Journal of Theoretical and Applied Information Technology

Displaying 1-40 of 407 results

  • White Papers // Jun 2014

    QOS Based Cost Efficient Resource Allocation in Cloud

    Resource allocation is one of the important challenges in cloud computing environment. It depends on how to allocate the resource to the particular task. Resource allocation can be done by two methods. One of the methods statically allocates the resources and other dynamically allocates the resources. Two methods are having...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2014

    Text Mining Algorithm Discotex (Dis-Covery From Text Extraction) With Information Extraction

    Text mining concerns looking for patterns in unstructured text. The related task of Information Extraction (IE) is about locating specific items in natural-language documents. This paper presents a framework for text mining, called DISCOTEX (DISCOvery from Text EXtraction), using a learned information extraction system to transform text into more structured...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2014

    Assembler Design Techniques for a Reconfigurable Soft-Core Processor

    The reconfigurable processor design which utilizes platform such as Field Programmable Gate Array (FPGA) has offered several advantages in minimizing the non-recurring engineering cost and to reduce the time-to-market for processor-based products. However, when any modification is made to the processor architecture, the same information needs to be relayed to...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2014

    Anonymous Web Browsing Against Traffic Analysis Attacks by Reusing the Cache Memory

    Anonymous web browsing is a hot topic with many potential applications for privacy reasons. However, there are few such systems which can provide high level anonymity for web browsing. The reason is the current dominant dummy packet padding method for anonymization against traffic analysis attacks. This method inherits huge delay...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2014

    A Comparative Study of Classification Models for Detection in IP Networks Intrusions

    Intrusion detection is an essential mechanism to protect computer systems from many attacks. The authors presented a contribution to the network intrusion detection process using six most representative classification techniques: decision trees, BayesNet, Naive Bayes, Rules, SVM, and Perceptron multi-layer network. In this paper, they presented a feature selection using...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2014

    An Effective Cross Rate Packet Aggregation Scheme for Virtualized Network Cloud Computing

    Virtualization enables the cloud computing. The bottleneck of transferring packets from driver domain to Virtual Machines (VMs) in I/O channel was eliminated by basic aggregation and destination based aggregation scheme, but it is limited to aggregating packets for a particular destination and missing out more effective packet combinations. This paper...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2014

    Novel Framework for the Portfolio Determination Using PSO Adopted Clustering Technique

    Methods based on the econometrics, statistics, machine learning, heuristics and data mining methods are used to predict the market behavior and investment decisions. In this paper, the authors have presented a novel approach for the portfolio creation using the PSO adopted k-means. Then the NARX and the Markowitz model have...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2014

    Dynamic Structured Privileges With Multiowner Data Sharing for Dynamic Groups in the Cloud

    Cloud computing is a general term used to describe a new class of network based computing that takes place over the internet. The most basic and important service offered by cloud is data storage. However, the major obstacle in the multi owner data sharing for the wide deployment of cloud...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2014

    Evaluation Subquery Methods in Microsoft Sql Server 2008

    Frequently user compiles a query to satisfy business process needs, whether directly using DBMS or connecting into application system. There are many methods that can be used to generate desired results to support transaction, but all the query processing should be run effectively and efficiently. A significant aspect of query...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2014

    A Survey of Research and Practices in Multiprocessor System on Chip Design Space Exploration

    In this paper, the authors present a perspective on the existing research and practices initiated for the Design Space Exploration (DSE) in Multi-Processor System-on-Chip (MPSoC) technology. Reduction in size as well as adding more functionality within a single chip by incorporating multiple processors remains the key in the development of...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2014

    A Comparative Analysis of Markov Model With Clustering and Association Rule Mining for Better Web Page Prediction

    Web page prediction that involves personalizing web user's behavior and also helps the web master to improve the website structure and helps the user in navigating the site and accessing the information. World Wide Web (WWW) is a huge storage place for pages and links. So that the browser can...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2014

