Journal of Theoretical and Applied Information Technology

Displaying 41-80 of 583 results

  • White Papers // Jul 2014

    An Effective Queuing Model Based Bandwidth Allocation Scheme for Fair QoS Provisioning in LTE Systems

    In this paper, the authors propose a novel bandwidth allocation scheme that will guarantee Quality-of-Service (QoS) support in the Down-Link (DL) of a LTE-A system. The proposed scheme is developed based on a queuing model that links important performance metrics of DL service flows of LTE-A systems to a set...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jul 2014

    A Back Propagation Based Botnet Detection Algorithm for Enhanced Network Security

    The increased network computers makes botnet detection as a challenging one and it makes easier for intruders and attackers to generate mitigation attacks. The centralized propagation nature of botnet floods warms through different botnet clients and questions the network security. To overcome the challenges in identifying the botnet, the authors...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jul 2014

    Data Collection Using Mobile Robot in WSN:A Review

    Development of mass construction, the charge of sensor nodes has reduced significantly and resource-rich sensor nodes are organized with high-technology events, for example GPS. However energy is used to measure the capability of the battery for all sensor nodes, the energy attenuation of sensor node fallout in a dull mode...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jul 2014

    A TDMA-Based Smart Clustering Technique for VANETS

    A vehicle's on-road time since the last pit stop has to be taken into account while forming clusters using Vehicular Ad-hoc NETworks (VANET). This is important so as to keep the vehicles at optimum driving conditions and to provide rest to the driver at regular intervals. To the best of...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jul 2014

    Dominating Set Based Geocast with Temporal Stability for Wireless Mobile Adhoc and Sensor Networks

    Geocast is a variant of a location based multicast where a packet is delivered from a source to all nodes specific to a geographic area interested by the source. Efficiently utilize the energy; this can reduce the void formation. Reduce the transmission cost and the delay for delivering the packet....

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jul 2014

    Impact of Radio Propagation Model and Mobility in On-Demand Routing Protocol of MANET

    Accuracy of routing protocol performance in Mobile Ad hoc NETwork (MANET) depends on many parameters. Besides many parameters propagation model and node velocity are the two among them. Node mobility is responsible for network topology and propagation model for calculating signal strength at receiver. In wireless network MANET suffers a...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jul 2014

    Cybercrime Prevention in the Kingdom of Bahrain Via It Security Audit Plans

    Implementing cybercrime preventing technologies is critical in today's connected world. As companies continue to rely on critical infrastructure, they should also address the risk and threats imposed by the use of these technologies. Bahrain is no different from anywhere else in the world when comes to cybercrimes, however, due to...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jul 2014

    Optimization of Nano Adhoc on Demand Distance Vector Routing Protocol in MANET

    Recent development of mobile ad hoc networks, ensembles the nano molecular communication components in order to improve network performance by using Transmitter Nano machine (TN) and Receiver Nano machine (RN). The previous model Nano Ad hoc On-demand Distance Vector (NAODV) routing has the problem higher latency ratio, which claims the...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jul 2014

    Two-Ways Database Synchronization in Homogenous Database Management System with Binary Log Approach

    Now-a-days, there are several researches conducted about design from database for the real-time application. A real-time database system is usually defined as a database system in which the transaction is correlated with the deadline, right when their transactions are done. Along with the developing of the database system these days,...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jul 2014

    A Novel Design of Finger Vein Recognition for Personal Authentication and Vehicle Security

    In this paper, a real time embedded finger vein recognition system for personal authentication and vehicle security is proposed. Vein patterns are different for each finger and for each persons and as they are hidden underneath the skin's surface, forgery is extremely difficult these unique aspects of finger vein patterns...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2014

    Fusion Affine Moment Invariants and Wavelet Packet Features Selection for Face Verification

    Face recognition under changing lighting conditions is a challenging problem in computer vision. The effect of pose and illumination on face images result in a low accuracy rate in the face verification system. In this paper, the authors proposed a new framework for solving the above problem and increase the...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2014

