Journal of Theoretical and Applied Information Technology

Displaying 1-40 of 698 results

  • White Papers // Jan 2015

    Cyber Security for Cyber Physcial Systems: A Trust-Based Approach

    Cyber-Physical Systems (CPS) consists of a combination of different embedded subsystems, which work independently of each other and also interact with the external environment. Such embedded systems operate in the presence of inherent uncertainty, context dependencies and adversarial certainty arising from both the cyber and physical worlds. Security is one...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2015

    Experimental Evaluation of TCP Congestion Contorl Mechanisms in Short and Long Distance Networks

    Originally TCP was designed for early, low bandwidth, short distance networks, so standard TCP did not utilize the maximum bandwidth in today's high bandwidth network environments. Therefore a lot of TCP congestion control mechanisms also known as TCP variants have been developed for today's long distance high bandwidth networks. In...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2015

    A New Adaptive Throughput Policy Algorithm on Campus IP-Based Network Internet Traffic

    In this paper, the authors present the development of a new scheme called Adaptive Throughput Policy (ATP) algorithm to control internet inbound throughput utilization in an IP-based network by considering traffic flows and their processing times. Real live inbound internet traffics collected from a campus network with Committed Access Rate...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2015

    Energy Efficient Node Disjoint Multipath Routing to Improve Wireless Sensor Network Lifetime

    Some of the major challenges confronting wireless sensor networks are usually associated with scarcity of energy and resource limitations. In order to achieve efficient utilization of energy and increase the operational lifetime of the wireless sensor network while at the same time providing consistent packets delivery, energy efficient node disjoint...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2015

    A Comparative Evaluation of State-of-the-Art Integration Testing Techniques of Component-Based Software

    In the last few years, component-based software has gained widespread notice and acceptance as a method that facilitates the development of existing large, complex, and very critical systems by integrating prefabricated small pieces of software called components. Component integration becomes an essential stage in the component-based software development Lifecycle. Therefore,...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2015

    A Survey and Open Issues of Jammer Localization Techniques in Wireless Sensor Networks

    Jamming sensor attacks localization is a significant area that acquires considerable research interest. This interest is expected to grow further with the prolifiration of wireless sensor network applications due to the physical share environment. Jamming attacks emitting a radio frequency signals by the adversaries and impact the wireless sensor network...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2015

    Automatic Adaptive Reconfigurable FPGA with Reusable Techiniques Using ARM

    In this paper, the authors discuss about reconfigurable system that allow online adaptation, whenever a fault occurs in the system. This is obtained by using FPGA that switches among Configurable Logic Block (CLB) automatically which has same features in an optimal manner. This reduces the time and complexity. Also the...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2015

    Enhancement of AES Algorithm Based on Chaotic Maps and Shift Operation for Image Encryption

    With the rapid development of the Internet and communication networks, the confidentiality of digital images transmitted over public networks must be preserved by using encryption techniques. Advanced Encryption Standard (AES) is one of the most commonly used encryption algorithms at present. Although AES has several advantages, such as security in...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2015

    Security Policies Matching Through Ontologies Alignment to Support Security Experts

    The management of security policies has become increasingly difficult for the security expert given the number of domains to manage their extent and their complexity. A security expert has to deal with a variety of frameworks, with different language specifications, formalization and aspect used in domains that may belong to...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2015

    High Performance Implementation of RSSI Based Wi-Fi Location Tracker for Android Applications

    Wi-Fi-based Positioning System (WPS) is used where GPS is inadequate due to various causes including multipath and signal blockage indoors. Such systems include indoor positioning systems. The advantage of choosing Wi-Fi for a location based service is its high compatibility and frequency of availability. The majority of today's smart phones...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2015

    Does Efficient Fuzzy Kohonen Clustering Network Algorithm Really Improves Clustering Data Result?

