Journal of Theoretical and Applied Information Technology

Displaying 1-40 of 407 results

  • White Papers // Jun 2014

    Anonymous Web Browsing Against Traffic Analysis Attacks by Reusing the Cache Memory

    Anonymous web browsing is a hot topic with many potential applications for privacy reasons. However, there are few such systems which can provide high level anonymity for web browsing. The reason is the current dominant dummy packet padding method for anonymization against traffic analysis attacks. This method inherits huge delay...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2014

    Text Mining Algorithm Discotex (Dis-Covery From Text Extraction) With Information Extraction

    Text mining concerns looking for patterns in unstructured text. The related task of Information Extraction (IE) is about locating specific items in natural-language documents. This paper presents a framework for text mining, called DISCOTEX (DISCOvery from Text EXtraction), using a learned information extraction system to transform text into more structured...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2014

    Assembler Design Techniques for a Reconfigurable Soft-Core Processor

    The reconfigurable processor design which utilizes platform such as Field Programmable Gate Array (FPGA) has offered several advantages in minimizing the non-recurring engineering cost and to reduce the time-to-market for processor-based products. However, when any modification is made to the processor architecture, the same information needs to be relayed to...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2014

    QOS Based Cost Efficient Resource Allocation in Cloud

    Resource allocation is one of the important challenges in cloud computing environment. It depends on how to allocate the resource to the particular task. Resource allocation can be done by two methods. One of the methods statically allocates the resources and other dynamically allocates the resources. Two methods are having...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2014

    Evaluation Subquery Methods in Microsoft Sql Server 2008

    Frequently user compiles a query to satisfy business process needs, whether directly using DBMS or connecting into application system. There are many methods that can be used to generate desired results to support transaction, but all the query processing should be run effectively and efficiently. A significant aspect of query...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2014

    Dynamic Structured Privileges With Multiowner Data Sharing for Dynamic Groups in the Cloud

    Cloud computing is a general term used to describe a new class of network based computing that takes place over the internet. The most basic and important service offered by cloud is data storage. However, the major obstacle in the multi owner data sharing for the wide deployment of cloud...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2014

    A Survey of Research and Practices in Multiprocessor System on Chip Design Space Exploration

    In this paper, the authors present a perspective on the existing research and practices initiated for the Design Space Exploration (DSE) in Multi-Processor System-on-Chip (MPSoC) technology. Reduction in size as well as adding more functionality within a single chip by incorporating multiple processors remains the key in the development of...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2014

    A Comparative Study of Classification Models for Detection in IP Networks Intrusions

    Intrusion detection is an essential mechanism to protect computer systems from many attacks. The authors presented a contribution to the network intrusion detection process using six most representative classification techniques: decision trees, BayesNet, Naive Bayes, Rules, SVM, and Perceptron multi-layer network. In this paper, they presented a feature selection using...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2014

    An Effective Cross Rate Packet Aggregation Scheme for Virtualized Network Cloud Computing

    Virtualization enables the cloud computing. The bottleneck of transferring packets from driver domain to Virtual Machines (VMs) in I/O channel was eliminated by basic aggregation and destination based aggregation scheme, but it is limited to aggregating packets for a particular destination and missing out more effective packet combinations. This paper...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2014

    Novel Framework for the Portfolio Determination Using PSO Adopted Clustering Technique

    Methods based on the econometrics, statistics, machine learning, heuristics and data mining methods are used to predict the market behavior and investment decisions. In this paper, the authors have presented a novel approach for the portfolio creation using the PSO adopted k-means. Then the NARX and the Markowitz model have...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2014

    A Comparative Analysis of Markov Model With Clustering and Association Rule Mining for Better Web Page Prediction

    Web page prediction that involves personalizing web user's behavior and also helps the web master to improve the website structure and helps the user in navigating the site and accessing the information. World Wide Web (WWW) is a huge storage place for pages and links. So that the browser can...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2014

