Journal of Theoretical and Applied Information Technology

Displaying 1-40 of 717 results

  • White Papers // Mar 2015

    Using Multi-Agents Systems in Distributed Data Mining: A Survey

    Extract accurate information from huge databases about peta-bytes has an unprecedented utility. However, the implementation of a data mining system requires an enormous amount of work and an extremely long run time in some cases of distributed environments. Distributed artificial intelligence consists that the entities with certain amount of autonomy...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2015

    An Efficient and Novel Approach for Web Search Personalization Using Web Usage Mining

    Generally each user has a different background and different needs when the user searches for any information on the web. For the same query issued by different users, most of the search engines return the same results to all users, without considering the individuals need. This problem is solved using...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2015

    A New Proposed Dynamic Dual Processor Based CPU Scheduling Algorithm

    Selection of appropriate CPU scheduling algorithm is important, because the OS scheduler has to context switch, the CPU among the various tasks that an operating system has to execute. Real time systems involve high number of context switches. Hence, RR scheduling is not suitable, as this can result in a...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2015

    Comparison of Hardware and Nios II Based-Software Implementation of MLP on the FPGA Plateform

    The artificial neural networks provide optimal and satisfactory solutions for most applications of image and signal processing requiring complex mathematical operations. This often leads to implement these artificial neural networks in platforms that retain their performance (computational efficiency and speed of execution). This paper presents, in a first stage, two...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2015

    Cyber Security for Cyber Physcial Systems: A Trust-Based Approach

    Cyber-Physical Systems (CPS) consists of a combination of different embedded subsystems, which work independently of each other and also interact with the external environment. Such embedded systems operate in the presence of inherent uncertainty, context dependencies and adversarial certainty arising from both the cyber and physical worlds. Security is one...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2015

    Experimental Evaluation of TCP Congestion Contorl Mechanisms in Short and Long Distance Networks

    Originally TCP was designed for early, low bandwidth, short distance networks, so standard TCP did not utilize the maximum bandwidth in today's high bandwidth network environments. Therefore a lot of TCP congestion control mechanisms also known as TCP variants have been developed for today's long distance high bandwidth networks. In...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2015

    A New Adaptive Throughput Policy Algorithm on Campus IP-Based Network Internet Traffic

    In this paper, the authors present the development of a new scheme called Adaptive Throughput Policy (ATP) algorithm to control internet inbound throughput utilization in an IP-based network by considering traffic flows and their processing times. Real live inbound internet traffics collected from a campus network with Committed Access Rate...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2015

    Energy Efficient Node Disjoint Multipath Routing to Improve Wireless Sensor Network Lifetime

    Some of the major challenges confronting wireless sensor networks are usually associated with scarcity of energy and resource limitations. In order to achieve efficient utilization of energy and increase the operational lifetime of the wireless sensor network while at the same time providing consistent packets delivery, energy efficient node disjoint...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2015

    A Comparative Evaluation of State-of-the-Art Integration Testing Techniques of Component-Based Software

    In the last few years, component-based software has gained widespread notice and acceptance as a method that facilitates the development of existing large, complex, and very critical systems by integrating prefabricated small pieces of software called components. Component integration becomes an essential stage in the component-based software development Lifecycle. Therefore,...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2015

    A Survey and Open Issues of Jammer Localization Techniques in Wireless Sensor Networks

    Jamming sensor attacks localization is a significant area that acquires considerable research interest. This interest is expected to grow further with the prolifiration of wireless sensor network applications due to the physical share environment. Jamming attacks emitting a radio frequency signals by the adversaries and impact the wireless sensor network...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2015

    Automatic Adaptive Reconfigurable FPGA with Reusable Techiniques Using ARM

    In this paper, the authors discuss about reconfigurable system that allow online adaptation, whenever a fault occurs in the system. This is obtained by using FPGA that switches among Configurable Logic Block (CLB) automatically which has same features in an optimal manner. This reduces the time and complexity. Also the...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2015

    Enhancement of AES Algorithm Based on Chaotic Maps and Shift Operation for Image Encryption

