International Journal of Computer Applications

Displaying 1-40 of 6999 results

  • White Papers // Apr 2015

    A Hybrid Approach to Association Rule Hiding

    Data mining is a technique for summarizing and identifying similar patterns in data. Data mining can take different approaches and build different models depending upon the type of data involved and the objectives. In this paper, the authors follow the association rules approach for finding the correlation relationships among large...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Design of Multinode Reconfigurable Network based Multiprocessor Systems on Chip

    Multi-Processor System-on-Chip (MPSoC) platforms are becoming increasingly more heterogeneous and are shifting towards a more communication-centric methodology. Network-on-Chip (NoC) have emerged as the design paradigm for scalable on-chip communication architectures. As the system complexity grows, the problem emerges as how to design and instantiate such a NoC-based MPSoC platform in...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Design of Reconfigurable Multiprocessor Architecture for Embedded System

    Multiprocessing, as generally defined, is the use of two or more Central Processing Units (CPUs) within a single computer system. The term also refers to the ability of a system to support more than one processor and/or the ability to allocate tasks between them. Embedded systems are the brains of...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Database Security through Risk Assessment

    Database security is the foundation of the new electronic business, e-commerce and other business system including intranet and extranet users. The Internet and e-commerce uses have ballooned and India has become an emerging power in the IT enabled services field. As Internet accessing costs are falling user's increases and India...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Performance based Analysis of Cloudlet Architectures in Mobile Cloud Computing

    With modern Smartphones and powerful mobile devices, mobile apps provide many advantages to the community but it has also grown the demand for online availability and accessibility. Cloud computing is provided to be widely adopted for several applications in mobile devices. However, there are many advantages and disadvantages of using...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Efficient Classifier Generation over Stream Sliding Window using Associative Classification Approach

    Prominence of data streams has dragged the interest of many researchers in the recent past. Mining associative rules generated on data streams for prediction has raised greater research interest in recent years. Associative classification mining has shown better performance over many former classification techniques in data mining and data stream...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Bio Inspired Algorithms: An Efficient Approach for Resource Scheduling in Cloud Computing

    Nature plays a vital role in solving complicated problems in computer science. It helps user in finding the optimal desired way to solve extremely dynamic, difficult and robust problems. Bio inspired algorithm help them to cope with the technological need of a new era. Many researchers did enormous work in...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    An Optimizing Technique based on Genetic Algorithm for Power Management in Heterogeneous Multi-Tier Web Clusters

    The most serious drawback now-a-days is the power management because the web applications are becoming more sophisticated and their processing power is gradually increasing. Current cluster are designed to handle peak loads, where all servers are equally utilized. In practice, peak load conditions barely happen and clusters are most of...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Survey of Security Algorithms in Cloud

    Cloud computing refers to the delivery of computing resources over the web. Computing resources are shared rather than having personal devices to handle applications. Information is accessed simply at anywhere, anyhow by connecting users' device with web. Cloud computing is predicated on web services used for storing, transferring and lots...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    A Survey Paper on Wearable Sensors based Fall Detection

    Falling is often accepted as a natural part of the aging process elderly people are typically, more unsteady and frailer. Thus are more likely to fall and be injured than younger individuals. Falls can have a serious effect on both the quality of life of elder people and on health...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Enhanced Integrated Approach to Predict Web User's Future Requests using K-Means and FP-Growth

    The tremendous growth in the World Wide Web has led to the user perceived latency when requesting for resources from the web servers. Millions of users are connected to the web server for different needs. To improve the performance of the servers, caching is used where the frequently accessed pages...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    A Novel Approach using XMI Log Generation Cryptography and Mining Techniques for to Enhance Security of Data

    Security is the major issue in IT sector because data of an organization is an important asset for them. The information can be there client or customer contacts or it may be the information about their accounts, in short that information is very confidential information that they never want to...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Web Log based Analysis of User's Browsing Behavior

    In the increasing craze of internet has geared a number of modern firms for using web technology in their day-to-day lives. A remarkable ability to analyze web log data is provided to them by the web mining technology that is putatively full of information, but frequently lacking with meaningful information....