    A Combinatorial Tree Based Frequent Pattern Mining

    Frequent pattern mining is a process of extracting frequently occurring itemset patterns from very large data storages. These frequent patterns are used to generate association rules. Association rules define the relationship among items. The strength of the relationship can be measured using two different units namely support value and confidence...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2014

    High Speed Vlsi Architecture for Non Separable Block Based Lifting Wavelet Transform

    The inherent advantage of the in-place computation of the lifting based DWT over the conventional convolution method makes it suitable for efficient hardware implementation with lower computational complexity. The proposed paper uses non separable block based method to derive the VLSI architecture for the two dimensional DWT. In separable lifting...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2014

    Semantic and Fuzzy Aspects of Opinion Mining

    In recent years, the amount of opinions and reviews available on the web has grown tremendously and therefore the role of sentiment analysis is even more crucial than before. Given the very ambiguous and imprecise nature of sentiments and of their expressions, this study focuses on the review of semantic...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2014

    An Enhanced Semi-Apriori Algorithm for Mining Association Rules

    Data mining is an accumulation of techniques used to efficiently automate discovery of previously unknown, novel, valid, valuable and understandable patterns in large-scale databases. Mining association rules in large database is one of data mining and knowledge discovery research issue, although many algorithms have been designed to efficiently discover the...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2014

    Enhancing Data Security Using DES With Hardware Implementation

    Network security has become an important issue in organization, business and public data handling and has grown exponentially in recent times. The threats to the valuable information on the network are becoming more widespread and more sophisticated. In this paper, the authors focus on secure communication between end-points terminal and...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2014

    Job Scheduling Optimization Based on Resource Load Balance in Cloud Computing

    Job scheduling plays an important role in cloud computing networks. Appropriately distributing service jobs to multiple servers when the cloud network stays in dynamic load conditions is the main work of the scheduling strategy. The authors adopt the resource load level of a server as the state of the server,...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2014

    An FPGA Based Overlapped Quasi Cyclic Ldpc Decoder for Wi-Max

    In this paper, the authors present a partially parallel Quasi cyclic Low Density Parity Check (LDPC) decoder architecture for WiMAX IEEE 802.16e standard. Two phase message passing min-sum decoding algorithm is used to decode the Low Density Parity Check (LDPC) codes. The decoder is designed for code rate

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2014

    Factors Affecting Programmer's Performance on Web-Based Programming

    Today, the changes that occur in the field of IT are repositioning its role from just to support back office to strategic role. Thus, this change has led to high demand for IT professionals who have the competence and also updated on the utilization of new technologies. This research is...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2014

    A Novel Approach for Partitioning in Hadoop Using Round Robin Technique

    The Hadoop distributed file system is constructed to store profoundly and immensely colossal data sets accurately and to send those data sets at huge bandwidth to end user applications. Hadoop gives a distributed file system and a structure for the analysis and conversion of profoundly and astronomically immense data sets...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2014

    Pattern Based Classification for Text Mining Using Fuzzy Similarity Algorithm

    Pattern mining is an important research issues in data mining with few kinds of applications. Many text mining methods have been proposed for mining useful pattern in text documents. It is mainly focuses to approximately identify the different entities such as terms, phrases and pattern. The authors use the feature...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2014

    Scheduling Techniques in On-Demand Grid as a Service Cloud: A Review

    The Infrastructure-as-a-Service (IaaS) cloud is a customer oriented cloud environment that offers user with computing infrastructures on-demand to be used based on the cloud computing paradigm of pay-per-use. When the IaaS is now utilized to build a traditional grid network within the cloud environment, it is now called an on-demand...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Apr 2014

    On Long-Range-Dependence Synthetic Data Generation Through Heavy-Tailed Distributions

    Comprehensive analysis of the Internet traffic conducted over the last decade revealed the concept of Long-Range Dependence (LRD) in the collected data traces. Some of this analysis work proved that this property is a result of the heavy tailed distribution of the packet inter-arrival time, which is a result of...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Apr 2014

