Journal of Theoretical and Applied Information Technology

Displaying 1-40 of 717 results

  • White Papers // Mar 2015

    Using Multi-Agents Systems in Distributed Data Mining: A Survey

    Extract accurate information from huge databases about peta-bytes has an unprecedented utility. However, the implementation of a data mining system requires an enormous amount of work and an extremely long run time in some cases of distributed environments. Distributed artificial intelligence consists that the entities with certain amount of autonomy...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2015

    An Efficient and Novel Approach for Web Search Personalization Using Web Usage Mining

    Generally each user has a different background and different needs when the user searches for any information on the web. For the same query issued by different users, most of the search engines return the same results to all users, without considering the individuals need. This problem is solved using...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2015

    A New Proposed Dynamic Dual Processor Based CPU Scheduling Algorithm

    Selection of appropriate CPU scheduling algorithm is important, because the OS scheduler has to context switch, the CPU among the various tasks that an operating system has to execute. Real time systems involve high number of context switches. Hence, RR scheduling is not suitable, as this can result in a...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2015

    Comparison of Hardware and Nios II Based-Software Implementation of MLP on the FPGA Plateform

    The artificial neural networks provide optimal and satisfactory solutions for most applications of image and signal processing requiring complex mathematical operations. This often leads to implement these artificial neural networks in platforms that retain their performance (computational efficiency and speed of execution). This paper presents, in a first stage, two...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2015

    Cyber Security for Cyber Physcial Systems: A Trust-Based Approach

    Cyber-Physical Systems (CPS) consists of a combination of different embedded subsystems, which work independently of each other and also interact with the external environment. Such embedded systems operate in the presence of inherent uncertainty, context dependencies and adversarial certainty arising from both the cyber and physical worlds. Security is one...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2015

    Experimental Evaluation of TCP Congestion Contorl Mechanisms in Short and Long Distance Networks

    Originally TCP was designed for early, low bandwidth, short distance networks, so standard TCP did not utilize the maximum bandwidth in today's high bandwidth network environments. Therefore a lot of TCP congestion control mechanisms also known as TCP variants have been developed for today's long distance high bandwidth networks. In...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2015

    A New Adaptive Throughput Policy Algorithm on Campus IP-Based Network Internet Traffic

    In this paper, the authors present the development of a new scheme called Adaptive Throughput Policy (ATP) algorithm to control internet inbound throughput utilization in an IP-based network by considering traffic flows and their processing times. Real live inbound internet traffics collected from a campus network with Committed Access Rate...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2015

    Energy Efficient Node Disjoint Multipath Routing to Improve Wireless Sensor Network Lifetime

    Some of the major challenges confronting wireless sensor networks are usually associated with scarcity of energy and resource limitations. In order to achieve efficient utilization of energy and increase the operational lifetime of the wireless sensor network while at the same time providing consistent packets delivery, energy efficient node disjoint...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2015

    A Comparative Evaluation of State-of-the-Art Integration Testing Techniques of Component-Based Software

    In the last few years, component-based software has gained widespread notice and acceptance as a method that facilitates the development of existing large, complex, and very critical systems by integrating prefabricated small pieces of software called components. Component integration becomes an essential stage in the component-based software development Lifecycle. Therefore,...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2015

    A Survey and Open Issues of Jammer Localization Techniques in Wireless Sensor Networks

    Jamming sensor attacks localization is a significant area that acquires considerable research interest. This interest is expected to grow further with the prolifiration of wireless sensor network applications due to the physical share environment. Jamming attacks emitting a radio frequency signals by the adversaries and impact the wireless sensor network...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2015

    Automatic Adaptive Reconfigurable FPGA with Reusable Techiniques Using ARM

    In this paper, the authors discuss about reconfigurable system that allow online adaptation, whenever a fault occurs in the system. This is obtained by using FPGA that switches among Configurable Logic Block (CLB) automatically which has same features in an optimal manner. This reduces the time and complexity. Also the...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2015