    In this paper, the authors Fuzzy Kohonen Clustering Network (FKCN) algorithm is compared to Efficient Fuzzy Kohonen Clustering Network (EFKCN) algorithm. This paper is conducted to see if EFKCN is really efficient and could do a better clustering analysis than original FKCN. They do empirical testing and simulations to compare...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Trust Based Ad Hoc on Demand Distance Vector Routing Protocol Against Wormhole Attack

    Mobile Ad-hoc NETworks (MANETs) consists of mobile devices that communicate with each other without any predefined infrastructure/centralized administration. In network nodes can join or leave a network freely, MANETs are vulnerable to unauthorized data manipulation as it does not verify user identity before ensuring data access. Thus it is challenging...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    An Effective Scheduling of Multiple Source Nodes in MANET Using Dempster-Shafter Hypothesis

    A Mobile Ad-hoc NETwork (MANET) is built without any central control point such as a base station. Partially Observable Markov Decision Process (POMDP) multi-armed bandit problem solved continuous user authentication and Intrusion Detection Systems (IDS) for large network with different nodes. But POMDP did not deal with higher number of...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Application of FEAST (Feature Selection Toolbox) in IDS (Intrusion Detection Systems)

    Security in computer networks has become a critical point for many organizations, but keeping data integrity demands time and large economic investments, in consequence there has been several solution approaches between hardware and software but sometimes these has become inefficient for attacks detection. This paper presents research results obtained implementing...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Ensemble of Clustering Algorithms for Anomaly Intrusion Detection System

    Maximizing detection accuracy and minimizing the false alarm rate are two major challenges in the design of an anomaly Intrusion Detection System (IDS). These challenges can be handled by designing an ensemble classifier for detecting all classes of attacks. This is because, single classifier technique fails to achieve acceptable false...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Node Location Analysis Using RSSI for Automatic Position Reporting System

    In this paper, the authors analyze various connectivity issues encountered when a mobile node identifies an access point with greater signal strength and find a proper node location in the network. Dynamic networks require adaptive policies for optimal performance and guaranteed QoS to support real-time environment. The network connectivity issues...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    A Middleware and Policy-Based Adaptation Framework to Simplify Software Evolution: An Implementation on Unit Trust Enterprise System

    Software evolution needs to be properly controlled to avoid huge problems during maintenance phase. Software needs to evolve to ensure it meets its development purpose. One of promising ways to address the issue of software evolution is via software adaptation. There are 4 main approaches to software adaptation i.e. architecture-based,...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Automated Test Case Generation Using UML Use Case Diagram and Activity Diagram

    Testing plays a major role for improving the quality of a software product. Due to its iterative and incremental nature it needs special attention. Test case generation is one of the complex activities carried out during testing phase. Generating test cases in the early phases of development life cycle works...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Evaluated Reputation-Based Trust for WSN Security

    During the last years, Wireless Sensor Networks (WSNs) and its applications have obtained considerable momentum. However, security and power limits of WSNs are still important matters. Many existing approaches at most concentrate on cryptography to improve data authentication and integrity but this addresses only a part of the security problem...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Error Compensated Fixed Width Modified Booth Multiplier for Multimedia Applications

    Many multimedia and digital signal processing systems are desirable to maintain a fixed format and to allow little accuracy loss to output data. The objective of this paper is to design a fixed width modified booth multiplier with high error performance. And the need to derive an effective error compensation...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Measurement Study on Packet Size and Packet Rate Effects Over Vehicular Ad Hoc Network Performance

    A Vehicular Ad-hoc NETwork (VANET) is a type mobile ad hoc network which is developed to increase physical safety of vehicles' derivers. Many parameters affect the performance of VANET. Packet size and packet rate are two important parameters that need to be considered when using VANET. Different values of these...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Generalized Frequency Division Multiple Access Allocation Scheme for LTE-A

    Frequency Division Multiple Access (FDMA) is one of the important features of Long Term Evolution Advanced (LTE-A). For LTE-A downlink, Orthogonal FDMA (OFDMA) scheme is used to provide frequency orthogonality. Whereas, for uplink, Signal Carrier FDAM (SC-FDMA) is preferred since it provides improved PAPR performance over OFDMA. Interleaved FDMA (IFDMA)...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Current State of Anti-Phishing Approaches and Revealing Competencies

