International Journal of Computer Applications

Displaying 1-40 of 4301 results

  • White Papers // Jul 2014

    Performance Evaluation using Various Models in Distributed Component based Systems

    Over the years, several models were proposed to analyze the performance of distributed component based system with the view of improving system's performance. Traditional methods of prediction such as Petri nets and queuing networks exploit the benefits of component engineering paradigm, such as division of work and reuse. The authors...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Survey of Algorithm: Scheduling Systems and Distributed Resource Management in Grid

    Grid computing is the form of distributed computing where the resources of various computers are shared to solve a particular problem. Grid can be used for a variety of purposes. Job scheduling is used to schedule the user jobs to appropriate resources in grid environment. The resources in the grid...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    NER-FL: A Novel Named Entity Recognizer of Farsi Language using the Web-Based Natural Language Processors and Semantic Annotations

    Named entity recognition is a main task in the NLP area that has yielded multiple web-based natural language processors gaining popularity in the semantic Web community for extracting knowledge from web data. These processors are generally located as pipelines, using dedicated APIs and various taxonomy for extracting, classifying and disambiguating...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    A Survey on Security Mechanisms of Leading Cloud Service Providers

    With an unprecedented pace of developments in cloud computing technology, there has been an exponential increase of users of these services and an equal rise of cloud services providers. Clouding computing is a virtual pool of resources provided to users as service through a web interface. These resources may include...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Design of a Single Negative Metamaterial based Microstrip Patch Antenna

    From the observation of radiation pattern of microstrip antenna integrated with MeTaMaterial (MTM) cover has an improved gain compared to the gain of the microstrip antenna without MTM cover. An improvement of the gain from 10.48db to 11.94db in simulation was obtained when MTM cover is placed in front of...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Theoretical Approach of Search of Missing Values in Data Set using Data Mining

    The uncontrollable expansion of the information over the internet creates a critical job to discover which information is supportive or useful for a particular user. This paper proposes a new filtering technique using rough set and clustering technique to seek out the nearest neighbor, so that the user can get...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    An Efficient Technique for Detection of Flooding and Jamming Attacks in Wireless Sensor Networks

    Distributed denial of service attacks are a major threat for wireless sensor network. The aim of these attacks is that genuine users can not use network such as bandwidth, computing power and operating system data structures. Jamming and flooding attacks are one of the most popular attacks on WSN which...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    An Investigation into Access Control in Various Types of Operating Systems

    Access control is a security aspect whose importancy increases with technology advances as it forms the core of any security system. Access control can be applied at the Operating System (OS) level, middle-ware level, or the application level. The objective of this investigation is to give a detailed overview of...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Fault Tolerant ACO using Checkpoint in Grid Computing

    In this paper, the authors proposed an algorithm for fault tolerant distributed computation in a grid by the means of meta-heuristic Ant Colony Optimization (ACO) technique and check-pointing. Load balancing is the process of distributing the workload among the nodes in a grid. The load can be CPU cycles, memory...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Comparative Analysis of a Circularly Polarized Microstrip Antenna with a Cross-Slot using Single and Double Substrate

    In this paper, the authors compare the different parameters for differently configured single substrate circular patch and double substrate square patch microstrip antenna. The proposed antenna 1 is fed by proximity coupled feed whereas the proposed antenna 2 is single fed to excite the antenna. Copper clad substrate is used...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    ROF V/s Traditional Fiber as a Backhaul Technology: Comparisons of Cellular and Ethernet Networks based on SNR and Capacity

    Radio over fiber is the future technology. It will take over all traditional fiber technology, as it offers quality and service up to the requirement of the users. The ROF is being implemented over traditional fiber widely as it offers replacing of optical fiber's high range and also flexible in...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Performance Analysis of ETTH and FTTH In Terms of Cost and Scalability: A Comparative Study carried out on MATLAB

    As a new access network to the home, Ethernet To The Home (ETTH) and Fiber To The Home (FTTH) has the newest development of multimedia applications in which the end users require more and more bandwidth capacity. The main focus in this paper is to conduct a comparative study between...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Bandwidth Allocation Scheduling Algorithms for IEEE 802.16 WiMax Protocol to Improve QoS: A Survey

    In recent times, wireless network is extensively accessed technology to connect remote user terminal with its primary network. QoS is the vital parameter that can be treated wisely when data is transferred between terminal users and network administrators. In WiMax, QoS is determined accurately at MAC layer but bandwidth allocation...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Fuzzy Multi Criteria Approach for Selecting Software Quality Model

