Journal of Theoretical and Applied Information Technology

Displaying 1-40 of 581 results

  • White Papers // Aug 2014

    Dualistic Side by Side Endorsement of Multicast Protocol by Dynamic Clustering in MANET

    Source authentication and message integrity become a fundamental requirement for ad-hoc network. Clustering is an effective technique to reduce overhead and ensure scalability which the authors are using in this paper. The proposed work is new Tiered Authentication scheme for Multicast traffic (TAM), using dynamic clustering algorithm .The algorithm modifies...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Aug 2014

    Energy Efficient Traffic Capacity Improvement in Wireless Networks

    Wireless communication has seen rapid technological advancements in recent years. Wireless mesh network and ad-hoc network are types of wireless networks. Both are multihop networks: in wireless ad hoc networks the mobility of the relay nodes is very high when compared to the low mobility of the relay nodes in...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Aug 2014

    Proficient Algorithm for Superior Warning Message Broadcast in VANET

    In the past few decades, the number of vehicles on road has been rapidly increasing. Due to this high density of vehicles, road accidents and the potential threats on road are also increasing. To reduce these factors, Vehicular Ad-hoc NETworks (VANET) technology which uses moving car as nodes in a...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Aug 2014

    VANETs and Its Related Issues: An Extensive Survey

    Vehicular Ad hoc NETworks (VANETs) is a type of ad hoc network whereby its nodes are represented by vehicles. It originated from the desire to ensure drivers comfort and safety in road transportation so as to reduce the risk of accidents on the roads. VANETs have some unique features that...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Aug 2014

    Enhanced Ad Hoc on Demand Multipath Distance Vector for MANETs

    Mobile Ad hoc NETworks (MANETs) include wireless devices communicating over bandwidth-constrained links with nodes being free to move, join or leave network. Limited range wireless communication and node mobility ensure that nodes cooperate with each other to network and with underlying network, dynamically changing to meet needs continually. This research...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Aug 2014

    Multi-Level AES Design Security: From SystemC-TLM to FPGA

    Advanced Encryption Standard (AES) cryptographic system is widely used in embedded systems to secure secret information. One of the most powerful cryptanalysis techniques against the cryptographic systems is the fault injection attacks. The complexity of cryptographic systems is increasing which requires fast security attacks simulation against fault injection attacks. The...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Aug 2014

    Memorability Rates of Graphical Password Schemes

    Passwords authentication has become a widely recognized element of computer security for confirming users' identity before access can be granted or repudiated to an intended information contents or applications of the system. Graphical password schemes are a login option that use images instead of alphanumeric strings for the purpose of...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Aug 2014

    Geographic Relay Region Based Power Aware Routing in Wireless Sensor Networks

    Power aware routing is a powerful localized routing scheme for Wireless Sensor Networks (WSNs) due to its scalability and efficiency. Maintaining neighborhood information for packet forwarding may not be suitable for WSNs in highly dynamic scenarios. Beacon-based protocols are maintaining neighbor information but do not comply on energy efficiency. The...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Aug 2014

    Performance Evaluation of Cross Layer Based AODV Protocol Using Multipath Gateway Route Discovery for MANETs

    The Quality of Service (QoS) is a fundamental attribute of MANETs that makes an impression on the performance of the network, when connected to the internet. Several authors have proposed some solutions to improve the performance of the integration of mobile ad hoc network and internet to achieve effective data...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Aug 2014

    Network Intrusion Detection System: An Improved Architecture to Reduce False Positive Rate

    Counting Bloom Filter (CBFs) is widely employed in networking applications. They support membership queries with minimal error and surmount the drawback of Bloom filters. However, they engross large amount of memory. A new Sidon sequence based CBF is introduced to improve the competency of the CBFs. Unlike CBF, the hashed...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Aug 2014

    Congestion Prediction in Wireless Network Using Gene Expression Programming Technique

    Congestion control is very important in any network to provide a good quality of service. This paper implementing a network based congestion control technique using gene expression programming. Congestion is caused when the number of packets stored at the router buffer exceeds the total capacity of the buffer. Under this...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Aug 2014

