Journal of Theoretical and Applied Information Technology

Displaying 1-40 of 936 results

  • White Papers // Aug 2015

    Web Services Composition for Concurrent Plan using Artificial Intelligence Planning

    Automatic planning of web services composition is a challenging problem both in academia and real-world application. Artificial Intelligence (AI) planning can be applied to automate web services composition by depicting composition problem as AI planning problem. Web services composition would combine multiple services whenever some requirements cannot be fulfilled by...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Aug 2015

    A Comprehensive Human Factor Framework for Information Security in Organizations

    Human factor represent an essential issue in the security of information in organizations, as human factor determine the behavior of the employees toward information security. This paper attempts to integrate related human factors, recognized by previous paper, into a structured comprehensive framework. The framework has four main domains that take...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Aug 2015

    Slotted Microstrip Antennas for Circular Polarization with Compact Size For RFID ,Bluetooth &S-Band Applications

    Micorstrip patch antennas play a major role in day-to-day life. In this paper, the designed microstrip patch antenna is compact sized with circular polarization for RFID applications. Different arbitrary shaped slots like square circle plus are used and parameters like return loss, gain and frequency are observed for each of...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Aug 2015

    Throughput Enhancement of Wireless Sensor Network Localization Accuracy Against Jamming Attacks

    Localization refers to locating the position or area in which the sensor or object to be tracked. Based on the localization, many applications are emerging in the wireless sensor network. Since the wireless sensor network is a shared medium, jamming attacks can be launched by adversary emitting the radio frequency...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Aug 2015

    Applying Case based Reasoning in Agile Software Development

    There is a common misconception among developers who follow agile development methods that following formal processes and modeling are unnecessarily and perceived as a waste of effort. The initial intension of agile was not an anti-methodology movement but rather a balance between processes and production. Nevertheless, the main challenges facing...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jul 2015

    Elliptical Curve Cryptography Algorithm for Secure Mobile Adhoc Network

    Reducing network traffic and achieving high security are the most significant task of the Mobile Ad-hoc NETwork (MANET). The beacon-less kNN query processing methods are utilized for reducing traffic and maintaining high accuracy of the query result in MANET. The explosion method and spiral method are adopted in this approach....

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jul 2015

    Bluetooth Based Wireless Home Automation System using FPGA

    With the increasing development of modern technology and Smartphone, smart way of living has turned out to be a major part in the present era of human life. Due to rapid growth in technology, Bluetooth has brought a revolutionary change. Bluetooth technology aims to exchange data wirelessly within a range...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jul 2015

    The Effect of Routing On Data Traffic Control in Environmental Event Monitoring using Wireless Sensor Networks

    Wireless sensors networking is a promising technology for a wide range of useful applications in many areas including civilian and military areas. Thanks to the sensing capabilities of Wireless Sensor Networks (WSNs), they become a prominent choice for certain applications such as environmental monitoring. The distributed sensors collectively realize the...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jul 2015

    Object Localization and Path Optimization using Particle Swarm and Ant Colony Optimization for Mobile RFID Reader

    Optimization for an RFID reader is an important technique to reduce the cost of hardware; the authors need to define the location of the RFID reader to ensure the node will be fully covered by the reader. It is also essential to find the best way to place the nodes...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jul 2015

    Trust Based Dynamic Source Routing Protocol for MANET Against Routing Attacks

    Devices themselves are the network in ad hoc networks allowing seamless communication, at low cost, in a self-organized fashion and also easy deployment. Freedom and self-organizing capabilities make Mobile Ad hoc NETworks (MANETs) completely different from other networking solution. MANETs highly dynamic nature leads to changes and network topologies unpredictability,...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2015

    An Efficient Mathematical Analysis For Saving Energy in WSN Routing Protocol

    The issue of energy efficiency in Wireless Sensor Networks (WSNs) is a prime consideration. Therefore, the authors propose an energy-saving scheme for use in wireless sensor networks and this goal of this research. The proposed protocol is a mixture of the Low Energy Adaptive Clustering Hierarchy (LEACH) and Mediation Device...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2015

