International Journal of Computer Applications

Displaying 1-40 of 5819 results

  • White Papers // Jan 2015

    An Efficient Keystream for Cryptographic Applications

    The development of stream ciphers has been an effective protection tool for information security. The reliable data protection from the cryptographic point of view imposes the use of highly productive, generators of cryptographic keys in combination with sophisticated traditional algorithms. Now-a-days the use of stream ciphers is very important in...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Artificial Neural Network Based Electrocardiogram Classification for Biometric Authentication

    In this paper, Multi-Layer Perceptron (MLP) neural network model is used for the classification of ElectroCardioGram (ECG) signals. Out of twelve leads recorded lead II, single lead, is used for analysis. ECG samples from eight normal individuals are recorded regularly almost every month for thirty six months. Input to the...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Review of Nature Inspired Algorithms

    In the recent years, lots of researches have researched many algorithms so as to improve performance of the wireless sensor network for to save energy as well as network life time. A mobile ad hoc network MANET is a collection of mobile users node that communicate over wireless links. Research...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    SMEH: Stochastic Method of Energy Harvesting for Powering Up Mobile Phones

    The area of energy harvesting has seen various evolutions among the research community. Although various studies have been attempted to address the issues of energy harvesting in the past decade, but very few studies are focused on using RF energy from mobile phones explicitly. Hence, the prime motive of the...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    A Survey of Achieving Efficient Channel Condition Using Secure Channel Algorithm in Wireless Networks

    Wireless networking protocols square measure progressively being designed to use a user's measured channel condition. Every user reports its measured channel condition to a manager of wireless resources and a channel-aware protocol uses these reports to see however resources square measure allotted to users. In a channel-aware protocol, each individual...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Test Case Design Using Black Box Testing Techniques for Data Mart

    Data warehouse is a logical stockroom which accumulates and maintains enormous volume of data. It is very important for the enterprise that needs to analyze data obtained from heterogeneous sources to take tactical decisions. Any enterprise that wants to expand, survive and beat out the competition must have control over...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Effect of Cloud Computing on Enterprises: A Review

    Innovations are supreme to ride the spontaneous tide of change. Worst talented of enterprises are event to trim their computing jurisdiction look go away from the means of virtualization. This fondness of reducing the computing cost has led to the innovation of unsympathetic computing. Tarnish computing offers rectify computing through...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Use Case Application in Requirements Analysis Using Secure Tropos to UMLsec - Security Issues

    Information systems security is one of the most critical challenges presently facing nearly every one of the organizations. However, making certain security and quality in both information and the systems which control information is a difficult goal necessitating the mixture of two wide research disciplines which are typically separate: security...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    The Sway of Agile Processes Over Software Maintainability

    Software engineering is escalating in different dimensions at precipitous speed and coercing the developers and researchers to find new ways for easy and swift software development. The induction of agile methodologies is one such step towards achieving these goals. Today the agile processes and techniques are very extensively accepted and...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Development of a Hybrid Prediction Mechanism Using SMA and EXS Methods for GSM Logical Channel Load Variables

    In a GSM system, the physical channels carry different messages, depending on the information that is to be sent. These messages are carried via channels called logical channels (traffic and control). The logical channels loading impact on the network due to the nature of its variability. The GSM logical channel...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Implementation of Reversible Logic Gate in Quantum Dot Cellular Automata

    Quantum dot Cellular Automata (QCA) is a nanotechnology with many attractive features such as higher speed, smaller size, higher switching frequency, higher scale integration and low power consumption. There are many researchers have been reported on the design of reversible logic gates compared to the reversible TR. This paper proposes...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    A Survey: Deduplication Ontologies

    Cloud computing drive out the need of IT based companies to invest in high computing infrastructure and services used by them. In cloud, the data is dwell into set of networked resources that enable data to be accessed via virtual machines. These data centers are located in various parts of...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Topology Control with Radio Interference Detection in Wireless Sensor Network

    Wireless sensor network is a collection of small nodes with sensing environment that will make communication between nodes. Collision free communication in wireless network is performed by medium access control. Energy conservation is important in wireless sensor network that will be performed by topology control. Topology control will route the...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Zonal Based Deterministic Energy Efficient Clustering Protocol for WSNs