    With the rapid development of the Internet and communication networks, the confidentiality of digital images transmitted over public networks must be preserved by using encryption techniques. Advanced Encryption Standard (AES) is one of the most commonly used encryption algorithms at present. Although AES has several advantages, such as security in...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2015

    Security Policies Matching Through Ontologies Alignment to Support Security Experts

    The management of security policies has become increasingly difficult for the security expert given the number of domains to manage their extent and their complexity. A security expert has to deal with a variety of frameworks, with different language specifications, formalization and aspect used in domains that may belong to...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2015

    High Performance Implementation of RSSI Based Wi-Fi Location Tracker for Android Applications

    Wi-Fi-based Positioning System (WPS) is used where GPS is inadequate due to various causes including multipath and signal blockage indoors. Such systems include indoor positioning systems. The advantage of choosing Wi-Fi for a location based service is its high compatibility and frequency of availability. The majority of today's smart phones...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2015

    Does Efficient Fuzzy Kohonen Clustering Network Algorithm Really Improves Clustering Data Result?

    In this paper, the authors Fuzzy Kohonen Clustering Network (FKCN) algorithm is compared to Efficient Fuzzy Kohonen Clustering Network (EFKCN) algorithm. This paper is conducted to see if EFKCN is really efficient and could do a better clustering analysis than original FKCN. They do empirical testing and simulations to compare...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2015

    Towards a Multi-Agents Systems Application Based on the EAS-SGR Framework

    Information has always been in the heart of every organization. During its exchange this information can be altered or modified. It is also considered as a key element for the development of many businesses. In this context, the authors have the obligation to protect it and secure it. In fact,...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Ensemble of Clustering Algorithms for Anomaly Intrusion Detection System

    Maximizing detection accuracy and minimizing the false alarm rate are two major challenges in the design of an anomaly Intrusion Detection System (IDS). These challenges can be handled by designing an ensemble classifier for detecting all classes of attacks. This is because, single classifier technique fails to achieve acceptable false...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Node Location Analysis Using RSSI for Automatic Position Reporting System

    In this paper, the authors analyze various connectivity issues encountered when a mobile node identifies an access point with greater signal strength and find a proper node location in the network. Dynamic networks require adaptive policies for optimal performance and guaranteed QoS to support real-time environment. The network connectivity issues...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    A Middleware and Policy-Based Adaptation Framework to Simplify Software Evolution: An Implementation on Unit Trust Enterprise System

    Software evolution needs to be properly controlled to avoid huge problems during maintenance phase. Software needs to evolve to ensure it meets its development purpose. One of promising ways to address the issue of software evolution is via software adaptation. There are 4 main approaches to software adaptation i.e. architecture-based,...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Automated Test Case Generation Using UML Use Case Diagram and Activity Diagram

    Testing plays a major role for improving the quality of a software product. Due to its iterative and incremental nature it needs special attention. Test case generation is one of the complex activities carried out during testing phase. Generating test cases in the early phases of development life cycle works...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Evaluated Reputation-Based Trust for WSN Security

    During the last years, Wireless Sensor Networks (WSNs) and its applications have obtained considerable momentum. However, security and power limits of WSNs are still important matters. Many existing approaches at most concentrate on cryptography to improve data authentication and integrity but this addresses only a part of the security problem...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Error Compensated Fixed Width Modified Booth Multiplier for Multimedia Applications

    Many multimedia and digital signal processing systems are desirable to maintain a fixed format and to allow little accuracy loss to output data. The objective of this paper is to design a fixed width modified booth multiplier with high error performance. And the need to derive an effective error compensation...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Measurement Study on Packet Size and Packet Rate Effects Over Vehicular Ad Hoc Network Performance

    A Vehicular Ad-hoc NETwork (VANET) is a type mobile ad hoc network which is developed to increase physical safety of vehicles' derivers. Many parameters affect the performance of VANET. Packet size and packet rate are two important parameters that need to be considered when using VANET. Different values of these...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Generalized Frequency Division Multiple Access Allocation Scheme for LTE-A

