International Journal of Computer Applications

Displaying 1-40 of 3967 results

  • White Papers // Apr 2014

    VHDL based Hardware Architecture of a High Performance Image Edge Detection Algorithm

    In this paper the authors present the software and hardware implementation of a low cost and high performance image edge detection algorithm. This algorithm will be used as part of a complete vision based driver assistance system. The main challenge consists in realizing a real-time implementation of edge detection algorithm...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2014

    Design of Modified Exclusive-128 Bit NLFSR Stream Cipher and Randomness Test

    In this paper, the authors describe modified exclusive-128 NLFSR stream cipher which generates 128 bit key-streams using only NLFSR element as its main function and XOR operation. It consists of different sizes of NLFSRs both in Fibonacci and Galois configurations which offer better trade-off between the algorithm security and hardware...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2014

    Synchronous Relaying of Sensor Data

    In this paper the authors have put forth a novel methodology to relay data obtained by inbuilt sensors of smart phones in real time to remote database followed by fetching of this data. Smart phones are becoming very common and they are laced with a number of sensors that can...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2014

    Efficiency of Small- and Medium-sized Tofu Enterprises (SME) in Salatiga using Data Envelopment Analysis (DEA)

    The rise of US Dollars exchange rate to Rupiah in September 2013 has had an impact on all industries in Indonesia, especially tofu enterprises. The rising prices of raw materials require them to have an ability to survive and remain competitive. Productivity is one of the main indicators to estimate...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2014

    Framework for Offloading Android Applications using Cloud

    The usage of Smartphone is increasing rapidly over the last few years. Due to their mobility and good connectivity, Smartphone is increasing thrice as compared to PCs. However they are still constrained by limited processing power, memory and battery. Thus, the applications cannot be made very rich. In this paper,...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2014

    Comparison of BP and SVM on SLA based Masquerader Detection in Cloud

    Cloud computing is a new dynamics in the IT sector which imitates the pay per use modality of many commodity items. Organizations can use the new offerings in the IT field without significant capital investment. However, there is scrutiny in adoption of cloud computing in organizations as there are many...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2014

    Application of Optimization Technique to Tune PID Controller for a Level Process

    In any processes industry, process variables that need to be controlled are temperature, level, pressure and flow. This paper deals with an application of genetic algorithm to find the PID controller values to control the liquid level in the cylindrical tank. A process is identified as First Order Plus Dead...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2014

    Educational BigData Mining Approach in Cloud: Reviewing the Trend

    Big data is a new term used to identify the datasets that due to their large size and complexity, the authors cannot manage them with their current methodologies or data mining software tools. Big data mining is the capability of extracting useful information from these large datasets or streams of...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2014

    An Agglomerative Clustering Method for Large Data Sets

    In data mining, agglomerative clustering algorithms are widely used because their flexibility and conceptual simplicity. However, their main drawback is their slowness. In this paper, a simple agglomerative clustering algorithm with a low computational complexity, is proposed. This method is especially convenient for performing clustering on large data sets, and...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2014

    Multi-Objective Job Scheduler using Genetic Algorithm in Grid Computing

    In this paper the authors present multi-objective job scheduler using genetic algorithm which provides efficient utilization of resources by completing the different tasks in a minimum period of time. Grid is a kind of distributed system that provides the sharing of geographically distributed independent resources dynamically at runtime depending on...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2014

    FPGA Implementation of Fir Filter using Distributed Arithmetic Architecture for DWT

    The discrete wavelet transform has been widely used in the field of image and signal processing, optical electronics, digital communication and many other fields. This paper presents an efficient FPGA implementation of finite impulse response filter for discrete wavelet transform using distributed arithmetic architecture. This paper proposes a parallel implementation...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2014

    Performance Analysis of Web Services for Android based Devices

    Android mobile devices and Web services are becoming very popular. As android devices and wireless technologies continue to rapidly grow over a short span of period, Web services technology recognizes mobile computing as an area to which it should expand. Web service can greatly increase the functionality of Android devices...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2014

    High Capacity and Statistical Attacks Resistant Reversible Image Data Hiding Scheme using LSB Substitution

    Reversible data hiding technique is advancing with each passing day. It is a form of steganography in which the hidden data can be recovered or extracted by the authorized user. In this paper, the authors have proposed the variable least significant bit based digital image hiding system based on LSB...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2014

