International Journal of Computer Applications

Displaying 1-40 of 6208 results

  • White Papers // Feb 2015

    A Review on Big Data Integration

    Big data technologies are becoming a current talk and a new "Buzz-word" both in science and in industry. Today data have grown from terabytes to petabytes and now it is in zeta bytes. Increased amount of information increases the challenges in managing and manipulating data. Data integration is a main...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Text Encryption Algorithms Based on Pseudo Random Number Generator

    In this paper, the authors present algorithms for encryption and decryption developed using Pseudo Random Number Generator (PRNG) and non-Linear functions. PRNG used in the work are matlab Random Number Generator (RNG) and Linear Congruential Generator (LCG). The developed algorithms are named according to PRNG used in it. State of...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Trends and Technologies Used for Mitigating Energy Efficiency Issues in Wireless Sensor Network

    The area of wireless sensor network is one the constant attention of the research community owing to its potential advantages and the persistent issues associated with it. In the recent times, various applications are conceptualized where Wireless Sensor Network (WSN) is used either as a sub-network or as a complete...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Handover Modeling of Multiple States of Mobile Node in a Five Node Network Model

    In today's world, user demands keep changing at a faster rate. To keep up the pace with the fast changing needs, technology also needs to change accordingly. In this paper, handover probability, unnecessary handover probability, missing handover probability and wrong decision probability are computed for a five node network model....

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    A Survey: Load Balancing for Distributed File System

    Distributed systems are useful for computation and storage of large scale data at dispersed location. Distributed File System (DFS) is a subsystem of distributed system. DFS is a means of sharing of storage space and data. Servers, storage devices and clients are on dispersed location in DFS. Fault tolerance and...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Price Prediction of Stock Market Using Hybrid Model of Artificial Intelligence

    Today, investment by purchasing stock-share constitutes the greater part of economic exchange of countries and a considerable amount of capital is exchanged through the stock markets in the whole world. But one of the most important problems is finding efficient ways to summarize and visualize the stock market data to...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    An Overview of Vertical Handoff Decision Algorithm

    In wireless communications of fourth generation the expectation to assimilate a hypothetically numerous heterogeneous wireless technologies are happened under consideration of a novel step toward worldwide smooth access. As the popularity of mobile wireless networks increases as well the challenges of merging a various number of wireless networks increases. Everyone...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Congestion Control Techniques in a Computer Network: A Survey

    With the advance in technology the focus has shifted from desktops and laptops to handheld devices like tablets, phablets, mobile phones, PDA etc. giving rise in the number of users connected to internet. About 900 million computers are connected to internet. In an hour 383 thousand TB of data transmission...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    An Enhanced ATM Security System Using Second-Level Authentication

    The increase of Automated Teller Machine (ATM) frauds has actuated the development of new authentication mechanisms that can overcome the security problems associated with the Personal Identification Numbers (PIN). The traditional PIN entry system has stood the test of time mainly because of its speed and memorability which are part...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Area Coverage Redundancy and Node Positioning in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) create the platform of an extensive range of applications linked to national security, surveillance, military, health care, and environmental monitoring. One of the most imperative and elementary problems in Wireless Sensor Networks (WSNs) is the coverage problem. Network coverage of wireless sensor network means how well...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Design and Analysis of Meander Microstrip Antenna at Wireless Band

    Meander Line Antenna (MLA) is an electrically small antenna which poses several performance related issues such as narrow bandwidth, high VSWR, low gain and high cross polarization levels. This paper describe the design, simulation and development of meander line micro-strip antenna at wireless band, the antenna was modeled using micro-strip...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Fraud Detection in Current Scenario, Sophistications and Directions: A Comprehensive Survey

    Fraud Detection is one of the oldest areas of research. The requirement of an effective system that detects frauds effectively with zero loss exists until now. This is due to the increase in the technology, that influences both the ends; the user and the fraudster. Hence it becomes mandatory that...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Encrypted Information Hiding Using Audio Steganography and Audio Cryptography

    With the growing importance of the internet, secure transmission of information is crucial. Steganography and cryptography helps in providing this much needed data confidentiality. Steganography hides secret information into a cover medium and cryptography converts data into an unrecognizable form. In this paper, the authors proposed a novel approach for...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Formal Conceptual Framework for Structure of Context of Component-Based System for Designing Robust Software Systems and Metrics

