Journal of Theoretical and Applied Information Technology

Displaying 1-40 of 936 results

  • White Papers // Aug 2015

    Web Services Composition for Concurrent Plan using Artificial Intelligence Planning

    Automatic planning of web services composition is a challenging problem both in academia and real-world application. Artificial Intelligence (AI) planning can be applied to automate web services composition by depicting composition problem as AI planning problem. Web services composition would combine multiple services whenever some requirements cannot be fulfilled by...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Aug 2015

    A Comprehensive Human Factor Framework for Information Security in Organizations

    Human factor represent an essential issue in the security of information in organizations, as human factor determine the behavior of the employees toward information security. This paper attempts to integrate related human factors, recognized by previous paper, into a structured comprehensive framework. The framework has four main domains that take...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Aug 2015

    Slotted Microstrip Antennas for Circular Polarization with Compact Size For RFID ,Bluetooth &S-Band Applications

    Micorstrip patch antennas play a major role in day-to-day life. In this paper, the designed microstrip patch antenna is compact sized with circular polarization for RFID applications. Different arbitrary shaped slots like square circle plus are used and parameters like return loss, gain and frequency are observed for each of...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Aug 2015

    Throughput Enhancement of Wireless Sensor Network Localization Accuracy Against Jamming Attacks

    Localization refers to locating the position or area in which the sensor or object to be tracked. Based on the localization, many applications are emerging in the wireless sensor network. Since the wireless sensor network is a shared medium, jamming attacks can be launched by adversary emitting the radio frequency...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Aug 2015

    Applying Case based Reasoning in Agile Software Development

    There is a common misconception among developers who follow agile development methods that following formal processes and modeling are unnecessarily and perceived as a waste of effort. The initial intension of agile was not an anti-methodology movement but rather a balance between processes and production. Nevertheless, the main challenges facing...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jul 2015

    Elliptical Curve Cryptography Algorithm for Secure Mobile Adhoc Network

    Reducing network traffic and achieving high security are the most significant task of the Mobile Ad-hoc NETwork (MANET). The beacon-less kNN query processing methods are utilized for reducing traffic and maintaining high accuracy of the query result in MANET. The explosion method and spiral method are adopted in this approach....

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jul 2015

    Bluetooth Based Wireless Home Automation System using FPGA

    With the increasing development of modern technology and Smartphone, smart way of living has turned out to be a major part in the present era of human life. Due to rapid growth in technology, Bluetooth has brought a revolutionary change. Bluetooth technology aims to exchange data wirelessly within a range...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jul 2015

    The Effect of Routing On Data Traffic Control in Environmental Event Monitoring using Wireless Sensor Networks

    Wireless sensors networking is a promising technology for a wide range of useful applications in many areas including civilian and military areas. Thanks to the sensing capabilities of Wireless Sensor Networks (WSNs), they become a prominent choice for certain applications such as environmental monitoring. The distributed sensors collectively realize the...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jul 2015

    Object Localization and Path Optimization using Particle Swarm and Ant Colony Optimization for Mobile RFID Reader

    Optimization for an RFID reader is an important technique to reduce the cost of hardware; the authors need to define the location of the RFID reader to ensure the node will be fully covered by the reader. It is also essential to find the best way to place the nodes...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jul 2015

    Trust Based Dynamic Source Routing Protocol for MANET Against Routing Attacks

    Devices themselves are the network in ad hoc networks allowing seamless communication, at low cost, in a self-organized fashion and also easy deployment. Freedom and self-organizing capabilities make Mobile Ad hoc NETworks (MANETs) completely different from other networking solution. MANETs highly dynamic nature leads to changes and network topologies unpredictability,...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2015

    An Efficient Mathematical Analysis For Saving Energy in WSN Routing Protocol

    The issue of energy efficiency in Wireless Sensor Networks (WSNs) is a prime consideration. Therefore, the authors propose an energy-saving scheme for use in wireless sensor networks and this goal of this research. The proposed protocol is a mixture of the Low Energy Adaptive Clustering Hierarchy (LEACH) and Mediation Device...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2015

