International Journal of Computer Applications

Displaying 1-40 of 4516 results

  • White Papers // Sep 2014

    Dependency Mapper Based Efficient Job Scheduling and Load Balancing in Green Clouds

    Cloud computing is usually recognized as a technology which has significant impact on IT. However, cloud computing still has many crucial problems. In a cloud computing system, load balancing is the most central issue in the system i.e. to distribute the load in an efficient manner. It plays a very...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Operating Systems: Basic Concepts and Challenges Against Virtualization

    Operating Systems (OS) act as fundamentals to the basic computer systems in today's world. An OS is the communication between the software the user use and the hardware that lies underneath. Every electronic signal talks with their operating system to understand the work it has to do or the way...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Comparative Study of Various Next Generation Network-Business Process Frameworks

    The growth in telecommunication industry in technology, forced the necessity to shape up the existing business models. A business process can be defined as a flow of business activities. The paper discusses the impact of different process frameworks along the various key parameters that synthesizes views from areas such as...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Comparative Study on Exterior RCC Beam Column Joint Subjected to Monotonic Loading

    Computer simulation offers the potential for improved understanding of the local and global mechanisms that determine the response of structures to severe loading. The research presented here focuses on development of a finite element model using ABAQUS software to be used in investigating the behavior of reinforced concrete exterior beam-column...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    An Efficient Gateway Election Algorithm for Clusters in MANET

    The dynamic nature of mobile ad hoc network brought several constraints like scalability, robust connectivity, limited power constraints etc. Several cluster based routing algorithms have been proposed for large scale ad hoc networks. In cluster-based routing, the network is logically divided into groups called clusters. This grouping is to sustain...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    RS-MONA: Reliable and Scalable Secure Method to Store and Share Secrete Data for Groups in Cloud

    In this paper, the authors present various issues related to privacy and security while storing user's data on untrusted cloud. In today's world sharing of group resource among the cloud users is a major problem. There is a lot of research being made to find out the issues with these...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Existing Software Stakeholder Practices an Overview

    Software technology is an ever changing and dynamic science. As in other spheres, here too, despite the vast extent of interactive and participatory software practice and theory, there is still little shared understanding amongst those involved. The success of a software project is directly affected by the lack of understanding...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Prevention of Virus Propagation in Mobile Network

    Infections and malwares have the capacity to spread beginning workstation systems into versatile systems with the fast improvement of brilliant phone clients. Currently, there are three disease vectors utilized by portable malware to spoil versatile. A Bluetooth affiliation permits document exchange if the telephone's Bluetooth stack helps OBEX trade -...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Driver Behavior Monitoring Through Sensors and Tracking the Accident Using Wireless Technology

    Monitoring the driver behavior is one of the ways to prevent the fatal accidents and it is necessary to alert the driver when they are drowsy or in a distracted state. Distraction and drowsiness of the driver have been important factors for a large number of major accidents. They reduce...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    HDLC Implementation in Wireless Sensor Networks

    In this paper, the authors aim the designing and implementing an efficient HDLC chip. They use pipelining technique in HDLC register module which increases the throughput of the system and also helps in decreasing the delay of the system. In pipeline technique, number of instructions has been executed at the...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    PI-RTOS: Platform Independent RTOS

    In this paper, the authors propose a real-time operating system kernel for the 32-bit Leon3 processor. A system is said to be Real Time if it is required to complete its work and deliver its services on time. In a real-time system the correctness of its output, is an important...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Software Requirement Engineering Risk Prediction Model

    Analysis of many software program assignments from 2011 through 2014 shows interesting patterns. When the user compare large assignments that have efficiently attained their own cost as well as schedule quotes versus the ones that ran delayed, ended up over spending budget, or maybe ended up, half a dozen popular...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    An Enhanced Energy Aware Coverage Preservation with Static Clustering for WSN

    A Wireless Sensor Network (WSN) consists of a huge number of sensor nodes associated via wireless medium. Nodes in a WSN are organized with limited battery energy and thus improvement on network lifetime by reducing energy-usage is of extreme important. One of the solutions to minimize such energy-usage is associate...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    A Novel Predictive and Non-Predictive Cooperative Model for Routing in Ad Hoc Networks

    Ad hoc networks are formed by intermediate nodes which agree to relay traffic. The link between nodes is broken when a node rejects to relay traffic. Various parameters like depreciation in the energy of a node, distance between nodes and mobility of the nodes play a vital role in determining...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Requirement Risk Identification: A Practitioner's Approach