    For defining a set of unambiguous and language-independent metrics and other relevant concepts, the need for definition of a formal conceptual framework of the context/environment, particularly for safety-critical environments, has earlier been recognized and emphasized. In this paper, a formal conceptual framework is proposed for defining metrics and other relevant...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Characteristics of a Fuzzy Project Network Using Statistical Data

    In this paper, characteristics of fuzzy project network using statistical data are discussed in detail in order to calculate the fuzzy critical path, fuzzy earliest times, fuzzy latest times and fuzzy total float. Fuzzy number as fuzzy activity time is constructed using interval estimate by calculating mean, variance and standard...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Developing Web-Based Semantic and Fuzzy Expert Systems Using Proposed Tool

    Developing the Expert System (ES) using conventional programming languages is very tedious task. Therefore, it is not surprising that tools have been developed that can support the knowledge engineer. Separate tools now exist to support the knowledge acquisition and to support the implementation. Fuzzy set theory is used to capture...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Efficient Bandwidth Management and Implementation of Cross-Layer Queuing Model in a Wireless Campus Area Network

    In this paper, the authors investigate the use of an efficient bandwidth management scheme by implementing cross-layer M/M/1 queuing model. Strict Open System Interconnection (OSI) layer to layer communication problem is solved by introducing a common database that automatically synchronizes the status of each OSI layer to all the other...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    A Trusted Misbehaviors Detection Scheme in Delay Tolerant Network

    Misbehavior of node represent a serious threat against routing in delay tolerant network. In this paper mainly focus to improve the packet loss during the transmission of packet one to another node and also deal with selfish and malicious node. In this paper introducing a periodically available trusted authority. TA...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    A Review on Improvement of QoS in Web Services Functions

    Web services provide a mechanism to aggregate multiple services into one composite services. It selects services based on functional and non-functional attributes of services according to the applied user constraints. Abstract service ontology is a framework for optimized service selection which is formalized and developed by using OWL2-RL language. Abstract...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    A Hybrid Ant Colony Optimization Algorithm using MapReduce for Arc Routing Problem

    Ant Colony Optimization (ACO) could be a comparatively new random heuristic approach for determination optimization issues. Furthermore, This paper extends these implementations with two local search methods and the authors compare two heuristics that guide the HACO algorithms. However, relatively few results on the runtime analysis of the ACO on...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Detection of Objects in Aerial Videos for Object Extraction and Tracking for UAV Applications

    The growing security challenges raise the importance of research in the area of automated surveillance and tracking. Algorithms for real time video processing of aerial live videos can be very useful for meeting next generation surveillance needs. In this paper, a robust mechanism for extracting object and tracking in videos...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Enhancing Cryptographic Security Using Novel Approach Based on Enhanced-RSA and Elamal: Analysis and Comparison

    Cryptography is generated to create secure data transmission over networks. The algorithm chosen for cryptography should satisfy the conditions of authentication, confidentiality, integrity and non-repudiation. Recent years have witnessed the phenomenal growth of RSA. The authors design an algorithm to merge both enhanced RSA algorithm and El-Gamal algorithm to provide...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Situational Analysis of Significant Research Contribution in Optical Network

    With the increasing demands of high speed internet and long-haul networking system, optical network has largely contributed in the area of network and communication system. Owing to lossless transmission and ability to carry massive data in a single optical fiber, optical networking has highly positive potential. It was seen that...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    OpenCL Parallel Blocked Approach for Solving All Pairs Shortest Path Problem on GPU

    All-Pairs Shortest Path Problem (APSP) finds a large number of practical applications in real world. This paper presents a blocked parallel approach for APSP using an open standard framework OpenCL, which provides development environment for utilizing heterogeneous computing elements of computer system and to take advantage of massive parallel capabilities...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    An Improvement of Forgery Video Detection Technique Using Error Level Analysis

    Now-a-days, videos are core part of live entertainment in television and movies, and they are breathing of real entertainment world. People believe movies and video snaps in everywhere of digital media. Digital Photo images are everywhere: on the covers of magazines, in newspapers, in courtrooms, and all over the Internet....