    Frequency Division Multiple Access (FDMA) is one of the important features of Long Term Evolution Advanced (LTE-A). For LTE-A downlink, Orthogonal FDMA (OFDMA) scheme is used to provide frequency orthogonality. Whereas, for uplink, Signal Carrier FDAM (SC-FDMA) is preferred since it provides improved PAPR performance over OFDMA. Interleaved FDMA (IFDMA)...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Current State of Anti-Phishing Approaches and Revealing Competencies

    Phishing has become a substantial threat for internet users and a major cause of financial losses. In these attacks the cybercriminals carry out user credential information and users can fall victim. The current solution against phishing attacks are not sufficient to detect and work against novel phishes. This paper presents...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Trust Based Ad Hoc on Demand Distance Vector Routing Protocol Against Wormhole Attack

    Mobile Ad-hoc NETworks (MANETs) consists of mobile devices that communicate with each other without any predefined infrastructure/centralized administration. In network nodes can join or leave a network freely, MANETs are vulnerable to unauthorized data manipulation as it does not verify user identity before ensuring data access. Thus it is challenging...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    An Effective Scheduling of Multiple Source Nodes in MANET Using Dempster-Shafter Hypothesis

    A Mobile Ad-hoc NETwork (MANET) is built without any central control point such as a base station. Partially Observable Markov Decision Process (POMDP) multi-armed bandit problem solved continuous user authentication and Intrusion Detection Systems (IDS) for large network with different nodes. But POMDP did not deal with higher number of...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Application of FEAST (Feature Selection Toolbox) in IDS (Intrusion Detection Systems)

    Security in computer networks has become a critical point for many organizations, but keeping data integrity demands time and large economic investments, in consequence there has been several solution approaches between hardware and software but sometimes these has become inefficient for attacks detection. This paper presents research results obtained implementing...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Automatic Classification of Audio Data Using Gradient Descent Neural Network Based Algorithm

    Audio mining is a technique by which the core of an audio signal can be automatically searched and analyzed. This paper addresses feature extraction from audio and audio similarity measures and proposes an algorithm to mine any type of audio data. This Hybrid Algorithm for Audio Mining (HAAM) consists of...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Web Structure Mining for Users Based on a Hybrid GA/PSO Approach

    Web mining is a demanding task that looks for web access model, web structures and the reliability and dynamics of the web contents. It offers capable web personalization, system development, site alteration, business intelligence and usage characterization. A latest approach is offered for the estimation of the website hyperlink structure,...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    A Review of Ant Colony Optimization Routing Protocols for Wireless Multimedia Sensor Network

    Multimedia applications have become an essential part of the people daily lives, and their use is flourishing day-by-day. The area of wireless sensor network is not an exception where the multimedia sensors are attracting the attention of the researchers increasingly, and has shifted the focus from traditional scalar sensors to...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Mobile Security: Security Mechanisms and Protection of Mobile Applications

    In this paper, the authors propose security policies and mechanisms for mobile phones that better meet the expectations of users, either at the level of mobile networks, or mobile applications. At the mobile networks level: the paper focuses on limiting the spread of malware via SMS/MMS and emails. It describes...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Internal Threat Control Framework Based on Information Security Management System

    In this paper, the authors focus on proposing a framework for security control that based on ISO 27001 and ISO 27002, which is a standard of Information Security Management System (ISMS). This framework helps to mitigate internal threats for data centre meant for public sector adoption. The ISMS implementation scope...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Multi-Agent Security Architecture for a Sharia Compliant E-Auction

    Electronic auction has introduced new processes in the way auction is conducted which require investigation to ensure compliancy to Sharia (Islamic principles that are based on Qur'an and Sunnah) rules. The use of mobile software agent in electronic auction marketplaces adds ubiquity power to the bidders. In particular it allows...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Design of Privacy Model for Storing Files on Cloud Storage

    Cloud storages like Google drive, Dropbox are popular for personal and institutional file storage. Cloud storage is beneficial in terms of scalability, availability and economy. But cloud storage has privacy challenges due to which many users are reluctant to use it for personal data storage. Storage of personal or sensitive...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Design and Development of Zigbee Based Wireless Remote Controlling and Data Acquisition Device Through Internet

