Universal Journal of Applied computer Science and Technology

Displaying 1-21 of 21 results

  • White Papers // Jun 2012

    Estimation of Required Bandwidth for Organisations

    Over the years, organizations and individuals have suffered so much in the hands of the Internet Service Providers (ISPs) due to their inability to estimate the needed bandwidth. CiscoNet and Brad have proffered solution to adjust TCP window size and the round trip latency so that the desired bandwidth can...

    Provided By Universal Journal of Applied computer Science and Technology

  • White Papers // May 2012

    Fast Face Recognition Using Enhanced SOM Architecture

    Face recognition is one of the challenging problem is still facing in the recent years in many applications and may fields up to date and still there is no solution is to be find to face that problem. Face recognition is the biometric method, and it is one of the...

    Provided By Universal Journal of Applied computer Science and Technology

  • White Papers // May 2012

    Session Initiation Protocol Based Stack Development for User Agent Client and Server

    In this paper, the authors describes Session Initiation Protocol (SIP), an application-layer control (signaling) protocol for creating, modifying, and terminating sessions with one or more participants. These sessions include Internet telephone calls, multimedia distribution, and multimedia conferences. SIP invitations used to create sessions carry session descriptions that allow participants to...

    Provided By Universal Journal of Applied computer Science and Technology

  • White Papers // May 2012

    A Survey of Combined Network Designs in Wireless Mesh Networks

    Over the last decade, the model of Wireless Mesh Networks (WMNs) has improved a lot, and there has been extensive research on various areas related to WMNs such as design, deployment, protocols, performance, etc. The quantity of research being conducted in the area of wireless mesh design has dramatically increased...

    Provided By Universal Journal of Applied computer Science and Technology

  • White Papers // May 2012

    Encryption Techniques of Cryptography

    In cryptography, encryption is the process of transforming information referred to as plaintext using an algorithm to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information (in cryptography, referred to as ciphertext). The reverse process,...

    Provided By Universal Journal of Applied computer Science and Technology

  • White Papers // May 2012

    A Novel Approach for Generation of Test Cases Using Tabu Search Algorithm

    This test case generation based on design specifications is an important part of testing processes. Improvements in software testing techniques are needed to address the increasingly complex applications that are implemented by today's software systems. The Unified Modelling Language (UML) is gaining wide acceptance in industry, and they are seeking...

    Provided By Universal Journal of Applied computer Science and Technology

  • White Papers // Apr 2012

    Fault Tolerant Administration and Control of TCP/IP Based Network Via Mobile Device

    Network administration is a service that employs a range of tools and applications to recognize existing and potential loss of service, as well as helping the managers in monitoring and maintaining the network. Fault management tools can help to increase the reliability of the network by identifying the fault and...

    Provided By Universal Journal of Applied computer Science and Technology

  • White Papers // Mar 2012

    Security Attacks: Vulnerability in Ad Hoc Networks

    Ad hoc networks are a new paradigm of wireless communication for mobile hosts, Ad hoc. They are usually set up in situations of emergency, for temporary operations or simply if there are no resources to set up elaborate networks. There are various challenges that are faced in the Ad hoc...

    Provided By Universal Journal of Applied computer Science and Technology

  • White Papers // Mar 2012

    Improving Scope of Cloud Technology Under Open Source Tools

    Cloud Computing is a paradigm designed to tie together the power of networks of computers and communications in a more cost effective way. Clouds provide elastic capability such that it could serve a wide and constantly expanding range of information processing needs, including business, government, and education. The Cloud computing...

    Provided By Universal Journal of Applied computer Science and Technology

  • White Papers // Mar 2012

    Analytical Study of Usability Evaluation Methods

    The effectiveness of software can be evaluated with the help of important quality factors such as maintainability, portability, functionality, reliability, usability and efficiency. There is increase in demand for quality software systems, but most of them fail to fulfill the user expectations due to lack of usability of software. Usability...

    Provided By Universal Journal of Applied computer Science and Technology

  • White Papers // Feb 2012

    A Survey of Traffic Analysis

    In recent years not only use of internet is increased very rapidly but attackers on internet increased. The use of internet nothing but a transferring of data from one place to another place now when many users at a time transferring data from one place to another that create traffic....

