International Journal of Computer Applications Technology and Research

Displaying 1-40 of 176 results

  • White Papers // Jul 2015

    A Reliable Routing Technique for Wireless Sensor Networks

    Wireless Sensor Network (WSN) consists of very large number of sensor nodes which are deployed close to the area which is to be monitored so as to sense various environmental conditions. WSN is a data-driven network which produces large amount of data and also sensor nodes are energy-limited devices and...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // May 2015

    Data Mining Using Improved Association Rule

    Data mining plays an important role in extracting patterns and other information from data. The Apriori algorithm has been the most popular techniques in-finding frequent patterns. However, Apriori algorithm scans the database many times leading to large I/O. This paper is proposed to overcome the limitations of Apriori algorithm while...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // May 2015

    Frequent Data Mining in Data Publishing for Privacy Preservation

    Weighted frequent pattern mining is suggested to find out more important frequent pattern by considering different weights of each item. Weighted frequent patterns are generated in weight ascending and frequency descending order by using prefix tree structure. These generated weighted frequent patterns are applied to maximal frequent item set mining...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Apr 2015

    Preventing Disclosure Attacks by Secured Traffic Aware Protocol in MANETs

    In this paper, the authors propose a system that allows a safe and secure data transfer in MANETs between the source and the destination. As MANETs are unplanned networks and networks of instant communication, they are prone to attacks like disclosure, brute force attacks, etc. In this paper, they mainly...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Apr 2015

    Location Provider with Privacy Using Localized Server and GPS

    Maps are an essential part of any handheld device and use constantly used for navigation and other resources by application for providing location based data which can be used for customized examination outcomes, however these data are conservatively stowed on a L.B.S server which are susceptible to attacks and misuse...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Apr 2015

    Energy Efficiency in File Transfer Across Wireless Communication

    The key idea of the authors' energy efficiency management is to use the exchange between energy consumption vs the gain in responsibility, timeliness and security to maximize the system helpful time period. They tend to formulate the exchange as associate in nursing optimization downside for dynamically crucial the most effective...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Feb 2015

    A Survey on the Clustering Algorithms in Sales Data Mining

    In this paper, the authors discuss different clustering techniques that can be used in sales databases. The advancement of digital data collection and build-up of data in data banks as a result of modernization in sales disciplines has brought in great challenges of data processing for better and meaningful results...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jan 2015

    Semantically Enriched Knowledge Extraction with Data Mining

    While data mining has enjoyed great popularity and success in recent years, semantic web is shaping up as a next big step in the evolution of World Wide Web (WWW). It is the way web is growing as a smarter cyberspace. In field of information and communication technology huge amount...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jan 2015

    User Participation in ERP Implementation: A Case-Based Study

    Information System (IS), such as Enterprise Resource Planning (ERP) systems, are being developed and used in organizations to achieve their business goals and to enhance organizational effectiveness. The effect of user participation on successful systems development and implementation of ERP systems continues to be an area of interest to researchers....

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jan 2015

    An Efficient Reconfigurable Filter Design for Reducing Dynamic Power

    In this paper, the authors present an architectural view of designing a digital filter. The main idea is to design a reconfigurable filter for reducing dynamic power consumption. By considering the input variation's they reduce the order of the filter considering the coefficient are fixed. The filter is implemented using...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jan 2015

    Risk Prediction for Production of an Enterprise

    Despite all preventive measures, there is so much possibility of risks in any project development as well as in enterprise management. There is no any standard mechanism or methodology available to assess the risks in any project or production management. Using some precautionary steps, managers can only avoid the risks...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jan 2015

    Functional Coverage for Low Power DDR2 Memory Controller in UVM

    It is a well-known fact today that verification consumes approximately 70% of the product cycle and it is one of the main hindrances in developing a complex design. The advanced CAD tools reduce the design time but still the verification time is increasing with the design complexity. Writing directed tests...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jan 2015

    Order Size Dependent Trade Credit Study in a Three Echelon Supply Chain Model

    In this paper, the authors generalize order linked trade credit policy in three echelon supply chain system where manufacturer, distributor and retailer are involved and manufacturer provide a delay period to distributor and distributor also provide an order linked trade credit policy to their retailer. Whole paper is discussed in...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2014

    Design and Implementation of Refresh and Timing Controller Unit for LPDDR2 Memory Controller

