International Journal of Computer Applications Technology and Research

Displaying 1-40 of 157 results

  • White Papers // Dec 2014

    Spam Filtering by Using Genetic Based Feature Selection

    Spam is defined as redundant and unwanted electronically letters, and now-a-days, it has created many problems in business life such as occupying networks bandwidth and the space of user's mailbox. Due to these problems, much research has been carried out in this regard by using classification technique. The paper show...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2014

    Performance Prediction of Service-Oriented Architecture - A survey

    Performance prediction and evaluation for SOA based applications assist software consumers to estimate their applications based on service specifications created by service developers. Incorporating traditional performance models such as stochastic Petri nets, queuing networks, and simulation present drawbacks of SOA based applications due to special characteristics of SOA such as...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2014

    Location Based Tracking System for Emergency Services

    Transmitting the geo-location information of a target via wireless networks is effective when both the target and the tracker are within Wi-Fi coverage area; the 802.11 wireless networks are not always accessible. When the target or the tracker is unable to access Wi-Fi, it is impossible to perform location tracking....

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2014

    Local Restoration in Metro Ethernet Networks for Multiple Link Failures

    Ethernet a popular choice for Metropolitan-Area Networks (MANs) due to simplicity, cost effectiveness and scalability. The Spanning-Tree based switching mechanism, which is considered to be very efficient at avoiding switching loops in LAN environment, is a performance bottleneck in Metro network context. Handling of link failure is an important issue...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2014

    Dynamic Resource Provisioning with Authentication in Distributed Database

    Data center have the largest consumption amounts of energy in sharing the power. The public cloud workloads of different priorities and performance requirements of various applications. Cloud data center have capable of sensing an opportunity to present different programs. The author proposed construction and the name of the security level...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2014

    Guarding Against Large-Scale Scrabble In Social Network

    Generally, the botnet is one of the most dangerous threats in the network. It has number attackers in the network. The attacker consists of DDOS attack, remote attack, etc. Bots perform repetitive tasks automatically or on a schedule over the internet, tasks that would be too mundane or time-consuming for...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2014

    Authentic Data Access Scheme for Variant Disruption- Tolerant Networks

    Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network connectivity and frequent partitions. Disruption-Tolerant Network (DTN) technologies are becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and access the confidential information or...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2014

    Reverse Engineering for Documenting Software Architectures, a Literature Review

    Recently, much research in software engineering focused on reverse engineering of software systems which has become one of the major engineering trends for software evolution. This paper is to provide a literature review on the existing reverse engineering methodologies and approaches for documenting the architecture of software systems. The survey...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2014

    Hybrid Based Resource Provisioning in Cloud

    The data centers and energy consumption characteristics of the various machines are often noted with different capacities. The public cloud workloads of different priorities and performance requirements of various applications when analyzed the authors had noted some invariant reports about cloud. The Cloud data centers become capable of sensing an...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2014

    Efficient Resource Management Mechanism with Fault Tolerant Model for Computational Grids

    Grid computing provides a framework and deployment environment that enables resource sharing, accessing, aggregation and management. It allows resource and coordinated use of various resources in dynamic, distributed virtual organization. The grid scheduling is responsible for resource discovery, resource selection and job assignment over a decentralized heterogeneous system. In the...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2014

    Illumination Invariant Face Recognition System using Local Directional Pattern and Principal Component Analysis

    In this paper, the authors propose an illumination-robust face recognition system using local directional pattern images. Usually, local pattern descriptors including local binary pattern and local directional pattern have been used in the field of the face recognition and facial expression recognition, since local pattern descriptors have important properties to...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2014

    Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchical Attribute-Set-Based Encryption (HASBE) in Cloud Computing

    Cloud computing is going to be very popular technology in IT enterprises. For any enterprise the data stored is very huge and invaluable. Since all tasks are performed through network it has become vital to have the secured use of legitimate data. In cloud computing the most important matter of...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2014

    CMS Website Security Threat Protection Oriented Analyzer System

    Website security is a critical issue that needs to be considered in the web, in order to run the users' online business healthy and smoothly. It is very difficult situation when security of website is compromised when a brute force or other kind of attacker attacks on their web creation....

