International Journal of Computer Applications

Displaying 1-40 of 6088 results

  • White Papers // Feb 2015

    Text Encryption Algorithms Based on Pseudo Random Number Generator

    In this paper, the authors present algorithms for encryption and decryption developed using Pseudo Random Number Generator (PRNG) and non-Linear functions. PRNG used in the work are matlab Random Number Generator (RNG) and Linear Congruential Generator (LCG). The developed algorithms are named according to PRNG used in it. State of...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Trends and Technologies Used for Mitigating Energy Efficiency Issues in Wireless Sensor Network

    The area of wireless sensor network is one the constant attention of the research community owing to its potential advantages and the persistent issues associated with it. In the recent times, various applications are conceptualized where Wireless Sensor Network (WSN) is used either as a sub-network or as a complete...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Handover Modeling of Multiple States of Mobile Node in a Five Node Network Model

    In today's world, user demands keep changing at a faster rate. To keep up the pace with the fast changing needs, technology also needs to change accordingly. In this paper, handover probability, unnecessary handover probability, missing handover probability and wrong decision probability are computed for a five node network model....

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    A Survey: Load Balancing for Distributed File System

    Distributed systems are useful for computation and storage of large scale data at dispersed location. Distributed File System (DFS) is a subsystem of distributed system. DFS is a means of sharing of storage space and data. Servers, storage devices and clients are on dispersed location in DFS. Fault tolerance and...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Price Prediction of Stock Market Using Hybrid Model of Artificial Intelligence

    Today, investment by purchasing stock-share constitutes the greater part of economic exchange of countries and a considerable amount of capital is exchanged through the stock markets in the whole world. But one of the most important problems is finding efficient ways to summarize and visualize the stock market data to...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    An Overview of Vertical Handoff Decision Algorithm

    In wireless communications of fourth generation the expectation to assimilate a hypothetically numerous heterogeneous wireless technologies are happened under consideration of a novel step toward worldwide smooth access. As the popularity of mobile wireless networks increases as well the challenges of merging a various number of wireless networks increases. Everyone...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Congestion Control Techniques in a Computer Network: A Survey

    With the advance in technology the focus has shifted from desktops and laptops to handheld devices like tablets, phablets, mobile phones, PDA etc. giving rise in the number of users connected to internet. About 900 million computers are connected to internet. In an hour 383 thousand TB of data transmission...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    An Enhanced ATM Security System Using Second-Level Authentication

    The increase of Automated Teller Machine (ATM) frauds has actuated the development of new authentication mechanisms that can overcome the security problems associated with the Personal Identification Numbers (PIN). The traditional PIN entry system has stood the test of time mainly because of its speed and memorability which are part...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Area Coverage Redundancy and Node Positioning in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) create the platform of an extensive range of applications linked to national security, surveillance, military, health care, and environmental monitoring. One of the most imperative and elementary problems in Wireless Sensor Networks (WSNs) is the coverage problem. Network coverage of wireless sensor network means how well...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Design and Analysis of Meander Microstrip Antenna at Wireless Band

    Meander Line Antenna (MLA) is an electrically small antenna which poses several performance related issues such as narrow bandwidth, high VSWR, low gain and high cross polarization levels. This paper describe the design, simulation and development of meander line micro-strip antenna at wireless band, the antenna was modeled using micro-strip...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Fraud Detection in Current Scenario, Sophistications and Directions: A Comprehensive Survey

    Fraud Detection is one of the oldest areas of research. The requirement of an effective system that detects frauds effectively with zero loss exists until now. This is due to the increase in the technology, that influences both the ends; the user and the fraudster. Hence it becomes mandatory that...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Design and Comparison of Three Rectangular-Slots-Loaded and No Slot-Loaded Square Shaped Micro-Strip Patch Antenna

    In this paper, the authors present a proposed design for square shaped micro-strip patch antenna by cutting three rectangular slots on the surface of the square patch. Using proposed antenna design and probe feeding at proper position they will compare the resultant return loss and VSWR and bandwidth with the...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Design Issues and Challenges in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are composed self-organized wireless ad hoc networks which comprise of a large number of resource constrained sensor nodes. The major areas of research in WSN is going on hardware, and operating system of WSN, deployment, architecture, localization, synchronization, programming models, data aggregation and dissemination, database querying,...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    A Simple and Efficient Roadmap to Process Fingerprint Images in Frequency Domain