    Secure Embedded Webserver with Internet Control Message Protocol

    Embedded system based real time process control and monitoring requires several critical issues to be intrinsically taken care to avoid fatal error. Issues of concern include avoiding OS crash, avoiding fragmented frames, place proper section of code in critical section, implement the different activities as tasks, etc. In this paper,...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2014

    Implementation of Datawarehouse, Datamining and Dashboard for Higher Education

    Today, most of the higher education institutions have been supported by integrated information systems for all activities, such as lecturer recruitment, marketing, student admission, student registration, academic operations, and alumni system. Higher education information system generates many transactional data; and the amount of those data is increased day-by-day, but the...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2014

    A Negative Association Rules for Web Usage Mining Using Negative Selection Algorithm

    The immense capacity of web usage data which survives on web servers contains potentially precious information about the performance of website visitors. Pattern mining involves applying data mining methods to large web data repositories to extract usage patterns. Due to the emerging reputation of the World Wide Web (WWW), many...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2014

    An Analysis for a Cluster Tree Zigbee Topology

    ZigBee or IEEE 802.15.4 is considered as a unique communication standard developed for wireless personal area network. Zigbee is a Low-Rate (LR) communication network which provides flexibility, very low power consumption, ease of installation, reliable data transfer, short range operation, acceptable battery life, low data rate in an ad hoc...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2014

    Energy Based Spectrum Sensing, Power Spectrum Estimation and PAPR Analysis for Cognitive Radio Networks

    An electro magnetic spectrum is the source for all wireless communication. However, communication in this medium is often interrupted by complications such as hidden terminal problem. noise uncertainty and channel uncertainty. In order to provide an efficient solution, in this paper, the authors propose an energy based spectrum sensing, power...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2014

    Enhanced Scenario-Based Experiments to Overcome Byzantine Attacks in MANET

    MANETs are unplanned, self-configuring network composed of mobile nodes that utilize mesh networking principles for inter-connectivity. MANETs are IP networks made up of a collection of wireless and mobile nodes communicating via radio links that can temporarily form a network whenever they coexist in the same neighborhood without any fixed...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2014

    Design & Deployment of Testbed Based on ICMPv6 Flooding Attack

    One of the important protocols in IPv6 implementation is ICMPv6 which is used for neighbor and router discovery. However, this protocol also could be used by attackers to deny network services like ICMPv6 flood attacks which network decreases performance. In ICMPv6 flooding attacks detection, behavioral-based approaches, particularly suffer from the...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2014

    Secure Key Exchange in New Multi-Party Identity-Based Authenticated Key Agreement Protocol

    Today's computing environments such as internet conferencing, distributed simulation, multi-user games, and many more applications involve dynamic peer groups. Communication among dynamic peer groups must be secure and, at the same time, fast and cost effective. In an internet conference, all participants together establish a common conference key to enable...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2014

    The Design of Knowledge Management System Model for SME (UKM)

    Studies on knowledge management showed that the knowledge management plays an important role to improve Small and Medium Enterprises (SMEs) performance, as knowledge or Information is one of innovation driver that will support the SME competitiveness. Therefore, in this paper, together with KOPWANI Usaha Kecil dan Menengah (UKM) the team...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2014

    A New Approach to Trust Evaluation for Cluster Based MANETs

    A Mobile Ad hoc NETwork (MANET) is a pool of independent, dynamic, wireless devices that forms a network, devoid of no permanent infrastructure. This inherent features and wireless nature of mobile ad hoc networks makes them vulnerable to a wide variety of attacks. To discover routes with trusted nodes, the...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2014

    Design of Fractal Antenna for UWB Applications

    Wireless communication technology is an advancing field of study and its importance is in great demand in commercial and military applications. Multiband antenna and wide band antennas are desired in all communication systems. This paper is to design an antenna suitable for wireless applications. A small, low cost fractal antenna...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2014

    Performance Analysis of Cooperation and Non Cooperation of Relay Nodes in Cognitive Radio Ad Hoc Networks - A Game Theoretic Approach