    Phishing has become a substantial threat for internet users and a major cause of financial losses. In these attacks the cybercriminals carry out user credential information and users can fall victim. The current solution against phishing attacks are not sufficient to detect and work against novel phishes. This paper presents...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Automatic Classification of Audio Data Using Gradient Descent Neural Network Based Algorithm

    Audio mining is a technique by which the core of an audio signal can be automatically searched and analyzed. This paper addresses feature extraction from audio and audio similarity measures and proposes an algorithm to mine any type of audio data. This Hybrid Algorithm for Audio Mining (HAAM) consists of...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    A Review of Ant Colony Optimization Routing Protocols for Wireless Multimedia Sensor Network

    Multimedia applications have become an essential part of the people daily lives, and their use is flourishing day-by-day. The area of wireless sensor network is not an exception where the multimedia sensors are attracting the attention of the researchers increasingly, and has shifted the focus from traditional scalar sensors to...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Design of Privacy Model for Storing Files on Cloud Storage

    Cloud storages like Google drive, Dropbox are popular for personal and institutional file storage. Cloud storage is beneficial in terms of scalability, availability and economy. But cloud storage has privacy challenges due to which many users are reluctant to use it for personal data storage. Storage of personal or sensitive...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Design and Development of Zigbee Based Wireless Remote Controlling and Data Acquisition Device Through Internet

    IrDa and Bluetooth have been used widely in many wireless monitoring and controlling devices. Although, these devices have been replaced the traditional wired systems and contribute in solving the high cost of such systems, there are drawbacks been emerged. The major disadvantages are the range limitation of Bluetooth module and...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Three Layers Approach for Network Scanning Detection

    Computer networks became one of the most important dimensions in any organization. This importance is due to the connectivity benefits that can be given by networks, such as computing power, data sharing and enhanced performance. However using networks comes with a cost, there are some threats and issues that need...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Impact of Software Risk Management on Analysis Modeling in Life Cycle of Web Application Development

    Various branches of engineering use models effectively to reduce complexity, document analysis steps and facilitate communication within the development team. And this applies to software engineering and web engineering. Modeling aims to provide detailed sufficient descriptions to accomplish the system the user want to build, modeling easily produces patterns represent...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    A New Methodology of Three Way Distribution Process of Improved PSO Algorithm Using Mobile Sink Nodes

    In a recent trend, Mobile Sink (MS) is a major part of Wireless Sensor Network (WSN) for distributing, scalable network of communicating with localized environment. Improved Particle Swarm Optimization algorithm (IPSO) has been used to find the exact location of three way processes such as sink, distribution of frequency and...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Mobile Security: Security Mechanisms and Protection of Mobile Applications

    In this paper, the authors propose security policies and mechanisms for mobile phones that better meet the expectations of users, either at the level of mobile networks, or mobile applications. At the mobile networks level: the paper focuses on limiting the spread of malware via SMS/MMS and emails. It describes...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Internal Threat Control Framework Based on Information Security Management System

    In this paper, the authors focus on proposing a framework for security control that based on ISO 27001 and ISO 27002, which is a standard of Information Security Management System (ISMS). This framework helps to mitigate internal threats for data centre meant for public sector adoption. The ISMS implementation scope...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Multi-Agent Security Architecture for a Sharia Compliant E-Auction

    Electronic auction has introduced new processes in the way auction is conducted which require investigation to ensure compliancy to Sharia (Islamic principles that are based on Qur'an and Sunnah) rules. The use of mobile software agent in electronic auction marketplaces adds ubiquity power to the bidders. In particular it allows...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    An Efficient Super Peer Selection Algorithm for Peer-to-Peer (P2P) Live Streaming Network

