International Journal of Computer Applications

Displaying 401-440 of 8029 results

  • White Papers // May 2015

    Efficient Routing in Zigbee Wireless Network using Shortcut Tree Routing

    Zigbee tree routing, which doesn't need any routing table/route discovery overhead is used in several resource limited devices and applications. ZTR has a basic limitation regarding providing of optimal routing path as it follows tree topology, hence an optimal routing path can't be achieved. In this paper, the authors proposed...

    Provided By International Journal of Computer Applications

  • White Papers // May 2015

    A Comparative Study on Network Structure Based Routing Protocol and its Variants in Wireless Sensor Networks: A Survey

    Now-a-days, wireless sensor network is one of the fastest growing and emerging areas in the scientific and engineering world. Its basic objective is to sense the crucial data and send it base station so that it takes corrective actions further. Sensor nodes interact with each other via various routing protocols....

    Provided By International Journal of Computer Applications

  • White Papers // May 2015

    Wireless Sensor Network Simulation Environment

    Wireless sensor networks are infrastructure-less and fully distributed systems of self-configurable and self-organized nodes that are wishing to share data over the air. Nodes could be PCs, mobile phones, printers, etc. The main challenge of sensor networks is its characteristics (dynamic topology, variable capacity, infrastructure less, bandwidth, computing power, battery...

    Provided By International Journal of Computer Applications

  • White Papers // May 2015

    PC based Security System

    In this paper, the authors involve design and construction of security system controlled through PC (Personal Computer) with several sensors and a controller attached in order to perform its specified tasks. In this paper, they can detect illegal person, who want to enter in house or industries. After detection automatically...

    Provided By International Journal of Computer Applications

  • White Papers // May 2015

    Secure Based Clustering Algorithm for Wireless Sensor Networks

    Protecting the data from intruders and increasing the network lifetime is a major constraint in wireless sensor network. The lifetime of the network is determined by the amount of energy consumed by each node. In order to increase the network lifetime and protect the data, the security based clustering algorithm...

    Provided By International Journal of Computer Applications

  • White Papers // May 2015

    Investigation on the Revolution and Need of Energy Efficient Smartphone Development

    Now-a-days, Smartphones act as a PA (Personal Assistant) to most of the people and it offers essential services such as mobile internet, geo location and maps, multimedia services, high data rate connectivity and much more. Especially present younger generations accept Smartphones as a part of their life. Smartphone apps (applications)...

    Provided By International Journal of Computer Applications

  • White Papers // May 2015

    Node Mobility Impact on Zone Routing Protocol

    Zone routing protocol has designed for wireless mobile ad hoc networks. MANET (Mobile Ad hoc NETwork) is a network of geographically randomly distributed nodes. These network nodes can perform transaction of data packets using wireless links and they don't need any fixed infrastructure. In wireless mobile ad hoc network node...

    Provided By International Journal of Computer Applications

  • White Papers // May 2015

    To Investigate the Effect of Mobility on the Air Interface Parameter Selection in WIMAX Networks

    Mobility is an important factor in wireless networks because internet connectivity can be effective only if it is available during the movement of node. WiMAX standard IEEE 802.16e supports full mobility. This paper mainly focuses on the mobility i.e. when mobile node moves from one cellular BS (Base Station) to...

    Provided By International Journal of Computer Applications

  • White Papers // May 2015

    Mobility Prediction using Modified RBF Network

    Recently, with the wide increase use of mobile devices, users are using it to achieve different types of tasks like multimedia and internet services. Many studies have been introduced to identify user's behaviors. The most common factor is the location. By knowing user's locations, set of required tasks can be...

    Provided By International Journal of Computer Applications

  • White Papers // May 2015

    A Proposal on Wireless Ad Hoc Network Controlled Rovers

    An ad-hoc network is a network which does not rely on any preexisting infrastructure. It is a network that is created to serve only a particular purpose. Wireless ad-hoc networks consist of nodes that are interconnected and transmit data wirelessly. This paper discusses about an application of wireless ad-hoc networks...

    Provided By International Journal of Computer Applications

  • White Papers // May 2015

    Group Key Management Technique based on Logic- Key Tree in the Field of Wireless Sensor Network

    In the recent times the concept of group key management is found to be one of the very essential issues in the field of wireless sensor network. Because of the dual impact limitations and various operations in open and hash environment the security and confidentiality which are considered as very...

    Provided By International Journal of Computer Applications

  • White Papers // May 2015

    A Survey on TCP Congestion Control Schemes in Guided Media and Unguided Media Communication

    Transmission Control Protocol (TCP) is a widely used end-to-end transport protocol in the Internet. This end-to-end delivery in wired (guided) as well as wireless (unguided) network improves the performance of transport layer or Transmission Control Protocol (TCP) characterized by negligible random packet losses. This paper represents tentative study of TCP...

