Journal of Theoretical and Applied Information Technology

Displaying 1-40 of 652 results

  • White Papers // Dec 2014

    Application of FEAST (Feature Selection Toolbox) in IDS (Intrusion Detection Systems)

    Security in computer networks has become a critical point for many organizations, but keeping data integrity demands time and large economic investments, in consequence there has been several solution approaches between hardware and software but sometimes these has become inefficient for attacks detection. This paper presents research results obtained implementing...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    An Effective Scheduling of Multiple Source Nodes in MANET Using Dempster-Shafter Hypothesis

    A Mobile Ad-hoc NETwork (MANET) is built without any central control point such as a base station. Partially Observable Markov Decision Process (POMDP) multi-armed bandit problem solved continuous user authentication and Intrusion Detection Systems (IDS) for large network with different nodes. But POMDP did not deal with higher number of...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Trust Based Ad Hoc on Demand Distance Vector Routing Protocol Against Wormhole Attack

    Mobile Ad-hoc NETworks (MANETs) consists of mobile devices that communicate with each other without any predefined infrastructure/centralized administration. In network nodes can join or leave a network freely, MANETs are vulnerable to unauthorized data manipulation as it does not verify user identity before ensuring data access. Thus it is challenging...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Evaluated Reputation-Based Trust for WSN Security

    During the last years, Wireless Sensor Networks (WSNs) and its applications have obtained considerable momentum. However, security and power limits of WSNs are still important matters. Many existing approaches at most concentrate on cryptography to improve data authentication and integrity but this addresses only a part of the security problem...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Automated Test Case Generation Using UML Use Case Diagram and Activity Diagram

    Testing plays a major role for improving the quality of a software product. Due to its iterative and incremental nature it needs special attention. Test case generation is one of the complex activities carried out during testing phase. Generating test cases in the early phases of development life cycle works...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    A Middleware and Policy-Based Adaptation Framework to Simplify Software Evolution: An Implementation on Unit Trust Enterprise System

    Software evolution needs to be properly controlled to avoid huge problems during maintenance phase. Software needs to evolve to ensure it meets its development purpose. One of promising ways to address the issue of software evolution is via software adaptation. There are 4 main approaches to software adaptation i.e. architecture-based,...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Node Location Analysis Using RSSI for Automatic Position Reporting System

    In this paper, the authors analyze various connectivity issues encountered when a mobile node identifies an access point with greater signal strength and find a proper node location in the network. Dynamic networks require adaptive policies for optimal performance and guaranteed QoS to support real-time environment. The network connectivity issues...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Current State of Anti-Phishing Approaches and Revealing Competencies

    Phishing has become a substantial threat for internet users and a major cause of financial losses. In these attacks the cybercriminals carry out user credential information and users can fall victim. The current solution against phishing attacks are not sufficient to detect and work against novel phishes. This paper presents...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Generalized Frequency Division Multiple Access Allocation Scheme for LTE-A

    Frequency Division Multiple Access (FDMA) is one of the important features of Long Term Evolution Advanced (LTE-A). For LTE-A downlink, Orthogonal FDMA (OFDMA) scheme is used to provide frequency orthogonality. Whereas, for uplink, Signal Carrier FDAM (SC-FDMA) is preferred since it provides improved PAPR performance over OFDMA. Interleaved FDMA (IFDMA)...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Measurement Study on Packet Size and Packet Rate Effects Over Vehicular Ad Hoc Network Performance

    A Vehicular Ad-hoc NETwork (VANET) is a type mobile ad hoc network which is developed to increase physical safety of vehicles' derivers. Many parameters affect the performance of VANET. Packet size and packet rate are two important parameters that need to be considered when using VANET. Different values of these...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Error Compensated Fixed Width Modified Booth Multiplier for Multimedia Applications

    Many multimedia and digital signal processing systems are desirable to maintain a fixed format and to allow little accuracy loss to output data. The objective of this paper is to design a fixed width modified booth multiplier with high error performance. And the need to derive an effective error compensation...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Ensemble of Clustering Algorithms for Anomaly Intrusion Detection System