    Energy-Efficient Sub-Clustering With Optimized Processor Speed (ESOPS) in Wireless Sensor Networks

    A wireless sensor network consists of sensor nodes to monitor the physical and environmental conditions. In certain applications like habitat monitoring, where sensor nodes are randomly deployed in manually inaccessible environment that operates with a limited battery power. This battery constraint reduces the network lifetime. The sensor nodes consist of...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Apr 2014

    A Novel Approach for Dynamic Cloud Partitioning and Load Balancing in Cloud Computing Environment

    Cloud computing is an attracting technology in the field of computer science. Cloud computing involves sharing of resources. In the event of processing many jobs, the load balancing becomes essential for efficient operation and to improve user satisfaction. This paper introduces the strategic model that performs load balancing as well...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Apr 2014

    Optimization of Transaction Processing in Cloud Databases Through a Datacenter System Design Cracs to Improve Replica Consistency, Availability and Scalability

    It is obvious that tremendous achievements have been emerged in IT industries at various sectors. If the authors have a keen look, all the technologies are revolving around a single word \"Data\". All techniques are trying to improve the read and write of data from and to the database. Usually...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Apr 2014

    An Energy Saving Set Associative Cache Algorithm With Improved Performance

    Enabling one way in set associative cache during operation is proposed in literature. However, this architecture degrades the average memory access time. This paper proposes an algorithm to map to certain way in set associative cache improving the performance. The address is mapped to certain way by certain transformations involving...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Apr 2014

    Personalized Web Search Methods - A Complete Review

    Internet's foremost information retrieval service is the World Wide Web (WWW). It serves as a platform for retrieving variety of information that are associated with research, education, marketing, sports, games, politics, finance, etc. The utter volume of information growth leads to the information overload on the internet. Search engines are...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Apr 2014

    Resourceful and Secure Routing Protocol Via Active Hierarchical Clustering Mechanisms for Wireless Sensor Network

    Wireless Sensor Network (WSN) combine information sensing, wireless communication, information processing in current years. Two major constraints related to wireless sensor networks are the dynamic variance of the network caused by capacity constraint of sensor nodes and uncertainties related to wireless links. Moreover, the problem in wireless sensor networks is...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Apr 2014

    FL2440 Hardware Based Neural Data Security Using Polarization Encryption (Ep) Approach

    Encryption scheme is widely used in the field of communication network security. The network systems are focus on reliability, service and functions, which provided end-to-end service to protect encrypted data node. It enables to interconnect the various functional levels to interact and communicate with each other. An interconnected group of...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Apr 2014

    Two Level Clustering Approach for Data Quality Improvement in Web Usage Mining

    Web Usage Mining (WUM) is a term related to the extraction of knowledge from web log data. Web log data has a lot of irrelevant data to proceed WUM. Therefore, it requires several steps to get a good quality of data, because the final result of WUM depends on the...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Apr 2014

    An Algorithm About Partner Selection Problem on Cloud Service Provider Based on Genetic

    Aiming at choosing suitable cloud service providers to construct a dynamic alliance and then satisfying terminal customers more efficiently, to achieve the optimal allocation of cloud services. This paper uses gray relative comprehensive evaluation model to determine the optimizing index of cloud services market. The authors use the multi-objective optimization...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Apr 2014

    Semantic Schema Matching Approaches: A Review

    An extensive review of the existing research work in the field of schema matching uncovers the significance of semantics in this subject. It is beyond doubt that both structural and semantics aspect of schema matching have been the topic of research for many years and there are strong references available...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Apr 2014

    E-Learning Development as Public Infrastructure of Cloud Computing

    In this paper, the authors describe the model they implement to provides services, such as IaaS, PaaS, and SaaS, for e-learning and collaboration in the educational environment in Salatiga. Currently, the combination of cloud technology and e-learning is being explored. Several efforts of using IaaS cloud technology in education focus...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Apr 2014