    Provided By Universal Journal of Applied computer Science and Technology

  • White Papers // Feb 2012

    Design and Implementation of a Cloud Based Rural Healthcare Information System Model

    Modern information technology is being increasingly used in the healthcare sector with the sole objective of enhancing the availability of improved medical services at a reduced costs. In this context, outsourcing of computation and storage resources using cloud infrastructure has become a potential alternative. Rural healthcare centers can largely benefit...

    Provided By Universal Journal of Applied computer Science and Technology

  • White Papers // Feb 2012

    Optimized Approach of Analysing the Data Loads Through Process Chains in SAP Business Ware House

    This paper describes a unique technique to display the data loading status of all the process chains occurring in the system. The objective is to increase the speed on correcting the data load failures and at the same time provide the capacity to analyze the data load status from a...

    Provided By Universal Journal of Applied computer Science and Technology

  • White Papers // Feb 2012

    Silver Light Technology For Rich Internet Applications

    Microsoft Silverlight is a cross-browser, cross-platform implementation of the .NET Framework for building and delivering the next generation of media experiences and Rich Internet Applications (RIA) for the Web. Silverlight uses the EXtensible Application Markup Language (XAML) to ease UI development (e.g., controls, animations, graphics, layout, etc.) while using managed...

    Provided By Universal Journal of Applied computer Science and Technology

  • White Papers // Feb 2012

    Performance Analysis of Different Erbium Doped Fiber Based Codirectionally Pumped WDM Systems Operating in Optical Wide-Band

    With the advent of modern telecommunication industry in 21st century, secure, fast and long distance data communication has become an important communication requirement. Widespread demand for huge information capacity has paved the way for light wave systems, which includes optical fiber amplifiers. Today rare earth doped fibers such as Erbium...

    Provided By Universal Journal of Applied computer Science and Technology

  • White Papers // Aug 2011

    LTE System Performance in Frequency Selective Fading Channel With Aid of Stbc Technology

    Multipath fading is the major problem facing any wireless communications system. Orthogonal Frequency Division Multiplexing (OFDM) is considered efficient solution for mitigating fading distortion especially frequency selective type. LTE and WiMAX families are based on OFDM technology which is the main reason for those systems high efficiency. In this paper...

    Provided By Universal Journal of Applied computer Science and Technology

  • White Papers // Jun 2011

    Architecture of Software Defined Radio Using Digital Signal Processor

    In considering the architecture of the radio device, whether mobile terminal or base station it simply divided into two areas. RADIO FRONT END,RADIO BACK END. Radio front end is related to the radio frequency aspects both receiver and transmitter section, and hardware is the dominant element for the front end....

    Provided By Universal Journal of Applied computer Science and Technology

  • White Papers // May 2011

    Minutiae Fingerprint Recognition Using Hausdorff Distance

    Biometric authentication is an excellent way to security now days. Now it has been proven that each and every individual has its own biometric feature such as Fingerprint, Iris, Footsteps, Face and Voice which is different from other. These can be used to identify individual. Using biometric not only guarantees...

    Provided By Universal Journal of Applied computer Science and Technology

  • White Papers // May 2011

    Authenticated Sequence of Systems for Reliable Broadcast Using Key Transfer Protocol

    Group communication is becoming the basis for a growing number of applications. It is therefore critical to provide sound security mechanisms for group communication. Group communication can benefit from a Key Generation Center to achieve a scalable exchange of messages. Key Generation Center can broadcast group key information to all...

    Provided By Universal Journal of Applied computer Science and Technology

  • White Papers // Apr 2011

    A Comparative Study and Critical Analysis of Various Integrated Development Environments of C, C++, and Java Languages for Optimum Development

    This paper deals with a comparative study and critical analysis of various Integrated Development Environments of C, C++, and Java languages so that a comprehensive list of specifications could be drawn for the development of an all inclusive and optimum future IDE. An Integrated Development Environment(IDE), also known as an...

    Provided By Universal Journal of Applied computer Science and Technology

  • White Papers // Oct 2010

    A New Software Data-Flow Testing Approach via Ant Colony Algorithms

    Search-based optimization techniques have been applied to a wide variety of software engineering activities including cost estimation, next release problem, and test generation. Several search based test generation techniques have been developed. These techniques had focused on finding suites of test data to satisfy a number of control-flow or data-flow...