    Peer-To-Peer (P2P) computing is the fast emergent overlay network distribution system, the main gains of P2P is each peer in the network can act autonomous. Super peer network representation is an advancing design of centralized topology embedded in a decentralized system in the Peer-To-Peer (P2P) system. Super peer overlay helps...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Performance Evaluation of TCP Congestion Control Algorithms Throughput for CVE Based on Cloud Computing Model

    Collaborative Virtual Environment (CVE) is becoming popular in the last few years; this is because CVE is designed to allow geographically distributed users to work together over the network. Currently, in the development of CVE systems, client server architectures with multiple servers are used with TCP as update transmitting transport...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    A Novel Data Mining Method for Malware Detection

    Losses caused by malware are irrecoverable. Detection of malicious activity is the most challenge in the security of computing systems because current virulent executable are using sophisticated polymorphism and metamorphism techniques. It make difficult for analyzers to investigate their code statically. In this paper, the authors present a data mining...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Cooperative Intrusion Detection System Framework Using Mobile Agents for Cloud Computing

    Cloud computing improves collaboration, flexibility, scaling, and availability, and provides the potential for cost reduction through optimized and efficient computing. Cloud computing allows the use of a collection of services, applications, information, and infrastructure composed of group of compute, network, information, and storage resources. In brief, the cloud computing is...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    A Perspective of Automated Programming Error Feedback Approaches in Problem Solving Exercises

    Programming tools are meant for student to practice programming. Automated programming error feedback will be provided for students to self-construct the knowledge through their own experience. This paper has clustered current approaches in providing automated error programming feedback to the students during problem solving exercises. These include additional syntax error...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    A New Static Resource and Bandwidth Utilization Approach Using WiMAX 802.16e Fractional Frequency Reuse Base Station

    In this paper, the authors propose a new Static Resource Assignment (SRA) approach to enhance resource and bandwidth utilization in traditional Fractional Frequency Reuse (FFR) WiMAX Base Station (BS) which widely used in cellular network deployment to overcome the inter-cell interference. The new SRA FFR efficiently tackled the wastage of...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Energy Realization Fisheye State Routing Algorithm for Mobile Adhoc Networks

    Energy consumption is prominent and critical issue faced by mobile ad-hoc network. Maximum energy is consumed when the data is send from one node to another node. Therefore energy efficient routing mechanisms are required. In this paper, a routing scheme based on the fisheye state routing with two groups of...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Oct 2009

    A Novel Information Hiding Technique for Security by Using Image Steganography

    This paper a novel method is proposed to provide more security for the key information with the combination of image compression and data encryption method. This method requires less memory space and fast transmission rate because of image compression technique is applied. Steganography plays an important role in information security....

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Aug 2009

    A Novel Protocol for Indirect Authentication in Mobile Networks Based on Elliptic Curve Cryptography

    Unlimited mobility free of any fundamental communications is presented by Mobile Networks. In such networks, the information access between unacquainted nodes and server is a usual thing that happens frequently. This creates more chance to take the advantage of accessing information illegally by any invalid user node. The threat of...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2009

    A Novel Approach for an Accurate Human Identification Through Iris Recognition Using Bitplane Slicing and Normalisation

    Unlike other biometrics such as fingerprints and face, the distinct aspect of iris comes from randomly distributed features. This leads to its high reliability for personal identification and at the same time, the difficulty in effectively representing such details in an image. Iris recognition illustrates work in computer vision, pattern...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2009

    Application of Tabu Search Algorithm to Security Constrained Economic Dispatch

    This paper presents an algorithm for solving Security Constrained Economic Dispatch (SCED) problem through the application of Tabu Search (TS). The SCED problem is formulated with base case and contingency case line flow constraints, which are important for practical implementation. Two representative systems namely 66-bus and 191-bus Indian utility systems...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jul 2009

    A New Secure Design for Mobile Communication

    Mobile handheld device is a popular device that provides secure, private, authentic, and accurate communication and exchange of confidential information. This paper proposes a technique to solve the authenticity problem in mobile communication. This technique is mainly based on the usage of the Fingerprint to identify both the speaker and...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Sep 2009