    High Speed Vlsi Architecture for Non Separable Block Based Lifting Wavelet Transform

    The inherent advantage of the in-place computation of the lifting based DWT over the conventional convolution method makes it suitable for efficient hardware implementation with lower computational complexity. The proposed paper uses non separable block based method to derive the VLSI architecture for the two dimensional DWT. In separable lifting...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2014

    A Combinatorial Tree Based Frequent Pattern Mining

    Frequent pattern mining is a process of extracting frequently occurring itemset patterns from very large data storages. These frequent patterns are used to generate association rules. Association rules define the relationship among items. The strength of the relationship can be measured using two different units namely support value and confidence...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2014

    An Enhanced Semi-Apriori Algorithm for Mining Association Rules

    Data mining is an accumulation of techniques used to efficiently automate discovery of previously unknown, novel, valid, valuable and understandable patterns in large-scale databases. Mining association rules in large database is one of data mining and knowledge discovery research issue, although many algorithms have been designed to efficiently discover the...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2014

    Semantic and Fuzzy Aspects of Opinion Mining

    In recent years, the amount of opinions and reviews available on the web has grown tremendously and therefore the role of sentiment analysis is even more crucial than before. Given the very ambiguous and imprecise nature of sentiments and of their expressions, this study focuses on the review of semantic...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2014

    Job Scheduling Optimization Based on Resource Load Balance in Cloud Computing

    Job scheduling plays an important role in cloud computing networks. Appropriately distributing service jobs to multiple servers when the cloud network stays in dynamic load conditions is the main work of the scheduling strategy. The authors adopt the resource load level of a server as the state of the server,...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2014

    Enhancing Data Security Using DES With Hardware Implementation

    Network security has become an important issue in organization, business and public data handling and has grown exponentially in recent times. The threats to the valuable information on the network are becoming more widespread and more sophisticated. In this paper, the authors focus on secure communication between end-points terminal and...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2014

    Factors Affecting Programmer's Performance on Web-Based Programming

    Today, the changes that occur in the field of IT are repositioning its role from just to support back office to strategic role. Thus, this change has led to high demand for IT professionals who have the competence and also updated on the utilization of new technologies. This research is...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2014

    An FPGA Based Overlapped Quasi Cyclic Ldpc Decoder for Wi-Max

    In this paper, the authors present a partially parallel Quasi cyclic Low Density Parity Check (LDPC) decoder architecture for WiMAX IEEE 802.16e standard. Two phase message passing min-sum decoding algorithm is used to decode the Low Density Parity Check (LDPC) codes. The decoder is designed for code rate

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2014

    A Novel Approach for Partitioning in Hadoop Using Round Robin Technique

    The Hadoop distributed file system is constructed to store profoundly and immensely colossal data sets accurately and to send those data sets at huge bandwidth to end user applications. Hadoop gives a distributed file system and a structure for the analysis and conversion of profoundly and astronomically immense data sets...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2014

    Scheduling Techniques in On-Demand Grid as a Service Cloud: A Review

    The Infrastructure-as-a-Service (IaaS) cloud is a customer oriented cloud environment that offers user with computing infrastructures on-demand to be used based on the cloud computing paradigm of pay-per-use. When the IaaS is now utilized to build a traditional grid network within the cloud environment, it is now called an on-demand...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2014

    Pattern Based Classification for Text Mining Using Fuzzy Similarity Algorithm

    Pattern mining is an important research issues in data mining with few kinds of applications. Many text mining methods have been proposed for mining useful pattern in text documents. It is mainly focuses to approximately identify the different entities such as terms, phrases and pattern. The authors use the feature...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Apr 2014

    On Long-Range-Dependence Synthetic Data Generation Through Heavy-Tailed Distributions

