International Journal of Computer Applications Technology and Research

Displaying 1-40 of 157 results

  • White Papers // Dec 2014

    Spam Filtering by Using Genetic Based Feature Selection

    Spam is defined as redundant and unwanted electronically letters, and now-a-days, it has created many problems in business life such as occupying networks bandwidth and the space of user's mailbox. Due to these problems, much research has been carried out in this regard by using classification technique. The paper show...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2014

    Performance Prediction of Service-Oriented Architecture - A survey

    Performance prediction and evaluation for SOA based applications assist software consumers to estimate their applications based on service specifications created by service developers. Incorporating traditional performance models such as stochastic Petri nets, queuing networks, and simulation present drawbacks of SOA based applications due to special characteristics of SOA such as...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2014

    Location Based Tracking System for Emergency Services

    Transmitting the geo-location information of a target via wireless networks is effective when both the target and the tracker are within Wi-Fi coverage area; the 802.11 wireless networks are not always accessible. When the target or the tracker is unable to access Wi-Fi, it is impossible to perform location tracking....

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2014

    Local Restoration in Metro Ethernet Networks for Multiple Link Failures

    Ethernet a popular choice for Metropolitan-Area Networks (MANs) due to simplicity, cost effectiveness and scalability. The Spanning-Tree based switching mechanism, which is considered to be very efficient at avoiding switching loops in LAN environment, is a performance bottleneck in Metro network context. Handling of link failure is an important issue...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2014

    Illumination Invariant Face Recognition System using Local Directional Pattern and Principal Component Analysis

    In this paper, the authors propose an illumination-robust face recognition system using local directional pattern images. Usually, local pattern descriptors including local binary pattern and local directional pattern have been used in the field of the face recognition and facial expression recognition, since local pattern descriptors have important properties to...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2014

    Efficient Resource Management Mechanism with Fault Tolerant Model for Computational Grids

    Grid computing provides a framework and deployment environment that enables resource sharing, accessing, aggregation and management. It allows resource and coordinated use of various resources in dynamic, distributed virtual organization. The grid scheduling is responsible for resource discovery, resource selection and job assignment over a decentralized heterogeneous system. In the...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2014

    Hybrid Based Resource Provisioning in Cloud

    The data centers and energy consumption characteristics of the various machines are often noted with different capacities. The public cloud workloads of different priorities and performance requirements of various applications when analyzed the authors had noted some invariant reports about cloud. The Cloud data centers become capable of sensing an...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2014

    Authentic Data Access Scheme for Variant Disruption- Tolerant Networks

    Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network connectivity and frequent partitions. Disruption-Tolerant Network (DTN) technologies are becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and access the confidential information or...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2014

    Reverse Engineering for Documenting Software Architectures, a Literature Review

    Recently, much research in software engineering focused on reverse engineering of software systems which has become one of the major engineering trends for software evolution. This paper is to provide a literature review on the existing reverse engineering methodologies and approaches for documenting the architecture of software systems. The survey...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2014

    Dynamic Resource Provisioning with Authentication in Distributed Database

    Data center have the largest consumption amounts of energy in sharing the power. The public cloud workloads of different priorities and performance requirements of various applications. Cloud data center have capable of sensing an opportunity to present different programs. The author proposed construction and the name of the security level...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2014

    Guarding Against Large-Scale Scrabble In Social Network

    Generally, the botnet is one of the most dangerous threats in the network. It has number attackers in the network. The attacker consists of DDOS attack, remote attack, etc. Bots perform repetitive tasks automatically or on a schedule over the internet, tasks that would be too mundane or time-consuming for...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2014

    Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchical Attribute-Set-Based Encryption (HASBE) in Cloud Computing

    Cloud computing is going to be very popular technology in IT enterprises. For any enterprise the data stored is very huge and invaluable. Since all tasks are performed through network it has become vital to have the secured use of legitimate data. In cloud computing the most important matter of...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2014

    CMS Website Security Threat Protection Oriented Analyzer System

    Website security is a critical issue that needs to be considered in the web, in order to run the users' online business healthy and smoothly. It is very difficult situation when security of website is compromised when a brute force or other kind of attacker attacks on their web creation....