    A Survey of Routing MAC Techniques for Wireless Sensor Networks Routing Protocol

    A Wireless Sensor Network (WSN) contains a random number of sensors distributed in the environment to monitor physical conditions. In the following, a survey of MAC routing mechanisms in WSN is presented and discussed. One of the most important issues in WSN is the issue of energy efficiency of the...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2015

    RACARP: A Robustness Aware Routing Protocol for Cognitive Radio Ad Hoc Networks

    Cognitive Radio (CR) is a new paradigm which offers a viable solution to deal with the spectrum shortage problem and enhances the spectrum utilization in wireless communication systems. In Cognitive Radio Ad Hoc Networks (CRAHNs), data routing is one of the most challenging tasks due to varying link-quality, frequent topology...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2015

    A Comparative Evaluation of Intrusion Detection Techniques in Wireless Sensor Network

    Wireless Sensor Network (WSN) are composed of low cost sensor nodes and usually deploy in open and unprotected area, which make security the major challenge in this kind of network, due to their characteristics WSN is vulnerable to various types of attacks and intrusions, where it require security mechanisms to...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2015

    Novel Printed Monopole Trapezoidal Notch Antenna with S-Band Rejection

    A compact coplanar waveguide fed trapezoidal monopole antenna and a notch band monopole antenna are presented in this paper. Notch band is obtained between 3-4 GHz, which covers S- band of WiMAX applications. The notch band antenna is obtained by etching U- slot on the radiating element of the monopole...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2015

    Design of Network Architecture for Intrusion Detection using Spanning Tree Multiclass Classifier in MANET

    Security in mobile ad-hoc network plays a strategic role to ensure high level of protection without any intrusions in computer networks. Most of the intrusions in mobile ad-hoc network are traced and detected by collecting traffic information and classified according to different classification algorithms. With individual traffic classifiers design, packet...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2015

    The Moderating Effect of Web Service on the Relationship between Business Analytics and Supply Chain Performance

    In recent years, supply chain performance measurement has received much attention from researchers and practitioners. Effective supply chain performance through supply chain antecedents such as business analytics has become a potentially valuable way of securing competitive advantage and improving supply chain performance. Many organizations have begun to recognize that supply...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2015

    Modified Vertical Handoff Decision Algorithm for Improving QOS Metrics in Heterogeneous Networks

    In 4G networks, the meshing of WiMAX and WLAN has been a tough task. Issues regarding intermeshing of WIMAX and WLAN networks during vertical handoff have to be analyzed. Two interconnected networks such as WIMAX and WLAN has been proposed. The authors' proposed scheme provides better connectivity between fixed and...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2015

    An Improved Adaptive and Dynamic Hybrid Agile Methodology to Enhance Software Project Success Deliveries

    The discipline, uptake and use of agile methodologies in the software industry have been slow and unconvincing as a robust tool. The research community also indicates that, since the use of agile methodologies was first introduced more than 13 years ago, issues and perceptions have been many suggesting a keen...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2015

    Overview on Identification of Marks of Subscriber Secret Location Tracking in Wireless Communications Networks

    As mobile devices are getting an integral part of people's everyday life they store and process data that can be of great importance for the user. Another problem with the development of mobile Internet and means of wireless communication is tracking. All the movements and activities of the mobile phone...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2015

    AACGFA : Adapting Auto-Configuration Geographical Fidelity Algorithm for Mobile Wireless Sensor Networks

    Today Mobile Wireless Sensor Networks (MWSNs) are used in several areas. There are many environments of developments and designs MWSN in programing level according to project needs, however in this paper, the authors will design a MWSN model using design tools as Wisen Profile (model devoted to a driven development...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2015

    Empirical Study of GUI to Reuse Unusable Test Cases

    Now-a-days, it is more important to upgrade web applications which are provided by companies due to changes in user requirements. In developing web applications the Graphical User Interface (GUI) plays vital role. Due to frequent changes in application it varies from old version and modified version. Finally, it makes some...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2015

