International Journal of Computer Applications

Displaying 1-40 of 5484 results

  • White Papers // Oct 2014

    Quad Band H-Slot Microstrip Patch Antenna for WiMAX Application

    Antennas are important components in communication systems and play a role in transmitting and receiving signals. In modern wireless communication systems, multiband antenna has been playing a very important role for wireless service requirements. Now-a-days, antennas with multiband capabilities have been widely required in satellite and mobile communication systems to...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Analysis the Performance of MANET Protocol Under Black Hole Attack for E-Mail Application

    A Mobile Ad-hoc NETwork (MANET) is a collection of wireless mobile nodes having ability to communicate with each other without any fixed network infrastructure. Due to the unavailability of controlling entity, routing and network management are done cooperatively by respective nodes. MANET is an autonomous system where each node act...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Biclustering of Gene Expression Data Using a Two - Phase Method

    Biclustering is a very useful data mining technique which identifies coherent patterns from microarray gene expression data. A bicluster of a gene expression dataset is a subset of genes which exhibit similar expression patterns along a subset of conditions. Biclustering is a powerful analytical tool for the biologist and has...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Detection and Classification of Intrusions Using Fusion Probability of HMM

    The main definition of intrusion detection system starts with the use in hardware or software so that the data or traffic flows through these devices can be filtered since this traffic may contains some unwanted flow data that may harm to the system. Intrusion detection system is a technique of...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Artificial Intelligence and Cognitive Analytics Approaches towards Efficient Predictions for Business Intelligence

    Business intelligence techniques no longer just evolve around traditional databases and warehouses, but have leaped into the era of big data. The aim is now to extract as much hidden knowledge from this rich data. The data is highly varying and evolves from various sources. Business improvement strategies usually revolved...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    A Survey of Object Oriented JavaScript Language

    Many of the programmer's moves towards an object oriented programming languages due to its reusability nature, whereas in procedural programming languages reusability is not allowed which may contribute to the high cost of development. Most of web browsers make use of JavaScript as a user interactive program that is a...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    An Efficient Intruder Avoidance Method for MANETs

    Among all the up to date wireless networks, Mobile Ad-hoc NETwork (MANET) is one amongst the foremost necessary and distinctive applications. Unfortunately, the open medium and remote distribution of MANET create it at risk of numerous kinds of attacks. So, it is crucial to develop efficient intrusion-detection mechanisms to protect...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Multi-Level Data Integrity Service

    Cloud computing is an auspicious computing model that empowers on-demand network access to a shared pool of computing resources. One of the services offered by cloud is moving data into the cloud. Cloud Providers offer storage space to consumers for storing their data. Data moves between cloud providers and consumers...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Secure Cloud Computing with Third Party Auditing: A Survey

    Cloud computing based technology and their impact is growing now-a-day. Cloud computing is used in all the area of business, education, social impact and data miner. The growing demand is because of the on demand service and pay per basis used somehow in the unlimited form. But the uses enhance...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Enhanced the Security of Playfair Technique Using Excess 3 Code (XS3) and Ceasar Cipher

    In this paper, the authors are to provide security for the data that contains alphabets and integer values during the transmission, when data is transmitted form sender to receiver. As they know that playfair technique if best for multiple letter encryption, which treats the plain text as single units and...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Design and Implement Enhancing Security in Multi Cloud Storage System Using Distributed File System

    Distributed computing is a quickest developing engineering. It permits business associations to utilize or access diverse applications, store data without access their individual documents. While considering the force, strength and the security of cloud one can't disregard diverse dangers to client's information on distributed storage. Document access guarantee in true...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Application of Feature Selection Methods in Educational Data Mining

    In the recent years, web based learning has emerged as a new field of research due to growth of network and communication technology. These learning systems generate a large volume of student data. Data mining algorithms may be applied on this data set to study interesting patterns. As an example,...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    RUCM: A Measurement Model for Detecting the Most Suitable Code Component From Object Oriented Repository

    Software quality based applications development is the main concern is user satisfaction. It increases the reliability and efficiency of information retrieval and management. As the bundle of code created day-by-day the repository storing such code is regularly migrates the older code in to legacy systems. To develop and facilitate new...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Visual Secret Sharing Between Remote Participants