    In the field of computer vision, image enhancement is one of the most important and critical stage, which eventually or indirectly decides the final results in the Boolean form, as far as image recognition or comparison is concern, fingerprint recognition system is also the part of computer vision and considered...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Time Execution Constraints Using Intricate Encryption and Decryption Process for Secure Data Transmission

    The encryption and decryption process is widely investigated and developed for a robust data security which is challenging to crack. Many researchers proposed different types of encryption and decryption algorithms such as DES, AES, RSA, etc., the proposed algorithms are encountered such as deficiency of stoutness and significant amount of...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    A Survey on Hierarchical Attribute Set Based Encryption (HASBE) Access Control Model for Cloud Computing

    Cloud computing refers to the application and service that run on a distributed system using virtualized resources and access by common internet protocol and networking standard. Cloud computing virtualizes system by pooling and sharing resources. System and resources can be monitored from central infrastructure as needed. It requires high security...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Efficient Wireless Channel Estimation Using Alamouti STBC With MIMO and 16-PSK Modulation

    The wireless communication system is better for the new generation of data communication technology, because it facilitates the user to communicate of share information through mobile devices in mobile situation without any leased or dedicated line. This paper field is continuously exploring by the researchers to innovate new techniques to...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Providing Data Security in Cloud Computing Using Novel and Mixed Agent Based Approach

    Determining the user's trust is a growing concern for ensuring privacy and security in a cloud computing environment. In a cloud, user's data is stored in one or more remote server(s) which poses more security challenges for the system. Most important concern is to protect user's sensitive information from other...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Encrypted Information Hiding Using Audio Steganography and Audio Cryptography

    With the growing importance of the internet, secure transmission of information is crucial. Steganography and cryptography helps in providing this much needed data confidentiality. Steganography hides secret information into a cover medium and cryptography converts data into an unrecognizable form. In this paper, the authors proposed a novel approach for...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Formal Conceptual Framework for Structure of Context of Component-Based System for Designing Robust Software Systems and Metrics

    For defining a set of unambiguous and language-independent metrics and other relevant concepts, the need for definition of a formal conceptual framework of the context/environment, particularly for safety-critical environments, has earlier been recognized and emphasized. In this paper, a formal conceptual framework is proposed for defining metrics and other relevant...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    An Intrusion Detection System for MANETs

    Mobile Ad-hoc NETwork (MANET) is a temporary infrastructure less network. This network is formed by combining some set of wireless mobile hosts. The host is called as a node which dynamically establishes their own network. In MANET all the nodes operates in cooperative fashion. Due to their certain inherently vulnerable...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Grid Based Fuzzy Optimized Routing Protocol for Underwater Sensor Networks

    In Underwater Wireless Sensor Networks (UWSNs) there are several problems with limited bandwidth, long propagation delay, low battery power, location problems because of having adverse environment. In Grid Based Fuzzy Optimized (GBFO) routing protocol the whole network is divided by different virtual grids. Then energy estimation of an active node...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Enhancing Cloud Security Through Access Control Models: A Survey

    Cloud computing is a new computing paradigm in which an application can run on connected cloud server instead of local server. Cloud computing provides efficient data storage, resource sharing and services in a distributed manner with great ease. However, cloud computing is having issues like security and privacy of data...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Case Study: Outlier Detection on Sequential Data

    Time series data streams are common in wireless sensor networks in nowadays. This type of data is having uncertainty due to the limitation of the measuring equipments or other sources of corrupting noise, leading to uncertain data. As uncertain streaming data is continuously generated, mining algorithms should be able to...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Annihiliation of Redudant Data in Amalgamation of WSN's Using Data Cleansing

    Now-a-days manufacturing environments are very charismatic and inclement. Traditional Management Information Systems (MISs) have mostly been implemented upon hierarchical architectures, which are inflexible to adapt changes and uncertainties promptly. Next-generation MISs must be agile and adaptable to accommodate changes without significant time delays. It is essential for an MIS to...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Characteristics of a Fuzzy Project Network Using Statistical Data

    In this paper, characteristics of fuzzy project network using statistical data are discussed in detail in order to calculate the fuzzy critical path, fuzzy earliest times, fuzzy latest times and fuzzy total float. Fuzzy number as fuzzy activity time is constructed using interval estimate by calculating mean, variance and standard...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Developing Web-Based Semantic and Fuzzy Expert Systems Using Proposed Tool