    Network Selection in Heterogeneous Wireless Environment using Decision Making Algorithms-Topsis and Promethee

    Forthcoming wireless environment is a fusion of numerous networks with diverse technologies deployed by individual operators. In such an environment, innovative network selection methodologies are required not only to provide "Always best connected" service to mobile users but also to maximize network operator's revenue. To fulfill such requirements, multiple attributes...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2015

    State of the Art Survey on Security Issue in Cloud Computing Architectures, Approaches and Methods

    The development of cloud computing has revolutionized in how the computing and storage are utilized remotely. It has grown from being hopeful business concept to one of the fast growing segments of the IT manufacturing. It has become attractive to businesses and organizations. Although of all the benefits of the...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2015

    Performance Analysis of Relay and Combining Methods in Wireless Networks

    The quality signal in a wireless transmission occasionally suffers from severe bad channel quality due to effects like fading caused by multi-path propagation. Diversity is one of the methods that used to reduce such effect whereby different samples of the same signal are transferred over essentially independent channels. Cooperative wireless...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2015

    Packet Level Data Compression Techniques for Wireless Sensor Networks

    Wireless sensor network consist of a set of sensor nodes. The processing capacity varies with each node. Sensors in it have storage capacity which is limited. The main challenge today in this field is to improvise the power and energy management of sensor network. Different techniques have been introduced by...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2015

    Bandwidth Provisioning Scheme for 3D Wireless Sensor Networks

    BandWidth (BW) resources are scarce and valuable in Wireless Sensor Networks (WSNs). Managing this scarcity in BW is a key challenge in WSN's environments. Achieving high BW Utilization (BWU) will rise the Quality-of-Service (QoS) that network can guarantee, without the omission of the importance of concurring BWU, with the minimizing...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2015

    Evaluation Of Security in Software Architecture using Combination Of ATAM and STRIDE

    In this time, security is important thing that must be included when develop software because it has large effect on continuity of software and business. Therefore, security evaluation is required as a phase in software architecture development. Security evaluation is useful to minimize future problems about security. This paper is...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Apr 2015

    New Architecture of IDS Based Interaction on Mobile Agents and Data Mining

    Intrusion Detection System (IDS) is a very useful tool for the defence of a network against attacks. Now-a-days, intruders use a complex attacks towards a target. This makes the IDS unable to detect all intrusions and the latter generate two frequent false alarms. This paper is to propose a new...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Apr 2015

    An Assessing Approach Based nn FMECA Methodology to Evaluate Security of a Third Party Cloud Provider

    Cloud computing is recognized as a great eliminator of the hefty costs and complex processes that come with evaluating, purchasing, configuring or managing software and hardware essentials that are necessary for enterprise applications. However it presents a significant security concerns that need to be addressed when moving to the cloud...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Apr 2015

    Review of Quality Of Service in Routing Protocols for Wireless Sensor Networks

    Rapid innovative improvements in wireless communication technology have revolutionized Wireless Sensor Networks (WSNs). A WSN is comprised of self-ruling sensors that are distributed spatially to monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion, or pollutants and to pass this information through the network to a main...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Apr 2015

    Scalable Multidimensional Anonymization Algorithm Over Big Data Using Map Reduce On Public Cloud

    It appears that everybody observes with special attention, the occurrence of big data and its practice. There is no disbelief that the big data uprising has instigated. Though the practices of big data propose favorable business paybacks, there are substantial privacy implications. Multidimensional generalization anonymization scheme is an actual method...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Apr 2015

    Energy Saving in Green Cloud Computing Data Centers: A Review

    The cloud computing is a new computing standard which targets to offer reliable, adaptive and Quality-of-Service (QoS) based computing environments for IT users. One of the recent major concerns in cloud environment is efficient usage of energy in its data centers. This paper reviews energy saving strategies in data centers...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Apr 2015

    Improvement of Rectangular Patch Antenna Performance for RFID Applications

    Printed elements antennas "Patch" have the advantages of microstrip lines, light weight, reduced by the technique of printed circuit cost. They can be placed on land or space vehicles, easy to networks of tens or hundreds element, connected directly to the power supply device that goes in the direction of...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Apr 2015

