International Journal of Computer Applications

Displaying 1-40 of 4116 results

  • White Papers // Jun 2014

    Enhancement of the Private Cloud Data Transaction by using an Orthogonal Handshaking Authentication Protocol (OHSAP)

    Now-a-day, \"Cloud computing\" is an inevitable trend in the field of information technology due to the reason for information sharing as well as the resource utilization. In most of the organizations either it may be a profitable or non profitable category must focus on the resource sharing due to minimization...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    A Service Broker Model for Cloud based Render Farm Selection

    Cloud computing is gaining popularity in the 3D animation industry for rendering the 3D images. Rendering is an inevitable task in creating the 3D animated scenes. It is a process where the scene files to be animated is read and converted into 3D photorealistic images automatically. Since it is a...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Deadline Scheduling Algorithms in Cloud Computing: A Review

    Cloud computing is the nascent technology which is based on pay-per-use model. It is computing paradigm where applications, data, bandwidth and IT services are provided via Internet. Objective of the cloud service providers to use resource proficiently and achieve the maximum profit. This leads to task scheduling as a core...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Text Clustering Algorithms: A Review

    With the growth of Internet, large amount of text data is increasing, which are created by different media like social networking sites, web, and other informatics sources, etc. This data is in unstructured format which makes it tedious to analyze it, so the authors need methods and algorithms which can...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Analysis of 64- bit RC5 Encryption Algorithm for Pipelined Architecture

    In modern days data transmission through a channel requires more security. Security based more important transmission is comparatively better & believable than simple transmission. This paper is to use RC5 algorithm for encryption and decryption of data for secure data transmission from one place to another place for proper communication...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    A Survey on Problems and Solutions of Frequent Pattern Mining with the use of Pre-Processing Techniques

    Frequent pattern mining is a researched area which is used for extracting interesting associations and correlations among item sets in transactional and relational database. Many algorithms of frequent pattern mining is been devised ranging from efficient and scalable algorithms in transactional database to numerous research frontiers and their wide applications....

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    A Review of Leveraging Private Cloud Computing in Financial Service Institutions: Value Propositions and Current Performances

    In this paper the authors identifies main value propositions of leveraging private cloud computing and reviews current performance of implementing cloud computing technology in financial industry. The following aspects have been reviewed by this paper, namely discerning cloud computing-enabled innovations, identifying three value propositions of using cloud computing, reviewing current...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Database Generation for the Development of Village Information System (VIS)

    Data is considered as raw material from which meaningful results and analysis can be carried out. Database is a group of organized records and files which are stored systematically and shared by different users. To generate an information system it requires lot of data and database integrated with GIS. Comprehensive...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Provide a New Mapping for Deadlock Detection and Resolution Modeling of Distributed Database to Colored Petri Net

    One of the most important applications of distributed systems is enabling resource sharing between systems. In such environments, if a sequence of procedures to control resource allocation is not possible to create a deadlock exists. Deadlock problem for a distributed database system that uses locking as a concurrency control algorithm,...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Productivity Improvement in the Pride's Spare Parts Manufacturing using Computer Simulation and Data Envelopment Analysis

    Generally, improving production rate is a typical crucial problem in any manufacturing system. To cope with the problem, different kinds of scientific method stems from trial and error may be applied which imposes high costs. Rottenly testing any proposed scenarios may have significant effect on both operational management and manufacturing...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Big Data: The Next-Gen Google

    It is rightly said that invention is the mother of necessity. Big data - A new word in the information world. This paper describes the concept of big data and its research areas have been explored. This paper presents what all changes big data can bring to day-to-day lives. There...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Data Mining in Web Search Engine Optimization and User Assisted Rank Results

    In the fast moving world, the use of web is been increasing day-by-day so that the requirement of users relative to web search are also increasing. The content search over the web is one of the important research area comes under the web content mining. According to a traditional search...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    A Comparative Study on LEACH Routing Protocol and its Variants in Wireless Sensor Networks: A Survey

    Wireless sensor network consists of sensor nodes which are powered by battery; to communicate with each other for environment monitoring. Energy efficiency is the main issue in wireless sensor networks. Therefore, to maximize network lifetime and achieve maximum reliability and scalability, routing techniques have been developed. Leach is the conventional...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Supporting Ranking Queries for Search-As-You-Type in Databases using WIP

