International Journal of Computer Applications

Displaying 1-40 of 5614 results

  • White Papers // Nov 2014

    A Comparative Study of ANFIS Membership Function to Predict ERP User Satisfaction Using ANN and MLRA

    An Enterprise Resource Planning (ERP) system is packaged business software that integrates organizational process and functions into a unified system. Many researchers and practitioners agree that Enterprise Resource Planning (ERP) systems are the most important development in terms of corporate use of Information Technology (IT) in the 1990s. In this...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    A Framework for Secure Mobile Database Transactions Using Cryptographic Co-Processor

    The increase in the adoption of database systems by the corporate in key data management technology for their day-to-day operations. So, decision-making becomes crucial for the security of data that is managed by these systems. The damage and misuse of data affects not only the single user or application, but...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Introduction of NDN with Comparison to Current Internet Architecture Based on TCP/IP

    Over the years number of people using internet has escalated. The primary motive of the Internet has been revised. To deal with this drastic change, network architecture has to be redesigned considering future trends. The future architecture of Internet can be developed only after scrutinizing various aspects of current Internet...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Hybrid Technique of Pre Shared Key and Entropy Variation for DDOS Detection

    Here, in this paper an effective technique for the detection of intrusion is proposed. The model is based on the hybrid combinatorial method of pre-shared key exchange and entropy variation. The data to be sent is first authenticated by the local router by comparing the shared key between them. The...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Privacy Preserving Dynamic Recommender System

    A recommender system is now becoming main decision maker in today's word. It provides information for specific items such as books, news, cloths and many more. Personalization is now becoming common term for improving e-commerce services and attracts more users. Today's recommender system provides suggestion for specific items but drawback...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Elliptic Curve Cryptography with Hill Cipher Generation for Secure Text Cryptosystem

    Cryptography is an art to protect secret information from attacks. This idea of information security leads to the evolution of cryptography. In this paper, an idea is proposed in which hill cipher is generated with Elliptic Curve Cryptography (ECC) to provide better security and proper security coverage. Hill Cipher is...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Automation Framework for Testing Android Mobiles

    Android mobiles are playing key role in mobile market. OEMs (Original Equipment Manufacturer) are focusing on Android mobiles as the cost of production is comparatively low comparing to other mobile platforms. In order to keep the time to market very short, the testing cycles need to be reduced. Android mobile...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Energy Efficient and Improved Certificate Revocation Technique for Mobile Ad Hoc Networks

    Mobile Ad-hoc NETworks (MANETs) are self-organizing as well as self configurable with an open network environment. The nodes during this network will be a part of can freely leave from the network. Therefore, the wireless and dynamic natures of MANET create them a lot of vulnerable in the direction of...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    RPOAWLB: Resource Provisioning Optimization Approach Based on RPOA with Load Balance

    Consummation of the service providing with fulfilling the users QoS requirements and satisfying the service's provider, is considered a vital challenge for resource provisioning process. The QoS requirements usually have two main parameters that are needed to be optimized (i.e. minimizing service's response time, and total paid cost). On the...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Interactive Multi-Media Applications: Quality of Service Guaranteed Under Huge Traffic

    The internet has brought about revolution in the telecommunication system. The use of computer applications has changed with easiness and low cost. Interactive MultiMedia (IMM) applications such as Voice over Internet Protocol (VoIP) and video conferencing are being produced. They offer beneficial services to academicians, officers and other users. But...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    EBK-Means: A Clustering Technique Based on Elbow Method and K-Means in WSN

    WSN consist of hundreds of thousands of small and cost effective sensor nodes. Sensor nodes are used to sense the environmental or physiological parameters like temperature, pressure and etc. For the connectivity of the sensor nodes, they use wireless transceiver to send and receive the inter-node signals. Sensor nodes, because...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Hybrid Intrusion Detection System Using FCRM Mechanism

    The necessity of efficient intrusion detection system increased recent research to be focused on hybrid techniques for better results. In recent research plenty of intrusion detection systems have been proposed with various data mining techniques, machine learning mechanisms and fuzzy logic. Existing intrusion detection systems suffered from higher false positive...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    An Approach for Development of Multitenant Application as SaaS Cloud