    Enhancement of AES Algorithm Based on Chaotic Maps and Shift Operation for Image Encryption

    With the rapid development of the Internet and communication networks, the confidentiality of digital images transmitted over public networks must be preserved by using encryption techniques. Advanced Encryption Standard (AES) is one of the most commonly used encryption algorithms at present. Although AES has several advantages, such as security in...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2015

    Security Policies Matching Through Ontologies Alignment to Support Security Experts

    The management of security policies has become increasingly difficult for the security expert given the number of domains to manage their extent and their complexity. A security expert has to deal with a variety of frameworks, with different language specifications, formalization and aspect used in domains that may belong to...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2015

    High Performance Implementation of RSSI Based Wi-Fi Location Tracker for Android Applications

    Wi-Fi-based Positioning System (WPS) is used where GPS is inadequate due to various causes including multipath and signal blockage indoors. Such systems include indoor positioning systems. The advantage of choosing Wi-Fi for a location based service is its high compatibility and frequency of availability. The majority of today's smart phones...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2015

    Does Efficient Fuzzy Kohonen Clustering Network Algorithm Really Improves Clustering Data Result?

    In this paper, the authors Fuzzy Kohonen Clustering Network (FKCN) algorithm is compared to Efficient Fuzzy Kohonen Clustering Network (EFKCN) algorithm. This paper is conducted to see if EFKCN is really efficient and could do a better clustering analysis than original FKCN. They do empirical testing and simulations to compare...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2015

    Towards a Multi-Agents Systems Application Based on the EAS-SGR Framework

    Information has always been in the heart of every organization. During its exchange this information can be altered or modified. It is also considered as a key element for the development of many businesses. In this context, the authors have the obligation to protect it and secure it. In fact,...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Ensemble of Clustering Algorithms for Anomaly Intrusion Detection System

    Maximizing detection accuracy and minimizing the false alarm rate are two major challenges in the design of an anomaly Intrusion Detection System (IDS). These challenges can be handled by designing an ensemble classifier for detecting all classes of attacks. This is because, single classifier technique fails to achieve acceptable false...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Node Location Analysis Using RSSI for Automatic Position Reporting System

    In this paper, the authors analyze various connectivity issues encountered when a mobile node identifies an access point with greater signal strength and find a proper node location in the network. Dynamic networks require adaptive policies for optimal performance and guaranteed QoS to support real-time environment. The network connectivity issues...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    A Middleware and Policy-Based Adaptation Framework to Simplify Software Evolution: An Implementation on Unit Trust Enterprise System

    Software evolution needs to be properly controlled to avoid huge problems during maintenance phase. Software needs to evolve to ensure it meets its development purpose. One of promising ways to address the issue of software evolution is via software adaptation. There are 4 main approaches to software adaptation i.e. architecture-based,...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Automated Test Case Generation Using UML Use Case Diagram and Activity Diagram

    Testing plays a major role for improving the quality of a software product. Due to its iterative and incremental nature it needs special attention. Test case generation is one of the complex activities carried out during testing phase. Generating test cases in the early phases of development life cycle works...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Evaluated Reputation-Based Trust for WSN Security

    During the last years, Wireless Sensor Networks (WSNs) and its applications have obtained considerable momentum. However, security and power limits of WSNs are still important matters. Many existing approaches at most concentrate on cryptography to improve data authentication and integrity but this addresses only a part of the security problem...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Error Compensated Fixed Width Modified Booth Multiplier for Multimedia Applications

    Many multimedia and digital signal processing systems are desirable to maintain a fixed format and to allow little accuracy loss to output data. The objective of this paper is to design a fixed width modified booth multiplier with high error performance. And the need to derive an effective error compensation...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Measurement Study on Packet Size and Packet Rate Effects Over Vehicular Ad Hoc Network Performance

    A Vehicular Ad-hoc NETwork (VANET) is a type mobile ad hoc network which is developed to increase physical safety of vehicles' derivers. Many parameters affect the performance of VANET. Packet size and packet rate are two important parameters that need to be considered when using VANET. Different values of these...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Generalized Frequency Division Multiple Access Allocation Scheme for LTE-A