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Nov 2014

    Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Counter measures In Cloud Environment

    Network Intrusion detection and Countermeasure Election in virtual network systems (NICE) are used to establish a defense-in-depth intrusion detection framework. For better attack detection, NICE incorporates attack graph analytical procedures into the intrusion detection processes. The authors must note that the design of NICE does not intend to improve any...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Nov 2014

    Authenticating Location Based Skyline Queries in Mobile Environment

    With the booming of Smartphone's and mobile devices, location-based services have experienced massive escalation in now-a-days. The outsourcing data processing services to cloud service provider becomes very trending in recent years, which provides solution to the clients instead of data owner. However, the authors cannot expect real solutions from the...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Nov 2014

    Application of a Novel Software Algorithm for Information Reduction in High Frame Rate Ultrasonography

    Ultrasonography is a non invasive method in medical field and is generally used for imaging the abnormal tissue growth. The tissue growth can be benign or malignant and to diagnose the quality of the tissue growth based on the stiffness is a challenge. Orthogonal wave velocity is computed by observing...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Nov 2014

    Rule Based Automatic Generation of Query Terms for SMS Based Retrieval Systems

    Every big and small need is fulfilled through the small hand held device called mobile. But matching the text standard of a mobile having limited space and of users' varying moods or limited capacity and knowledge, makes it difficult to comprehend what the user is actually seeking when it comes...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Nov 2014

    Knowledge Management in the Cloud: Benefits and Risks

    The success of organizations largely depends on continual investment in learning and acquiring new knowledge that creates new businesses and improve existing performance. So, using knowledge management must result in better achieving, or even exceeding, organizations objectives. The purpose of knowledge management must not be to just become more knowledgeable,...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Oct 2014

    Ensure Security and Scalable Performance in Multiple Relay Networks

    A relay network is a broad class of network topology commonly used in networks, where the source and destination are interconnected by means of some nodes. In such a network the source and destination cannot transmit to each other directly because the distance between the source and destination is greater...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Oct 2014

    Enhanced Detection System for Trust Aware P2P Communication Networks

    Botnet is a number of computers that have been set up to forward transmissions to other computers unknowingly to the user of the system and it is most significant to detect the botnets. However, Peer-To-Peer (P2P) structured botnets are very difficult to detect because, it doesn't have any centralized server....

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Oct 2014

    The Need to Integrate Usability Engineering into Agile Process Models for Mobile Applications and Devices Development

    Reliability of an interactive mobile computing device or the lack of it is often reflected in user satisfaction. The rapid proliferation and ubiquity of smart devices in the consumer market has forced the Software Engineering (SE) community to quickly adapt development approaches conscious of the novel capabilities of mobile applications....

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Oct 2014

    Protecting Global Records Sharing with Identity Based Access Control List

    Generally, the information is stored in the database. Protecting sensitive information is encrypted before outsourcing to a service provider. The authors send the request to service provider through SQL queries. The query expressiveness is limited by means of any software-based cryptographical constructs then deployed, for server-side query working on the...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Oct 2014

    An Adaptative Accident Prevention Technique for Mobile Communications Systems

    In this paper, the authors introduce how many times the elders told about the ill-effects of using cell phones while driving, but how many of the users have taken their advices seriously. Well the authors think not even thirty percent. Isn't it? But whether they like it or not, it...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Oct 2014

    A Review Study on Secure Authentication in Mobile System

    In mobile environment, the users communicate with each other about location based information and services with the help of network nodes. But providing security to data has become a difficult task. Currently available network security mechanisms are insufficient, but there is a greater demand for flexible, scalable security mechanisms. Mobile...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Oct 2014

