|
Journal of Theoretical and Applied Information Technology
29th
Feb 2008 | Vol. 4 No. 2 |
Title: |
ON THE MATRIX OF CHROMATIC JOINS |
Author: |
S. Senthilraj |
Source: |
Journal of Theoretical and Applied Information Technology
pp 106-110, 2008 |
Abstract |
This paper, considers various Graph Theory
terms and definitions. The Chromatic Join of two partitions P and Q of Sn and
the matrix M (n) associated with such a Chromatic Joins. The order of auxiliary
matrix A (n, P) and also recursion formula for det{A(n, P)}. Further it
discussed the formula for evaluation of the determinants of det{A(n, P)}. |
|
Full Text |
|
|
|
Title: |
DESIGN AND IMPLEMENTATION OF SYSTEM AND NETWORK
SECURITY FOR AN ENTERPRISE WITH WORLDWIDE BRANCHES |
Author: |
Seifedine Kadry, Wassim Hassan |
Source: |
Journal of Theoretical and Applied Information Technology
pp 111-118, 2008 |
Abstract |
The basic reasons we care about information systems
security are that some of our information needs to be protected against
unauthorized disclosure for legal and competitive reasons; all of the
information we store and refer to must be protected against accidental or
deliberate modification and must be available in a timely fashion. We must also
establish and maintain the authenticity (correct attribution) of documents we
create, send and receive. Finally, the if poor security practices allow damage
to our systems, we may be subject to criminal or civil legal proceedings; if our
negligence allows third parties to be harmed via our compromised systems, there
may be even more severe legal problems. Another issue that is emerging in
e-commerce is that good security can finally be seen as part of the market
development strategy. Consumers have expressed widespread concerns over privacy
and the safety of their data; companies with strong security can leverage their
investment to increase the pool of willing buyers and to increase their market
share. We no longer have to look at security purely as loss avoidance: in
today’s marketplace good security becomes a competitive advantage that can
contribute directly to revenue figures and the bottom line. Networks today run
mission-critical business services that need protection from both external and
internal threats. In this paper we proposed a secure design and implementation
of a network and system using Windows environment. Reviews of latest product
with an application to an enterprise with worldwide branches are given. |
|
Full Text |
|
Title: |
Impact
of ERP Systems on Small and Mid Sized Public Sector Enterprises |
Author: |
Ashim Raj Singla |
Source: |
Journal of Theoretical and Applied Information Technology
pp 119-131, 2008 |
Abstract |
Abstract ERP Systems are the most integrated
information systems that cut across various organizations as well as various
functional areas. It has been observed that ERP systems prove to be a failure
either in the design or its implementation. A number of reasons contribute in
the success or failure of an ERP systems. Success or failure of ERP system can
be estimated on the basis of impact of ERP on that organization. In this paper
an attempt has been made to study the impact of ERP systems in mid-sized Indian
public sector organizations. For this study, two public sector companies namely
PUNCOM and PTL located in northern India have been selected. Based on the model
used to study ERP impact and thus the findings, various recommendations have
been put forward to suggest a strategy so as to mitigate and manage such
successful implementation. |
|
Full Text |
|
Title: |
COMPARISON BETWEEN TWO WATERMARKING ALGORITHMS
USING DCT COEFFICIENT, AND LSB REPLACEMENT |
Author: |
Mona M. El-Ghoneimy |
Source: |
Journal of Theoretical and Applied Information Technology
pp 132-139, 2008 |
Abstract |
Digital watermarking is a method through which we
can authenticate images, videos and even texts. Watermarking functions are not
only authentication, but also protection for such documents against malicious
intentions to change such documents or even claim the rights of such documents.
In this paper two watermarking algorithms are simulated. The first algorithm is
based on the Discrete Cosine Transform (DCT)(in the frequency domain) and the
second algorithm is based on the least significant bit (LSB)replacement (in the
spatial domain). The results are shown and compared under different kinds of
attacks. |
|
Full Text |
|
Title: |
Remote administration Tools: A
Comparative study |
Author: |
Anis Ismail, Mohammad Hajjar, Haissam
Hajjar |
Source: |
Journal of Theoretical and Applied Information Technology
pp 140-148 , 2008 |
Abstract |
One of the trends we have been observing for some
time now is the blurring of divisional lines between different types of malware.