    Maximizing detection accuracy and minimizing the false alarm rate are two major challenges in the design of an anomaly Intrusion Detection System (IDS). These challenges can be handled by designing an ensemble classifier for detecting all classes of attacks. This is because, single classifier technique fails to achieve acceptable false...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Mobile Security: Security Mechanisms and Protection of Mobile Applications

    In this paper, the authors propose security policies and mechanisms for mobile phones that better meet the expectations of users, either at the level of mobile networks, or mobile applications. At the mobile networks level: the paper focuses on limiting the spread of malware via SMS/MMS and emails. It describes...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Internal Threat Control Framework Based on Information Security Management System

    In this paper, the authors focus on proposing a framework for security control that based on ISO 27001 and ISO 27002, which is a standard of Information Security Management System (ISMS). This framework helps to mitigate internal threats for data centre meant for public sector adoption. The ISMS implementation scope...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Multi-Agent Security Architecture for a Sharia Compliant E-Auction

    Electronic auction has introduced new processes in the way auction is conducted which require investigation to ensure compliancy to Sharia (Islamic principles that are based on Qur'an and Sunnah) rules. The use of mobile software agent in electronic auction marketplaces adds ubiquity power to the bidders. In particular it allows...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Three Layers Approach for Network Scanning Detection

    Computer networks became one of the most important dimensions in any organization. This importance is due to the connectivity benefits that can be given by networks, such as computing power, data sharing and enhanced performance. However using networks comes with a cost, there are some threats and issues that need...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Impact of Software Risk Management on Analysis Modeling in Life Cycle of Web Application Development

    Various branches of engineering use models effectively to reduce complexity, document analysis steps and facilitate communication within the development team. And this applies to software engineering and web engineering. Modeling aims to provide detailed sufficient descriptions to accomplish the system the user want to build, modeling easily produces patterns represent...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    A New Methodology of Three Way Distribution Process of Improved PSO Algorithm Using Mobile Sink Nodes

    In a recent trend, Mobile Sink (MS) is a major part of Wireless Sensor Network (WSN) for distributing, scalable network of communicating with localized environment. Improved Particle Swarm Optimization algorithm (IPSO) has been used to find the exact location of three way processes such as sink, distribution of frequency and...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Design and Development of Zigbee Based Wireless Remote Controlling and Data Acquisition Device Through Internet

    IrDa and Bluetooth have been used widely in many wireless monitoring and controlling devices. Although, these devices have been replaced the traditional wired systems and contribute in solving the high cost of such systems, there are drawbacks been emerged. The major disadvantages are the range limitation of Bluetooth module and...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Design of Privacy Model for Storing Files on Cloud Storage

    Cloud storages like Google drive, Dropbox are popular for personal and institutional file storage. Cloud storage is beneficial in terms of scalability, availability and economy. But cloud storage has privacy challenges due to which many users are reluctant to use it for personal data storage. Storage of personal or sensitive...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    A Review of Ant Colony Optimization Routing Protocols for Wireless Multimedia Sensor Network

    Multimedia applications have become an essential part of the people daily lives, and their use is flourishing day-by-day. The area of wireless sensor network is not an exception where the multimedia sensors are attracting the attention of the researchers increasingly, and has shifted the focus from traditional scalar sensors to...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    A Perspective of Automated Programming Error Feedback Approaches in Problem Solving Exercises

    Programming tools are meant for student to practice programming. Automated programming error feedback will be provided for students to self-construct the knowledge through their own experience. This paper has clustered current approaches in providing automated error programming feedback to the students during problem solving exercises. These include additional syntax error...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    A New Static Resource and Bandwidth Utilization Approach Using WiMAX 802.16e Fractional Frequency Reuse Base Station