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Cloud Computing: A Survey on Cloud Computing

    The internet is marvelous technology of the computing world. The most exhaustive technology that internet dispense, is the Cloud Computing. It provides instrumental values to the customers and cloud service providers. With the advent of cloud computing the client uses the resources like hardware, software or storage, that are offered...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Comparison Analysis of Link Prediction Algorithms in Social Network

    Social network depicts the relationship like friendship, common interests etc. among various individuals. Social network analysis deals with analysis of these social relationships. Link prediction algorithms are used to predict these social relationships. Given a social network graph in which a node represents a user and an edge represents the...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Ruby on Rails - An Agile Developer's Framework

    Agile development framework is a free, open source web application development framework. It aims at expanding the speed and ease with which database-driven web applications can be made. Agile web development emphasizes clear goals, planning, incremental and iterative delivery in this way guarantees the successful completion of a product at...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Fuzzy Based Congestion Detection in Computer Network

    The traditional transmission control protocols are not so efficient for high speed computer networks and it has been a challenge to design a model that can be able to reduce congestion problem. In now-a-days, the people life is very much affected by the internet. In any network, network congestion is...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    A Review Paper on Object Detection for Improve the Classification Accuracy and Robustness Using Different Techniques

    Object detection is a computer technology that connected to image processing and computer vision that deal with detecting instance objects of certain class in digital images and videos. Object detection is a challenging problem in vision based computer applications. It is used to identifying that whether in scene or image...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    A Conceptual Framework for QoE Measurement and Management in Networked Systems

    Network management of real time applications demands a new approach for an effective service quality provision. The traditional approach of network management based on Quality of Service (QoS) parameters like jitter, throughput, delay and loss cannot give enough details of how user quality demands. Therefore network management approach must start...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Pipelined Implementation of Dynamic Rijndael S-Box

    Pipelined architecture for S-Box is proposed in this paper. ROM based look-up table implementation of S-Box requires more memory and introduces unbreakable delay for its access. Pipelined S-Box of combinational logic based implementation gives higher throughput and less delay as compared to that of no pipelined S-Box. 5, 6 and...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Dual Level Security for Key Exchange Using Modified RSA Public Key Encryption in Playfair Technique

    In this paper, the authors are to provide the dual level security for the key in playfair cipher using modified RSA digital signature scheme. This paper has two phases, in the first phase the key is converted into the ASCII code and in the second phase, this paper is using...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Software Test Process, Testing Types and Techniques

    Software testing is the most critical phase of the Software Development Life Cycle (SDLC). Software under test goes through various phases, which as per the study are test analysis; test planning, test case/data/environment preparation, test execution, bug logging and tracking and closure. There is lot of research which has been...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Business Intelligence Design Model (BIDM) for University

    Information and knowledge are the backbone of any organization's development because they are used in decision making processes. In addition, the management level of any organization is looking forward to ensure the quality and the effectiveness of the work performances depending on the knowledge to make the right decisions. But...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Image Symmetric Encryption Based on Block Displacement

    In this paper, the authors are explaining the management of security. This will allow users authorization and integrity, accuracy and images security circulating on the internet. Addition to that, more effort is required for an image-based data in the process of encrypting and decrypting the image. Proposed architecture facilities for...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Parking Navigation and Payment System Using IR Sensors and RFID Technology

    The main problem in today's crowded parking facility is congestion and finding a vacant parking space. In this paper, a navigation method is proposed that minimizes the parking time, based on collected real-time vacancy information of parking slots. In the proposed method, a central server in the parking facility collects...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Comparative Analysis of Various Attacks on MANET

    Mobile Ad-hoc NETworks (MANETs) is a part of wireless networks. No wires and fixed routers are used in this type of network. It is not everlasting network; it is the short term network. Nodes has the capability to self organize themselves and it follows infrastructure less architecture. Network is formed...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Performance Analysis of MIMO-OFDM and MISO-OFDM System Based on STBC Code

    MIMO (Multiple Input Multiple Output)-OFDM (Orthogonal Frequency Division Multiplexing) technique is most attractive techniques in wireless communication system and it is very popular for high data rate capacity and against multipath fading. This paper presents performance analysis and a comparative study of OSTBC (Orthogonal Space Time Block Code) over Rayleigh...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Efficient Clustering with Proposed Load Balancing Technique for MANET