    Cognitive Radio (CR) technology is a solution to solve the problems in wireless networks resulting from the limited available spectrum and the inefficiency in the spectrum usage by exploiting the existing wireless spectrum opportunistically. CR networks, equipped with the intrinsic capabilities of the cognitive radio, will provide an ultimate spectrum...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2014

    Anonymous Web Browsing Against Traffic Analysis Attacks by Reusing the Cache Memory

    Anonymous web browsing is a hot topic with many potential applications for privacy reasons. However, there are few such systems which can provide high level anonymity for web browsing. The reason is the current dominant dummy packet padding method for anonymization against traffic analysis attacks. This method inherits huge delay...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2014

    Text Mining Algorithm Discotex (Dis-Covery From Text Extraction) With Information Extraction

    Text mining concerns looking for patterns in unstructured text. The related task of Information Extraction (IE) is about locating specific items in natural-language documents. This paper presents a framework for text mining, called DISCOTEX (DISCOvery from Text EXtraction), using a learned information extraction system to transform text into more structured...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2014

    Assembler Design Techniques for a Reconfigurable Soft-Core Processor

    The reconfigurable processor design which utilizes platform such as Field Programmable Gate Array (FPGA) has offered several advantages in minimizing the non-recurring engineering cost and to reduce the time-to-market for processor-based products. However, when any modification is made to the processor architecture, the same information needs to be relayed to...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2014

    QOS Based Cost Efficient Resource Allocation in Cloud

    Resource allocation is one of the important challenges in cloud computing environment. It depends on how to allocate the resource to the particular task. Resource allocation can be done by two methods. One of the methods statically allocates the resources and other dynamically allocates the resources. Two methods are having...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2014

    Energy and Load Aware Stability Routing for Mobile Ad Hoc Network

    Due to mobility, the topology of a Mobile Ad hoc NETwork (MANET) changes frequently, making it more difficult to find routes that last for the entire duration of data transfer. Energy awareness and congestion control is becoming a crucial factor in the design of routing protocols. Satisfying both stability and...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2014

    A Triangular Matrix Routing Table Representation for Efficient Routing in MANET

    To improve the routing efficiency of a MANET, two issues need to be investigated: routing table size and path selection from source to destination. Given that routing performance depends on routing table size, which is determined by the number of nodes, a detailed table representation is required. In this paper,...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2014

    A Framework of Information Security Culture Change

    Establishing information security culture within an organization may include transformation of how employees interact with the information assets which may be challenged with resistance, fear or confusion. Change management skills could assist organization members to smoothly adapt to the new culture. The use of change management in information security culture...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2014

    An Enhanced Trust Authorization Based Web Services Access Control Model

    With the increasing tendency among business organizations to move around the web services platform, Web services paradigm creates new security challenges which can only be realized by developing effective access control models. Now-a-days, service provider big challenge is detecting and preventing malicious requesters or behaviors. In order to evade malicious...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2014

    Evaluation Subquery Methods in Microsoft Sql Server 2008

    Frequently user compiles a query to satisfy business process needs, whether directly using DBMS or connecting into application system. There are many methods that can be used to generate desired results to support transaction, but all the query processing should be run effectively and efficiently. A significant aspect of query...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2014

    Dynamic Structured Privileges With Multiowner Data Sharing for Dynamic Groups in the Cloud

    Cloud computing is a general term used to describe a new class of network based computing that takes place over the internet. The most basic and important service offered by cloud is data storage. However, the major obstacle in the multi owner data sharing for the wide deployment of cloud...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2014

    A Survey of Research and Practices in Multiprocessor System on Chip Design Space Exploration

    In this paper, the authors present a perspective on the existing research and practices initiated for the Design Space Exploration (DSE) in Multi-Processor System-on-Chip (MPSoC) technology. Reduction in size as well as adding more functionality within a single chip by incorporating multiple processors remains the key in the development of...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2014

    A Comparative Study of Classification Models for Detection in IP Networks Intrusions