    Malicious Node Detection Through Trust Aware Routing in Wireless Sensor Networks

    Wireless sensor network are constituted by a large number of tiny size sensors and distributed randomly for gathering information. These types of networks have remarkable applications and demand worldwide. The wireless sensor network has been suffered with variety of attacks because of its design and deployment nature. The previous traditional...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2015

    Using Multi-Agents Systems in Distributed Data Mining: A Survey

    Extract accurate information from huge databases about peta-bytes has an unprecedented utility. However, the implementation of a data mining system requires an enormous amount of work and an extremely long run time in some cases of distributed environments. Distributed artificial intelligence consists that the entities with certain amount of autonomy...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2015

    Reconstructing, Augmenting and Manipulating 3D Scene from Sequence of Images

    The detection of third dimension by using multiple images follows naturally from the physical behavior of human eyes in the vision of 3D objects. In this paper, the scene parameters are setup for scene reconstruction; camera position and orientation are considered. Consecutive images are used to create the depth map...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2015

    Centroid Dynamic Sink Location for Clustered Wireless Mobile Sensor Networks

    The wireless sensor network consists of three main components: a large number of small-sized sensors, a remote sink connected to the internet, and a cluster head whose existence depends on the overall network structure. The sensor in the wireless sensor network can be deployed through many ways, such as a...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2015

    Symmetric Cryptography Keys Management for 6Lowpan Networks

    Thanks to the 6LoWPAN (IPv6 over Low power Wireless Personal Area Network) technology, each object will get the opportunity to obtain an IPv6 address and integrate the world of the Internet of things. This provides the ability to collect and monitor data remotely. Objects are heterogeneous; they vary depending on...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2015

    A New Proposed Dynamic Dual Processor Based CPU Scheduling Algorithm

    Selection of appropriate CPU scheduling algorithm is important, because the OS scheduler has to context switch, the CPU among the various tasks that an operating system has to execute. Real time systems involve high number of context switches. Hence, RR scheduling is not suitable, as this can result in a...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2009

    The Role of Zigbee Technology in Future Data Communication System

    ZigBee is an IEEE 802.15.4 standard for data communications with business and consumer devices. It is designed around low-power consumption allowing batteries to essentially last forever. The ZigBee standard provides network, security, and application support services operating on top of the IEEE 802.15.4 Medium Access Control (MAC) and Physical Layer...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Oct 2010

    A Study of Security Challenges in Wireless Sensor Networks

    Wireless Sensor Networks (WSN) is a recent advanced technology of computer networks and electronics. The WSN increasingly becoming more practicable solution to many challenging applications. The sensor networks depend upon the sensed data, which may depend upon the application. One of the major applications of the sensor networks is in...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2010

    A Novel Distributed Protocol for Randomly Deployed Clustered Based Wireless Sensor Network:

    Grouping sensor nodes into cluster has been popularly used in order to achieve the network scalability. Every cluster needs a leader, and referred as the cluster-head. Many clustering Schemes for Wireless sensor Networks focus on the stable clustering techniques for mobile environments. In this paper, the authors have proposed a...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2010

    Security Issues in Wireless Sensor Network Data Gathering Protocols: A Survey

    Wireless sensor networks are usually deployed for gathering data from unattended or hostile environment. Several application specific sensor network data gathering protocols have been proposed in research literatures. However, most of the proposed algorithms have given little attention to the related security issues. In this paper the authors have explored...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Sep 2010

    Semantic Web And Economic And Financial Information Management

    The field of economy and finance is a conceptually rich domain where information is complex, huge in volume and a highly valuable business product by itself. Novel management techniques are required for economic and financial information in order to enable an effective generation, gathering, integration, management and consumption of complex...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jul 2008

