International Journal of Computer Applications

Displaying 1-40 of 7093 results

  • White Papers // Jun 2015

    A Protocol Design for Ubiquitous Object Categorization and Communication Through Query Language

    An autonomous and intelligent computing object that can be accessed by anything, anytime and anywhere is known as ubiquitous object. An environment in which these objects are present is known as ubiquitous computing environment. Advancement in computing technologies resulting in the growth of computer technologies and computer based applications; there...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    Test Scheduling of Stacked 3D SoCs with Thermal Aware Considerations

    Today's electronic designs have become prone to errors and defects due to the ever increasing complexity and compactions. This has resulted into imparting of much more importance to VLSI testing. Testing is mandatory and has to be performed on each manufactured product. Low cost and good defect coverage are the...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    Performance Analysis of Dual Core, Core 2 Duo and Core i3 Intel Processor

    Performance analysis is a more efficient method of improving processor performance. This paper discusses heavily on performance analysis of dual core, core 2 duo and core i3 Intel architectures. The paper described the evolution of Intel architectures and gave the reason for testing the performances of the systems. All experiment...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    Performing Big Data Over Cloud on a Test-Bed

    Data analytics has been rapidly growing in a variety of application areas like mining business intellect for processing the huge amount of data. MapReduce programming paradigm adds itself well to these data-intensive analytics jobs, given its one of the well-known ability to scale-out and force several machines to parallel process...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    Business Innovation with Enterprise Architecture

    Enterprise architecture serves as a business concept for optimization and facilitation of internal business processes along with technical aspects of business. Despite the evident benefits, the integration of architecture may cause detrimental effects and additional risks for any perspective company. Organizations occupied in innovation business are actively incorporating EA principles...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    Review Paper on Fast DHT Algorithm Using Vedic Mathematics

    Digital Signal Processing (DSP) includes processing of data in various domains based on their applications. DSP has vast applications in various fields such as space, medical, commercial, industrial and scientific. Each requires processing of vast data for collecting useful information. Discrete Hartley Transform (DHT) is one of the transform used...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    Efficient High Utility Itemset Mining Using Utility Information Record

    High utility item sets refer to the sets of items with high utility like profit in a database and efficient mining of high utility item sets plays an important role in many real life applications and is an important research issue in data mining area. In recent years, the problems...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    An Improved End to End System for Sharing and Managing Data in Cloud Storage

    Cloud computing is one of the emerging area in modern times. It is providing excellent facilities due to its adaptable infrastructure and features, but the issues related to trust management and security are key challenges in various applications. Whenever data or information is shared or transmitted from one host to...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    Identifying SOA Security Threats Using Web Mining

    The Service Oriented Architecture (SOA) became a dominant paradigm for enterprise computing. The web services are the implementation of SOA that works for heterogeneous platforms as they use common Internet protocols for communication and simple text format such as XML for data representation. The basic SOA architecture does not contain...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    A Neuro-Fuzzy Integrated Clustering for Weather Knowledge Analysis

    Weather information processing and knowledge extraction is one of the challenging applications of data mining. This process area requires authenticated and intelligent processing to obtain accurate information from the knowledge set. In this paper, an intelligent clustering mechanism is defined to acquire such information. This neuro-fuzzy based model is applied...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    Audio Classification Based on Association and Hybrid Optimization Technique

    In pattern recognition areas and data mining, audio data classification is a most important topic. This paper describes a new classification method, where Optimal classification Rule Extraction for multi-class Audio Data (O-cREAD). This classification method uses a new hybrid optimization approach for extracting optimal classification rules and then these optimal...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    State of the Art of Big Data Analytics: A Survey

    In the recent times, the amount of data are generated and stored by various industries are rapidly increasing on the internet thus data scientists are facing a lot of challenges for maintaining a huge amount of data as the fast growing industries require the significant information for enhancing the business...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    Consumer Behavior Analysis Through Network Captures Using Big Data

    For any business it is crucial to listen its target audience, understand market trends and must possess the ability to predict the future of the business. But understanding the mindset of the consumer has always been challenging for the businesses. Hence to understand the requirement of its customers and market...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    A Comparative Study on Dynamic Scheduling of Real-Time Tasks in Multiprocessor System Using Genetic Algorithms

    Multiprocessors have evolved as powerful computing tools for executing dynamic real-time tasks. The continual evolutions of the multiprocessor and real-time systems in the last few decades have encouraged the research and development of a new and efficient algorithm for dynamic scheduling of real-time task in multiprocessor systems. This paper proposes...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    Top-K Query Processing Techniques in Uncertain Databases: A Review

