International Journal of Computer Applications

Displaying 1-40 of 3909 results

  • White Papers // Mar 2014

    Network Attacks and Their Detection Mechanisms: A Review

    In computer networks, an attack is an attempt to steal, disable, destroy, alter, or gain unauthorized access to or make unauthorized use of an asset. With the development of large open networks, security threats for the network have increased significantly in the past few years. Different types of attacks possess...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2014

    Recognizing Spam Domains by Extracting Features From Spam Emails Using Data Mining

    In this paper, the authors attempt to develop an algorithm to recognize spam domains using data mining techniques with the focus on law enforcement forensic analysis. Spam filtering has been the major weapon against spam, but failed to reduce the number of spam emails sent to an indiscriminate set of...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2014

    Spam Email Detection Using Structural Features

    In recent years, the authors have witnessed a dramatic raise in the use of web and thus email becomes an inevitable mode of communication. This is the scenario where the attackers take advantage by the mode of spam mails to the email users and misguide them to some phished sites...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2014

    Ranking with Distance Based Outlier Detection Techniques: A Survey

    Data mining is the practice of automatically searching large stores of data to discover patterns and trends that go beyond simple analysis. Outlier detection is very much popular in data mining field and it is an active research area due to its various applications like fraud detection, network sensor, email...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2014

    Cloud Business Intelligence Survey

    Organizations are always seeking to become more intelligent and achieve a greater competitive advantage by using Business Intelligence (BI) solutions. The new phenomenon of business intelligence is how businesses handle data. One of the instruments that can make the BI tools more accessible is cloud computing. This paper outlines some...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2014

    An Analysis of Task Scheduling in Cloud Computing Using Evolutionary and Swarm-Based Algorithms

    Cloud computing is a popular computing paradigm that performs processing of huge volumes of data using highly available geographically distributed resources that can be accessed by users on the basis of pay-as-per-use policy. In the modern computing environment where the amount of data to be processed is increasing day-by-day, the...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2014

    Enhanced Preprocessing Algorithm of Information System for Law Enforcement Using Data Mining Techniques

    Most of the data collection techniques, like survey studies, field experiments, crime findings, etc., produce huge amount of information, where missing values are inevitable. A data preprocessing is a process of cleaning the data, data integration and data transformation. It intends to reduce some noises and inconsistent data. Data preprocessing...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2014

    Modified K-Means Algorithm for Effective Clustering of Categorical Data Sets

    Traditional k-means algorithm is well known for its clustering ability and efficiency on large amount of data sets. But this method is well suited for numeric values only and cannot be effectively used for categorical data sets. In this paper, the authors present modified k-means algorithms that can that can...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2014

    Data Analysis and Summarization to Detect Illegal VOIP Traffic with Call Detail Records

    Voice over Internet Protocol (VoIP) is an advanced area for researchers. Many different methods are used to send voice over IP networks. With the development of modern telecommunications equipments and software's telecommunication's malpractices are growing rapidly. Hence there is always a need for monitoring communications and guarantee both security and...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2014

    Ranking Prediction of Cloud Services Based on BPR

    Cloud is an advancing technology where the concept of service oriented architecture, distributed, autonomic, and utility computing is being utilized by various service providers. The current changing world is highly challengeable to build high-quality cloud application. Since QoS ranking that provide beneficial information for optimal cloud service selection is time...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2014

    A Bidder Behavior Learning Intelligent System for Trust Measurement

    With the spread of e-commerce fields over the world especially an online auctions segment, the problems of internet crimes increased in the last years. The online auctions face a serious problem of trust among the participants where users have no information about the others, and have no relations among them...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2014

    Stochastic Modelling of a Computer System with Hardware Redundancy

    In this paper, an effort for the stochastic analysis of a computer system has been made considering the idea of hardware redundancy in cold standby. The hardware and software failures occur independently in the computer system with some probability. A single server is employed immediately to conduct hardware repair and...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2014

    Agglomerative Clustering in Web Usage Mining: A Survey

    Web usage mining used to extract knowledge from WWW. Now-a-days, interaction of user towards web data is growing, web usage mining is significant in effective website management, adaptive website creation, support services, personalization, and network traffic flow analysis and user trend analysis and user's profile also helps to promote website...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2014

    A New Approach to Organize the Results of Searching the Web, Using a Combination of Ranking and Genetic Structure-Based Clustering

