligent tutoring system helps students better understand parameter passing mechanisms in Java using problem based technique. In this paper,...

    Provided By JATIT

  • White Papers // Aug 2008

    Database Algebras

    As computers become larger (in capacity), smaller (in size), and more powerful, it becomes easier to do more complex things with them than could be done in the past. This is as true of DataBase Management Systems (DBMSs) as of any other type of software. The central feature of a...

    Provided By JATIT

  • White Papers // Aug 2008

    Assignment of Tasks on Parallel and Distributed Computer Systems With Network Contention

    Rapid advances in communications technology and the proliferation of inexpensive PCs and workstations have created a wide avenue for Distributed Computing Systems to move into mainstream computing. A Distributed Computing System (DCS) consists of a number of PCs or workstations interconnected through PPP, LAN or WAN. These systems provide a...

    Provided By JATIT

  • White Papers // Aug 2008

    The Role of ATM Technology in Future Data Communication Systems

    Demand for quick access to Web-based applications and real-time delivery of multimedia transmissions via an integrated network infrastructure drives implementation of ATM (Asynchronous Transfer Mode) broadband solutions. ATM is a high-performance technology that provides bandwidth on-demand for seamless transport of full-motion video, audio, data, animations, and still images in local...

    Provided By JATIT

  • White Papers // Aug 2008

    Realization of a New Fuzzy Mixed Metric Approach for Optimizing Routing Decisions in Packet Switched Networks

    The paper illustrates a new fuzzy approach for optimizing routing decisions. This illustration is being done, here, using packet switched networks. It implements the approach and analyzes the new coherent formats of link-state packets and routing table accrued from the implementation of approach. In this algorithm, each node in the...

    Provided By JATIT

  • White Papers // Aug 2008

    Multiscale Feature and Single Neural Network Based Face Recognition

    This research paper deals with the implementation of face recognition using neural network (recognition classifier) on multi-scale features of face (such as eyes, nose, mouth and remaining portions of face). The proposed system contains three parts, preprocessing, multi scale feature extraction and face classification using neural network. The basic idea...

    Provided By JATIT

  • White Papers // Aug 2008

    An Agent Based Intelligent Tutoring System for Parameter Passing in Java Programming

    The authors have developed an agent based intelligent tutoring system for the parameter passing mechanisms in computer science, an introductory Java programming language, in Al-Azhar University in Gaza. The agent based intelligent tutoring system helps students better understand parameter passing mechanisms in Java using problem based technique. In this paper,...

    Provided By JATIT

  • White Papers // Aug 2008

    Database Algebras

    As computers become larger (in capacity), smaller (in size), and more powerful, it becomes easier to do more complex things with them than could be done in the past. This is as true of DataBase Management Systems (DBMSs) as of any other type of software. The central feature of a...

    Provided By JATIT

  • White Papers // Aug 2008

    Assignment of Tasks on Parallel and Distributed Computer Systems With Network Contention

    Rapid advances in communications technology and the proliferation of inexpensive PCs and workstations have created a wide avenue for Distributed Computing Systems to move into mainstream computing. A Distributed Computing System (DCS) consists of a number of PCs or workstations interconnected through PPP, LAN or WAN. These systems provide a...

    Provided By JATIT

  • White Papers // Aug 2008

    The Role of ATM Technology in Future Data Communication Systems

    Demand for quick access to Web-based applications and real-time delivery of multimedia transmissions via an integrated network infrastructure drives implementation of ATM (Asynchronous Transfer Mode) broadband solutions. ATM is a high-performance technology that provides bandwidth on-demand for seamless transport of full-motion video, audio, data, animations, and still images in local...

    Provided By JATIT

  • White Papers // Aug 2008

    Realization of a New Fuzzy Mixed Metric Approach for Optimizing Routing Decisions in Packet Switched Networks

    The paper illustrates a new fuzzy approach for optimizing routing decisions. This illustration is being done, here, using packet switched networks. It implements the approach and analyzes the new coherent formats of link-state packets and routing table accrued from the implementation of approach. In this algorithm, each node in the...