    Visual cryptography and random grids are forms of visual secret sharing that encrypt a secret image into indecipherable shares. Decryption occurs by printing them onto transparencies and stacking, but this requires participants to be in the physical presence of each other, so this paper addresses the use of visual secret...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Minimum Spanning Tree Based Improved Routing Protocol for Heterogeneous Wireless Sensor Network

    Performing multiple tasks like data aggregation, processing and communication to other Sensor Nodes (SNs) or Base Station (BS) is a very attractive and effective attribute carried out by Wireless Sensor Networks (WSNs). As SNs have limited energy resources, storage capabilities and processing, the network layer protocol has therefore to guarantee...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Cost and Time Evaluation of Load Balancing and Service Broker Strategies in Multiple Data Centers

    Cloud computing is a boon for almost every sector as it reduces the overall expenditure by making IT infrastructure, services and platform on \"On-demand\" basis. The \"Pay-as-you-go\" policy of cloud technology enables the users to use and pay for the services and computing infrastructure only when they need it without...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Fuzzy Based Effort Estimation Approach

    Besides of these there are many equation based effort estimation techniques like Halstead model, Bailey-Basil model, and Walston-Felix model. Cost and effort estimation are the major concern of any software industry. They are identified with the help of Kilo Line COde (KLOC) which denotes number of, line of code in...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    A Novel Method for Preserving Privacy in Big-Data Mining

    As the people daily lives has become digitization which led to an explosion in the collection of data by organization and individuals. Organization pushes their vast amount of data into big data clusters, but most have implemented zero security measures. Protection on confidentiality of these data is very important. In...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Diametrical User Control to Filter the Unwanted Messages from Online Social Networks

    Online Social Networks (OSNs) are the most impulsive standard to provide communication, sharing and disseminate a significant amount of individual life data. Content can be changed based on daily needs in several communication fields (audio, video, image, and text). One of the important aspects of OSN is to give the...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    An Investigational Analysis of different Approaches and Techniques for Time Synchronization in Wireless Sensor Network

    Time synchronization is one of the important research aspect from past decade due to its close correlation on Quality of Service (QoS) attributes in Wireless Sensor Network (WSN). One of the challenging issues is addressing time synchronization is that different WSN applications have particular QoS demands that varies from throughout,...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Performance Evaluation of Transport Layer in Cognitive Radio Ad-Hoc Networks

    In this paper, the authors have proposed some changes to MAC protocol for improving the performance of transport layer in cognitive radio ad-hoc networks. They have studied effects of different MAC and routing protocols on TCP in cognitive radio technology enabled environments. They have reviewed performance of TCP in two...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    A Clustering Algorithm in Complex Social Networks

    Complex networks are real graphs (networks) with non-trivial topological features. The empirical study of real-world networks like computer networks and social networks gives insights into the structures and properties of such networks. Identification of community structure is one of the important problems in social networks. Tightly knit group of nodes...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Comparison of Energy Detection Methods in Cognitive Radio Networks

    Cognitive Radio (CR) is used in mobile communication to make devices and networks better adaptable to changes in environmental parameters such as frequency allocation and regulation. Cognitive Radio (CR) is an emerging new paradigm in wireless communications. Its goal is to make frequency use more efficient by using temporarily unoccupied...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Performance Comparison of Diversity Techniques in MIMO Wireless Communication

    The goal for next generation of mobile communication system is to perfectly consistent integrate a broad variety of communication services like high-speed data, video and voice signals, multimedia traffic. In the paper, the authors have analyzed various diversity techniques to find out the optimum scheme for use. Diversity is a...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    A Novel Framework for Cloud Security Against Data Breach

    Cloud computing is the most emerging technology now-a-days. Every internet user accessing cloud services either directly or indirectly without knowing or aware of security aspects because of trust between the user and the cloud service provider. But, this trust is harmed by the malicious user or hacker by breaching the...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Advanced Feedback Encryption Standard Version-1 (AFES-1)

    In this paper, Advanced Feedback Encryption Standard version 1 (AFES-1), the researcher have combined both bit-level and byte level operations on the plain text. The researcher had recently published Multi Way Feedback Encryption Standard version 3 (MWFES-3). MWFES-3 is a byte level encryption algorithm. The authors have capitalized on the...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    A Stream Based Implementation of Secured SOA Model Using XML Encryption and XML Signature

    Web service security is essential for SOA-based applications; it has explorative set of technologies such as Simple Object Access Protocol (SOAP), Web Services Description Language (WSDL) and Universal Description, Discovery and Integration (UDDI), and electronic business XML (ebXML). These promote an environment for organizations to communicate in Internet. The inevitable...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Application of Multimedia Technology in Database and IT Service Management

    Multimedia is a blend of two or more media such as text, sound, graphics, animation and video, to effectually converse ideas to the users and this could be in linear or non-linear form. The application of multimedia technology to database and IT service management has improved enormously in recent times....