    In this paper, the authors propose a new Static Resource Assignment (SRA) approach to enhance resource and bandwidth utilization in traditional Fractional Frequency Reuse (FFR) WiMAX Base Station (BS) which widely used in cellular network deployment to overcome the inter-cell interference. The new SRA FFR efficiently tackled the wastage of...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    An Efficient Super Peer Selection Algorithm for Peer-to-Peer (P2P) Live Streaming Network

    Peer-To-Peer (P2P) computing is the fast emergent overlay network distribution system, the main gains of P2P is each peer in the network can act autonomous. Super peer network representation is an advancing design of centralized topology embedded in a decentralized system in the Peer-To-Peer (P2P) system. Super peer overlay helps...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Performance Evaluation of TCP Congestion Control Algorithms Throughput for CVE Based on Cloud Computing Model

    Collaborative Virtual Environment (CVE) is becoming popular in the last few years; this is because CVE is designed to allow geographically distributed users to work together over the network. Currently, in the development of CVE systems, client server architectures with multiple servers are used with TCP as update transmitting transport...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    A Novel Data Mining Method for Malware Detection

    Losses caused by malware are irrecoverable. Detection of malicious activity is the most challenge in the security of computing systems because current virulent executable are using sophisticated polymorphism and metamorphism techniques. It make difficult for analyzers to investigate their code statically. In this paper, the authors present a data mining...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Cooperative Intrusion Detection System Framework Using Mobile Agents for Cloud Computing

    Cloud computing improves collaboration, flexibility, scaling, and availability, and provides the potential for cost reduction through optimized and efficient computing. Cloud computing allows the use of a collection of services, applications, information, and infrastructure composed of group of compute, network, information, and storage resources. In brief, the cloud computing is...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2014

    Energy Realization Fisheye State Routing Algorithm for Mobile Adhoc Networks

    Energy consumption is prominent and critical issue faced by mobile ad-hoc network. Maximum energy is consumed when the data is send from one node to another node. Therefore energy efficient routing mechanisms are required. In this paper, a routing scheme based on the fisheye state routing with two groups of...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Nov 2014

    Enhanced Security Framework for Authentication and Integrity (ESFAI) in CDMA Networks

    Universal Mobile Telecommunications System (UMTS) is the third generation mobile communications system. It was built on the concepts of GSM and it is the starting point in the development of the fourth generation network. This paper proposes enhancements for the initial identification and for the Authentication and Key Agreement (AKA)...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Nov 2014

    Fuzzy Logic Controller Plus Proportional Integral Controller Based Load Frequency Control of Hybrid Genrator Network

    In this paper, the authors explain about the design of Fuzzy Logic Controller plus Proportional Integral (FLC plus PI controller) based Load Frequency Control (LFC) for Hybrid Generator Network (HGN), which is the combination of the diesel generator and the solar PV panels. The different variations are considered as a...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Nov 2014

    Hybrid Optimized List Scheduling and Trust Based Resource Selection in Cloud Computing

    Cloud computing is computing service delivery over the Internet. Cloud services allow people and businesses to use software/hardware managed by third parties in remote locations. Cloud computing ensures access to information and computer resources from wherever a network connection is available. Task scheduling is fundamental to achieving cloud computing efficiency....

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Nov 2014

    An Efficient Trace Orient Cluster Head Selection for Adaptive Cluster Based Routing in MANET's

    To minimize the overheads of routing and to reduce energy loss on mobile nodes, various routing strategies has been adapted in literature for MANET. Most of the methods, suffers with cluster head selection problem and which generates energy holes in the co-operative routing. To overcome the problem of energy holes...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Nov 2014

    CDMA Based Secure Cross Layer Framework for Authentication and Scheduling in MANET

    In MANET, mobile nodes are connected without any centralized administration. Due to that, a mobile node is easily affected by means of several attacks. Due to these attacks, network is totally partitioned and more packet congestion occurs. Because of improper scheduling, congestion level of network will get increase unlimitedly. To...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Nov 2014

    An Efficient Delay Aware Routing Protocol for Real Time Systems in Wireless Sensor Network