    VHDL Implementation of FPGA Based OFDM Modem for Wireless Applications

    The new mobile technologies trying to give broadband over wireless channel allowing the user to have bandwidth connectivity even inside moving vehicle. The metropolitan broadband wireless networks require a Non-Line-Of-Sight (NLOS) capability, and the scheme Orthogonal Frequency Division Multiplex (OFDM) becomes essential to overcome the effects of multipath fading. Orthogonal...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Oct 2014

    Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wireless Sensor Network

    One of the most effective ways to prevent unauthorized and corrupted message from being forward in wireless sensor network. So to restrict these problems many authentication schemes have been developed based on symmetric key cryptosystem. But there is high computational and communication overhead in addition to lack of scalability and...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Oct 2014

    Location Based Encryption-Decryption Approach for Data Security

    Data security is an important task in today's life. Data security can be done using GPS device. Among computer user mostly use data in electronic format. How to provide a security for data is important. In this paper, the authors propose a location based data-security system to secure data by...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Sep 2014

    The Impact of Mobility Models on the Performance of AODV, DSR and LAR Routing Protocols

    MANETs are the collection of wireless nodes that can dynamically form a network anytime and anywhere to exchange information without using any pre-existing infrastructure. There are some challenges that make the design of mobile ad hoc network routing protocols a tough task. Firstly, in mobile ad hoc networks, node mobility...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Sep 2014

    Steganography using Interpolation and LSB with Cryptography on Video Images-A Review

    Stegnography is the most common term used in the IT industry, which specifically means, \"Covered writing\" and is derived from the Greek language. Stegnography is defined as the art and science of invisible communication i.e. it hides the existence of the communication between the sender and the receiver. In distinction...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Sep 2014

    Intrusion Detection System Using Self Organizing Map Algorithms

    With the rapid expansion of computer usage and computer network the security of the computer system has became very important. Every day new kind of attacks is being faced by industries. Many methods have been proposed for the development of intrusion detection system using artificial intelligence technique. In this paper,...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Sep 2014

    The Use of Intelligent Algorithms to Detect Attacks In Intrusion Detection System

    More networks are connected to the Internet every day, which increases the amount of valuable data and the number of resources that can be attacked. Some systems have been designed and developed to secure these data and prevent attacks on resources. Unfortunately, new attacks are being created everyday, which makes...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Sep 2014

    A Posteriori Perusal of Mobile Computing

    The breakthrough in wireless networking has prompted a new concept of computing, called mobile computing in which users tote portable devices have access to a shared infrastructure, independent of their physical location. Mobile computing is becoming increasingly vital due to the increase in the number of portable computers and the...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Aug 2014

    Different Types of Attacks and Detection Techniques in Mobile Ad Hoc Network

    A Mobile Ad-hoc NETwork (MANET) is a collection of mobile nodes (stations) communicating in a multi hop way without any fixed infrastructure such as access points or base stations. MANET has not well specified defense mechanism, so malicious attacker can easily access this kind of network. In this paper, the...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Aug 2014

    Security improvements Zone Routing Protocol in Mobile Ad Hoc Network

    The attractive features of ad-hoc networks such as dynamic topology, absence of central authorities and distributed cooperation hold the promise of revolutionizing the ad-hoc networks across a range of civil, scientific, military and industrial applications. However, these characteristics make ad-hoc networks vulnerable to different types of attacks and make implementing...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Aug 2014

    Resource Allocation in Computational Grids environment Using Improved Particle Swarm Optimization Algorithm

    Resource allocation in computational grids is considered as a NP-complete problem due to resources heterogeneity. Grid resources are related to various management areas exerting different management policies. Now-a-days, enhancing grid efficiency is regarded as a problem requiring proper and effective schedule. Unfortunately, grid resources dynamic nature, in addition to the...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Aug 2014

    Data Mining Innovativeness of Data Give-and-Take Service Station in Teradata Client-Server Construction