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Nov 2014

    Authenticating Location Based Skyline Queries in Mobile Environment

    With the booming of Smartphone's and mobile devices, location-based services have experienced massive escalation in now-a-days. The outsourcing data processing services to cloud service provider becomes very trending in recent years, which provides solution to the clients instead of data owner. However, the authors cannot expect real solutions from the...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Nov 2014

    Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Counter measures In Cloud Environment

    Network Intrusion detection and Countermeasure Election in virtual network systems (NICE) are used to establish a defense-in-depth intrusion detection framework. For better attack detection, NICE incorporates attack graph analytical procedures into the intrusion detection processes. The authors must note that the design of NICE does not intend to improve any...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Nov 2014

    Application of a Novel Software Algorithm for Information Reduction in High Frame Rate Ultrasonography

    Ultrasonography is a non invasive method in medical field and is generally used for imaging the abnormal tissue growth. The tissue growth can be benign or malignant and to diagnose the quality of the tissue growth based on the stiffness is a challenge. Orthogonal wave velocity is computed by observing...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Nov 2014

    Rule Based Automatic Generation of Query Terms for SMS Based Retrieval Systems

    Every big and small need is fulfilled through the small hand held device called mobile. But matching the text standard of a mobile having limited space and of users' varying moods or limited capacity and knowledge, makes it difficult to comprehend what the user is actually seeking when it comes...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Nov 2014

    Knowledge Management in the Cloud: Benefits and Risks

    The success of organizations largely depends on continual investment in learning and acquiring new knowledge that creates new businesses and improve existing performance. So, using knowledge management must result in better achieving, or even exceeding, organizations objectives. The purpose of knowledge management must not be to just become more knowledgeable,...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Oct 2014

    Enhanced Detection System for Trust Aware P2P Communication Networks

    Botnet is a number of computers that have been set up to forward transmissions to other computers unknowingly to the user of the system and it is most significant to detect the botnets. However, Peer-To-Peer (P2P) structured botnets are very difficult to detect because, it doesn't have any centralized server....

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Oct 2014

    Ensure Security and Scalable Performance in Multiple Relay Networks

    A relay network is a broad class of network topology commonly used in networks, where the source and destination are interconnected by means of some nodes. In such a network the source and destination cannot transmit to each other directly because the distance between the source and destination is greater...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Oct 2014

    The Need to Integrate Usability Engineering into Agile Process Models for Mobile Applications and Devices Development

    Reliability of an interactive mobile computing device or the lack of it is often reflected in user satisfaction. The rapid proliferation and ubiquity of smart devices in the consumer market has forced the Software Engineering (SE) community to quickly adapt development approaches conscious of the novel capabilities of mobile applications....

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Oct 2014

    Protecting Global Records Sharing with Identity Based Access Control List

    Generally, the information is stored in the database. Protecting sensitive information is encrypted before outsourcing to a service provider. The authors send the request to service provider through SQL queries. The query expressiveness is limited by means of any software-based cryptographical constructs then deployed, for server-side query working on the...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Oct 2014

    An Adaptative Accident Prevention Technique for Mobile Communications Systems

    In this paper, the authors introduce how many times the elders told about the ill-effects of using cell phones while driving, but how many of the users have taken their advices seriously. Well the authors think not even thirty percent. Isn't it? But whether they like it or not, it...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Oct 2014

    VHDL Implementation of FPGA Based OFDM Modem for Wireless Applications

    The new mobile technologies trying to give broadband over wireless channel allowing the user to have bandwidth connectivity even inside moving vehicle. The metropolitan broadband wireless networks require a Non-Line-Of-Sight (NLOS) capability, and the scheme Orthogonal Frequency Division Multiplex (OFDM) becomes essential to overcome the effects of multipath fading. Orthogonal...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Oct 2014

    A Review Study on Secure Authentication in Mobile System

    In mobile environment, the users communicate with each other about location based information and services with the help of network nodes. But providing security to data has become a difficult task. Currently available network security mechanisms are insufficient, but there is a greater demand for flexible, scalable security mechanisms. Mobile...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Oct 2014

    Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wireless Sensor Network

    One of the most effective ways to prevent unauthorized and corrupted message from being forward in wireless sensor network. So to restrict these problems many authentication schemes have been developed based on symmetric key cryptosystem. But there is high computational and communication overhead in addition to lack of scalability and...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Oct 2014

    Location Based Encryption-Decryption Approach for Data Security

    Data security is an important task in today's life. Data security can be done using GPS device. Among computer user mostly use data in electronic format. How to provide a security for data is important. In this paper, the authors propose a location based data-security system to secure data by...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Sep 2014