    Developing the Expert System (ES) using conventional programming languages is very tedious task. Therefore, it is not surprising that tools have been developed that can support the knowledge engineer. Separate tools now exist to support the knowledge acquisition and to support the implementation. Fuzzy set theory is used to capture...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Designing Smart University Using RFID and WSN

    Attendance is one of the important factors that determine the students rendering. There is a necessity to build a smart system that decrease load in managing the attendance and improves the performance of colleges, universities and any educational institute. The most common actions in educational organizations involve identification of student,...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    SLA-Based Virtual Machine Management for Mixed Workloads of Interactive Jobs in a Cloud Datacenter

    Efficient provisioning of resources is a challenging problem in cloud computing environments due to its dynamic nature and the need for supporting heterogeneous applications. Even though VM (Virtual Machine) technology allows several workloads to run concurrently and to use a shared infrastructure, still it does not guarantee application performance. Thus,...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    An Enhanced Proxy Blind Signature with Two Intractable Problems

    A proxy blind signature scheme is combination of two signature schemes particularly proxy signature and blind signature. In this signature scheme the original signer delegate the users' signing authority to some other entity named proxy signer. The proxy signer signs the documents or messages, but the signer cannot be able...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Risk Aware Intrusion Detection and Response Mechanism for MANET

    Mobile Ad-hoc NETworks (MANETs) are dynamic in nature. It is well known fact that dynamic nature of network infrastructure (of MANETs) results in the highly vulnerable to attacks. Among these attacks, routing attack has considerable attention, since it could cause most destructive damage to MANET. A lot of work is...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    A Weighted Fair Queue Based SBPN (WFQ-SBPN) Algorithm to Improve QoS for Multimedia Application in Mobile Ad Hoc Networks

    In this paper, the authors investigate a new technique based on SBPN for congestion avoidance. In this technique, they proposed a new algorithm based on WFQ for improving the QoS for multimedia traffic in MANET. In traditional algorithm used SBPN-FIFO in which data transmitted in which order it's received. In...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Enhancing Virtual Machine Performance in Cloud Using Cache as a Service

    Caching is one of the important concept used for optimizing the performance gap across data hierarchies; in particular, disk storage systems. Cloud applications are generally resource hungry and may consist of high frequency of occasional resource consumption, which are common in the cloud; do benefit the most from caching. There...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Cyber Warfare and Terrorism Based on Data Transmission Through Classical Cryptographic and Steganographic Algorithms

    The introduction of Internet has made it easier for everyone to access almost all information from different locations globally. This has made sensitive information prone to attack by malicious attackers. It therefore becomes important to come with measures that can be used to protect data on transmission from falling into...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Experimental Evaluation of Scalability and Reliability of a Multicast Protocol for MANETs

    In this era of social media, real time video multicast over Mobile Ad-hoc NETworks (MANETs) is subject of active research and new products are in use as a result of these research advancements. The authors have earlier proposed a simple and novel approach for multicasting in MANETs that is particularly...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    An Implementation of Secure Wireless Network for Avoiding Black hole Attack

    Mobile Ad-hoc NETwork (MANET) is a temporary infrastructure less network, Due to absence of infrastructure, MANET is vulnerable to attacks such as black hole attack, gray hole attack, wormhole attack, Sybil attack, and route table modification attack. This research is concerned with "Includes a way to produce and implement a...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    A Survey: Privacy Preserving Data Mining

    Privacy preserving data mining techniques are introduced with the aim of extract the relevant knowledge from the large amount of data while protecting the sensible information at the same time. The success of data mining relies on the availability of high quality data. To ensure quality of data mining, effective...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Efficient Bandwidth Management and Implementation of Cross-Layer Queuing Model in a Wireless Campus Area Network

    In this paper, the authors investigate the use of an efficient bandwidth management scheme by implementing cross-layer M/M/1 queuing model. Strict Open System Interconnection (OSI) layer to layer communication problem is solved by introducing a common database that automatically synchronizes the status of each OSI layer to all the other...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    A Trusted Misbehaviors Detection Scheme in Delay Tolerant Network

    Misbehavior of node represent a serious threat against routing in delay tolerant network. In this paper mainly focus to improve the packet loss during the transmission of packet one to another node and also deal with selfish and malicious node. In this paper introducing a periodically available trusted authority. TA...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    A Comparative Analysis of Lane Detection Techniques