    Software project development has always been associated with high failure rate. The failure of a software project depends on rooted risks. These risks don't come into face at early stages of requirement gathering and analysis which carried on in the further phases of development greatly affects the cost of a...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    A Cooperative Strategy for Collision Detection and Prevention for Unmanned Ground Vehicles in Military Applications Using WSN Based VANET

    In the recent years, Vehicular Ad hoc NETworks (VENETs) have gained tremendous attention of researchers due to various services they provide and likely to be deployed commercially in coming years. VANET enables vehicles to communicate with each other to avoid any critical situation such as vehicle collision, unseen obstacles etc....

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Optimized Conditional Privacy Preservation Protocol for NFC Applications Using Genetic Algorithm

    In the recent years, the NFC with the combination of smart devices has widened the utilization range of NFC. It is said it will replace the credit card in electronic payment so security is one of the area that is to be checked. Currently the NFC security requires user's public...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Optimal Software Release Time Policy using Goal Programming

    In this paper, the impact of software testing effort and the efficiency on the modeling of software reliability for optimizing the cost in case of release time policy has been discussed. Another important problem in the software development process is to determine when to stop testing and release the software....

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Adhoc On-Demand Distance Vector - Energy Efficient Approach

    As nodes of Mobile Ad hoc NETwork (MANET) are mobile in nature, overall network lifetime is one of the key challenges in MANET. To improve overall network lifetime along with packet delivery fraction and normalized routing load, this paper proposed an Optimized Multi-hop Routing Ad hoc On-demand Distance Vector protocol...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    A Novel Feature Based Unified Node Data Analysis (FBU-NDA) Based IDS Using AODV in MANET

    MANET is a type of wireless network, which works on radio frequencies and holds short range communication. As it is temporary in nature and is having movable devices for communication which makes such network as infrastructure less. In such network variable conditions of routing will face several issues which degrade...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Survey of Integrity Verification in Multi-Cloud Storage by Efficient Cooperative Provable Data Possession

    Provable Data Possession (PDP) is one of the techniques to ensure the integrity of data in storage outsourcing. Here in this paper, the authors speak to the creation of an efficient PDP method for distributed cloud storage to maintain the scalability of service and data migration. On the basis on...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    An Elliptical Routing Protocol for Wireless Mesh Networks: Performance Analysis

    Wireless Mesh Networks (WMN) is one of the implemented types of MANETs. WMN is wireless network, in which each node can communicate directly with one or other peer nodes. In generally, MANET routing protocols are used in WMN, it arises performance issues. In this paper, the authors propose a new...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Acknowledgment Time Delay Approach to Optimize TCP Performance in Hybrid Networked Systems

    Transmission Control Protocol (TCP) is connection oriented transport protocol used on IP in wireless medium and it insists lossless data transmission in proper order. When TCP is used as a transmission protocol where physical layer is wireless medium, results high packet reordering due to bursty traffic and drastic variation in...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Enhanced CSMA/CA Contention Window for Efficient Random Access in IEEE 802.15.6

    The IEEE 802.15.6 is a new communication standard on Wireless Body Area Network (WBAN) for short-range, wireless communications in the vicinity of, or inside a human body. It is used for medical and non-medical applications. The IEEE 802.15.6 defines a Medium Access Control (MAC) layer compatible with several PHYsical layers...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    A Security Measure for Electronic Business Applications

    With the growth of business over the internet, there is more scope of security vulnerabilities over the internet. Despite of many efforts to make internet safe to the users, there is still a possibility for threats. The client, as well as the merchant for the electronic business, always faces problems...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    A Security Framework for E-Business Applications

    During the electronic business, the clients and the merchants make use of the internet. Thus, the authors can say that the internet, the client, and the merchant are the components for the electronic business. The electronic business involves various categories of businesses. These various types of e-businesses have different types...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    A Review of Elliptic Curve Based Signcryption Schemes

    Signcryption is a new cryptographic approach which provides authentication and encryption simultaneously in a single logical step. The aim is to reduce the cost of signature-then-encryption approach. This cost includes computational cost and communication cost. Furthermore, some signcryption schemes are based on RSA while some are based on elliptic curve....