    Mining Low, Medium and High Profit Customers Over Transactional Data Stream

    In frequent itemset mining each item in transaction is represented by a binary value means 1 for present and 0 for absent. But there are several other parameter are also important like quantity, price or and profit of each item. Quantity, price or and profit these parameter are important in...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2014

    A Study of Load Balancing in Cloud Computing using Soft Computing Techniques

    Cloud computing is a business oriented approach which involves collaboration of multiple computing technologies via internet. With the rapid increase in cloud usage, it becomes a challenge to deliver the services effectively and efficiently as per client's demand. In this concern load balancing has become one of the major key...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2014

    Big Data Analysis with Dataset Scaling in Yet another Resource Negotiator (YARN)

    The data is exceedingly large day-by-day. In some organizations, there is a need to analyze and process the gigantic data. This is a big data problem often faced by these organizations. It is not possible for single machine to handle that data. So the authors have used Apache Hadoop Distributed...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2014

    Dynamic Resources for Multicore Processor using Register File Protection

    A massive investment in the design multicore has been accomplished through technologies that impose significant barriers to assure the reliable operation of future chips. Extremely complex, parallel, multi-core processor fabricated in these technologies will become more vulnerable to several factors that produce transient (soft) errors or permanent (hard) errors. One...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2014

    Web Usage Mining for Discovery and Evaluation of Online Navigation Pattern Prediction

    Web mining is combination of two activated research areas data mining and World Wide Web. Web mining is used for mining the interested knowledge from World Wide Web. Web usage mining is used to discover the user access patterns from web server log files. The first step of web usage...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2014

    Secure and Efficient Data Retrieval Process based on Hilbert Space Filling Curve

    Cloud computing economically enables the paradigm of data service outsourcing. However, to protect the secret data, sensitive information in cloud first the data has to be encrypted before outsourced to the commercial public cloud. It is a very challenging task. Although traditional attribute based encryption technique allow users to securely...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2014

    Hiding Encrypted Data in Audio Wave File

    Today at a time of globalization in which the whole planet become look like a small village and transport information through it with a push button in keyboard and at a time of huge evaluation in the digital world and for the millions of users to international net and some...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2014

    Multichannel Data Compression using Wavelet Subbands Arranging Technique

    To reduce the amount of data and preserve necessary signal quality for multichannel data transmission in many applications such as meteorology, or telemedicine, a new technique called WSAT is presented. The proposed technique is designed to deal with the large amount of multichannel data for transmission, and real-time analysis. The...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2014

    FPGA Implementation of Low Power and High Speed Hummingbird Cryptographic Algorithm

    Hummingbird is the latest ultra-lightweight cryptographic algorithm targeted for low cost smart devices. In this paper, the authors design a low power and high speed lightweight cryptographic hummingbird algorithm for hardware environment. The performance of the approach used is determined on XILINX platform using Verilog as hardware description language. They...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2014

    A User Identification Technique to Access Big Data Using Cloud Services

    Authentication is required in stored database systems so that only authorized users can access the data and related cloud infrastructures. This paper proposes an authentication technique using multi-factor and multi-dimensional authentication system with multi-level security. The proposed technique is likely to be more robust as the probability of breaking the...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2014

    FISM and FMICMAC Analysis on Enablers of Cloud Computing

    Cloud computing is an automatic multitenant pay-as-the user-go service accessed through web browsers. The main services of cloud computing are software as a service, infrastructure as a service and platform as a service. These services are very much helpful and beneficial to IT organizations undergoing severe budgetary constraints. In this...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2014

    A Frame work on AMBA bus based Communication Architecture to improve the Real Time Computing Performance in MPSoC

    Enormous advancements in System-on-Chip (SoC) have led to a new area called as MPSoC, having single chip with many processors. MPSoC is usually targeted for high-end embedded designs to meet real-time requirements, where performance and bandwidth plays a major role. Multi Processor System-on-Chip (MPSoC) deals with multiple on-chip processors and...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2014

    A Framework for Centralized Access Monitoring over Cloud Architectures

    While the authors talk about monitoring, the performance and compliance aspects are only on focus, however, the fine grained access logs also needs to be maintained if a proper internal audit is to be realized at organization level. Also, they do need to maintain long term logs for auditing purposes...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2014

    A Hierarchical Method for Dynamic Resource Allocation in Cloud

    Cloud computing has become a buzz word in real world. They provide rapid service to the customer mainly focusing on resource allocation. The main issue of cloud computing is to fix the dynamic resource allocation in order to improve the performance speed and reduce the cost, utilizing the resource efficiently....

