Journal of Theoretical and Applied Information Technology

Displaying 1-40 of 367 results

  • White Papers // Mar 2014

    Prediction of Students' Success by Applying Data Mining Algorithams

    In education, an intelligent data analysis includes data mining methods which are applicable in different areas of education as a way of discovering implicit, previously unknown, and useful knowledge out of existing data with a sole goal, and it is, to make quality decisions. One of the classification methods in...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2014

    Mobile Sink Based Reliable and Energy Efficient Data Gathering Technique for WSN

    In Wireless Sensor Network (WSN), data gathering causes more energy consumption. Also most of the existing literature work on data gathering process considers only distance and node density and skips reliability criteria. Hence in order to offer both reliability and energy efficiency, in this paper, the authors propose to design...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2014

    Datawarehouse Sales and Supply of Goods Model Based on HTML5

    In this paper the authors conduct an analysis of sales and inventory systems that exist in the company, then designing a data warehouse for PT. Delta Djakarta, Tbk. to support the decision-making process in estimating the number of sales in the future, then found the existing problems and provide solutions...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2014

    Implementing Data Warehouse as a Foundation for Decision Support System (perspective : Technical and Nontechnical Factors)

    A company needs a system to conduct the process of analyzing data in order to support decision maker takes the best decision. Data warehousing system as one solution can accommodate that need. The system has been accepted as a key which enables company or organizations to improve their abilities in...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2014

    A Performance Study of Hardware Impact on Full Virtualization for Server Consolidation in Cloud Environment

    Underutilization of hardware resources has always been a problem in single workload driven traditional OS environment. To improve resource utilization, virtualization of multiple VMs and workloads onto the same host with the aid of hypervisor has been the recent trend. Its use cases such as server consolidation, live migration, performance...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2014

    Challenges in Minimising Energy Consumption for Wireless Sensor Networks

    Wireless sensor networks are one of the active research areas now-a-days due to its vast applications in different fields such as defense, civilian and medical fields. One of the basic challenges in the design of Wireless Sensor Network (WSN) is maximizing their lifetime because of the sensors placement in remote...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2014

    Skyline in Cloud Computing

    The cloud computing technology is booming. The utility of this technology is no longer to show. In this paper, the authors investigate the problem of search and selection systems allowing users to search through cloud services and find the ones that best meet their needs. In this paper, they propose...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2014

    The Impact of Location Based Attacks on Geographical Routing Protocols

    Several applications of mobile ad hoc networks select geographical routing especially the Greedy Perimeter Stateless Routing (GPSR) protocol due to its scalability, efficiency, and ability to support location based applications. However, there are many security issues in protecting location information, which can easily be abused by attackers. Location based adversarial...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2014

    A Critical Overview of Existing Query Processing Systems Over Heterogeneous Data Sources

    In the past, to answer a user query, the authors generally extract data from one centralized database or from multiple sources with the same structure. Then things have been changed and they are facing the fact that in some cases, it is necessary to use a set of data sources...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2014

    New Interactive Multimedia Application Model Using Objects Storage in a Database

    In these days, it is very important to have an open environment for multimedia applications development, because there are many application developers with a good experience in this field, and this experience can be used for the functions library development. This paper presents a new interactive multimedia application model which...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2014

    Data Exchange Delivery Between Information System at Low Bandwidth Quality Using Messaging

    Data exchange is a routine activity in a distributed system. This activity can be done between organizations with equivalent positions or between branches with the head office. Technology is commonly used web development service as additional middleware. In a growing organization, the effort is quite difficult because it requires a...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2014

    A Hybrid Indexed Table and Quasigroup Encryption Approach for Code Security Against Various Software Threats

    Security is of fundamental importance in digital communication. The system should be secure against brute force attacks and impersonation by the eavesdropper. Code and the sensitive data should only be accessed and understood by legitimate user/authority. Software in recent scenario has been highly susceptible to various attacks and threats. Reverse...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2014

    A Fully Associative Cache Algorithm With Improved Performance

    Fully associative caches enable all blocks to map address. This paper proposes an algorithm to enable one fully associative block. The address a is right shifted by certain prefixed number of bits. The result is XOR'ed with n-1, n being the number of fully associative cache blocks. The bit selection...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2014

    Efficient Intrusion Detection System Based on Support Vector Machines Using Optimized Kernel Function

    An efficient Intrusion Detection System (IDS) requires fast processing and optimized performance. Architectural complexity of the classifier increases by the processing of the raw features in the datasets which causes heavy load and needs proper transformation and representation. PCA is a traditional approach for dimension reduction by finding linear combinations...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2014