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    A Novel Privacy Preserving Public Appraising Mechanism for Shared Data Distribution in the Cloud

    Cloud server is a model for enabling suitable, on-demand network access to a shared pool of resources that can be rapidly provisioned and released with cloud service provider communication. However, public appraising for such shared data while conserving uniqueness of system leftovers to be an open challenge. In this paper,...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Privacy Preserving using Data Partitioning Technique for Secure Cloud Storage

    Cloud computing is a utility computing such as pay-as-you-go computing, illusion of infinite resources, no upfrontcost and fine grained billing. User's store their large amount of data on a cloud severs at remote place without worrying about storage correctness as well as information Integrity. So that users can option to...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Association Rules Optimization using Artificial Bee Colony Algorithm with Mutation

    In data mining, association rule mining is one of the popular and simple methods to find the frequent item sets from a large dataset. While generating frequent item sets from a large dataset using association rule mining, computer takes too much time. This can be improved by using Artificial Bee...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Modified Fine-grained Data Access Control Algorithms for File Storage Cloud

    Cloud computing is an emerging technology and it is used where computation, data manipulation and information sharing are needed. As number of cloud users is increasing day-by-day, which leads to various security issues like unauthorized and unnecessary service access. To provide access control or preventing unauthorized access of data stored...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Feasibility Study of Backtracking Algorithm for Virtual Cluster Migration in Cloud Computing

    Cloud Computing (CC) is an emerging field in which research scholars from academia and industry professional contribute their knowledge to understand and propagate the dimensions of its applications. One of the popular services in CC is Infrastructures as a Service (IaaS) by which the customers can rent a highly configured...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Efficient Data Dissemination Techniques in VANETs: A Review

    Vehicular Ad hoc NETworks (VANETs) being a sub class of MANET is a challenging field of wireless communication. It is a sensible way of using infrastructure fewer networks augmented with Intelligent Transportation System (ITS). It is an emerging trend now-a-days for vehicles to be equipped with an embedded on-board computing...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Review on Fault Tolerance Techniques in Cloud Computing

    With the immense growth of internet and its users, cloud computing, with its incredible possibilities in ease, quality of service and on-interest administrations has turned into a guaranteeing figuring stage for both business and non-business computation customers. It is an adoptable technology as it provides integration of software and resources...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Bisecting K-Means for Clustering Web Log data

    Web usage mining is the area of web mining which deals with extraction of useful knowledge from web log information produced by web servers. One of the most important tasks of Web Usage Mining (WUM) is web user clustering which forms groups of users exhibiting similar interests or similar browsing...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Synchronous CR-OLAP Tool for Efficient Parallel Computing

    Real Time OLAP (OnLine Analytical Processing), or RTOLAP, is the capability to quickly retrieve, aggregate, analyze and present multidimensional data for cubes whenever there are changes to the data in the relational data sources, without having to run heavy processing on the cube. A big advantage of real time OLAP...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Fuzzy Goal Programming Approach to Solve Linear Multilevel Programming Problems using Genetic Algorithm

    In this paper, the authors introduce a priority based Fuzzy Goal Programming (FGP) method for modelling and solving MultiLevel Programming Problem (MLPP) through Genetic Algorithm (GA). In model formulation, the individual best solution of objectives of each of the Decision Makers (DMs) is determined by using the GA method for...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Predicting Examination Results Using Association Rule Mining

    Higher education has changed a lot in the last decade. The use of various innovative techniques and technologies, especially ICT in teaching learning process is increasing day-by-day. Number of information systems has been developed and successfully implemented to support educational processes. These systems typically capture almost every data regarding a...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    FPGA Implementation of a Modified Turbo Encoder

    Turbo Convolutional Codes (TCC) are excellent error correcting codes, however TCC decoding based on A-Posteriori Probability (APP) algorithm is computationally complex and the complexity is not significantly reduced even if puncturing mechanism is used. To overcome the above disadvantage, turbo codes need to be concatenated with other coding techniques such...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    A Domain and Language Construct Based Mapping to Convert Natural Language Query to SQL

    DataBase Management Systems (DBMSs) have been widely used for storing and retrieving data. However, databases are often hard to use since their interface is quite rigid in co-operating with users. End user is required to issue SQL query to retrieve information from the database. Thus, a user cannot interact directly...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Improving Current Hadoop MapReduce Workflow and Performance

    In this paper, the authors propose an improvement and implementation of enhanced Hadoop MapReduce workflow that develop the performance of the current Hadoop MapReduce. This architecture speeds up the process of manipulating big data by enhancing different parameters in the processing jobs. Big data needs to be divided into many...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    A Low Power VLSI Implementation of STTRAM Based TCAM for High Speed Switching Circuits