    Comprehensive analysis of the Internet traffic conducted over the last decade revealed the concept of Long-Range Dependence (LRD) in the collected data traces. Some of this analysis work proved that this property is a result of the heavy tailed distribution of the packet inter-arrival time, which is a result of...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Apr 2014

    Optimization of Transaction Processing in Cloud Databases Through a Datacenter System Design Cracs to Improve Replica Consistency, Availability and Scalability

    It is obvious that tremendous achievements have been emerged in IT industries at various sectors. If the authors have a keen look, all the technologies are revolving around a single word \"Data\". All techniques are trying to improve the read and write of data from and to the database. Usually...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Apr 2014

    A Novel Approach for Dynamic Cloud Partitioning and Load Balancing in Cloud Computing Environment

    Cloud computing is an attracting technology in the field of computer science. Cloud computing involves sharing of resources. In the event of processing many jobs, the load balancing becomes essential for efficient operation and to improve user satisfaction. This paper introduces the strategic model that performs load balancing as well...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Apr 2014

    Personalized Web Search Methods - A Complete Review

    Internet's foremost information retrieval service is the World Wide Web (WWW). It serves as a platform for retrieving variety of information that are associated with research, education, marketing, sports, games, politics, finance, etc. The utter volume of information growth leads to the information overload on the internet. Search engines are...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Apr 2014

    An Energy Saving Set Associative Cache Algorithm With Improved Performance

    Enabling one way in set associative cache during operation is proposed in literature. However, this architecture degrades the average memory access time. This paper proposes an algorithm to map to certain way in set associative cache improving the performance. The address is mapped to certain way by certain transformations involving...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Apr 2014

    Energy-Efficient Sub-Clustering With Optimized Processor Speed (ESOPS) in Wireless Sensor Networks

    A wireless sensor network consists of sensor nodes to monitor the physical and environmental conditions. In certain applications like habitat monitoring, where sensor nodes are randomly deployed in manually inaccessible environment that operates with a limited battery power. This battery constraint reduces the network lifetime. The sensor nodes consist of...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Apr 2014

    Resourceful and Secure Routing Protocol Via Active Hierarchical Clustering Mechanisms for Wireless Sensor Network

    Wireless Sensor Network (WSN) combine information sensing, wireless communication, information processing in current years. Two major constraints related to wireless sensor networks are the dynamic variance of the network caused by capacity constraint of sensor nodes and uncertainties related to wireless links. Moreover, the problem in wireless sensor networks is...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Apr 2014

    Two Level Clustering Approach for Data Quality Improvement in Web Usage Mining

    Web Usage Mining (WUM) is a term related to the extraction of knowledge from web log data. Web log data has a lot of irrelevant data to proceed WUM. Therefore, it requires several steps to get a good quality of data, because the final result of WUM depends on the...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Apr 2014

    FL2440 Hardware Based Neural Data Security Using Polarization Encryption (Ep) Approach

    Encryption scheme is widely used in the field of communication network security. The network systems are focus on reliability, service and functions, which provided end-to-end service to protect encrypted data node. It enables to interconnect the various functional levels to interact and communicate with each other. An interconnected group of...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Apr 2014

    E-Learning Development as Public Infrastructure of Cloud Computing

    In this paper, the authors describe the model they implement to provides services, such as IaaS, PaaS, and SaaS, for e-learning and collaboration in the educational environment in Salatiga. Currently, the combination of cloud technology and e-learning is being explored. Several efforts of using IaaS cloud technology in education focus...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Apr 2014

    Semantic Schema Matching Approaches: A Review

    An extensive review of the existing research work in the field of schema matching uncovers the significance of semantics in this subject. It is beyond doubt that both structural and semantics aspect of schema matching have been the topic of research for many years and there are strong references available...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Apr 2014

    Implementation of Data Encoding and Decoding in ARM Boards With QoS Parameters

    Networks must be able to transfer data from one device to another with acceptable accuracy. For most of the applications, a system must guarantee that the data received are identical to the data transmitted. Any time data are transmitted from one node to the next, they can become corrupted in...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Apr 2014