    In this paper, the authors present an "Implementation of refresh and timing controller" unit for Low Power Double Data Rate 2 (LPDDR2) memory controller. "Refresh and timing controller" unit plays a vital role for LPDDR2 memory controller. It maintains different timing parameters to handle various commands for memory like refresh,...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2014

    Spam Filtering by Using Genetic Based Feature Selection

    Spam is defined as redundant and unwanted electronically letters, and now-a-days, it has created many problems in business life such as occupying networks bandwidth and the space of user's mailbox. Due to these problems, much research has been carried out in this regard by using classification technique. The paper show...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2014

    Performance Prediction of Service-Oriented Architecture - A survey

    Performance prediction and evaluation for SOA based applications assist software consumers to estimate their applications based on service specifications created by service developers. Incorporating traditional performance models such as stochastic Petri nets, queuing networks, and simulation present drawbacks of SOA based applications due to special characteristics of SOA such as...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2014

    Location Based Tracking System for Emergency Services

    Transmitting the geo-location information of a target via wireless networks is effective when both the target and the tracker are within Wi-Fi coverage area; the 802.11 wireless networks are not always accessible. When the target or the tracker is unable to access Wi-Fi, it is impossible to perform location tracking....

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2014

    Prediction Model Using Web Usage Mining Techniques

    Popularity of WWW increasing day-by-day which results in the increase of web-based services, due to which web is now largest data repository. In order to handle this incremental nature of data various prediction techniques are used. If the prefetched pages are not visited by user in their subsequent access there...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2014

    Local Restoration in Metro Ethernet Networks for Multiple Link Failures

    Ethernet a popular choice for Metropolitan-Area Networks (MANs) due to simplicity, cost effectiveness and scalability. The Spanning-Tree based switching mechanism, which is considered to be very efficient at avoiding switching loops in LAN environment, is a performance bottleneck in Metro network context. Handling of link failure is an important issue...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2014

    Integration of Bus Specific Clock Gating and Power Gating

    In integrated circuits, a gargantuan portion of chip power is mostly consumed by clocking systems which comprises of flip-flops, latches and clock distribution networks. The two most widely used techniques for the reduction of dynamic and leakage power are Clock Gating (CG) and Power Gating (PG). The two techniques CG...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2014

    A Survey on the Classification Techniques in Educational Data Mining

    Due to increasing interest in data mining and educational system, educational data mining is the emerging topic for research community. Educational data mining means to extract the hidden knowledge from large repositories of data with the use of technique and tools. Educational data mining develops new methods to discover knowledge...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2014

    A Novel Method for Encoding Data Firmness in VLSI Circuits

    The number of tests, corresponding test data volume and test time increase with each new fabrication process technology. Higher circuit densities in System-On-Chip (SOC) designs have led to drastic increase in test data volume. Larger test data size demands not only higher memory requirements, but also an increase in testing...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2014

    Illumination Invariant Face Recognition System using Local Directional Pattern and Principal Component Analysis

    In this paper, the authors propose an illumination-robust face recognition system using local directional pattern images. Usually, local pattern descriptors including local binary pattern and local directional pattern have been used in the field of the face recognition and facial expression recognition, since local pattern descriptors have important properties to...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2014

    Efficient Resource Management Mechanism with Fault Tolerant Model for Computational Grids

    Grid computing provides a framework and deployment environment that enables resource sharing, accessing, aggregation and management. It allows resource and coordinated use of various resources in dynamic, distributed virtual organization. The grid scheduling is responsible for resource discovery, resource selection and job assignment over a decentralized heterogeneous system. In the...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2014

    Hybrid Based Resource Provisioning in Cloud

    The data centers and energy consumption characteristics of the various machines are often noted with different capacities. The public cloud workloads of different priorities and performance requirements of various applications when analyzed the authors had noted some invariant reports about cloud. The Cloud data centers become capable of sensing an...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2014

    Authentic Data Access Scheme for Variant Disruption- Tolerant Networks

    Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network connectivity and frequent partitions. Disruption-Tolerant Network (DTN) technologies are becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and access the confidential information or...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2014

    Reverse Engineering for Documenting Software Architectures, a Literature Review

    Recently, much research in software engineering focused on reverse engineering of software systems which has become one of the major engineering trends for software evolution. This paper is to provide a literature review on the existing reverse engineering methodologies and approaches for documenting the architecture of software systems. The survey...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2014