    Ternary Content-Addressable Memory (TCAM) is often used in high speed search intensive applications such as ATM switch, IP filters. Hence, currently ZTCAM, is introduced which emulates the TCAM functionality with SRAM. It has some drawbacks such as low scalability, low storage density, slow access time and high cost. But, this...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    VLSI Implementation of Low Power Area Efficient Fast Carry Select Adder

    Carry SeLect Adder (CSLA) is one of the speedy adders utilized as a part of numerous computational frameworks to perform quick number crunching operations. The carry select adder utilizes an effective plan by imparting the Common Boolean Logic (CLB) term. The modified CSLA architecture building design has created utilizing Binary...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Design of NoC Router Architecture Using VHDL

    Network-on-Chip (NoC) is an advance design method of communication network into System-on-Chip (SoC). It provides solution to the problems of traditional bus-based SoC. It is widely considered that NoC will take the place of traditional bus-based design and will meet the communication requirements of next SoC design. A router is...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Interactive Technologies Utilization Model for University Relationship Marketing Strategies

    In this paper, the authors develop a usage model for interactive technologies for university marketing strategies, using a combination of the Task Technology Fit (TTF) model and the Information Systems Acceptance (ISA) model. Interactive technologies enables the universities to inexpensively engage their customers in one-to-one. Over the years, relationship marketing...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    A Survey on Energy Performance Improvement with Data Aggregation Techniques for WSN

    In the recent advance in science and technology, the communication system has been marching towards quick development. Wireless sensor network is one of the important blocks for communication. The major limiting factors in wireless sensor network are power consumption requirements, life time of network, data integrity and data confidentiality. Data...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Software Bug Detection Using Data Mining

    The common software problems appear in a wide variety of applications and environments. Some software related problems arises in software project development i.e. software related problems are known as software defect in which software bug is a major problem arises in the coding implementation. There are no satisfied results found...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Performance Analysis of Magnitude Comparator Using Different Design Techniques

    Comparators are a basic design module and element in modern digital VLSI design, digital signal processors and data processing application-specific integrated circuits. This paper comprises of design of three different comparators for 2, 4 and 8-bit magnitude comparison. The above said designs are prepared using two different design approaches: weighted...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Intelligent Task Allocation in Multi Core Environment

    The architectural advancements in desktop computing have made embedded devices in real-time applications to adopt multi-core architectures. Constrained power availability but ever increasing performance requirements are the main reason for this migration. Failure to allocate tasks to specific cores would result in some tasks running while other tasks in other...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    A Proposed Approach for Efficient Energy Utilization in Cloud Data Center

    Cloud computing has transmuted the IT industry on the whole and made easy to access the resources from anywhere and at any time. These resources can be accessed as a service rather than as a product. Clients pay for the service used as per their requirement. The huge demand of...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Spam Detection in Social Media Networks: A Data Mining Approach

    The ubiquitous use of social media has generated unparalleled amounts of social data. Data maybe texts, numbers or facts that is computable by a computer. A particular data is absolutely useless until and unless converted into some useful information. It is necessary to analyze this massive amount of data and...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Unsupervised Technique for Web Data Extraction: Trinity

    Search engine is a program which searches specific information from huge amount of data. So, for getting results in an effective manner and within less time this technique is used. This paper is having a technique which depends on two or more web documents which are generated from same server-side...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    High Performance Computing and Big Data Analytics - Paradigms and Challenges

    The advent of technology has led to rise in data being captured, stored and analyzed. The requirement of improving the computational models along with managing the voluminous data is a primary concern. The transition of the high performance computing from catering to traditional problems to the newer domains like finance,...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Algorithm to Monitor Suspicious Activity on Social Networking Sites Using Data Mining Techniques

    In today's world, social networks have become a platform to express opinions or feelings related to current events or any other topics. But, sometimes provocative posts related to renowned people, religion, sexuality, countries or any other sensitive topics create havoc in the society. Such posts must be administered and removed...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Performance Analysis of Proactive and Reactive Routing Protocols for Ad Hoc Networks

    Mobile Ad hoc networks are the collection of wireless nodes that can exchange information dynamically among them without pre-existing fixed infrastructure. Because of highly dynamic nature, performance of routing protocols is an important issue. In addition to this routing protocols face many challenges like limited battery backup, limited processing capability...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2010

    Analyzing Core Migration Protocol Wireless Ad Hoc Networks by Adopting Multiple Nodes Diverse Test-bed