    Software-as-a-Service (SaaS) is one of the striking features of cloud computing. SaaS has revolutionized the software engineering very significantly. SaaS eliminates the requirement of customers (tenants) to purchase, install and maintenance of infrastructure and software. Customers only have to pay for services provided by SaaS vendors. Multi-tenancy in SaaS application...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Advanced Intrusion Detection System with Prevention Capabilities

    Today, with the advent of internet, everyone can do information exchange and resource sharing. Even business organization and government agencies are not behind in this move to reach users for their decision making and for business strategies. But at the same time, with ease of use and availability of various...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Modified RSA Digital Signature Scheme for Data Confidentiality

    As the people know that digital signature is an authentication mechanism that enables the creator of a message to attach a code that acts as a signature. This signature guarantees the source authenticity and integrity of a message. Digital signature provides three types of services such as authentication, message integrity...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Decoding of PBCH in LTE

    Based on GSM/EDGE and UMTS/HSPA technologies LTE (Long Term Evolution) is the latest advancement in the cellular technology. LTE is backed by most 3GPP and 3GPP2 service providers and is commonly known as 4G. Designed to meet the needs of high speed data and mass media transport LTE is the...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Performance Analysis of Multiple Access Techniques for Broadband Power Line Communication System

    Broadband over power lines is the way of providing internet services to customers using high frequency signals integrated in the power wiring. For uplink internet services data signals are modulated and coupled into the overhead power lines. For the downlink data signals are decoupled at the consumer's premises. BPL can...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Cross Site Request Forgery: Preventive Measures

    Cross Site Request Forgery (CSRF) is considered as one of top vulnerability in today's web, where an untrusted website can force the user browser to send the unauthorized valid request to the trusted site. Cross Site Request Forgery (CSRF) will let the integrity of the legitimate user. So far many...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Comparison of Routing Protocols in WSN Using NetSim Simulator: LEACH Vs LEACH-C

    The tremendous growth of Wireless Sensor Network (WSN) in various applications such as military, defence, civil, health care and agriculture etc. has created a lot of interest among the research community for past few years. WSNs have several characteristics and constraints. Routing, Fusion, Localization is the key factors and very...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Aircraft Identification Technique Using Public-Key Cryptosystem

    Conventional method of identification of a friend aircraft from foe can be accomplished using beacon system. This system consists of interrogator on the ground station and transponder on the aircraft. A new approach for Identifying a Friend aircrafts from Foe (IFF) using public-key cryptosystem is introduced. Two schemes of public-key...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Parallel and Distributed GIS for Processing Geo-Data: An Overview

    Geographic Information System (GIS) is a collection of applications whose tasks include (collaborating with other systems and) gathering geographic data, store and process spatio-temporal data (geo-data) and share the derived geographic knowledge with the users and other applications. Some of the most important routine applications of GIS are spatial analysis,...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Incorporating MDA to Design Business Intelligence Services by Using SaaS Model of Cloud Computing

    Cloud computing based on the latest information and computing technologies provides software programs, platforms, infrastructure etc. as services. On the other hand, Business Intelligence (BI) on the Cloud is an assistance model that helps organizations further their strategic business interests and it is for this reason, every organization is looking...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Sensitive Data Exposure Prevention Using Dynamic Database Security Policy

    Today, the internet has become a 4th necessity for human after air, water and food. The internet is widely used for business. Now-a-days, billions of transactions are done online with the use of different applications. In today's world threats to security is becoming more and more sensitive issue, lots of...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    A Failure Node Detection Based on Discrete Selection in WSNs

    Now-a-days, Wireless Sensor Networks (WSNs) applications are frequently used in various technologies for reducing the cost of manufacturing portable wireless sensor nodes. It trend to deploy the large number of portable wireless sensors in WSNs to increase the Quality of Service (QoS). The QoS is mainly affected by the life...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Biometric Identification Using Electroencephalography

    In this paper, the authors investigate the use of brain activity for person identification. A biometric system is a technological system that uses information about a person. Research on brain signals show that each individual has a unique brain wave pattern. Electroencephalography signals generated by mental tasks are acquired to...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Reversible Data Hiding for Security Applications

    In this paper, the authors discuss about RDH technique in encrypted image. In this paper RDH use single-level-2D-DWT and optimal transfer mechanism. Original image is converted into number to string which is having some numeric values. In the RDH technique a host image is taken and is divided into two...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Profiling of Test Cases with Clustering Methodology