    Teradata is a relational database management system that drives a company's data warehouse. Teradata provide the foundation to give a company the power to grow, to complete in today's dynamic marketplace, to achieve the goal of \"Transforming transactions into relationships\" and to evolve the business by getting answer to a...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Aug 2014

    Information Security in Cloud Computing

    The National Institute of Standards and Technology (NIST) defined cloud computing as a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or cloud provider interaction. Cloud computing refers to the following concepts...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Aug 2014

    An Evolutionary Based Data Mining technique in Engineering Faculty Evaluation using weka

    Data mining, the extraction of hidden knowledge from large amounts of data repositories. Data mining is used in a vast area and numerous commercial data mining applications including retail sales, e-commerce, remote sensing, bioinformatics etc. Education is an essential element for the progress of country. Mining in educational environment is...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jul 2014

    Efficient Web Data Extraction

    Web data extraction is an important problem for information integration as multiple web pages may present the same or similar information using completely different formats or syntaxes that make integration of information a challenging task. Hence the need of a system that automatically extracts the information from web pages is...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jul 2014

    A Survey of Image Steganography

    Today, computer and network technologies provide easy-to-use communication channels for steganography. In this paper, the authors present a general overview of the steganography. Steganography is the art of hiding the very presence of communication by embedding secret messages into innocuous looking cover documents, such as digital images. Detection of steganography,...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jun 2013

    Performance Evaluation of DSDV, DSR AND ZRP Protocol in MANET

    Mobile ad-hoc networks are rapidly deployable and self-configuring networks. In MANET all the network node work as a router and must be capable to relay traffic from one to another since communicating nodes might be out of range. MANET is characterized by dynamic topology, possibly unidirectional links, constrained resources and...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jun 2013

    Deflection Routing in OBS Networks

    Optical Burst Switching (OBS) network is emerging as a promising candidate for future optical internet due to its ability to carry bursty traffic, adapting to the technological constraints in All Optical Networks (AON). Optical Burst Switching (OBS) network proposed as future optical internet is capable of carrying bursty traffic and...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // May 2013

    Performance Analysis for Parallel MRA in Heterogeneous Wireless Networks

    In this paper, the authors analysis a different methods to find optimal path for services and the power allocation to heterogeneous wireless network. Under heterogeneous wireless networks, a user can send data through a single or multi RATs (Radio Access Technology) simultaneously. This paper is to choose the optimal path...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // May 2013

    An Inverted List Based Approach to Generate Optimised Path in DSR in MANETs - A Review

    In this paper, the authors design and formulate the inverted list based approach for providing safer path and effective communication in DSR protocol. Some nodes in network can participate in network more frequently whereas some nodes are not participating. Because of this there is the requirement of such an approach...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // May 2013

    A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET's using NS-2

    In this paper, the authors design and formulate a trust-based routing protocol for secure transactions, such as military and disaster relief operations, banking in Mobile Ad hoc NETworks (MANETs). The proposed approach is showing the idea of a trust model in the network layer of MANET. AODV is ad hoc...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // May 2013

    Ballpark Figure Algorithms for Data Broadcast in Wireless Networks

    In wireless system allocation is a necessary purpose and show industry expensive dependability in message protocol design. In multihop wireless networks, equally, imposition by a node by reason of immediate transmissions as its neighbors makes it nontrivial to graph a minimum-latency transmit algorithm, which is known to be NP-complete. A...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // May 2013

    Power Optimization Technique for Sensor Network

    In this paper, different power optimization techniques for wireless sensor network is proposed and compared. The energy conservation in a wireless sensor network is of great significance and very essential. The nodes in a wireless environment are subject to less transmission capabilities and limited battery resources. There are several issues...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Aug 2013

    Effective Implementation of Green Computing Using RTI Data

    Today in the era of computerization the use of computers has various pros and cons. Computer saves the peoples' time and efforts to do a work but it also harmful to the peoples' health and environment. Today most of the CO2 emission is caused because of use of computer and...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Aug 2013