Classifying a newly discovered 'creature' as a virus, a worm, a Trojan or a
security exploit becomes more difficult and anti-virus researchers spend a
significant amount of their time discussing the proper classification of new
viruses and Trojans. Depending on the point of view, very often, the same
program may be perceived as a Remote Administration Tool (RAT) allowing a
potentially malicious user to remotely control the system. A Remote
Administration Tool is a remote control software that when installed on a
computer it allows a remote computer to take control of it. With remote control
software you can work on a remote computer exactly as if you were right there at
its keyboard. With fast, reliable, easy-to-use pc from remote control software,
it lets you save hours of running up and down stairs between computers. Remote
control software allows you to take control of another PC on a LAN, WAN or
dial-up connection so you see the remote computer's screen on your monitor and
all your mouse movements and keystrokes are directly transferred to the remote
machine. Remote control software provides fast secure access to remote PC’s on
Windows platforms. Hackers and malware sometimes install these types of software
on a computer in order to take control of them remotely. Many remote
administrator tools exist in the market and it is difficult to choose what you
need. As you are an IT support, you need to choose the software which leads your
IT skills. After you determine how much you want to manage remotely, the next
step is to select the tools and supporting components you need to accomplish
your remote management tasks. Our paper entails evaluating many remote control
software which help you to select the remote administrator tools. |
|
Full Text |
|
Title: |
MOVING TOWARD NETWORK SECURITY AND FIREWALLS
FOR PROTECTING AND PRESERVING PRIVATE RESOURCES ON THE INTERNET |
Author: |
Dr.S.S.Riaz Ahamed. |
Source: |
Journal of Theoretical and Applied Information Technology
pp 149-153 , 2008 |
Abstract |
Computer and network security are challenging
topics among executives and managers of computer corporations. Internet security
is the practice of protecting and preserving private resources and information
on the Internet. Even discussing security policies may seem to create a
potential liability. As a result, enterprise management teams are often not
aware of the many advances and innovations in Internet and intranet security
technology. Without this knowledge, corporations are not able to take full
advantage of the benefits and capabilities of the network. |
|
Full Text |
|
Title: |
PERFORMANCE ANALYSIS AND SPECIAL ISSUES OF CODE
DIVISION MULTIPLE-ACCESS TECHNIQUES FOR WIRELESS APPLICATIONS |
Author: |
Dr.S.S.Riaz Ahamed |
Source: |
Journal of Theoretical and Applied Information Technology
pp 154-159 , 2008 |
Abstract |
Code Division Multiple Access (CDMA) has gained
widespread international acceptance by cellular radio system operators as an
upgrade that will dramatically increase both their system capacity and the
service quality. CDMA is a "spread spectrum" technology, allowing many users to
occupy the same time and frequency allocations in a given band/space. As its
name implies, CDMA (Code Division Multiple Access) assigns unique codes to each
communication to differentiate it from others in the same spectrum. In a world
of finite spectrum resources, CDMA enables many more people to share the
airwaves at the same time than do alternative technologies. The core principle
of spread spectrum is the use of noise-like carrier waves, and, as the name
implies, bandwidths much wider than that required for simple point-to-point
communication at the same data rate. |
|
Full Text |
|
Title: |
SECTOR SYNTHESIS OF ANTENNA ARRAY USING GENETIC
ALGORITHM |
Author: |
Abdelaziz A. Abdelaziz and Hanan A. Kamal |
Source: |
Journal of Theoretical and Applied Information Technology
pp 160-169 , 2008 |
Abstract |
This paper introduces a new application of genetic
algorithm (GA) in dynamic sector synthesis of antenna array for mobile base
transceiver station (BTS). The basic objective is to have narrow beam widths in
heavy handoff areas and wider beam widths in areas with low traffic density. By
predefining the beam widths and thus the beams of each sector, optimal sectoring
can be achieved using GA at different time of the day as traffic changes. The
proposed algorithm consists of the simple GA with new adaptive mutation
mechanism. When compared with simple GA, the proposed algorithm shows faster
convergence. The results obtained are more stable and having higher fitness.
|
|
Full Text |
|
Title: |
RK STARTERS FOR MULTISTEP METHODS ON
HOLE-FILLER CNN SIMULATION |
Author: |
S.Senthilkumar |
Source: |
Journal of Theoretical and Applied Information Technology
pp 170-177 , 2008 |
Abstract |
The goal of this paper is focused on developing an
efficient design strategy for simulating CNN arrays and hole-filling is
implemented using RK step multistep methods to improve the performance of the
image or handwritten character recognition. This approach is carried out by
analyzing the important features of the hole-filler template and the dynamic
process of CNN using well knownr RK step multistep methods to obtain a set of
inequalities satisfying its output characteristics as well as the parameter
range of the hole-filler template. Simulation results and comparison have also
been presented to show the efficiency of the Numerical Integration Algorithms.
In this article, the use of new improved fourth and fifth order linear and
nonlinear Runge-Kutta methods in starting procedures for the well known RK step
multistep methods is adapted to yield greater accuracy compared with using the
standard fourth order Runge-kutta method in the application to problems
involving discontinuities and severe gradients where the stepsize is frequently
changed. |
|
Full Text |
|
|
|
|