    The Impact of Mobility Models on the Performance of AODV, DSR and LAR Routing Protocols

    MANETs are the collection of wireless nodes that can dynamically form a network anytime and anywhere to exchange information without using any pre-existing infrastructure. There are some challenges that make the design of mobile ad hoc network routing protocols a tough task. Firstly, in mobile ad hoc networks, node mobility...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Sep 2014

    Steganography using Interpolation and LSB with Cryptography on Video Images-A Review

    Stegnography is the most common term used in the IT industry, which specifically means, \"Covered writing\" and is derived from the Greek language. Stegnography is defined as the art and science of invisible communication i.e. it hides the existence of the communication between the sender and the receiver. In distinction...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Sep 2014

    A Posteriori Perusal of Mobile Computing

    The breakthrough in wireless networking has prompted a new concept of computing, called mobile computing in which users tote portable devices have access to a shared infrastructure, independent of their physical location. Mobile computing is becoming increasingly vital due to the increase in the number of portable computers and the...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Sep 2014

    The Use of Intelligent Algorithms to Detect Attacks In Intrusion Detection System

    More networks are connected to the Internet every day, which increases the amount of valuable data and the number of resources that can be attacked. Some systems have been designed and developed to secure these data and prevent attacks on resources. Unfortunately, new attacks are being created everyday, which makes...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Sep 2014

    Intrusion Detection System Using Self Organizing Map Algorithms

    With the rapid expansion of computer usage and computer network the security of the computer system has became very important. Every day new kind of attacks is being faced by industries. Many methods have been proposed for the development of intrusion detection system using artificial intelligence technique. In this paper,...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Aug 2014

    Security improvements Zone Routing Protocol in Mobile Ad Hoc Network

    The attractive features of ad-hoc networks such as dynamic topology, absence of central authorities and distributed cooperation hold the promise of revolutionizing the ad-hoc networks across a range of civil, scientific, military and industrial applications. However, these characteristics make ad-hoc networks vulnerable to different types of attacks and make implementing...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Aug 2014

    Different Types of Attacks and Detection Techniques in Mobile Ad Hoc Network

    A Mobile Ad-hoc NETwork (MANET) is a collection of mobile nodes (stations) communicating in a multi hop way without any fixed infrastructure such as access points or base stations. MANET has not well specified defense mechanism, so malicious attacker can easily access this kind of network. In this paper, the...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Aug 2014

    Resource Allocation in Computational Grids environment Using Improved Particle Swarm Optimization Algorithm

    Resource allocation in computational grids is considered as a NP-complete problem due to resources heterogeneity. Grid resources are related to various management areas exerting different management policies. Now-a-days, enhancing grid efficiency is regarded as a problem requiring proper and effective schedule. Unfortunately, grid resources dynamic nature, in addition to the...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Aug 2014

    Data Mining Innovativeness of Data Give-and-Take Service Station in Teradata Client-Server Construction

    Teradata is a relational database management system that drives a company's data warehouse. Teradata provide the foundation to give a company the power to grow, to complete in today's dynamic marketplace, to achieve the goal of \"Transforming transactions into relationships\" and to evolve the business by getting answer to a...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Aug 2014

    Information Security in Cloud Computing

    The National Institute of Standards and Technology (NIST) defined cloud computing as a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or cloud provider interaction. Cloud computing refers to the following concepts...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Aug 2014

    An Evolutionary Based Data Mining technique in Engineering Faculty Evaluation using weka

    Data mining, the extraction of hidden knowledge from large amounts of data repositories. Data mining is used in a vast area and numerous commercial data mining applications including retail sales, e-commerce, remote sensing, bioinformatics etc. Education is an essential element for the progress of country. Mining in educational environment is...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jul 2014

    Efficient Web Data Extraction

    Web data extraction is an important problem for information integration as multiple web pages may present the same or similar information using completely different formats or syntaxes that make integration of information a challenging task. Hence the need of a system that automatically extracts the information from web pages is...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jul 2014

    A Survey of Image Steganography

    Today, computer and network technologies provide easy-to-use communication channels for steganography. In this paper, the authors present a general overview of the steganography. Steganography is the art of hiding the very presence of communication by embedding secret messages into innocuous looking cover documents, such as digital images. Detection of steganography,...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // May 2014

    A Recapitulation of Data Auditing Approaches for Cloud Data

    Cloud computing, a buzzword, a technology, has been exploring over the years since 1990s and presently, being considered as a today's s era dependency for the interconnected users. Online resources (like CPU processing power, memory space), software, hardware, capacities are being delivered to the associated users with no headache of...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // May 2014

    Data Mining: Approach Towards the Accuracy Using \"Teradata\"!