    WRTS: Wireless Sensor Based Real Time Traffic Information System

    Due to increasing traffic density, driving takes longer time within cities than in highways. The situation is worse in peak hours, when people travel from home to offices and vice versa. Emergency services, like ambulance services, fire brigade, police service etc., are directly affected due to increased traffic density. The...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jun 2013

    Design of Mobile Short Message Service (SMS) Across a Computer Network for Organisational Communication

    Short Message Service (SMS) is the most powerful tool in terms of communication especially for mobile users. It does not limit anyone regardless of high- or low-end mobile phones for as long as they can receive and send messages anytime, anywhere. It was revealed that, lack of adequate communication technology...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jun 2013

    Multiple Downlink Fair Packet Scheduling Scheme in Wi-Max

    IEEE 802.16 is standardization for a broadband wireless access in network Metropolitan Area Network (MAN). IEEE 802.16 standard (Wi-Max) defines the concrete Quality of Service (QoS) requirement, a scheduling scheme and efficient packet scheduling scheme which is necessary to achieve the QoS requirement. In this paper, a novel waiting queue...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Sep 2013

    Load Adaptive Networking & Energy Aware System Design to Reduce the Energy Consumption In Telecommunication Networks

    Worldwide, the growth rate of Internet users is about 20 percent per year. In developing countries this growth rate is closer to 40 - 50 percent. One of the main challenges for the future of information and communication technologies is reduction of the power consumption in telecommunication networks. The authors...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Oct 2013

    Clogging Report with Ad-Diffusion and Carter Performance Inspection using Intelligent Vanet

    Mobile ad-hoc network is a collection of mobile nodes that form a temporary network without use of any existing infrastructure. Group communication is challenging task in MANET .In recent years many protocols have been developed to achieve group communication in MANET. Since VANET is the subset of MANET the same...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2013

    An Efficient Anonymous Location Service for Geographic Ad Hoc Routing in MANET

    Anonymous routing schemes in MANETs can be classified into on-demand or reactive routing methods, proactive routing methods and anonymous middleware routing method. A finer classification of reactive routing methods includes hop-by-hop encryption and redundant traffic routing which either generate high cost or cannot provide full anonymity protection to data sources,...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2013

    Alert Routing In Wireless Video Sensor Networks For Monitoring Applications

    Wireless sensor networks are appropriate monitoring tools used in surveillance applications. Organizations all over the world are realizing the effectiveness of protecting people, places and things with advanced video surveillance systems to increase safety. Wireless infrastructure allows them to deploy and extend video surveillance capability in virtually any indoor or...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Sep 2013

    Bayesian Network for Uncertainty Representation in Semantic Web: A Survey

    Bayesian network is a probabilistic model to represent uncertainty available in knowledge base and using it tremendous works have been done to prove its relevance in uncertainty representation and reasoning using Bayesian inference. Probability can be used to represent uncertainty like prediction information, situational awareness, data and knowledge fusion etc...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Sep 2013

    Strategies in the Design of Low Power Wireless Sensor Network for the Measurement and Monitoring of Physiological Parameters

    In this paper, the authors present the strategies involved in the design of a low power wireless sensor network for the measurement and monitoring of physiological parameters like body temperature, pulse rate and respiration rate of a patient. Ultra low power MSP430F1611 microcontroller from Texas Instruments (TI) and the low...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Oct 2013

    Classification of The Insured On The Basis Of The Customers Loyalty Through Using Data Mining Techniques

    Insurance companies ask for too much information about their customers and the information was saved in their data base for many years, customers and prediction of their requirements as well as estimation of future customers were all classified on the basis of experimental inferences and guessing of the insurance companies....