    A Survey of Routing MAC Techniques for Wireless Sensor Networks Routing Protocol

    A Wireless Sensor Network (WSN) contains a random number of sensors distributed in the environment to monitor physical conditions. In the following, a survey of MAC routing mechanisms in WSN is presented and discussed. One of the most important issues in WSN is the issue of energy efficiency of the...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2015

    RACARP: A Robustness Aware Routing Protocol for Cognitive Radio Ad Hoc Networks

    Cognitive Radio (CR) is a new paradigm which offers a viable solution to deal with the spectrum shortage problem and enhances the spectrum utilization in wireless communication systems. In Cognitive Radio Ad Hoc Networks (CRAHNs), data routing is one of the most challenging tasks due to varying link-quality, frequent topology...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2015

    A Comparative Evaluation of Intrusion Detection Techniques in Wireless Sensor Network

    Wireless Sensor Network (WSN) are composed of low cost sensor nodes and usually deploy in open and unprotected area, which make security the major challenge in this kind of network, due to their characteristics WSN is vulnerable to various types of attacks and intrusions, where it require security mechanisms to...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2015

    Novel Printed Monopole Trapezoidal Notch Antenna with S-Band Rejection

    A compact coplanar waveguide fed trapezoidal monopole antenna and a notch band monopole antenna are presented in this paper. Notch band is obtained between 3-4 GHz, which covers S- band of WiMAX applications. The notch band antenna is obtained by etching U- slot on the radiating element of the monopole...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2015

    Design of Network Architecture for Intrusion Detection using Spanning Tree Multiclass Classifier in MANET

    Security in mobile ad-hoc network plays a strategic role to ensure high level of protection without any intrusions in computer networks. Most of the intrusions in mobile ad-hoc network are traced and detected by collecting traffic information and classified according to different classification algorithms. With individual traffic classifiers design, packet...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2015

    The Moderating Effect of Web Service on the Relationship between Business Analytics and Supply Chain Performance

    In recent years, supply chain performance measurement has received much attention from researchers and practitioners. Effective supply chain performance through supply chain antecedents such as business analytics has become a potentially valuable way of securing competitive advantage and improving supply chain performance. Many organizations have begun to recognize that supply...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2015

    Modified Vertical Handoff Decision Algorithm for Improving QOS Metrics in Heterogeneous Networks

    In 4G networks, the meshing of WiMAX and WLAN has been a tough task. Issues regarding intermeshing of WIMAX and WLAN networks during vertical handoff have to be analyzed. Two interconnected networks such as WIMAX and WLAN has been proposed. The authors' proposed scheme provides better connectivity between fixed and...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2015

    An Improved Adaptive and Dynamic Hybrid Agile Methodology to Enhance Software Project Success Deliveries

    The discipline, uptake and use of agile methodologies in the software industry have been slow and unconvincing as a robust tool. The research community also indicates that, since the use of agile methodologies was first introduced more than 13 years ago, issues and perceptions have been many suggesting a keen...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2015

    Overview on Identification of Marks of Subscriber Secret Location Tracking in Wireless Communications Networks

    As mobile devices are getting an integral part of people's everyday life they store and process data that can be of great importance for the user. Another problem with the development of mobile Internet and means of wireless communication is tracking. All the movements and activities of the mobile phone...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2015

    AACGFA : Adapting Auto-Configuration Geographical Fidelity Algorithm for Mobile Wireless Sensor Networks

    Today Mobile Wireless Sensor Networks (MWSNs) are used in several areas. There are many environments of developments and designs MWSN in programing level according to project needs, however in this paper, the authors will design a MWSN model using design tools as Wisen Profile (model devoted to a driven development...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2015

    Empirical Study of GUI to Reuse Unusable Test Cases

    Now-a-days, it is more important to upgrade web applications which are provided by companies due to changes in user requirements. In developing web applications the Graphical User Interface (GUI) plays vital role. Due to frequent changes in application it varies from old version and modified version. Finally, it makes some...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2015