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2014

    Review on Cloud Computing: Issues, Services and Models

    Cloud computing is Internet-based technology. It provides on-demand resources, software and information sharing by internet to users and devices. Cloud computing is the product of traditional network technology like grid computing, distributed computing and parallel computing. It is growing every day due to its basic services such as virtual pool...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2014

    Comparative Study of Load Balancing Algorithms through Virtual Machine Scheduling in Cloud Computing Environment

    In the cloud environment number of user can request for the services simultaneously, so there exist a need of mechanism that efficiently allocates the resources to the user. Due to highly dynamic and heterogeneous nature of resources in cloud environment it is very difficult to fully utilize the resources with...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2014

    Remote Monitoring and Control of Robotic Arm with Visual Feedback using Raspberry Pi

    The common misconception regarding robots is that, they are used for industrial purpose only. But it is not so, they find applications in different fields, ranging from simple household chores to space explorations. There are different ways to control these robots, but imagine the case of controlling a robot miles...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2014

    Fuzzy Gain Scheduling of PID Controller for a MIMO Process

    In this paper the authors describe the development of a fuzzy gain scheduling scheme of PID controllers for three tank process. This paper presents the controllers for three tank multi loop system using fuzzy gain scheduling. The application of Fuzzy Logic Controller (FLC) appears to be encouraging in the sense...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2014

    Security-SLA and Signature Scheme for Cloud Network

    Cloud computing is used for management of resources applications and information as services over the cloud. The resources used in cloud are usually distributed as services. Cloud resources are majorly delivered to the customers in terms of services and the security here is implemented through the infrastructure security metrics via...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2014

    Secure System Practices and Data Access Management in Wireless Sensor Network

    Wireless Sensor Networks (WSN) are a heterogeneous system with a collection of sensors distributed unbalanced patterns in remote areas, and often in unfriendly environments, without any pre-deployed architecture, and with limited hardware inside them. As the use of wireless sensor networks continuously growing, it should require efficient security mechanisms. Therefore...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2014

    Network Attacks and Their Detection Mechanisms: A Review

    In computer networks, an attack is an attempt to steal, disable, destroy, alter, or gain unauthorized access to or make unauthorized use of an asset. With the development of large open networks, security threats for the network have increased significantly in the past few years. Different types of attacks possess...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2014

    Recognizing Spam Domains by Extracting Features From Spam Emails Using Data Mining

    In this paper, the authors attempt to develop an algorithm to recognize spam domains using data mining techniques with the focus on law enforcement forensic analysis. Spam filtering has been the major weapon against spam, but failed to reduce the number of spam emails sent to an indiscriminate set of...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2014

    Spam Email Detection Using Structural Features

    In recent years, the authors have witnessed a dramatic raise in the use of web and thus email becomes an inevitable mode of communication. This is the scenario where the attackers take advantage by the mode of spam mails to the email users and misguide them to some phished sites...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2014

    Ranking with Distance Based Outlier Detection Techniques: A Survey

    Data mining is the practice of automatically searching large stores of data to discover patterns and trends that go beyond simple analysis. Outlier detection is very much popular in data mining field and it is an active research area due to its various applications like fraud detection, network sensor, email...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2014

    Cloud Business Intelligence Survey

    Organizations are always seeking to become more intelligent and achieve a greater competitive advantage by using Business Intelligence (BI) solutions. The new phenomenon of business intelligence is how businesses handle data. One of the instruments that can make the BI tools more accessible is cloud computing. This paper outlines some...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2014

    An Analysis of Task Scheduling in Cloud Computing Using Evolutionary and Swarm-Based Algorithms

    Cloud computing is a popular computing paradigm that performs processing of huge volumes of data using highly available geographically distributed resources that can be accessed by users on the basis of pay-as-per-use policy. In the modern computing environment where the amount of data to be processed is increasing day-by-day, the...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2014

    Enhanced Preprocessing Algorithm of Information System for Law Enforcement Using Data Mining Techniques

    Most of the data collection techniques, like survey studies, field experiments, crime findings, etc., produce huge amount of information, where missing values are inevitable. A data preprocessing is a process of cleaning the data, data integration and data transformation. It intends to reduce some noises and inconsistent data. Data preprocessing...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2010