    Web mining means searching the web for find specific information. Web mining operation should be done in a way to give the best results to the user. Two of the best methods in this area are clustering and ranking web pages. The hereby-proposed method is a new approach which is...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    An Overview and Trends in Cloud Computing

    Cloud computing has emerged as a technology that has surrounded the user. The technology has become backbone within few years. Earlier technology which was used in networking was distributed computing. The cloud computing has change whole situation at present. With cloud computing virtual network, the capability of handling million of...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    A Review on Security Issues and Challenges of Mobile Cloud Computing and Preventive Measures

    Cloud computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements. Mobile Cloud Computing (MCC) is a revolution in the field of mobile world. Mobile cloud computing is...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    Secured Services in Cloud Computing Environment

    Securing data is always of vital importance and because of the critical nature of cloud computing and large amounts of complex data it carries, the need is even important. Cryptographic algorithms are one of the most important areas in security. They are processes that protect data by making sure that...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    Improvement of Quality of Service (QoS) Over a Wide Area Network (WAN) Using Multiprotocol Label Switching Traffic Engineering (MPLS-TE)

    Bandwidth refers to the amount of data that can be transmitted in a specific time over a wireless or wired medium. It is an important factor that is used to analyze network performance, design new networks, and understand the internet. Multi-Protocol Label Switching (MPLS) originated from tag switching and enables...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    Automated Creating a Data Warehouse from Unstructured Semantic Data

    The use and analysis of unstructured semantic data such as text files, semantic web, and etc which have been included the bulk of the available data sources, such as Internet due to their high volume and the extent of their resources is very complicated and time consuming process. In this...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    Weka: A Tool for Data Preprocessing, Classification, Ensemble, Clustering and Association Rule Mining

    The basic principle of data mining is to analyze the data from different perspectives, classify it and recapitulate it. Data mining has become very popular in each and every application. Though the authors have large amount of data but they don't have useful information in every field. There are many...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    A Survey on Phishing Attacks

    In the last few years, a large number of internet users are increasing additionally different companies, banks and service providers are providing services online. So various sensitive and financial data are becomes online now in these days. This aspect of internet users are an evolution for the users' but the...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    A Survey of Wireless Sensor Networks in Key Management Scheme

    In this paper, the authors present an entire study of Key Management Schemes for wireless sensor networks. Key Management Schemes (KMS) suggested in the literature, it is difficult for a warning network designer to learn exactly that KMS best connects in a certain WSN application. This review, that the KMS...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    Data Provenance Verification for Secure Hosts using Advance Cryptography Algorithm

    Malware is the intrusive program that affects computer operation and sensitive information of the host system. The objective is to protect such data and prevent malware from injecting fake keystroke into host network stack. The new technique Cryptographic Provenance Verification (CPV) uses a property known as data provenance integrity which...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    Data Mining Techniques for Informative Motif Discovery

    The discovery of motifs in biological sequence is a much explored and still exploring area of research in functional genomics since they control the expression or regulation of a group of genes involved in a similar cellular function. This paper explores the use of data mining techniques by various researchers...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    Learning Transfer Automatic Through Data Mining in Reinforcement Learning

    One of the problems in reinforcement learning is that as the environment becomes more complex, the number of parameters used in decision making increase which leads the users' to a slow decision making process. The main idea here is to come up with a new algorithm which is able to...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    Object Caching Design Framework for Improving Data Access Performance in Enterprise Applications

    In today's technological world, applications are designed to communicate across different interfaces and databases with high speed mode. The data communication between applications and the database needs accuracy as well as quick fire. There have been many designs implemented to reduce the transfer time. Caching is one of such attempt...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    Generalized Reliability Model for Cloud Computing

    Performance of cloud computing depends on effective utilization of resources and reliability. With resource allocation algorithms such as banker's algorithm resource utilization can be done in an effective manner in cloud computing. With reliability, the authors can estimate the fault tolerance capability of a system. Reliability improvement is largely dependent...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    MCSAuth: A New Authentication Mechanism for Cloud Systems

    Cloud computing has attracted a lot of attention in both academia and industry lately. With its focus on scaling, collaboration, agility, availability and cost reduction, cloud computing offers a compelling alternative to in-house IT solutions. However, by \"Outsourcing\" the computing infrastructure, it introduces a number of security issues. Specifically, since...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    Improving Results and Performance of Collaborative Filtering-Based Recommender Systems Using Cuckoo Optimization Algorithm