    An Analysis of Privacy Risks and Design Principles for Developing Countermeasures in Privacy Preserving Sensitive Data Publishing

    Government Agencies and many other organizations often need to publish sensitive data - tables that contain unaggregated information about individuals. Sensitive data is a valuable source of information for the research and allocation of public funds, trend analysis and medical research. Publishing data about individuals without revealing sensitive information about...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Apr 2014

    Implementation of Data Encoding and Decoding in ARM Boards With QoS Parameters

    Networks must be able to transfer data from one device to another with acceptable accuracy. For most of the applications, a system must guarantee that the data received are identical to the data transmitted. Any time data are transmitted from one node to the next, they can become corrupted in...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2014

    Residential Site Selection by Combining GIS and Fuzzy Database Query on Android Device

    Residential sites are a crucial means for the survival of a family life in which currently the residential sector development increased. The increasing number of existing residences makes people difficult to determine the location of the residences in accordance with the needs of each individual. Geographic Information Systems (GIS) is...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2014

    Prediction of Students' Success by Applying Data Mining Algorithams

    In education, an intelligent data analysis includes data mining methods which are applicable in different areas of education as a way of discovering implicit, previously unknown, and useful knowledge out of existing data with a sole goal, and it is, to make quality decisions. One of the classification methods in...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2014

    Fault Recovery Algorithm Using King Spare Allocation and Shortest Path Shifting for Reconfigurable Systems

    Field Programmable Gate Arrays (FPGAs) have the capability of reconfiguring in-field and at runtime that helps in fault recovery. FPGAs are used to implement complex functions in applications such as nuclear systems, space missions, communication systems etc where system reliability is very critical. Such systems must be designed with the...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2014

    Dynamic Effect of Knowledge Management System on School Management

    In this paper, the authors investigate the effect of knowledge management system on school management, as well as to use system dynamics as the main research method. This study selected a certain elementary school in Miaoli County in Taiwan as the research subject. This paper used students' sense of identification,...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jul 2013

    An Energy Efficient Key Management and Authentication Technique for Multicasting in Ad Hoc Networks

    In this paper, the authors propose a trust authority based key management and authentication technique for multicasting in ad hoc networks. Initially, they construct an energy efficient topology aware key tree which mainly aims to reduce the re-keying load by pre-processing the joining members during the idle re-keying interval. Key...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jul 2013

    Solving Heuristic Attacks Using Elliptic Curve Cryptography in Quantum Computer

    Quantum Secret Sharing (QSS) is one of the important branches in Quantum Cryptography which combines Quantum with classical mechanics. The main objective of this paper is to propose Elliptic Curve Cryptography (ECC) for solving heuristic attacks. The QSS and ECC methods has been tested in the following three quantum algorithms...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jul 2013

    A Study on Statistical Based Feature Selection Methods for Classification of Gene Microarray Dataset

    With the rapid development of computer and information technology, an enormous amount of data in science and engineering had been generated in massive scale. Also, the diversity of data, the data mining tasks and approaches pose many challenges to research in data mining. The data mining field has widespread applications...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2013

    An Overview on Wormhole Attack Detection in Ad-Hoc Networks

    An Ad-hoc network is a group of wireless mobile nodes that shapes a temporary network without any infrastructure and centralized management. Each mobile node functions not only as base station but also as router forwarding packets for other mobile nodes in the network. One of the dangerous attacks in an...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2013

    A Cloud Computing Methodology for Industrial Automation and Manufacturing Execution System

    In this paper, the authors investigated guaranteeing the assembly process information flow in real time, enterprise wide, from assembly station sensors directly to the company policy maker's offices, is the true solution for improving productivity competence, reducing bottlenecks movements, optimization of supply chain network, identify missing operations in the floor...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2013