    A Way Forward to Improving Functionalities of Open Database System

    The increasing need for information dissemination and the tremendous population growth in today's organizations calls for the need to migrate most application and their associated data to the network where several millions of people can access concurrently. Several challenges such as security risk and management/maintenance of the database have been...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Oct 2009

    Pattern Recognition Algorithms for Ear Biometrics

    This paper presents geometrical Parameter algorithms for ear Biometrics by representing the Ear image as contours, feature extraction and recognition. The proposed algorithms were developed for ear biometrics, but they can be applied in other contour image processing applications. Firstly it presents mathematical and algorithmic foundations of geometrical feature extraction...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2010

    Robust TCP: An Improvement on TCP Protocol

    The Transmission Control Protocol (TCP) is the most popular transport layer protocol for the internet. Congestion Control is used to increase the congestion window size if there is additional bandwidth on the network, and decrease the congestion window size when there is congestion. This paper uses a classic TCP which...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2009

    Design & Simulation of Optical Fiber Bragg Grating Pressure Sensor for Minimum Attenuation Criteria

    This paper presents the design & simulation of an Optical Fiber Bragg Grating (OFBG) sensor for stress, strain measurement and also demonstrates the methodology to arrive at the optimal grating pitch dimensions for a given interrogating wavelength. The wavelength chosen for interrogation of the Fiber Bragg Grating (FBG) sensor is...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2010

    An Efficient Architecture for Agent-Based Dynamic Web Service Discovery With QoS

    The SOA enables the development of flexible large scale-applications in open environments by dynamically combining the web services. There exist many web services which exhibit similar functional characteristics. It is imperative to provide service consumers with facilities for selecting required web services according to their non-functional characteristics or QoS. An...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Oct 2009

    Matching Model for Semantic Web Services Discovery

    The Semantics-based Web Service Matching Model is proposed in this paper to improve the performance of Web Service discovery. Semantics-based Web Service Matching is a two-phase method including semantic similarity matching and qualitative filtering. Function-based semantic similarity matching used of matching algorithm in order to finding the most proper services....

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2010

    SMS Advertising and Its Prospects in Bangladesh

    Application of SMS advertising for enhancing communication with the consumers has drawn significant attention of the contemporary researchers. This study examines whether SMS advertising can be an effective medium of advertising in Bangladesh. The key ingredient of this research is the perception of consumers regarding the adoption SMS advertising. Qualitative...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2010

    A Study on Cellular CDMA-Based for New Generation Mobile Radio System

    As the networks improve and new demands for rapid data transfer rates and multimedia services grow, operators are seeking new cellular communication solutions based on technologies like GSM, 3GSM and CDMA2000 to cater to these requirements. The paper points out that the increasing popularity of the GSM equipments globally is...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2010

    SINR Based Vertical Handoff Algorithm Between GPRS and WiMAX Networks

    Next generation wireless network is foreseen as the combination of heterogeneous wireless networks capable of providing enhanced services to mobile users. Vertical handoff is a crucial issue in providing service to mobile users, in a heterogeneous network. To maintain continuous service during vertical handoff period, the handoff procedure should consider...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2010

    Security Issues in Wireless Sensor Network Data Gathering Protocols: A Survey

    Wireless sensor networks are usually deployed for gathering data from unattended or hostile environment. Several application specific sensor network data gathering protocols have been proposed in research literatures. However, most of the proposed algorithms have given little attention to the related security issues. In this paper the authors have explored...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Oct 2010

    A Study of Security Challenges in Wireless Sensor Networks

    Wireless Sensor Networks (WSN) is a recent advanced technology of computer networks and electronics. The WSN increasingly becoming more practicable solution to many challenging applications. The sensor networks depend upon the sensed data, which may depend upon the application. One of the major applications of the sensor networks is in...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2010

    A Novel Distributed Protocol for Randomly Deployed Clustered Based Wireless Sensor Network:

    Grouping sensor nodes into cluster has been popularly used in order to achieve the network scalability. Every cluster needs a leader, and referred as the cluster-head. Many clustering Schemes for Wireless sensor Networks focus on the stable clustering techniques for mobile environments. In this paper, the authors have proposed a...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2009

    The Role of Zigbee Technology in Future Data Communication System

    ZigBee is an IEEE 802.15.4 standard for data communications with business and consumer devices. It is designed around low-power consumption allowing batteries to essentially last forever. The ZigBee standard provides network, security, and application support services operating on top of the IEEE 802.15.4 Medium Access Control (MAC) and Physical Layer...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Sep 2010

    Semantic Web And Economic And Financial Information Management

    The field of economy and finance is a conceptually rich domain where information is complex, huge in volume and a highly valuable business product by itself. Novel management techniques are required for economic and financial information in order to enable an effective generation, gathering, integration, management and consumption of complex...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Sep 2011

    Survey on Survival Approaches in Wireless Network Against Jamming Attack

    Wireless networks are more depicted to intentional or unintentional threats than their wired based equivalent networks. Major reason being the wireless medium which can be listened and interfered by non-participants, in an on-going valid communication. In the absence of a collision detection mechanism and relying mainly on cooperation of each...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Oct 2009

    User Assisted Keyword Search on RSS Syhthesizer for Relevant Weblogs

    Information transfers through web has plays a significant role in the utilization of its resources. The major parts that involve in information transfer recently are through sharing and publishing weblogs. Weblogs that normally published in chronological order by bloggers mostly attracts the frequent returned blogs readers unless it is shared...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Oct 2011

    Performance Evaluation of a Cloud Based Load Balancer Severing Pareto Traffic

    Cloud resources represent an unforeseeable breakthrough in ITC industry. Load balancer is a key element in resource provisioning for high available cloud solutions, and yet its performance depends on the traffic offered load. The authors develop a discrete event simulation to evaluate the performance with respect to the different load...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Oct 2011

    A Novel Embedding Scheme Based on Walsh Hadamard Transform

    The purpose of steganography is to send secret message by embedding data into some innocuous cover objects such as digital images. The data hiding method used until now is the syndrome coding method. In this paper, the authors present an improved data hiding scheme defined by Boolean functions. Using some...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Oct 2011

    Evaluatin of QoS Parameters on TCP/IP in Wireless Ad Hoc Networks

    Wireless ad hoc network is a collection of mobile nodes interconnected by multi-hop communication paths forming a temporary network without the aid of any centralized administration or standard support services regularly available as in conventional networks. The topology of the network changes dynamically as mobile nodes join or depart the...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Design and Implementation of Intelligent Cloud Guide System Based on Android System

    With the improvement of people's quality of life, the number of travelers has been increasing year by year; the form of the traditional tour guide is gradually unable to meet the needs of tourists. The question, that how the authors can provide better and useful guide service for tourists has...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    On the Shortest Recycle Path Algorithm of Wireless Sensor Node

    Along with the spreading application of Wireless Sensor Network, once the node energy is exhausted, it will cause environmental pollution. Therefore, the problem of node recovery becomes increasingly important. The automatic recycling of robot will become one of the feasible methods. The key is how to use less time and...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Analysis and Countermeasures for the Security of Routing Protocol in Perception Layer of IOTS

    The security has always been the eternal topic in the field of Information technology. As a major part of Internet of Things (IoT), the perception layer acts critical roles from cognizing and sensing the ambient world to implement control instructions. So, the security of perception layer is very important. In...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Flexible Sharing in DHT-Based P2P Networks Using Metadata of Resource

    DHT-based P2P systems have the ability to map a resource's identifier to its location, so a resource can be located by the unique identifier of the resource. In such systems users must know the identifier of a resource exactly to find the resource. However, a resource cannot be described accurately...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Design of COMP Act Rectangular Dielectric Resonator Antenna for Wireless Communications