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    A Zeroth-Order Resonance Patch Antenna for Dual Band Operations with Broad E-Plane Beam Widths

    In this paper, design of probe fed Zeroth Order Resonance (ZOR) antenna with dual frequency operation is presented. The mushroom structure is placed at the center of the geometry and the grounded via to have the desired ZOR response. The feed is connected between the inner ring and the mushroom...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    High Performance Multicast Routing Protocol in Mobile Ad-Hoc Network

    In this paper, the authors intend to improve the performance of MANETs - Mobile Ad-hoc NETworks handling high volume traffic by introducing an enhanced tree based multicast routing protocol with efficient management of topology and groups with an improvised label mechanism capable of building alternate paths and secure better transmission...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    A New Approach for Extraction of Pattern Frames in Text Mining

    Due to the rapid growth in World Wide Web (WWW) and data availability, text mining has become one of the most important fields in data mining. Text mining refers to the technique which is useful to find the information from a huge volume of digital documents. Many existing text mining...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Improved Leach Using Highest Remaining Energy First Based Cluster Head Selection

    Power effectiveness found to be main limitation in WSN due to insufficient battery of sensor nodes. Therefore, the most significant focus of the existing work is to locate the ways to decrease the difficulty of power utilization and will result in improvement in the network stability period and life time....

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Network Reliable Routing Protocol for Event-Driven Wireless Sensor Network

    Wireless Sensor Networks (WSNs) are a collection of various densely deployed sensor nodes which is implemented in a variety of applications such as home, medical, military, security surveillance and combat field reconnaissance etc. An Event-driven Wireless Sensor Networks (EWSNs) is a type of wireless sensor network in which the desired...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Third-Party Application Maintenance Management

    The success and failure of software projects are based on performance indicators such as: compliance to the customer first requirements, customer satisfaction, and software quality, budget overrun, schedule compliance and so on. Certainly, project management approaches and best practices known in the field of software engineering or others have been...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Survey on How to Read a Dendrogram

    Cluster analysis is one of the most important functionality of data mining. With the advent of such a data mining technology, cluster analysis of items is frequently done in supermarkets. Cluster analysis groups objects based on the information found in the data describing the objects or their relationships. The goal...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Scalable Parallel Clustering Approach for Large Data Using Possibilistic Fuzzy C-Means Algorithm

    Clustering is an unsupervised learning task where one seeks to identify a finite set of categories termed clusters to describe the data. The proposed system, try to exploit computational power from the multi-core processors by modifying the design on existing algorithms and software. However, the existing clustering algorithms either handle...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Slot Cut Ultra Wide Band Antennas

    The ultra wide band antennas are required in applications where larger bandwidth for the transmitting signal is needed. They cover wide bandwidth in the range from 500 MHz to the frequencies above 8000MHz. In this paper, a review of various techniques to realize ultra wide band Micro-Strip Antennas (MSA) is...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Highly Secure Method Based on Ciphertext Policy Attribute Based Encryption in Hadoop System

    Cloud computing is one of today's most exciting technologies due to its ability to reduce costs associated with computing while increasing flexibility and scalability for computer processes. Cloud computing is set of resources and services offered through the Internet. The rapid growth in field of \"Cloud computing\" also increases severe...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Software Effort Estimation: A Fuzzy Logic Approach

    There are many equation based effort estimation models like Bailey-Basil Model, Halstead model, and Walston-Felix model. Effort and cost estimation are the major concern of any sort of software industry. They are calculated with the help of Kilo Line COde (KLOC) which are the number of, line of code in...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Routing Protocols Used for CRN : A Survey

    Cognitive Radio (CR) is an emerging technology in the wireless communication. CR nodes have the capability to change its transmission or reception efficiently without interfering with licensed users. The network formed with CR nodes communicating with each other is called Cognitive Radio Network (CRN). CRN utilizes the unutilized frequency spectrum....