    Software quality models have been proposed to evaluate general and definite type of software products. These models were proposed to evaluate scope of software product. There has been an increasing interest in recent times for using multi criteria decision making techniques to present the comparison of software quality models. Earlier...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Analyzing Driving and Road Events via Smartphone

    Travelling in India by road is considered dangerous as traffic conditions are chaotic, the drivers drive recklessly, and the roads are poorly maintained. Therefore, there is need to monitor driver behavior and road condition regularly. In this paper, the authors developed a method that collects data using accelerometer sensor present...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Study of Facial Expression Analysis of Feature Extraction Based on Lip Movement for User Authentication

    The people are living in the 21st century, as the technology grows the security issues are gradually increasing and for those issues there is always a need for improvements in existing methods or there is a hope for new ideas towards this field. As the users use the technology from...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Path Determination using Improved BFS approach in Wireless Sensor Network

    Wireless Sensor Network (WSN) is type of network which consists of a collection of tiny devices called sensor nodes. The effective communication type in sensor network is aggregative communication. In such a path is constructed between all the participant nodes and generate an aggregative path. Each node includes its data...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Performance Evaluation of Three-Node Tandem Communication Network Model with Feedback for First Two nodes Having Non Homogeneous Poisson Arrivals

    Tandem queues are widely used in mathematical modeling of random processes describing the operation of manufacturing systems, supply chains, computer and telecommunication networks. In many of the communication systems the arrivals are time dependent and can be characterized by a non homogeneous poisson process. In this paper, the authors developed...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Current Status of Network Processors

    As number of users is increasing, demands for new applications on internet is increasing, demand for internet video is increasing, users on YouTube, Facebook, Google is also increasing, users are giving preferences to online shopping, new protocols are being introduced more rapidly. It forces significant growth in data traffic. Number...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Modeling Fuzzy Scheduling in Infrastructure as a Service Cloud

    The high capacity computing units like super computers, clusters are need to be virtualized and necessarily served to the consumers with their specific requirements, because perhaps resources underutilized. This paper addresses the results of lease scheduling in the Infrastructure-as-a-Service (IaaS) cloud in the uncertain conditions, and use of fuzzy logic...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Adoptive Neuro-Fuzzy Inference System for Traffic Noise Prediction

    An Adaptive Neuro-Fuzzy Inference System (ANFIS) is implemented to evaluate traffic noise under heterogeneous traffic conditions of Nagpur city, India. The major factors which affect the traffic noise are traffic flow, vehicle speed and honking. These factors are considered as input parameters to ANFIS model for traffic noise estimation. The...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    TTSM: Trust Threshold Security Model for User Assured Security in Cloud Computing

    Internet and networks applications are growing very fast & hence the importance and value of the exchanged data over internet are increasing. Cloud computing technology is used to handle such scalable growth in data and the users. It supports the dynamic elasticity for increased number of application, processes, users and...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Development and Implementation of Controller Area Network (CAN) Device Driver for a 32-Bit RISC Architecture based RENESAS Micro-Processor Series with AUTOSAR Software Conformance

    Device drivers abstract away the technical details and the complexity associated with interfacing a peripheral with the controller network. This in-turn increases the simplicity and reliability of the application software, in-turn reducing the product's time to market. Device drivers provide an interface platform for binding the processor-dependent physical layer and...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Optimized Antenna for 5.2GHz Applications

    Most of the communications in the century is accomplished through the wireless medium. There are various standards for simultaneous running of different applications. WLAN (Wireless Local Area Network) is a common wireless communication standard. Among the five bands announced by IEEE in 802.11 standards for wireless LAN, two most common...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Spyware Detection based upon Hybrid Approach In Android Smartphones

    Smartphones, which were once a luxury product has now become a household product. This transformation has been due to the vast amount of functionalities which a smart phone provides in just a single device. Smartphone OS, such as Android, is an open source mobile platform that enables the users to...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Low Cost Embedded System for Voltage Sag Analysis

    In this paper, the authors describe the development of low cost embedded system for detecting and analyzing the voltage sags in the ac supply. The proposed system have the capabilities of real time acquisition of voltage signal using an Embedded Controller and display its parameters in a graphical user interface...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Comparative Study of Different Models before Feature Selection and AFTER Feature Selection for Intrusion Detection