    IrDa and Bluetooth have been used widely in many wireless monitoring and controlling devices. Although, these devices have been replaced the traditional wired systems and contribute in solving the high cost of such systems, there are drawbacks been emerged. The major disadvantages are the range limitation of Bluetooth module and...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Three Layers Approach for Network Scanning Detection

    Computer networks became one of the most important dimensions in any organization. This importance is due to the connectivity benefits that can be given by networks, such as computing power, data sharing and enhanced performance. However using networks comes with a cost, there are some threats and issues that need...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Impact of Software Risk Management on Analysis Modeling in Life Cycle of Web Application Development

    Various branches of engineering use models effectively to reduce complexity, document analysis steps and facilitate communication within the development team. And this applies to software engineering and web engineering. Modeling aims to provide detailed sufficient descriptions to accomplish the system the user want to build, modeling easily produces patterns represent...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    A New Methodology of Three Way Distribution Process of Improved PSO Algorithm Using Mobile Sink Nodes

    In a recent trend, Mobile Sink (MS) is a major part of Wireless Sensor Network (WSN) for distributing, scalable network of communicating with localized environment. Improved Particle Swarm Optimization algorithm (IPSO) has been used to find the exact location of three way processes such as sink, distribution of frequency and...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    A New Static Resource and Bandwidth Utilization Approach Using WiMAX 802.16e Fractional Frequency Reuse Base Station

    In this paper, the authors propose a new Static Resource Assignment (SRA) approach to enhance resource and bandwidth utilization in traditional Fractional Frequency Reuse (FFR) WiMAX Base Station (BS) which widely used in cellular network deployment to overcome the inter-cell interference. The new SRA FFR efficiently tackled the wastage of...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jul 2008

    Control System for Internet Bandwidth Based on Java Technology

    This paper presents a Java-based real-time Internet access estimation tool for Quality of Service (QoS) in Internet accesses for Multimedia applications (JEQoSIM). It is specially aimed for real-time multimedia applications which use the User Datagram Protocol (UDP). The system is capable of estimating access capacity, available bandwidth and delay as...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Sep 2010

    Semantic Web And Economic And Financial Information Management

    The field of economy and finance is a conceptually rich domain where information is complex, huge in volume and a highly valuable business product by itself. Novel management techniques are required for economic and financial information in order to enable an effective generation, gathering, integration, management and consumption of complex...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2009

    The Impact of Emerging RFID Technology in the Wirefree Environment for Automatic Identification, Data Collection and Dedicated Short Range Communication

    Radio Frequency Identification is a Dedicated Short Range Communication (DSRC) technology. With RFID, the electromagnetic or electrostatic coupling in the RF (radio frequency) portion of the electromagnetic spectrum is used to transmit signals. An RFID system consists of an antenna and transceiver, which read the radio frequency and transfer the...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Sep 2009

    Design & Development Low Cost RFID Antenna

    This paper describes how Low Cost HF (13.56 MHz) antennas can be built and tuned so that their characteristics match the requirements of the high performance reader and third party RF modules. This third edition places greater emphasis on antennas for the higher power readers. In general, the distance at...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Nov 2009

    Enhance Fuzzy Commitment Scheme: An Approach for Post Quantum Cryptosystem

    This paper attempt has been made to explain a fuzzy commitment scheme with McEliece scheme because the efficiency and security of this cryptosystem is comparatively better than any other cryptosystem. Since this scheme is one of the interesting candidates for post quantum cryptography. Hence interest to deal this system with...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Oct 2009

    A Novel Information Hiding Technique for Security by Using Image Steganography

    This paper a novel method is proposed to provide more security for the key information with the combination of image compression and data encryption method. This method requires less memory space and fast transmission rate because of image compression technique is applied. Steganography plays an important role in information security....