    Proactive Routing with Early Congestion Detection in MANET

    Ad hoc mobile networks are composed of mobile nodes communicating through wireless medium, without any fixed backbone infrastructure. In these networks, congestion occurs in any intermediate node, when data packets travel from the source to the destination, and they incur high packet loss and long delay, which cause the performance...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Aug 2014

    A Power Aware Transmission Scheme Selection With Data Aggregation for Wireless Sensor Networks

    Many sensor applications today demand the need of extended lifetime. Among the most popular approaches which address this issue, Multiple Input Multiple Output (MIMO) and Single Input Single Output (SISO) techniques explore environment-specific performance constraints of achieving this target. Under a constant bit error rate, MIMO saves a considerable transmit...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Aug 2014

    A Survey on Secured Searching Techniques for Effective Data Utilization in Public Cloud

    Recent technology advances have made the success of cloud computing by acquiring the infrastructure, platform and software from the third party vendor. The promising benefit of cloud computing is data service outsourcing, by which the data owners stores their data in the public data centers by economically saving their capital...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Aug 2014

    Secured Smart Home Energy Monitoring System (SSHEMS) Using Raspberry Pi

    In this paper, the authors deal with the design and implementation of secure home automation using Raspberry Pi for mobile devices that leverage mobile technology to provide essential security to their homes and associated control operations. The proposed home security solution hinges on their novel integration of cameras and motion...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Aug 2014

    Performance Evaluation of Dynamic Source Routing Under Black Hole Attack

    Mobile Ad hoc NETwork (MANET) is a network that does not have a fixed infrastructure and have the ability to manage its network independently. It consists of a collection of \"Peer\" mobile nodes that are capable of communicating with each other. Nodes within each other's radio range, communicate directly via...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Aug 2014

    Robustness of Localization Accuracy for Wireless Sensor Networks Under Physical Attacks

    Wireless sensor network localization is an important area that attracted significant research interest. This interest is expected to grow further with the proliferation of wireless sensor network applications. As localization is becoming popular, many attacks on the localization process are also on a rise. These attacks confuse the localization process...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Aug 2014

    Error Minimization in Localization of Wireless Sensor Networks Using Differential Evolution with Mobile Anchor Positioning (DE - MAP) Algorithm

    Sensor node localization is considered to be one of the most critical issues in a Wireless Sensor Network (WSN). The objective of localization is determination of physical co-ordinates of a group of sensor nodes. The location information plays a vital role for coverage, deployment of sensor nodes and rescue operations....

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Aug 2014

    Development of Coverage Based Cell Selection Algorithm for WiMAX

    Fourth Generation (4G) mobile systems focus on effortlessly incorporating the existing wireless technologies like GSM, wireless LAN, and Bluetooth. This contrasts with Third Generation (3G), which simply focuses on developing new standards and hardware. WiMAX have been rapidly emerging in the last few years. The mobile subscriber and traffic volume...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Aug 2014

    Graph Based Rational Text Clustering Using Semantic Ontology

    Text clustering methods have been discussed with various factors. The authors have the goal and problem of making decision with rationality factors about how much information is available or how complete the document about the knowledge. They propose a new rational text clustering algorithm using the semantic ontology. The documents...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Aug 2014

    Improvement of Algorithm for Updating Firewall Policies

    Security issues are becoming more critical in network systems. Firewalls offer an important defense and protection for network, permit to strengthen security aspect. Firewalls are network devices or programs which enforce an organization's security policy, permit to control and monitor the traffic flow of network; they are installed between networks...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Aug 2014

    Distributed and Secured Dynamic Pseudo ID Generation for Privacy Preservation in Vehicular Ad Hoc Networks

    Safety applications in Vehicular Ad hoc NETworks (VANET) needs to be handled with at most care such that no adversary will be allowed to intrude the privacy of the user. Replacement of original IDs with pseudo IDs makes this possible. Generating and storing a set a pseudo IDs by the...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Aug 2014

    Arima Model-Based RTT Estimation for Congestion Avoidance Mechanism in Asymmetric Networks