    Wireless Sensor Network (WSN) has gained a tremendous attention of researchers due to its vast applications. Wireless sensor network consists of small size and low powered smart sensor nodes deployed in the region to be monitored. Sensor nodes sense the data and send the sensed data to sink directly or...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Energy Conservation MAC Protocols with Low Duty Cycling for WSN: A Review

    The energy constraints in the wireless sensor network are under too much consideration. Since WSN is based on relay system and therefore each node participate in complete communication process either as a source, forwarding nodes or as a receiver. This paper presents critical reviews on recent development in various MAC...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Survey on Routing Protocols

    Recent advances in Wireless Sensor Networks (WSNs) over the last two decades has an more interest in the potential use in applications like combat field, security surveillance, border protection, disaster management. Moreover, researchers have termed the 21st century as the \"Sensor decade\" sensor nodes are remotely deployed in large numbers...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Analysis of Jellyfish Reorder Attack on ZRP

    MANETs are more susceptible to attacks than a wired network. High mobility, lack of central administration, etc. are some of the main causes. One of the DoS attacks known as Jellyfish attack is difficult to analyze as well as to detect in MANETs as Jellyfisher nodes follow all the protocol...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Global Positioning System for Object Tracking

    Global Positioning System (GPS) is globally used for the tracking and navigation purpose. GPS is mainly used in the military, farming, civil, transportation and commercial users around the world. Here in this paper, the authors describe how GPS Tracking System works and where it is useful in real world environment....

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Analysis of Non Simultaneous Sybil Attack on DSR

    Security is one of the most challenging issues in Mobile Ad-hoc NETworks (MANETs). Most of the routing protocols in MANETs do not have an inbuilt mechanism to fight security attacks. Sybil attack is one such attack in which a single physical device takes on multiple identities in network thus behaving...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    A Review on Workload Prediction of Cloud Services

    In cloud computing user pay only for the amount of services used. There are number of cloud service providers which can be selected on the basis of application needs. The models available for workload prediction of cloud environment till date are analytical or mathematical. The steps involved in capacity planning...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Radix Priority Search Tree in Circular Range Searching for GIS

    In this paper, the authors present a method for circular range searching in 2D geographical data for GIS. The proposed is based on the Priority Search Tree (PST) developed by the researcher. McCreight in the mid eighties. The Priority Search Tree is a data structure used for performing semi-infinite range...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Software Quality Assurance in Internet of Things

    Internet of Things (IoT) is increasing the connectedness of things and people on a scale that were not imaginable before. The pace of adoption of IoT in market is increasing due to ubiquitous computing and increase in the connectedness of machines and people. But very few parameters exist to check...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    A Review of Techniques Used in EPS and 4G-LTE in Mobility Schemes

    With the extensive proliferation of mobile applications and Smartphone's, there is an increasing trend of technical adoption of 3G (Third Generation). But, with the exponential growing of massive traffic, it is seen that even 3G network is completely not capable of catering to the dynamic needs of the customers. This...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    A Survey on Intrusion Detection Systems for Cloud Computing Environment

    Cloud computing is a newly emerged technology. It is getting popularity day-by-day due to its amazing services. The applications and services based on the cloud are emerging day-by-day. Due to networked nature of the cloud, resources, data and applications are vulnerable to the attack in cloud environment. So Intrusion Detection...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    A Cyber-Physical Stream Algorithm for Intelligent Software Defined Storage

    Software-Defined Storage (SDS) is a data storage infrastructure that allows software plays a significant role instead of merely relying on storage hardware. The paper presents a new cyber physical stream algorithm for selecting a predominant item from very large collections of data. The algorithm effectively works for frequencies of the...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Moment Based Object Classification From Shapes

    A flexible object recognition system is considered which can compute the good features for high classification of objects. To characterize an output class or object usage of appropriate features is vital for all classification problems. Moment invariant functions are very useful for object classification, regardless of its orientation, size and...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    A Modified AODV Routing Protocol to Avoid Black Hole Attack in MANETs

    Mobile Ad-hoc NETworks (MANETs) are composed of a set of stations (nodes) communicating through wireless channels, without any fixed backbone support in which nodes are allowed to join and leave the network at any point of time. MANETs are generally more vulnerable to information and physical security threats than wired...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Detecting Input Validation Attacks in Web Application

    Internet remains to blow up exponentially and has become more significant in the people everyday life, but this resulted in web application targeted by cyber crooks and hacker. The paper identifies vulnerability attacks caused due to inputs performed by a user which are not properly validated across the web application....