    In many proposed systems, the lane detection consists of the localization of particular primitives such as markings of the plane of the painted roads. Various challenges like parked and moving vehicle, bad feature lines, shade of trees, buildings and other vehicles, road curvature, uneven lane shapes, integrated lanes, writings and...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Analytical Approach in Terms of Lead and Lag Parameter to Tune Database Performance

    Performance tuning in database management system means escalating the performance of database by reducing time. For enhancing performance, analysis is important and analysis can be performed by neural network learning to save time spent in doing repeated work because neural network has ability to adapt dynamically varying environment. In this...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Performance Tuning in Database Management System based on Analysis of Combination of Time and Cost Parameter through Neural Network Learning

    Performance tuning in database management system means enhancing the performance of database, i.e. minimizing the response time at a very optimum cost. Query optimization is one of the important aspects of performance tuning. Lots of research work has been done in this field but it is still ongoing process. To...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Enhanced Secured Multi cloud using Technical Environment and Regulatory Framework

    Cloud computing is the rising generation key platform for sharing the resources like software as a service, infrastructure as a service, and platform as a service. In future all IT enterprises migrate into cloud platform. Cloud server exchanges the messages for remote location users with the help of multi cloud...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    An Energy Efficient Cooperative MISO Transmission Scheme for Cluster-based Wireless Sensor Network

    Wireless sensor network becomes an attractive choice for different applications because of their multitasking nature such as sensing the data, computing the data, and transmitting that data to the main location. But wireless sensor network have a number of tiny sensor nodes which are operate on small batteries. So it...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Performance Analysis of Various Architectural Approaches in Cloud Computing Environment for Energy and Bandwidth Minimization

    Cloud computing is one of the mainly admired subject in the computational world. It is support to processing the data that was emerged by profitable infrastructure. Cloud computing consist of large number of servers comprising of both virtual and physical servers in order to provide the resources in an optimal...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Improved Task Scheduling Algorithm in Cloud Environment

    Cloud computing is one of the hottest word in IT world and it having huge demand in these days. Some big IT companies like Google, IBM, Microsoft, Amazon, Yahoo and others develop cloud computing systems and products related to it for customers. But still customers are having difficulties for adopting...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Solution to Security and Secrecy in Cloud Environment using PAKE Protocol - A Bibliographic Survey

    Cloud computing is an emerging technology that provide people a way to share large amount of hardware and software resources that belong to different organizations. Maintaining privacy and security in cloud environment is more complicated. Mitigating threats in a distributed computing environment is a difficult task as it requires constant...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    A Novel Approach towards Tourism Recommendation System with Collaborative Filtering and Association Rule Mining

    In the tourism recommendation system, the number of users and items is very large. But traditional recommendation system uses partial information for identifying similar characteristics of users. Collaborative filtering is the primary approach of any recommendation system. It provides a recommendation which is easy to understand. It is based on...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Analysis and Verification of Multi-Core Enabled ESL Model using SystemC and VLang

    Today most of the System-on-Chip (SoC) integrate multiple processing cores, digital signal processors, as well as dedicated hardware accelerators, etc. This results into large and complex systems which pose challenges to conventional design and verification flow. This raises the need for higher level of abstraction (i.e. electronics system level abstraction)....

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Direct Discrimination Aware Data Mining

    With the advent of data mining, in many applications the automated decision making systems are used to make fair decision, but there can be discrimination hidden in the decision made by system. Discrimination refers to treating person or entity unfairly based on their membership to a certain group. Discrimination can...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    A Survey on Various Techniques of Data Storage on Cloud using Third Party Auditor

    In present scenario cloud computing emerges as one of the most powerful computing technology to provide dynamic service on demand on very large scale over the internet. Cloud computing offers various features like scalability, pay on use, using these features giants companies use cloud to store their data, In cloud...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    A Hybrid Approach for Recommendation System in Web Graph Mining

    Large amount of information is available on web and information extraction takes place in huge volume. When queries are submitted to search engines they are generally in natural languages and contain just one or two words. Search engine are unable to recognize natural language and thus it becomes difficult to...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Ancient Indian Vedic Mathematics based 32-Bit Multiplier Design for High Speed and Low Power Processors