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Aug 2009

    A Novel Protocol for Indirect Authentication in Mobile Networks Based on Elliptic Curve Cryptography

    Unlimited mobility free of any fundamental communications is presented by Mobile Networks. In such networks, the information access between unacquainted nodes and server is a usual thing that happens frequently. This creates more chance to take the advantage of accessing information illegally by any invalid user node. The threat of...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2009

    A Novel Approach for an Accurate Human Identification Through Iris Recognition Using Bitplane Slicing and Normalisation

    Unlike other biometrics such as fingerprints and face, the distinct aspect of iris comes from randomly distributed features. This leads to its high reliability for personal identification and at the same time, the difficulty in effectively representing such details in an image. Iris recognition illustrates work in computer vision, pattern...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2009

    Application of Tabu Search Algorithm to Security Constrained Economic Dispatch

    This paper presents an algorithm for solving Security Constrained Economic Dispatch (SCED) problem through the application of Tabu Search (TS). The SCED problem is formulated with base case and contingency case line flow constraints, which are important for practical implementation. Two representative systems namely 66-bus and 191-bus Indian utility systems...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jul 2009

    A New Secure Design for Mobile Communication

    Mobile handheld device is a popular device that provides secure, private, authentic, and accurate communication and exchange of confidential information. This paper proposes a technique to solve the authenticity problem in mobile communication. This technique is mainly based on the usage of the Fingerprint to identify both the speaker and...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Sep 2009

    A Way Forward to Improving Functionalities of Open Database System

    The increasing need for information dissemination and the tremendous population growth in today's organizations calls for the need to migrate most application and their associated data to the network where several millions of people can access concurrently. Several challenges such as security risk and management/maintenance of the database have been...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Oct 2009

    Pattern Recognition Algorithms for Ear Biometrics

    This paper presents geometrical Parameter algorithms for ear Biometrics by representing the Ear image as contours, feature extraction and recognition. The proposed algorithms were developed for ear biometrics, but they can be applied in other contour image processing applications. Firstly it presents mathematical and algorithmic foundations of geometrical feature extraction...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Aug 2009

    Framework for a Context-Aware Mobile e-Health Service Discovery Infrastructure for Rural/Suburban Healthcare

    This paper presents the research in the design and implementation of a framework for cost cutting electronic healthcare delivery services for rural/suburban communities. This is achieved through the development of a semantic web services framework that would be deployed to provide wireless mobile healthcare delivery services and health management services...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Oct 2009

    Overview and Challenges of Routing Protocol and Mac Layer in Mobile Ad-Hoc Network

    Mobile Ad-hoc Network (MANET) are a new paradigm of wireless wearable devices enabling instantaneous person-to-person, person-to-machine or machine-to-person communications immediately and easily .In this paper an overview and history of MANET is given .The paper discusses the issues which should keep in mind for designing of MAC layer and Routing...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2010

    Robust TCP: An Improvement on TCP Protocol

    The Transmission Control Protocol (TCP) is the most popular transport layer protocol for the internet. Congestion Control is used to increase the congestion window size if there is additional bandwidth on the network, and decrease the congestion window size when there is congestion. This paper uses a classic TCP which...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Sep 2011

    Survey on Survival Approaches in Wireless Network Against Jamming Attack

    Wireless networks are more depicted to intentional or unintentional threats than their wired based equivalent networks. Major reason being the wireless medium which can be listened and interfered by non-participants, in an on-going valid communication. In the absence of a collision detection mechanism and relying mainly on cooperation of each...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Apr 2014

    A Special Matrix Power Operation Development for Simultaneous Calculation of All Network's Shortest Path

    Network's shortest paths calculation is an important need in transportation network analysis. The Dijkstra algorithm has long been developed for the shortest path of a pair of nodes calculation individually. A more practical method to simultaneously calculate all shortest paths of all pair of nodes of a network needs to...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Apr 2014

    Design and Analysis of Analytical Model of Novel Energy Constrained Cooperative MAC Protocol for Ad-Hoc Networks

    Relay assisted cooperative wireless communication has been shown to have significant performance gains over the legacy direct transmission scheme for ad-hoc network. An efficient cooperative Medium Access Control scheme (MAC) is needed to solve the difficulties induced by relaying and cooperative computing. Another challenging issue is the extension of network...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Apr 2014

    An Efficient Intrusion Detection Using Fast Hierarchical Relevance Vector Machine

    Internet is a useful source of information in everyone's daily activity. Internet becomes a globally used public network. Significance of Intrusion Detection System (IDS) in computer network security is well proven. In order to protect the organization data, Intrusion Detection System (IDS) offers protection from external users and internal attackers....