    A network data set may contain a huge amount of data and processing this huge amount of data is one of the most challenges task for network based Intrusion Detection System (IDS). Normally these data contain lots of redundant and irrelevant features. Feature selection approaches are used to extract the...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    A Survey of Reconfigurable Architectures

    A new architecture type that is recently evolving is the reconfigurable architecture which combines the benefits of ASIPs (Application Specific Instruction Set Processors) and FPGAs (Field Programmable Gate Arrays). Reconfigurable computing combines software flexibility with high performance hardware. FPGAs are generally employed to construct a reconfigurable block as it provides...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    A Survey: Sparse Traffic Grooming and RWA Assignment Schemes in Optical Network

    Traffic grooming has become a very important issue on optical network, as optical networks provide a very high speed data transmission for huge amount of data. A sparse grooming network with only a fractional of nodes having grooming functionalities may achieve the same performance as the one in which all...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    DC Shunt Motor Control using Wavelet Network

    In this paper, a dc shunt motor with fixed speed control system is presented, a wavelet neural network control scheme is proposed to control the speed of shunt DC motor, the Wavelet Neural Network (WNN) is used and optimized using Particle Swarm Optimization (PSO) algorithm. The performance is measured depending...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Cryptanalysis to Secure System

    In this paper, the authors describe how to implement 3D password. As it is free from textual password as well as graphical password. Hence it is free from attackers. 3D password is used to overcome the drawbacks of previously existing security or authentication schemes. 3D password is well created by...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Instruction Customization: A Challenge in ASIP Realization

    An Application Specific Instruction set Processors (ASIP) or alternatively known as customized processor is a processor designed for a particular application or for a set of applications. Earlier surveys show that though a significant research has been done for this most promising processor design technology, still approaches used in them...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    PAPR Reduction in OFDM System using Wavelet SLM and PTS Technique

    Recently researchers have developed many techniques to solve high PAPR problem. These techniques have some merits and demerits. The concentration of this research work is especially upon the SeLected Mapping (SLM) and Partial Transmit Sequence (PTS) techniques using wavelet transforms Inverse Discrete Wavelet Transform (IDWT) and DWT instead of conventional...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Energy Efficient Routing with MAX-Min Energy Scheme in Ad-hoc On-Demand Multipath Distance Vector routing for MANET

    During the past few years, there has been increasing interest in the design of energy efficient protocols for wireless ad-hoc networks. Node within an ad hoc network generally relies on batteries (or exhaustive energy sources) for power. Since these energy sources have a limited lifetime, power availability is one of...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Energy Efficient Ad-hoc Routing Protocol for Disaster Scenario

    Due to decentralization and infrastructure less characteristics of ad hoc networks, it can be established in any environment without pre-existing infrastructure with ease of deployment. There are many issues for designing of ad hoc network like MAC layer protocol, security, mobility of nodes, routing protocol, quality of service etc. The...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Calculating Page Pertinence for Web Referencing a New Approach

    Every day, more than three billion queries are performed on Google. To take advantage of opportunities that the user are offered by the search engines, it is important for their website to achieve high rankings in search results, in order to reach a larger customer base, increasing its business in...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    A Comparative Study of Defense Mechanisms against SYN Flooding Attack

    Distributed Denial-of-Service (DDoS) flooding attacks are a serious threat to the security of the internet. A DDoS attack makes a machine or network resources not usable by the legitimate clients. A SYN flood is a form of denial-of-service attack. An attacker sends SYN requests continuously to a target system to...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    An Approach to Enhance the Energy Efficiency of RFID Protocol using NTP Protocol

    A Wireless Sensor Networks (WSN) is a type of self organizing and self managing network which is not made of permanently of sensor nodes of the condition of not having internet infrastructure. A wireless sensor network consists of a large number of nodes spread over a specific area where the...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Recursive Ensemble Approach for Incremental Learning of Non-Stationary Imbalanced Data

    Learning non-stationary data stream is much difficult as many real world data mining applications involve learning from imbalanced data sets. Imbalance dataset consist of data having minority and majority classes. Classifiers have high productivity accuracy on majority classes and Low productivity accuracy on minority classes. Imbalanced class partition over data...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Wavelet based Power Quality Monitoring in Grid Connected Wind Energy Conversion System