    An Analysis of Privacy Risks and Design Principles for Developing Countermeasures in Privacy Preserving Sensitive Data Publishing

    Government Agencies and many other organizations often need to publish sensitive data - tables that contain unaggregated information about individuals. Sensitive data is a valuable source of information for the research and allocation of public funds, trend analysis and medical research. Publishing data about individuals without revealing sensitive information about...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Apr 2014

    An Algorithm About Partner Selection Problem on Cloud Service Provider Based on Genetic

    Aiming at choosing suitable cloud service providers to construct a dynamic alliance and then satisfying terminal customers more efficiently, to achieve the optimal allocation of cloud services. This paper uses gray relative comprehensive evaluation model to determine the optimizing index of cloud services market. The authors use the multi-objective optimization...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2014

    Residential Site Selection by Combining GIS and Fuzzy Database Query on Android Device

    Residential sites are a crucial means for the survival of a family life in which currently the residential sector development increased. The increasing number of existing residences makes people difficult to determine the location of the residences in accordance with the needs of each individual. Geographic Information Systems (GIS) is...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2014

    Dynamic Effect of Knowledge Management System on School Management

    In this paper, the authors investigate the effect of knowledge management system on school management, as well as to use system dynamics as the main research method. This study selected a certain elementary school in Miaoli County in Taiwan as the research subject. This paper used students' sense of identification,...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2014

    Fault Recovery Algorithm Using King Spare Allocation and Shortest Path Shifting for Reconfigurable Systems

    Field Programmable Gate Arrays (FPGAs) have the capability of reconfiguring in-field and at runtime that helps in fault recovery. FPGAs are used to implement complex functions in applications such as nuclear systems, space missions, communication systems etc where system reliability is very critical. Such systems must be designed with the...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2014

    New Approach to Improving Lifetime in Heterogeneous Wireless Sensor Networks Based on Clustering Energy Efficiency Algorithm

    The major challenge for wireless sensor networks is energy consumption minimization. Wireless transmission consumes much more of energy. In the clustered network, a few nodes become cluster heads which causes the energetic heterogeneity. Therefore the behavior of the sensor network becomes very unstable. Hence, the need to apply the balancing...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    A Network Management System for Epon Based on SNMP

    Now, the PON technologies become the preferred broadband access technology all over the world. In this paper, a network management system is designed for EPON. In Manager and Agent, the "Simple and Shortcut" protocol SNMP is adopted to develop the application program. As the Agent runs on the embedded system,...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    Honeypot Based Intrusion Management System: From a Passive Architecture to an IPS System

    In this paper, the authors are presenting an Intrusion Prevention System (IPS) based on multiple sensors in the network. These sensors are in fact honeypots built using honeyd. Honeyd is a high level honeypot which is very light and which is offering a lot of possibilities to get the most...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    Energy Efficient Distributed Image Compression Using JPEG2000 in Wireless Sensor Networks (WSNS)

    Restricted computational power, memory limitations, narrow bandwidth and energy supplied present strong limits in sensor nodes are the important points should be considered during the real time transmission of data using Wireless Sensor Networks. Therefore, maximizing network lifetime and minimizing energy consumption are always optimization goals. To reduce the energy...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Modeling to Compiling: Design and Implementation for Wireless Sensor Network System

    Based on the characteristics of the Wireless Sensor Network (WSN), researchers tend to ignore the system modeling of the complex system which is built by WSN and the central processor. Actually, the complex modeling method and code generation tool will cause a lot of manpower and time costs. Different from...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Optimal Approximate Algorithm to Solve Location-Selection of Recycle Water Station Problem

    The minimum Steiner tree problem has wide application background, such as transportation system, communication network, pipeline design and VISL, etc. It is unfortunately that the computational complexity of the problem is NP-hard. People are common to find some special problems to consider or find the approximate algorithm to solve different...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    A Secure Scheme for Heterogeneous Wireless Sensor Networks