    In this paper, an efficient and modified load balancing algorithm is proposed. This paper shows the results of the proposed energy aware load balancing algorithm. Global re-clustering is initiated when the network becomes significantly unbalanced i.e. if the variance of degree of the cluster heads in the network is greater...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Analytical Approach in Terms of Lead and Lag Parameter to Tune Database Performance

    Performance tuning in database management system means escalating the performance of database by reducing time. For enhancing performance, analysis is important and analysis can be performed by neural network learning to save time spent in doing repeated work because neural network has ability to adapt dynamically varying environment. In this...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Performance Tuning in Database Management System based on Analysis of Combination of Time and Cost Parameter through Neural Network Learning

    Performance tuning in database management system means enhancing the performance of database, i.e. minimizing the response time at a very optimum cost. Query optimization is one of the important aspects of performance tuning. Lots of research work has been done in this field but it is still ongoing process. To...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Enhanced Secured Multi cloud using Technical Environment and Regulatory Framework

    Cloud computing is the rising generation key platform for sharing the resources like software as a service, infrastructure as a service, and platform as a service. In future all IT enterprises migrate into cloud platform. Cloud server exchanges the messages for remote location users with the help of multi cloud...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    An Energy Efficient Cooperative MISO Transmission Scheme for Cluster-based Wireless Sensor Network

    Wireless sensor network becomes an attractive choice for different applications because of their multitasking nature such as sensing the data, computing the data, and transmitting that data to the main location. But wireless sensor network have a number of tiny sensor nodes which are operate on small batteries. So it...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Performance Analysis of Various Architectural Approaches in Cloud Computing Environment for Energy and Bandwidth Minimization

    Cloud computing is one of the mainly admired subject in the computational world. It is support to processing the data that was emerged by profitable infrastructure. Cloud computing consist of large number of servers comprising of both virtual and physical servers in order to provide the resources in an optimal...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Improved Task Scheduling Algorithm in Cloud Environment

    Cloud computing is one of the hottest word in IT world and it having huge demand in these days. Some big IT companies like Google, IBM, Microsoft, Amazon, Yahoo and others develop cloud computing systems and products related to it for customers. But still customers are having difficulties for adopting...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Solution to Security and Secrecy in Cloud Environment using PAKE Protocol - A Bibliographic Survey

    Cloud computing is an emerging technology that provide people a way to share large amount of hardware and software resources that belong to different organizations. Maintaining privacy and security in cloud environment is more complicated. Mitigating threats in a distributed computing environment is a difficult task as it requires constant...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    A Novel Approach towards Tourism Recommendation System with Collaborative Filtering and Association Rule Mining

    In the tourism recommendation system, the number of users and items is very large. But traditional recommendation system uses partial information for identifying similar characteristics of users. Collaborative filtering is the primary approach of any recommendation system. It provides a recommendation which is easy to understand. It is based on...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Analysis and Verification of Multi-Core Enabled ESL Model using SystemC and VLang

    Today most of the System-on-Chip (SoC) integrate multiple processing cores, digital signal processors, as well as dedicated hardware accelerators, etc. This results into large and complex systems which pose challenges to conventional design and verification flow. This raises the need for higher level of abstraction (i.e. electronics system level abstraction)....

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Direct Discrimination Aware Data Mining

    With the advent of data mining, in many applications the automated decision making systems are used to make fair decision, but there can be discrimination hidden in the decision made by system. Discrimination refers to treating person or entity unfairly based on their membership to a certain group. Discrimination can...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    A Survey on Various Techniques of Data Storage on Cloud using Third Party Auditor

    In present scenario cloud computing emerges as one of the most powerful computing technology to provide dynamic service on demand on very large scale over the internet. Cloud computing offers various features like scalability, pay on use, using these features giants companies use cloud to store their data, In cloud...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    A Hybrid Approach for Recommendation System in Web Graph Mining

    Large amount of information is available on web and information extraction takes place in huge volume. When queries are submitted to search engines they are generally in natural languages and contain just one or two words. Search engine are unable to recognize natural language and thus it becomes difficult to...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Ancient Indian Vedic Mathematics based 32-Bit Multiplier Design for High Speed and Low Power Processors

    The use of Vedic mathematics lies in the fact that it reduces the typical calculation in the conventional mathematics to very simple once. This is so because the Vedic formulae have claimed to be building on the natural principles on which the human mind works. Vedic mathematics is a several...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Implementation of USB 3.0 SuperSpeed Physical Layer using Verilog HDL