    The world is in constant changing and the demand of small size antennas with wide band and good performances is increasing, which encouraged the researchers to do an intensive work to deign antennas with these characteristics. One technological solution which meets this demand is the Dielectric Resonator Antenna (DRA). Because...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Misbehaving Attack Mitigation Technique for Multicast Security in Mobile Ad Hoc Networks (MANET)

    Node misbehavior problems have received increased attention in multicasting in Mobile Ad-hoc NETworks (MANETs). The misbehaving nodes can be either selfish or malicious nodes. The main goal of the malicious nodes is to intentionally interrupt the network using various attacks. Hence it is essential to develop a mitigation technique against...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    A Human-Oriented Virus Propagation Model in Email Networks

    The users' world is currently threatened by digital viruses, such as email viruses and mobile viruses. These viruses are mainly activated by users' operations. Therefore, it's important for users to understand the pattern of user's operational behaviors and estimate the effect of such behaviors on virus propagation. This paper first...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Discrete Markov Chain Model for Reputation Estimation of Unstructure P2P Network

    Building trust relationships between peers is an important and difficult part in the security needs of P2P network without a central server. P2P reputation system has been introduced which collects locally generated peer feedbacks and aggregates them to yield global reputation scores. Most P2P applications on the Internet are unstructured,...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    A New Node Self-Localization Algorithm for Wireless Sensor Network Used in the Borehole

    Determining the physical location of sensor nodes is the most basic requirement in most Wireless Sensor Networks (WSN) application. Wireless Sensor Network nodes' self-localization techniques are discussed and studied in this paper. At first, the organization structure of Wireless Sensor Network, the classify of node location algorithmic and node location...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    DV-HOP Localization Algorithm Improvement of Wireless Sensor Network

    The gain of SVC depends upon the type of reactive power load for optimum performance. As the load and input wind power conditions are variable, the gain setting of SVC needs to be adjusted or tuned. In this paper, an ANN based approach has been used to tune the gain...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Resource Scheduling Algorithm Based on Multi-Target Balance in Enterprise Gloud Storage System

    Resource request task is limited by scheduling length, time span, load balancing, Quality of Service, economic principles, safety performance and other factors in the Enterprise Gloud Storage system, it is difficult to characterize it with specific features. This paper analyzed the storage model, designed a compromised task scheduling algorithm based...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Cost: A Service-Oriented Simulation Architecture

    Community of Simulation Task (CoST) is a simulation architecture based on a service-oriented architecture to achieve seamless integration and interoperability of command information system. It servitize the simulation resources through combination the simulation service and completes CoST by management and coordinated simulation resources. Firstly, this paper introduced in the CoST...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Addressing Security and Privacy Issues in Cloud Computing

    Cloud computing offers a new way to deliver services while significantly changing the cost structure underlying those services. This new technical and pricing opportunities change in the way the business operate. It combines the features of traditional computing technology like grid, parallel and distributed computing and so on. The aim...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Application of Multi-Objective Weighing Work Scheduling Algorithm Into Storage Network

    The resource request task of transmission of large number of servers, wide-band resources in the enterprise storage gridding, the business distribution and download service are limited by scheduling length, time span, load balance, service quality, economic principles, security performance and many other factors, so it is difficult to use definite...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Simulation Service Management Bus in Service Oriented Run-Time Infrastructure

    As the SOA (Service-Oriented Architecture) is paid close attention by many researchers in recent years. It is a component model which can be defined as service according to business needs and can be taken as reusable shared resource. In this paper, Simulation Service Management Bus (SSMB) is proposed to intergrade...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Application of Wildpackets on Protocol Characteristics Analysis of P2P

    WildPackets is the leading provider of network, application performance, and protocol analysis, VoIP monitoring, and troubleshooting solutions. The key of P2P traffic management is constantly updated P2P protocol characteristics library of network traffic management device. In this paper, the authors analyze the determinants of P2P protocol characteristics, the characteristics change...

    Provided By Journal of Theoretical and Applied Information Technology