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Oct 2013

    Estimation of Beacon Update interval for GPSR Protocol in MANETs

    In MANET, each node is needed to maintain its location information with the neighbor nodes for geographic routing. For this purpose they transmit the beacon packet periodically, which is not efficient in geographic routing due to packet collision. Also it has its effects in terms of update cost. Further the...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Nov 2013

    Probabilistic Opportunistic Access of Cognitive Radio Network using Partially Observable Markov Decision Process

    Growing demands of spectrum utilization make the authors to think about cognitive radio. Cognitive radio is smart enough to adjust its parameters according to spectrum use thereby increasing the efficiency of spectrum access. It means it should have the ability to make optimistic decisions dynamically in a multi operated network....

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Nov 2013

    Modeling and Analysis of Reliability in Grid using Petri Nets

    Intelligent grid computing is considered as an essential infrastructure in future life, and they are executed and implemented to save the energy, to reduce the costs and to increase reliability. This paper has been carried out with the aim of identifying various samples of Grid networks and investigating the applied...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jan 2014

    Modeling and Analysis of Two Node Network Model with Multiple States in Mobile Networks

    In this paper, the decision probability of the handoff are modeled and simulated for smaller bandwidths. The smaller bandwidth is chosen just for simulation purposes and to demonstrate the applicability of the algorithm. The probability of handover and probability of incorrect decision in the handover is modeled. Two nodes of...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jan 2014

    Presenting an Excusable Model of Enterprise Architecture for Evaluation of Reliability using Colored Petri Nets

    Upon increasing application of unified modeling language diagrams for description of enterprise architecture and importance of evaluating the non-functional requirements in the enterprise architecture, establishing an executable model of these diagrams is necessary. On the other side, unified modeling language diagrams have not the capability of evaluating the non-functional requirements...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jan 2014

    Modeling and Evaluation of Performance and Reliability of Component-based Software Systems using Formal Models

    Validation of software systems is very useful at the primary stages of their development cycle. Evaluation of functional requirements is supported by clear and appropriate approaches, but there is no similar strategy for evaluation of non-functional requirements (such as performance and reliability). Whereas establishing the non-functional requirements have significant effect...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jan 2014

    Mobile Device Oriented Image Scaling for Reducing Memory Consumption in Storing in Android

    In Android operating system, efficient memory consumption is an important feature for better performance. It is very important to efficiently use and manage the internal and external memory space present inside the mobile operating system. Various techniques has been used and implemented to reduce the memory usage in android. One...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Apr 2013

    Survey on Service Oriented Architecture to Support the Deployment of Web Services on Sensor Nodes

    Embedded systems are small, fast, and very great tools, gadgets and equipment which have become part of the peoples' everyday life. Service Oriented Architecture (SOA) seamlessly interconnects sensors (embedded devices) inside and between four distinct domains - the business, telecommunication, automotive and home automation domain. In this paper, Simple Object...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jun 2013

    Comparative Analysis of File Transfer Algorithms to Reduce Average Download Time in Peer to Peer Networks

    File sharing using the peer-to-peer techniques are very effective and popular among Internet users. The Peer-To-Peer (P2P) network is used for downloading large-volume contents such as movies and software. To address the problem of flexibility and scalability, the authors propose a distributed peer-to-peer architecture and algorithms for data clustering. In...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jun 2013

    Survey of Various Protocols in Geographical Based Routing in Vehicular Adhoc Networks

    Vehicular Ad hoc NETwork (VANET), a subclass of Mobile Ad hoc NETworks (MANETs), is a promising approach for the Intelligent Transportation System (ITS). The design of routing protocols in VANETs is important and necessary issue for support the smart ITS. The key difference of VANET and MANET is the special...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2013

    Software Engineering Challenges in Pervasive Computing: A Review

    Moving away from decades of machine-centric computing and making pervasive human-centric computing, the new wave of computing, a reality revolutionizes the relationship between humans and computing systems. There is a growing interest in the use of context-awareness as a technique for developing pervasive computing applications that are flexible, adaptable, and...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Feb 2014