    Network Selection in Heterogeneous Wireless Environment using Decision Making Algorithms-Topsis and Promethee

    Forthcoming wireless environment is a fusion of numerous networks with diverse technologies deployed by individual operators. In such an environment, innovative network selection methodologies are required not only to provide "Always best connected" service to mobile users but also to maximize network operator's revenue. To fulfill such requirements, multiple attributes...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2015

    State of the Art Survey on Security Issue in Cloud Computing Architectures, Approaches and Methods

    The development of cloud computing has revolutionized in how the computing and storage are utilized remotely. It has grown from being hopeful business concept to one of the fast growing segments of the IT manufacturing. It has become attractive to businesses and organizations. Although of all the benefits of the...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2015

    Performance Analysis of Relay and Combining Methods in Wireless Networks

    The quality signal in a wireless transmission occasionally suffers from severe bad channel quality due to effects like fading caused by multi-path propagation. Diversity is one of the methods that used to reduce such effect whereby different samples of the same signal are transferred over essentially independent channels. Cooperative wireless...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2015

    Packet Level Data Compression Techniques for Wireless Sensor Networks

    Wireless sensor network consist of a set of sensor nodes. The processing capacity varies with each node. Sensors in it have storage capacity which is limited. The main challenge today in this field is to improvise the power and energy management of sensor network. Different techniques have been introduced by...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2015

    Bandwidth Provisioning Scheme for 3D Wireless Sensor Networks

    BandWidth (BW) resources are scarce and valuable in Wireless Sensor Networks (WSNs). Managing this scarcity in BW is a key challenge in WSN's environments. Achieving high BW Utilization (BWU) will rise the Quality-of-Service (QoS) that network can guarantee, without the omission of the importance of concurring BWU, with the minimizing...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2015

    Evaluation Of Security in Software Architecture using Combination Of ATAM and STRIDE

    In this time, security is important thing that must be included when develop software because it has large effect on continuity of software and business. Therefore, security evaluation is required as a phase in software architecture development. Security evaluation is useful to minimize future problems about security. This paper is...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Apr 2015

    New Architecture of IDS Based Interaction on Mobile Agents and Data Mining

    Intrusion Detection System (IDS) is a very useful tool for the defence of a network against attacks. Now-a-days, intruders use a complex attacks towards a target. This makes the IDS unable to detect all intrusions and the latter generate two frequent false alarms. This paper is to propose a new...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Apr 2015

    An Assessing Approach Based nn FMECA Methodology to Evaluate Security of a Third Party Cloud Provider

    Cloud computing is recognized as a great eliminator of the hefty costs and complex processes that come with evaluating, purchasing, configuring or managing software and hardware essentials that are necessary for enterprise applications. However it presents a significant security concerns that need to be addressed when moving to the cloud...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Apr 2015

    Review of Quality Of Service in Routing Protocols for Wireless Sensor Networks

    Rapid innovative improvements in wireless communication technology have revolutionized Wireless Sensor Networks (WSNs). A WSN is comprised of self-ruling sensors that are distributed spatially to monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion, or pollutants and to pass this information through the network to a main...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Apr 2015

    Scalable Multidimensional Anonymization Algorithm Over Big Data Using Map Reduce On Public Cloud

    It appears that everybody observes with special attention, the occurrence of big data and its practice. There is no disbelief that the big data uprising has instigated. Though the practices of big data propose favorable business paybacks, there are substantial privacy implications. Multidimensional generalization anonymization scheme is an actual method...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Apr 2015

    Energy Saving in Green Cloud Computing Data Centers: A Review

    The cloud computing is a new computing standard which targets to offer reliable, adaptive and Quality-of-Service (QoS) based computing environments for IT users. One of the recent major concerns in cloud environment is efficient usage of energy in its data centers. This paper reviews energy saving strategies in data centers...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Apr 2015