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A 64 Bits Dynamically Key Controlled Symmetric Cipher (KAMFEE-X64)

    This paper presents an improved version of KAMFEE cipher. The proposed cipher (KAMFEE-X64) is designed to be compatible with the new 64 bits microprocessors unlike the old cipher (KAMFEE) which is designed for systems based on x86 microprocessors. KAMFEE-X64 has a key dependent block length and key dependent rounds, enhanced...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A Review of Automatic Test Cases Generation

    Manual testing is hard and time consuming and it may be impossible for large systems or tester mistake in the test. The software testing is the rising cost of activities in development software and the test case generation is important activity in software testing. Hence researches performed to automate testing...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Multi Lingual Speaker Identification on Foreign Languages Using Artificial Neural Network

    Based on the Back Propagation Algorithm, this paper portrait a method for speaker identification in multiple foreign languages. In order to identify speaker, the complete process goes through recording of the speech utterances of different speakers in multiple foreign languages, features extraction, data clustering and system training. In order to...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A New Approach for Information Security Using Asymmetric Encryption and Watermarking Technique

    Rapid growth of internet and networked information systems has contributed a lot in the increase of multimedia contents. As digital contents are increasing day by day on internet it has raised requirement for the effective protection of multimedia assets (images, audios, videos). This paper proposes a new approach to protect...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A Design of Authentication and Access Control Model for Remote Access Using GSM Technologies

    The GSM technologies plays vital role in pervasive computing environments. The open and dynamic nature of the pervasive computing environment allows entities to join and leave frequently. This causes a large number of autonomous entities to interact in an ad-hoc manner, raising concerns as to the trustworthiness of the service...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Removal of Network Ambiguities Through Knowledge Based System

    Documents on the Internet are composed of several kinds of multimedia information when accessed for personal, entertainment, business, and scientific purposes. There are many specific content domains of interest to different communities of users. Extracting semantic relationships between entities from text documents is challenging task in information extraction. By semantics...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Lifetime Maximization of Wireless Sensor Networks Using Improved Genetic Algorithm Based Approach

    In Wireless Sensor Networks the nodes have limited energy and are seriously constrained by the battery life. To increase the lifetime of the network is a critical and challenging issue and thus it is the routing in WSNs, which is the primary focus of design for researchers. In this paper...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Innovative Performance Evaluation of Unnecessary Handoffs and Handoff Failures During Access Network Selection Between WLAN and Cellular Networks

    Received Signal Strength based (RSS) horizontal handoff algorithms have been most commonly used by nearly all second generation and third generation wireless networks in a homogeneous environment. Vertical handoffs or network selection algorithms are the terms coined due to integration and interoperability of existing wired and wireless access networks under...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Survey on Securing Data in Cloud

    Cloud computing is an innovative information system architecture which reduces the overall client side resource requirements. Even though the data outsourcing reduce the burden of client storage the clients no longer have physical possession of data which will leads to so many security issues. Hence the user need to make...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Multimodal Biometric System Using Iris, Palmprint and Finger-Knuckle

    Most real-life biometric systems are still unimodal. Unimodal biometric systems perform person recognition based on a single source of biometric information. Such systems are often affected by some problems such as noisy sensor data, nonuniversality and spoof attacks. Multibiometrics overcomes these problems. Multibiometric systems represent the fusion of two or...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    An Efficient Bee-Inspired Auto-Configuration Algorithm for Mobile Ad Hoc Networks

    The infrastructure-less and dynamic nature of Mobile Ad-hoc NETworks (MANETs) requires the implementation of a new set of networking technologies in order to provide efficient end-to-end communication according to the principles of the standard TCP/IP suite. Routing and IP address auto-configuration are among the most challenging tasks in the ad...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Broadband Microstrip S-Shaped Patch Antenna for Wireless Communication

    This paper presents a single-patch broadband microstrip S-shaped patch antenna. Microstrip S-shaped patch antenna, fed by a coaxial feeding. The antenna is designed by inserting two slots into rotated square patch then it look like english letter S. Because of the slots and thick substrate, bandwidth of antenna is increased....