    A Novel Approach for Text Clustering Using Must Link and Cannot Link Algorithm

    Text clustering is used to group documents with high levels of similarity. It has found applications in different areas of text mining and information retrieval. The digital data available nowadays has grown in huge volume and retrieving useful information from that is a big challenge. Text clustering has found an...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2014

    An Efficient Algorithm for Fault Classification and Identification in Online Transaction Management

    Now-a-days, the customer demand for accessing a web based application has grown enormously as everything is available in the Internet. Sensitive application providers retain their resources in safe from unauthorized access by using single signon technique. In this technique if a user gives an irrelevant information in a particular session,...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2014

    Detection Mechanism for Distributed Denial of Service (DDoS) Attacks for Anomaly Detection System

    Distributed Denial of Service (DDoS) is the attack to pollute the network. The attacker creates a large amount of packet to the particular system. DoS attacks synchronized by a group of attackers will lead to Distributed DoS. The packets are sending by using the compromised computers. Which are targeted systems...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2014

    An All-Inclusive Review on Various Techniques of Web Usage Mining

    Numerous users use World Wide Web (WWW) as their default resource for obtaining knowledge and many organization need to empathize their customer's preference, behavior and future need to improve their business. Web usage mining is a part of web mining and an active research topic. The main goal is to...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2014

    A Five-Factor Software Architecture Analysis Based on FAR for ATM Banking System

    Software architecture represents the high level structures of a software system. It can be defined as the set of structures required to explain about the software system which comprise the software elements, the relations between them, and the properties of both the elements and relations. A major challenge in the...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2014

    Foremost Security Apprehensions in Cloud Computing

    In the recent years, a term keeps coming in the sphere of IT. This new concept called cloud computing is probably the most noteworthy evolution since the arrival of the web. Many business leaders have decided to invest in this architecture in order to gain in terms of saving on...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2014

    Conception of Throughput by Preventing Flood Attack in Network Layer

    To achieve the target potential in wireless sensor networks, security has been creating a major role where it has been used during the communication of nodes in a specified area, by considering the secure connections between the nodes during the transmission of packets. As per security as concern, wireless sensor...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2014

    Employing Data Mining on Highly Secured Private Clouds for Implementing a Security-as-a-Service Framework

    Cloud computing is rapidly gaining popularity. However, like any new system, cloud computing is facing some significant challenges. The most significant challenge faced by cloud adopters is related to legal compliance, security controls, privacy and trust. This paper proposes a novel security management framework by employing data mining to detect,...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2014

    BASIP a Virtual Machine Placement Technique to Reduce Energy Consumption in Cloud Data Centre

    Infrastructure-as-a-Service (IaaS) in cloud computing provides Infrastructure as a service for the demand of user from small instance to large instance in pay per use model. The services include like computer resource, networking and data storage. An API (Application Programming Interface) is used to access the infrastructure and a dashboard...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2014

    Towards a New Algorithm More Efficient for Updating Firewall Policies

    Firewall is one of the most widely utilized component on any network architecture, since that a deployment is a very important step to turn the initial policy to a target policy. This policy requires automated tools in order to create a suitable environment for configuring or deploying safely a policy...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2014

    Fast and Secure Handover Authentcation Scheme in Mobile WiMAX

    Handover is one of the essential elements that can affect the Quality of Service (QoS) and capacity of Mobile Broadband Networks. The next generation of broadband wireless networks including the IEEE802.16e standard, allow users to roam seamlessly and securely over the network. Unfortunately the current design suffers from lengthy delay...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2014

    Exploiting IPv6 Routing Headers Type 0/2 in Different IP Wireless Networks: Attack Scenario & Analysis

    Mobile IP is an open standard protocol designed by IETF to allow users to move from one network to another while maintaining their own permanent IP addresses. However, the seamless connectivity in different IP networks has introduced new security vulnerabilities. One of the most critical concerns with the IPv6 is...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2014

    A Multi-Agent Based Distributed Intrusion Prevention System Against DDoS Flooding Attacks

    Denial of Service (DoS) attacks is a simple and very annoying type of intrusions. This kind of attacks attempts to make unreachable at least a service of equipment like it can stagnate the whole of a network. To launch a DoS attack, the authors have, now-a-days, often tools to succeed....