    Intrusion detection is an essential mechanism to protect computer systems from many attacks. The authors presented a contribution to the network intrusion detection process using six most representative classification techniques: decision trees, BayesNet, Naive Bayes, Rules, SVM, and Perceptron multi-layer network. In this paper, they presented a feature selection using...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2014

    An Effective Cross Rate Packet Aggregation Scheme for Virtualized Network Cloud Computing

    Virtualization enables the cloud computing. The bottleneck of transferring packets from driver domain to Virtual Machines (VMs) in I/O channel was eliminated by basic aggregation and destination based aggregation scheme, but it is limited to aggregating packets for a particular destination and missing out more effective packet combinations. This paper...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2014

    Novel Framework for the Portfolio Determination Using PSO Adopted Clustering Technique

    Methods based on the econometrics, statistics, machine learning, heuristics and data mining methods are used to predict the market behavior and investment decisions. In this paper, the authors have presented a novel approach for the portfolio creation using the PSO adopted k-means. Then the NARX and the Markowitz model have...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2014

    A Fuzzy Approach for Representative Node Selection in Cross Layer TCP

    A cross-layer based improved Transmission Control Protocol (TCP) protocol ensuring fair throughput and reliability was proposed in the previous investigations. In this protocol, data path was segmented, and representative nodes are maintained in every segment for any TCP connection. A Transmission Controller Module (TCM) is used by the representative node...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2014

    Honeybee Protection System for Detecting and Preventing Network Attacks

    An effective system inspired from honeybees protection mechanism in nature is proposed to detect and prevent network attacks. The proposed approach consists of multi-agents deployed in distributed locations in the network to discriminate normal from malicious activates. These agents recognize a network attack using a mechanism contains Undesirable-Absent (UA) or...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Jun 2014

    Efficient Energy Based Congestion Control Scheme for Mobile Ad Hoc Networks

    In recent years, MANET is the popular and growing network used in various applications. Here, the mobile nodes are randomly moving without any access point. Due to mobility of nodes, energy consumption of the network goes higher. More energy consumption occurs due to retransmission of packets and occurrence of packet...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Broadband Satellite Networks: Standards, Cross-Layer Design, and QoS Improvement

    A review of broadband satellite communication networks scenario, standards on broadband satellite networks and the main specifications of standards are provided. Due to the performance of current broadband satellite system is constrained by the layered protocol architecture, typical of both the ISO/OSI reference model and the Internet protocol suite. The...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    A Vertical Handover Trigger Mechanism Based on Gray Prediction

    Cross layer handover schemes are expected to provide seamless services for mobile terminal in the heterogeneous wireless networks. To reduce the handover delay time, link layer must timely trigger handover protocols of layer 3 so that they can finish handover procedures before current wireless link terminates. Because of limited computing...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Analysis and Design of Low-Power Transceiver With Zigbee Sensor Unit

    Power consumption of nodes in a Wireless Sensor Network (WSN) determines the life cycle of the WSN, so it is particularly important to design low-power and high-performance Wireless Sensor Nodes in the network. Based on a simple analysis of the IEEE802.15.4 protocol specifications and comparison among the efficiencies of different...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Research on the Security System Quantitative Risk Assessment Method Based on Exploitation Graph Model and Bayesian Network

    In this paper, the author's topic is based on multi-feature fusion the Mean shift target tracking technology belongs to the field of intelligent video analysis, moving target tracking is interested in moving target location each image in a video sequence to find and acquire the target movement. Moving target tracking...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Coverage Holes Discovery Algorithm for Wireless Sensor Network

    Non-uniform random distribution and exhausted energy of sensor nodes may lead to coverage holes emerged in Wireless Sensor Networks. Aiming at the problems of coverage holes in Wireless Sensor Networks, a geometry-based distributed coverage holes discovery algorithm is proposed in this paper, and it is proved theoretically. The main idea...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    A Method for CQI Feedback Based on Distributed Compressed Sensing in Adaptive Two-Way Relay System