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Improving Mobile Money Security with Two-Factor Authentication

    Security is a leading factor for establishing and maintaining customer trust in Mobile Money Services (MMSs). MMSs in Tanzania rely on the use of Personal Identification Number (PIN) as an authentication method. However, a PIN can be easily guessed, forged or misused. This paper explores security challenges in MMSs and...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Routing Approaches for Wireless Sensor Network

    A WSN consists of a large number of sensor nodes typically hundreds or thousands. Each sensor node comprises of different components which work together to act like sensor and can sense for some particular application. In this paper, the authors describe the approaches for routing in Wireless Sensor Networks (WSNs)....

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Performance and Evolution of Routing Protocol DSR, AODV and AOMDV in MANET

    A Mobile Ad-hoc NETwork (MANET) is a collection of various number of mobile nodes connected through wireless links forming a temporary network without any type of fixed topology, centralized access point and infrastructure. A variety of routing protocols have been proposed and several have been extensively simulated. In this paper,...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Low-Cost IP Camera for Traffic Monitoring

    In this paper, the authors present the research conducted to provide low cost traffic monitoring solution to the ever increasing traffic congestion problems. The embedded system created is a low-power system that can replace the expensive and complicated systems that add up to the high installation and controlling costs. The...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    An Enhanced Integrated Solution for Identification and Elimination of Wormhole Attack in MANET

    Mobile Ad-hoc NETwork (MANET) is an infrastructure less, self controlled wireless network it doesn't need any centralized control so it can form and deform anywhere. Several freely movable mobile nodes with wireless connectivity can construct this type of network anywhere in no time, open connectivity and lack of central infrastructure...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    A Survey on Reliable and Congestion Control Transport Protocols of WSN

    A Wireless Sensor Network (WSN) is formed of spatially dispersed unmonitored sensor nodes connected via a transmission infrastructure, which is wireless, to cooperatively monitor, record and save physical or atmospheric conditions like temperature, pollutants, sound or motion. Transport layer protocols of wireless sensor networks, plays an important role in the...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Parallelization of Annotated Java Code in a Distributed Network

    Parallelism has been employed for many years, mainly in high-performance computing. The paper focuses towards a new parallel execution technique in a distributed network in which the java code is parallelized and independent code is executed on different system in accordance with the availability of the system resource in a...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Embedded Energy and Power Management System

    In this paper, Embedded Energy and Power Management System (EEPMS) to manage power consumption, automatic meter reading in home area is described. The EEPMS is a single phase digital kWh power meter with embedded Zigbee modem which utilize the Wireless sensor network to send its power usage reading using information...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Mining Historical Traffic Data Using Back Propagation Neural Network for Accurate Location Estimation

    The network technology is growing continuously and rapidly, their applications are also improved in the similar manner. Among these utilities and applications the location aware applications are also in high demand. These applications are required to evaluate more accurate positioning for improving the quality of applications services. Therefore, in this...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Performance of WSN by Minimizing Delay and Maximizing Lifetime

    Efficient use of energy in Wireless Sensor Network (WSN) to extends the network lifetime. In order to improve the lifetime of the Wireless Sensor Network (WSN). Sleep - wake scheduling is a valuable mechanism to extend the lifetime of these energy-controlled Wireless Sensor Networks (WSNs). Conversely, sleep - wake scheduling...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Surveillance of Smart Home Based on Mobile Alerts Through Wireless Sensors

    Since it is not possible to be at home and workplace at a single time but it is important to monitor the people family and most valuable possessions at home which can be made possible with pervasive technologies. In this paper, the authors present home alert notifications on mobiles with...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Implementation of LiSP Using Park-Miller for Wireless Sensor Network

    Wireless Sensor Networks (WSNs) continuous to grow and a rosining technology in networks. WSN used in many critical situations and applications. One of major application of the sensor network is use in military. Due to these reason securities is a major challenge for WSN. Wireless sensor networks have many topics...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A 64 Bits Dynamically Key Controlled Symmetric Cipher (KAMFEE-X64)