    Traditional databases store relatively static data or solid facts on which queries are executed and answers are reflected on the current state of the database. Many applications involving large databases with uncertain data require various techniques to rank queries. Ranking queries (often called as top-k) are useful in answering most...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    Designing and Development of Database Testing Tool

    Tool enable user to perform all the operations from the beginning of data definition which includes creating, altering, dropping and truncate of table to the data manipulation that includes selecting, inserting, updating and deleting of data, which is followed by controlling them that is commit and reset. In data definition,...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    Customer Purchasing Behavior Using Sequential Pattern Mining Technique

    In this competitive world, wherever each organization or company must improve the people for collaborating within the market. For this improvement, they would like to grasp the client purchasing behavior. Presently data processing provides several techniques to enhance it. This paper is to shortcoming of the "Frequent pattern mining technique"...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    Extraction of Template Using Clustering From Heterogeneous Web Documents

    In general, a common template or layout is used to generate set of pages in websites. For example, Google book lays out the details like author name, book names, reviews or comments, etc. in the similar way in all of its book pages. The database provides different values to generate...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    Study of Power-Delay Characteristics of a Mixed-Logic-Style Novel Adder Circuit at 90nm Gate Length

    In this paper, the authors discuss a rail to rail swing, mixed logic style 1-bit 28 Transistor (28T) full-adder, based on a novel architecture. The performance metrics: power, delay and Power Delay Product (PDP) of the proposed 1-bit adder are compared with other two high performance 1-bit adder architectures reported,...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    Combined Partitioning Hardware-Software Algorithms

    In recent years, meta-heuristics have become increasingly interesting in solving combinatorial problems including hardware-software partitioning. In this paper, the authors present a comparative study between some algorithms which involve meta-heuristics based on Tabu-search, genetic algorithm and binary search trees to address the problem of hardware-software partitioning. In fact, meta-heuristics can...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    A Survey: Privacy Preservation Techniques in Data Mining

    Data mining tools aims to find useful patterns from large amount of data. These patterns represent information and are conveyed in decision trees, clusters or association rules. The knowledge discovered by various data mining techniques may contain private information about people or business. Preservation of privacy is a significant aspect...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    Power and Area Efficient Design of 6T Multiplexer Using Transmission Gate Logic

    The main issue in designing of VLSI circuits is power consumption and area requirement. In this paper, multiplexer circuit is proposed with the help of transmission gate logic using 6 transistors. Different design methodologies are used for designing of multiplexer layout. Multiplexer is essential circuit for different field of network...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    Feature Selection by Mining Optimized Association Rules Based on Apriori Algorithm

    In this paper, the authors present a novel feature selection based on association rule mining using reduced dataset. This paper is to find closely related features using association rule mining method. Apriori algorithm is used to find closely related attributes using support and confidence measures. From closely related attributes a...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    Feature Evolving Data Streams Using SVM Kernel in the Multi Novel Class Detection

    There are many challenges which community faces in data mining, concerning with the data stream categorization. The four different issues of categorization viz. infinite length, concept drift, concept, development feature and development. Due to infinite length of data, it is impossible to store and use the traditional data. Many researchers...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    Area Efficient Design Analysis of Carry Look Ahead Adder

    In this paper, the authors provide a low power solution for very large scale integration. Power consumption of a circuit and its area occupied are major constraints for a VLSI designer. So, in this paper they focused mainly on these two parameters by using different design methodologies such as fully...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    A Novel Hybrid Clustering Techniques Based on K-Means, PSO and Dynamic Optimization

    Clustering is a process for partitioning datasets. This paper is a challenging field of research in which their potential applications pose their own special requirements. K-means is the most extensively used algorithm to find a partition that minimizes Mean Square Error (MSE) is an exigent task. The object function of...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    Survey on Data Processing and Scheduling in Hadoop

    There is an explosion in the volume of data in the world. The amount of data is increasing by leaps and bounds. The sources are individuals, social media, organizations, etc. The data may be structured, semi-structured or unstructured. Gaining knowledge from this data and using it for competitive advantage is...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    Energy-Efficiency Based Clustering and Data Aggregation for Wireless Sensor Networks