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2014

    Correction Position of Coordinates From Data GPS Logger in Google Maps by Using Lagrange Interpolation Method

    Development of navigation technologies increase rapidly. People need a GPS to indicate a location or street. The accuracy of the GPS position is often less precise. This problem is used as a discussion of issues in the design of GIS to fix the GPS coordinates to the coordinates of the...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2014

    Multi-Level Trust Architecture for Mobile Adhoc Networks Based on Context-Aware

    Mobile Ad-hoc NETworks (MANETs) are not favorable to centralized trust architecture and literature review provides several security framework and solutions for trust management. However, there is no unified architecture for MANET to exploit deployed security models based on trust. This paper presents compelling trust architecture in which a trust based...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2014

    Energy Efficient Intrusion Detection System for Wireless Sensor Network Using Neural Network

    In Wireless Sensor Network (WSN), the existing intrusion detection techniques rarely consider energy consumption for judging the node state. Also there is need for increased detection rate. Hence in this paper, the authors propose an energy efficient intrusion detection system for WSN. Initially the nodes deployed in the network are...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2014

    Fuzzy Vault Fusion Based Multimodal Biometric Human Recognition System with Fingerprint and Ear

    Human Recognition is one of the admired tasks over the world for recognizing a person using biometrics by determining physical or behavioral characteristics of that person. In this paper, the authors have already worked out a multimodal biometric recognition system with fingerprint, palm print and hand vein. For getting more...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2014

    Transaction Aware Vertical Partitioning of Database (TAVPD) for Responsive OLTP Applications in Cloud Data Stores

    On-Line Transaction Processing (OLTP) applications are business applications which are characterized by high-frequency short lived data transactions. In cloud domain, applications are expected to be highly responsive and low cost with optimized levels of consistency. Cloud data stores rely on an appropriate data partitioning scheme to achieve promising levels of...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2014

    Secure Authentication Based Multipath Routing Protocol for WSNs

    Wireless Sensor Networks (WSN's) have attracted a great deal of research attention due to their wide range of potential applications. Applications of WSN include battlefield surveillance, biological detection, medical monitoring, home security and inventory tracking. Wireless sensor networks consist of some nodes that have limited processing capability, small memory and...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2014

    Optimized Multicast Routing Scheme for Mobile Ad Hoc Networks

    Mobile Ad hoc Network is the indivisible part of wireless network. In the past few years, the popularity of MANET grows unlimitedly. Due to the presence of mobility and infrastructure less topology, the vulnerability of ad hoc networks is introduced unconditionally. So the failures of link, path and node may...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2013

    Cost Effective Poly Vernam Cipher with Cache Optimization

    The people digital world provides a means to access mammoths of data and services. Such a huge responsibility and task does not come without disadvantages, the most important of which is security and consistency of data and the maintenance of privacy. The science of cryptology has provided the user with...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2013

    Data Integrity in Cloud Computing Security

    Cloud computing requires comprehensive security solutions based upon many aspects of a large and loosely integrated system. The application software and databases in cloud computing are moved to the centralized large data centers, where the management of the data and services may not be fully trustworthy. Threats, vulnerabilities and risks...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2013

    An Expedited Triple Key Broadcast Authentication Scheme Based on TESLA, ECDH, and ECDSA

    Wireless Sensor Networks (WSNs) are prone to various security breaches as they are placed in hostile environments. Several security and broadcast authentication mechanisms were proposed for securing the WSN fully via key exchange mechanisms, handshake protocols, and other routing protocols. But these existing schemes cannot detect a variety of attacks...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2013

    The Migration of Data From a Relational Database (RDB) to an Object Relational (ORDB) Database

    The object relational model includes both the object model and the relational model, which offers several advantages, the use of different object mechanism, inheritance, overloading, encapsulation of data, new types, the elimination of joints with passing by reference, at the same time benefiting from the simplicity of the relational concept...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2013

    Survey of SIP Authentication Mechanisms

    In recent years, Voice over Internet Protocol (VoIP) has become a popular NGN (Next Generation Network) technology. As this technology is built on internet protocol it is affected by critical security problems. The Session Initiation Protocol (SIP) is considered as the most used signaling protocol for calls over the Internet...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2013

    Network Layer Specific Data Transmission for Integrated Next Generation Networks

    Being digitized the communication system; channels are having a severe workload in the current scenario. The internet and 4G services available in the global world are able to provide good service to both stationary and moving devices. Huge number of devices can be introduced in a specific region of the...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2011

    Lightning Strike Mapping for Peninsular Malaysia Using Artificial Intelligence Techniques