    Dynamic Resource Provisioning with Authentication in Distributed Database

    Data center have the largest consumption amounts of energy in sharing the power. The public cloud workloads of different priorities and performance requirements of various applications. Cloud data center have capable of sensing an opportunity to present different programs. The author proposed construction and the name of the security level...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2014

    Guarding Against Large-Scale Scrabble In Social Network

    Generally, the botnet is one of the most dangerous threats in the network. It has number attackers in the network. The attacker consists of DDOS attack, remote attack, etc. Bots perform repetitive tasks automatically or on a schedule over the internet, tasks that would be too mundane or time-consuming for...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2014

    Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchical Attribute-Set-Based Encryption (HASBE) in Cloud Computing

    Cloud computing is going to be very popular technology in IT enterprises. For any enterprise the data stored is very huge and invaluable. Since all tasks are performed through network it has become vital to have the secured use of legitimate data. In cloud computing the most important matter of...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2014

    CMS Website Security Threat Protection Oriented Analyzer System

    Website security is a critical issue that needs to be considered in the web, in order to run the users' online business healthy and smoothly. It is very difficult situation when security of website is compromised when a brute force or other kind of attacker attacks on their web creation....

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Nov 2014

    Authenticating Location Based Skyline Queries in Mobile Environment

    With the booming of Smartphone's and mobile devices, location-based services have experienced massive escalation in now-a-days. The outsourcing data processing services to cloud service provider becomes very trending in recent years, which provides solution to the clients instead of data owner. However, the authors cannot expect real solutions from the...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Nov 2014

    Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Counter measures In Cloud Environment

    Network Intrusion detection and Countermeasure Election in virtual network systems (NICE) are used to establish a defense-in-depth intrusion detection framework. For better attack detection, NICE incorporates attack graph analytical procedures into the intrusion detection processes. The authors must note that the design of NICE does not intend to improve any...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Nov 2014

    Application of a Novel Software Algorithm for Information Reduction in High Frame Rate Ultrasonography

    Ultrasonography is a non invasive method in medical field and is generally used for imaging the abnormal tissue growth. The tissue growth can be benign or malignant and to diagnose the quality of the tissue growth based on the stiffness is a challenge. Orthogonal wave velocity is computed by observing...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Nov 2014

    Rule Based Automatic Generation of Query Terms for SMS Based Retrieval Systems

    Every big and small need is fulfilled through the small hand held device called mobile. But matching the text standard of a mobile having limited space and of users' varying moods or limited capacity and knowledge, makes it difficult to comprehend what the user is actually seeking when it comes...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Nov 2014

    Knowledge Management in the Cloud: Benefits and Risks

    The success of organizations largely depends on continual investment in learning and acquiring new knowledge that creates new businesses and improve existing performance. So, using knowledge management must result in better achieving, or even exceeding, organizations objectives. The purpose of knowledge management must not be to just become more knowledgeable,...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Oct 2014

    Enhanced Detection System for Trust Aware P2P Communication Networks

    Botnet is a number of computers that have been set up to forward transmissions to other computers unknowingly to the user of the system and it is most significant to detect the botnets. However, Peer-To-Peer (P2P) structured botnets are very difficult to detect because, it doesn't have any centralized server....

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Oct 2014

    Ensure Security and Scalable Performance in Multiple Relay Networks

    A relay network is a broad class of network topology commonly used in networks, where the source and destination are interconnected by means of some nodes. In such a network the source and destination cannot transmit to each other directly because the distance between the source and destination is greater...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Oct 2014

    The Need to Integrate Usability Engineering into Agile Process Models for Mobile Applications and Devices Development

    Reliability of an interactive mobile computing device or the lack of it is often reflected in user satisfaction. The rapid proliferation and ubiquity of smart devices in the consumer market has forced the Software Engineering (SE) community to quickly adapt development approaches conscious of the novel capabilities of mobile applications....