    Provided By Universal Journal of Applied computer Science and Technology

  • White Papers // Aug 2011

    LTE System Performance in Frequency Selective Fading Channel With Aid of Stbc Technology

    Multipath fading is the major problem facing any wireless communications system. Orthogonal Frequency Division Multiplexing (OFDM) is considered efficient solution for mitigating fading distortion especially frequency selective type. LTE and WiMAX families are based on OFDM technology which is the main reason for those systems high efficiency. In this paper...

    Provided By Universal Journal of Applied computer Science and Technology

  • White Papers // Feb 2012

    Optimized Approach of Analysing the Data Loads Through Process Chains in SAP Business Ware House

    This paper describes a unique technique to display the data loading status of all the process chains occurring in the system. The objective is to increase the speed on correcting the data load failures and at the same time provide the capacity to analyze the data load status from a...

    Provided By Universal Journal of Applied computer Science and Technology

  • White Papers // May 2012

    A Novel Approach for Generation of Test Cases Using Tabu Search Algorithm

    This test case generation based on design specifications is an important part of testing processes. Improvements in software testing techniques are needed to address the increasingly complex applications that are implemented by today's software systems. The Unified Modelling Language (UML) is gaining wide acceptance in industry, and they are seeking...

    Provided By Universal Journal of Applied computer Science and Technology

  • White Papers // May 2012

    Encryption Techniques of Cryptography

    In cryptography, encryption is the process of transforming information referred to as plaintext using an algorithm to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information (in cryptography, referred to as ciphertext). The reverse process,...

    Provided By Universal Journal of Applied computer Science and Technology

  • White Papers // May 2012

    Fast Face Recognition Using Enhanced SOM Architecture

    Face recognition is one of the challenging problem is still facing in the recent years in many applications and may fields up to date and still there is no solution is to be find to face that problem. Face recognition is the biometric method, and it is one of the...

    Provided By Universal Journal of Applied computer Science and Technology

  • White Papers // May 2012

    Session Initiation Protocol Based Stack Development for User Agent Client and Server

    In this paper, the authors describes Session Initiation Protocol (SIP), an application-layer control (signaling) protocol for creating, modifying, and terminating sessions with one or more participants. These sessions include Internet telephone calls, multimedia distribution, and multimedia conferences. SIP invitations used to create sessions carry session descriptions that allow participants to...

    Provided By Universal Journal of Applied computer Science and Technology

  • White Papers // Jun 2012

    Estimation of Required Bandwidth for Organisations

    Over the years, organizations and individuals have suffered so much in the hands of the Internet Service Providers (ISPs) due to their inability to estimate the needed bandwidth. CiscoNet and Brad have proffered solution to adjust TCP window size and the round trip latency so that the desired bandwidth can...

    Provided By Universal Journal of Applied computer Science and Technology

  • White Papers // Feb 2012

    Silver Light Technology For Rich Internet Applications

    Microsoft Silverlight is a cross-browser, cross-platform implementation of the .NET Framework for building and delivering the next generation of media experiences and Rich Internet Applications (RIA) for the Web. Silverlight uses the EXtensible Application Markup Language (XAML) to ease UI development (e.g., controls, animations, graphics, layout, etc.) while using managed...

    Provided By Universal Journal of Applied computer Science and Technology

  • White Papers // Feb 2012

    A Survey of Traffic Analysis

    In recent years not only use of internet is increased very rapidly but attackers on internet increased. The use of internet nothing but a transferring of data from one place to another place now when many users at a time transferring data from one place to another that create traffic....

    Provided By Universal Journal of Applied computer Science and Technology

  • White Papers // Feb 2012

    Design and Implementation of a Cloud Based Rural Healthcare Information System Model

    Modern information technology is being increasingly used in the healthcare sector with the sole objective of enhancing the availability of improved medical services at a reduced costs. In this context, outsourcing of computation and storage resources using cloud infrastructure has become a potential alternative. Rural healthcare centers can largely benefit...

    Provided By Universal Journal of Applied computer Science and Technology

  • White Papers // Mar 2012

    Analytical Study of Usability Evaluation Methods

    The effectiveness of software can be evaluated with the help of important quality factors such as maintainability, portability, functionality, reliability, usability and efficiency. There is increase in demand for quality software systems, but most of them fail to fulfill the user expectations due to lack of usability of software. Usability...