    This paper focuses on Artificial Intelligence (AI) techniques on mapping the lightning strike area in Peninsular Malaysia. Three AI techniques such as fuzzy logic, neural network and neuro-fuzzy techniques are selected to be explored in classifying the characteristics of lightning strike which are based on; level of strike (high, medium,...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    A Safe RFID Authentication Protocol for Internet of Things

    Internet of Things (IoT) is the evolution of related technologies and applications such as Internet and mobile networks. Future research into IoT will focus on generic technology, information security, and critical applications. Based on IoT, the existing RFID system security mechanisms are analyzed, with a focus on cryptographic protocols. Investigate...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Algorithm Design of Secure Data Message Transmission Based on Openssl and VPN

    In order to solve the safety problem that remote or mobile users can perform secure data transmission among different computers via enterprise internal network, conventional approach is to establish VPN connection. The transmitted data via VPN network must be encrypted so as to ensure that illegal users are unable to...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Conceptual Model of Multi-Agent Business Collaboration Based on Cloud Workflow

    With the development of information and network technology, more and more enterprises adopt the networked manufacturing mode to improve their production, service, and operations. However, the current networked manufacturing mode cannot put the centralized resources into distributed services, which leads to a lower inter-enterprise business collaboration capability. This paper firstly...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    K-Means Method for Grouping in Hybrid Mapreduce Clusters

    In hybrid cloud computing era, hybrid clusters which are consisted of virtual machines and physical machines become more and more popular. MapReduce is a good weapon in this big data era where social computing and multimedia computing are emerging. One of the biggest challenges in hybrid mapreduce cluster is I/O...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Research on Resource Scheduling Algorithm Based on Fuzzy Clustering and Smart Agents in Cloud Computing

    Cloud computing has been a hot spot in recent years. In complex and dynamically changing cloud computing environment, resource management and scheduling is a hard and challenging problem, and should be solved at first. This paper presents an effective resource management model and the corresponding resource scheduling algorithm is based...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Modeling and Micro Scale Analyzing of Micro-Switch Applied in All-Optical Communication

    Inductive micro-switch is an integrative device of a sensor and actuator and widely applied in all-optical-network communication. Its malfunctions related to "Fail-to-closure" and "Transient-closure" result in low reliability and weak anti-jamming capability. A new bistable inductive micro-switch is presented based on Micro Electro-Mechanical System (MEMS) technology. A sine rough surface...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    SER-Minimization Relay Selection for Two-Way Relay Channels With Physical Layer Network Coding

    In this paper, the authors explore the relay selection scheme for two-way relay channels with Physical layer Network Coding (PNC), where two end nodes exchange information via a selected relay node with the minimal Symbol Error Rate (SER) performance among multiple candidate relay nodes. To reduce the computational complexity, they...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Hidden Hops Aware Load Balancing Based on Greedy Approach

    Virtual network mapping is one of the main problems in network virtualization. At present, virtual networking mapping aims at minimal resource consumption at substrate network, but ignores the resource demanded by the hidden hops, making bottlenecks due to the resource shortage at the hidden hops. This paper aims at the...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Secure Routing in MANET Using Asymmetric Graphs

    Identification of neighbors plays a major role of many protocols for Wireless Ad-hoc NETworks and also the process of network paths in a network plays an important role. Wormhole attack is a major issue in networks. This type of attack causes the opponent to collects packets from one location and...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Hardware and Software Implementation for Highly Secured Modified Wired Equivalent Privacy (MdWEP)

    Wireless communication networks are in huge need and demand due to various features of Internet and its availability and easy accessibility all over the world. Therefore, advanced security techniques and mechanism are required for private business application and for effective and secured data transfer from one network to other. Many...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Secure Key Sharing for Group Communication Under Community Cloud

    The cloud is one of the most discussed topics among IT professionals today, and organizations are increasingly exploring the potential benefits of using cloud computing or solutions for their businesses. In the users' modern world, people join hands together to form groups and that forms communities through which the ability...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Addressing Security and Privacy Issues in Cloud Computing

    Cloud computing offers a new way to deliver services while significantly changing the cost structure underlying those services. This new technical and pricing opportunities change in the way the business operate. It combines the features of traditional computing technology like grid, parallel and distributed computing and so on. The aim...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Application of Multi-Objective Weighing Work Scheduling Algorithm Into Storage Network