    A Vision Based Hand Gesture Interface for Controlling VLC Media Player

    Human Computer Interaction can acquire several advantages with the introduction of different natural forms of device free communication. Gestures are a natural form of actions which the authors often use in user's daily life for interaction, therefore to use it as a communication medium with computers generates a new paradigm...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Comparison of Okumura, Hata and COST-231 Models on the Basis of Path Loss and Signal Strength

    Radio propagation is essential for emerging technologies with appropriate design, deployment and management strategies for any wireless network. It is heavily site specific and can vary significantly depending on terrain, frequency of operation, velocity of mobile terminal, interface sources and other dynamic factor. Accurate characterization of radio channel through key...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    A Survey of Energy Efficient Location Based Multipath Routing in MANET

    Mobile Ad-hoc NETwork (MANET) is a collection of mobile nodes that communicates with each other in the absence of centralized administration and fixed infrastructure. In MANET each node having a routing capability but their mobility swiftness are different and due to mobile behavior it is difficult to find out the...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    An Adaptive Particle Filtering Technique for Tracking of Moving Multiple Objects in a Video

    Tracking moving objects in a video is of critical importance in various fields such as traffic monitoring, video surveillance, human motion capture, etc. However, tracking multiple objects in a video is very challenging. To meet that, authors proposed a new adaptive technique for object localization through local and global appearance...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Constraint Based Data Mining Focusing Farming Case Study

    Data mining process may uncover thousands of patterns from a given data set; most of them may be unrelated to the users' interest. Also these rules occupy more memory space, take more time also require more efforts of the decision maker in analysis. To confine the search space users have...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    QoS Aware Reliable Cluster Based Routing Protocol (QoS-RCBRP) for Heterogeneous Mobile Ad-Hoc Networks

    Routing in mobile ad hoc network is an ever demanding research area. The aim of this research work is to design and develop QoS aware Reliable Cluster Based Routing Protocol (QoS-RCBRP) for heterogeneous mobile ad hoc networks. From the dense number of literatures it has been examined that when the...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Revised Modularity Index to Measure Modularity of OSS Projects with Case Study of Freemind

    Open Source Software (OSS) Projects are gaining popularity worldwide. Studies by many researchers show that the important key success factor is modularity of the source code. This paper presents the revised Modularity Index which is a software metrics to measure the modularity level of a java-based OSS Projects. To show...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    A Method for Calculating Frame Check Sequences in Tagged Ethernet Frames

    Like other technologies such as Internet Protocol (IP) or Transmission Control Protocol (TCP), an Ethernet frame also has a field to detect some errors occurred on transmission. This field is referred to as Frame Check Sequence (FCS). Usually, when an Ethernet frame conveys extra information on some feature such as...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    A Comparison and Analysis of Soft Computing Techniques for Content Based Image Retrieval System

    Content-based image retrieval has become one of the most active research areas in the past few years. In this paper various methodologies used in the research area of Content Based Image Retrieval methods using Soft Computing techniques are discussed. The comparison and analysis of various soft computing techniques like Fuzzy...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Implementation of Recursive Structural Parser for Symbolic Computation Using Mathematical Pseudo Language and Features of Java

    Symbolic Computation is a Computer Algebra System (CAS) which is developed to compute the symbolic mathematical expressions consisting simple or complex calculations. Symbolic Computation provides the interface to provide input expression in a typical mathematical format. Mathematical problems related to algebra, logarithm, roots, sum & product of series etc can...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Performance Analysis of Low Complexity Error Correcting Codes

    From Shannon limit it is known that, for a particular bandwidth and noise characteristics, there exists a maximum rate at which data can be transmitted with arbitrarily small number of errors. Coding schemes are utilized to improve the data transmission efficiency. The paper aims to represent the comparative performance analysis...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    BER Performance Analysis for Optical Communication Using DPSK Modulation

    In this paper, the authors explain and analyze Bit Error Rate (BER) performance for optical communication system using Differential Phase Shift Keying (DPSK) modulation scheme. Specifically, after developing an approximate form BER expression, they explain the BER performance for different system parameters such as fiber length, gain and number of...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Analytical Comparison of Some Traditional Partitioning Based and Incremental Partitioning Based Clustering Methods

    Data clustering is a highly valuable field of computational statistics and data mining. Data clustering can be considered as the most important unsupervised learning technique as it deals with finding a structure in a collection of unlabeled data. A Clustering is division of data into similar objects. A major difficulty...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Performance Analysis of Ubiquitous Wireless Connectivity in a 3G/IEEE 802.11 Integrated Network