    Most of the search engines in Internet have simplified keyword-based search concept. The relational database management systems do not allow keyword-based search while they offers powerful query languages. Existing search systems that are based on keyword in relational database require users to submit a complete query to compute answers. Often...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Reliable Data Aggregation using Ant Colony Optimization with State Transition Ant Rule in Sensor Network

    Data aggregation plays a vital role as the Wireless Sensor Network (WSN) is highly susceptible to attacks. In WSN, data aggregation correlates the sensing data and aggregates at the intermediate nodes by reducing the time taken for message transfer. Works conducted on Concealed Data Aggregation scheme for Multiple Applications (CDAMA)...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Energy Efficient Hierarchy-based Clustering Routing Protocol for Wireless Sensor Networks

    Wireless Sensor Network (WSN) consisting of a large number of sensor nodes is effective for gathering data in a variety of environments. Since the sensors operate on battery of limited power, it is a challenging task to design an efficient routing scheme which can minimize the delay while offering high...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Multilevel Security and its Application to Enhance Data Protection

    A vast amount of information available on the internet along with the increased use of internet as a communication medium served a great deal in making the information available vulnerable. The number as well as the technique of attacks has become more and more sophisticated with time. This paper focuses...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Performance Analysis of Multiple Keys used for Data Security

    Data security is an essential component of an organization in order to keep the information safe from various competitors. It helps to ensure the privacy of a user from others. Secured and timely transmission of data is always an important aspect for an organization. The use of strong encryption algorithms...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Application of Factor Analysis to k-means Clustering Algorithm on Transportation Data

    Factor analysis is a very useful linear algebra technique used for dimensionality reduction. It is also used for data compression and visualization of high dimensional datasets. This technique tries to identify from among a large set of variables, a reduced set of components which summarizes the original data. This is...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Built in Self-Test for 4

    Built In Self-Test (BIST) is a technique or a method which allow the circuit to test itself. BIST increases the controllability and observability of integrated circuit therefore it is easier to apply inputs and then detect faults from it. BIST also decreases the time of testing integrated circuits & gives...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    High Imperceptible Data Hiding using Remainder Method

    In this paper the authors will propose a high quality image steganography technique which can hide secret data within an image in such a way so that it is imperceptible to human eye. This method solves the overlapping problem of remainder and use modulo operator efficiently for hiding purpose. First,...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Using Kerberos with Digital Signature and AES Encryption to Provide Data Security in Cloud Computing

    The cloud computing is the next generation platform that provides dynamic resources pools, virtualization, and high availableness. Today, with the assistance of those computing, the authors are able to utilize ascendable, distributed computing environments among the boundary of the web, It provides several edges in terms of low value and...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Prototyped LEACH Routing Algorithm for the Enhancement of Energy Efficiency in Wireless Sensor Network

    The topic of discussion and research is wireless sensor network and it just because it is an always application based. The research on wireless sensor networks has recently received much attention by offering an advantage of monitoring different kinds of environments by sensing their physical phenomenon. There are some important...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Back-End Forwarding Scheme in Server Load Balancing using Client Virtualization

    Load balancing can be done at two levels, the HTTP level and the network level. It refers to the distribution of the HTTP request made by the user across the web server in a server cluster and is achieved by various algorithms such as random selection, round robin, weighted round...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    A State-of-Art Load Balancing Algorithms in Cloud Computing

    Cloud computing is the ultimate technology in internet. It is a means of acquiring computing possessions, making do and delivering software and services. Cloud computing allows the customers to apply the application without set up and access their own files on any device with internet. Cloud services can be acquired...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    A Comparison of Clustering and Modification based Graph Anonymization Methods with Constraints

    In this paper a comparison is performed on two of the key methods for graph anonymization and their behavior is evaluated when constraints are incorporated into the anonymization process. The two methods tested are node clustering and node modification and are applied to Online Social Network (OSN) graph datasets. The...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Recent Trends in Energy-Efficient Clustering in WSNs

    Tremendous growth has been observed in the use of Wireless Sensor Networks (WSNs) in the last decade. WSNs behave like an interface between the virtual and physical worlds. Sensor nodes sense the changes in external environment and send the data to other nodes in the network or the sink, also...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Hybrid TB-LEACH Energy Based Multihop Protocol

    Wireless sensor network is defined as the network composed of tiny and energy restricted sensor nodes. Sensor nodes collect the useful information from surrounding environment and deliver it to the base station. Sensor nodes have limited energy. Routing protocols must consume minimum energy in order to prolong the network lifetime....