    The resource request task of transmission of large number of servers, wide-band resources in the enterprise storage gridding, the business distribution and download service are limited by scheduling length, time span, load balance, service quality, economic principles, security performance and many other factors, so it is difficult to use definite...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Simulation Service Management Bus in Service Oriented Run-Time Infrastructure

    As the SOA (Service-Oriented Architecture) is paid close attention by many researchers in recent years. It is a component model which can be defined as service according to business needs and can be taken as reusable shared resource. In this paper, Simulation Service Management Bus (SSMB) is proposed to intergrade...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Application of Wildpackets on Protocol Characteristics Analysis of P2P

    WildPackets is the leading provider of network, application performance, and protocol analysis, VoIP monitoring, and troubleshooting solutions. The key of P2P traffic management is constantly updated P2P protocol characteristics library of network traffic management device. In this paper, the authors analyze the determinants of P2P protocol characteristics, the characteristics change...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Broadband Satellite Networks: Standards, Cross-Layer Design, and QoS Improvement

    A review of broadband satellite communication networks scenario, standards on broadband satellite networks and the main specifications of standards are provided. Due to the performance of current broadband satellite system is constrained by the layered protocol architecture, typical of both the ISO/OSI reference model and the Internet protocol suite. The...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    A Vertical Handover Trigger Mechanism Based on Gray Prediction

    Cross layer handover schemes are expected to provide seamless services for mobile terminal in the heterogeneous wireless networks. To reduce the handover delay time, link layer must timely trigger handover protocols of layer 3 so that they can finish handover procedures before current wireless link terminates. Because of limited computing...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Analysis and Design of Low-Power Transceiver With Zigbee Sensor Unit

    Power consumption of nodes in a Wireless Sensor Network (WSN) determines the life cycle of the WSN, so it is particularly important to design low-power and high-performance Wireless Sensor Nodes in the network. Based on a simple analysis of the IEEE802.15.4 protocol specifications and comparison among the efficiencies of different...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Research on the Security System Quantitative Risk Assessment Method Based on Exploitation Graph Model and Bayesian Network

    In this paper, the author's topic is based on multi-feature fusion the Mean shift target tracking technology belongs to the field of intelligent video analysis, moving target tracking is interested in moving target location each image in a video sequence to find and acquire the target movement. Moving target tracking...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Coverage Holes Discovery Algorithm for Wireless Sensor Network

    Non-uniform random distribution and exhausted energy of sensor nodes may lead to coverage holes emerged in Wireless Sensor Networks. Aiming at the problems of coverage holes in Wireless Sensor Networks, a geometry-based distributed coverage holes discovery algorithm is proposed in this paper, and it is proved theoretically. The main idea...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    A Method for CQI Feedback Based on Distributed Compressed Sensing in Adaptive Two-Way Relay System

    In two-way relay wireless communication systems, adaptive modulation and scheduling are promising for increasing the system throughput. To achieve this goal, it is necessary to feedback the information of the Channel Quality Indication (CQI). In this paper, the authors introduced a novel method for CQI feedback based on Distributed Compressed...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    An Efficient Certificateless Authenticated Key Agreement

    Key agreement is very important in information and data security. To overcome the key escrow property of identity-based cryptography and combines the advantages of the traditional PKI and the identity-based cryptography, certificateless public key cryptography is proposed. This paper proposed a new certificateless two-party key agreement protocol and gives the...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Design and Implementation of Intelligent Cloud Guide System Based on Android System

    With the improvement of people's quality of life, the number of travelers has been increasing year by year; the form of the traditional tour guide is gradually unable to meet the needs of tourists. The question, that how the authors can provide better and useful guide service for tourists has...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    On the Shortest Recycle Path Algorithm of Wireless Sensor Node

    Along with the spreading application of Wireless Sensor Network, once the node energy is exhausted, it will cause environmental pollution. Therefore, the problem of node recovery becomes increasingly important. The automatic recycling of robot will become one of the feasible methods. The key is how to use less time and...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Analysis and Countermeasures for the Security of Routing Protocol in Perception Layer of IOTS

    The security has always been the eternal topic in the field of Information technology. As a major part of Internet of Things (IoT), the perception layer acts critical roles from cognizing and sensing the ambient world to implement control instructions. So, the security of perception layer is very important. In...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Flexible Sharing in DHT-Based P2P Networks Using Metadata of Resource

    DHT-based P2P systems have the ability to map a resource's identifier to its location, so a resource can be located by the unique identifier of the resource. In such systems users must know the identifier of a resource exactly to find the resource. However, a resource cannot be described accurately...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Design of COMP Act Rectangular Dielectric Resonator Antenna for Wireless Communications