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A Fuzzy Approach for Privacy Preserving in Data Mining

    Advances in hardware technology have increased storage and recording capabilities regarding individual's personal data. Privacy preserving of data has to ensure that individual data publishing will refrain from disclosing sensitive data. Data is anonymized to address the data misuse concerns. Recent techniques have highlighted data mining in ways to ensure...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Bank Locker Security System Based on RFID and GSM Technology

    The main goal of this paper is to design and implement a bank locker security system based on RFID and GSM technology which can be organized in bank, secured offices and homes. In this system only authentic person can be recovered money from bank locker. The authors have implemented a...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Survey of Integrating Testing for Componentbased System

    Today's software larger in size, design complex and time consuming to implement them, for this the authors need a prominent solution to overcome these problems. Component-Based Software Development (CBSD) has emerged as an Object Oriented (OO) Software Engineering approach that forced rapid software development. Using CBSE approach they can eliminate...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A Novel Approach of Speedy-Highly Secured Data Transmission Using Cascading of PDLZW and Arithmetic Coding with Cryptography

    The spread of computing has led to an outburst in the volume of data in the communication world. The paper proposes the cascading of two algorithms PDLZW and Arithmetic Coding with cryptography. With the hierarchical parallel dictionary set, the search time can be reduced significantly and all these dictionaries are...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Stock Market Prediction Model by Combining Numeric and News Textual Mining

    This paper proposes a novel method for the prediction of stock market closing price. Many researchers have contributed in this area of chaotic forecast in their ways. Data mining techniques can be used more in financial markets to make qualitative decisions for investors. Fundamental and technical analyses are the traditional...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Review of Fractal Transform Based Image and Video Compression

    Fractal Compression is a new technique in the field of color and video compression. This technique has grabbed much attention in recent years because of very high compression ratio that can be achieved. It also provides interesting interpolation features to zoom the images. Hybrid schemes incorporating fractal compression and speedup...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Enhancement in Feedback Polynomials of LFSR Used in A5/1 Stream Cipher

    There is encryption algorithms used in GSM. This is for to encrypt the information when transmit from mobile station to base station during communication. As stated that A5/1 is strong algorithm but it cryptanalysis by cryptanalysts. This paper modified concept to improve A5/1 encryption algorithm by consideration of feedback combining...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    WEB Based Service Platform of Population

    The Indian Census is the most credible source of information on Demography (Population Characteristics), Economic Activities, Literacy and Education etc. As the Census data plays a vital role for the future of the country it is very important to maintain it properly and accurately. As of now census data is...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Combining Advanced Encryption Standard (AES) and One Time Pad (OTP) Encryption for Data Security

    The development of telecommunications technology and data storage using the computer has become a necessity because there are many jobs that can be completed quickly, accurately, and efficiently. In addition it allows data transmission distance is relatively fast and cheap, but on the other hand long-distance data transmission is possible...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Concept of Designing an Optimized Pull Model View Controller Type Content Management Framework

    Based on the concept of "Easy to learn and develop for anyone", the authors present an integrated framework concept for developing content management system using an optimized pull Model View Controller (MVC) type in web programming. The framework consist of four easy steps to follow: first step is determining web...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Cyber Security Approach in Web Application Using SVM

    Internet is open source for web access like for the purpose of railway reservation, online banking, online fees submission etc. Security concern is the most threatening topic for users about their confidential information's storage. various security designing and algorithms has been designed to impose secure environment for user but still...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A Research on Decentralized Clustering Algorithms for Dense Wireless Sensor Networks

    A wireless sensor network with large number of sensor nodes can be used as an effective tool for collecting data in various situations. Recent advancement in wireless communications and electronics has enabled the development of low-cost sensor network. Wireless sensor networks are web of sensor nodes with a set of...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    CO2 Monitoring System from Remote Location Using GSM, GPS and Concept of MODBUS

    The system developed here is useful for measurement of waste gas (like Co2) remotely. This will helpful particularly for the environment department because many chimneys releases polluted gases now-a-days, which is a serious issue for Global warming. If any factory emits gas beyond some predefined specified limit, this system will...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Hybrid Model for Location Privacy in Wireless Ad-Hoc Networks for Mobile Applications

    A wireless ad-hoc network is a decentralized type of wireless network. The network is ad-hoc because it does not rely on a preexisting infrastructure, such as routers in wired networks or access points in managed (infrastructure) wireless networks. Now-a-day in fast growing world, use of internet is increasing popularly and...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Multipath Global Rerouting for Fault Tolerant Overlay Network (FTON) in Labeled Optical Burst-Switching