    Many of Applications have got much attraction of Wireless Sensor Networks (WSNs) due to its multi features with low cost and are getting more and more advancements. Usually in WSN, nodes are deployed in a region to sense the events and send the sensed data towards the sink(s) or a...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Nov 2014

    Construction of a Novel Online Data Warehouse Architecture Using Storage Area Network with Fibre Channel Fabric

    The major issues of data warehouse architecture are higher cost, lower performance and limited access. The reasons for these problems focus the architectural design. The solutions are proposed with the new modified data warehouse design say online data warehouse architecture with the recent technological support from cloud computing say storage...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Nov 2014

    Randomness Test of Cryptographic One-to-Many Reversible Mapping for IPv6 Address Generation

    In this paper, the authors present simulation results on randomness test of a cryptographic one-to-many reversible mapping between user space and the IPv6 address space. A one-to-many reversible mapping mechanism is developed which may be embedded into a DHCPv6 (Dynamic Host Configuration Protocol for IPv6) server in the stateful mode...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Nov 2014

    QoS Based Hybrid Swarm Intelligent Intrusion Detection System for Network Security

    Intrusion Detection System (IDS) plays a vital role in system security which operates data in real time that may leads to dimensionality problem. As the number and size of the network and internet traffic increase and the need for the intrusion detection grows in step to reduce the overhead required...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Nov 2014

    Impact of Node Movement Using DYMO Protocolin Different Landscape Title

    MANET is an anthology of mobile nodes with moving sense and can communicate to each other with wireless links without any infrastructure or centralized administration. MANET has to face many challenges in various aspects; one of the further most challenges is terrain size and node placement. In this paper, some...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Nov 2014

    Design of Efficient Caching Algorithms for Peer to Peer Networks to Reduce Traffic in Internet

    Peer-To-Peer (P2P) file sharing systems generate a major portion of the Internet traffic, and this portion is expected to increase in the future. The authors explore the potential of deploying proxy caches in different autonomous systems with the goal of reducing the cost incurred by Internet service providers and alleviating...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Nov 2014

    Determining Software Maintainability of Java Interfaces Using Quantitative Approach

    Software maintainability is one important aspect in the evolution of a software product. Several coupling measures have been introduced to identify and measure the design complexity of an Object Oriented (OO) systems. The coupling metrics proposed in this paper, recognizes the complexity between inheritance and interface programming. This paper presents...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    A Network Management System for Epon Based on SNMP

    Now, the PON technologies become the preferred broadband access technology all over the world. In this paper, a network management system is designed for EPON. In Manager and Agent, the "Simple and Shortcut" protocol SNMP is adopted to develop the application program. As the Agent runs on the embedded system,...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    Honeypot Based Intrusion Management System: From a Passive Architecture to an IPS System

    In this paper, the authors are presenting an Intrusion Prevention System (IPS) based on multiple sensors in the network. These sensors are in fact honeypots built using honeyd. Honeyd is a high level honeypot which is very light and which is offering a lot of possibilities to get the most...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    Energy Efficient Distributed Image Compression Using JPEG2000 in Wireless Sensor Networks (WSNS)

    Restricted computational power, memory limitations, narrow bandwidth and energy supplied present strong limits in sensor nodes are the important points should be considered during the real time transmission of data using Wireless Sensor Networks. Therefore, maximizing network lifetime and minimizing energy consumption are always optimization goals. To reduce the energy...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Modeling to Compiling: Design and Implementation for Wireless Sensor Network System

    Based on the characteristics of the Wireless Sensor Network (WSN), researchers tend to ignore the system modeling of the complex system which is built by WSN and the central processor. Actually, the complex modeling method and code generation tool will cause a lot of manpower and time costs. Different from...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Optimal Approximate Algorithm to Solve Location-Selection of Recycle Water Station Problem