    In wireless sensor network is maximizing the lifetime of the network. All sensor nodes directly send information to the base station so the energy requirement is very high. The data collection mechanism comes at the cost of power consumption and packet collision. The authors introduce automatic time series modeling based...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    big.LITTLE Architecture: Heterogeneous Multicore Processing

    ARM's big.LITTLE architecture introduces a solution to optimize power consumption by selecting the core type most suitable for a level of processing load along with high performance. Using heterogeneous multi-core processing having high performance cortex-A15 with power efficient cortex-A7 is what big.LITTLE architecture follows to have power efficient system on-chip...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    Face Recognition Based on Oriented Complex Wavelets and FFT

    Biometrics is a secure and reliable authentication system based on physiological and behavioral characteristics of an individual. Biometrics acquires a prominent accessing technique in modern security applications like access to banks, ATM, computers and other transactions which needs authorized user for a claimed service. The advantage of biometric based access...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    Review on Hiding the Sensitive High Utility Itemsets

    The association rule mining is the traditional mining technique which identifies the frequent item sets from the databases and this technique generates the rules by considering the each items. The traditional association rule mining fails to obtain the infrequent item sets with higher profit. Since association rule mining technique treats...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    A Survey Paper On: Frequent Pattern Analysis Algorithm From the Web Log Data

    Web data mining is an emerging research area where mining data is an important task and various algorithms has been proposed in order to solve the various issues related to the web mining in existing dataset. This paper focuses the concept of data mining and FP-growth algorithm. As for FP-growth...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    Evaluating the Performance Estimators Via Machine Learning Supervised Learning Algorithms for Dataset Threshold

    Framework for user modeling is represented that is useful for both supervised and unsupervised machine learning techniques which will reduce the cost of development that is typically related to the knowledge-based approaches of machine learning for supervised approaches and user modeling that is basically required for the handling of the...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    An Optimized Association Rule Mining Using Genetic Algorithm

    Association rule mining technique that attempt to unearthing interesting pattern or relationship between data in large database. Genetic algorithm is a search heuristic which is used to generate useful solution for optimization and search problems. Genetic algorithm based evaluation in mining technique is backbone for mining interesting rule based on...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    Optimization in Power Usage of Smartphones

    The demand for Smartphones and mobile based applications is growing very fast since past few years. Thousands of applications on Google play store received millions of download. The growing Smartphone functionalities have increased its energy requirements. The applications provide amazing features and rich user interfaces; make use of hi-tech sensors...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    An Improved HDR Technique by Classification Method

    Now-a-days, HDR image is mostly used in applications of wide range such as next generation broadcast, digital cinema and digital photography, because of its high quality and its good expression ability. In the authors' paper, they have improved an HDR (High Dynamic Range) and changed it into multiple improved Low...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    An Enhanced Method to Mine Rare Item Sets using Multiple Item Sets Support based on CP-Tree

    Rare association rule is an association rule consisting of rare items. Frequent Pattern (FP)-growth is an approach for utilizes the preceding knowledge providing by the user at the time of input and discovers frequent patterns with a two scan on the transactional dataset. The authors are presented a CP-tree (Compact-Pattern...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    Review on Database Access Control Mechanisms and Models

    The recent rapid explosion of web based applications and information system have further increased the risk exposure of databases and thus, data protection is today more crucial than ever. It is more important to protect data not only from external intruders but also internal intruders. In this paper, different access...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    Effective Product Ranking Method Based on Opinion Mining

    As internet is spreading out its bound, the demand of online transaction is also getting considerably increased. Now, everyone wants fast and direct to home service without tacking any efforts. Online shopping is a way of effective transaction between money and goods which is done by end user without spending...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    Identification of Similar Strings in a Dataset using Scalable Join

    Similarity, join plays an important role in data integration and cleansing, record linkage and data de-duplication. It finds similar sting pairs from collections of strings. If two strings are similar they share a common token. Number of approaches has been proposed for in-memory string similarity joins. But due to the...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2011

    Comparative Study of Radio Propagation and Mobility Models in Vehicular Adhoc Network

    VANET (Vehicular Adhoc NETwork) has gained interest all over the world, many projects and research communities are working for the deployment of VANET. The main objective of these projects and researches are to develop protocols and tools to provide adequate wireless communication between vehicles. As one all know that these...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2011

    Communication in Network Using Wavelet Transform

    Huge amounts of digital visual data are stored on different media and exchanged over various sorts of networks nowadays. The authors propose new measures and techniques for encryption of image. They show that both statistical and pattern classification techniques using the proposed measures provide reasonable discrimination schemes for detecting embedding...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2011