    This paper presents an improved version of KAMFEE cipher. The proposed cipher (KAMFEE-X64) is designed to be compatible with the new 64 bits microprocessors unlike the old cipher (KAMFEE) which is designed for systems based on x86 microprocessors. KAMFEE-X64 has a key dependent block length and key dependent rounds, enhanced...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A Review of Automatic Test Cases Generation

    Manual testing is hard and time consuming and it may be impossible for large systems or tester mistake in the test. The software testing is the rising cost of activities in development software and the test case generation is important activity in software testing. Hence researches performed to automate testing...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Multi Lingual Speaker Identification on Foreign Languages Using Artificial Neural Network

    Based on the Back Propagation Algorithm, this paper portrait a method for speaker identification in multiple foreign languages. In order to identify speaker, the complete process goes through recording of the speech utterances of different speakers in multiple foreign languages, features extraction, data clustering and system training. In order to...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A New Approach for Information Security Using Asymmetric Encryption and Watermarking Technique

    Rapid growth of internet and networked information systems has contributed a lot in the increase of multimedia contents. As digital contents are increasing day by day on internet it has raised requirement for the effective protection of multimedia assets (images, audios, videos). This paper proposes a new approach to protect...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A Design of Authentication and Access Control Model for Remote Access Using GSM Technologies

    The GSM technologies plays vital role in pervasive computing environments. The open and dynamic nature of the pervasive computing environment allows entities to join and leave frequently. This causes a large number of autonomous entities to interact in an ad-hoc manner, raising concerns as to the trustworthiness of the service...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Removal of Network Ambiguities Through Knowledge Based System

    Documents on the Internet are composed of several kinds of multimedia information when accessed for personal, entertainment, business, and scientific purposes. There are many specific content domains of interest to different communities of users. Extracting semantic relationships between entities from text documents is challenging task in information extraction. By semantics...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Lifetime Maximization of Wireless Sensor Networks Using Improved Genetic Algorithm Based Approach

    In Wireless Sensor Networks the nodes have limited energy and are seriously constrained by the battery life. To increase the lifetime of the network is a critical and challenging issue and thus it is the routing in WSNs, which is the primary focus of design for researchers. In this paper...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Innovative Performance Evaluation of Unnecessary Handoffs and Handoff Failures During Access Network Selection Between WLAN and Cellular Networks

    Received Signal Strength based (RSS) horizontal handoff algorithms have been most commonly used by nearly all second generation and third generation wireless networks in a homogeneous environment. Vertical handoffs or network selection algorithms are the terms coined due to integration and interoperability of existing wired and wireless access networks under...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Survey on Securing Data in Cloud

    Cloud computing is an innovative information system architecture which reduces the overall client side resource requirements. Even though the data outsourcing reduce the burden of client storage the clients no longer have physical possession of data which will leads to so many security issues. Hence the user need to make...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Multimodal Biometric System Using Iris, Palmprint and Finger-Knuckle

    Most real-life biometric systems are still unimodal. Unimodal biometric systems perform person recognition based on a single source of biometric information. Such systems are often affected by some problems such as noisy sensor data, nonuniversality and spoof attacks. Multibiometrics overcomes these problems. Multibiometric systems represent the fusion of two or...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    An Efficient Bee-Inspired Auto-Configuration Algorithm for Mobile Ad Hoc Networks

    The infrastructure-less and dynamic nature of Mobile Ad-hoc NETworks (MANETs) requires the implementation of a new set of networking technologies in order to provide efficient end-to-end communication according to the principles of the standard TCP/IP suite. Routing and IP address auto-configuration are among the most challenging tasks in the ad...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Broadband Microstrip S-Shaped Patch Antenna for Wireless Communication

    This paper presents a single-patch broadband microstrip S-shaped patch antenna. Microstrip S-shaped patch antenna, fed by a coaxial feeding. The antenna is designed by inserting two slots into rotated square patch then it look like english letter S. Because of the slots and thick substrate, bandwidth of antenna is increased....