    In two-way relay wireless communication systems, adaptive modulation and scheduling are promising for increasing the system throughput. To achieve this goal, it is necessary to feedback the information of the Channel Quality Indication (CQI). In this paper, the authors introduced a novel method for CQI feedback based on Distributed Compressed...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    An Efficient Certificateless Authenticated Key Agreement

    Key agreement is very important in information and data security. To overcome the key escrow property of identity-based cryptography and combines the advantages of the traditional PKI and the identity-based cryptography, certificateless public key cryptography is proposed. This paper proposed a new certificateless two-party key agreement protocol and gives the...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Design and Implementation of Intelligent Cloud Guide System Based on Android System

    With the improvement of people's quality of life, the number of travelers has been increasing year by year; the form of the traditional tour guide is gradually unable to meet the needs of tourists. The question, that how the authors can provide better and useful guide service for tourists has...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    On the Shortest Recycle Path Algorithm of Wireless Sensor Node

    Along with the spreading application of Wireless Sensor Network, once the node energy is exhausted, it will cause environmental pollution. Therefore, the problem of node recovery becomes increasingly important. The automatic recycling of robot will become one of the feasible methods. The key is how to use less time and...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Analysis and Countermeasures for the Security of Routing Protocol in Perception Layer of IOTS

    The security has always been the eternal topic in the field of Information technology. As a major part of Internet of Things (IoT), the perception layer acts critical roles from cognizing and sensing the ambient world to implement control instructions. So, the security of perception layer is very important. In...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Flexible Sharing in DHT-Based P2P Networks Using Metadata of Resource

    DHT-based P2P systems have the ability to map a resource's identifier to its location, so a resource can be located by the unique identifier of the resource. In such systems users must know the identifier of a resource exactly to find the resource. However, a resource cannot be described accurately...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Design of COMP Act Rectangular Dielectric Resonator Antenna for Wireless Communications

    The world is in constant changing and the demand of small size antennas with wide band and good performances is increasing, which encouraged the researchers to do an intensive work to deign antennas with these characteristics. One technological solution which meets this demand is the Dielectric Resonator Antenna (DRA). Because...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Misbehaving Attack Mitigation Technique for Multicast Security in Mobile Ad Hoc Networks (MANET)

    Node misbehavior problems have received increased attention in multicasting in Mobile Ad-hoc NETworks (MANETs). The misbehaving nodes can be either selfish or malicious nodes. The main goal of the malicious nodes is to intentionally interrupt the network using various attacks. Hence it is essential to develop a mitigation technique against...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    A Human-Oriented Virus Propagation Model in Email Networks

    The users' world is currently threatened by digital viruses, such as email viruses and mobile viruses. These viruses are mainly activated by users' operations. Therefore, it's important for users to understand the pattern of user's operational behaviors and estimate the effect of such behaviors on virus propagation. This paper first...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Discrete Markov Chain Model for Reputation Estimation of Unstructure P2P Network

    Building trust relationships between peers is an important and difficult part in the security needs of P2P network without a central server. P2P reputation system has been introduced which collects locally generated peer feedbacks and aggregates them to yield global reputation scores. Most P2P applications on the Internet are unstructured,...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    A New Node Self-Localization Algorithm for Wireless Sensor Network Used in the Borehole

    Determining the physical location of sensor nodes is the most basic requirement in most Wireless Sensor Networks (WSN) application. Wireless Sensor Network nodes' self-localization techniques are discussed and studied in this paper. At first, the organization structure of Wireless Sensor Network, the classify of node location algorithmic and node location...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    DV-HOP Localization Algorithm Improvement of Wireless Sensor Network

    The gain of SVC depends upon the type of reactive power load for optimum performance. As the load and input wind power conditions are variable, the gain setting of SVC needs to be adjusted or tuned. In this paper, an ANN based approach has been used to tune the gain...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Resource Scheduling Algorithm Based on Multi-Target Balance in Enterprise Gloud Storage System