    Recently renewable energy resources especially wind power integration has been far increased in the electric power distribution system. To utilize wind power more effectively, wind energy conversion system is interfaced to grid through power electronics interfaces. In this paper, monitoring of various power quality disturbances at the point of common...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A 64 Bits Dynamically Key Controlled Symmetric Cipher (KAMFEE-X64)

    This paper presents an improved version of KAMFEE cipher. The proposed cipher (KAMFEE-X64) is designed to be compatible with the new 64 bits microprocessors unlike the old cipher (KAMFEE) which is designed for systems based on x86 microprocessors. KAMFEE-X64 has a key dependent block length and key dependent rounds, enhanced...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A Review of Automatic Test Cases Generation

    Manual testing is hard and time consuming and it may be impossible for large systems or tester mistake in the test. The software testing is the rising cost of activities in development software and the test case generation is important activity in software testing. Hence researches performed to automate testing...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Multi Lingual Speaker Identification on Foreign Languages Using Artificial Neural Network

    Based on the Back Propagation Algorithm, this paper portrait a method for speaker identification in multiple foreign languages. In order to identify speaker, the complete process goes through recording of the speech utterances of different speakers in multiple foreign languages, features extraction, data clustering and system training. In order to...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A New Approach for Information Security Using Asymmetric Encryption and Watermarking Technique

    Rapid growth of internet and networked information systems has contributed a lot in the increase of multimedia contents. As digital contents are increasing day by day on internet it has raised requirement for the effective protection of multimedia assets (images, audios, videos). This paper proposes a new approach to protect...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A Design of Authentication and Access Control Model for Remote Access Using GSM Technologies

    The GSM technologies plays vital role in pervasive computing environments. The open and dynamic nature of the pervasive computing environment allows entities to join and leave frequently. This causes a large number of autonomous entities to interact in an ad-hoc manner, raising concerns as to the trustworthiness of the service...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Removal of Network Ambiguities Through Knowledge Based System

    Documents on the Internet are composed of several kinds of multimedia information when accessed for personal, entertainment, business, and scientific purposes. There are many specific content domains of interest to different communities of users. Extracting semantic relationships between entities from text documents is challenging task in information extraction. By semantics...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Lifetime Maximization of Wireless Sensor Networks Using Improved Genetic Algorithm Based Approach

    In Wireless Sensor Networks the nodes have limited energy and are seriously constrained by the battery life. To increase the lifetime of the network is a critical and challenging issue and thus it is the routing in WSNs, which is the primary focus of design for researchers. In this paper...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Innovative Performance Evaluation of Unnecessary Handoffs and Handoff Failures During Access Network Selection Between WLAN and Cellular Networks

    Received Signal Strength based (RSS) horizontal handoff algorithms have been most commonly used by nearly all second generation and third generation wireless networks in a homogeneous environment. Vertical handoffs or network selection algorithms are the terms coined due to integration and interoperability of existing wired and wireless access networks under...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Survey on Securing Data in Cloud

    Cloud computing is an innovative information system architecture which reduces the overall client side resource requirements. Even though the data outsourcing reduce the burden of client storage the clients no longer have physical possession of data which will leads to so many security issues. Hence the user need to make...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Multimodal Biometric System Using Iris, Palmprint and Finger-Knuckle

    Most real-life biometric systems are still unimodal. Unimodal biometric systems perform person recognition based on a single source of biometric information. Such systems are often affected by some problems such as noisy sensor data, nonuniversality and spoof attacks. Multibiometrics overcomes these problems. Multibiometric systems represent the fusion of two or...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    An Efficient Bee-Inspired Auto-Configuration Algorithm for Mobile Ad Hoc Networks

    The infrastructure-less and dynamic nature of Mobile Ad-hoc NETworks (MANETs) requires the implementation of a new set of networking technologies in order to provide efficient end-to-end communication according to the principles of the standard TCP/IP suite. Routing and IP address auto-configuration are among the most challenging tasks in the ad...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Broadband Microstrip S-Shaped Patch Antenna for Wireless Communication

    This paper presents a single-patch broadband microstrip S-shaped patch antenna. Microstrip S-shaped patch antenna, fed by a coaxial feeding. The antenna is designed by inserting two slots into rotated square patch then it look like english letter S. Because of the slots and thick substrate, bandwidth of antenna is increased....