    In this paper, mainly concentrate on reduce the burst loss and Non-availability of wavelength in network; proposed an overlay model known as Fault Tolerant Overlay Network (FTON) which improves the performance of a regular IP electronic network. An FTON is created over the existing network; an FTON node collects the...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Application of Fuzzy Analytic Hierarchy Method in Software Engineering Scenario

    In software engineering scenario, software effort estimation is very uncertain and depends on various external factors .For developing a particular type of software, selection of an optimal and experienced group of developer is essential for software development organization for organizational benefits and is necessary because success and failure of software...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A Framework for Android and J2ME Bluetooth Communication

    Mobile applications development is attracting more and more developers recently due to the emergence of new mobile platforms such as Android; which is making application development easier as well as its' marketing. All new Smartphone's now support Bluetooth, a popular communication medium for mobile phones. However, cross-platform Bluetooth communication between...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Mobile Client's Access Mechanism for Location Based Service Using Cell-ID

    Today's location-sensitive service relies on user's mobile device to determine its location and send the location to the application. A location-based service is a service that determines the location of a mobile device and uses this to provide functionalities and information specific to that location. With the growth of the...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Performance Analysis of Backoff Exponent Behaviour at MAC Layer In ZigBee Sensor Networks

    Topology is one of the major new paradigms and is the premier research topic in ZigBee based Wireless Sensor Network and has opened up new challenges for researchers throughout the World due to its wide range of applications ranging from medical research to military. IEEE 802.15.4/ZigBee is a worldwide open...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Performance Analysis for Visual Data Mining Classification Techniques of Decision Tree, Ensemble and SOM

    This paper is a comprehensive report on experimental setup, data collection methods, implementation and result analyses of market segmentation and forecasting using neural network based artificial intelligence tools. The main focus of the paper is on visual data mining applications for enhancing business decisions. The software based system is implemented...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A Survey on Preventing Jamming Attacks in Wireless Communication

    Communication in wireless network is possible with an air medium. Due to the high security threats in this system, the network may face various difficulties. One of the major threats is jamming attack which comes under Denial Of Service (DOS) attack. Jamming attack is common among many exploits that compromises...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Test Case Generation Based on Activity Diagram for Mobile Application

    Testing impacts the popularity of any software and hardware products. If proper testing of any product is done it will increase the cost and sale of the product. Mobiles are widely used electronic device there are several mobile companies established which provide variety of applications and features. It is obvious...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Network Security Using Firewall and Cryptographic Authentication

    The network Security is the hottest topic in the current research scenario. The information security is really threatened by obnoxious users. With increasing vulnerabilities, caused by port scan attacks, replay attacks and predominantly IP Spoofing, targeting services, the network behavior is getting malevolent. But there is a lack of any...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Box-Office Opening Prediction of Movies Based on Hype Analysis Through Data Mining

    Box-office performance of a movie is mainly determined by the amount the movie collects in the opening weekend and Pre-Release hype is an important factor as far as estimating the openings of the movie are concerned. This can be estimated through user opinions expressed online on sites such as Twitter...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Graph Neural Network for Minimum Dominating Set

    The dominating set concept in graphs has been used in many applications. In large graphs finding the minimum dominating set is difficult. The minimum dominating set problem in graphs seek a set D of minimum number of vertices such that each vertex of the graph is either in D or...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    A Stream Cipher Algorithm Based on Nonlinear Combination Generator with Enhanced Security for Image Encryption

    This paper describes a novel approach for image encryption using stream cipher algorithm based on non linear combination generator. This work aims to enhance the security of encrypted image. The work is based on the use of several linear feedback shifts registers whose feedback polynomials are primitive and of degrees...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Artificial Neural Network Modelling of Traffic Noise in Agra-Firozabad Highway

    The noise is a major environmental hazard at present. It causes hearing problem, tinnitus, high blood pressure, mental depression, heart palpitation etc. Noise is a usual problem everywhere and involves high health risk, but in today's fast life the authors ignore its harmful consequences and it results in high health...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Network Connectivity Based Topology Control for Mobile Ad Hoc Networks

    Energy consumption and network connectivity are two of the important research issues that are yet to be resolved in Mobile Ad-hoc NETworks (MANETs). However, only a few topology control methods (e.g.) take into account the low interference as a goal of the methods. Some researchers tried to indirectly reduce the...

    Provided By International Journal of Computer Applications