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Apr 2014

    Anomaly Based Intrusion Detection in WLAN Using Discrimination Algorithm Combined with Naive Bayesian Classifier

    The role of Intrusion Detection System (IDS) has been inevitable in the area of Information and Network security - especially for building a good network defense infrastructure. Due to the wide popularity of wireless networks tremendous applications are emerging and Wireless Local Area Network (WLAN) has gained attention by both...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Apr 2014

    Detection of DDoS Attacks Using IP Traceback and Network Coding Technique

    Distributed Denial-of-Service (DDoS) attacks can collapse even the well-structured networks. Now-a-days with evermore-powerful tools in a hacker's armoury, DDoS attacks are easier to launch. Typical types of DDoS attacks include bandwidth attacks and application attacks. In a bandwidth attack, network resources or equipment are exhausted by a bulk volume of...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Apr 2014

    Performance Enhancement by an Energy ADEPT PE-AODV with Link Failure Prediction

    Mobile Ad hoc NETwork (MANET) is a wireless network which has dynamic nature with infrastructure less without a central administration. In MANETs link failure occurs due to topological changes of mobile node which causes high data loss and delay, so the performance is enhanced by predicting the link break in...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Apr 2014

    Hashed Symmetric Key Encryption Based VBSR

    Security impact on mobile ad hoc network increases more since there is no architecture and high mobility of nodes along the environment. Security features include providing authentication and confidentiality. Both these services insist that the messages should be encrypted and decrypted using some keys either public key and private key....

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Apr 2014

    A Survey of Unicast Routing Protocols Based-Greedy Forwarding Strategies for Vehicular Ad-Hoc Networks in Urban Scenario

    A Vehicular Ad hoc NETwork (VANET) is a new technology that allows vehicles to form a self-organized network without reliance on permanent infrastructure. The characteristics of VANET such as rapid topology changes, high mobility, and frequent link disconnections makes it difficult to design an efficient routing protocol for routing data...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Apr 2014

    A Dynamic QoS Model for Multimedia Real Time Transmission in Enterprise Networks

    Quality of Service (QoS) is a key factor in many research areas like multimedia real time systems, web services, distributed systems, business networking and runtime monitoring. QoS is multi-faceted, fuzzy and dynamic. Current researches focus on implementation level performance assurance, ignoring domain specific or application level metrics which are also...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Apr 2014

    Impact of Mobile Context-Aware Applications on Human Computer Interaction

    The rapid growth of technological advances and availability of mobile devices has raised the opportunity to innovate feasible context-aware applications with the ability to access information anywhere and anytime. Therefore, this paper intends to review the recent developed mobile context-aware application. The paper is selected based on their application domains...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2014

    MDP: A Paradigm for Communication and Computation in Mobile Cluster

    In this paper, the authors explore the inter-process communication across communicating parallel tasks in a mobile cluster. The process which is linked with specific mobile or static nodes will not be resilient to the changing conditions of the mobile cluster. The proposed Mobile Distributed Pipes (MDP) model enables the location...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2014

    Image Fusion Techniques for Iris and Palmprint Biometric System

    Biometric-based personal identification techniques use physiological or behavioral characteristics of an individual (e.g. face, voice, fingerprint, gait, hand geometry, palmprint, iris, gene, etc.) to establish automatic personal recognition or authentication. Biometrics characteristics of a particular individual are unique. Hence biometric techniques are promoted for several applications. Image Fusion is a...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2014

    (CBCDR)Cluster Based Cyclic Diversionary Routing: Energy Efficient Routing Strategy for Location Privacy

    A Wireless Sensor Networks (WSNs) is a network of sensors which sense the surroundings and communicates the information gathered from the monitored field through the virtual medium. The system designed for communication should utilize less energy. Sensors in the field are very small and can utilize the energy for constraints...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2014