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Oct 2014

    Protecting Global Records Sharing with Identity Based Access Control List

    Generally, the information is stored in the database. Protecting sensitive information is encrypted before outsourcing to a service provider. The authors send the request to service provider through SQL queries. The query expressiveness is limited by means of any software-based cryptographical constructs then deployed, for server-side query working on the...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jan 2015

    Functional Coverage for Low Power DDR2 Memory Controller in UVM

    It is a well-known fact today that verification consumes approximately 70% of the product cycle and it is one of the main hindrances in developing a complex design. The advanced CAD tools reduce the design time but still the verification time is increasing with the design complexity. Writing directed tests...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jan 2015

    Order Size Dependent Trade Credit Study in a Three Echelon Supply Chain Model

    In this paper, the authors generalize order linked trade credit policy in three echelon supply chain system where manufacturer, distributor and retailer are involved and manufacturer provide a delay period to distributor and distributor also provide an order linked trade credit policy to their retailer. Whole paper is discussed in...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2014

    Prediction Model Using Web Usage Mining Techniques

    Popularity of WWW increasing day-by-day which results in the increase of web-based services, due to which web is now largest data repository. In order to handle this incremental nature of data various prediction techniques are used. If the prefetched pages are not visited by user in their subsequent access there...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // May 2015

    Data Mining Using Improved Association Rule

    Data mining plays an important role in extracting patterns and other information from data. The Apriori algorithm has been the most popular techniques in-finding frequent patterns. However, Apriori algorithm scans the database many times leading to large I/O. This paper is proposed to overcome the limitations of Apriori algorithm while...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2014

    Integration of Bus Specific Clock Gating and Power Gating

    In integrated circuits, a gargantuan portion of chip power is mostly consumed by clocking systems which comprises of flip-flops, latches and clock distribution networks. The two most widely used techniques for the reduction of dynamic and leakage power are Clock Gating (CG) and Power Gating (PG). The two techniques CG...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // May 2015

    Frequent Data Mining in Data Publishing for Privacy Preservation

    Weighted frequent pattern mining is suggested to find out more important frequent pattern by considering different weights of each item. Weighted frequent patterns are generated in weight ascending and frequency descending order by using prefix tree structure. These generated weighted frequent patterns are applied to maximal frequent item set mining...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Feb 2015

    A Survey on the Clustering Algorithms in Sales Data Mining

    In this paper, the authors discuss different clustering techniques that can be used in sales databases. The advancement of digital data collection and build-up of data in data banks as a result of modernization in sales disciplines has brought in great challenges of data processing for better and meaningful results...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2014

    A Survey on the Classification Techniques in Educational Data Mining

    Due to increasing interest in data mining and educational system, educational data mining is the emerging topic for research community. Educational data mining means to extract the hidden knowledge from large repositories of data with the use of technique and tools. Educational data mining develops new methods to discover knowledge...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jan 2015

    Semantically Enriched Knowledge Extraction with Data Mining

    While data mining has enjoyed great popularity and success in recent years, semantic web is shaping up as a next big step in the evolution of World Wide Web (WWW). It is the way web is growing as a smarter cyberspace. In field of information and communication technology huge amount...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jan 2015

    User Participation in ERP Implementation: A Case-Based Study

    Information System (IS), such as Enterprise Resource Planning (ERP) systems, are being developed and used in organizations to achieve their business goals and to enhance organizational effectiveness. The effect of user participation on successful systems development and implementation of ERP systems continues to be an area of interest to researchers....

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jul 2013

    Noise Processing Methods for Media Processor SOC

    Images taken with both digital cameras and conventional film cameras will pick up noise from a variety of sources. Many further uses of these images require that the noise will be (partially) removed for aesthetic purposes as in artistic work or marketing, or for practical purposes such as computer vision....

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2014

    A Novel Method for Encoding Data Firmness in VLSI Circuits

    The number of tests, corresponding test data volume and test time increase with each new fabrication process technology. Higher circuit densities in System-On-Chip (SOC) designs have led to drastic increase in test data volume. Larger test data size demands not only higher memory requirements, but also an increase in testing...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jan 2015

    Risk Prediction for Production of an Enterprise

    Despite all preventive measures, there is so much possibility of risks in any project development as well as in enterprise management. There is no any standard mechanism or methodology available to assess the risks in any project or production management. Using some precautionary steps, managers can only avoid the risks...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2014

    Design and Implementation of Refresh and Timing Controller Unit for LPDDR2 Memory Controller

    In this paper, the authors present an "Implementation of refresh and timing controller" unit for Low Power Double Data Rate 2 (LPDDR2) memory controller. "Refresh and timing controller" unit plays a vital role for LPDDR2 memory controller. It maintains different timing parameters to handle various commands for memory like refresh,...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jan 2015