    Architecture of Malware Tracker Visualization for Malware Analysis

    Malware is a man-made malicious code designed for computer destructive purposes. The early destructive programs were developed either for pranks or experimental purposes. However, in this day and age, malware are created mainly for financial gain. Since years ago, the use of malware attack tools, such as keylogger, screen capture...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2013

    Balancing Process to the Ciphering System SEC

    In this paper, the authors present a new symmetrical encryption system based on symmetric encryption SEC, it formalizes the problem of encryption to a combinatorial optimization problem and uses evolutionary algorithms to solve it. The main objective of this work is to strengthen the resistance of the encryption system \"SEC\"...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2013

    Heterogeneous Information Integrity for Chinese Minorities within Cloud Computing Platform

    The minority information resources' construction is an important part of national information construction in China. The heterogeneous distributed data semantic integration technology within cloud computing platform, mainly focus on how to use the machine automatically analyzing, understanding and handling of user needs and heterogeneous information. In this paper, the methodology...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2013

    Integrity of Digitally Signed Messages Using Joint Signature Scheme

    In this era of advanced technology, mobile commerce is going to become popular due to rapid development of technology but this technology needs a lot of struggle for maintaining secure communication and protection from threats. In this paper, a mechanism for secure and authentic communication in mobile commerce based on...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2013

    A Method of Synthetic Scheduling Basing on the Cloud Computing

    Cloud Computing is a type of integrated resource and resource environment, which includes various related resource and resource integrated with computing power, data information and knowledge, software and people, aiming at organizing the geographically spreading computers into a \"Virtual supercomputer\" with the use of internet. Cloud Computing is a special...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2013

    The Construction and Design of E-Learning Platform for Database Course

    With the rapid development of computer technology and the improvement of performance of mobile devices, e-learning based on the Internet and smart mobile devices becomes an important direction of educational development. This paper proposed the system design idea, general framework and functions realization of e-learning platform for database course. The...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Apr 2013

    The Design and Implementation of Software Registration Module Based on RSA Encryption Algorithm

    For professional software products, software developers must develop software registration authorization module in order to prevent illegal software theft and transfer. Currently, the main software encryption methods are symmetric cryptosystem and asymmetric cryptosystem. Symmetric cryptosystem mainly covers AES (Advanced Encryption Standard), DES (Data Encryption Standard), IDEA (International Data Encryption Algorithm)...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2013

    Performance Improvement of Disk Based K-Means Over K-Means on Large Datasets

    Clustering is a popular necessity having extensive scope for varied applications. The authors apply the k-means task in a situation where the volume of data is large and puts pressure on the access memory. The objective is to use less memory and access data sequentially. This paper proposes a method...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2013

    On the Construction and Research of Interdisciplinary Practical Teaching Platform Under Cloud Environment

    With the rapid development of Internet information technology, professional teaching softwares and simulation system are set up in higher vocational colleges. And they are widely used in practical teaching. Since the Interdisciplinary Practical Teaching has been carried out across the whole school, the shortage of training places becomes a contradiction....

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2013

    Privacy Preserving Sensitive Utility Pattern Mining

    Data mining services require accurate input data for their results to be meaningful, but privacy concerns may influence users to provide spurious information. In this paper, the authors have presented an efficient algorithm for mining of privacy preserving high utility item sets by considering the sensitive item sets. The algorithm...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2013

    Extension Data Mining Based on Extension Set and Rough Set

    Data mining has gained popularity in the database field recently, the gained knowledge is static because of the static nature of the database, and does not reflect the dynamic nature of knowledge. Extension data mining is a product combining Extenics with data mining, By using the theory and method of...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2013

    The Method of Selecting Critical Successful Factors to Knowledge Management and Its Automation

    How to implement knowledge management is crucial to the enterprises, and different enterprise has different critical factors which also have different weight for different enterprise. The paper deeply analyzes all the important factors for the knowledge management implementation first. Then the paper proposes the invariance method to choose the critical...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Sep 2013

    A Joint Design of Routing and Resource Allocation Using QoS Monitoring Agent in Mobile Ad-Hoc Networks