    Data mining refers to the process or method that extracts or mines interesting knowledge or patterns from large amounts of data. Thus, the result of the natural evolution of information technology can be viewed by data mining. Data mining also involves assimilation, more willingly than a simple transformation. Data mining...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // May 2014

    Encrypted Query Processing Based Log Management in the Cloud for Improved Potential for Confidentiality

    To address privacy concerns current implementation allows access to log records that are indirectly identified by upload-tag values. The authors plan to propose a practical homomorphic encryption schemes that will allow encryption of log records in such a way that the logging cloud can execute some queries on the encrypted...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jan 2013

    Security for Effective Data Storage in Multi Clouds

    Cloud Computing is a technology that uses the internet and central remote servers to maintain data and applications. Cloud computing allows consumers and businesses to use applications without installation and access their personal files at any computer with internet access. This technology allows for much more efficient computing by centralizing...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jan 2013

    A Generic Model for Student Data Analytic Web Service (SDAWS)

    Any university management system accumulates a cartload of data and analytics can be applied on it to gather useful information to aid the academic decision making process. This paper is to demonstrate the significance of a data analytic web service in the education domain. This can be integrated with the...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jan 2013

    Handling Cross-Layer Attacks Using Neighbors Monitoring Scheme and Swarm Intelligence in MANET

    The standard MAC protocol widely used for Mobile Ad hoc NETworks (MANETs) is IEEE 802.11. When attacks in MAC layer are left as such without paying attention, it could possibly disturb channel access and consequently may cause wastage of resources in terms of bandwidth and power. In this paper, a...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Oct 2012

    Agent Based Task Scheduling in Grid

    Autonomous agents are intelligent entities that can operate on behalf of the human users autonomously to solve the problems, negotiate with other agents (peers), learn from the past and predict upcoming events. Grid computing is considered to be wide area distributed computing which provides sharing, selection and aggregation of distributed...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Oct 2012

    Task Scheduling Heuristic in Grid Computing

    Task scheduling is heart of any grid application which guides resource allocation in grid. Heuristic task scheduling strategies have been used for optimal task scheduling. Heuristic techniques have been widely used by the researchers to solve resource allocation problem in grid computing. In this paper, the authors classify heuristic task...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Nov 2012

    An Improved Adaptive Space-Sharing Scheduling Policy for Non-Dedicated Heterogeneous Cluster Systems

    Adaptive space-sharing scheduling algorithms tend to improve the performance of clusters by allocating processors to jobs based on the current system load. The focus of existing adaptive algorithms is on dedicated homogeneous and heterogeneous clusters. However, commodity clusters are naturally non-dedicated and tend to be heterogeneous over the time as...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Nov 2012

    Comparative Analysis of Different Techniques for Novel Class Detection

    Data stream mining is the process of extracting knowledge from continuous data. Data stream can be viewed as a sequence of relational touples arrives continuously at time varying. Classification of data stream is more challenging task due to three major problems in data stream mining: infinite length, concept-drift, arrival of...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Nov 2012

    Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in Cloud-By Using Nephel's Algorithm

    In recent years, ad-hoc parallel data processing has emerged to be one of the killer applications for Infrastructure-as-a-Service (IaaS) clouds. Major cloud computing companies have started to integrate frameworks for parallel data processing in their product portfolio, making it easy for customers to access these services and to deploy their...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2013

    Clustering That Depends Upon Various Viewpoints Similarity Measure

    In data mining clustering takes key role when compared to other important ones. The main goal of clustering is to get intrinsic structures in information, and arrange them into perfect subgroups for future work and analysis. Between the data objects there must be cluster relationship which was assumed by clustering...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2013

    A Novel Method for the Construction of Threshold Multiple-Secret Visual Cryptographic Schemes by Without Pixel Expansion

    The main concept of the original Visual Secret Sharing (VSS) scheme is to encrypt a secret image into n meaningless share images. It cannot leak any information of the shared secret by any combination of the n share images except for all of images. The shared secret image can be...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jan 2014