    A New Method for Reducing Energy Consumption in Wireless Sensor Networks using Fuzzy Clustering and Fault Tolerance

    Now-a-days, wireless sensor networks, clustering protocol based on the neighboring nodes into separate clusters and fault tolerance for each cluster exists for sensors to send information to the base station, to gain the best performance in terms of increased longevity and maintain tolerance than with other routing methods. However, most...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jan 2014

    Analysis of Pattern of Information Revelation and Site Use Behavior in Social Networking Sites

    With the emergence of online social networking sites, the rules of social interaction and communication has been changed. Most of the social networking sites motivate users to share personal information, build new relationships and increase knowledge with a perceived ease of use. But this online interaction and sharing of personal...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2013

    Float-Based Pipeline Monitoring Network

    Wireless sensor networks are used to monitor water/oil pipelines. The excising schemes for pipeline monitoring are not energy efficient. Network operators have to daily travel across pipelines to change batteries of sensor nodes. In this paper, the authors propose a novel sensor-based pipeline monitoring protocol called FPMN. FPMN utilizes float...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Mar 2014

    An Interactive Visual Textual Data Analysis by Event Detection and Extraction

    Now-a-days, searching for the text data in a large ocean like location is quite challenging and more inaccurate task. Data that holds with the relation to its event can be evolved with certain changes with some intervals of time. Already existing techniques provides a trendy manner in order to extract...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Apr 2014

    Improvising Network Life Time of Wireless Sensor Networks Using Mobile Data Aggregator

    In Wireless Sensor Networks (WSNs) a large number of sensors scatter over a surveillance field and extract data of interests by reading real-world phenomena from the physical environment. Since sensors are typically battery-powered and left unattended after the initial deployment, it is generally infeasible to replenish the power supplies once...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Mar 2014

    A Survey of Web Spam Detection Techniques

    Internet is a global information system. Most of the users use search engines due to high volume of information in virtual world in order to access to required information. They often observe the results of first pages in search engines. If they cannot obtain desired result, then they exchange query...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Mar 2014

    Mobile Device Protection Using Sensors

    Mobile devices like laptops, iPhones and PDAs are highly susceptible to theft in public places like airport terminal, library and cafe. Moreover, the exposure of sensitive data stored in the mobile device could be more damaging than the loss of device itself. In this paper, the authors propose and implement...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Mar 2014

    Authenticate System Objects Using Access Control Policy Based Management

    The network level access control policy is based on policy rule. The policy rule is a basic building of a policy based system. Each policy contains set of conditions and actions. Here conditions are evaluated to determine whether the actions are performed. The existing paper is based on packet filtering...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // May 2014

    Implementation of Matrix based Mapping Method Using Elliptic Curve Cryptography

    Elliptic Curve Cryptography (ECC) gained a lot of attention in industry. The key attraction of ECC over RSA is that it offers equal security even for smaller bit size, thus reducing the processing complexity. ECC encryption and decryption methods can only perform encrypt and decrypt operations on the curve but...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Apr 2014

    Survey on Efficient and Secure Anonymous Communication in Manets

    Mobile ad-hoc networks require anonymous communications in order to thwart new wireless passive attacks; and to protect new assets of information such as nodes locations, motion patterns, network topology and traffic patterns in addition to conventional identity and message privacy. The transmitted routing messages and cached active routing entries leave...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Apr 2014

    An Adaptive Energy Aware Clustering Based Reliable Routing for in-Network Aggregation in Wireless Sensor Network

    Wireless Sensor Network (WSN) consists of spatially distributed autonomous devices that cooperatively sense physical or environmental conditions. Due to the non-uniform node deployment, the energy consumption among nodes is more imbalanced in cluster-based wireless sensor networks this factor will affect the network life time. Cluster-based routing and EADC algorithm through...

    Provided By International Journal of Computer Applications Technology and Research