    Software testing is an imperative task in software development process. Software testing is used to identify the correctness, completeness and quality of the software product or system. Till date, software testing is considered as a very expensive activity as it takes a lot of testing efforts, time and cost to...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Improved Security Levels of WLAN Through DBSPS

    Wireless network plays a vital role in the field of Information and Communication Technology (ICT). Security to the wireless network is a major challenge to the researchers and practitioners. Especially Wireless Local Area Networks (WLANs) are more prone to security threats. This paper introduces a novel technique Double Bio-cryptic Security-aware...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Technology Forecasting: The Case of Cloud Computing and Sub-Technologies

    Forecasting natural phenomena and cycles of various events of human interest gains importance in the contemporary world. A spurt of research and investigative patents and documentation shows the patronage of the same by mammoth enterprises and competitive governments looking for cost arbitrage for greater market share for their products and...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Outlier Detection for Business Intelligence Using Data Mining Techniques

    Data mining is a process of extracting previously unknown information from large datasets, using it for organizational decision making. In this paper, the authors have made a review of various outlier detection techniques from data mining perspective. Existing studies in data mining focus generally on finding patterns from large datasets...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Latent Fingerprint Matching Based on Texture Descriptor Using Hough Transform

    Latent fingerprint matching has played a critical role in identifying the suspects and criminals. Latent fingerprints are fingerprints which are obtained from crime scene. These are essential to forensics as well as law enforcement agencies to match & identify the criminals. Latents are the incomplete fingerprints to facilitate be regularly...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Effect of Scope Creep in Software Projects - Its Bearing on Critical Success Factors

    Quality software is developed only when project management techniques are meticulous followed. Various metrics are introduced by the industry experts to execute perfect project management. The success rate of the projects is very meek when compared to efforts and expertise of the technical experts. Various reasons pitch in the scenario...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Cloud Testing: Perspective and Challenges

    In the recent years, cloud computing has emerged as potential technology for software industry as a resource base. With cloud computing, organizations need not require large capital outlays and human expenses for realizing innovative ideas. Cloud computing has provided many potential benefits to organizations for maximizing their profit in different...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Review of Implicit Security Mechanisms for Cloud Computing

    Cloud systems refer to the collection of interconnected servers that are provisioned dynamically on demand, for execution of applications, to the customer like electricity grid. Cloud computing has been drawing the interest from industry but there are still many issues that are in their primitive stage which are hampering the...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Improved ECRSEP Protocol for Heterogeneous WSNs

    In this paper, the authors enhance the performance of the ECRSEP using enhanced CH selection and segment based optimization. The sensor field optimization is a dangerous problem in wireless sensor networks and has been ignored by several researchers. As in numerous real-time sensing fields the sensor nodes on the corners...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    A Competitive Study Among Different Hybrid Routing Protocols Using High Quality GSM Voice as Input

    Mobile Ad-hoc NETworks (MANETs) are self-configuring networks having dynamic topology which don't require any type of preinstalled infrastructure. All the nodes in MANETs perform the operations of both host as well as router. The nodes in MANET should be able to relay the traffic from one node to another since...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    An Extensive Survey on Different Routing Protocols and Issue in VANETs

    Vehicular Ad-hoc NETworks (VANETs) is a class of Mobile Ad-hoc NETwork (MANET). Vehicular Ad-hoc NETwork (VANET) and Mobile Ad-hoc NETwork (MANET) are wireless networks which are points as automatic configured and self governing wireless ad-hoc networks. In VANET some terms of dynamic and high mobility are defined. Knowledge of routing...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Neuro Fuzzy Based Approach to Predict Component's Reusability

    The current scenario of open source development and outsourcing industry heavily depends upon the reusability of software components for achieving consistency in quality and cost optimization. Hence, the software developer needs excellent support in the assessment of the reusability levels of the software that they are trying to develop. Estimating...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Comparative Study with Modified Method for Target Tracking in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are networks of large number of tiny, battery powered sensor nodes having limited on-board storage, processing, and radio capabilities to monitor physical or environmental conditions, such as temperature, vibration, pressure, sound or motion, and then collectively send this information to a central computing system, called the...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Cost Optimization in Cloud Services

    Cloud computing is a large distributed computing environment in which collection of resources is available to user through internet. It helps the consumers to reduce the cost of information management as they are not required to own their servers and can use capacity leased from cloud service providers. At present,...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A 64 Bits Dynamically Key Controlled Symmetric Cipher (KAMFEE-X64)