    Resource request task is limited by scheduling length, time span, load balancing, Quality of Service, economic principles, safety performance and other factors in the Enterprise Gloud Storage system, it is difficult to characterize it with specific features. This paper analyzed the storage model, designed a compromised task scheduling algorithm based...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Cost: A Service-Oriented Simulation Architecture

    Community of Simulation Task (CoST) is a simulation architecture based on a service-oriented architecture to achieve seamless integration and interoperability of command information system. It servitize the simulation resources through combination the simulation service and completes CoST by management and coordinated simulation resources. Firstly, this paper introduced in the CoST...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Research on Fault-Tolerant Routing With High Success Probability in Mesh Interconnection Networks and Image

    Mesh networks have been applied to build large scale multicomputer systems and Network-on-Chips (NoCs) extensively. Mesh networks perform poorly in tolerating faults in the view of worst-case analysis, so it is practically important for multicomputer systems and NoCs manufactures to determine that how much success probability to construct a fault-free...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    LBGR: A Load Balancing P2P File Storage System Based on Grouping and Reputation

    The expansion of the Internet leads to the rapid growth of information, which brings about urgent needs for rapid, efficient and reliable mass storage systems. In this paper, the authors present LBGR, a load balancing P2P file storage system based on grouping and reputation. LBGR evaluates a node by calculating...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    SOHO Network Modeling and Simulation Using OPNET

    The rapidly growing Internet is driving the demand for higher transmission capacity and high-speed networks. Designing an efficient network to achieve desirable performance is a challenging task, requiring designers to balance user performance expectations with costs and capacities. The paper is based on the OPNET simulation tool focusing on the...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Feb 2013

    Study and Implementation of Library Workgroup Based on Security Policy System

    IPSec provides cryptographic-based security protection mechanism for IP packets. The correct implementation of IPSec depends on the security protection parameters included in security policies. IETF Library workgroup's proposal of security policy system architecture can simplify the task of managing security policies and ensure the proper deployment of security policies. By...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2013

    Reliable Real-Time Data Transmission in Manet Using Connection Possibility

    In Mobile Ad-hoc NETworks (MANETs), reliability in real time data transmission can be assured by confirming the connectivity of the network. Since, MANETs are characterized by dynamic topology changes; the established connection must be monitored for its consistency. In order to provide and maintain connectivity, in this paper, the authors...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2013

    Architecture of Malware Detector for Obfuscated Code Inspection

    Signature-based malware detection is a very fundamental technique that detects malware by generating signatures. The detection however, is unable to detect obfuscated malware unless pre-generated signature is stored in the database. In this paper, the authors propose a combination of known packer detection, unpacking module, and heuristic scanning techniques to...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2013

    A Review of Responsibilities of Internet Service Providers Toward Their Customers' Network Security

    The use of the internet in the 21st century is indisputable to the people worldwide. People have become dependent on the internet's connectivity to conduct business, share information, and collaborate. Yet, some people use the internet as an avenue for illegal activities such as breaking into other people computers or...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2013

    Spectral Efficiency Analysis for MIMO Beamforming Using Adaptive Modulation

    In this paper, the authors describe the analysis of Multiple Input Multiple Output (MIMO) beamforming with adaptive modulation using spectral efficiency as a figure of merit in multipath fading environment. Multipath fading environment causes the transmitted signals to be unreliable due to effects of tall buildings, trees, mountains, moving objects...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2013

    OFDM System Channel Estimation Algorithm Research Based on Kalman Filter Compressed Sensing

    Orthogonal Frequency Division Multiplexing (OFDM) has been considered as a kind of effective means to realize wideband data transmission by applying multiple low rates and parallel data transmission subcarriers. A very important characteristic of wireless channel is multipath propagation, which makes the received signal overlap, and leads to Inter Symbol...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2013

    Research on Water Quality Monitoring by Means of Sensor Network

    As society develops quickly and people attach more importance to environmental protection, it is of great research significance to intelligently monitor the environment. Based on the sensor network, doing research on live monitor of water quality, first of all, this paper designs data collecting nodes under water, which realize communication...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2013