    UMTS networks promise to offer always on, ubiquitous connectivity with relatively low data rates for moderate to high mobility users in macro cell environments. On the other hand, IEEE 802.11 (WLAN) offers much higher data rates, comparable to 3G and other wireless local area networks, to users with low mobility...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Extraction of Frequent Patterns From Web Logs Using Web Log Mining Techniques

    World Wide Web is a huge repository of web pages and links. It provides profusion of information for the Internet users. The growth of web is tremendous as approximately one million pages are added daily. User's accesses are recorded in web logs. Because of the incredible usage of web, the...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Analysis on Techno-Economic Benefits of a Strategically Placed Distributed Generator in a Radial Distribution System

    Integration of alternative sources of energy into a network for Distributed Generation (DG) requires small-scale power generation technologies located close to the loads served. The move toward on-site distributed power generation has been accelerated because of deregulation and restructuring of the utility industry and the feasibility of alternative energy sources....

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Frame Based Video Retrieval Using Video Signatures

    The World Wide Web today has grown so wide and the video-on-demand applications and video share web are becoming very popular day-by-day on the World Wide Web. An efficient video similarity search algorithm for content-based video retrieval is important in video-on-demand based services. However, there is no satisfying video similarity...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Review and Survey of Broadband Microstrip Patch Antennas

    Microstrip Patch Antenna (MPA) is generally used in modern communication devices, and a large part of day-to-day communication is done through it. Study of literature of past few year shows that, the leading work on MPA is focused on designing compact sized broadband microstrip antenna. But inherently MPA have narrow...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Optimization of Execution Time Using Association Rule Mining Algorithms

    The efficiency of mining association rules is an important field of Knowledge Discovery in Databases. The Apriori algorithm is a classical algorithm in mining association rules. This paper presents optimization of execution time for classicical apriori and an improved Apriori algorithm (DFR-Direct Fined and Remove) to increase the efficiency of...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    A Survey on Regression Test Selection Techniques on Aspect-Oriented Programming

    An aspect oriented programming is gaining a lot of popularity these days, there is a growing interest because of crosscutting concerns in object oriented systems. When the aspect oriented features are added into object oriented features the new program needs to be regression tested, and, to reduce the cost, Selection...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Design of Multiplier-Less Reconfigurable Non-Uniform Channel Filters Using Meta-Heuristic Algorithms

    Low complexity and reconfigurability are reported to be the key features in a Software Defined Radio (SDR). To obtain these features, a reconfigurable architecture based on Frequency Response Masking (FRM) technique can be used for the implementation of the channel filters in the SDR. The frequency response masking approach is...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    SPC for Software Reliability Using Inflection S-Shaped Model

    Traditional statistical analysis methods account for natural variation but require aggregation of measurements over time, which can delay decision making. Statistical Process Control (SPC) is a branch of statistics that combines rigorous time series analysis methods with graphical presentation of data, often yielding insights into the data more quickly and...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    A Modified Fuzzy Logic Routing for Wireless Mesh Network

    To make routing decisions based on more than one check, buffer residency, node energy and hop count and to provide an efficient routing method for wireless mesh networks, a fuzzy based oblivious routing is proposed in this paper. Simulation results in ns-2 verify that they perform better than multiple restriction...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    S-Box Design Analysis and Parameter Variation in AES Algorithm

    In this paper fundamental scrutiny of AES algorithm with the non serviceable aspects i.e. elevated performance, high throughput, and area efficiency is offered. A virtual analysis of DES, 3DES and AES is shown. This paper will present the theoretical analysis of parameter variations in the generation of the S-BOX. The...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Analysis of Community Behavior of Delay Tolerant Protocols

    In Delay Tolerant Networks (DTNs) constitute the category of Mobile Ad hoc Networks. They are characterized by the absence of end-to-end path connectivity with limited data sources and power. DTN is a field where intermittent data communication is always a challenging task. To overcome the network partitioning, node mobility is...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    A Hand to Hand Taxonomical Survey on Web Mining

    The data mining techniques exploitation in the field of web is referred as web mining. The enormous data is present at the websites and this need to be tackled well with the help of different data mining techniques. Searching, puling data together and analyzing the data are the main focus...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Modeling Aspects for Step and Bus Topologies Under Distributed Computing System