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Development of Multimodal Biometric Framework for Smartphone Authentication System

    Secret knowledge, like remembering password or token based authentication systems are deemed inconvenience and difficult to use for users such as password may be forgotten or token may be lost. So burdens like remembering password and stolen or forged token based authentication have raised a current trend of biometric authentication...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    P2P Social Network with Dynamic Identity-Based Broadcast Encryption Using Rolls

    Social Network Service (SNS) market is stretch over worldwide, and then there are many security threats by attackers. In addition because sensitive data is concentrated on the central server, privacy can be exposed to SNS provider as well as malicious users. In this paper, the authors suggest the rolls scheme...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    ICORMAN: Extended Version of CORMAN Using Efficient Channel Reuse Method

    Mobile Ad-hoc NETworks (MANETs) are wireless networks in which all nodes are moving freely in the network; also they can leave or enter into the network at any time. The nodes in these types of networks are communicating on-the-move without any base stations. Due to this mobility, inter-node connectivity may...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    An Analytical Model for IEEE 802.15.4/ ZigBee Wireless Sensor Networks with Duty Cycle Mechanism for Performance Prediction and Configuration of MAC Parameters to Achieve QoS and Energy Efficiency

    The IEEE 802.15.4 standard defines a PHYsical (PHY) and Medium Access Control (MAC) layer protocol for low data rate wireless network with low power requirement which makes it ideal PHY/MAC for WSNs. Currently WSNs with combination of IEEE 802.15.4 and ZigBee are being used extensively in industrial applications such as...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Clustering Multi-Attribute Uncertain Data Using Probability Distribution

    Clustering is an unsupervised classification technique for grouping set of abstract objects into classes of similar objects. Clustering uncertain data is one of the essential tasks in mining uncertain data. Uncertain data is typically found in the area of sensor networks, weather data, customer rating data etc. The earlier methods...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Survey on Mobile Ad Hoc Network Routing Protocols

    Wireless mobile ad-hoc network is characterized as network without any physical connections. In this network there is no fixed topology due to the mobility of nodes, interference, multipath propagation and path loss. Many Routing protocols have been developed to overcome these characteristics. This paper is to review existing mobile ad-hoc...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Novel Modified Playfair Cipher Using a SquareMatrix

    In this paper, the authors explain about encryption and decryption of text using a secret password provided by the user. The encryption machine takes the password and source message as input and generates a cipher text based on modified Playfair Cipher algorithm using dynamic rectangular matrix. The decryption machine takes...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Cooperation Aware Layer Three Multi Path Routing Using QoS Approach for MANET

    Routing protocols in Mobile Ad-hoc NETworks (MANETs) need to accommodate its dynamic characteristics such as node mobility, non-availability of central control etc. Node mobility increase challenges to the routing protocols with respect to attainment of the desired level of Quality of services. Apart from own communication, MANET nodes have to...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    An Insight Into Software Crowdsourcing: How Crowd Can Transform the Business Model for Technology Service Providers

    Crowdsourcing is a distributed computing model which enables sharing of human efforts in form of ideas, non-hierarchical decision making; utilization of human intelligence and collaboration on complex real world problems that otherwise cannot be solved by any individual person, machine or organization easily. It leverage machine learning, automation, artificial intelligence...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    A Genetic-Fuzzy Algorithm for Load Balancing in Multiprocessor Systems

    With the increasing use of computers in research contributions, added requirement for faster processing is now an important necessity. Parallel Processing describes the concept of running tasks which can be run simultaneously on several processors. Load balancing is very important problem in multiprocessor systems. In this paper, the authors introduce...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Survey on Grid Based Energy Efficient Routing Protocols in Wireless Sensor Networks

    Sensor nodes in Wireless Sensor Networks (WSNs) have limited energy, range, memory and computational power. In WSN, it is an important task to send measured data at regular intervals from an area of interest for time sensitive applications to a base station or sink for further processing to meet the...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Genetic Algorithm and Probabilistic Neural Networks for Fingerprint Identification

    Existing security methods rely on knowledge based on approaches like password or token based on approaches like access cards. Such method is not very secure, biometrics such as fingerprint, face and voice offer means of personal identification and provide increased security because they rely on who the user are. In...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    An Improved Leader Selection Approach for Improving Network QoS

    To improve the effectiveness and QoS of service in a sensor network there are number of communication and localization architectures followed by sensor network. One of such architecture is leader selection architecture. This architecture restrict the communication to short distances so that the energy consumption of a node is reduces....