    A Novel RSRM Algorithm for Mining Services for Better Enhancement in Small HandHeld Devices

    This paper presents a case study on data mining services able to support decision makers in strategic planning for the enhancement of small handheld devices. The application provides e-Knowledge services for the analysis of territorial dynamics by processing and modeling huge amount of data, in order to discover rules and...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2011

    Experimental Evaluation of TCP BIC and Vegas in MANETs

    The tremendous growth of wireless networks demands the need to meet different congestion control algorithms for wireless network. Usual transmission control protocol reduces its performance by misinterpreting mobility losses due to node motion as congestion losses in wireless mobility network. So the congestion control algorithms have important role in the...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2011

    Performance Analysis of MN Equalizer Based Minimum Mean Square Error (MMSE) Receiver for MIMO Wireless Channel

    The effect of fading and interference effects can be combated with equalizer. This paper analyses the performance of MMSE equalizer based receiver for MIMO wireless channel. The BER characteristics for the various transmitting and receiving antenna is simulated in mat lab tool box and many advantages and disadvantages the system...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2011

    Virtual Cylindrical View of a Color Image for Its Permutation for an Encryption Purpose

    This paper presents a novel algorithm for row and column permutation of pixels for the purpose of image encryption. The algorithm introduces a virtual cylinder surrounding an image and a virtual viewer looking at it, but displaced from an original position. The key idea is based on the assumption that...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Accessing Remote Application Without Installation at Host End Through Cloud Computing

    Cloud computing is an upcoming efficient networking computing environment. The work proposes sharing an application across various clients of a host system via cloud computing. The sharing is performed between the host storage system and the remote storage system in a cloud computing environment. The Host storage device of the...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Cloud Computing - A Hope for the Rural India

    Rural population being the majority of Indian population has the potential of making India an economic superpower and a developed country but in the present scenario this majority is completely oblivious to the power and capability of Information technology in improvement of business opportunities and employment because of the huge...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Performance Analysis of Proactive and Reactive Routing Protocols for Ad Hoc Networks

    Mobile Ad hoc networks are the collection of wireless nodes that can exchange information dynamically among them without pre-existing fixed infrastructure. Because of highly dynamic nature, performance of routing protocols is an important issue. In addition to this routing protocols face many challenges like limited battery backup, limited processing capability...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2010

    Analyzing Core Migration Protocol Wireless Ad Hoc Networks by Adopting Multiple Nodes Diverse Test-bed

    A number of application level multicast protocols have been proposed for core selection and core migration in Mobile Ad Hoc Networks. Core migration is necessary to minimize any disruptions on the transmission of data due to the changes in tree structure and to achieve improvement in the delivery of media...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2010

    Classification of Current Routing Protocols for Ad Hoc Networks - A Review

    An ad hoc wireless network is a collection of two or more devices or nodes or terminals with wireless communications and networking capability that communicate with each other without the aid of any centralized administrator also the wireless nodes that can dynamically form a network to exchange information without using...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks

    Appropriate routing protocol in data transfer is a challenging problem of network in terms of lower end-to-end delay in delivery of data packets with improving packet delivery ratio and lower overhead as well. This paper explains an Effective and Scalable AODV (called as AODV-ES) for Wireless Ad hoc Sensor Networks...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2010

    Load-Balancing Approach for AOMDV in Ad-Hoc Networks

    Routing protocol is a challenging issue in ad hoc networks. It has been studied thoroughly these years. However, most routing protocols in ad hoc network do not consider the problem of load balance. This paper presents an effective scheme to balance the load in ad hoc network. Ad-hoc On demand...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Black Hole Attack Prevention in Multicast Routing Protocols for Mobile Ad Hoc Networks Using Certificate Chaining

    Security in wireless ad-hoc networks is a complex issue. The wireless and dynamic nature of ad-hoc networks makes them more vulnerable to security attacks when compared with fixed networks. The existing routing protocols are optimized to perform the routing process without considering the security problem. Black hole attack is one...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Secure Group Communication Using Multicast Key Distribution Scheme in Ad Hoc Network (SGCMKDS)

    In Recent years, secure communications have become a important subject of research. The new service for wireless and wired networks is to provide confidentiality, authentication, authorization and data integrity. Security has always been a sensitive issue. In fact, this service becomes necessary to protect basic applications, especially E-commerce and bank...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Performance Characteristics of Cluster - Based Multicast Key Distribution Scheme for Mobile ADHOC Networks