    Detecting and Preventing Data Overloading Difficulty using Concept Hierarchies

    Data mining is the process of extracting knowledge from large amount of data stored in database, data warehouse or other repositories. Concept hierarchy is defined as recursively reduce the data by replacing low level concepts (such as numeric values for age) by higher level concepts (such as young, middle-aged, or...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jan 2014

    Comparative Study of Particle Swarm Optimization and Fuzzy C-Means to Data Clustering

    Data has an important role in all aspects of human life and so analyzing this data for discovering proper knowledge is important. Data mining refers to find useful information (extracting patterns or knowledge) from large amount of data. Clustering is an important data mining technique which aims to divide the...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jan 2014

    Insuring Security for Outsourced Data Stored in Cloud Environment

    The cloud storage offers users with infrastructure flexibility, faster deployment of applications and data, cost control, adaptation of cloud resources to real needs, improved productivity, etc. Inspite of these advantageous factors, there are several deterrents to the widespread adoption of cloud computing remain. Among them, security towards the correctness of...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Feb 2014

    An Efficient Discovery of High Utility Item Sets from Large Database

    Identifying frequent items from database and treating each item in a database as equal. However, items are actually differs in many aspects like, profit in real application, such as retail marketing. The difference between items makes a strong impact on the decision making applications, where the values of each items...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Feb 2014

    Swarm Intelligence Based Optimization for Web Usage Mining in Recommender System

    Now-a-days, the web has become one of the most effective and efficient platform for information change and retrieval. Due to heterogeneity and unstructured nature of the data available on the WWW, web mining uses various data mining techniques to discover useful knowledge from web hyperlinks, page content and usage log....

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Feb 2014

    Analysis of Cryptographic Algorithms for Network Security

    Cryptography plays a major role in securing data. It is used to ensure that the contents of a message are confidentially transmitted and would not be altered. Network security is most vital component in information security as it refers to all hardware and software function, characteristics, features, operational procedures, accountability,...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Sep 2013

    Detection of Outliers and Reduction of Their Undesirable Effects for Improving the Accuracy of K-Means Clustering Algorithm

    Clustering is an unsupervised categorization technique and also a highly used operation in data mining, in which, the data sets are divided into certain clusters according to similarity or dissimilarity criterions so that the assigned objects to each cluster would be more similar to each other comparing to the objects...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Sep 2013

    QoS Driven Task Scheduling in Cloud Computing

    Cloud computing systems promise to offer pay per use, on demand computing services to users worldwide. Recently, there has been a dramatic increase in the demand for delivering services to a large number of users, so they need to offer differentiated services to users and meet their expected quality requirements....

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Nov 2013

    Reviewing Cluster Based Collaborative Filtering Approaches

    With regard to rapid development of Internet technology and the increasing volume of data and information, the need for systems that can guide users toward their desired items and services may be felt more than ever. Recommender systems, as one of these systems, are one of information filtering systems predicting...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Nov 2013

    Implementation of Mobile-Cloudlet-Cloud Architecture for Face Recognition in Cloud Computing Using Android Mobile

    Real time face recognition applications use face recognition algorithms, which extract information such as shape, size, and position of facial features (eyes, nose, ear, lips) and then compare this extracted feature to stored featured database to locate matching images. Face recognition application used in airport security, in passport office, in...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Nov 2013

    Presenting a New Method for Detection and Prevention of Single Black Holes Attack in AODV Protocol in Wireless Ad Hoc Network

    There is no infrastructure in wireless ad hoc networks, and nodes independently manage the networks. Therefore, the connection between nodes is provided by the nodes themselves, and these nodes act as a router. In this case, they use routing protocol such as AODV. In order to provide the connections, nodes...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Nov 2013

    Location Based Detection of Replication Attacks and Colluding Attacks

    Wireless sensor networks gains its importance because of the critical applications in which it is involved like industrial automation, healthcare applications, military and surveillance. Among security attacks in wireless sensor networks the authors consider an active attack, node replication attack and colluding attack. They use localized algorithms, ((i.e.) replication detection...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Nov 2013

    Gender Specification Using Touch Less Fingerprint Recognition

    Fingerprint recognition or fingerprint authentication refers to the automated method of verifying a match between two human fingerprints. Fingerprints are one of many forms of biometrics used to identify individuals and verify their identity. This paper touches on two major classes of algorithms (minutia and pattern) and four sensor designs...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Nov 2013