    The use of Vedic mathematics lies in the fact that it reduces the typical calculation in the conventional mathematics to very simple once. This is so because the Vedic formulae have claimed to be building on the natural principles on which the human mind works. Vedic mathematics is a several...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Implementation of USB 3.0 SuperSpeed Physical Layer using Verilog HDL

    In this proposed design it mainly includes USB 3.0, physical layer along with USB 2.0 functionality with super speed functionality. Physical layer mainly contains PCI express and PIPE interface. This proposed design transferred data from transmitter to receiver serially. This design manages to transfer data either on 2.5GT/s or on...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Job Scheduling Algorithms in Cloud Computing: A Survey

    Cloud computing is the new IT paradigm that makes the delivery of computing resources (hardware and software), applications and data as a service over the internet to its users. Cloud computing mainly intended to provide reliable, dynamic and virtualized services in terms of resources for doing computation, storage and knowledge...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Survey on MapReduce Scheduling Algorithms

    MapReduce is a programming model used by Google to process large amount of data in a distributed computing environment. It is usually used to perform distributed computing on clusters of computers. Computational processing of data stored on either a file system or a database usually occurs. MapReduce takes the advantage...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Comparison of Search based Techniques for Automated Test Data Generation

    One of the essential parts of the software development process is software testing as it ensures the delivery of a good quality and reliable software. Various techniques and algorithms have been developed to carry out the testing process. In this paper, the authors deal with utility of the nature based...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    FPGA Implementation of Area Efficient and Delay Optimized 32-Bit SQRT CSLA with First Addition Logic

    Binary addition is a fundamental operation in most digital circuits. There are a variety of adders, each has certain performance. Parallel adders are used for fast binary addition which plays a crucial impersonation in majority of digital circuit designs including Digital Signal Processors (DSP) and microprocessor data path unit. In...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Develepment of Real Time Application Platform for Linux Kernel with Preempt-RT

    The On Board Computer (OBC) of an aerospace vehicle carries out control, guidance and navigation operations during the flight. It consists of a processor and IO board to execute the real time embedded software and to read input data from other subsystems & send commands to control system. In the...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Hybrid TB-LEACH Energy Based Multihop Protocol

    Wireless sensor network is defined as the network composed of tiny and energy restricted sensor nodes. Sensor nodes collect the useful information from surrounding environment and deliver it to the base station. Sensor nodes have limited energy. Routing protocols must consume minimum energy in order to prolong the network lifetime....

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Recent Trends in Energy-Efficient Clustering in WSNs

    Tremendous growth has been observed in the use of Wireless Sensor Networks (WSNs) in the last decade. WSNs behave like an interface between the virtual and physical worlds. Sensor nodes sense the changes in external environment and send the data to other nodes in the network or the sink, also...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    A Comparison of Clustering and Modification based Graph Anonymization Methods with Constraints

    In this paper a comparison is performed on two of the key methods for graph anonymization and their behavior is evaluated when constraints are incorporated into the anonymization process. The two methods tested are node clustering and node modification and are applied to Online Social Network (OSN) graph datasets. The...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Back-End Forwarding Scheme in Server Load Balancing using Client Virtualization

    Load balancing can be done at two levels, the HTTP level and the network level. It refers to the distribution of the HTTP request made by the user across the web server in a server cluster and is achieved by various algorithms such as random selection, round robin, weighted round...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    A State-of-Art Load Balancing Algorithms in Cloud Computing

    Cloud computing is the ultimate technology in internet. It is a means of acquiring computing possessions, making do and delivering software and services. Cloud computing allows the customers to apply the application without set up and access their own files on any device with internet. Cloud services can be acquired...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Using Kerberos with Digital Signature and AES Encryption to Provide Data Security in Cloud Computing

    The cloud computing is the next generation platform that provides dynamic resources pools, virtualization, and high availableness. Today, with the assistance of those computing, the authors are able to utilize ascendable, distributed computing environments among the boundary of the web, It provides several edges in terms of low value and...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Prototyped LEACH Routing Algorithm for the Enhancement of Energy Efficiency in Wireless Sensor Network

    The topic of discussion and research is wireless sensor network and it just because it is an always application based. The research on wireless sensor networks has recently received much attention by offering an advantage of monitoring different kinds of environments by sensing their physical phenomenon. There are some important...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Built in Self-Test for 4