    Provided By JATIT

  • White Papers // Nov 2008

    Studies on the Performance Improvement of Window Adjustment Procedure in High Bandwidth Delay Product Network

    High bandwidth environment is useful for sending large volumes of data within short period of time. As there is a growing demand for high bandwidth networks, data transfer must take place without any congestion. Hence attempts have been made to find a suitable window adjustment procedure for congestion avoidance. In...

    Provided By JATIT

  • White Papers // Dec 2010

    Software Risks and Mitigation in Global Software Development

    The Global Software Development is becoming so much complex and challengeable as the scope of the problem domain of the user increases day by day advancement. In today's modern world of engineering development, almost all projects suffer from some unwanted threats called risks which can seriously affect the quality, cost...

    Provided By JATIT

  • White Papers // Jan 2011

    Electronic Toll Collection System Using Passive RFID Technology

    This paper focuses on an Electronic Toll Collection (ETC) system using Radio Frequency IDentification (RFID) technology. Research on ETC has been around since 1992, during which RFID tags began to be widely used in vehicles to automate toll processes. The proposed RFID system uses tags that are mounted on the...

    Provided By JATIT

  • White Papers // Jan 2011

    On the Security of Firewall Policy Deployment

    Due to the sensitive nature of information transmitted during a policy deployment, the communication between management tool and firewall should be confidential. Confidentiality can be achieved by using encrypted communication protocols such as SSH, SSL and IPSec. Much research has already addressed the specification of policies, conflict detection and optimization,...

    Provided By JATIT

  • White Papers // Jan 2011

    QoS Formal Specification of Engineering Language

    Distributed systems can be very large and complex and the many different considerations which influence their design can result in a substantial body of specification, which needs a structuring framework if it is to be managed successfully. The purpose of the RM-ODP is to define such a framework. The Reference...

    Provided By JATIT

  • White Papers // Jan 2011

    Real Time Warning System Design for Web Deface Based on Short Message Service

    Currently the internet is becoming more important in many aspects of human life. The number of people who use the internet in daily activities is also increasing. The rapid growing of computer networks and the interconnection among them has entailed some security problems. There are a growing number of bad-intentioned...

    Provided By JATIT

  • White Papers // Jan 2011

    Comprehensive Analysis of Complex Data Structures for Graph Data Mining

    Various methods and techniques are prevailing for processing data to extract useful knowledge; nevertheless they are accounted for business transaction databases. Much data exists in non-business domains also, where there is an ardent need of extracting knowledge. Knowledge is useful for understanding data concisely or comprehending the concepts in a...

    Provided By JATIT

  • White Papers // Jan 2011

    An Enhanced Three Levels Security Policy

    Design and implementation of intrusion detection systems remain an important research issue in order to maintain proper network security. Despite the undeniable progress in the area of computer security there is still much to be done to improve security of today's computer systems and so many mechanisms have been developed...

    Provided By JATIT

  • White Papers // Jan 2011

    Best Target Platform for Application Migration

    According to the latest surveys about programming language popularity, most companies deciding to develop an enterprise application preferred to use one of the cross-platform programming languages for development. Most of the reasons given for using cross-platform programming language are related to their prominent features such as flexibility and portability. Furthermore,...

    Provided By JATIT

  • White Papers // Feb 2011

    A Conceptualized Model for Enhancing Non-repudiation in University E-Form Processing

    Most organizations use one form of online registration or another. Since these registration forms are structured to be open and available to users, many of them do not afford or seem to require basic security measures like access control measures or even basic passwords. This however implies that the authenticity...

    Provided By JATIT

  • White Papers // Feb 2011

    The Impact of Change Management in ERP System: A Case Study of Madar

    This paper discusses Enterprise Resource Planning (ERP) - change management. A review of the research literature has been presented that focuses on the ERP change management factors. The literature is further classified and the major outcomes of each study have been addressed in this paper. The discussion is supported by...

    Provided By JATIT