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A 64 Bits Dynamically Key Controlled Symmetric Cipher (KAMFEE-X64)

    This paper presents an improved version of KAMFEE cipher. The proposed cipher (KAMFEE-X64) is designed to be compatible with the new 64 bits microprocessors unlike the old cipher (KAMFEE) which is designed for systems based on x86 microprocessors. KAMFEE-X64 has a key dependent block length and key dependent rounds, enhanced...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A Review of Automatic Test Cases Generation

    Manual testing is hard and time consuming and it may be impossible for large systems or tester mistake in the test. The software testing is the rising cost of activities in development software and the test case generation is important activity in software testing. Hence researches performed to automate testing...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Multi Lingual Speaker Identification on Foreign Languages Using Artificial Neural Network

    Based on the Back Propagation Algorithm, this paper portrait a method for speaker identification in multiple foreign languages. In order to identify speaker, the complete process goes through recording of the speech utterances of different speakers in multiple foreign languages, features extraction, data clustering and system training. In order to...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A New Approach for Information Security Using Asymmetric Encryption and Watermarking Technique

    Rapid growth of internet and networked information systems has contributed a lot in the increase of multimedia contents. As digital contents are increasing day by day on internet it has raised requirement for the effective protection of multimedia assets (images, audios, videos). This paper proposes a new approach to protect...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A Design of Authentication and Access Control Model for Remote Access Using GSM Technologies

    The GSM technologies plays vital role in pervasive computing environments. The open and dynamic nature of the pervasive computing environment allows entities to join and leave frequently. This causes a large number of autonomous entities to interact in an ad-hoc manner, raising concerns as to the trustworthiness of the service...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Removal of Network Ambiguities Through Knowledge Based System

    Documents on the Internet are composed of several kinds of multimedia information when accessed for personal, entertainment, business, and scientific purposes. There are many specific content domains of interest to different communities of users. Extracting semantic relationships between entities from text documents is challenging task in information extraction. By semantics...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Lifetime Maximization of Wireless Sensor Networks Using Improved Genetic Algorithm Based Approach

    In Wireless Sensor Networks the nodes have limited energy and are seriously constrained by the battery life. To increase the lifetime of the network is a critical and challenging issue and thus it is the routing in WSNs, which is the primary focus of design for researchers. In this paper...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Innovative Performance Evaluation of Unnecessary Handoffs and Handoff Failures During Access Network Selection Between WLAN and Cellular Networks

    Received Signal Strength based (RSS) horizontal handoff algorithms have been most commonly used by nearly all second generation and third generation wireless networks in a homogeneous environment. Vertical handoffs or network selection algorithms are the terms coined due to integration and interoperability of existing wired and wireless access networks under...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Survey on Securing Data in Cloud

    Cloud computing is an innovative information system architecture which reduces the overall client side resource requirements. Even though the data outsourcing reduce the burden of client storage the clients no longer have physical possession of data which will leads to so many security issues. Hence the user need to make...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Multimodal Biometric System Using Iris, Palmprint and Finger-Knuckle

    Most real-life biometric systems are still unimodal. Unimodal biometric systems perform person recognition based on a single source of biometric information. Such systems are often affected by some problems such as noisy sensor data, nonuniversality and spoof attacks. Multibiometrics overcomes these problems. Multibiometric systems represent the fusion of two or...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    An Efficient Bee-Inspired Auto-Configuration Algorithm for Mobile Ad Hoc Networks

    The infrastructure-less and dynamic nature of Mobile Ad-hoc NETworks (MANETs) requires the implementation of a new set of networking technologies in order to provide efficient end-to-end communication according to the principles of the standard TCP/IP suite. Routing and IP address auto-configuration are among the most challenging tasks in the ad...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Broadband Microstrip S-Shaped Patch Antenna for Wireless Communication

    This paper presents a single-patch broadband microstrip S-shaped patch antenna. Microstrip S-shaped patch antenna, fed by a coaxial feeding. The antenna is designed by inserting two slots into rotated square patch then it look like english letter S. Because of the slots and thick substrate, bandwidth of antenna is increased....