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A Fuzzy Approach for Privacy Preserving in Data Mining

    Advances in hardware technology have increased storage and recording capabilities regarding individual's personal data. Privacy preserving of data has to ensure that individual data publishing will refrain from disclosing sensitive data. Data is anonymized to address the data misuse concerns. Recent techniques have highlighted data mining in ways to ensure...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Bank Locker Security System Based on RFID and GSM Technology

    The main goal of this paper is to design and implement a bank locker security system based on RFID and GSM technology which can be organized in bank, secured offices and homes. In this system only authentic person can be recovered money from bank locker. The authors have implemented a...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Survey of Integrating Testing for Componentbased System

    Today's software larger in size, design complex and time consuming to implement them, for this the authors need a prominent solution to overcome these problems. Component-Based Software Development (CBSD) has emerged as an Object Oriented (OO) Software Engineering approach that forced rapid software development. Using CBSE approach they can eliminate...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A Novel Approach of Speedy-Highly Secured Data Transmission Using Cascading of PDLZW and Arithmetic Coding with Cryptography

    The spread of computing has led to an outburst in the volume of data in the communication world. The paper proposes the cascading of two algorithms PDLZW and Arithmetic Coding with cryptography. With the hierarchical parallel dictionary set, the search time can be reduced significantly and all these dictionaries are...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Stock Market Prediction Model by Combining Numeric and News Textual Mining

    This paper proposes a novel method for the prediction of stock market closing price. Many researchers have contributed in this area of chaotic forecast in their ways. Data mining techniques can be used more in financial markets to make qualitative decisions for investors. Fundamental and technical analyses are the traditional...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Review of Fractal Transform Based Image and Video Compression

    Fractal Compression is a new technique in the field of color and video compression. This technique has grabbed much attention in recent years because of very high compression ratio that can be achieved. It also provides interesting interpolation features to zoom the images. Hybrid schemes incorporating fractal compression and speedup...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Enhancement in Feedback Polynomials of LFSR Used in A5/1 Stream Cipher

    There is encryption algorithms used in GSM. This is for to encrypt the information when transmit from mobile station to base station during communication. As stated that A5/1 is strong algorithm but it cryptanalysis by cryptanalysts. This paper modified concept to improve A5/1 encryption algorithm by consideration of feedback combining...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    WEB Based Service Platform of Population

    The Indian Census is the most credible source of information on Demography (Population Characteristics), Economic Activities, Literacy and Education etc. As the Census data plays a vital role for the future of the country it is very important to maintain it properly and accurately. As of now census data is...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Combining Advanced Encryption Standard (AES) and One Time Pad (OTP) Encryption for Data Security

    The development of telecommunications technology and data storage using the computer has become a necessity because there are many jobs that can be completed quickly, accurately, and efficiently. In addition it allows data transmission distance is relatively fast and cheap, but on the other hand long-distance data transmission is possible...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Concept of Designing an Optimized Pull Model View Controller Type Content Management Framework

    Based on the concept of "Easy to learn and develop for anyone", the authors present an integrated framework concept for developing content management system using an optimized pull Model View Controller (MVC) type in web programming. The framework consist of four easy steps to follow: first step is determining web...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Cyber Security Approach in Web Application Using SVM

    Internet is open source for web access like for the purpose of railway reservation, online banking, online fees submission etc. Security concern is the most threatening topic for users about their confidential information's storage. various security designing and algorithms has been designed to impose secure environment for user but still...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A Research on Decentralized Clustering Algorithms for Dense Wireless Sensor Networks

    A wireless sensor network with large number of sensor nodes can be used as an effective tool for collecting data in various situations. Recent advancement in wireless communications and electronics has enabled the development of low-cost sensor network. Wireless sensor networks are web of sensor nodes with a set of...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    CO2 Monitoring System from Remote Location Using GSM, GPS and Concept of MODBUS

    The system developed here is useful for measurement of waste gas (like Co2) remotely. This will helpful particularly for the environment department because many chimneys releases polluted gases now-a-days, which is a serious issue for Global warming. If any factory emits gas beyond some predefined specified limit, this system will...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Hybrid Model for Location Privacy in Wireless Ad-Hoc Networks for Mobile Applications

    A wireless ad-hoc network is a decentralized type of wireless network. The network is ad-hoc because it does not rely on a preexisting infrastructure, such as routers in wired networks or access points in managed (infrastructure) wireless networks. Now-a-day in fast growing world, use of internet is increasing popularly and...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Multipath Global Rerouting for Fault Tolerant Overlay Network (FTON) in Labeled Optical Burst-Switching