    An approach for improving quality and performance of collaborative filtering-based recommender systems is proposed in this paper. A slight change on similarity metric is proposed. To obtain more accurate similarity measurement between two users, similarity measurement method needs a well-chosen weight vector. Different weight vectors could be employed based on...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    Review on: Data Aggregation and Dynamic Routing in Wireless Sensor Network

    A Wireless Sensor Network (WSN) has important applications such as monitoring temperature, humidity, level, speed, remote environmental monitoring and target tracking. Main critical issue in sensor network is maximization of network lifetime. All sensor nodes are required large amount of energy to send and receive data; also it depends upon...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    Introducing Hybrid Model for Data Clustering Using K-Harmonic Means and Gravitational Search Algorithms

    Clustering is a process of extracting reliable, unique, effective and comprehensible patterns from database. Various clustering methods are proposed to accomplish exactness and accuracy of clusters. K-means is well known clustering algorithm but it easily converge to local optima. To overcome this drawback, an improved algorithm called K-Harmonic Mean (KHM)...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    Dominant Flow based Attribute Grouping for Indifferent Movement Detection in Crowd

    The growth of technology is heading security systems in a challenging way with amalgamation of different threats and vulnerabilities. Although it is becoming easier day-by-day to find out the abnormality in the ongoing video with advancement of technology in the field of video cameras, however it is still challenging to...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    Hybrid Approaches for Data Cleaning in Data Warehouse

    The quality of data can only be improved by cleaning data prior to loading into the data warehouse as correctness of data is essential for well-informed and reliable decision making. Data warehouse is the only viable solution that can bring that dream into a reality. The quality of the data...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    Knowledge Discovery from Static Datasets to Evolving Data Streams and Challenges

    Mining data streams has recently become an important active research work and more widespread in several fields of computer science and engineering. It has proven successfully in many domains such as wireless sensor networks, ATM transactions, search engines, web analysis and weather monitoring. Data steams can be considered a subfield...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    An Acknowledgement Based Intrusion Detection System Using ECDSA for Detecting Malicious Node in MANET

    Mobile Ad-hoc NETwork (MANET) is a group of wireless mobile nodes generating a network not by using any existing infrastructure. MANET is a collection of mobile nodes equipped with a wireless-transmitter and receiver that in contact with each other via bi-directional wireless links either directly or indirectly. An encroachment detection...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    An Algorithm for Automated View Reduction in Weighted Clustering of Multiview Data

    Clustering multiview data is one of the major research topics in the area of data mining. Multiview data can be defined as instances that can be viewed differently from different viewpoints. Usually while clustering data the differences among views are ignored. In this paper, a new algorithm for clustering multiview...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    A Trustworhty Model for Reliable Cloud Service Discovery

    Cloud computing is a new model for delivering new applications and services. Its adoption is gaining ground because most of the services provided by the cloud are of low cost and readily available for use. Despite many promises by the cloud service providers, users remain much concerned about the general...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    PSO Based Multidimensional Data Clustering: A Survey

    Data clustering is considered as one of the most promising data analysis methods in data mining and on the other side k-means is the well known partitional clustering technique. Nevertheless, k-means and other partitional clustering techniques struggle with some challenges where dimension is the core concern. The different challenges associated...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    A Novel Secure Remote User Authentication Protocol Using Three Factors

    According to the recent work done in the area of remote user authentication, biometrics based password authentication using smart card is the most interesting and upcoming technology. Many protocols has been designed aiming to combine three authentication factors efficiently in order secure the process of remote user authentication, but failed...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    Web Service Business Policy Customization through Finite State Machine based Semantic Representation

    In this paper, the authors propose a Finite State Machine (FSM) based approach for web service business policy customization that can address two key challenges: automated policy detection and evaluation and dynamic web service deployment. They have applied this technique on insurance domain in order to customize insurance policies for...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2010

    A Vision Based Hand Gesture Interface for Controlling VLC Media Player

    Human Computer Interaction can acquire several advantages with the introduction of different natural forms of device free communication. Gestures are a natural form of actions which the authors often use in user's daily life for interaction, therefore to use it as a communication medium with computers generates a new paradigm...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Comparison of Okumura, Hata and COST-231 Models on the Basis of Path Loss and Signal Strength