    Improvement of Rectangular Patch Antenna Performance for RFID Applications

    Printed elements antennas "Patch" have the advantages of microstrip lines, light weight, reduced by the technique of printed circuit cost. They can be placed on land or space vehicles, easy to networks of tens or hundreds element, connected directly to the power supply device that goes in the direction of...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Apr 2015

    Malicious Node Detection Through Trust Aware Routing in Wireless Sensor Networks

    Wireless sensor network are constituted by a large number of tiny size sensors and distributed randomly for gathering information. These types of networks have remarkable applications and demand worldwide. The wireless sensor network has been suffered with variety of attacks because of its design and deployment nature. The previous traditional...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2015

    Using Multi-Agents Systems in Distributed Data Mining: A Survey

    Extract accurate information from huge databases about peta-bytes has an unprecedented utility. However, the implementation of a data mining system requires an enormous amount of work and an extremely long run time in some cases of distributed environments. Distributed artificial intelligence consists that the entities with certain amount of autonomy...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2015

    Reconstructing, Augmenting and Manipulating 3D Scene from Sequence of Images

    The detection of third dimension by using multiple images follows naturally from the physical behavior of human eyes in the vision of 3D objects. In this paper, the scene parameters are setup for scene reconstruction; camera position and orientation are considered. Consecutive images are used to create the depth map...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2015

    Centroid Dynamic Sink Location for Clustered Wireless Mobile Sensor Networks

    The wireless sensor network consists of three main components: a large number of small-sized sensors, a remote sink connected to the internet, and a cluster head whose existence depends on the overall network structure. The sensor in the wireless sensor network can be deployed through many ways, such as a...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2015

    Symmetric Cryptography Keys Management for 6Lowpan Networks

    Thanks to the 6LoWPAN (IPv6 over Low power Wireless Personal Area Network) technology, each object will get the opportunity to obtain an IPv6 address and integrate the world of the Internet of things. This provides the ability to collect and monitor data remotely. Objects are heterogeneous; they vary depending on...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2015

    A New Proposed Dynamic Dual Processor Based CPU Scheduling Algorithm

    Selection of appropriate CPU scheduling algorithm is important, because the OS scheduler has to context switch, the CPU among the various tasks that an operating system has to execute. Real time systems involve high number of context switches. Hence, RR scheduling is not suitable, as this can result in a...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jul 2008

    Control System for Internet Bandwidth Based on Java Technology

    This paper presents a Java-based real-time Internet access estimation tool for Quality of Service (QoS) in Internet accesses for Multimedia applications (JEQoSIM). It is specially aimed for real-time multimedia applications which use the User Datagram Protocol (UDP). The system is capable of estimating access capacity, available bandwidth and delay as...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Sep 2009

    Design & Development Low Cost RFID Antenna

    This paper describes how Low Cost HF (13.56 MHz) antennas can be built and tuned so that their characteristics match the requirements of the high performance reader and third party RF modules. This third edition places greater emphasis on antennas for the higher power readers. In general, the distance at...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Nov 2009

    Enhance Fuzzy Commitment Scheme: An Approach for Post Quantum Cryptosystem

    This paper attempt has been made to explain a fuzzy commitment scheme with McEliece scheme because the efficiency and security of this cryptosystem is comparatively better than any other cryptosystem. Since this scheme is one of the interesting candidates for post quantum cryptography. Hence interest to deal this system with...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Oct 2009

    A Novel Information Hiding Technique for Security by Using Image Steganography

    This paper a novel method is proposed to provide more security for the key information with the combination of image compression and data encryption method. This method requires less memory space and fast transmission rate because of image compression technique is applied. Steganography plays an important role in information security....