    Design of Novel Security Architecture for MANET for Trusting and Authentication

    In MANETs, providing the security for routing and data packets is a big challenge. To overcome those drawbacks in this paper, the authors design novel security architecture for MANET for trusting and authentication. It provides routing security against jamming attacks, detects stealthy packet dropping attacks, a trust based reputation management...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2014

    Analyzing the Efficiency of Program Through Various OOAD Metrics

    Software plays an important role in this today's fast moving world. As everything being computerized, each and every activity must be programmed to lead a successful life. In business environment, to maintain the successful path, many new techniques and technologies have been implemented. Of those, programming for business needs, many...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2014

    An Energy Efficient Enhanced Error Node Regaining Algorithm for a Wireless Sensor Network

    Latest techniques in micro processing, wireless and battery technology and smart sensors have enriched data processing, wireless communication and detection skill. In sensor networks, each sensor node has some degree of wireless computational power to process and transfer the live data to the data collection centre. This paper proposes an...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2014

    Improving Wireless Sensor Network Lifespan Through Energy Efficient Algorithms

    One of the main challenges of wireless sensor network is maximization of the lifetime of the sensor node since the energy efficiency determines the lifetime of a sensor node, power consumption of the sensing device should be minimized. To conserve power, sensor node should shut off the power supply when...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2014

    An Analysis on Source-Filter Model Based Artificial Bandwidth Extension System

    To minimize transmission bandwidth in speech based communication systems such as telephone systems, narrowband representation of the signal is generally used. This band-limited signal can able to represent the vowel sounds without much distortion, but it is not suitable for representing consonant sounds, mostly fricative consonants. Artificial Band Extension (ABE)...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2014

    Mih Based Qos-Aware Algorithm for Efficient Handoff in WiFi/WiMax Integrated Networks

    In future the wireless networks will be heterogeneous and a mobile user has to roam between different access technologies. Achieving efficient Vertical Hand-Off (VHO) with guaranteed Quality of Service (QoS) in such heterogeneous environment still remains as an unsolved issue. VHO occurs when a mobile user changes his point of...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2014

    A Hybrid Cac Scheme for Effective Resource Allocation in IEEE 802.16 Wireless Networks

    Call Admission Control (CAC) plays a vital role in providing the desired Quality of Service (QoS) in broadband wireless networks. The aim of this paper is to propose an efficient Greedy Shaper based Call Admission Control (GSCAC) scheme for WiMAX networks to manage the number of admitted user connections and...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2014

    Evaluation of Most User Band (MUB) Attack in a Cognitive Radio Network Based on Sub-Nyquist Sampling

    The unused or under-utilized TV bands are opportunistically utilized by Cognitive Radio enabled IEEE 802.22 Wireless Regional Area Networks (WRAN). However, due to the nature of cognitive radio networks and lack of proactive security protocols, the IEEE 802.22 networks are vulnerable to various Denial of Service (DoS) threats. In this...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2014

    Cryptanalytic Attacks on Rivest, Shamir, and Adleman (RSA) Cryptosystem: Issues and Challenges

    RSA cryptosystem is an information security algorithm used for encrypting and decrypting of digital data in order to protect the content of the data and to ensure its privacy. Prior research studies have shown that RSA algorithm is very successful in protecting enterprises commercial services and systems as well as...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2014

    Game-Theoretic Nash-Equilibrium and Ecmdpranking Policies for Vertical Handover Decision with Emergency Braking in VANETs

    A Vehicular Ad-hoc NETworks (VANETs) is a technology that uses moving vehicles as nodes in a network to create a mobile network. Vehicular communications like V-2-V and V-2-I with vertical handover decision process has to consider the speed limits and other real-time constraints such as lane-changes, emergency braking along with...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2014

    A Flexible Web Service Environment with High Range of Security and QoS Mechanisms

    Providing information with Quality of Service (QoS) through Web services is essential to QoS-aware service management and composition. Delivering QoS on the Internet is a critical and significant challenge due to its dynamic and unpredictable nature. Even though the UDDI registry has all the details of WSDL documents provided by...

    Provided By Journal of Theoretical and Applied Information Technology