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A Fuzzy Approach for Privacy Preserving in Data Mining

    Advances in hardware technology have increased storage and recording capabilities regarding individual's personal data. Privacy preserving of data has to ensure that individual data publishing will refrain from disclosing sensitive data. Data is anonymized to address the data misuse concerns. Recent techniques have highlighted data mining in ways to ensure...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Bank Locker Security System Based on RFID and GSM Technology

    The main goal of this paper is to design and implement a bank locker security system based on RFID and GSM technology which can be organized in bank, secured offices and homes. In this system only authentic person can be recovered money from bank locker. The authors have implemented a...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Survey of Integrating Testing for Componentbased System

    Today's software larger in size, design complex and time consuming to implement them, for this the authors need a prominent solution to overcome these problems. Component-Based Software Development (CBSD) has emerged as an Object Oriented (OO) Software Engineering approach that forced rapid software development. Using CBSE approach they can eliminate...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A Novel Approach of Speedy-Highly Secured Data Transmission Using Cascading of PDLZW and Arithmetic Coding with Cryptography

    The spread of computing has led to an outburst in the volume of data in the communication world. The paper proposes the cascading of two algorithms PDLZW and Arithmetic Coding with cryptography. With the hierarchical parallel dictionary set, the search time can be reduced significantly and all these dictionaries are...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Stock Market Prediction Model by Combining Numeric and News Textual Mining

    This paper proposes a novel method for the prediction of stock market closing price. Many researchers have contributed in this area of chaotic forecast in their ways. Data mining techniques can be used more in financial markets to make qualitative decisions for investors. Fundamental and technical analyses are the traditional...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Review of Fractal Transform Based Image and Video Compression

    Fractal Compression is a new technique in the field of color and video compression. This technique has grabbed much attention in recent years because of very high compression ratio that can be achieved. It also provides interesting interpolation features to zoom the images. Hybrid schemes incorporating fractal compression and speedup...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Enhancement in Feedback Polynomials of LFSR Used in A5/1 Stream Cipher

    There is encryption algorithms used in GSM. This is for to encrypt the information when transmit from mobile station to base station during communication. As stated that A5/1 is strong algorithm but it cryptanalysis by cryptanalysts. This paper modified concept to improve A5/1 encryption algorithm by consideration of feedback combining...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    WEB Based Service Platform of Population

    The Indian Census is the most credible source of information on Demography (Population Characteristics), Economic Activities, Literacy and Education etc. As the Census data plays a vital role for the future of the country it is very important to maintain it properly and accurately. As of now census data is...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Combining Advanced Encryption Standard (AES) and One Time Pad (OTP) Encryption for Data Security

    The development of telecommunications technology and data storage using the computer has become a necessity because there are many jobs that can be completed quickly, accurately, and efficiently. In addition it allows data transmission distance is relatively fast and cheap, but on the other hand long-distance data transmission is possible...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Concept of Designing an Optimized Pull Model View Controller Type Content Management Framework

    Based on the concept of "Easy to learn and develop for anyone", the authors present an integrated framework concept for developing content management system using an optimized pull Model View Controller (MVC) type in web programming. The framework consist of four easy steps to follow: first step is determining web...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Cyber Security Approach in Web Application Using SVM

    Internet is open source for web access like for the purpose of railway reservation, online banking, online fees submission etc. Security concern is the most threatening topic for users about their confidential information's storage. various security designing and algorithms has been designed to impose secure environment for user but still...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A Research on Decentralized Clustering Algorithms for Dense Wireless Sensor Networks

    A wireless sensor network with large number of sensor nodes can be used as an effective tool for collecting data in various situations. Recent advancement in wireless communications and electronics has enabled the development of low-cost sensor network. Wireless sensor networks are web of sensor nodes with a set of...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    CO2 Monitoring System from Remote Location Using GSM, GPS and Concept of MODBUS

    The system developed here is useful for measurement of waste gas (like Co2) remotely. This will helpful particularly for the environment department because many chimneys releases polluted gases now-a-days, which is a serious issue for Global warming. If any factory emits gas beyond some predefined specified limit, this system will...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Hybrid Model for Location Privacy in Wireless Ad-Hoc Networks for Mobile Applications

    A wireless ad-hoc network is a decentralized type of wireless network. The network is ad-hoc because it does not rely on a preexisting infrastructure, such as routers in wired networks or access points in managed (infrastructure) wireless networks. Now-a-day in fast growing world, use of internet is increasing popularly and...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Multipath Global Rerouting for Fault Tolerant Overlay Network (FTON) in Labeled Optical Burst-Switching