    An Efficient Reconfigurable Filter Design for Reducing Dynamic Power

    In this paper, the authors present an architectural view of designing a digital filter. The main idea is to design a reconfigurable filter for reducing dynamic power consumption. By considering the input variation's they reduce the order of the filter considering the coefficient are fixed. The filter is implemented using...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jan 2013

    Security for Effective Data Storage in Multi Clouds

    Cloud Computing is a technology that uses the internet and central remote servers to maintain data and applications. Cloud computing allows consumers and businesses to use applications without installation and access their personal files at any computer with internet access. This technology allows for much more efficient computing by centralizing...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jan 2013

    A Generic Model for Student Data Analytic Web Service (SDAWS)

    Any university management system accumulates a cartload of data and analytics can be applied on it to gather useful information to aid the academic decision making process. This paper is to demonstrate the significance of a data analytic web service in the education domain. This can be integrated with the...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jan 2013

    Handling Cross-Layer Attacks Using Neighbors Monitoring Scheme and Swarm Intelligence in MANET

    The standard MAC protocol widely used for Mobile Ad hoc NETworks (MANETs) is IEEE 802.11. When attacks in MAC layer are left as such without paying attention, it could possibly disturb channel access and consequently may cause wastage of resources in terms of bandwidth and power. In this paper, a...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Oct 2012

    Agent Based Task Scheduling in Grid

    Autonomous agents are intelligent entities that can operate on behalf of the human users autonomously to solve the problems, negotiate with other agents (peers), learn from the past and predict upcoming events. Grid computing is considered to be wide area distributed computing which provides sharing, selection and aggregation of distributed...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Oct 2012

    Task Scheduling Heuristic in Grid Computing

    Task scheduling is heart of any grid application which guides resource allocation in grid. Heuristic task scheduling strategies have been used for optimal task scheduling. Heuristic techniques have been widely used by the researchers to solve resource allocation problem in grid computing. In this paper, the authors classify heuristic task...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Apr 2015

    Preventing Disclosure Attacks by Secured Traffic Aware Protocol in MANETs

    In this paper, the authors propose a system that allows a safe and secure data transfer in MANETs between the source and the destination. As MANETs are unplanned networks and networks of instant communication, they are prone to attacks like disclosure, brute force attacks, etc. In this paper, they mainly...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jul 2015

    A Reliable Routing Technique for Wireless Sensor Networks

    Wireless Sensor Network (WSN) consists of very large number of sensor nodes which are deployed close to the area which is to be monitored so as to sense various environmental conditions. WSN is a data-driven network which produces large amount of data and also sensor nodes are energy-limited devices and...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Apr 2015

    Location Provider with Privacy Using Localized Server and GPS

    Maps are an essential part of any handheld device and use constantly used for navigation and other resources by application for providing location based data which can be used for customized examination outcomes, however these data are conservatively stowed on a L.B.S server which are susceptible to attacks and misuse...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Apr 2015

    Energy Efficiency in File Transfer Across Wireless Communication

    The key idea of the authors' energy efficiency management is to use the exchange between energy consumption vs the gain in responsibility, timeliness and security to maximize the system helpful time period. They tend to formulate the exchange as associate in nursing optimization downside for dynamically crucial the most effective...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // May 2014

    A Recapitulation of Data Auditing Approaches for Cloud Data

    Cloud computing, a buzzword, a technology, has been exploring over the years since 1990s and presently, being considered as a today's s era dependency for the interconnected users. Online resources (like CPU processing power, memory space), software, hardware, capacities are being delivered to the associated users with no headache of...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // May 2014

    Data Mining: Approach Towards the Accuracy Using \"Teradata\"!

    Data mining refers to the process or method that extracts or mines interesting knowledge or patterns from large amounts of data. Thus, the result of the natural evolution of information technology can be viewed by data mining. Data mining also involves assimilation, more willingly than a simple transformation. Data mining...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // May 2014

    Encrypted Query Processing Based Log Management in the Cloud for Improved Potential for Confidentiality

    To address privacy concerns current implementation allows access to log records that are indirectly identified by upload-tag values. The authors plan to propose a practical homomorphic encryption schemes that will allow encryption of log records in such a way that the logging cloud can execute some queries on the encrypted...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jun 2013

    Survey of Various Protocols in Geographical Based Routing in Vehicular Adhoc Networks

    Vehicular Ad hoc NETwork (VANET), a subclass of Mobile Ad hoc NETworks (MANETs), is a promising approach for the Intelligent Transportation System (ITS). The design of routing protocols in VANETs is important and necessary issue for support the smart ITS. The key difference of VANET and MANET is the special...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jun 2013