    Control System for Internet Bandwidth Based on Java Technology

    This paper presents a Java-based real-time Internet access estimation tool for Quality of Service (QoS) in Internet accesses for Multimedia applications (JEQoSIM). It is specially aimed for real-time multimedia applications which use the User Datagram Protocol (UDP). The system is capable of estimating access capacity, available bandwidth and delay as...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Sep 2009

    Design & Development Low Cost RFID Antenna

    This paper describes how Low Cost HF (13.56 MHz) antennas can be built and tuned so that their characteristics match the requirements of the high performance reader and third party RF modules. This third edition places greater emphasis on antennas for the higher power readers. In general, the distance at...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Oct 2009

    Overview and Challenges of Routing Protocol and Mac Layer in Mobile Ad-Hoc Network

    Mobile Ad-hoc Network (MANET) are a new paradigm of wireless wearable devices enabling instantaneous person-to-person, person-to-machine or machine-to-person communications immediately and easily .In this paper an overview and history of MANET is given .The paper discusses the issues which should keep in mind for designing of MAC layer and Routing...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2010

    Robust TCP: An Improvement on TCP Protocol

    The Transmission Control Protocol (TCP) is the most popular transport layer protocol for the internet. Congestion Control is used to increase the congestion window size if there is additional bandwidth on the network, and decrease the congestion window size when there is congestion. This paper uses a classic TCP which...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2009

    Design & Simulation of Optical Fiber Bragg Grating Pressure Sensor for Minimum Attenuation Criteria

    This paper presents the design & simulation of an Optical Fiber Bragg Grating (OFBG) sensor for stress, strain measurement and also demonstrates the methodology to arrive at the optimal grating pitch dimensions for a given interrogating wavelength. The wavelength chosen for interrogation of the Fiber Bragg Grating (FBG) sensor is...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2010

    SINR Based Vertical Handoff Algorithm Between GPRS and WiMAX Networks

    Next generation wireless network is foreseen as the combination of heterogeneous wireless networks capable of providing enhanced services to mobile users. Vertical handoff is a crucial issue in providing service to mobile users, in a heterogeneous network. To maintain continuous service during vertical handoff period, the handoff procedure should consider...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2010

    A Study on Cellular CDMA-Based for New Generation Mobile Radio System

    As the networks improve and new demands for rapid data transfer rates and multimedia services grow, operators are seeking new cellular communication solutions based on technologies like GSM, 3GSM and CDMA2000 to cater to these requirements. The paper points out that the increasing popularity of the GSM equipments globally is...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Oct 2009

    Matching Model for Semantic Web Services Discovery

    The Semantics-based Web Service Matching Model is proposed in this paper to improve the performance of Web Service discovery. Semantics-based Web Service Matching is a two-phase method including semantic similarity matching and qualitative filtering. Function-based semantic similarity matching used of matching algorithm in order to finding the most proper services....

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2010

    An Efficient Architecture for Agent-Based Dynamic Web Service Discovery With QoS

    The SOA enables the development of flexible large scale-applications in open environments by dynamically combining the web services. There exist many web services which exhibit similar functional characteristics. It is imperative to provide service consumers with facilities for selecting required web services according to their non-functional characteristics or QoS. An...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2010

    SMS Advertising and Its Prospects in Bangladesh

    Application of SMS advertising for enhancing communication with the consumers has drawn significant attention of the contemporary researchers. This study examines whether SMS advertising can be an effective medium of advertising in Bangladesh. The key ingredient of this research is the perception of consumers regarding the adoption SMS advertising. Qualitative...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Nov 2009

    Enhance Fuzzy Commitment Scheme: An Approach for Post Quantum Cryptosystem

    This paper attempt has been made to explain a fuzzy commitment scheme with McEliece scheme because the efficiency and security of this cryptosystem is comparatively better than any other cryptosystem. Since this scheme is one of the interesting candidates for post quantum cryptography. Hence interest to deal this system with...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Oct 2009

    A Novel Information Hiding Technique for Security by Using Image Steganography

    This paper a novel method is proposed to provide more security for the key information with the combination of image compression and data encryption method. This method requires less memory space and fast transmission rate because of image compression technique is applied. Steganography plays an important role in information security....