    In this paper, mainly concentrate on reduce the burst loss and Non-availability of wavelength in network; proposed an overlay model known as Fault Tolerant Overlay Network (FTON) which improves the performance of a regular IP electronic network. An FTON is created over the existing network; an FTON node collects the...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Application of Fuzzy Analytic Hierarchy Method in Software Engineering Scenario

    In software engineering scenario, software effort estimation is very uncertain and depends on various external factors .For developing a particular type of software, selection of an optimal and experienced group of developer is essential for software development organization for organizational benefits and is necessary because success and failure of software...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A Framework for Android and J2ME Bluetooth Communication

    Mobile applications development is attracting more and more developers recently due to the emergence of new mobile platforms such as Android; which is making application development easier as well as its' marketing. All new Smartphone's now support Bluetooth, a popular communication medium for mobile phones. However, cross-platform Bluetooth communication between...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Mobile Client's Access Mechanism for Location Based Service Using Cell-ID

    Today's location-sensitive service relies on user's mobile device to determine its location and send the location to the application. A location-based service is a service that determines the location of a mobile device and uses this to provide functionalities and information specific to that location. With the growth of the...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Performance Analysis of Backoff Exponent Behaviour at MAC Layer In ZigBee Sensor Networks

    Topology is one of the major new paradigms and is the premier research topic in ZigBee based Wireless Sensor Network and has opened up new challenges for researchers throughout the World due to its wide range of applications ranging from medical research to military. IEEE 802.15.4/ZigBee is a worldwide open...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Performance Analysis for Visual Data Mining Classification Techniques of Decision Tree, Ensemble and SOM

    This paper is a comprehensive report on experimental setup, data collection methods, implementation and result analyses of market segmentation and forecasting using neural network based artificial intelligence tools. The main focus of the paper is on visual data mining applications for enhancing business decisions. The software based system is implemented...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A Survey on Preventing Jamming Attacks in Wireless Communication

    Communication in wireless network is possible with an air medium. Due to the high security threats in this system, the network may face various difficulties. One of the major threats is jamming attack which comes under Denial Of Service (DOS) attack. Jamming attack is common among many exploits that compromises...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Test Case Generation Based on Activity Diagram for Mobile Application

    Testing impacts the popularity of any software and hardware products. If proper testing of any product is done it will increase the cost and sale of the product. Mobiles are widely used electronic device there are several mobile companies established which provide variety of applications and features. It is obvious...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Network Security Using Firewall and Cryptographic Authentication

    The network Security is the hottest topic in the current research scenario. The information security is really threatened by obnoxious users. With increasing vulnerabilities, caused by port scan attacks, replay attacks and predominantly IP Spoofing, targeting services, the network behavior is getting malevolent. But there is a lack of any...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Box-Office Opening Prediction of Movies Based on Hype Analysis Through Data Mining

    Box-office performance of a movie is mainly determined by the amount the movie collects in the opening weekend and Pre-Release hype is an important factor as far as estimating the openings of the movie are concerned. This can be estimated through user opinions expressed online on sites such as Twitter...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Graph Neural Network for Minimum Dominating Set

    The dominating set concept in graphs has been used in many applications. In large graphs finding the minimum dominating set is difficult. The minimum dominating set problem in graphs seek a set D of minimum number of vertices such that each vertex of the graph is either in D or...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    A Stream Cipher Algorithm Based on Nonlinear Combination Generator with Enhanced Security for Image Encryption

    This paper describes a novel approach for image encryption using stream cipher algorithm based on non linear combination generator. This work aims to enhance the security of encrypted image. The work is based on the use of several linear feedback shifts registers whose feedback polynomials are primitive and of degrees...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Artificial Neural Network Modelling of Traffic Noise in Agra-Firozabad Highway

    The noise is a major environmental hazard at present. It causes hearing problem, tinnitus, high blood pressure, mental depression, heart palpitation etc. Noise is a usual problem everywhere and involves high health risk, but in today's fast life the authors ignore its harmful consequences and it results in high health...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Network Connectivity Based Topology Control for Mobile Ad Hoc Networks

    Energy consumption and network connectivity are two of the important research issues that are yet to be resolved in Mobile Ad-hoc NETworks (MANETs). However, only a few topology control methods (e.g.) take into account the low interference as a goal of the methods. Some researchers tried to indirectly reduce the...

    Provided By International Journal of Computer Applications