    The distributed computing approach has the several advantages over the old centralized computing approach like reduction of execution time and low cost involvement. Many researchers have applied the modeling concepts for the distributed computing system. The most popular approach is the object-oriented modeling also known as Unified Modeling Language (UML)...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Comparative Analysis of Variations of Ant-Miner by Varying Input Parameters

    Ant Colony Optimization (ACO) studies artificial systems that take inspiration from the behavior of real ant colonies and which are used to solve discrete optimization problems. ACO can be applied to the data mining field to extract rule-based classifiers. This paper presents variations of Ant-Miner named cAnt-Miner (Ant-Miner coping with...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Analysis of Popular Video Shot Boundary Detection Techniques in Uncompressed Domain

    Now days there are tremendous amount of videos available on internet. Entertainment video, news video, sports video are accessed by users to fulfill their different needs. User's daily routine systems are also producing huge amount of videos for example surveillance system, shopping malls, home videos etc. These videos need to...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Data Privacy in Data Engineering, the Privacy Preserving Models and Techniques in Data Mining and Data Publishing: Contemporary Affirmation of the Recent Literature

    Privacy preserving for data engineering methods like mining and publishing etc., with the advancement of the rapid development of technologies like Internet and distributed computing has turned out to be one of the most important research areas of interest and has also triggered a serious issue of concern in accordance...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    User Behavior Modeling Based on Adaptive Gaussian Mixture Model

    A remarkable technological development has been witnessed due to the recent advancements in the area of science and technology. This made the users to access the Internet and store the information retrieved in various databases at various servers across the globe, making World Wide Web as an information gateway. This...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Current Trends in Parallel Computing

    In this paper a survey on current trends in parallel computing has been studied that depicts all the aspects of parallel computing system. A large computational problem that cannot be solved by a single CPU can be divided into a chunk of small enough subtasks which are processed simultaneously by...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Using Social Networking Data as a Location Based Warning System

    Twitter and Facebook are huge social networks that contain a lot of data that can be used for sentiment analysis. The authors often find out that a particular area they travel to is dangerous, after asking around. However what if they could use social networking data like 'Tweets' to find...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Multi-Colony Ant Systems for Multi-Hose Routing

    Ant System (AS) is a general purpose heuristic algorithm inspired by the foraging behavior of real ant colonies. AS and its improved versions have been successfully applied to difficult combinatorial optimization problems such as travelling salesman problem, quadratic assignment problem and job shop scheduling. In this paper, two versions of...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    A Neural Network Based Real Time Hand Gesture Recognition System

    Hand Gesture is habitually used in everyday life style. It is so natural way to communicate. Hand gesture recognition method is widely used in the application area of Controlling mouse and/or keyboard functionality, mechanical system, 3D World, Manipulate virtual objects, Navigate in a Virtual Environment, Human/Robot Manipulation and Instruction Communicate...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    MPLS Traffic Engineering in ISP Network

    Multi Protocol Label Switching (MPLS) is an innovative and vibrant technology. The most famous applications of MPLS technology are MPLS VPN, MPLT Traffic engineering and MPLS QoS and Any Transport over MPLS (AToM). This study addressed only MPLS Traffic engineering, which is one of the driving factors of deploying MPLS...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Analysis of Adaptive Semiblind Channel Estimation Scheme with Missed Data Channel Estimation Schemes in MIMO Antenna System

    Multiple Input Multiple Output (MIMO) antenna systems are being given much attention to provide high capacity with less bandwidth requirement. In this paper, some channel estimation techniques have been tried to implement with the adaptive semiblind channel estimation scheme using less requirement of pilot symbols similar to as in the...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Unit Based Scheduling in Project Management: A Programming Approach

    A unit based scheduling technique is proposed to assess networks of the given project and find out the optimum schedule. The proposed approach uses an iterative method to execute unit expediting and the expedition is done to the desired amount for all activities along the critical path. The output of...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Extending the UCP Model by Incorporating the Prevailing Trends in Software Effort Estimation

    This paper is an extension of the original UCP Model for software estimation by incorporating the factors that are currently weighted in estimation of software by IT professionals. The rationale of the study is to make UCP Model effective, realistic and more accurate for the current IT industry. To identify...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Data Hiding Scheme for Digital Images Based on Genetic Algorithms with LSBMR

    Modern information hiding technology is an important branch of information security. Hiding capacity is very much important for efficient covert communication. The redundancies of digital media as well as the characteristic of human visual system make hiding technology a significant one. Steganography is the Art and Science of writing hidden...

    Provided By International Journal of Computer Applications