    The delay-based congestion control mechanism performs well over the bandwidth-symmetric network rather than bandwidth-asymmetric network. The upstream and downstream link of asymmetric network has different bandwidth i.e. high bandwidth in the downstream link and low bandwidth in the upstream link. Therefore, mostly the bottleneck link is the upstream link, not...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Aug 2014

    Enhanced Minimum Secured Routing Path for Mobile Ad-Hoc Networks

    The Enhanced Minimum Secured Routing (EMSR) path algorithm develops a new routing path from source to the destination based on the ascending order of the edge, the ascending order edge is get connected, in order to avoid congestion in routing path in Mobile Ad hoc NETworks (MANETs). The routing is...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jul 2014

    Maliciousness in Mobile Ad Hoc Networks: A Performance Evaluation

    Mobile Ad hoc NETworks (MANETs) combine wireless communication with high node mobility. Limited wireless communication range and node mobility ensure that nodes cooperate with each other to provide networking, with network dynamically changing to ensure needs are met continually. The protocols dynamic nature enables MANET operation as suited to deployment...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jul 2014

    A Multi-Objective Approach for Energy Efficient Clustering Using Comprehensive Learning Particle Swarm Optimization in Mobile Ad-Hoc Network

    A Mobile Ad-hoc NETwork (MANET) faces various challenges including limited energy, limited communication bandwidth, computation constraint and cost. Therefore, clustering of sensor nodes is adopted which involves selection of cluster-heads for each cluster. This enhances system performance by enabling bandwidth reuse, better resource allocation and improved power control. The various...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jul 2014

    TSAAC: Threshold Sensitive Assistant Aided Clustering Protocol for Heterogeneous WSNs Using Niching Particle Swarm Optimization

    The energy efficiency and improvement in network's lifetime are some of the critical issues in Wireless Sensor Networks (WSNs). Remote environmental monitoring and target tracking are the important applications of a wireless sensor network. In this paper, TSAAC (Threshold Sensitive Assistant Aided Clustering) a heterogeneous protocol using Niching Particle Swarm...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jul 2014

    Cooperative Packet Delivery Using Enhanced Cooperative Opportunistic Routing Scheme (ECORS) in MANET

    Cooperative communication is an active area of research today. It enables the nodes to achieve spatial diversity, which leads to tremendous improvement in system capacity and delay. In this proposed system cooperative communication mechanism is used to determine a list of intermediate relay nodes that follows en-route to the destinations....

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jul 2014

    Optimized Priority Assignment Scheme for Congested Wireless Sensor Networks

    Congestion is a likely event in wireless sensor networks due to node density and traffic convergence. Congestion can decrease network lifetime and reduce information accuracy. Transferring crucial data during congestion is a challenging problem in wireless sensor network. To achieve this, the authors have proposed a competent data delivery protocol...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jul 2014

    Symbolic Data Conversion Method Using the Knowledge-Based Extraction in Anomaly Intrusion Detection System

    In anomaly intrusion detection systems, machine learning algorithms, e.g. KNN, SOM, and SVM, are widely used to construct a model of normal system activity that are designed to work with numeric data. Consequently, symbolic data (e.g., TCP, SMTP, FTP, OTH, etc.) need to be converted into numeric data prior to...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jul 2014

    Resource Median Multicast Routing Protocol for Energy Controlled Multipath Communication in Wireless Ad-Hoc Network

    Many applications in network consisting of scattered interactive method, software improvements and replica model for distributed database envisages optimized routing, scheduling and data dispersal schemes. A large wireless ad-hoc network broadcast messages from the source to all the elements in a multicast group. Certain research works based on the Design-based...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jul 2014

    Offline Handwritten Signature Verification Using Back Propagation Artificial Neural Network Matching Technique

    Handwriting is a skill that is highly personal to individuals and consists of graphical marks on the surface in relation to a particular language. Signatures of the same person can vary with time and state of mind. Several studies have come up with several methods on how to detect forgeries...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jul 2014