    A number of application level multicast protocols have been proposed for core selection and core migration in Mobile Ad Hoc Networks. Core migration is necessary to minimize any disruptions on the transmission of data due to the changes in tree structure and to achieve improvement in the delivery of media...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2010

    Classification of Current Routing Protocols for Ad Hoc Networks - A Review

    An ad hoc wireless network is a collection of two or more devices or nodes or terminals with wireless communications and networking capability that communicate with each other without the aid of any centralized administrator also the wireless nodes that can dynamically form a network to exchange information without using...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks

    Appropriate routing protocol in data transfer is a challenging problem of network in terms of lower end-to-end delay in delivery of data packets with improving packet delivery ratio and lower overhead as well. This paper explains an Effective and Scalable AODV (called as AODV-ES) for Wireless Ad hoc Sensor Networks...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2010

    Load-Balancing Approach for AOMDV in Ad-Hoc Networks

    Routing protocol is a challenging issue in ad hoc networks. It has been studied thoroughly these years. However, most routing protocols in ad hoc network do not consider the problem of load balance. This paper presents an effective scheme to balance the load in ad hoc network. Ad-hoc On demand...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Black Hole Attack Prevention in Multicast Routing Protocols for Mobile Ad Hoc Networks Using Certificate Chaining

    Security in wireless ad-hoc networks is a complex issue. The wireless and dynamic nature of ad-hoc networks makes them more vulnerable to security attacks when compared with fixed networks. The existing routing protocols are optimized to perform the routing process without considering the security problem. Black hole attack is one...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Secure Group Communication Using Multicast Key Distribution Scheme in Ad Hoc Network (SGCMKDS)

    In Recent years, secure communications have become a important subject of research. The new service for wireless and wired networks is to provide confidentiality, authentication, authorization and data integrity. Security has always been a sensitive issue. In fact, this service becomes necessary to protect basic applications, especially E-commerce and bank...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Performance Characteristics of Cluster - Based Multicast Key Distribution Scheme for Mobile ADHOC Networks

    Many emerging commercial and military applications require secure multicast communication in adhoc environments. Secure multicast communication in mobile adhoc networks is challenging due to its inherent characteristics of infrastructure-less architecture with lack of central authority, high packet loss rates and limited resources such as bandwidth, time and power. Hence key...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2010

    Performance Analysis of AODV & DSR Routing Protocol in Mobile Ad Hoc Networks

    Mobile Ad hoc NETwork (MANET) is an autonomous system of mobile nodes connected by wireless links. Each node operates not only as an end system, but also as a router to forward packets. The nodes are free to move about and organize themselves into a network. These nodes change position...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2010

    A New Queuing Policy for Delay Tolerant Networks

    Recently there has been much research activity in the area of Delay Tolerant Networks (DTNs). There are several different types of DTNs depending on their characteristics. Routing is one of the key components in the DTN architecture. The basic principle behind the routing protocols for DTNs is store, carry and...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2010

    A Comparative Study of Gateway Discovery Protocol in MANET

    Connecting the wired and wireless networks particularly the Mobile ad hoc Network is integrated with Internet. Different mechanisms have been proposed to integrate MANETs and the Internet. These mechanisms are differing based on gateway discovery mechanism, and ADHOC routing protocol. When MANET is connected to the Internet, it is important...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2010

    Intrusion Response System in AODV for MANET

    The Mobile Adhoc NETwork (MANET) requires effective intrusion response system. This paper presents an intrusion response system that supports the infrastructureless nature of MANETs. This paper proposes a NHELLO and Link Layer based solution towards excluding malicious node which is robust against address spoofing from the attacker. In particular, the...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2010

    A QoS-Based Resources Reservation Mechanism for Ad Hoc Networks

    For the last several years, there has been a significant increase of interest in supporting Quality of Service (QoS) constraints in Mobile Ad Hoc Networks (AHNs). AHNs include mobile nodes with limited capacities and communication resources. This specificity makes existing solutions for wired networks little suitable and a broad range...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Traffic Pattern Based Performance Comparison of Reactive and Proactive Protocols of Mobile Ad-Hoc Networks

    The primary objective of this paper is to study and investigate the performance measures of Reactive protocols (AODV, TORA) and Proactive protocols (DSDV) routing protocols of MANET using TCP & CBR based traffic models. This paper will simulates the environment used for analyzing, evaluating and implementing AODV, DSDV and TORA...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2010