    In MANETs, mobile nodes can join and leave or change their position inside the network, so its topology can change anytime in unpredictable ways. So maintaining the QoS for the resource allocation is crucial for MANETs. In this paper, the authors propose a joint design of routing and resource allocation...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Sep 2013

    Improving Link Stability of Multicasting Routing Protocol in MANETs

    Mobile Ad Hoc NETworks (MANETs) are a set of mobile nodes collected in groups with no fixed infrastructure and self organized. MANETs suffers from many limitations such as scarce resources and unexpected dynamic architectural which makes finding the most stable route to transmit data packets a challenging task. Multicasting is...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Nov 2013

    Data Mining in Network Security - Techniques & Tools: A Research Perspective

    In this paper the authors present recent trends and practices in data mining to handle the rising risks and threats in the area of network security in today's digital age and discuss the various data mining tools for data analysis and prediction, network tools for sniffing and analyzing the networks....

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2014

    BASIP a Virtual Machine Placement Technique to Reduce Energy Consumption in Cloud Data Centre

    Infrastructure-as-a-Service (IaaS) in cloud computing provides Infrastructure as a service for the demand of user from small instance to large instance in pay per use model. The services include like computer resource, networking and data storage. An API (Application Programming Interface) is used to access the infrastructure and a dashboard...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2014

    Transaction Aware Vertical Partitioning of Database (TAVPD) for Responsive OLTP Applications in Cloud Data Stores

    On-Line Transaction Processing (OLTP) applications are business applications which are characterized by high-frequency short lived data transactions. In cloud domain, applications are expected to be highly responsive and low cost with optimized levels of consistency. Cloud data stores rely on an appropriate data partitioning scheme to achieve promising levels of...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2014

    Towards a New Algorithm More Efficient for Updating Firewall Policies

    Firewall is one of the most widely utilized component on any network architecture, since that a deployment is a very important step to turn the initial policy to a target policy. This policy requires automated tools in order to create a suitable environment for configuring or deploying safely a policy...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2014

    Fast and Secure Handover Authentcation Scheme in Mobile WiMAX

    Handover is one of the essential elements that can affect the Quality of Service (QoS) and capacity of Mobile Broadband Networks. The next generation of broadband wireless networks including the IEEE802.16e standard, allow users to roam seamlessly and securely over the network. Unfortunately the current design suffers from lengthy delay...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2014

    Secure Authentication Based Multipath Routing Protocol for WSNs

    Wireless Sensor Networks (WSN's) have attracted a great deal of research attention due to their wide range of potential applications. Applications of WSN include battlefield surveillance, biological detection, medical monitoring, home security and inventory tracking. Wireless sensor networks consist of some nodes that have limited processing capability, small memory and...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2014

    Exploiting IPv6 Routing Headers Type 0/2 in Different IP Wireless Networks: Attack Scenario & Analysis

    Mobile IP is an open standard protocol designed by IETF to allow users to move from one network to another while maintaining their own permanent IP addresses. However, the seamless connectivity in different IP networks has introduced new security vulnerabilities. One of the most critical concerns with the IPv6 is...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2014

    A Multi-Agent Based Distributed Intrusion Prevention System Against DDoS Flooding Attacks

    Denial of Service (DoS) attacks is a simple and very annoying type of intrusions. This kind of attacks attempts to make unreachable at least a service of equipment like it can stagnate the whole of a network. To launch a DoS attack, the authors have, now-a-days, often tools to succeed....