    Two-Ways Database Synchronization in Homogeneous DBMS Using Audit Log Approach

    Data integration is the most important part in applying distributed database, in which data from various data source can be united by implementing integration. Data replication is one of the data integration forms which is very popular nowadays, since it is convenient or it can do backup towards data in...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jul 2014

    Hybrid Optimization Algorithm for Geographic Routing in VANET

    Vehicular Ad-hoc NETworks (VANETs) developed rapidly in the last decade which is widely used to improve safety and traffic efficiency. VANET is an active research, standardization and development area due to its potential to improve vehicle and road safety, traffic efficiency, and convenience keeping in mind drivers and passengers comfort....

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jul 2014

    A Novel Protection Guaranteed, QoT Aware RWA Algorithm for All Optical Networks

    All optical transparent networks carry huge traffic and any link failure or failure to restore the link failed light path can cause loss of gigabits of data; hence guaranteed protection becomes necessary at the time of failure. Many protection schemes were presented in the literature, but none of them speaks...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jul 2014

    An Integrated Model for Secure on Demand Resource Provisioning Based on Service Level Agreement (SLA) in Cloud Computing

    Cloud computing, as new paradigm of new century, provides various advantages and benefits for the organizations and individuals. Among them resource provisioning is a big advantage that supports cloud providers cloud resources with their users. Providing a secure way for resource provisioning is a critical issue, so that any neglect...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jul 2014

    A Novel R-SIP Cache Consistency Mechanism for Mobile Wireless Networks

    A computer network is one where the computer nodes that form the network are able to exchange data among them. A computer network can be established either using cable wires or wirelessly. In Mobile Ad hoc NETwork (MANETs), caching of data items among mobile nodes have become an inevitable solution...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jul 2014

    Dynamic Sensor Relocation Technique Based Light Weight Integrated Protocol for WSN

    In the past few years, it is observed and noticed that the authors are utilizing Wireless Sensor Networks (WSNs) with greater interest for various popular and crucial applications. It represents an emerging set of technologies that will have profound effects across a range of medical, industrial, scientific and governmental applications....

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jul 2014

    Energy Efficient MAC Protocol with Fairscheduling Technique in MANET

    In Mobile Ad hoc NETworks (MANETs), achieving fairness and increasing channel utilization are the important design goals of scheduling. However, these two goals contradict with each other. In this paper, a fair-scheduling technique for inelastic traffic flows in MANET is proposed. The network traffic is differentiated into two categories as...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jul 2014

    Autonomous Re-Configuration System with Route Stability in Wireless Networks

    In multihop wireless networks experience frequent link failure caused by channel interference, dynamic obstacles, and bandwidth demands. Because of this degradation the wireless networks require expensive manual network management recovery. This paper presents an Autonomous network Reconfiguration System (ARS) using AOMDV protocol and acknowledgement reception. The ARS enables the multi...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    A Network Management System for Epon Based on SNMP

    Now, the PON technologies become the preferred broadband access technology all over the world. In this paper, a network management system is designed for EPON. In Manager and Agent, the "Simple and Shortcut" protocol SNMP is adopted to develop the application program. As the Agent runs on the embedded system,...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    Honeypot Based Intrusion Management System: From a Passive Architecture to an IPS System

    In this paper, the authors are presenting an Intrusion Prevention System (IPS) based on multiple sensors in the network. These sensors are in fact honeypots built using honeyd. Honeyd is a high level honeypot which is very light and which is offering a lot of possibilities to get the most...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    Energy Efficient Distributed Image Compression Using JPEG2000 in Wireless Sensor Networks (WSNS)

    Restricted computational power, memory limitations, narrow bandwidth and energy supplied present strong limits in sensor nodes are the important points should be considered during the real time transmission of data using Wireless Sensor Networks. Therefore, maximizing network lifetime and minimizing energy consumption are always optimization goals. To reduce the energy...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Modeling to Compiling: Design and Implementation for Wireless Sensor Network System