    A secure scheme for heterogeneous Wireless Sensor Networks is presented. The Wireless Sensor Networks have some sensor nodes and heterogeneous sensor nodes that have greater power and transmission capability than other nodes have. All kinds of sensor nodes are evenly distributed respectively in entire sensing area that is divided into...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    A Safe RFID Authentication Protocol for Internet of Things

    Internet of Things (IoT) is the evolution of related technologies and applications such as Internet and mobile networks. Future research into IoT will focus on generic technology, information security, and critical applications. Based on IoT, the existing RFID system security mechanisms are analyzed, with a focus on cryptographic protocols. Investigate...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Algorithm Design of Secure Data Message Transmission Based on Openssl and VPN

    In order to solve the safety problem that remote or mobile users can perform secure data transmission among different computers via enterprise internal network, conventional approach is to establish VPN connection. The transmitted data via VPN network must be encrypted so as to ensure that illegal users are unable to...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Conceptual Model of Multi-Agent Business Collaboration Based on Cloud Workflow

    With the development of information and network technology, more and more enterprises adopt the networked manufacturing mode to improve their production, service, and operations. However, the current networked manufacturing mode cannot put the centralized resources into distributed services, which leads to a lower inter-enterprise business collaboration capability. This paper firstly...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    K-Means Method for Grouping in Hybrid Mapreduce Clusters

    In hybrid cloud computing era, hybrid clusters which are consisted of virtual machines and physical machines become more and more popular. MapReduce is a good weapon in this big data era where social computing and multimedia computing are emerging. One of the biggest challenges in hybrid mapreduce cluster is I/O...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Research on Resource Scheduling Algorithm Based on Fuzzy Clustering and Smart Agents in Cloud Computing

    Cloud computing has been a hot spot in recent years. In complex and dynamically changing cloud computing environment, resource management and scheduling is a hard and challenging problem, and should be solved at first. This paper presents an effective resource management model and the corresponding resource scheduling algorithm is based...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Modeling and Micro Scale Analyzing of Micro-Switch Applied in All-Optical Communication

    Inductive micro-switch is an integrative device of a sensor and actuator and widely applied in all-optical-network communication. Its malfunctions related to "Fail-to-closure" and "Transient-closure" result in low reliability and weak anti-jamming capability. A new bistable inductive micro-switch is presented based on Micro Electro-Mechanical System (MEMS) technology. A sine rough surface...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    SER-Minimization Relay Selection for Two-Way Relay Channels With Physical Layer Network Coding

    In this paper, the authors explore the relay selection scheme for two-way relay channels with Physical layer Network Coding (PNC), where two end nodes exchange information via a selected relay node with the minimal Symbol Error Rate (SER) performance among multiple candidate relay nodes. To reduce the computational complexity, they...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Hidden Hops Aware Load Balancing Based on Greedy Approach

    Virtual network mapping is one of the main problems in network virtualization. At present, virtual networking mapping aims at minimal resource consumption at substrate network, but ignores the resource demanded by the hidden hops, making bottlenecks due to the resource shortage at the hidden hops. This paper aims at the...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Secure Routing in MANET Using Asymmetric Graphs

    Identification of neighbors plays a major role of many protocols for Wireless Ad-hoc NETworks and also the process of network paths in a network plays an important role. Wormhole attack is a major issue in networks. This type of attack causes the opponent to collects packets from one location and...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Hardware and Software Implementation for Highly Secured Modified Wired Equivalent Privacy (MdWEP)

    Wireless communication networks are in huge need and demand due to various features of Internet and its availability and easy accessibility all over the world. Therefore, advanced security techniques and mechanism are required for private business application and for effective and secured data transfer from one network to other. Many...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Secure Key Sharing for Group Communication Under Community Cloud