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Develepment of Real Time Application Platform for Linux Kernel with Preempt-RT

    The On Board Computer (OBC) of an aerospace vehicle carries out control, guidance and navigation operations during the flight. It consists of a processor and IO board to execute the real time embedded software and to read input data from other subsystems & send commands to control system. In the...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    FPGA Implementation of Area Efficient and Delay Optimized 32-Bit SQRT CSLA with First Addition Logic

    Binary addition is a fundamental operation in most digital circuits. There are a variety of adders, each has certain performance. Parallel adders are used for fast binary addition which plays a crucial impersonation in majority of digital circuit designs including Digital Signal Processors (DSP) and microprocessor data path unit. In...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    An Efficient Text Clustering Approach using Biased Affinity Propagation

    Based on an effective clustering algorithm seeds affinity propagation-in this paper an efficient clustering approach is presented which uses one dimension for the group of the words representing the similar area of interest with that the authors have also considered the uneven weighting of each dimension depending upon the categorical...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Design and Implementation of an Improved Routing Algorithm using Frequent Item Set Mining

    In this paper the authors present how routers can manage large amount of data packets as routers exchange information with each other to find the best possible route to a destination thus graphs represent a more general class of structures than sets, sequences, lattices and trees. Since on web heavy...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Enhanced Secured Multi cloud using Technical Environment and Regulatory Framework

    Cloud computing is the rising generation key platform for sharing the resources like software as a service, infrastructure as a service, and platform as a service. In future all IT enterprises migrate into cloud platform. Cloud server exchanges the messages for remote location users with the help of multi cloud...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Performance Tuning in Database Management System based on Analysis of Combination of Time and Cost Parameter through Neural Network Learning

    Performance tuning in database management system means enhancing the performance of database, i.e. minimizing the response time at a very optimum cost. Query optimization is one of the important aspects of performance tuning. Lots of research work has been done in this field but it is still ongoing process. To...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Analytical Approach in Terms of Lead and Lag Parameter to Tune Database Performance

    Performance tuning in database management system means escalating the performance of database by reducing time. For enhancing performance, analysis is important and analysis can be performed by neural network learning to save time spent in doing repeated work because neural network has ability to adapt dynamically varying environment. In this...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Solution to Security and Secrecy in Cloud Environment using PAKE Protocol - A Bibliographic Survey

    Cloud computing is an emerging technology that provide people a way to share large amount of hardware and software resources that belong to different organizations. Maintaining privacy and security in cloud environment is more complicated. Mitigating threats in a distributed computing environment is a difficult task as it requires constant...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Improved Task Scheduling Algorithm in Cloud Environment

    Cloud computing is one of the hottest word in IT world and it having huge demand in these days. Some big IT companies like Google, IBM, Microsoft, Amazon, Yahoo and others develop cloud computing systems and products related to it for customers. But still customers are having difficulties for adopting...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Performance Analysis of Various Architectural Approaches in Cloud Computing Environment for Energy and Bandwidth Minimization

    Cloud computing is one of the mainly admired subject in the computational world. It is support to processing the data that was emerged by profitable infrastructure. Cloud computing consist of large number of servers comprising of both virtual and physical servers in order to provide the resources in an optimal...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    An Energy Efficient Cooperative MISO Transmission Scheme for Cluster-based Wireless Sensor Network

    Wireless sensor network becomes an attractive choice for different applications because of their multitasking nature such as sensing the data, computing the data, and transmitting that data to the main location. But wireless sensor network have a number of tiny sensor nodes which are operate on small batteries. So it...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    SSM-DENCLUE: Enhanced Approach for Clustering of Sequential Data: Experiments and Test Cases

    Clustering web usage data is useful to discover interesting patterns related to user traversals, behavior and their characteristics, which helps for the improvement of better search engines and Web personalization. Clustering web sessions is to group them based on similarity and consists of minimizing the intra-cluster similarity and maximizing the...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    A Generic Approach for Team Selection in Multi - Player Games Using Genetic Algorithm