    A Real Time Health Control and Localization of Pilgrims in El Hajj: BSN Application

    As an emerging technology, WSN (Wireless Sensor Networks) composed from a large number of small, low data rate and inexpensive node that communicate in order to sense or control a physical phenomenon. WSN have a lot of applications like disaster management, health, military and security, and enormously attracted the community...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2013

    Optimization Method of Pilot Allocation for Cooperative Amplify-and-Forward OFDM System

    Pilot-assisted channel estimation has been studied only in common cooperative AF (Amplify-and-Forward) OFDM which has no feedback mechanism. In this paper, for cooperative AF-OFDM system, the authors propose a feedback technique in which the pilot allocation mechanism is adapted to the cooperative mobile channel. Then they show how uniform pilots...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2013

    Algorithm for Redundant Nodes Deployment of Greenhouse WSN Monitoring and Control System

    Specific to the funneling effect of Greenhouse Wireless Sensor Networks (WSN) monitoring and control system, Redundant Nodes Deployment Algorithm (RNDA) is proposed. RNDA deploys a certain number of redundant nodes based on load of nodes so as to balance energy consumption of network. By means of introducing the next-hop routing...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2013

    Multi-Attribute Reverse Auction-Based Protocol for Resource Allocation in Grids

    Auction models are found efficient in managing resources allocation, which is a key technology in grid computing system. In this paper, a new reverse auction approach is proposed, and its mechanism and related auction algorithm are designed. In the authors' approach, the grid trading service, i.e., an intelligent entity uses...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2013

    Study in the Routing Algorithm Improvement on Multi-Channel Multi-Hop Wireless Sensor Network

    In this paper, the authors analyze the characteristics of Wireless Sensor Networks through the history of the development of Wireless Sensor Networks. They propose a new Wireless Sensor Network nodes algorithm based on the study of Wireless Sensor Network routing mechanism and the transmission model .This algorithm improves the protocol...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2013

    A Novel Wireless Network Based Mobile E-Buisiness General Architecture

    The upcoming mobile and ubiquitous computing world will need new forms of information sharing and services collaboration between mobile devices, thus to support mobile commerce applications. In this paper, a General Mobile Business Architecture (GMBA: General Mobile Business Architecture) was presented, which can be used in hybrid network environment with...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2013

    A Key Agreement for Large Group Using Bilinear Maps

    A key agreement scheme for large dynamic multicast group systems has been designed to cope with such applications including pay-tv, teleconferencing, collaborative work, online games, and so forth. To avoid heavy loads and unauthorized accesses to the system, it is necessary to construct an efficient and secure scheme. Some recently...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2013

    Research on Improved Positioning Algorithm Based on UWB

    Ultra Wide Band radio (UWB) is also known as the Impulse Radio (IR). It will become one of the most competitive technologies, especially in the high speed data transmission, high precision positioning, tracking and other fields; it has broad application prospects in the future. The main function of the high-voltage...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2013

    Hybrid Approach for Energy Optimization in Cluster Based WSN Using Energy Balancing Clustering Protocol

    In recent times, the technology of Wireless Sensor Network has a great impact on technical fields like wireless communication, information technology, electrical etc. However the major problem faced in this technology is that the sensor nodes run out of energy very quickly. Many routing protocols have been proposed to solve...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2013

    A Scalable Semantic Peer-to-Peer System

    Peer-To-Peer computing is emerging as a new distributed computing paradigm for many novel applications that involve exchange of information among a large number of peers with little centralized coordination. Scalability is without doubt the foremost requirement for a Peer-To-Peer system. To obtain a high factor of scalability, the authors partition...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Mar 2013

    A New Clustering Algorithm for Wireless Sensor Networks

    Wireless Sensor Networks have recently become an attractive research area. However, saving energy and, thus, extending the Wireless Sensor Network lifetime entails great challenges. For this reason, clustering techniques are largely made use of. In this paper, the authors propose a new algorithm based on the principle of spectral clustering...

    Provided By Journal of Theoretical and Applied Information Technology