    In this paper, mainly concentrate on reduce the burst loss and Non-availability of wavelength in network; proposed an overlay model known as Fault Tolerant Overlay Network (FTON) which improves the performance of a regular IP electronic network. An FTON is created over the existing network; an FTON node collects the...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Application of Fuzzy Analytic Hierarchy Method in Software Engineering Scenario

    In software engineering scenario, software effort estimation is very uncertain and depends on various external factors .For developing a particular type of software, selection of an optimal and experienced group of developer is essential for software development organization for organizational benefits and is necessary because success and failure of software...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A Framework for Android and J2ME Bluetooth Communication

    Mobile applications development is attracting more and more developers recently due to the emergence of new mobile platforms such as Android; which is making application development easier as well as its' marketing. All new Smartphone's now support Bluetooth, a popular communication medium for mobile phones. However, cross-platform Bluetooth communication between...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Mobile Client's Access Mechanism for Location Based Service Using Cell-ID

    Today's location-sensitive service relies on user's mobile device to determine its location and send the location to the application. A location-based service is a service that determines the location of a mobile device and uses this to provide functionalities and information specific to that location. With the growth of the...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Performance Analysis of Backoff Exponent Behaviour at MAC Layer In ZigBee Sensor Networks

    Topology is one of the major new paradigms and is the premier research topic in ZigBee based Wireless Sensor Network and has opened up new challenges for researchers throughout the World due to its wide range of applications ranging from medical research to military. IEEE 802.15.4/ZigBee is a worldwide open...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Performance Analysis for Visual Data Mining Classification Techniques of Decision Tree, Ensemble and SOM

    This paper is a comprehensive report on experimental setup, data collection methods, implementation and result analyses of market segmentation and forecasting using neural network based artificial intelligence tools. The main focus of the paper is on visual data mining applications for enhancing business decisions. The software based system is implemented...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A Survey on Preventing Jamming Attacks in Wireless Communication

    Communication in wireless network is possible with an air medium. Due to the high security threats in this system, the network may face various difficulties. One of the major threats is jamming attack which comes under Denial Of Service (DOS) attack. Jamming attack is common among many exploits that compromises...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Test Case Generation Based on Activity Diagram for Mobile Application

    Testing impacts the popularity of any software and hardware products. If proper testing of any product is done it will increase the cost and sale of the product. Mobiles are widely used electronic device there are several mobile companies established which provide variety of applications and features. It is obvious...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Network Security Using Firewall and Cryptographic Authentication

    The network Security is the hottest topic in the current research scenario. The information security is really threatened by obnoxious users. With increasing vulnerabilities, caused by port scan attacks, replay attacks and predominantly IP Spoofing, targeting services, the network behavior is getting malevolent. But there is a lack of any...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Box-Office Opening Prediction of Movies Based on Hype Analysis Through Data Mining

    Box-office performance of a movie is mainly determined by the amount the movie collects in the opening weekend and Pre-Release hype is an important factor as far as estimating the openings of the movie are concerned. This can be estimated through user opinions expressed online on sites such as Twitter...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Graph Neural Network for Minimum Dominating Set

    The dominating set concept in graphs has been used in many applications. In large graphs finding the minimum dominating set is difficult. The minimum dominating set problem in graphs seek a set D of minimum number of vertices such that each vertex of the graph is either in D or...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    A Stream Cipher Algorithm Based on Nonlinear Combination Generator with Enhanced Security for Image Encryption

    This paper describes a novel approach for image encryption using stream cipher algorithm based on non linear combination generator. This work aims to enhance the security of encrypted image. The work is based on the use of several linear feedback shifts registers whose feedback polynomials are primitive and of degrees...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Artificial Neural Network Modelling of Traffic Noise in Agra-Firozabad Highway

    The noise is a major environmental hazard at present. It causes hearing problem, tinnitus, high blood pressure, mental depression, heart palpitation etc. Noise is a usual problem everywhere and involves high health risk, but in today's fast life the authors ignore its harmful consequences and it results in high health...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Network Connectivity Based Topology Control for Mobile Ad Hoc Networks

    Energy consumption and network connectivity are two of the important research issues that are yet to be resolved in Mobile Ad-hoc NETworks (MANETs). However, only a few topology control methods (e.g.) take into account the low interference as a goal of the methods. Some researchers tried to indirectly reduce the...

    Provided By International Journal of Computer Applications