    Frequency Division Multiple Access (FDMA) is one of the important features of Long Term Evolution Advanced (LTE-A). For LTE-A downlink, Orthogonal FDMA (OFDMA) scheme is used to provide frequency orthogonality. Whereas, for uplink, Signal Carrier FDAM (SC-FDMA) is preferred since it provides improved PAPR performance over OFDMA. Interleaved FDMA (IFDMA)...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Current State of Anti-Phishing Approaches and Revealing Competencies

    Phishing has become a substantial threat for internet users and a major cause of financial losses. In these attacks the cybercriminals carry out user credential information and users can fall victim. The current solution against phishing attacks are not sufficient to detect and work against novel phishes. This paper presents...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Trust Based Ad Hoc on Demand Distance Vector Routing Protocol Against Wormhole Attack

    Mobile Ad-hoc NETworks (MANETs) consists of mobile devices that communicate with each other without any predefined infrastructure/centralized administration. In network nodes can join or leave a network freely, MANETs are vulnerable to unauthorized data manipulation as it does not verify user identity before ensuring data access. Thus it is challenging...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    An Effective Scheduling of Multiple Source Nodes in MANET Using Dempster-Shafter Hypothesis

    A Mobile Ad-hoc NETwork (MANET) is built without any central control point such as a base station. Partially Observable Markov Decision Process (POMDP) multi-armed bandit problem solved continuous user authentication and Intrusion Detection Systems (IDS) for large network with different nodes. But POMDP did not deal with higher number of...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Application of FEAST (Feature Selection Toolbox) in IDS (Intrusion Detection Systems)

    Security in computer networks has become a critical point for many organizations, but keeping data integrity demands time and large economic investments, in consequence there has been several solution approaches between hardware and software but sometimes these has become inefficient for attacks detection. This paper presents research results obtained implementing...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Automatic Classification of Audio Data Using Gradient Descent Neural Network Based Algorithm

    Audio mining is a technique by which the core of an audio signal can be automatically searched and analyzed. This paper addresses feature extraction from audio and audio similarity measures and proposes an algorithm to mine any type of audio data. This Hybrid Algorithm for Audio Mining (HAAM) consists of...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Web Structure Mining for Users Based on a Hybrid GA/PSO Approach

    Web mining is a demanding task that looks for web access model, web structures and the reliability and dynamics of the web contents. It offers capable web personalization, system development, site alteration, business intelligence and usage characterization. A latest approach is offered for the estimation of the website hyperlink structure,...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Mobile Security: Security Mechanisms and Protection of Mobile Applications

    In this paper, the authors propose security policies and mechanisms for mobile phones that better meet the expectations of users, either at the level of mobile networks, or mobile applications. At the mobile networks level: the paper focuses on limiting the spread of malware via SMS/MMS and emails. It describes...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Internal Threat Control Framework Based on Information Security Management System

    In this paper, the authors focus on proposing a framework for security control that based on ISO 27001 and ISO 27002, which is a standard of Information Security Management System (ISMS). This framework helps to mitigate internal threats for data centre meant for public sector adoption. The ISMS implementation scope...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Multi-Agent Security Architecture for a Sharia Compliant E-Auction

    Electronic auction has introduced new processes in the way auction is conducted which require investigation to ensure compliancy to Sharia (Islamic principles that are based on Qur'an and Sunnah) rules. The use of mobile software agent in electronic auction marketplaces adds ubiquity power to the bidders. In particular it allows...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Design of Privacy Model for Storing Files on Cloud Storage

    Cloud storages like Google drive, Dropbox are popular for personal and institutional file storage. Cloud storage is beneficial in terms of scalability, availability and economy. But cloud storage has privacy challenges due to which many users are reluctant to use it for personal data storage. Storage of personal or sensitive...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Design and Development of Zigbee Based Wireless Remote Controlling and Data Acquisition Device Through Internet