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Sep 2009

    A Way Forward to Improving Functionalities of Open Database System

    The increasing need for information dissemination and the tremendous population growth in today's organizations calls for the need to migrate most application and their associated data to the network where several millions of people can access concurrently. Several challenges such as security risk and management/maintenance of the database have been...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Oct 2009

    Pattern Recognition Algorithms for Ear Biometrics

    This paper presents geometrical Parameter algorithms for ear Biometrics by representing the Ear image as contours, feature extraction and recognition. The proposed algorithms were developed for ear biometrics, but they can be applied in other contour image processing applications. Firstly it presents mathematical and algorithmic foundations of geometrical feature extraction...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2013

    A New Integration Method of Information for Table Tennis Training From a Data Warehouse

    A continuing challenge for Integration Information of Table Tennis Training (TTT) is to develop efficient data unit component part. Many see data unit integration as a potential solution; however, the quality of data integration of Table Tennis Training tends to outweigh the potential benefits. The quality of TTT data unit...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2013

    A Light-Weighted Transaction Processing System Based on Internet Message Access Protocol

    A few methods are proposed to build a light-weighted transaction processing system, which is based on the Internet Message Access Protocol (IMAP). The main idea underlying these methods is to use an email service as ubiquitous lightweight data storage and provide means to assure transaction processing in a new application...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2013

    Quantum Information Delay Scheme Using Orthogonal Product States

    In this paper, the authors provide a quantum information delay scheme using orthogonal product states. By sharing orthogonal product states one person can give the other person some information which cannot be read until he or she lets the latter do. The fundamental Laws of quantum mechanics guarantee that the...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2013

    Multi-Level Group Key Management Technique for Multicast Security in MANET

    In Mobile Ad-hoc NETworks (MANETs), data transmission is speeded up by means of multicasting. Though multicast transmission lessens overhead, collision and congestion, it persuades new challenges towards security management. This challenge must be conquered to bring better throughput of the network. In this paper, the authors introduce a multi level...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2013

    A Real Time Health Control and Localization of Pilgrims in El Hajj: BSN Application

    As an emerging technology, WSN (Wireless Sensor Networks) composed from a large number of small, low data rate and inexpensive node that communicate in order to sense or control a physical phenomenon. WSN have a lot of applications like disaster management, health, military and security, and enormously attracted the community...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2013

    Optimization Method of Pilot Allocation for Cooperative Amplify-and-Forward OFDM System

    Pilot-assisted channel estimation has been studied only in common cooperative AF (Amplify-and-Forward) OFDM which has no feedback mechanism. In this paper, for cooperative AF-OFDM system, the authors propose a feedback technique in which the pilot allocation mechanism is adapted to the cooperative mobile channel. Then they show how uniform pilots...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2013

    Algorithm for Redundant Nodes Deployment of Greenhouse WSN Monitoring and Control System

    Specific to the funneling effect of Greenhouse Wireless Sensor Networks (WSN) monitoring and control system, Redundant Nodes Deployment Algorithm (RNDA) is proposed. RNDA deploys a certain number of redundant nodes based on load of nodes so as to balance energy consumption of network. By means of introducing the next-hop routing...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2013

    Multi-Attribute Reverse Auction-Based Protocol for Resource Allocation in Grids

    Auction models are found efficient in managing resources allocation, which is a key technology in grid computing system. In this paper, a new reverse auction approach is proposed, and its mechanism and related auction algorithm are designed. In the authors' approach, the grid trading service, i.e., an intelligent entity uses...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2013

    Study in the Routing Algorithm Improvement on Multi-Channel Multi-Hop Wireless Sensor Network

    In this paper, the authors analyze the characteristics of Wireless Sensor Networks through the history of the development of Wireless Sensor Networks. They propose a new Wireless Sensor Network nodes algorithm based on the study of Wireless Sensor Network routing mechanism and the transmission model .This algorithm improves the protocol...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2013