    Based on the characteristics of the Wireless Sensor Network (WSN), researchers tend to ignore the system modeling of the complex system which is built by WSN and the central processor. Actually, the complex modeling method and code generation tool will cause a lot of manpower and time costs. Different from...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Optimal Approximate Algorithm to Solve Location-Selection of Recycle Water Station Problem

    The minimum Steiner tree problem has wide application background, such as transportation system, communication network, pipeline design and VISL, etc. It is unfortunately that the computational complexity of the problem is NP-hard. People are common to find some special problems to consider or find the approximate algorithm to solve different...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    A Secure Scheme for Heterogeneous Wireless Sensor Networks

    A secure scheme for heterogeneous Wireless Sensor Networks is presented. The Wireless Sensor Networks have some sensor nodes and heterogeneous sensor nodes that have greater power and transmission capability than other nodes have. All kinds of sensor nodes are evenly distributed respectively in entire sensing area that is divided into...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    A Safe RFID Authentication Protocol for Internet of Things

    Internet of Things (IoT) is the evolution of related technologies and applications such as Internet and mobile networks. Future research into IoT will focus on generic technology, information security, and critical applications. Based on IoT, the existing RFID system security mechanisms are analyzed, with a focus on cryptographic protocols. Investigate...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Algorithm Design of Secure Data Message Transmission Based on Openssl and VPN

    In order to solve the safety problem that remote or mobile users can perform secure data transmission among different computers via enterprise internal network, conventional approach is to establish VPN connection. The transmitted data via VPN network must be encrypted so as to ensure that illegal users are unable to...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Conceptual Model of Multi-Agent Business Collaboration Based on Cloud Workflow

    With the development of information and network technology, more and more enterprises adopt the networked manufacturing mode to improve their production, service, and operations. However, the current networked manufacturing mode cannot put the centralized resources into distributed services, which leads to a lower inter-enterprise business collaboration capability. This paper firstly...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    K-Means Method for Grouping in Hybrid Mapreduce Clusters

    In hybrid cloud computing era, hybrid clusters which are consisted of virtual machines and physical machines become more and more popular. MapReduce is a good weapon in this big data era where social computing and multimedia computing are emerging. One of the biggest challenges in hybrid mapreduce cluster is I/O...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Research on Resource Scheduling Algorithm Based on Fuzzy Clustering and Smart Agents in Cloud Computing

    Cloud computing has been a hot spot in recent years. In complex and dynamically changing cloud computing environment, resource management and scheduling is a hard and challenging problem, and should be solved at first. This paper presents an effective resource management model and the corresponding resource scheduling algorithm is based...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Modeling and Micro Scale Analyzing of Micro-Switch Applied in All-Optical Communication

    Inductive micro-switch is an integrative device of a sensor and actuator and widely applied in all-optical-network communication. Its malfunctions related to "Fail-to-closure" and "Transient-closure" result in low reliability and weak anti-jamming capability. A new bistable inductive micro-switch is presented based on Micro Electro-Mechanical System (MEMS) technology. A sine rough surface...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    SER-Minimization Relay Selection for Two-Way Relay Channels With Physical Layer Network Coding

    In this paper, the authors explore the relay selection scheme for two-way relay channels with Physical layer Network Coding (PNC), where two end nodes exchange information via a selected relay node with the minimal Symbol Error Rate (SER) performance among multiple candidate relay nodes. To reduce the computational complexity, they...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Hidden Hops Aware Load Balancing Based on Greedy Approach

    Virtual network mapping is one of the main problems in network virtualization. At present, virtual networking mapping aims at minimal resource consumption at substrate network, but ignores the resource demanded by the hidden hops, making bottlenecks due to the resource shortage at the hidden hops. This paper aims at the...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Secure Routing in MANET Using Asymmetric Graphs

    Identification of neighbors plays a major role of many protocols for Wireless Ad-hoc NETworks and also the process of network paths in a network plays an important role. Wormhole attack is a major issue in networks. This type of attack causes the opponent to collects packets from one location and...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Hardware and Software Implementation for Highly Secured Modified Wired Equivalent Privacy (MdWEP)