    Radio propagation is essential for emerging technologies with appropriate design, deployment and management strategies for any wireless network. It is heavily site specific and can vary significantly depending on terrain, frequency of operation, velocity of mobile terminal, interface sources and other dynamic factor. Accurate characterization of radio channel through key...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    A Survey of Energy Efficient Location Based Multipath Routing in MANET

    Mobile Ad-hoc NETwork (MANET) is a collection of mobile nodes that communicates with each other in the absence of centralized administration and fixed infrastructure. In MANET each node having a routing capability but their mobility swiftness are different and due to mobile behavior it is difficult to find out the...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    An Adaptive Particle Filtering Technique for Tracking of Moving Multiple Objects in a Video

    Tracking moving objects in a video is of critical importance in various fields such as traffic monitoring, video surveillance, human motion capture, etc. However, tracking multiple objects in a video is very challenging. To meet that, authors proposed a new adaptive technique for object localization through local and global appearance...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Constraint Based Data Mining Focusing Farming Case Study

    Data mining process may uncover thousands of patterns from a given data set; most of them may be unrelated to the users' interest. Also these rules occupy more memory space, take more time also require more efforts of the decision maker in analysis. To confine the search space users have...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    QoS Aware Reliable Cluster Based Routing Protocol (QoS-RCBRP) for Heterogeneous Mobile Ad-Hoc Networks

    Routing in mobile ad hoc network is an ever demanding research area. The aim of this research work is to design and develop QoS aware Reliable Cluster Based Routing Protocol (QoS-RCBRP) for heterogeneous mobile ad hoc networks. From the dense number of literatures it has been examined that when the...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Revised Modularity Index to Measure Modularity of OSS Projects with Case Study of Freemind

    Open Source Software (OSS) Projects are gaining popularity worldwide. Studies by many researchers show that the important key success factor is modularity of the source code. This paper presents the revised Modularity Index which is a software metrics to measure the modularity level of a java-based OSS Projects. To show...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    A Method for Calculating Frame Check Sequences in Tagged Ethernet Frames

    Like other technologies such as Internet Protocol (IP) or Transmission Control Protocol (TCP), an Ethernet frame also has a field to detect some errors occurred on transmission. This field is referred to as Frame Check Sequence (FCS). Usually, when an Ethernet frame conveys extra information on some feature such as...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    A Comparison and Analysis of Soft Computing Techniques for Content Based Image Retrieval System

    Content-based image retrieval has become one of the most active research areas in the past few years. In this paper various methodologies used in the research area of Content Based Image Retrieval methods using Soft Computing techniques are discussed. The comparison and analysis of various soft computing techniques like Fuzzy...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Implementation of Recursive Structural Parser for Symbolic Computation Using Mathematical Pseudo Language and Features of Java

    Symbolic Computation is a Computer Algebra System (CAS) which is developed to compute the symbolic mathematical expressions consisting simple or complex calculations. Symbolic Computation provides the interface to provide input expression in a typical mathematical format. Mathematical problems related to algebra, logarithm, roots, sum & product of series etc can...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Performance Analysis of Low Complexity Error Correcting Codes

    From Shannon limit it is known that, for a particular bandwidth and noise characteristics, there exists a maximum rate at which data can be transmitted with arbitrarily small number of errors. Coding schemes are utilized to improve the data transmission efficiency. The paper aims to represent the comparative performance analysis...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    BER Performance Analysis for Optical Communication Using DPSK Modulation

    In this paper, the authors explain and analyze Bit Error Rate (BER) performance for optical communication system using Differential Phase Shift Keying (DPSK) modulation scheme. Specifically, after developing an approximate form BER expression, they explain the BER performance for different system parameters such as fiber length, gain and number of...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Analytical Comparison of Some Traditional Partitioning Based and Incremental Partitioning Based Clustering Methods

    Data clustering is a highly valuable field of computational statistics and data mining. Data clustering can be considered as the most important unsupervised learning technique as it deals with finding a structure in a collection of unlabeled data. A Clustering is division of data into similar objects. A major difficulty...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Performance Analysis of Ubiquitous Wireless Connectivity in a 3G/IEEE 802.11 Integrated Network