    A Novel Wireless Network Based Mobile E-Buisiness General Architecture

    The upcoming mobile and ubiquitous computing world will need new forms of information sharing and services collaboration between mobile devices, thus to support mobile commerce applications. In this paper, a General Mobile Business Architecture (GMBA: General Mobile Business Architecture) was presented, which can be used in hybrid network environment with...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2013

    A Key Agreement for Large Group Using Bilinear Maps

    A key agreement scheme for large dynamic multicast group systems has been designed to cope with such applications including pay-tv, teleconferencing, collaborative work, online games, and so forth. To avoid heavy loads and unauthorized accesses to the system, it is necessary to construct an efficient and secure scheme. Some recently...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2013

    Research on Improved Positioning Algorithm Based on UWB

    Ultra Wide Band radio (UWB) is also known as the Impulse Radio (IR). It will become one of the most competitive technologies, especially in the high speed data transmission, high precision positioning, tracking and other fields; it has broad application prospects in the future. The main function of the high-voltage...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2013

    Hybrid Approach for Energy Optimization in Cluster Based WSN Using Energy Balancing Clustering Protocol

    In recent times, the technology of Wireless Sensor Network has a great impact on technical fields like wireless communication, information technology, electrical etc. However the major problem faced in this technology is that the sensor nodes run out of energy very quickly. Many routing protocols have been proposed to solve...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2013

    A Scalable Semantic Peer-to-Peer System

    Peer-To-Peer computing is emerging as a new distributed computing paradigm for many novel applications that involve exchange of information among a large number of peers with little centralized coordination. Scalability is without doubt the foremost requirement for a Peer-To-Peer system. To obtain a high factor of scalability, the authors partition...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2013

    A New Clustering Algorithm for Wireless Sensor Networks

    Wireless Sensor Networks have recently become an attractive research area. However, saving energy and, thus, extending the Wireless Sensor Network lifetime entails great challenges. For this reason, clustering techniques are largely made use of. In this paper, the authors propose a new algorithm based on the principle of spectral clustering...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2013

    Cloud Data Management: System Instances and Current Research

    With the development of Internet technology and cloud computing, cloud data management technology has emerged while the technology of traditional database management cannot meet the requirement. In this paper, the authors will compare the features and analyze the difference among the new cloud data management systems from data model, data...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2013

    Cycle Recording in Track and Field Competitions of RFID

    Automatic cycle record in track and field competition has been a difficult problem for a long time. The rapid development of RFID promises the possibility of its realization. This paper studies the data acquisitions and processing in RFID, according to the cycle record in distance race, proposes the non-artificial methods...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2013

    Heterogeneous Multi-Sensor Joint Tracking of Target Buried in Aew Radar Blind Doppler Zone

    Due to adopting the Pulse Doppler (PD) system, the Blind Doppler Zone (BDZ) of Airborne Early Warning (AEW) radar is inevitable. This paper focuses on finding a technique with good estimation performance for tracking airborne targets flying in AEW BDZ. Consequently, combining with Interacting Multiple Models (IMM), Extended Kalman Filter...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2013

    The Research on Dispersion Control of Dispersion Unshifted Single-Mode Optical Fiber

    The dispersion unshifted optical fiber is in favor of communications construction project, because of its mature manufacturing technique, low loss, large bandwidth, transmission distance, low engineering cost, the related derivative products, easy realization. In order to pursue a better communication quality, dispersion control has become an important index of engineering....

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2013

    Efficient Top-K Query Processing in P2P Networks

    Top-k query is widely used in the search engine and gains great success, which perform the cooperative query by aggregating the database objects' degree of match for each different query predicate and returning the best k matching objects only. It's also applied to P2P file-sharing systems. However, top-k query processing...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2013

    Speech Authentication Based on Perceptual Fingerprint Hashing

    A perceptual fingerprint hashing method is proposed for audio authentication in this paper. First, the biologic fingerprint image is divided into overlapping rectangle blocks by randomly using a chaotic sequence, and then the gravity center of each block is calculated. Finally, the perceptual Hashing value is generated based on the...

    Provided By Journal of Theoretical and Applied Information Technology