    Built In Self-Test (BIST) is a technique or a method which allow the circuit to test itself. BIST increases the controllability and observability of integrated circuit therefore it is easier to apply inputs and then detect faults from it. BIST also decreases the time of testing integrated circuits & gives...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    High Imperceptible Data Hiding using Remainder Method

    In this paper the authors will propose a high quality image steganography technique which can hide secret data within an image in such a way so that it is imperceptible to human eye. This method solves the overlapping problem of remainder and use modulo operator efficiently for hiding purpose. First,...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Performance Analysis of Multiple Keys used for Data Security

    Data security is an essential component of an organization in order to keep the information safe from various competitors. It helps to ensure the privacy of a user from others. Secured and timely transmission of data is always an important aspect for an organization. The use of strong encryption algorithms...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Application of Factor Analysis to k-means Clustering Algorithm on Transportation Data

    Factor analysis is a very useful linear algebra technique used for dimensionality reduction. It is also used for data compression and visualization of high dimensional datasets. This technique tries to identify from among a large set of variables, a reduced set of components which summarizes the original data. This is...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Energy Efficient Hierarchy-based Clustering Routing Protocol for Wireless Sensor Networks

    Wireless Sensor Network (WSN) consisting of a large number of sensor nodes is effective for gathering data in a variety of environments. Since the sensors operate on battery of limited power, it is a challenging task to design an efficient routing scheme which can minimize the delay while offering high...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Multilevel Security and its Application to Enhance Data Protection

    A vast amount of information available on the internet along with the increased use of internet as a communication medium served a great deal in making the information available vulnerable. The number as well as the technique of attacks has become more and more sophisticated with time. This paper focuses...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Supporting Ranking Queries for Search-As-You-Type in Databases using WIP

    Most of the search engines in Internet have simplified keyword-based search concept. The relational database management systems do not allow keyword-based search while they offers powerful query languages. Existing search systems that are based on keyword in relational database require users to submit a complete query to compute answers. Often...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Reliable Data Aggregation using Ant Colony Optimization with State Transition Ant Rule in Sensor Network

    Data aggregation plays a vital role as the Wireless Sensor Network (WSN) is highly susceptible to attacks. In WSN, data aggregation correlates the sensing data and aggregates at the intermediate nodes by reducing the time taken for message transfer. Works conducted on Concealed Data Aggregation scheme for Multiple Applications (CDAMA)...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Data Mining in Web Search Engine Optimization and User Assisted Rank Results

    In the fast moving world, the use of web is been increasing day-by-day so that the requirement of users relative to web search are also increasing. The content search over the web is one of the important research area comes under the web content mining. According to a traditional search...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    A Comparative Study on LEACH Routing Protocol and its Variants in Wireless Sensor Networks: A Survey

    Wireless sensor network consists of sensor nodes which are powered by battery; to communicate with each other for environment monitoring. Energy efficiency is the main issue in wireless sensor networks. Therefore, to maximize network lifetime and achieve maximum reliability and scalability, routing techniques have been developed. Leach is the conventional...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Productivity Improvement in the Pride's Spare Parts Manufacturing using Computer Simulation and Data Envelopment Analysis

    Generally, improving production rate is a typical crucial problem in any manufacturing system. To cope with the problem, different kinds of scientific method stems from trial and error may be applied which imposes high costs. Rottenly testing any proposed scenarios may have significant effect on both operational management and manufacturing...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Big Data: The Next-Gen Google

    It is rightly said that invention is the mother of necessity. Big data - A new word in the information world. This paper describes the concept of big data and its research areas have been explored. This paper presents what all changes big data can bring to day-to-day lives. There...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    A Review of Leveraging Private Cloud Computing in Financial Service Institutions: Value Propositions and Current Performances

    In this paper the authors identifies main value propositions of leveraging private cloud computing and reviews current performance of implementing cloud computing technology in financial industry. The following aspects have been reviewed by this paper, namely discerning cloud computing-enabled innovations, identifying three value propositions of using cloud computing, reviewing current...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    A Survey on Problems and Solutions of Frequent Pattern Mining with the use of Pre-Processing Techniques

    Frequent pattern mining is a researched area which is used for extracting interesting associations and correlations among item sets in transactional and relational database. Many algorithms of frequent pattern mining is been devised ranging from efficient and scalable algorithms in transactional database to numerous research frontiers and their wide applications....

    Provided By International Journal of Computer Applications