    The cloud is one of the most discussed topics among IT professionals today, and organizations are increasingly exploring the potential benefits of using cloud computing or solutions for their businesses. In the users' modern world, people join hands together to form groups and that forms communities through which the ability...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Addressing Security and Privacy Issues in Cloud Computing

    Cloud computing offers a new way to deliver services while significantly changing the cost structure underlying those services. This new technical and pricing opportunities change in the way the business operate. It combines the features of traditional computing technology like grid, parallel and distributed computing and so on. The aim...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Application of Multi-Objective Weighing Work Scheduling Algorithm Into Storage Network

    The resource request task of transmission of large number of servers, wide-band resources in the enterprise storage gridding, the business distribution and download service are limited by scheduling length, time span, load balance, service quality, economic principles, security performance and many other factors, so it is difficult to use definite...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Simulation Service Management Bus in Service Oriented Run-Time Infrastructure

    As the SOA (Service-Oriented Architecture) is paid close attention by many researchers in recent years. It is a component model which can be defined as service according to business needs and can be taken as reusable shared resource. In this paper, Simulation Service Management Bus (SSMB) is proposed to intergrade...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    Network Intrusion Based on Cloud Network

    Cloud computing through the development of recent years has become a mature network technology, which have been or are being applied to a number of large-scale network server clusters, including computing, storage server, Internet resources etc. This paper aimed at the cloud cluster cyber source intrusion and malicious behavior, analyzes...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    A Two-Step Filtrate Localization Method for Wireless Sensor Networks

    In this paper, the authors address a Wireless Sensor Network localization problem that has high reliability in an environment where physical node destruction is possible. They propose a range-independent localization algorithm called Two-Step Filtrate Localization (TSFL) that allows sensors to passively determine their location with high reliability, without increasing the...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    New Computation Technique for Encryption and Decryption Based on RSA and Elgamal Cryptosystems

    Cryptography addresses the necessary elements for secure communication that involved privacy, confidentiality, key exchange, authentication, and non-repudiation. This paper proposed a new computation of encryption and decryption that was based on the computation of RSA and ElGamal Cryptosystems. The RSA is a Public Key Encryption system that gets its security...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    Comparison of Feature Extractors for Real-Time Object Detection on Android Smartphone

    In this paper, the authors present the analysis of real-time object detection method for embedded system particularly the Android Smartphone. As they all know, object detection algorithm is a complicated algorithm that consumes high performance hardware to execute the algorithm in real time. However due to the development of embedded...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    Research on Mutual Coupling Correction of Array Output Signal by BP Network

    The method of mutual coupling correction of array output signal is studied in the paper. According to array signal processing's feature, array error model is analyzed and array mutual coupling is studied. The method that smart antennas' channel calibration by BP network in wireless communication is proposed, which improves the...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    Channel Coding Simulation Research of Inter-Satellite Spread Spectrum Communication System

    In this paper, the authors consider proposing the mathematical model and simulation mode of inter-satellite channel based on the reliability of inter-satellite communication system. The Monte Carlo method is adopted to develop the spread spectrum communication system of two consumers. In order to reduce the bit errors of inter-satellite communication,...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    Chaos of Henon Map Based on the Coupled Networks

    The study of complex networks has most interests to the understanding of behaviors of the network dynamics. In a network, an individual can be represented by the node; the edge is defined relationship of two individuals. In this paper, the relationship between the parameters of Henon map is studied, and...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    An Enhanced Rule Approach for Network Intrusion Detection Using Efficient Data Adapted Decision Tree Algorithm

    Data mining has been used extensively and broadly by several network organizations. Intrusion Detection is one of the high priorities & the challenging tasks for network administrators & security experts. Intrusion Detection System is employed to protect the data integrity, confidentiality and system availability from attacks. IDS use the data...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    Securing Internet Applications Using Homomorphic Encryption Schemes