    Provided By Universal Journal of Applied computer Science and Technology

  • White Papers // Mar 2012

    Improving Scope of Cloud Technology Under Open Source Tools

    Cloud Computing is a paradigm designed to tie together the power of networks of computers and communications in a more cost effective way. Clouds provide elastic capability such that it could serve a wide and constantly expanding range of information processing needs, including business, government, and education. The Cloud computing...

    Provided By Universal Journal of Applied computer Science and Technology

  • White Papers // Mar 2012

    Security Attacks: Vulnerability in Ad Hoc Networks

    Ad hoc networks are a new paradigm of wireless communication for mobile hosts, Ad hoc. They are usually set up in situations of emergency, for temporary operations or simply if there are no resources to set up elaborate networks. There are various challenges that are faced in the Ad hoc...

    Provided By Universal Journal of Applied computer Science and Technology

  • White Papers // Apr 2012

    Fault Tolerant Administration and Control of TCP/IP Based Network Via Mobile Device

    Network administration is a service that employs a range of tools and applications to recognize existing and potential loss of service, as well as helping the managers in monitoring and maintaining the network. Fault management tools can help to increase the reliability of the network by identifying the fault and...

    Provided By Universal Journal of Applied computer Science and Technology

  • White Papers // Feb 2012

    Performance Analysis of Different Erbium Doped Fiber Based Codirectionally Pumped WDM Systems Operating in Optical Wide-Band

    With the advent of modern telecommunication industry in 21st century, secure, fast and long distance data communication has become an important communication requirement. Widespread demand for huge information capacity has paved the way for light wave systems, which includes optical fiber amplifiers. Today rare earth doped fibers such as Erbium...

    Provided By Universal Journal of Applied computer Science and Technology

  • White Papers // May 2012

    A Survey of Combined Network Designs in Wireless Mesh Networks

    Over the last decade, the model of Wireless Mesh Networks (WMNs) has improved a lot, and there has been extensive research on various areas related to WMNs such as design, deployment, protocols, performance, etc. The quantity of research being conducted in the area of wireless mesh design has dramatically increased...

    Provided By Universal Journal of Applied computer Science and Technology

  • White Papers // Apr 2011

    A Comparative Study and Critical Analysis of Various Integrated Development Environments of C, C++, and Java Languages for Optimum Development

    This paper deals with a comparative study and critical analysis of various Integrated Development Environments of C, C++, and Java languages so that a comprehensive list of specifications could be drawn for the development of an all inclusive and optimum future IDE. An Integrated Development Environment(IDE), also known as an...

    Provided By Universal Journal of Applied computer Science and Technology

  • White Papers // May 2011

    Minutiae Fingerprint Recognition Using Hausdorff Distance

    Biometric authentication is an excellent way to security now days. Now it has been proven that each and every individual has its own biometric feature such as Fingerprint, Iris, Footsteps, Face and Voice which is different from other. These can be used to identify individual. Using biometric not only guarantees...

    Provided By Universal Journal of Applied computer Science and Technology

  • White Papers // May 2011

    Authenticated Sequence of Systems for Reliable Broadcast Using Key Transfer Protocol

    Group communication is becoming the basis for a growing number of applications. It is therefore critical to provide sound security mechanisms for group communication. Group communication can benefit from a Key Generation Center to achieve a scalable exchange of messages. Key Generation Center can broadcast group key information to all...

    Provided By Universal Journal of Applied computer Science and Technology

  • White Papers // Jun 2011

    Architecture of Software Defined Radio Using Digital Signal Processor

    In considering the architecture of the radio device, whether mobile terminal or base station it simply divided into two areas. RADIO FRONT END,RADIO BACK END. Radio front end is related to the radio frequency aspects both receiver and transmitter section, and hardware is the dominant element for the front end....

    Provided By Universal Journal of Applied computer Science and Technology

  • White Papers // Oct 2010

    A New Software Data-Flow Testing Approach via Ant Colony Algorithms

    Search-based optimization techniques have been applied to a wide variety of software engineering activities including cost estimation, next release problem, and test generation. Several search based test generation techniques have been developed. These techniques had focused on finding suites of test data to satisfy a number of control-flow or data-flow...

    Provided By Universal Journal of Applied computer Science and Technology