    Many emerging commercial and military applications require secure multicast communication in adhoc environments. Secure multicast communication in mobile adhoc networks is challenging due to its inherent characteristics of infrastructure-less architecture with lack of central authority, high packet loss rates and limited resources such as bandwidth, time and power. Hence key...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2010

    Performance Analysis of AODV & DSR Routing Protocol in Mobile Ad Hoc Networks

    Mobile Ad hoc NETwork (MANET) is an autonomous system of mobile nodes connected by wireless links. Each node operates not only as an end system, but also as a router to forward packets. The nodes are free to move about and organize themselves into a network. These nodes change position...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2010

    A QoS-Based Resources Reservation Mechanism for Ad Hoc Networks

    For the last several years, there has been a significant increase of interest in supporting Quality of Service (QoS) constraints in Mobile Ad Hoc Networks (AHNs). AHNs include mobile nodes with limited capacities and communication resources. This specificity makes existing solutions for wired networks little suitable and a broad range...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Traffic Pattern Based Performance Comparison of Reactive and Proactive Protocols of Mobile Ad-Hoc Networks

    The primary objective of this paper is to study and investigate the performance measures of Reactive protocols (AODV, TORA) and Proactive protocols (DSDV) routing protocols of MANET using TCP & CBR based traffic models. This paper will simulates the environment used for analyzing, evaluating and implementing AODV, DSDV and TORA...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2010

    PROFIDES - Profile based Intrusion Detection Approach Using Traffic Behavior over Mobile Ad Hoc Network

    Intrusion Detection in MANET is one of the major concern in peer to-peer networking scenario where mobile / wireless nodes communicate with each other without any pre-defined infra-structural setup. This paper presents an overview of various intrusion detection models, identifying its issues, discusses on design and proposes an intrusion detection...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2010

    A Study on the Behavior of MANET Routing Protocols with Varying Densities and Dynamic Mobility Patterns

    Mobility and node density are the two major factors which has much influence on the performance of any routing protocol of mobile ad hoc network. Several previous works highlighted this fact. This paper will evaluates some of the widely used MANET routing protocols with different mobility and network density. The...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2011

    Design and Development of a Secured Routing Scheme for Mobile Adhoc Network

    The development of mobile ad hoc network advocates self-organized wireless interconnection of communication devices that would either extend or operate in concern with the wired networking infrastructure or, possibly, evolve to autonomous networks. Unlike traditional wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2010

    Optimized Routing in Mobile Ad Hoc Networks Using Evolutionary Location Intelligence

    Evolutionary Location Intelligence on implementing a position based routing, that make forwarding decision based on the geographical position of a packet's destination is concentrated in this paper. One distinct advantage of this model is not necessary to maintain explicit routes. Position based routing does scale well even if the network...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2010

    A Literature Review of Security Attack in Mobile Ad-Hoc Networks

    Security is a major concern for protected communication between mobile nodes in a hostile environment. In hostile environments adversaries can bunch active and passive attacks against intercept able routing in embed in routing message and data packets. In this paper, the authors focus on fundamental security attacks in Mobile adhoc...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2010

    Fuzzy-Controlled Power-Aware Routing Protocol (FPRP) for Mobile Ad Hoc Networks

    In multi-hop wireless ad-hoc networks, designing energy-efficient routing protocols is critical since nodes are power-constrained. However, it is also an inherently hard problem due to two important factors: First, the nodes may be mobile, demanding the energy-efficient routing protocol to be fully distributed and adaptive to the current states of...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Performance Analysis of Congestion Control in Mobile ADHOC Grid Layer

    Mobile Ad Hoc Grid deals with the challenges in resource discovery and job scheduling due to its mobility and power consumption. In this paper a new grid computing technique is implemented to manage the congestion control with job scheduling. The proposed addition of the mobile ad hoc network with in...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Detection and Removal of Cooperative Black/Gray Hole Attack in Mobile ADHOC Networks

    Mobile Ad hoc NETworks (MANET) are widely used in places where there is little or no infrastructure. A number of people with mobile devices may connect together to form a large group. Later on they may split into smaller groups. This dynamically changing network topology of MANETs makes it vulnerable...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2010

    Highly Ensured QOS Routing in Mobile Ad Hoc Networks Based on Multiple Constraints