    The minimum Steiner tree problem has wide application background, such as transportation system, communication network, pipeline design and VISL, etc. It is unfortunately that the computational complexity of the problem is NP-hard. People are common to find some special problems to consider or find the approximate algorithm to solve different...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    A Secure Scheme for Heterogeneous Wireless Sensor Networks

    A secure scheme for heterogeneous Wireless Sensor Networks is presented. The Wireless Sensor Networks have some sensor nodes and heterogeneous sensor nodes that have greater power and transmission capability than other nodes have. All kinds of sensor nodes are evenly distributed respectively in entire sensing area that is divided into...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    A Safe RFID Authentication Protocol for Internet of Things

    Internet of Things (IoT) is the evolution of related technologies and applications such as Internet and mobile networks. Future research into IoT will focus on generic technology, information security, and critical applications. Based on IoT, the existing RFID system security mechanisms are analyzed, with a focus on cryptographic protocols. Investigate...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Algorithm Design of Secure Data Message Transmission Based on Openssl and VPN

    In order to solve the safety problem that remote or mobile users can perform secure data transmission among different computers via enterprise internal network, conventional approach is to establish VPN connection. The transmitted data via VPN network must be encrypted so as to ensure that illegal users are unable to...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Conceptual Model of Multi-Agent Business Collaboration Based on Cloud Workflow

    With the development of information and network technology, more and more enterprises adopt the networked manufacturing mode to improve their production, service, and operations. However, the current networked manufacturing mode cannot put the centralized resources into distributed services, which leads to a lower inter-enterprise business collaboration capability. This paper firstly...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    K-Means Method for Grouping in Hybrid Mapreduce Clusters

    In hybrid cloud computing era, hybrid clusters which are consisted of virtual machines and physical machines become more and more popular. MapReduce is a good weapon in this big data era where social computing and multimedia computing are emerging. One of the biggest challenges in hybrid mapreduce cluster is I/O...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Research on Resource Scheduling Algorithm Based on Fuzzy Clustering and Smart Agents in Cloud Computing

    Cloud computing has been a hot spot in recent years. In complex and dynamically changing cloud computing environment, resource management and scheduling is a hard and challenging problem, and should be solved at first. This paper presents an effective resource management model and the corresponding resource scheduling algorithm is based...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Modeling and Micro Scale Analyzing of Micro-Switch Applied in All-Optical Communication

    Inductive micro-switch is an integrative device of a sensor and actuator and widely applied in all-optical-network communication. Its malfunctions related to "Fail-to-closure" and "Transient-closure" result in low reliability and weak anti-jamming capability. A new bistable inductive micro-switch is presented based on Micro Electro-Mechanical System (MEMS) technology. A sine rough surface...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    SER-Minimization Relay Selection for Two-Way Relay Channels With Physical Layer Network Coding

    In this paper, the authors explore the relay selection scheme for two-way relay channels with Physical layer Network Coding (PNC), where two end nodes exchange information via a selected relay node with the minimal Symbol Error Rate (SER) performance among multiple candidate relay nodes. To reduce the computational complexity, they...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Hidden Hops Aware Load Balancing Based on Greedy Approach

    Virtual network mapping is one of the main problems in network virtualization. At present, virtual networking mapping aims at minimal resource consumption at substrate network, but ignores the resource demanded by the hidden hops, making bottlenecks due to the resource shortage at the hidden hops. This paper aims at the...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Secure Routing in MANET Using Asymmetric Graphs

    Identification of neighbors plays a major role of many protocols for Wireless Ad-hoc NETworks and also the process of network paths in a network plays an important role. Wormhole attack is a major issue in networks. This type of attack causes the opponent to collects packets from one location and...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Hardware and Software Implementation for Highly Secured Modified Wired Equivalent Privacy (MdWEP)

    Wireless communication networks are in huge need and demand due to various features of Internet and its availability and easy accessibility all over the world. Therefore, advanced security techniques and mechanism are required for private business application and for effective and secured data transfer from one network to other. Many...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Secure Key Sharing for Group Communication Under Community Cloud