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Sep 2009

    A Way Forward to Improving Functionalities of Open Database System

    The increasing need for information dissemination and the tremendous population growth in today's organizations calls for the need to migrate most application and their associated data to the network where several millions of people can access concurrently. Several challenges such as security risk and management/maintenance of the database have been...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Oct 2009

    Pattern Recognition Algorithms for Ear Biometrics

    This paper presents geometrical Parameter algorithms for ear Biometrics by representing the Ear image as contours, feature extraction and recognition. The proposed algorithms were developed for ear biometrics, but they can be applied in other contour image processing applications. Firstly it presents mathematical and algorithmic foundations of geometrical feature extraction...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Oct 2009

    Overview and Challenges of Routing Protocol and Mac Layer in Mobile Ad-Hoc Network

    Mobile Ad-hoc Network (MANET) are a new paradigm of wireless wearable devices enabling instantaneous person-to-person, person-to-machine or machine-to-person communications immediately and easily .In this paper an overview and history of MANET is given .The paper discusses the issues which should keep in mind for designing of MAC layer and Routing...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2010

    A Study on Cellular CDMA-Based for New Generation Mobile Radio System

    As the networks improve and new demands for rapid data transfer rates and multimedia services grow, operators are seeking new cellular communication solutions based on technologies like GSM, 3GSM and CDMA2000 to cater to these requirements. The paper points out that the increasing popularity of the GSM equipments globally is...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2009

    Design & Simulation of Optical Fiber Bragg Grating Pressure Sensor for Minimum Attenuation Criteria

    This paper presents the design & simulation of an Optical Fiber Bragg Grating (OFBG) sensor for stress, strain measurement and also demonstrates the methodology to arrive at the optimal grating pitch dimensions for a given interrogating wavelength. The wavelength chosen for interrogation of the Fiber Bragg Grating (FBG) sensor is...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2010

    SINR Based Vertical Handoff Algorithm Between GPRS and WiMAX Networks

    Next generation wireless network is foreseen as the combination of heterogeneous wireless networks capable of providing enhanced services to mobile users. Vertical handoff is a crucial issue in providing service to mobile users, in a heterogeneous network. To maintain continuous service during vertical handoff period, the handoff procedure should consider...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2010

    SMS Advertising and Its Prospects in Bangladesh

    Application of SMS advertising for enhancing communication with the consumers has drawn significant attention of the contemporary researchers. This study examines whether SMS advertising can be an effective medium of advertising in Bangladesh. The key ingredient of this research is the perception of consumers regarding the adoption SMS advertising. Qualitative...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2010

    Robust TCP: An Improvement on TCP Protocol

    The Transmission Control Protocol (TCP) is the most popular transport layer protocol for the internet. Congestion Control is used to increase the congestion window size if there is additional bandwidth on the network, and decrease the congestion window size when there is congestion. This paper uses a classic TCP which...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Oct 2009

    Matching Model for Semantic Web Services Discovery

    The Semantics-based Web Service Matching Model is proposed in this paper to improve the performance of Web Service discovery. Semantics-based Web Service Matching is a two-phase method including semantic similarity matching and qualitative filtering. Function-based semantic similarity matching used of matching algorithm in order to finding the most proper services....

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2010

    An Efficient Architecture for Agent-Based Dynamic Web Service Discovery With QoS

    The SOA enables the development of flexible large scale-applications in open environments by dynamically combining the web services. There exist many web services which exhibit similar functional characteristics. It is imperative to provide service consumers with facilities for selecting required web services according to their non-functional characteristics or QoS. An...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2010

    Security Issues in Wireless Sensor Network Data Gathering Protocols: A Survey

    Wireless sensor networks are usually deployed for gathering data from unattended or hostile environment. Several application specific sensor network data gathering protocols have been proposed in research literatures. However, most of the proposed algorithms have given little attention to the related security issues. In this paper the authors have explored...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Oct 2010

    A Study of Security Challenges in Wireless Sensor Networks

    Wireless Sensor Networks (WSN) is a recent advanced technology of computer networks and electronics. The WSN increasingly becoming more practicable solution to many challenging applications. The sensor networks depend upon the sensed data, which may depend upon the application. One of the major applications of the sensor networks is in...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2010

    A Novel Distributed Protocol for Randomly Deployed Clustered Based Wireless Sensor Network:

    Grouping sensor nodes into cluster has been popularly used in order to achieve the network scalability. Every cluster needs a leader, and referred as the cluster-head. Many clustering Schemes for Wireless sensor Networks focus on the stable clustering techniques for mobile environments. In this paper, the authors have proposed a...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2009

    The Role of Zigbee Technology in Future Data Communication System

    ZigBee is an IEEE 802.15.4 standard for data communications with business and consumer devices. It is designed around low-power consumption allowing batteries to essentially last forever. The ZigBee standard provides network, security, and application support services operating on top of the IEEE 802.15.4 Medium Access Control (MAC) and Physical Layer...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Apr 2015

    Energy Saving in Green Cloud Computing Data Centers: A Review

    The cloud computing is a new computing standard which targets to offer reliable, adaptive and Quality-of-Service (QoS) based computing environments for IT users. One of the recent major concerns in cloud environment is efficient usage of energy in its data centers. This paper reviews energy saving strategies in data centers...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Apr 2015

    New Architecture of IDS Based Interaction on Mobile Agents and Data Mining

    Intrusion Detection System (IDS) is a very useful tool for the defence of a network against attacks. Now-a-days, intruders use a complex attacks towards a target. This makes the IDS unable to detect all intrusions and the latter generate two frequent false alarms. This paper is to propose a new...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2015

    State of the Art Survey on Security Issue in Cloud Computing Architectures, Approaches and Methods

    The development of cloud computing has revolutionized in how the computing and storage are utilized remotely. It has grown from being hopeful business concept to one of the fast growing segments of the IT manufacturing. It has become attractive to businesses and organizations. Although of all the benefits of the...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2009

    An Algorithm for Impulse Noise Reduction by Robust Estimator in Highly Corrupted Images

    In this paper a novel method for effectively denoising the extremely corrupted image by fixed value impulse noise using robust estimation based filter is proposed. The proposed algorithm classifies the pixels of localized window in to "Corrupted" or "Uncorrupted" and removes only corrupted pixels by robust estimation or by mean...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    Network Intrusion Based on Cloud Network

    Cloud computing through the development of recent years has become a mature network technology, which have been or are being applied to a number of large-scale network server clusters, including computing, storage server, Internet resources etc. This paper aimed at the cloud cluster cyber source intrusion and malicious behavior, analyzes...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    A Two-Step Filtrate Localization Method for Wireless Sensor Networks

    In this paper, the authors address a Wireless Sensor Network localization problem that has high reliability in an environment where physical node destruction is possible. They propose a range-independent localization algorithm called Two-Step Filtrate Localization (TSFL) that allows sensors to passively determine their location with high reliability, without increasing the...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    New Computation Technique for Encryption and Decryption Based on RSA and Elgamal Cryptosystems

    Cryptography addresses the necessary elements for secure communication that involved privacy, confidentiality, key exchange, authentication, and non-repudiation. This paper proposed a new computation of encryption and decryption that was based on the computation of RSA and ElGamal Cryptosystems. The RSA is a Public Key Encryption system that gets its security...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    Comparison of Feature Extractors for Real-Time Object Detection on Android Smartphone

    In this paper, the authors present the analysis of real-time object detection method for embedded system particularly the Android Smartphone. As they all know, object detection algorithm is a complicated algorithm that consumes high performance hardware to execute the algorithm in real time. However due to the development of embedded...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    Research on Mutual Coupling Correction of Array Output Signal by BP Network

    The method of mutual coupling correction of array output signal is studied in the paper. According to array signal processing's feature, array error model is analyzed and array mutual coupling is studied. The method that smart antennas' channel calibration by BP network in wireless communication is proposed, which improves the...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    Channel Coding Simulation Research of Inter-Satellite Spread Spectrum Communication System

    In this paper, the authors consider proposing the mathematical model and simulation mode of inter-satellite channel based on the reliability of inter-satellite communication system. The Monte Carlo method is adopted to develop the spread spectrum communication system of two consumers. In order to reduce the bit errors of inter-satellite communication,...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    A Vertical Handover Trigger Mechanism Based on Gray Prediction