    Comparative Analysis of File Transfer Algorithms to Reduce Average Download Time in Peer to Peer Networks

    File sharing using the peer-to-peer techniques are very effective and popular among Internet users. The Peer-To-Peer (P2P) network is used for downloading large-volume contents such as movies and software. To address the problem of flexibility and scalability, the authors propose a distributed peer-to-peer architecture and algorithms for data clustering. In...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Apr 2013

    Survey on Service Oriented Architecture to Support the Deployment of Web Services on Sensor Nodes

    Embedded systems are small, fast, and very great tools, gadgets and equipment which have become part of the peoples' everyday life. Service Oriented Architecture (SOA) seamlessly interconnects sensors (embedded devices) inside and between four distinct domains - the business, telecommunication, automotive and home automation domain. In this paper, Simple Object...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Oct 2013

    Clogging Report with Ad-Diffusion and Carter Performance Inspection using Intelligent Vanet

    Mobile ad-hoc network is a collection of mobile nodes that form a temporary network without use of any existing infrastructure. Group communication is challenging task in MANET .In recent years many protocols have been developed to achieve group communication in MANET. Since VANET is the subset of MANET the same...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jun 2013

    Multiple Downlink Fair Packet Scheduling Scheme in Wi-Max

    IEEE 802.16 is standardization for a broadband wireless access in network Metropolitan Area Network (MAN). IEEE 802.16 standard (Wi-Max) defines the concrete Quality of Service (QoS) requirement, a scheduling scheme and efficient packet scheduling scheme which is necessary to achieve the QoS requirement. In this paper, a novel waiting queue...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jun 2013

    Design of Mobile Short Message Service (SMS) Across a Computer Network for Organisational Communication

    Short Message Service (SMS) is the most powerful tool in terms of communication especially for mobile users. It does not limit anyone regardless of high- or low-end mobile phones for as long as they can receive and send messages anytime, anywhere. It was revealed that, lack of adequate communication technology...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Aug 2013

    WRTS: Wireless Sensor Based Real Time Traffic Information System

    Due to increasing traffic density, driving takes longer time within cities than in highways. The situation is worse in peak hours, when people travel from home to offices and vice versa. Emergency services, like ambulance services, fire brigade, police service etc., are directly affected due to increased traffic density. The...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Aug 2013

    Effective Implementation of Green Computing Using RTI Data

    Today in the era of computerization the use of computers has various pros and cons. Computer saves the peoples' time and efforts to do a work but it also harmful to the peoples' health and environment. Today most of the CO2 emission is caused because of use of computer and...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // May 2013

    Power Optimization Technique for Sensor Network

    In this paper, different power optimization techniques for wireless sensor network is proposed and compared. The energy conservation in a wireless sensor network is of great significance and very essential. The nodes in a wireless environment are subject to less transmission capabilities and limited battery resources. There are several issues...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // May 2013

    Ballpark Figure Algorithms for Data Broadcast in Wireless Networks

    In wireless system allocation is a necessary purpose and show industry expensive dependability in message protocol design. In multihop wireless networks, equally, imposition by a node by reason of immediate transmissions as its neighbors makes it nontrivial to graph a minimum-latency transmit algorithm, which is known to be NP-complete. A...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // May 2013

    A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET's using NS-2

    In this paper, the authors design and formulate a trust-based routing protocol for secure transactions, such as military and disaster relief operations, banking in Mobile Ad hoc NETworks (MANETs). The proposed approach is showing the idea of a trust model in the network layer of MANET. AODV is ad hoc...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // May 2013

    An Inverted List Based Approach to Generate Optimised Path in DSR in MANETs - A Review

    In this paper, the authors design and formulate the inverted list based approach for providing safer path and effective communication in DSR protocol. Some nodes in network can participate in network more frequently whereas some nodes are not participating. Because of this there is the requirement of such an approach...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // May 2013

    Performance Analysis for Parallel MRA in Heterogeneous Wireless Networks

    In this paper, the authors analysis a different methods to find optimal path for services and the power allocation to heterogeneous wireless network. Under heterogeneous wireless networks, a user can send data through a single or multi RATs (Radio Access Technology) simultaneously. This paper is to choose the optimal path...

    Provided By International Journal of Computer Applications Technology and Research