    Routing protocols for mobile ad hoc networks have been explored extensively in the past years. Most of the work is aimed at finding a shortest path between the source and the destination, without considering the network performance influencing factors like present network traffic, movements and application requirements etc. In the...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2010

    On Demand Temporary Parallel Route Recovery for Frequent Link Failure in Adhoc Networks

    Adhoc network is collection of wireless mobile nodes dynamically forming a temporary network without the use of existing network infrastructure of centralized administration. Each node acts as a router by itself and forwards all the packets which it receives. This concept is basically useful when there is a very high...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2010

    Implementation of Mobile Intrusion Detection Controller [MIDC] for Affording Secure Service in MANET Environment

    In this new millennium most of the transactions depend on wireless network. In this context highly secured transaction of information is the need of the hour. During the transaction there must not be any loss of information or there should be no intrusion to assure the secured data transmission. There...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2010

    MAC Enhancements to Support Quality of Services (QoS) in Ad Hoc Wireless Networks: EMACA (Enhancement of Multiple Accesses with Collision Avoidance)

    Ad hoc Wireless Network (AWN) is a collection of mobile hosts forming a temporary network on the fly, without using any fixed infrastructure. QoS (Quality of Service) is the idea that transmission rates, error rates, and other characteristics can be measured, improved, and to some extent guaranteed in advance in...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2010

    Performance Evaluation of Routing Protocol and Congestion Control Protocol in Wireless Multi-hop Networks

    Computer networks have long suffered from congestion. Congestion occurs when an increase in the offered load results in a decrease in the effective throughput of the network. The basic cause is that the short term packet arrival rate at some gateway exceeds its service rate. Existing congestion control schemes treat...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2010

    An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs

    Mobility management is a major challenge in Mobile Ad hoc NETworks (MANETs) due in part to the dynamically changing network topologies. For mobile sensor networks that are deployed for surveillance applications, it is important to use a mobility management scheme that can empower nodes to make better decisions regarding their...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Routing Misbehavior in Ad Hoc Network

    Rushing attack may cause more vulnerability in MANET as it can be used as a pre-requisite for launching some other types of Denial of-Service attacks. Significant research efforts have been made towards increasing the survivability of MANET either by developing secure routing algorithms or by improving the robustness of MAC...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2010

    Mobile Agent as an Approach to Improve QoS in Vehicular Ad Hoc Network

    Vehicular traffic is a foremost problem in modern cities. Huge amount of time and resources are wasted while traveling due to traffic congestion. With the introduction of sophisticated traffic management systems, such as those incorporating dynamic traffic assignments, more stringent demands are being placed upon the available real time traffic...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2011

    Analytical Study the Performance Evaluation of Mobile Ad Hoc Networks Using AODV Protocol

    The Mobile Ad hoc NETworks (MANETs) have been communicating over wireless mesh channels and support multihop networks. Every node in the MANET is free to move independently in any direction. MANET is a kind of wireless mesh network which operates in Link Layer (LL) of Ad hoc networks. The current...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2010

    A Load Aware Routing Mechanism for Improving Energy Efficiency in Mobile Ad Hoc Networks

    Integration of Load Balancing mechanisms into routing protocols has elicited significant interest to alleviate congestion and improve the performance of on-demand routing protocols. For the sustained network functionality, load balancing mechanisms need to compute energy efficient paths with lesser traffic. Further severe degradation of network performance is observed due to...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Compression of Various Routing Protocol in Wireless Sensor Network

    Wireless Sensor Networks have emerged as an important new area in wireless technology. Wireless Sensor Networks (WSN) consists of numerous tiny sensors deployed at high density in regions requiring surveillance and monitoring. There are many existing protocol, techniques and concepts from traditional wireless network, such as cellular network, mobile ad-hoc...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2010

    Regular User Priority Scheme for Performance Improvement in 4G Network

    Wireless network are growing rapidly, leading to overloaded systems, unacceptable delays and increasing computational costs due to inefficient channel allocation strategy. Handoff call is more important over new call so it must provide some priority; this is the prime objective of all channel allocation strategy. This paper proposes regular users...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2010

    Broadband Frequency Domain-Based Air Interfaces for 4G Cellular Wireless Systems

    Future-generation cellular wireless systems, transporting high bit rates in non-ideal radio propagation environments, must be robust to severe frequency selective multipath. Further requirements include moderate terminal and base station hardware costs, high spectral efficiency, and scalability of the cost of terminals with respect to their maximum bit rate capabilities. Reconfigurable...

    Provided By International Journal of Computer Applications