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A Fuzzy Approach for Privacy Preserving in Data Mining

    Advances in hardware technology have increased storage and recording capabilities regarding individual's personal data. Privacy preserving of data has to ensure that individual data publishing will refrain from disclosing sensitive data. Data is anonymized to address the data misuse concerns. Recent techniques have highlighted data mining in ways to ensure...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Bank Locker Security System Based on RFID and GSM Technology

    The main goal of this paper is to design and implement a bank locker security system based on RFID and GSM technology which can be organized in bank, secured offices and homes. In this system only authentic person can be recovered money from bank locker. The authors have implemented a...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Survey of Integrating Testing for Componentbased System

    Today's software larger in size, design complex and time consuming to implement them, for this the authors need a prominent solution to overcome these problems. Component-Based Software Development (CBSD) has emerged as an Object Oriented (OO) Software Engineering approach that forced rapid software development. Using CBSE approach they can eliminate...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A Novel Approach of Speedy-Highly Secured Data Transmission Using Cascading of PDLZW and Arithmetic Coding with Cryptography

    The spread of computing has led to an outburst in the volume of data in the communication world. The paper proposes the cascading of two algorithms PDLZW and Arithmetic Coding with cryptography. With the hierarchical parallel dictionary set, the search time can be reduced significantly and all these dictionaries are...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Stock Market Prediction Model by Combining Numeric and News Textual Mining

    This paper proposes a novel method for the prediction of stock market closing price. Many researchers have contributed in this area of chaotic forecast in their ways. Data mining techniques can be used more in financial markets to make qualitative decisions for investors. Fundamental and technical analyses are the traditional...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Review of Fractal Transform Based Image and Video Compression

    Fractal Compression is a new technique in the field of color and video compression. This technique has grabbed much attention in recent years because of very high compression ratio that can be achieved. It also provides interesting interpolation features to zoom the images. Hybrid schemes incorporating fractal compression and speedup...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Enhancement in Feedback Polynomials of LFSR Used in A5/1 Stream Cipher

    There is encryption algorithms used in GSM. This is for to encrypt the information when transmit from mobile station to base station during communication. As stated that A5/1 is strong algorithm but it cryptanalysis by cryptanalysts. This paper modified concept to improve A5/1 encryption algorithm by consideration of feedback combining...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    WEB Based Service Platform of Population

    The Indian Census is the most credible source of information on Demography (Population Characteristics), Economic Activities, Literacy and Education etc. As the Census data plays a vital role for the future of the country it is very important to maintain it properly and accurately. As of now census data is...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Combining Advanced Encryption Standard (AES) and One Time Pad (OTP) Encryption for Data Security

    The development of telecommunications technology and data storage using the computer has become a necessity because there are many jobs that can be completed quickly, accurately, and efficiently. In addition it allows data transmission distance is relatively fast and cheap, but on the other hand long-distance data transmission is possible...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Concept of Designing an Optimized Pull Model View Controller Type Content Management Framework

    Based on the concept of "Easy to learn and develop for anyone", the authors present an integrated framework concept for developing content management system using an optimized pull Model View Controller (MVC) type in web programming. The framework consist of four easy steps to follow: first step is determining web...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Cyber Security Approach in Web Application Using SVM

    Internet is open source for web access like for the purpose of railway reservation, online banking, online fees submission etc. Security concern is the most threatening topic for users about their confidential information's storage. various security designing and algorithms has been designed to impose secure environment for user but still...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A Research on Decentralized Clustering Algorithms for Dense Wireless Sensor Networks

    A wireless sensor network with large number of sensor nodes can be used as an effective tool for collecting data in various situations. Recent advancement in wireless communications and electronics has enabled the development of low-cost sensor network. Wireless sensor networks are web of sensor nodes with a set of...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    CO2 Monitoring System from Remote Location Using GSM, GPS and Concept of MODBUS

    The system developed here is useful for measurement of waste gas (like Co2) remotely. This will helpful particularly for the environment department because many chimneys releases polluted gases now-a-days, which is a serious issue for Global warming. If any factory emits gas beyond some predefined specified limit, this system will...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Hybrid Model for Location Privacy in Wireless Ad-Hoc Networks for Mobile Applications

    A wireless ad-hoc network is a decentralized type of wireless network. The network is ad-hoc because it does not rely on a preexisting infrastructure, such as routers in wired networks or access points in managed (infrastructure) wireless networks. Now-a-day in fast growing world, use of internet is increasing popularly and...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Multipath Global Rerouting for Fault Tolerant Overlay Network (FTON) in Labeled Optical Burst-Switching