    PROFIDES - Profile based Intrusion Detection Approach Using Traffic Behavior over Mobile Ad Hoc Network

    Intrusion Detection in MANET is one of the major concern in peer to-peer networking scenario where mobile / wireless nodes communicate with each other without any pre-defined infra-structural setup. This paper presents an overview of various intrusion detection models, identifying its issues, discusses on design and proposes an intrusion detection...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2010

    A Study on the Behavior of MANET Routing Protocols with Varying Densities and Dynamic Mobility Patterns

    Mobility and node density are the two major factors which has much influence on the performance of any routing protocol of mobile ad hoc network. Several previous works highlighted this fact. This paper will evaluates some of the widely used MANET routing protocols with different mobility and network density. The...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2011

    Design and Development of a Secured Routing Scheme for Mobile Adhoc Network

    The development of mobile ad hoc network advocates self-organized wireless interconnection of communication devices that would either extend or operate in concern with the wired networking infrastructure or, possibly, evolve to autonomous networks. Unlike traditional wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2011

    Simulation Based Analysis of Adhoc Routing Protocol in Urban and Highway Scenario of VANET

    VANET (Vehicular Adhoc NETwork) research field is growing very fast. It has to serves a wide range of applications under different scenario (City, Highway). It has various challenges to adopt the protocols that can serve in different topology and scenario. This paper presents a comparative study of the adhoc routing...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2010

    Empirical Study of CSMA, MACA and EMACA Protocols to Support QoS Under Varying Conditions of Pause Time in Ad-Hoc Wireless Network by Resources of DSR Routing Protocol

    DSR routing protocol was used to evaluate the MACA and EMACA performance. Results show that the EMACA simulation performs well as compared to MACA in sense of Throughput, Total Packet Receive, Drop Packet Ratio and Average Jitter under varying conditions of Pause Time. This paper will try to change route...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2010

    Hint Based Power Efficient Routing Protocol for MANETs

    Energy Efficient Hint based routing Protocol (EEHP) in wireless networks is the problem of finding energy efficient shortest active path which also senses the node breakage before occurrence of disconnection and performs a handoff. In the existing Hint Based Routing Protocol (HBP), the nodes discover an active path to the...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2010

    A Framework to Prevent Mobile Sinks Accessing by Unauthorized Nodes in WSN

    Due to resource constraint nature of sensor nodes, the network suffers by computation and security problems. These nodes create a wireless sensor network that used sink stable or mobile as per required applications. Therefore, various traditional security techniques of the traditional networks are not possible to be applied on this...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2010

    Node Categorization Scheme (NCS) for Throughput Efficiency in Multi-Rate Mobile Ad Hoc Networks

    In multi-rate networks IEEE DCF 802.11 ensures long term equal channel access probability this in turn penalizes the faster stations in this networks. The maximum achievable throughput by any station gets bounded by the slowest transmitting peer. This leads towards the under utilization of the bandwidth. Another reason for bandwidth...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    ZRP Versus AODV and DSR: A Comprehensive Study on ZRP Performance

    Ad hoc networks are characterized by dynamic topology caused by node mobility, multihop wireless connectivity and channel non deterministic behaviour (Interference, multipath, hidden and exposed node problem makes the wireless channel very difficult to predict)This behaviour of Ad hoc networks must be analyzed in detail as a result of pairing...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2010

    On Demand Temporary Parallel Route Recovery for Frequent Link Failure in Adhoc Networks

    Adhoc network is collection of wireless mobile nodes dynamically forming a temporary network without the use of existing network infrastructure of centralized administration. Each node acts as a router by itself and forwards all the packets which it receives. This concept is basically useful when there is a very high...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2010

    Implementation of Mobile Intrusion Detection Controller [MIDC] for Affording Secure Service in MANET Environment

    In this new millennium most of the transactions depend on wireless network. In this context highly secured transaction of information is the need of the hour. During the transaction there must not be any loss of information or there should be no intrusion to assure the secured data transmission. There...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2010

    MAC Enhancements to Support Quality of Services (QoS) in Ad Hoc Wireless Networks: EMACA (Enhancement of Multiple Accesses with Collision Avoidance)

    Ad hoc Wireless Network (AWN) is a collection of mobile hosts forming a temporary network on the fly, without using any fixed infrastructure. QoS (Quality of Service) is the idea that transmission rates, error rates, and other characteristics can be measured, improved, and to some extent guaranteed in advance in...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2010