    The trend towards delegating data processing and management to a remote party raises major concerns related to privacy violations for both end-users and service providers. These concerns have attracted the attention of the research community, and several techniques have been proposed to protect against malicious parties by providing secure communication...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    A Novel Approach for Detecting Smart Camouflaging Worm

    Active Worms wreak havoc by exploiting security loopholes and flaws in software design to propagate from one machine to another. Active Worms are different than a traditional virus in that they don't spread by modifying programs on a single system, but rather by searching for and implanting destructive code onto...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    A Comprehensive Study of Routing Protocols for Cognitive Radio Networks

    The rapid development of wireless communication technologies results in the problem of radio spectrum shortage. Additionally, the traditional fixed spectrum allocation scheme can lead to the significant spectrum underutilization. Cognitive Radio (CR) is an emerging technology to solve those problems by enabling unlicensed users to opportunistically access the available licensed...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    Research on Spatial Index of Electric GIS

    In the electric GIS, facilities in different voltage levels show a different proportion, and topological relations exist in line and point. According to the limitations in multi-scale representation and topological connection of traditional spatial index, an extended R-Tree model based on multi-scale clustering(MCER Tree) is proposed, which removed the restrictions...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    Ant-Colony-Algorithm-Simulated-Annealing-Algorithm-Based Optimization Approach for MCM Interconnect Test

    In this paper, a novel optimization approach based on Ant Colony Algorithm (ACA) and Simulated annealing Algorithm (SA) is presented for the Multi-Chip Module (MCM) interconnect test generation problem. In order to apply ACA into the interconnect test, the pheromone updating rule and state transition rule is designed by combing...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    Express Aviation Network Construction Based on Hub-Spoke Theory

    Air freight network is one of the important means to improve the competitiveness of express enterprises. This paper establishes the model from two aspects, hub location decisions and hub number decisions, with the goal to achieve the lowest air freight network cost, based on the "Hub-spoke" theory. Then, computes the...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    System of Preview and Detection Based on Network Virtual Experiment

    As an important supporting means for teaching in university, virtual experiment makes up the lack of resources in experiment teaching. Network virtual experiment is a new development direction following the virtual experiment, it has inherited and carried forward the concept of virtual experiments, extending and expanding the resources of virtual...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    A Privacy Preserving Data Mining Scheme Based on Network User's Behavior

    The privacy preserving data mining has become a research hot issue in the data mining field. The server log of the Web site has preserved the page information visited by users. If the page information is not protected, the user's privacy data would be leaked. Aiming at the problem, it...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    A Flexible Viterbi Decoder for Software Defined Radio

    Modern wireless communication standard varies a lot from each other and is evolving rapidly. Flexibility becomes the dominate consideration of Software Defined Radio (SDR) system design. Reconfigurable platform is preferred in the SDR due to the reuse of hardware. Convolutional code is widely adopted in many wireless protocols but the...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    A Dynamic On-Demand Multipath Routing Algorithm for Low Earth Orbit Satellite Networks

    Compared with GEostationary Orbit (GEO) satellite systems and Medium Earth Orbit (MEO) satellite systems, Low Earth Orbit (LEO) satellite systems provide lower propagation delay as well as higher throughput. Because of these reasons, LEO satellite systems can play a pivotal role in providing services to areas where there is no...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    Analysis on the Impact on Learning and Teaching Model Based on Multimedia Network

    With the development of education informationalization, many teaching application based on multimedia and network are gradually penetrated into all kinds of education processes and the teaching activities which formed a huge challenge to traditional education mode. But the immaturity of the multimedia and network teaching which developed in recent decades...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Nov 2013

    Opinion Mining and Summarization of Company Reviews

    In the age of information any process begins with searching for information. Searching has become an unending syndrome. The people search for information on vast topics and the frequent few topics are on product, opinion about company, education institution and news over the internet. Search results include indexed data from...

    Provided By Journal of Theoretical and Applied Information Technology