    IrDa and Bluetooth have been used widely in many wireless monitoring and controlling devices. Although, these devices have been replaced the traditional wired systems and contribute in solving the high cost of such systems, there are drawbacks been emerged. The major disadvantages are the range limitation of Bluetooth module and...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Three Layers Approach for Network Scanning Detection

    Computer networks became one of the most important dimensions in any organization. This importance is due to the connectivity benefits that can be given by networks, such as computing power, data sharing and enhanced performance. However using networks comes with a cost, there are some threats and issues that need...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Impact of Software Risk Management on Analysis Modeling in Life Cycle of Web Application Development

    Various branches of engineering use models effectively to reduce complexity, document analysis steps and facilitate communication within the development team. And this applies to software engineering and web engineering. Modeling aims to provide detailed sufficient descriptions to accomplish the system the user want to build, modeling easily produces patterns represent...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    A New Methodology of Three Way Distribution Process of Improved PSO Algorithm Using Mobile Sink Nodes

    In a recent trend, Mobile Sink (MS) is a major part of Wireless Sensor Network (WSN) for distributing, scalable network of communicating with localized environment. Improved Particle Swarm Optimization algorithm (IPSO) has been used to find the exact location of three way processes such as sink, distribution of frequency and...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    A Review of Ant Colony Optimization Routing Protocols for Wireless Multimedia Sensor Network

    Multimedia applications have become an essential part of the people daily lives, and their use is flourishing day-by-day. The area of wireless sensor network is not an exception where the multimedia sensors are attracting the attention of the researchers increasingly, and has shifted the focus from traditional scalar sensors to...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    A New Static Resource and Bandwidth Utilization Approach Using WiMAX 802.16e Fractional Frequency Reuse Base Station

    In this paper, the authors propose a new Static Resource Assignment (SRA) approach to enhance resource and bandwidth utilization in traditional Fractional Frequency Reuse (FFR) WiMAX Base Station (BS) which widely used in cellular network deployment to overcome the inter-cell interference. The new SRA FFR efficiently tackled the wastage of...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2014

    QOS Based Cost Efficient Resource Allocation in Cloud

    Resource allocation is one of the important challenges in cloud computing environment. It depends on how to allocate the resource to the particular task. Resource allocation can be done by two methods. One of the methods statically allocates the resources and other dynamically allocates the resources. Two methods are having...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2014

    Text Mining Algorithm Discotex (Dis-Covery From Text Extraction) With Information Extraction

    Text mining concerns looking for patterns in unstructured text. The related task of Information Extraction (IE) is about locating specific items in natural-language documents. This paper presents a framework for text mining, called DISCOTEX (DISCOvery from Text EXtraction), using a learned information extraction system to transform text into more structured...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2014

    Assembler Design Techniques for a Reconfigurable Soft-Core Processor

    The reconfigurable processor design which utilizes platform such as Field Programmable Gate Array (FPGA) has offered several advantages in minimizing the non-recurring engineering cost and to reduce the time-to-market for processor-based products. However, when any modification is made to the processor architecture, the same information needs to be relayed to...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2014

    Anonymous Web Browsing Against Traffic Analysis Attacks by Reusing the Cache Memory

    Anonymous web browsing is a hot topic with many potential applications for privacy reasons. However, there are few such systems which can provide high level anonymity for web browsing. The reason is the current dominant dummy packet padding method for anonymization against traffic analysis attacks. This method inherits huge delay...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2014

    New Approach to Improving Lifetime in Heterogeneous Wireless Sensor Networks Based on Clustering Energy Efficiency Algorithm

    The major challenge for wireless sensor networks is energy consumption minimization. Wireless transmission consumes much more of energy. In the clustered network, a few nodes become cluster heads which causes the energetic heterogeneity. Therefore the behavior of the sensor network becomes very unstable. Hence, the need to apply the balancing...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2014

    Clustering of High Dimensional Dataset Using K-MAM (MAX-AVG-MIN) Method With Principal Component Analysis a Hybrid Approach