    The best team selection is always the requirement of management in different domains and in different organizations including government, project, industry, business and sports. The traditional team selection process is really lengthy, awkward and unclear due to manual process and personal judgments; which may lead to a disaster. These conflicting...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Semantic Data Extraction from Infobox Wikipedia Template

    Wikis are established means for collaborative authoring, versioning and publishing of textual articles. The Wikipedia for example, succeeded in creating the by far largest encyclopedia just on the basis of a wiki. Wikis are created by wiki software and are often used to create collaborative works. One of the key...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    A Hybrid PSO with Dynamic Inertia Weight and GA Approach for Discovering Classification Rule in Data Mining

    Data Mining is the efficient knowledge discovery form database. It is also form of knowledge discovery essential for solving problem in specific domain like health care, business and other field. The proposed system is based on population based on heuristic search technique, which can used to solve combinatorial optimization problem....

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Object Recognition Technique Based on Level Set Method and Neural Network

    The Object recognition is the task of finding and labeling parts of a Two-Dimensional (2D) image of a scene that correspond to objects in the scene. In this paper, the authors have proposed an efficient approach using level set method for extracting object shape contour and convex hull as a...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Text Extraction and Recognition From Image Using Neural Network

    Extraction and recognition of text from image is an important step in building efficient indexing and retrieval systems for multimedia databases. The authors' primary objective is to make an unconstrained image indexing and retrieval system using neural network. They adopt HSV based approaches for color reduction. This approach show impressive...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Increased Throughput for Load Based Channel Aware Routing in MANETs with Reusable Paths

    The widespread applications of Mobile Ad-hoc NETworks (MANETs) have lead to the development of many protocols in this field. Routing protocols for ad hoc networks have generally ignored channel fading. This paper proposes a routing protocol which calculates the channels non-fading duration for routing which attempts to minimize packet loss...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Review on Grid Task Scheduling in Distributed Heterogeneous Environment

    Computational grid is a potential technology mainly used for distributed environment. The major issues related with Grid are resource discovery, heterogeneity, fault tolerance and task scheduling. Grid task scheduling is an integrated component of computing which effectively utilizes the idle time of resources. Efficient scheduling algorithm is needed to utilize...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Context Based Web Indexing for Storage of Relevant Web Pages

    A focused crawler downloads web pages that are relevant to a user specified topic. The downloaded documents are indexed with a view to optimize speed and performance in finding relevant documents for a search query at the search engine side. However, the information will be more relevant if the context...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Evaluating Robustness of Resource Allocation in Uniprocessor Real Time System

    Real Time Systems (RTS) operate in an unpredictable changing environment that causing certain system performance features to degrade. Such systems need robustness to guarantee limited degradation despite variations in environmental parameters. EDF (Earliest Deadline First) scheduling has been used to evaluate the robustness of uniprocessor system with makespan as performance...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Information Retrieval on the Web and Its Evaluation

    Internet is one of the main sources of information for millions of people. One can find information related to practically all matters on internet. Moreover if user wants to retrieve information about some particular topic users may find thousands of Web Pages related to that topic. But, the authors' main...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Performance Evaluation of Software Effort Estimation Using Fuzzy Analogy Based on Complexity

    Rapid industrialization in the past few decades has necessitated the ever increasing demand for newer technologies leading to the dramatic development of sophisticated software for cost estimation and is expected to grow manifold in the forthcoming years. The improper understanding of software requirements has often resulted in inaccurate cost estimation....

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Page Rank Based Design and Implementation of Search Engine Optimization

    Search Engine Optimization (SEO) is an Internet marketing strategy and a process, widely used now-a-days for improving the volume or quality of traffic to a website through search engines. The results generated by search engines can be natural (organic or algorithmic) and/or paid search. In the present paper, different techniques...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    An Innovative Approach for Finding Frequent Item Sets Using Maximal Apriori and Fusion Process and Its Evaluation

    Frequent pattern mining is a vital branch of Data Mining that supports frequent itemsets, frequent sequence and frequent structure mining. The authors' approach is regarding frequent itemsets mining. Frequent item sets mining plays an important role in association rules mining. Many algorithms have been developed for finding frequent item sets...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Image Retrieval Techniques for Color based Images from Large Set of Database

    In content-based image retrieval, interactive systems have attracted a lot of research interest in recent years. Comparatively early systems, which focused on fully automatic strategies, recent approaches have supporting many are concentrated. Assuming that a user is looking for a set of images with similar feature using the query concept...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Communicating Mobile Robots a Novel Learning Approach