    In this paper, mainly concentrate on reduce the burst loss and Non-availability of wavelength in network; proposed an overlay model known as Fault Tolerant Overlay Network (FTON) which improves the performance of a regular IP electronic network. An FTON is created over the existing network; an FTON node collects the...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Application of Fuzzy Analytic Hierarchy Method in Software Engineering Scenario

    In software engineering scenario, software effort estimation is very uncertain and depends on various external factors .For developing a particular type of software, selection of an optimal and experienced group of developer is essential for software development organization for organizational benefits and is necessary because success and failure of software...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A Framework for Android and J2ME Bluetooth Communication

    Mobile applications development is attracting more and more developers recently due to the emergence of new mobile platforms such as Android; which is making application development easier as well as its' marketing. All new Smartphone's now support Bluetooth, a popular communication medium for mobile phones. However, cross-platform Bluetooth communication between...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Mobile Client's Access Mechanism for Location Based Service Using Cell-ID

    Today's location-sensitive service relies on user's mobile device to determine its location and send the location to the application. A location-based service is a service that determines the location of a mobile device and uses this to provide functionalities and information specific to that location. With the growth of the...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Performance Analysis of Backoff Exponent Behaviour at MAC Layer In ZigBee Sensor Networks

    Topology is one of the major new paradigms and is the premier research topic in ZigBee based Wireless Sensor Network and has opened up new challenges for researchers throughout the World due to its wide range of applications ranging from medical research to military. IEEE 802.15.4/ZigBee is a worldwide open...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Performance Analysis for Visual Data Mining Classification Techniques of Decision Tree, Ensemble and SOM

    This paper is a comprehensive report on experimental setup, data collection methods, implementation and result analyses of market segmentation and forecasting using neural network based artificial intelligence tools. The main focus of the paper is on visual data mining applications for enhancing business decisions. The software based system is implemented...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A Survey on Preventing Jamming Attacks in Wireless Communication

    Communication in wireless network is possible with an air medium. Due to the high security threats in this system, the network may face various difficulties. One of the major threats is jamming attack which comes under Denial Of Service (DOS) attack. Jamming attack is common among many exploits that compromises...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Test Case Generation Based on Activity Diagram for Mobile Application

    Testing impacts the popularity of any software and hardware products. If proper testing of any product is done it will increase the cost and sale of the product. Mobiles are widely used electronic device there are several mobile companies established which provide variety of applications and features. It is obvious...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Network Security Using Firewall and Cryptographic Authentication

    The network Security is the hottest topic in the current research scenario. The information security is really threatened by obnoxious users. With increasing vulnerabilities, caused by port scan attacks, replay attacks and predominantly IP Spoofing, targeting services, the network behavior is getting malevolent. But there is a lack of any...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Box-Office Opening Prediction of Movies Based on Hype Analysis Through Data Mining

    Box-office performance of a movie is mainly determined by the amount the movie collects in the opening weekend and Pre-Release hype is an important factor as far as estimating the openings of the movie are concerned. This can be estimated through user opinions expressed online on sites such as Twitter...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Graph Neural Network for Minimum Dominating Set

    The dominating set concept in graphs has been used in many applications. In large graphs finding the minimum dominating set is difficult. The minimum dominating set problem in graphs seek a set D of minimum number of vertices such that each vertex of the graph is either in D or...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    A Stream Cipher Algorithm Based on Nonlinear Combination Generator with Enhanced Security for Image Encryption

    This paper describes a novel approach for image encryption using stream cipher algorithm based on non linear combination generator. This work aims to enhance the security of encrypted image. The work is based on the use of several linear feedback shifts registers whose feedback polynomials are primitive and of degrees...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Artificial Neural Network Modelling of Traffic Noise in Agra-Firozabad Highway

    The noise is a major environmental hazard at present. It causes hearing problem, tinnitus, high blood pressure, mental depression, heart palpitation etc. Noise is a usual problem everywhere and involves high health risk, but in today's fast life the authors ignore its harmful consequences and it results in high health...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Network Connectivity Based Topology Control for Mobile Ad Hoc Networks

    Energy consumption and network connectivity are two of the important research issues that are yet to be resolved in Mobile Ad-hoc NETworks (MANETs). However, only a few topology control methods (e.g.) take into account the low interference as a goal of the methods. Some researchers tried to indirectly reduce the...

    Provided By International Journal of Computer Applications