    This paper presents an improved version of KAMFEE cipher. The proposed cipher (KAMFEE-X64) is designed to be compatible with the new 64 bits microprocessors unlike the old cipher (KAMFEE) which is designed for systems based on x86 microprocessors. KAMFEE-X64 has a key dependent block length and key dependent rounds, enhanced...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A Review of Automatic Test Cases Generation

    Manual testing is hard and time consuming and it may be impossible for large systems or tester mistake in the test. The software testing is the rising cost of activities in development software and the test case generation is important activity in software testing. Hence researches performed to automate testing...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Multi Lingual Speaker Identification on Foreign Languages Using Artificial Neural Network

    Based on the Back Propagation Algorithm, this paper portrait a method for speaker identification in multiple foreign languages. In order to identify speaker, the complete process goes through recording of the speech utterances of different speakers in multiple foreign languages, features extraction, data clustering and system training. In order to...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A New Approach for Information Security Using Asymmetric Encryption and Watermarking Technique

    Rapid growth of internet and networked information systems has contributed a lot in the increase of multimedia contents. As digital contents are increasing day by day on internet it has raised requirement for the effective protection of multimedia assets (images, audios, videos). This paper proposes a new approach to protect...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A Design of Authentication and Access Control Model for Remote Access Using GSM Technologies

    The GSM technologies plays vital role in pervasive computing environments. The open and dynamic nature of the pervasive computing environment allows entities to join and leave frequently. This causes a large number of autonomous entities to interact in an ad-hoc manner, raising concerns as to the trustworthiness of the service...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Removal of Network Ambiguities Through Knowledge Based System

    Documents on the Internet are composed of several kinds of multimedia information when accessed for personal, entertainment, business, and scientific purposes. There are many specific content domains of interest to different communities of users. Extracting semantic relationships between entities from text documents is challenging task in information extraction. By semantics...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Lifetime Maximization of Wireless Sensor Networks Using Improved Genetic Algorithm Based Approach

    In Wireless Sensor Networks the nodes have limited energy and are seriously constrained by the battery life. To increase the lifetime of the network is a critical and challenging issue and thus it is the routing in WSNs, which is the primary focus of design for researchers. In this paper...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Innovative Performance Evaluation of Unnecessary Handoffs and Handoff Failures During Access Network Selection Between WLAN and Cellular Networks

    Received Signal Strength based (RSS) horizontal handoff algorithms have been most commonly used by nearly all second generation and third generation wireless networks in a homogeneous environment. Vertical handoffs or network selection algorithms are the terms coined due to integration and interoperability of existing wired and wireless access networks under...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Survey on Securing Data in Cloud

    Cloud computing is an innovative information system architecture which reduces the overall client side resource requirements. Even though the data outsourcing reduce the burden of client storage the clients no longer have physical possession of data which will leads to so many security issues. Hence the user need to make...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Multimodal Biometric System Using Iris, Palmprint and Finger-Knuckle

    Most real-life biometric systems are still unimodal. Unimodal biometric systems perform person recognition based on a single source of biometric information. Such systems are often affected by some problems such as noisy sensor data, nonuniversality and spoof attacks. Multibiometrics overcomes these problems. Multibiometric systems represent the fusion of two or...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    An Efficient Bee-Inspired Auto-Configuration Algorithm for Mobile Ad Hoc Networks

    The infrastructure-less and dynamic nature of Mobile Ad-hoc NETworks (MANETs) requires the implementation of a new set of networking technologies in order to provide efficient end-to-end communication according to the principles of the standard TCP/IP suite. Routing and IP address auto-configuration are among the most challenging tasks in the ad...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Broadband Microstrip S-Shaped Patch Antenna for Wireless Communication

    This paper presents a single-patch broadband microstrip S-shaped patch antenna. Microstrip S-shaped patch antenna, fed by a coaxial feeding. The antenna is designed by inserting two slots into rotated square patch then it look like english letter S. Because of the slots and thick substrate, bandwidth of antenna is increased....