    UMTS networks promise to offer always on, ubiquitous connectivity with relatively low data rates for moderate to high mobility users in macro cell environments. On the other hand, IEEE 802.11 (WLAN) offers much higher data rates, comparable to 3G and other wireless local area networks, to users with low mobility...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Extraction of Frequent Patterns From Web Logs Using Web Log Mining Techniques

    World Wide Web is a huge repository of web pages and links. It provides profusion of information for the Internet users. The growth of web is tremendous as approximately one million pages are added daily. User's accesses are recorded in web logs. Because of the incredible usage of web, the...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Analysis on Techno-Economic Benefits of a Strategically Placed Distributed Generator in a Radial Distribution System

    Integration of alternative sources of energy into a network for Distributed Generation (DG) requires small-scale power generation technologies located close to the loads served. The move toward on-site distributed power generation has been accelerated because of deregulation and restructuring of the utility industry and the feasibility of alternative energy sources....

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Frame Based Video Retrieval Using Video Signatures

    The World Wide Web today has grown so wide and the video-on-demand applications and video share web are becoming very popular day-by-day on the World Wide Web. An efficient video similarity search algorithm for content-based video retrieval is important in video-on-demand based services. However, there is no satisfying video similarity...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Review and Survey of Broadband Microstrip Patch Antennas

    Microstrip Patch Antenna (MPA) is generally used in modern communication devices, and a large part of day-to-day communication is done through it. Study of literature of past few year shows that, the leading work on MPA is focused on designing compact sized broadband microstrip antenna. But inherently MPA have narrow...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Optimization of Execution Time Using Association Rule Mining Algorithms

    The efficiency of mining association rules is an important field of Knowledge Discovery in Databases. The Apriori algorithm is a classical algorithm in mining association rules. This paper presents optimization of execution time for classicical apriori and an improved Apriori algorithm (DFR-Direct Fined and Remove) to increase the efficiency of...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    A Survey on Regression Test Selection Techniques on Aspect-Oriented Programming

    An aspect oriented programming is gaining a lot of popularity these days, there is a growing interest because of crosscutting concerns in object oriented systems. When the aspect oriented features are added into object oriented features the new program needs to be regression tested, and, to reduce the cost, Selection...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Design of Multiplier-Less Reconfigurable Non-Uniform Channel Filters Using Meta-Heuristic Algorithms

    Low complexity and reconfigurability are reported to be the key features in a Software Defined Radio (SDR). To obtain these features, a reconfigurable architecture based on Frequency Response Masking (FRM) technique can be used for the implementation of the channel filters in the SDR. The frequency response masking approach is...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    SPC for Software Reliability Using Inflection S-Shaped Model

    Traditional statistical analysis methods account for natural variation but require aggregation of measurements over time, which can delay decision making. Statistical Process Control (SPC) is a branch of statistics that combines rigorous time series analysis methods with graphical presentation of data, often yielding insights into the data more quickly and...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    A Modified Fuzzy Logic Routing for Wireless Mesh Network

    To make routing decisions based on more than one check, buffer residency, node energy and hop count and to provide an efficient routing method for wireless mesh networks, a fuzzy based oblivious routing is proposed in this paper. Simulation results in ns-2 verify that they perform better than multiple restriction...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    S-Box Design Analysis and Parameter Variation in AES Algorithm

    In this paper fundamental scrutiny of AES algorithm with the non serviceable aspects i.e. elevated performance, high throughput, and area efficiency is offered. A virtual analysis of DES, 3DES and AES is shown. This paper will present the theoretical analysis of parameter variations in the generation of the S-BOX. The...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Analysis of Community Behavior of Delay Tolerant Protocols

    In Delay Tolerant Networks (DTNs) constitute the category of Mobile Ad hoc Networks. They are characterized by the absence of end-to-end path connectivity with limited data sources and power. DTN is a field where intermittent data communication is always a challenging task. To overcome the network partitioning, node mobility is...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    A Hand to Hand Taxonomical Survey on Web Mining

    The data mining techniques exploitation in the field of web is referred as web mining. The enormous data is present at the websites and this need to be tackled well with the help of different data mining techniques. Searching, puling data together and analyzing the data are the main focus...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Modeling Aspects for Step and Bus Topologies Under Distributed Computing System

    The distributed computing approach has the several advantages over the old centralized computing approach like reduction of execution time and low cost involvement. Many researchers have applied the modeling concepts for the distributed computing system. The most popular approach is the object-oriented modeling also known as Unified Modeling Language (UML)...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Comparative Analysis of Variations of Ant-Miner by Varying Input Parameters