    The authors introduce and demonstrate here a learning and decision-making problem associated with a complex task that integrates human and robotic learning dynamics with feedback. This paper aims to provide a contribution to the theme of a colony of robots in the subject area of inter-agent communication and learning. The...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Spectrum Efficiency of WiMAX Networks in the Presence of Interference with Diversity Combining

    WiMAX (Worldwide interoperability for Microwave Access) is a promising technology which can offer high speed voice, video and data services up to the requirements at the customer's end. The objectives of this paper is to evaluate the Performance evaluation of a WiMAX system under various diversity schemes (Selection combining, Maximal...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Centralized Parallel Form of Pattern Matching Algorithm in Packet Inspection by Efficient Utilization of Secondary Memory in Network Processor

    The network equipment has capable of inspecting packets in order to discover the worms and virus over the network. Many network users are hacked by attackers through malicious functions are mapped on network applications. Such unauthorized activities are required to delete by deep packet inspection in application layer. The high...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    An Improved Security Enabled Distribution of Protected Cloud Storage Services by ZeroKnowledge Proof Based on RSA Assumption

    Cloud computing dynamically provides high quality cloud-based secure services and applications over the internet. The Efficient sharing of Secure Cloud storage services (ESC) scheme which allows the upper-level user to share the secure cloud storage services with multiple lower-level users. In hierarchical identity-based architecture, the sender needs to encrypt a...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Performance Analysis of IEEE 802.15.4

    Wireless Sensor Network (WSN) consists of a large population of sensor nodes capable of computation, communication and sensing. Limited storage, processing, and transmission power are inherent limitations of WSN. IEEE 802.15.4 is a new standard, uniquely designed for Low Rate Wireless Personal Area Network (LR-WPAN), developed for applications that demand...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    A Novel Technique of Steganalysis in Uncompressed Image Through Zipf's Law

    In this paper, the authors present a Novel method to detect the existence of hidden message in LSB steganography. The key element of the proposed method is the power Law: Zipf's law. The detection theory is based on statistical analysis of pixel patterns using a Zipfness measure between successive bit...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    The FastDES: A New Look of Data Encryption Standard

    The FastDES algorithm is based on Data Encryption Standard (DES). In FastDES, the one round function concept of DES are used in three different customs to produce a new fast and more efficient secure algorithm. The DES operates on half of the input data, 32-bit of chunk out of 64...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Performance Analysis of Independent Component Analysis Algorithms for Multi-User Detection of DS-CDMA

    The conventional detection process of Direct Sequence Code Division Multiple Access (DS-CDMA) is limited by Multiple Access Interference (MAI) due to loss of orthogonality between spreading waveforms in multipath propagation channel environment. In this paper RADICAL Independent Component Analysis (ICA) algorithm is proposed for detection of DS-CDMA signals and compared...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Meta Heuristic Search Technique for Dynamic Test Case Generation

    Software testing is an inevitable activity of software development which is crucial to the software quality and consumes approximately 50% of the software development cost. Test case design is the most important activity in testing which determines software quality. The program with the moderate complexity cannot be tested completely but...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Document Clustering Using Learning From Examples

    Information Filtering (IF) systems usually filter data items by correlating a set of terms representing the user's interest with similar sets of terms representing the data items. Many techniques have been employed for constructing user profiles automatically, but they usually yield large sets of data. Various dimensionality-reduction techniques can be...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Multiple Object Detection and Tracking in Cluttered Region with Rational Mobile Area

    The proposed system highlights a novel approach of detecting and tracking multiple objects in the cluttered area like crowd using greedy algorithm. The proposed framework uses position of traced low-level feature points to generate a group of autonomous rational mobility region as resultant. Various challenging factors towards the accuracy of...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Effect of Communication Range with Node Cooperation in Wireless Passive Sensor Networks

    Node cooperation is considered in this paper in the existence of two relaying protocols i.e. "Amplify and Forward (AF)" also called "Store and Forward (SF)" and the second relaying protocol is "Decode and Forward". The two stated protocols are different from each other and perform different operations on received data...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Effect of Channel Coding with Node Cooperation for Wireless Passive Sensor Networks