    Cross layer handover schemes are expected to provide seamless services for mobile terminal in the heterogeneous wireless networks. To reduce the handover delay time, link layer must timely trigger handover protocols of layer 3 so that they can finish handover procedures before current wireless link terminates. Because of limited computing...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Analysis and Design of Low-Power Transceiver With Zigbee Sensor Unit

    Power consumption of nodes in a Wireless Sensor Network (WSN) determines the life cycle of the WSN, so it is particularly important to design low-power and high-performance Wireless Sensor Nodes in the network. Based on a simple analysis of the IEEE802.15.4 protocol specifications and comparison among the efficiencies of different...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Research on the Security System Quantitative Risk Assessment Method Based on Exploitation Graph Model and Bayesian Network

    In this paper, the author's topic is based on multi-feature fusion the Mean shift target tracking technology belongs to the field of intelligent video analysis, moving target tracking is interested in moving target location each image in a video sequence to find and acquire the target movement. Moving target tracking...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Coverage Holes Discovery Algorithm for Wireless Sensor Network

    Non-uniform random distribution and exhausted energy of sensor nodes may lead to coverage holes emerged in Wireless Sensor Networks. Aiming at the problems of coverage holes in Wireless Sensor Networks, a geometry-based distributed coverage holes discovery algorithm is proposed in this paper, and it is proved theoretically. The main idea...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    A Method for CQI Feedback Based on Distributed Compressed Sensing in Adaptive Two-Way Relay System

    In two-way relay wireless communication systems, adaptive modulation and scheduling are promising for increasing the system throughput. To achieve this goal, it is necessary to feedback the information of the Channel Quality Indication (CQI). In this paper, the authors introduced a novel method for CQI feedback based on Distributed Compressed...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    An Efficient Certificateless Authenticated Key Agreement

    Key agreement is very important in information and data security. To overcome the key escrow property of identity-based cryptography and combines the advantages of the traditional PKI and the identity-based cryptography, certificateless public key cryptography is proposed. This paper proposed a new certificateless two-party key agreement protocol and gives the...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Design and Implementation of Intelligent Cloud Guide System Based on Android System

    With the improvement of people's quality of life, the number of travelers has been increasing year by year; the form of the traditional tour guide is gradually unable to meet the needs of tourists. The question, that how the authors can provide better and useful guide service for tourists has...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    On the Shortest Recycle Path Algorithm of Wireless Sensor Node

    Along with the spreading application of Wireless Sensor Network, once the node energy is exhausted, it will cause environmental pollution. Therefore, the problem of node recovery becomes increasingly important. The automatic recycling of robot will become one of the feasible methods. The key is how to use less time and...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Analysis and Countermeasures for the Security of Routing Protocol in Perception Layer of IOTS

    The security has always been the eternal topic in the field of Information technology. As a major part of Internet of Things (IoT), the perception layer acts critical roles from cognizing and sensing the ambient world to implement control instructions. So, the security of perception layer is very important. In...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Flexible Sharing in DHT-Based P2P Networks Using Metadata of Resource

    DHT-based P2P systems have the ability to map a resource's identifier to its location, so a resource can be located by the unique identifier of the resource. In such systems users must know the identifier of a resource exactly to find the resource. However, a resource cannot be described accurately...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Design of COMP Act Rectangular Dielectric Resonator Antenna for Wireless Communications

    The world is in constant changing and the demand of small size antennas with wide band and good performances is increasing, which encouraged the researchers to do an intensive work to deign antennas with these characteristics. One technological solution which meets this demand is the Dielectric Resonator Antenna (DRA). Because...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Misbehaving Attack Mitigation Technique for Multicast Security in Mobile Ad Hoc Networks (MANET)

    Node misbehavior problems have received increased attention in multicasting in Mobile Ad-hoc NETworks (MANETs). The misbehaving nodes can be either selfish or malicious nodes. The main goal of the malicious nodes is to intentionally interrupt the network using various attacks. Hence it is essential to develop a mitigation technique against...

    Provided By Journal of Theoretical and Applied Information Technology