    In this proposed design it mainly includes USB 3.0, physical layer along with USB 2.0 functionality with super speed functionality. Physical layer mainly contains PCI express and PIPE interface. This proposed design transferred data from transmitter to receiver serially. This design manages to transfer data either on 2.5GT/s or on...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Job Scheduling Algorithms in Cloud Computing: A Survey

    Cloud computing is the new IT paradigm that makes the delivery of computing resources (hardware and software), applications and data as a service over the internet to its users. Cloud computing mainly intended to provide reliable, dynamic and virtualized services in terms of resources for doing computation, storage and knowledge...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Survey on MapReduce Scheduling Algorithms

    MapReduce is a programming model used by Google to process large amount of data in a distributed computing environment. It is usually used to perform distributed computing on clusters of computers. Computational processing of data stored on either a file system or a database usually occurs. MapReduce takes the advantage...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Comparison of Search based Techniques for Automated Test Data Generation

    One of the essential parts of the software development process is software testing as it ensures the delivery of a good quality and reliable software. Various techniques and algorithms have been developed to carry out the testing process. In this paper, the authors deal with utility of the nature based...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    FPGA Implementation of Area Efficient and Delay Optimized 32-Bit SQRT CSLA with First Addition Logic

    Binary addition is a fundamental operation in most digital circuits. There are a variety of adders, each has certain performance. Parallel adders are used for fast binary addition which plays a crucial impersonation in majority of digital circuit designs including Digital Signal Processors (DSP) and microprocessor data path unit. In...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Develepment of Real Time Application Platform for Linux Kernel with Preempt-RT

    The On Board Computer (OBC) of an aerospace vehicle carries out control, guidance and navigation operations during the flight. It consists of a processor and IO board to execute the real time embedded software and to read input data from other subsystems & send commands to control system. In the...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Hybrid TB-LEACH Energy Based Multihop Protocol

    Wireless sensor network is defined as the network composed of tiny and energy restricted sensor nodes. Sensor nodes collect the useful information from surrounding environment and deliver it to the base station. Sensor nodes have limited energy. Routing protocols must consume minimum energy in order to prolong the network lifetime....

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Recent Trends in Energy-Efficient Clustering in WSNs

    Tremendous growth has been observed in the use of Wireless Sensor Networks (WSNs) in the last decade. WSNs behave like an interface between the virtual and physical worlds. Sensor nodes sense the changes in external environment and send the data to other nodes in the network or the sink, also...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    A Comparison of Clustering and Modification based Graph Anonymization Methods with Constraints

    In this paper a comparison is performed on two of the key methods for graph anonymization and their behavior is evaluated when constraints are incorporated into the anonymization process. The two methods tested are node clustering and node modification and are applied to Online Social Network (OSN) graph datasets. The...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Back-End Forwarding Scheme in Server Load Balancing using Client Virtualization

    Load balancing can be done at two levels, the HTTP level and the network level. It refers to the distribution of the HTTP request made by the user across the web server in a server cluster and is achieved by various algorithms such as random selection, round robin, weighted round...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    A State-of-Art Load Balancing Algorithms in Cloud Computing

    Cloud computing is the ultimate technology in internet. It is a means of acquiring computing possessions, making do and delivering software and services. Cloud computing allows the customers to apply the application without set up and access their own files on any device with internet. Cloud services can be acquired...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Using Kerberos with Digital Signature and AES Encryption to Provide Data Security in Cloud Computing

    The cloud computing is the next generation platform that provides dynamic resources pools, virtualization, and high availableness. Today, with the assistance of those computing, the authors are able to utilize ascendable, distributed computing environments among the boundary of the web, It provides several edges in terms of low value and...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Prototyped LEACH Routing Algorithm for the Enhancement of Energy Efficiency in Wireless Sensor Network

    The topic of discussion and research is wireless sensor network and it just because it is an always application based. The research on wireless sensor networks has recently received much attention by offering an advantage of monitoring different kinds of environments by sensing their physical phenomenon. There are some important...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Built in Self-Test for 4