    The Passive sensor nodes are operated in a very low power regime i.e. -10dBm to -30dBm. Due to this fact, there is a high chance of data to be lost or severely corrupted due to overcome of noisy environment. In order to tackle this problem it was suggested that node...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Biometrics: An Overview of the Technology, Issues and Applications

    Biometric identification refers to identifying an individual based on his/her distinguishing physiological and/or behavioral characteristics. As these characteristics are distinctive to each and every person, biometric identification is more reliable and capable than the traditional token based and knowledge based technologies differentiating between an authorized and a fraudulent person. This...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    An Overview of Web Usage Mining

    Web Usage Mining make use of Association Rule Mining to discover the interesting pattern, identify web user behavior, predict web user expectation and improve the business strategy. Association Rule Mining is a technique of Data Mining which is used to find the relationship between the data items. In Web Usage...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Privacy Preserving Association Rule Mining in Vertically Partitioned Databases

    Data mining techniques are useful to discover hidden patterns from the large databases. Association rule mining is one of the important data mining techniques to discover relationships between items or item sets. In many organizations the database may exist in centralized or in distributed environment. In distributed environment, database may...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Improvement of Adaptive Target Tracking Protocol (ATTP) in Wireless Sensor Networks

    In Adaptive Target Tracking Protocol (ATTP), at first, the total area that the target would appear there is estimated, after that some candidate wakening up areas and volunteer sampling time intervals are defined. Then by using an Extended Kalman Filter (EKF)-based estimation technique and energy consumption model, the best candidate...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    An Energy-Efficient Grid Based Clustering Topology for a Wireless Sensor Network

    Wireless Sensor Network (WSN) is an emerging technology. It is predicted that in future, WSN will change the human life totally. Energy optimization in Wireless Sensor Network (WSN)is one of the challenging issue. Wireless Sensor Network composed of a set of tiny sensor nodes. The nodes are continuously sense and...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Filtering Template Driven Spam Mails Using Vector Space Models

    Spam became a big problem to the society. Some spammers are using templates for sending spam. To send a particular promotion they create some template and merge the details of receivers with the template. Similarities can find among these mails and easily ignore the forthcoming spam. Most high volume spam...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Indirect Coupling Method of Chip Impedance Matched Dipole Antenna for UHF RFID Tag

    Radio Frequency Identification is the wireless technology that uses radio waves to automatically identify items within certain proximity. This process involves tagging items with a transmitter which will send bursts of information. Passive RFID tag consists of a microchip connected with an antenna. The passive tag uses the electromagnetic pulse...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Multiple Event Source Routing (MESR) for Energy Efficient Wireless Sensor Network

    The Wireless Sensor Network (WSN) is used to sense different events occurring at different sections of the remote network. The sensor nodes have limited battery power, and the nature of their deployment makes recharging almost impossible. To limit the power drain, efficient communication protocols are needed. This paper proposes Multiple...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Analytical Comparison of Usability Measurement Methods

    Usability plays very important role in fulfilling the quality requirements of a software system as it expresses the relationship between the software and its application domain. If the software system is usable then it is more productive, useful and thus it satisfies user's expectations. Inspite of such importance of usability...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Timer Based Location Management in Cellular Network Using Cache Memory

    Location management is essential task in current cellular system. Mobility prediction is widely used to assist handoff management, resource reservation and service pre-configuration. Location management methods are to find out mobile unit current location. Location update and paging have to maintain efficiently to minimize location management cost in cellular network....

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    EFB Grid Based Structure for Discovering Quality Clusters in Density Based Clustering

    Clustering is one of the important data mining techniques which discover clusters in many real-world data sets. Recent algorithms attempt to find clusters in subspaces of high dimensional data. Density based clustering algorithms uses grid structure for partitioning each dimensions into intervals (bins) which yields good computation and quality results...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Design and Develop ECC for Wireless Sensor Network

    Wireless Sensor Networks consist of sensor nodes and few powerful control mobile laptops performing activities like routing, data aggregation etc over wireless media. These kinds of networks are getting popular these days because of small size, ease of handle and installation. Because of this property they are used in environment...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Managing Versioning Activities to Support Tracking Progress of Distributed Agile Teams

    Development Progress in agile methods is based on the amount of "Working software" completed by team members. Changes to the source code might be introduced that affect the working software. Team members face difficulties in understanding and sharing changes that affect development progress especially in distributed projects. They may not...

    Provided By International Journal of Computer Applications