    Survey on Dynamic Resource Allocation Strategy in Cloud Computing Environment

    Cloud computing becomes quite popular among cloud users by offering a variety of resources. This is an on demand service because it offers dynamic flexible resource allocation and guaranteed services in pay as-you-use manner to public. In this paper, the authors present the several dynamic resource allocation techniques and its...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Nov 2013

    Fault Injection Test Bed for Clock Violation

    In this paper, the International Data Encryption Algorithm (IDEA) algorithm synthesis models will be used as test encryption algorithm. The Xilinx digital clock manager component will be used for generation of clocks for different frequencies and phase shifts. The encryption output with faults introduced and without faults introduced is compared...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2013

    A Hybrid Approach for Enhancing the Capability of Spam Filter

    Electronic mail (e-mail) has become a promising component for Internet users. The most common problem observed in maintaining email inbox is the incoming spam mails. In this paper, a hybrid approach for enhancing the capability of spam filter is proposed. This hybrid approach has defined the best features like whitelisting,...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2013

    A Survey on Enhancing the Efficiency of Various Web Structure Mining Algorithms

    With the fast pace in internet technology, users get easily confused in large hyper text structure. Providing the relevant information to user is primary aim of the website owner. In order to achieve this goal, they use the concept of web mining. Web mining is used to categorize users and...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jul 2012

    Bloom Filters & Their Applications

    A Bloom Filter (BF) is a data structure suitable for performing set membership queries very efficiently. A standard bloom filter representing a set of n elements is generated by an array of m bits and uses k independent hash functions. Bloom filters have some attractive properties including low storage requirement,...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jan 2013

    Risk-Aware Response Mechanism With Extended D-S Theory

    Mobile Ad-hoc NETworks (MANETs) are having dynamic nature of its network infrastructure and it is vulnerable to all types of attacks. Among these attacks, the routing attacks getting more attention because it's changing the whole topology itself and it causes more damage to MANET. Even there is lot of intrusion...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jan 2013

    Identifying the Number of Visitors to improve Website Usability from Educational Institution Web Log Data

    Web usage mining deals with understanding the visitor's behavior with a website. It helps in understanding the concerns such as present and future probability of every website user, relationship between behavior and website usability. It has different branches such as web content mining, web structure and web usage mining. The...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Feb 2013

    Data Transfer Security Solution for Wireless Sensor Network

    WSN is a wide growth area for specific resource limited application. Factor associated with technology like, the encryption security, operating speed and power consumption for network. Here, the authors introduce a mechanism for secure transferring of data is WSN and various security related issues. This energy-efficient encryption is a secure...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Feb 2013

    Web Services Based Information Retrieval Agent System for Cloud Computing

    Cloud computing is Internet based system development in which large scalable computing resources are provided \"As a service\" over the Internet to users and has attracted more and more attention from industry and research community. However, the concept of cloud computing does not provide facilities for the knowledge discovery and...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Mar 2013

    A Trusted Integrity Verification Architecture for Commodity Computers

    Trust is an indispensable part of the computing environment, the validity of any transaction or information depends heavily on the authenticity of the information source. In this paper, many mechanisms for ensuring the authenticity of the information source were developed, including password verification and biometrics. But as the attacks are...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Mar 2013

    A New Architecture for Group Replication in Data Grid

    Now-a-days, grid systems are vital technology for programs running with high performance and problems solving with large scale in scientific, engineering and business. In grid systems, heterogeneous computational resources and data should be shared between independent organizations that are scatter geographically. A data grid is a kind of grid types...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Mar 2013

    An Improvised Tree Algorithm for Association Rule Mining Using Transaction Reduction

    Association rule mining technique plays an important role in data mining research where the aim is to find interesting correlations between sets of items in databases. The Apriori algorithm has been the most popular techniques in finding frequent patterns. However, when applying this method a database has to be scanned...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Mar 2013

    Advanced Authentication Scheme Using Multimodal Biometric Scheme

    Fingerprint recognition has attracted various researchers and achieved great success. But, fingerprint alone may not be able to meet the increasing demand of high accuracy in today's biometric system. The purpose of the authors' paper is to inspect whether the integration of palmprint and fingerprint biometric can achieve performance that...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Apr 2013

    A Review of Machine Learning Based Anomaly Detection Techniques

    Intruders may be from outside the host or the network or legitimate users of the network. Intrusion detection is the process of monitoring the events that are occurring in the systems or networks and analyzing them for signs of possible incidents, which are violations or threats to computer security policies,...

    Provided By International Journal of Computer Applications Technology and Research