    Clustering the high-dimensional data set is one of the main issues in clustering analysis. Reducing the data from high-dimensional to a meaningful representation of low dimensional will increase the efficiency of clustering algorithms. The performance of k-means clustering algorithm is poor for high dimensions. Hence, to improve the efficiency, in...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2014

    The Mixture Model: Combining Least Square Method and Density Based Class Boost Algorithm in Producing Missing Data and Better Models

    The problem of missing values in data tables arises in almost all domains. With the volume of the information growing every day on the communication channels and the necessity of the integration of this data for data analysis and data mining, this reflects even more. In this paper, the authors...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2014

    An Improved of Spam e-Mail Classification Mechanism Using K-Means Clustering

    Spam e-mails are considered as a serious violation of privacy. In addition, it has become costly and unwanted communication. Although, Support Vector Machine (SVM) has been widely used in e-mail spam detection, yet the problem of dealing with huge data is time and memory consuming and low accuracy. This paper...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2014

    Simplified Scheme for Performance Augmentation of Web Data Extraction

    Web mining is the application of data mining techniques to automatically discover and extract information from web data. Furthermore, it uses the data mining techniques to make the web more profitable and to enhance the effectiveness of the authors' interaction with the web. Users always expect maximum accurate results from...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2014

    Towards Popularity Aware Hybrid Caching to Improve Search in Social Relationship Based P2P Networks

    The widespread use of recent Peer-To-peer (P2P) file sharing has been mainly influenced by the scalability of their architecture and high versatile search mechanisms. However, most of the P2P networks construct loosely coupled overlay on the top of the internet based on the physical network constraints without taking user preferences...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Apr 2014

    Energy-Efficient Sub-Clustering With Optimized Processor Speed (ESOPS) in Wireless Sensor Networks

    A wireless sensor network consists of sensor nodes to monitor the physical and environmental conditions. In certain applications like habitat monitoring, where sensor nodes are randomly deployed in manually inaccessible environment that operates with a limited battery power. This battery constraint reduces the network lifetime. The sensor nodes consist of...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Apr 2014

    Resourceful and Secure Routing Protocol Via Active Hierarchical Clustering Mechanisms for Wireless Sensor Network

    Wireless Sensor Network (WSN) combine information sensing, wireless communication, information processing in current years. Two major constraints related to wireless sensor networks are the dynamic variance of the network caused by capacity constraint of sensor nodes and uncertainties related to wireless links. Moreover, the problem in wireless sensor networks is...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Apr 2014

    Two Level Clustering Approach for Data Quality Improvement in Web Usage Mining

    Web Usage Mining (WUM) is a term related to the extraction of knowledge from web log data. Web log data has a lot of irrelevant data to proceed WUM. Therefore, it requires several steps to get a good quality of data, because the final result of WUM depends on the...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Apr 2014

    FL2440 Hardware Based Neural Data Security Using Polarization Encryption (Ep) Approach

    Encryption scheme is widely used in the field of communication network security. The network systems are focus on reliability, service and functions, which provided end-to-end service to protect encrypted data node. It enables to interconnect the various functional levels to interact and communicate with each other. An interconnected group of...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Apr 2014

    E-Learning Development as Public Infrastructure of Cloud Computing

    In this paper, the authors describe the model they implement to provides services, such as IaaS, PaaS, and SaaS, for e-learning and collaboration in the educational environment in Salatiga. Currently, the combination of cloud technology and e-learning is being explored. Several efforts of using IaaS cloud technology in education focus...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Apr 2014

    Semantic Schema Matching Approaches: A Review

    An extensive review of the existing research work in the field of schema matching uncovers the significance of semantics in this subject. It is beyond doubt that both structural and semantics aspect of schema matching have been the topic of research for many years and there are strong references available...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Apr 2014

    Implementation of Data Encoding and Decoding in ARM Boards With QoS Parameters

    Networks must be able to transfer data from one device to another with acceptable accuracy. For most of the applications, a system must guarantee that the data received are identical to the data transmitted. Any time data are transmitted from one node to the next, they can become corrupted in...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Apr 2014