    The world is in constant changing and the demand of small size antennas with wide band and good performances is increasing, which encouraged the researchers to do an intensive work to deign antennas with these characteristics. One technological solution which meets this demand is the Dielectric Resonator Antenna (DRA). Because...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Misbehaving Attack Mitigation Technique for Multicast Security in Mobile Ad Hoc Networks (MANET)

    Node misbehavior problems have received increased attention in multicasting in Mobile Ad-hoc NETworks (MANETs). The misbehaving nodes can be either selfish or malicious nodes. The main goal of the malicious nodes is to intentionally interrupt the network using various attacks. Hence it is essential to develop a mitigation technique against...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    A Human-Oriented Virus Propagation Model in Email Networks

    The users' world is currently threatened by digital viruses, such as email viruses and mobile viruses. These viruses are mainly activated by users' operations. Therefore, it's important for users to understand the pattern of user's operational behaviors and estimate the effect of such behaviors on virus propagation. This paper first...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Discrete Markov Chain Model for Reputation Estimation of Unstructure P2P Network

    Building trust relationships between peers is an important and difficult part in the security needs of P2P network without a central server. P2P reputation system has been introduced which collects locally generated peer feedbacks and aggregates them to yield global reputation scores. Most P2P applications on the Internet are unstructured,...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    A New Node Self-Localization Algorithm for Wireless Sensor Network Used in the Borehole

    Determining the physical location of sensor nodes is the most basic requirement in most Wireless Sensor Networks (WSN) application. Wireless Sensor Network nodes' self-localization techniques are discussed and studied in this paper. At first, the organization structure of Wireless Sensor Network, the classify of node location algorithmic and node location...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    DV-HOP Localization Algorithm Improvement of Wireless Sensor Network

    The gain of SVC depends upon the type of reactive power load for optimum performance. As the load and input wind power conditions are variable, the gain setting of SVC needs to be adjusted or tuned. In this paper, an ANN based approach has been used to tune the gain...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Resource Scheduling Algorithm Based on Multi-Target Balance in Enterprise Gloud Storage System

    Resource request task is limited by scheduling length, time span, load balancing, Quality of Service, economic principles, safety performance and other factors in the Enterprise Gloud Storage system, it is difficult to characterize it with specific features. This paper analyzed the storage model, designed a compromised task scheduling algorithm based...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Cost: A Service-Oriented Simulation Architecture

    Community of Simulation Task (CoST) is a simulation architecture based on a service-oriented architecture to achieve seamless integration and interoperability of command information system. It servitize the simulation resources through combination the simulation service and completes CoST by management and coordinated simulation resources. Firstly, this paper introduced in the CoST...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Research on Fault-Tolerant Routing With High Success Probability in Mesh Interconnection Networks and Image

    Mesh networks have been applied to build large scale multicomputer systems and Network-on-Chips (NoCs) extensively. Mesh networks perform poorly in tolerating faults in the view of worst-case analysis, so it is practically important for multicomputer systems and NoCs manufactures to determine that how much success probability to construct a fault-free...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    LBGR: A Load Balancing P2P File Storage System Based on Grouping and Reputation

    The expansion of the Internet leads to the rapid growth of information, which brings about urgent needs for rapid, efficient and reliable mass storage systems. In this paper, the authors present LBGR, a load balancing P2P file storage system based on grouping and reputation. LBGR evaluates a node by calculating...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    SOHO Network Modeling and Simulation Using OPNET

    The rapidly growing Internet is driving the demand for higher transmission capacity and high-speed networks. Designing an efficient network to achieve desirable performance is a challenging task, requiring designers to balance user performance expectations with costs and capacities. The paper is based on the OPNET simulation tool focusing on the...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Study and Implementation of Library Workgroup Based on Security Policy System

    IPSec provides cryptographic-based security protection mechanism for IP packets. The correct implementation of IPSec depends on the security protection parameters included in security policies. IETF Library workgroup's proposal of security policy system architecture can simplify the task of managing security policies and ensure the proper deployment of security policies. By...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2013

    Reliable Real-Time Data Transmission in Manet Using Connection Possibility

    In Mobile Ad-hoc NETworks (MANETs), reliability in real time data transmission can be assured by confirming the connectivity of the network. Since, MANETs are characterized by dynamic topology changes; the established connection must be monitored for its consistency. In order to provide and maintain connectivity, in this paper, the authors...

    Provided By Journal of Theoretical and Applied Information Technology