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A Fuzzy Approach for Privacy Preserving in Data Mining

    Advances in hardware technology have increased storage and recording capabilities regarding individual's personal data. Privacy preserving of data has to ensure that individual data publishing will refrain from disclosing sensitive data. Data is anonymized to address the data misuse concerns. Recent techniques have highlighted data mining in ways to ensure...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Bank Locker Security System Based on RFID and GSM Technology

    The main goal of this paper is to design and implement a bank locker security system based on RFID and GSM technology which can be organized in bank, secured offices and homes. In this system only authentic person can be recovered money from bank locker. The authors have implemented a...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Survey of Integrating Testing for Componentbased System

    Today's software larger in size, design complex and time consuming to implement them, for this the authors need a prominent solution to overcome these problems. Component-Based Software Development (CBSD) has emerged as an Object Oriented (OO) Software Engineering approach that forced rapid software development. Using CBSE approach they can eliminate...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A Novel Approach of Speedy-Highly Secured Data Transmission Using Cascading of PDLZW and Arithmetic Coding with Cryptography

    The spread of computing has led to an outburst in the volume of data in the communication world. The paper proposes the cascading of two algorithms PDLZW and Arithmetic Coding with cryptography. With the hierarchical parallel dictionary set, the search time can be reduced significantly and all these dictionaries are...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Stock Market Prediction Model by Combining Numeric and News Textual Mining

    This paper proposes a novel method for the prediction of stock market closing price. Many researchers have contributed in this area of chaotic forecast in their ways. Data mining techniques can be used more in financial markets to make qualitative decisions for investors. Fundamental and technical analyses are the traditional...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Review of Fractal Transform Based Image and Video Compression

    Fractal Compression is a new technique in the field of color and video compression. This technique has grabbed much attention in recent years because of very high compression ratio that can be achieved. It also provides interesting interpolation features to zoom the images. Hybrid schemes incorporating fractal compression and speedup...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Enhancement in Feedback Polynomials of LFSR Used in A5/1 Stream Cipher

    There is encryption algorithms used in GSM. This is for to encrypt the information when transmit from mobile station to base station during communication. As stated that A5/1 is strong algorithm but it cryptanalysis by cryptanalysts. This paper modified concept to improve A5/1 encryption algorithm by consideration of feedback combining...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    WEB Based Service Platform of Population

    The Indian Census is the most credible source of information on Demography (Population Characteristics), Economic Activities, Literacy and Education etc. As the Census data plays a vital role for the future of the country it is very important to maintain it properly and accurately. As of now census data is...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Combining Advanced Encryption Standard (AES) and One Time Pad (OTP) Encryption for Data Security

    The development of telecommunications technology and data storage using the computer has become a necessity because there are many jobs that can be completed quickly, accurately, and efficiently. In addition it allows data transmission distance is relatively fast and cheap, but on the other hand long-distance data transmission is possible...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Concept of Designing an Optimized Pull Model View Controller Type Content Management Framework

    Based on the concept of "Easy to learn and develop for anyone", the authors present an integrated framework concept for developing content management system using an optimized pull Model View Controller (MVC) type in web programming. The framework consist of four easy steps to follow: first step is determining web...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Cyber Security Approach in Web Application Using SVM

    Internet is open source for web access like for the purpose of railway reservation, online banking, online fees submission etc. Security concern is the most threatening topic for users about their confidential information's storage. various security designing and algorithms has been designed to impose secure environment for user but still...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A Research on Decentralized Clustering Algorithms for Dense Wireless Sensor Networks

    A wireless sensor network with large number of sensor nodes can be used as an effective tool for collecting data in various situations. Recent advancement in wireless communications and electronics has enabled the development of low-cost sensor network. Wireless sensor networks are web of sensor nodes with a set of...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    CO2 Monitoring System from Remote Location Using GSM, GPS and Concept of MODBUS

    The system developed here is useful for measurement of waste gas (like Co2) remotely. This will helpful particularly for the environment department because many chimneys releases polluted gases now-a-days, which is a serious issue for Global warming. If any factory emits gas beyond some predefined specified limit, this system will...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Hybrid Model for Location Privacy in Wireless Ad-Hoc Networks for Mobile Applications

    A wireless ad-hoc network is a decentralized type of wireless network. The network is ad-hoc because it does not rely on a preexisting infrastructure, such as routers in wired networks or access points in managed (infrastructure) wireless networks. Now-a-day in fast growing world, use of internet is increasing popularly and...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Multipath Global Rerouting for Fault Tolerant Overlay Network (FTON) in Labeled Optical Burst-Switching