    An Analysis of Privacy Risks and Design Principles for Developing Countermeasures in Privacy Preserving Sensitive Data Publishing

    Government Agencies and many other organizations often need to publish sensitive data - tables that contain unaggregated information about individuals. Sensitive data is a valuable source of information for the research and allocation of public funds, trend analysis and medical research. Publishing data about individuals without revealing sensitive information about...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Apr 2014

    An Algorithm About Partner Selection Problem on Cloud Service Provider Based on Genetic

    Aiming at choosing suitable cloud service providers to construct a dynamic alliance and then satisfying terminal customers more efficiently, to achieve the optimal allocation of cloud services. This paper uses gray relative comprehensive evaluation model to determine the optimizing index of cloud services market. The authors use the multi-objective optimization...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2014

    Residential Site Selection by Combining GIS and Fuzzy Database Query on Android Device

    Residential sites are a crucial means for the survival of a family life in which currently the residential sector development increased. The increasing number of existing residences makes people difficult to determine the location of the residences in accordance with the needs of each individual. Geographic Information Systems (GIS) is...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2014

    Dynamic Effect of Knowledge Management System on School Management

    In this paper, the authors investigate the effect of knowledge management system on school management, as well as to use system dynamics as the main research method. This study selected a certain elementary school in Miaoli County in Taiwan as the research subject. This paper used students' sense of identification,...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2014

    Fault Recovery Algorithm Using King Spare Allocation and Shortest Path Shifting for Reconfigurable Systems

    Field Programmable Gate Arrays (FPGAs) have the capability of reconfiguring in-field and at runtime that helps in fault recovery. FPGAs are used to implement complex functions in applications such as nuclear systems, space missions, communication systems etc where system reliability is very critical. Such systems must be designed with the...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2014

    A Comparative Study of Classification Models for Detection in IP Networks Intrusions

    Intrusion detection is an essential mechanism to protect computer systems from many attacks. The authors presented a contribution to the network intrusion detection process using six most representative classification techniques: decision trees, BayesNet, Naive Bayes, Rules, SVM, and Perceptron multi-layer network. In this paper, they presented a feature selection using...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2014

    An Effective Cross Rate Packet Aggregation Scheme for Virtualized Network Cloud Computing

    Virtualization enables the cloud computing. The bottleneck of transferring packets from driver domain to Virtual Machines (VMs) in I/O channel was eliminated by basic aggregation and destination based aggregation scheme, but it is limited to aggregating packets for a particular destination and missing out more effective packet combinations. This paper...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2014

    Novel Framework for the Portfolio Determination Using PSO Adopted Clustering Technique

    Methods based on the econometrics, statistics, machine learning, heuristics and data mining methods are used to predict the market behavior and investment decisions. In this paper, the authors have presented a novel approach for the portfolio creation using the PSO adopted k-means. Then the NARX and the Markowitz model have...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2014

    Dynamic Structured Privileges With Multiowner Data Sharing for Dynamic Groups in the Cloud

    Cloud computing is a general term used to describe a new class of network based computing that takes place over the internet. The most basic and important service offered by cloud is data storage. However, the major obstacle in the multi owner data sharing for the wide deployment of cloud...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2014

    Evaluation Subquery Methods in Microsoft Sql Server 2008

    Frequently user compiles a query to satisfy business process needs, whether directly using DBMS or connecting into application system. There are many methods that can be used to generate desired results to support transaction, but all the query processing should be run effectively and efficiently. A significant aspect of query...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2014

    A Survey of Research and Practices in Multiprocessor System on Chip Design Space Exploration

    In this paper, the authors present a perspective on the existing research and practices initiated for the Design Space Exploration (DSE) in Multi-Processor System-on-Chip (MPSoC) technology. Reduction in size as well as adding more functionality within a single chip by incorporating multiple processors remains the key in the development of...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2014