    Wireless communication networks are in huge need and demand due to various features of Internet and its availability and easy accessibility all over the world. Therefore, advanced security techniques and mechanism are required for private business application and for effective and secured data transfer from one network to other. Many...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Secure Key Sharing for Group Communication Under Community Cloud

    The cloud is one of the most discussed topics among IT professionals today, and organizations are increasingly exploring the potential benefits of using cloud computing or solutions for their businesses. In the users' modern world, people join hands together to form groups and that forms communities through which the ability...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Addressing Security and Privacy Issues in Cloud Computing

    Cloud computing offers a new way to deliver services while significantly changing the cost structure underlying those services. This new technical and pricing opportunities change in the way the business operate. It combines the features of traditional computing technology like grid, parallel and distributed computing and so on. The aim...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Application of Multi-Objective Weighing Work Scheduling Algorithm Into Storage Network

    The resource request task of transmission of large number of servers, wide-band resources in the enterprise storage gridding, the business distribution and download service are limited by scheduling length, time span, load balance, service quality, economic principles, security performance and many other factors, so it is difficult to use definite...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Simulation Service Management Bus in Service Oriented Run-Time Infrastructure

    As the SOA (Service-Oriented Architecture) is paid close attention by many researchers in recent years. It is a component model which can be defined as service according to business needs and can be taken as reusable shared resource. In this paper, Simulation Service Management Bus (SSMB) is proposed to intergrade...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    Network Intrusion Based on Cloud Network

    Cloud computing through the development of recent years has become a mature network technology, which have been or are being applied to a number of large-scale network server clusters, including computing, storage server, Internet resources etc. This paper aimed at the cloud cluster cyber source intrusion and malicious behavior, analyzes...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    A Two-Step Filtrate Localization Method for Wireless Sensor Networks

    In this paper, the authors address a Wireless Sensor Network localization problem that has high reliability in an environment where physical node destruction is possible. They propose a range-independent localization algorithm called Two-Step Filtrate Localization (TSFL) that allows sensors to passively determine their location with high reliability, without increasing the...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    New Computation Technique for Encryption and Decryption Based on RSA and Elgamal Cryptosystems

    Cryptography addresses the necessary elements for secure communication that involved privacy, confidentiality, key exchange, authentication, and non-repudiation. This paper proposed a new computation of encryption and decryption that was based on the computation of RSA and ElGamal Cryptosystems. The RSA is a Public Key Encryption system that gets its security...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    Comparison of Feature Extractors for Real-Time Object Detection on Android Smartphone

    In this paper, the authors present the analysis of real-time object detection method for embedded system particularly the Android Smartphone. As they all know, object detection algorithm is a complicated algorithm that consumes high performance hardware to execute the algorithm in real time. However due to the development of embedded...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    Research on Mutual Coupling Correction of Array Output Signal by BP Network

    The method of mutual coupling correction of array output signal is studied in the paper. According to array signal processing's feature, array error model is analyzed and array mutual coupling is studied. The method that smart antennas' channel calibration by BP network in wireless communication is proposed, which improves the...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    Channel Coding Simulation Research of Inter-Satellite Spread Spectrum Communication System

    In this paper, the authors consider proposing the mathematical model and simulation mode of inter-satellite channel based on the reliability of inter-satellite communication system. The Monte Carlo method is adopted to develop the spread spectrum communication system of two consumers. In order to reduce the bit errors of inter-satellite communication,...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    Chaos of Henon Map Based on the Coupled Networks

    The study of complex networks has most interests to the understanding of behaviors of the network dynamics. In a network, an individual can be represented by the node; the edge is defined relationship of two individuals. In this paper, the relationship between the parameters of Henon map is studied, and...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    An Enhanced Rule Approach for Network Intrusion Detection Using Efficient Data Adapted Decision Tree Algorithm

    Data mining has been used extensively and broadly by several network organizations. Intrusion Detection is one of the high priorities & the challenging tasks for network administrators & security experts. Intrusion Detection System is employed to protect the data integrity, confidentiality and system availability from attacks. IDS use the data...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    Securing Internet Applications Using Homomorphic Encryption Schemes