    Ant Colony Optimization (ACO) studies artificial systems that take inspiration from the behavior of real ant colonies and which are used to solve discrete optimization problems. ACO can be applied to the data mining field to extract rule-based classifiers. This paper presents variations of Ant-Miner named cAnt-Miner (Ant-Miner coping with...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Analysis of Popular Video Shot Boundary Detection Techniques in Uncompressed Domain

    Now days there are tremendous amount of videos available on internet. Entertainment video, news video, sports video are accessed by users to fulfill their different needs. User's daily routine systems are also producing huge amount of videos for example surveillance system, shopping malls, home videos etc. These videos need to...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Data Privacy in Data Engineering, the Privacy Preserving Models and Techniques in Data Mining and Data Publishing: Contemporary Affirmation of the Recent Literature

    Privacy preserving for data engineering methods like mining and publishing etc., with the advancement of the rapid development of technologies like Internet and distributed computing has turned out to be one of the most important research areas of interest and has also triggered a serious issue of concern in accordance...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    User Behavior Modeling Based on Adaptive Gaussian Mixture Model

    A remarkable technological development has been witnessed due to the recent advancements in the area of science and technology. This made the users to access the Internet and store the information retrieved in various databases at various servers across the globe, making World Wide Web as an information gateway. This...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Current Trends in Parallel Computing

    In this paper a survey on current trends in parallel computing has been studied that depicts all the aspects of parallel computing system. A large computational problem that cannot be solved by a single CPU can be divided into a chunk of small enough subtasks which are processed simultaneously by...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Using Social Networking Data as a Location Based Warning System

    Twitter and Facebook are huge social networks that contain a lot of data that can be used for sentiment analysis. The authors often find out that a particular area they travel to is dangerous, after asking around. However what if they could use social networking data like 'Tweets' to find...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Multi-Colony Ant Systems for Multi-Hose Routing

    Ant System (AS) is a general purpose heuristic algorithm inspired by the foraging behavior of real ant colonies. AS and its improved versions have been successfully applied to difficult combinatorial optimization problems such as travelling salesman problem, quadratic assignment problem and job shop scheduling. In this paper, two versions of...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    A Neural Network Based Real Time Hand Gesture Recognition System

    Hand Gesture is habitually used in everyday life style. It is so natural way to communicate. Hand gesture recognition method is widely used in the application area of Controlling mouse and/or keyboard functionality, mechanical system, 3D World, Manipulate virtual objects, Navigate in a Virtual Environment, Human/Robot Manipulation and Instruction Communicate...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    MPLS Traffic Engineering in ISP Network

    Multi Protocol Label Switching (MPLS) is an innovative and vibrant technology. The most famous applications of MPLS technology are MPLS VPN, MPLT Traffic engineering and MPLS QoS and Any Transport over MPLS (AToM). This study addressed only MPLS Traffic engineering, which is one of the driving factors of deploying MPLS...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Analysis of Adaptive Semiblind Channel Estimation Scheme with Missed Data Channel Estimation Schemes in MIMO Antenna System

    Multiple Input Multiple Output (MIMO) antenna systems are being given much attention to provide high capacity with less bandwidth requirement. In this paper, some channel estimation techniques have been tried to implement with the adaptive semiblind channel estimation scheme using less requirement of pilot symbols similar to as in the...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Unit Based Scheduling in Project Management: A Programming Approach

    A unit based scheduling technique is proposed to assess networks of the given project and find out the optimum schedule. The proposed approach uses an iterative method to execute unit expediting and the expedition is done to the desired amount for all activities along the critical path. The output of...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Extending the UCP Model by Incorporating the Prevailing Trends in Software Effort Estimation

    This paper is an extension of the original UCP Model for software estimation by incorporating the factors that are currently weighted in estimation of software by IT professionals. The rationale of the study is to make UCP Model effective, realistic and more accurate for the current IT industry. To identify...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Data Hiding Scheme for Digital Images Based on Genetic Algorithms with LSBMR

    Modern information hiding technology is an important branch of information security. Hiding capacity is very much important for efficient covert communication. The redundancies of digital media as well as the characteristic of human visual system make hiding technology a significant one. Steganography is the Art and Science of writing hidden...

    Provided By International Journal of Computer Applications