    The cloud is one of the most discussed topics among IT professionals today, and organizations are increasingly exploring the potential benefits of using cloud computing or solutions for their businesses. In the users' modern world, people join hands together to form groups and that forms communities through which the ability...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Addressing Security and Privacy Issues in Cloud Computing

    Cloud computing offers a new way to deliver services while significantly changing the cost structure underlying those services. This new technical and pricing opportunities change in the way the business operate. It combines the features of traditional computing technology like grid, parallel and distributed computing and so on. The aim...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Application of Multi-Objective Weighing Work Scheduling Algorithm Into Storage Network

    The resource request task of transmission of large number of servers, wide-band resources in the enterprise storage gridding, the business distribution and download service are limited by scheduling length, time span, load balance, service quality, economic principles, security performance and many other factors, so it is difficult to use definite...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Simulation Service Management Bus in Service Oriented Run-Time Infrastructure

    As the SOA (Service-Oriented Architecture) is paid close attention by many researchers in recent years. It is a component model which can be defined as service according to business needs and can be taken as reusable shared resource. In this paper, Simulation Service Management Bus (SSMB) is proposed to intergrade...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    Network Intrusion Based on Cloud Network

    Cloud computing through the development of recent years has become a mature network technology, which have been or are being applied to a number of large-scale network server clusters, including computing, storage server, Internet resources etc. This paper aimed at the cloud cluster cyber source intrusion and malicious behavior, analyzes...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    A Two-Step Filtrate Localization Method for Wireless Sensor Networks

    In this paper, the authors address a Wireless Sensor Network localization problem that has high reliability in an environment where physical node destruction is possible. They propose a range-independent localization algorithm called Two-Step Filtrate Localization (TSFL) that allows sensors to passively determine their location with high reliability, without increasing the...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    New Computation Technique for Encryption and Decryption Based on RSA and Elgamal Cryptosystems

    Cryptography addresses the necessary elements for secure communication that involved privacy, confidentiality, key exchange, authentication, and non-repudiation. This paper proposed a new computation of encryption and decryption that was based on the computation of RSA and ElGamal Cryptosystems. The RSA is a Public Key Encryption system that gets its security...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    Comparison of Feature Extractors for Real-Time Object Detection on Android Smartphone

    In this paper, the authors present the analysis of real-time object detection method for embedded system particularly the Android Smartphone. As they all know, object detection algorithm is a complicated algorithm that consumes high performance hardware to execute the algorithm in real time. However due to the development of embedded...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    Research on Mutual Coupling Correction of Array Output Signal by BP Network

    The method of mutual coupling correction of array output signal is studied in the paper. According to array signal processing's feature, array error model is analyzed and array mutual coupling is studied. The method that smart antennas' channel calibration by BP network in wireless communication is proposed, which improves the...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    Channel Coding Simulation Research of Inter-Satellite Spread Spectrum Communication System

    In this paper, the authors consider proposing the mathematical model and simulation mode of inter-satellite channel based on the reliability of inter-satellite communication system. The Monte Carlo method is adopted to develop the spread spectrum communication system of two consumers. In order to reduce the bit errors of inter-satellite communication,...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    Chaos of Henon Map Based on the Coupled Networks

    The study of complex networks has most interests to the understanding of behaviors of the network dynamics. In a network, an individual can be represented by the node; the edge is defined relationship of two individuals. In this paper, the relationship between the parameters of Henon map is studied, and...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    An Enhanced Rule Approach for Network Intrusion Detection Using Efficient Data Adapted Decision Tree Algorithm

    Data mining has been used extensively and broadly by several network organizations. Intrusion Detection is one of the high priorities & the challenging tasks for network administrators & security experts. Intrusion Detection System is employed to protect the data integrity, confidentiality and system availability from attacks. IDS use the data...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    Securing Internet Applications Using Homomorphic Encryption Schemes