    A Comparative Analysis of Markov Model With Clustering and Association Rule Mining for Better Web Page Prediction

    Web page prediction that involves personalizing web user's behavior and also helps the web master to improve the website structure and helps the user in navigating the site and accessing the information. World Wide Web (WWW) is a huge storage place for pages and links. So that the browser can...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2014

    High Speed Vlsi Architecture for Non Separable Block Based Lifting Wavelet Transform

    The inherent advantage of the in-place computation of the lifting based DWT over the conventional convolution method makes it suitable for efficient hardware implementation with lower computational complexity. The proposed paper uses non separable block based method to derive the VLSI architecture for the two dimensional DWT. In separable lifting...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2014

    A Combinatorial Tree Based Frequent Pattern Mining

    Frequent pattern mining is a process of extracting frequently occurring itemset patterns from very large data storages. These frequent patterns are used to generate association rules. Association rules define the relationship among items. The strength of the relationship can be measured using two different units namely support value and confidence...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2014

    An Enhanced Semi-Apriori Algorithm for Mining Association Rules

    Data mining is an accumulation of techniques used to efficiently automate discovery of previously unknown, novel, valid, valuable and understandable patterns in large-scale databases. Mining association rules in large database is one of data mining and knowledge discovery research issue, although many algorithms have been designed to efficiently discover the...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2014

    Semantic and Fuzzy Aspects of Opinion Mining

    In recent years, the amount of opinions and reviews available on the web has grown tremendously and therefore the role of sentiment analysis is even more crucial than before. Given the very ambiguous and imprecise nature of sentiments and of their expressions, this study focuses on the review of semantic...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2014

    Job Scheduling Optimization Based on Resource Load Balance in Cloud Computing

    Job scheduling plays an important role in cloud computing networks. Appropriately distributing service jobs to multiple servers when the cloud network stays in dynamic load conditions is the main work of the scheduling strategy. The authors adopt the resource load level of a server as the state of the server,...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2014

    Enhancing Data Security Using DES With Hardware Implementation

    Network security has become an important issue in organization, business and public data handling and has grown exponentially in recent times. The threats to the valuable information on the network are becoming more widespread and more sophisticated. In this paper, the authors focus on secure communication between end-points terminal and...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2014

    Factors Affecting Programmer's Performance on Web-Based Programming

    Today, the changes that occur in the field of IT are repositioning its role from just to support back office to strategic role. Thus, this change has led to high demand for IT professionals who have the competence and also updated on the utilization of new technologies. This research is...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2014

    An FPGA Based Overlapped Quasi Cyclic Ldpc Decoder for Wi-Max

    In this paper, the authors present a partially parallel Quasi cyclic Low Density Parity Check (LDPC) decoder architecture for WiMAX IEEE 802.16e standard. Two phase message passing min-sum decoding algorithm is used to decode the Low Density Parity Check (LDPC) codes. The decoder is designed for code rate

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2014

    A Novel Approach for Partitioning in Hadoop Using Round Robin Technique

    The Hadoop distributed file system is constructed to store profoundly and immensely colossal data sets accurately and to send those data sets at huge bandwidth to end user applications. Hadoop gives a distributed file system and a structure for the analysis and conversion of profoundly and astronomically immense data sets...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Apr 2014

    On Long-Range-Dependence Synthetic Data Generation Through Heavy-Tailed Distributions

    Comprehensive analysis of the Internet traffic conducted over the last decade revealed the concept of Long-Range Dependence (LRD) in the collected data traces. Some of this analysis work proved that this property is a result of the heavy tailed distribution of the packet inter-arrival time, which is a result of...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2014

    Scheduling Techniques in On-Demand Grid as a Service Cloud: A Review

    The Infrastructure-as-a-Service (IaaS) cloud is a customer oriented cloud environment that offers user with computing infrastructures on-demand to be used based on the cloud computing paradigm of pay-per-use. When the IaaS is now utilized to build a traditional grid network within the cloud environment, it is now called an on-demand...

    Provided By Journal of Theoretical and Applied Information Technology