    Performance Evaluation of Routing Protocol and Congestion Control Protocol in Wireless Multi-hop Networks

    Computer networks have long suffered from congestion. Congestion occurs when an increase in the offered load results in a decrease in the effective throughput of the network. The basic cause is that the short term packet arrival rate at some gateway exceeds its service rate. Existing congestion control schemes treat...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2010

    An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs

    Mobility management is a major challenge in Mobile Ad hoc NETworks (MANETs) due in part to the dynamically changing network topologies. For mobile sensor networks that are deployed for surveillance applications, it is important to use a mobility management scheme that can empower nodes to make better decisions regarding their...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Routing Misbehavior in Ad Hoc Network

    Rushing attack may cause more vulnerability in MANET as it can be used as a pre-requisite for launching some other types of Denial of-Service attacks. Significant research efforts have been made towards increasing the survivability of MANET either by developing secure routing algorithms or by improving the robustness of MAC...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2010

    Mobile Agent as an Approach to Improve QoS in Vehicular Ad Hoc Network

    Vehicular traffic is a foremost problem in modern cities. Huge amount of time and resources are wasted while traveling due to traffic congestion. With the introduction of sophisticated traffic management systems, such as those incorporating dynamic traffic assignments, more stringent demands are being placed upon the available real time traffic...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2011

    Analytical Study the Performance Evaluation of Mobile Ad Hoc Networks Using AODV Protocol

    The Mobile Ad hoc NETworks (MANETs) have been communicating over wireless mesh channels and support multihop networks. Every node in the MANET is free to move independently in any direction. MANET is a kind of wireless mesh network which operates in Link Layer (LL) of Ad hoc networks. The current...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2010

    A Load Aware Routing Mechanism for Improving Energy Efficiency in Mobile Ad Hoc Networks

    Integration of Load Balancing mechanisms into routing protocols has elicited significant interest to alleviate congestion and improve the performance of on-demand routing protocols. For the sustained network functionality, load balancing mechanisms need to compute energy efficient paths with lesser traffic. Further severe degradation of network performance is observed due to...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Replacing Conventional Telephones by VoIP: Their Major Constraints & Solutions

    With the telecommunication traffic increasing each year, there is a need for developing a communication system which is more cost efficient. In this paper the authors have compared conventional telephone systems to VoIP communication and explored the possibility of replacing all conventional telephones using VoIP, the constraints faced by the...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2010

    Power Control Algorithms in Wireless Communication

    Radio resources in wireless communication systems, implementing different multiple access techniques, must be wisely managed. This perspective is pivotal since the variations in propagation channel are very fast. This complexity in the cellular system periodically contributes to different interference levels, high or low, resulting in the degradation of the system...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Cryptography and Steganography

    Cryptography and steganography, the art of transforming the code or the plain text into either the encrypted code or a pictures format, as used by the steganographic feature, is the matter of great deal in the modern world of the ruler "Security". Everyone in the entire scenario now emphasizes the...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    A Secure Multiparty Product Protocol for Preserving the Privacy in Collaborative Data Mining

    In the modern business world, collaborative data mining becomes especially important because of the mutual benefit it brings to the collaborators. During the collaboration, each party of the collaboration needs to share its data with other parties. If the parties don't care about their data privacy, the collaboration can be...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2010

    Implementation of Cloud Computing on Web Application

    Cloud computing is a new method to add capabilities to a computer without licensing new software, investing in new hardware or infrastructure or training new personnel. Applications are purchased, licensed and run over the network instead of users desktop. It provides common business applications online that are that are accessed...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Accessing Remote Application Without Installation at Host End Through Cloud Computing

    Cloud computing is an upcoming efficient networking computing environment. The work proposes sharing an application across various clients of a host system via cloud computing. The sharing is performed between the host storage system and the remote storage system in a cloud computing environment. The Host storage device of the...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2010

    A Model Based Approach to Implement Cloud Computing in e-Governance

    In the current scenario every enterprise wants to implement Cloud Computing to fulfill their computing needs. These changes naturally should reflect the way government functions in terms of the organization of the government, its relationship with its citizens, institutions and businesses and cooperation with other governments. The critical problem discussed...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Cloud Computing - A Hope for the Rural India

    Rural population being the majority of Indian population has the potential of making India an economic superpower and a developed country but in the present scenario this majority is completely oblivious to the power and capability of Information technology in improvement of business opportunities and employment because of the huge...

    Provided By International Journal of Computer Applications