    The trend towards delegating data processing and management to a remote party raises major concerns related to privacy violations for both end-users and service providers. These concerns have attracted the attention of the research community, and several techniques have been proposed to protect against malicious parties by providing secure communication...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    A Novel Approach for Detecting Smart Camouflaging Worm

    Active Worms wreak havoc by exploiting security loopholes and flaws in software design to propagate from one machine to another. Active Worms are different than a traditional virus in that they don't spread by modifying programs on a single system, but rather by searching for and implanting destructive code onto...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    A Comprehensive Study of Routing Protocols for Cognitive Radio Networks

    The rapid development of wireless communication technologies results in the problem of radio spectrum shortage. Additionally, the traditional fixed spectrum allocation scheme can lead to the significant spectrum underutilization. Cognitive Radio (CR) is an emerging technology to solve those problems by enabling unlicensed users to opportunistically access the available licensed...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    Research on Spatial Index of Electric GIS

    In the electric GIS, facilities in different voltage levels show a different proportion, and topological relations exist in line and point. According to the limitations in multi-scale representation and topological connection of traditional spatial index, an extended R-Tree model based on multi-scale clustering(MCER Tree) is proposed, which removed the restrictions...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    Ant-Colony-Algorithm-Simulated-Annealing-Algorithm-Based Optimization Approach for MCM Interconnect Test

    In this paper, a novel optimization approach based on Ant Colony Algorithm (ACA) and Simulated annealing Algorithm (SA) is presented for the Multi-Chip Module (MCM) interconnect test generation problem. In order to apply ACA into the interconnect test, the pheromone updating rule and state transition rule is designed by combing...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    Express Aviation Network Construction Based on Hub-Spoke Theory

    Air freight network is one of the important means to improve the competitiveness of express enterprises. This paper establishes the model from two aspects, hub location decisions and hub number decisions, with the goal to achieve the lowest air freight network cost, based on the "Hub-spoke" theory. Then, computes the...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    System of Preview and Detection Based on Network Virtual Experiment

    As an important supporting means for teaching in university, virtual experiment makes up the lack of resources in experiment teaching. Network virtual experiment is a new development direction following the virtual experiment, it has inherited and carried forward the concept of virtual experiments, extending and expanding the resources of virtual...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    A Privacy Preserving Data Mining Scheme Based on Network User's Behavior

    The privacy preserving data mining has become a research hot issue in the data mining field. The server log of the Web site has preserved the page information visited by users. If the page information is not protected, the user's privacy data would be leaked. Aiming at the problem, it...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    A Flexible Viterbi Decoder for Software Defined Radio

    Modern wireless communication standard varies a lot from each other and is evolving rapidly. Flexibility becomes the dominate consideration of Software Defined Radio (SDR) system design. Reconfigurable platform is preferred in the SDR due to the reuse of hardware. Convolutional code is widely adopted in many wireless protocols but the...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    A Dynamic On-Demand Multipath Routing Algorithm for Low Earth Orbit Satellite Networks

    Compared with GEostationary Orbit (GEO) satellite systems and Medium Earth Orbit (MEO) satellite systems, Low Earth Orbit (LEO) satellite systems provide lower propagation delay as well as higher throughput. Because of these reasons, LEO satellite systems can play a pivotal role in providing services to areas where there is no...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jan 2013

    Analysis on the Impact on Learning and Teaching Model Based on Multimedia Network

    With the development of education informationalization, many teaching application based on multimedia and network are gradually penetrated into all kinds of education processes and the teaching activities which formed a huge challenge to traditional education mode. But the immaturity of the multimedia and network teaching which developed in recent decades...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Application of Wildpackets on Protocol Characteristics Analysis of P2P

    WildPackets is the leading provider of network, application performance, and protocol analysis, VoIP monitoring, and troubleshooting solutions. The key of P2P traffic management is constantly updated P2P protocol characteristics library of network traffic management device. In this paper, the authors analyze the determinants of P2P protocol characteristics, the characteristics change...

    Provided By Journal of Theoretical and Applied Information Technology