    Built In Self-Test (BIST) is a technique or a method which allow the circuit to test itself. BIST increases the controllability and observability of integrated circuit therefore it is easier to apply inputs and then detect faults from it. BIST also decreases the time of testing integrated circuits & gives...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    High Imperceptible Data Hiding using Remainder Method

    In this paper the authors will propose a high quality image steganography technique which can hide secret data within an image in such a way so that it is imperceptible to human eye. This method solves the overlapping problem of remainder and use modulo operator efficiently for hiding purpose. First,...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Performance Analysis of Multiple Keys used for Data Security

    Data security is an essential component of an organization in order to keep the information safe from various competitors. It helps to ensure the privacy of a user from others. Secured and timely transmission of data is always an important aspect for an organization. The use of strong encryption algorithms...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Application of Factor Analysis to k-means Clustering Algorithm on Transportation Data

    Factor analysis is a very useful linear algebra technique used for dimensionality reduction. It is also used for data compression and visualization of high dimensional datasets. This technique tries to identify from among a large set of variables, a reduced set of components which summarizes the original data. This is...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Energy Efficient Hierarchy-based Clustering Routing Protocol for Wireless Sensor Networks

    Wireless Sensor Network (WSN) consisting of a large number of sensor nodes is effective for gathering data in a variety of environments. Since the sensors operate on battery of limited power, it is a challenging task to design an efficient routing scheme which can minimize the delay while offering high...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Multilevel Security and its Application to Enhance Data Protection

    A vast amount of information available on the internet along with the increased use of internet as a communication medium served a great deal in making the information available vulnerable. The number as well as the technique of attacks has become more and more sophisticated with time. This paper focuses...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Supporting Ranking Queries for Search-As-You-Type in Databases using WIP

    Most of the search engines in Internet have simplified keyword-based search concept. The relational database management systems do not allow keyword-based search while they offers powerful query languages. Existing search systems that are based on keyword in relational database require users to submit a complete query to compute answers. Often...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Reliable Data Aggregation using Ant Colony Optimization with State Transition Ant Rule in Sensor Network

    Data aggregation plays a vital role as the Wireless Sensor Network (WSN) is highly susceptible to attacks. In WSN, data aggregation correlates the sensing data and aggregates at the intermediate nodes by reducing the time taken for message transfer. Works conducted on Concealed Data Aggregation scheme for Multiple Applications (CDAMA)...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Data Mining in Web Search Engine Optimization and User Assisted Rank Results

    In the fast moving world, the use of web is been increasing day-by-day so that the requirement of users relative to web search are also increasing. The content search over the web is one of the important research area comes under the web content mining. According to a traditional search...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    A Comparative Study on LEACH Routing Protocol and its Variants in Wireless Sensor Networks: A Survey

    Wireless sensor network consists of sensor nodes which are powered by battery; to communicate with each other for environment monitoring. Energy efficiency is the main issue in wireless sensor networks. Therefore, to maximize network lifetime and achieve maximum reliability and scalability, routing techniques have been developed. Leach is the conventional...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Productivity Improvement in the Pride's Spare Parts Manufacturing using Computer Simulation and Data Envelopment Analysis

    Generally, improving production rate is a typical crucial problem in any manufacturing system. To cope with the problem, different kinds of scientific method stems from trial and error may be applied which imposes high costs. Rottenly testing any proposed scenarios may have significant effect on both operational management and manufacturing...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Big Data: The Next-Gen Google

    It is rightly said that invention is the mother of necessity. Big data - A new word in the information world. This paper describes the concept of big data and its research areas have been explored. This paper presents what all changes big data can bring to day-to-day lives. There...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    A Review of Leveraging Private Cloud Computing in Financial Service Institutions: Value Propositions and Current Performances

    In this paper the authors identifies main value propositions of leveraging private cloud computing and reviews current performance of implementing cloud computing technology in financial industry. The following aspects have been reviewed by this paper, namely discerning cloud computing-enabled innovations, identifying three value propositions of using cloud computing, reviewing current...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    A Survey on Problems and Solutions of Frequent Pattern Mining with the use of Pre-Processing Techniques

    Frequent pattern mining is a researched area which is used for extracting interesting associations and correlations among item sets in transactional and relational database. Many algorithms of frequent pattern mining is been devised ranging from efficient and scalable algorithms in transactional database to numerous research frontiers and their wide applications....

    Provided By International Journal of Computer Applications