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2014

    Multi-Level Trust Architecture for Mobile Adhoc Networks Based on Context-Aware

    Mobile Ad-hoc NETworks (MANETs) are not favorable to centralized trust architecture and literature review provides several security framework and solutions for trust management. However, there is no unified architecture for MANET to exploit deployed security models based on trust. This paper presents compelling trust architecture in which a trust based...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2014

    Foremost Security Apprehensions in Cloud Computing

    In the recent years, a term keeps coming in the sphere of IT. This new concept called cloud computing is probably the most noteworthy evolution since the arrival of the web. Many business leaders have decided to invest in this architecture in order to gain in terms of saving on...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2014

    Energy Efficient Intrusion Detection System for Wireless Sensor Network Using Neural Network

    In Wireless Sensor Network (WSN), the existing intrusion detection techniques rarely consider energy consumption for judging the node state. Also there is need for increased detection rate. Hence in this paper, the authors propose an energy efficient intrusion detection system for WSN. Initially the nodes deployed in the network are...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Aug 2013

    Enhanced Strategy of Deployment Firewall Policies

    Firewall is one of the most widely utilized component on any network architecture, since that a deployment is a very important step to turn the initial policy to a target policy. This operation must be done without presenting any risks or flaws. Much research has already addressed the specification of...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Aug 2013

    Database Integration: Importance and Approaches

    Database integration is a multistep process of finding similar entities in two or more databases to create a non-redundant, unified view of all databases. Database integration has become an active area for research due to increasing of information resources with the need of users and applications to integrate data from...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jul 2013

    Extending Temporally ER Model for Designing Temporal Databases with Multiple Time Granularities

    Entity-Relation (ER) model may be used for different but related purposes, e.g. to model real world for analysis, to describe a database scheme of a computer system for design. In recent years, with the increasing needs of time-related application, how to extend the ER model to enable it to properly...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jul 2013

    Cluster Labeling with Linked Data

    In this paper, the authors would like to introduce their approach to cluster labeling with Linked Data. Clustering web pages into semantically related groups promises better performance in searching the Web. Nowadays, only special semantic search engines provide clustering of results. Other engines are doubtful as far as the quality...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jul 2013

    VM Consolidation Techniques in Cloud Datacenter

    The crunch in resources and ability to serve the interest of customers with maximum efficiency and minimum resources has led to a wide range of research in cloud resource management. Various cloud service providers currently in the market are testing several algorithms to manage their resources and has not been...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jul 2013

    Palmprint Feature Representation Using Fractal Characteristics

    In this paper, the authors introduced some new techniques to extract the palmprint features based on fractal codes and fractal dimension. Four new techniques based on fractal, namely FDFC (Fractal Dimension from Fractal Codes), FDIFC (Fractal Dimension Image from Fractal Code), DIFC (Distance Image from Fractal Code), and AIFC (Angle...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jul 2013

    Implementation of Virtualization in Data Centers to Increase Proficiency and Performance

    A traditional data center is used to host computer systems and associated components. Electricity usage has become an increasing fraction of the total cost of ownership for data centers. It is difficult to reduce the electrical consumption of tier level data centers through appropriate design of the network-critical physical infrastructure...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jul 2013

    Automatic Selection of Filtering Devices in a Distributed Intrusion Prevension System

    In the previous paper, the authors presented a distributed intrusion prevention system based on honeypots for collecting malicious data. Among important questions to handle there is the choice of filtering device on which a filtering rule has to be applied. In this paper, they propose a solution which will allow...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jul 2013

    Evaluation of Intrusion Detection Techniques in Mobile Ad-Hoc Networks

    Mobile Ad-hoc NETworks (MANETs) are improvised wireless network increasingly appearing in recent years as portable wireless devices. Due to remarkable characteristics such as lack of central coordination, infrastructure less, dynamic topology and nature of wireless communication, Mobile ad-hoc networks are vulnerable to many security threats. Many Intrusion Detection Systems (IDS)...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jul 2013

    Predictive Load Balancing for Data Mining in Distributed Systems

    Load Balancing is the key attribute in distributed systems to ensure fast processing and optimal utilization of hardware components. The processing elements of varying hardware architecture and computing capabilities in a shared network system constitute the distributed system. In such a heterogeneous environment, load balancing and scheduling become complex and...

    Provided By Journal of Theoretical and Applied Information Technology