    In this paper, mainly concentrate on reduce the burst loss and Non-availability of wavelength in network; proposed an overlay model known as Fault Tolerant Overlay Network (FTON) which improves the performance of a regular IP electronic network. An FTON is created over the existing network; an FTON node collects the...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Application of Fuzzy Analytic Hierarchy Method in Software Engineering Scenario

    In software engineering scenario, software effort estimation is very uncertain and depends on various external factors .For developing a particular type of software, selection of an optimal and experienced group of developer is essential for software development organization for organizational benefits and is necessary because success and failure of software...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A Framework for Android and J2ME Bluetooth Communication

    Mobile applications development is attracting more and more developers recently due to the emergence of new mobile platforms such as Android; which is making application development easier as well as its' marketing. All new Smartphone's now support Bluetooth, a popular communication medium for mobile phones. However, cross-platform Bluetooth communication between...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Mobile Client's Access Mechanism for Location Based Service Using Cell-ID

    Today's location-sensitive service relies on user's mobile device to determine its location and send the location to the application. A location-based service is a service that determines the location of a mobile device and uses this to provide functionalities and information specific to that location. With the growth of the...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Performance Analysis of Backoff Exponent Behaviour at MAC Layer In ZigBee Sensor Networks

    Topology is one of the major new paradigms and is the premier research topic in ZigBee based Wireless Sensor Network and has opened up new challenges for researchers throughout the World due to its wide range of applications ranging from medical research to military. IEEE 802.15.4/ZigBee is a worldwide open...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Performance Analysis for Visual Data Mining Classification Techniques of Decision Tree, Ensemble and SOM

    This paper is a comprehensive report on experimental setup, data collection methods, implementation and result analyses of market segmentation and forecasting using neural network based artificial intelligence tools. The main focus of the paper is on visual data mining applications for enhancing business decisions. The software based system is implemented...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A Survey on Preventing Jamming Attacks in Wireless Communication

    Communication in wireless network is possible with an air medium. Due to the high security threats in this system, the network may face various difficulties. One of the major threats is jamming attack which comes under Denial Of Service (DOS) attack. Jamming attack is common among many exploits that compromises...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Test Case Generation Based on Activity Diagram for Mobile Application

    Testing impacts the popularity of any software and hardware products. If proper testing of any product is done it will increase the cost and sale of the product. Mobiles are widely used electronic device there are several mobile companies established which provide variety of applications and features. It is obvious...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Network Security Using Firewall and Cryptographic Authentication

    The network Security is the hottest topic in the current research scenario. The information security is really threatened by obnoxious users. With increasing vulnerabilities, caused by port scan attacks, replay attacks and predominantly IP Spoofing, targeting services, the network behavior is getting malevolent. But there is a lack of any...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Box-Office Opening Prediction of Movies Based on Hype Analysis Through Data Mining

    Box-office performance of a movie is mainly determined by the amount the movie collects in the opening weekend and Pre-Release hype is an important factor as far as estimating the openings of the movie are concerned. This can be estimated through user opinions expressed online on sites such as Twitter...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Graph Neural Network for Minimum Dominating Set

    The dominating set concept in graphs has been used in many applications. In large graphs finding the minimum dominating set is difficult. The minimum dominating set problem in graphs seek a set D of minimum number of vertices such that each vertex of the graph is either in D or...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    A Stream Cipher Algorithm Based on Nonlinear Combination Generator with Enhanced Security for Image Encryption

    This paper describes a novel approach for image encryption using stream cipher algorithm based on non linear combination generator. This work aims to enhance the security of encrypted image. The work is based on the use of several linear feedback shifts registers whose feedback polynomials are primitive and of degrees...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Artificial Neural Network Modelling of Traffic Noise in Agra-Firozabad Highway

    The noise is a major environmental hazard at present. It causes hearing problem, tinnitus, high blood pressure, mental depression, heart palpitation etc. Noise is a usual problem everywhere and involves high health risk, but in today's fast life the authors ignore its harmful consequences and it results in high health...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Network Connectivity Based Topology Control for Mobile Ad Hoc Networks

    Energy consumption and network connectivity are two of the important research issues that are yet to be resolved in Mobile Ad-hoc NETworks (MANETs). However, only a few topology control methods (e.g.) take into account the low interference as a goal of the methods. Some researchers tried to indirectly reduce the...

    Provided By International Journal of Computer Applications