    The trend towards delegating data processing and management to a remote party raises major concerns related to privacy violations for both end-users and service providers. These concerns have attracted the attention of the research community, and several techniques have been proposed to protect against malicious parties by providing secure communication...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    A Novel Approach for Detecting Smart Camouflaging Worm

    Active Worms wreak havoc by exploiting security loopholes and flaws in software design to propagate from one machine to another. Active Worms are different than a traditional virus in that they don't spread by modifying programs on a single system, but rather by searching for and implanting destructive code onto...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    A Comprehensive Study of Routing Protocols for Cognitive Radio Networks

    The rapid development of wireless communication technologies results in the problem of radio spectrum shortage. Additionally, the traditional fixed spectrum allocation scheme can lead to the significant spectrum underutilization. Cognitive Radio (CR) is an emerging technology to solve those problems by enabling unlicensed users to opportunistically access the available licensed...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    Research on Spatial Index of Electric GIS

    In the electric GIS, facilities in different voltage levels show a different proportion, and topological relations exist in line and point. According to the limitations in multi-scale representation and topological connection of traditional spatial index, an extended R-Tree model based on multi-scale clustering(MCER Tree) is proposed, which removed the restrictions...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    Ant-Colony-Algorithm-Simulated-Annealing-Algorithm-Based Optimization Approach for MCM Interconnect Test

    In this paper, a novel optimization approach based on Ant Colony Algorithm (ACA) and Simulated annealing Algorithm (SA) is presented for the Multi-Chip Module (MCM) interconnect test generation problem. In order to apply ACA into the interconnect test, the pheromone updating rule and state transition rule is designed by combing...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    Express Aviation Network Construction Based on Hub-Spoke Theory

    Air freight network is one of the important means to improve the competitiveness of express enterprises. This paper establishes the model from two aspects, hub location decisions and hub number decisions, with the goal to achieve the lowest air freight network cost, based on the "Hub-spoke" theory. Then, computes the...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    System of Preview and Detection Based on Network Virtual Experiment

    As an important supporting means for teaching in university, virtual experiment makes up the lack of resources in experiment teaching. Network virtual experiment is a new development direction following the virtual experiment, it has inherited and carried forward the concept of virtual experiments, extending and expanding the resources of virtual...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    A Privacy Preserving Data Mining Scheme Based on Network User's Behavior

    The privacy preserving data mining has become a research hot issue in the data mining field. The server log of the Web site has preserved the page information visited by users. If the page information is not protected, the user's privacy data would be leaked. Aiming at the problem, it...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    A Flexible Viterbi Decoder for Software Defined Radio

    Modern wireless communication standard varies a lot from each other and is evolving rapidly. Flexibility becomes the dominate consideration of Software Defined Radio (SDR) system design. Reconfigurable platform is preferred in the SDR due to the reuse of hardware. Convolutional code is widely adopted in many wireless protocols but the...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    A Dynamic On-Demand Multipath Routing Algorithm for Low Earth Orbit Satellite Networks

    Compared with GEostationary Orbit (GEO) satellite systems and Medium Earth Orbit (MEO) satellite systems, Low Earth Orbit (LEO) satellite systems provide lower propagation delay as well as higher throughput. Because of these reasons, LEO satellite systems can play a pivotal role in providing services to areas where there is no...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    Analysis on the Impact on Learning and Teaching Model Based on Multimedia Network

    With the development of education informationalization, many teaching application based on multimedia and network are gradually penetrated into all kinds of education processes and the teaching activities which formed a huge challenge to traditional education mode. But the immaturity of the multimedia and network teaching which developed in recent decades...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Application of Wildpackets on Protocol Characteristics Analysis of P2P

    WildPackets is the leading provider of network, application performance, and protocol analysis, VoIP monitoring, and troubleshooting solutions. The key of P2P traffic management is constantly updated P2P protocol characteristics library of network traffic management device. In this paper, the authors analyze the determinants of P2P protocol characteristics, the characteristics change...

    Provided By Journal of Theoretical and Applied Information Technology