    Provided By International Journal of Computer Applications

  • White Papers // May 2015

    A new RGB Image Encryption based on a Combination of 2D Chaotic Maps

    In this paper, a new approach for RGB image encryption is based on a blend of 2D chaotic maps. Chaotic Henon map, chaotic Burger map and chaotic Gingerbreadman map is used in order to meet up the requirements of the protected image transmission. The proposed image encryption scheme is composed...

    Provided By International Journal of Computer Applications

  • White Papers // May 2015

    A Taxonomy of Physical Layer Attacks in MANET

    In recent days, Mobile Ad-hoc NETworks (MANETs) have emerged as a major next generation wireless network technology. The wireless and distributed nature of MANETs paves way for the intruder to degrade the functionality of MANET. MANETs are vulnerable to numerous attacks at all layers, because the design of most MANET...

    Provided By International Journal of Computer Applications

  • White Papers // May 2015

    Detection and Prevention Mechanism for TTL Field Tampering Form of DDoS Attack in MANET's

    A Mobile Ad-hoc NETwork (MANET) is a group of nodes or devices without any fixed infrastructure or centralized control. There will be no centralized control (like switch router, etc.) or network infrastructure for a MANET to be set up, thus making its deployment very quick and inexpensive. In mobile ad-hoc...

    Provided By International Journal of Computer Applications

  • White Papers // May 2015

    HOP-by-HOP Packet Forwarding Mechanism in Wireless Mesh Network

    A wireless mesh network is infrastructure-less, "Self-organizing and self-configured" network where participating node automatically establishes and maintain connectivity amongst themselves. Such type of networks is difficult to provide internet access and connection in remote areas. In paper, lot of methods are proposed in order to handle problem in this network...

    Provided By International Journal of Computer Applications

  • White Papers // May 2015

    Clustering and Bayesian Approach-based Model for Detection of Phishing

    Phishing is an internet attack that aims to get users sensitive information by fraud websites. Website phishing is one of the major attacks by which most of internet users are being fooled by the phisher. The best way to protect from phishing is to recognize a phish. Phishing emails usually...

    Provided By International Journal of Computer Applications

  • White Papers // May 2015

    Detecting Phishing Web Pages

    Phishing is basically stealing user's personal information (e.g. stealing credit card information or using users banking passwords without any information to the user). Phishing can also be done by making fake web pages as similar as the real, legitimate page and when the user fills information asked in those web...

    Provided By International Journal of Computer Applications

  • White Papers // May 2015

    Secure Cloud Computing with RC4 Encryption and Attack Detection Mechanism

    The growing requirement of system resources, memory requirement and huge space, etc. have sprinted up the demand of cloud computing. The ease in the use and dynamic demand completion nature will also make it a future business platform. But the authors cannot forget the second side of the coin as...

    Provided By International Journal of Computer Applications

  • White Papers // May 2015

    Cluster Head Election Approach Based on Weighted Clustering Algorithm for MANET

    The mobile ad-hoc network is self-configurable network technology where not any fixed infrastructure is available. Due to frequent mobility and dynamic topology the network suffers from the frequent path breaks and the connectivity issues. The clustering techniques are utilized to improve the connectivity and scalability of network. Therefore, a new...

    Provided By International Journal of Computer Applications

  • White Papers // May 2015

    Enhancing Privacy Preservation using S-ALERT Protocol to Diminish Routing Attacks in MANETs

    An innominate communication method in Mobile Ad-hoc NETworks (MANETS) is categorized into proactive method, re-active method and anonymous routing method. Re-active routing is further divided into two methods, which includes superfluous traffic and routing hop-by-hop encryption. Whereas, MANETs has various choices in respect to anonymous routing protocols, to provide location...

    Provided By International Journal of Computer Applications

  • White Papers // May 2015

    Detection of Black Hole Attack Using Control Packets in AODV Protocol for MANET

    Mobile Ad-hoc NETwork (MANET) is a network of mobile nodes in which there is no infrastructure is defined. Mobile nodes transmit their information through intermediate nodes. Since there is no predefine infrastructure, MANET suffers from many internal or external attacks. Black hole attack is one of the security attacks in...

    Provided By International Journal of Computer Applications

  • White Papers // May 2015

    Monitoring System using GSM

    In this paper, the authors have proposed a method to make a base for the monitoring of systems. The monitoring of systems could be from monitoring of movements in any particular area to the monitoring of any external electrical, mechanical device. Every person is pocketed with the cell. So, taking...

    Provided By International Journal of Computer Applications

  • White Papers // May 2015

    Comparative Analysis of Traditional Methods with Game of Life in Cellular Automata for Edge Detection

    Edge detection is one of the most commonly used operations in image analysis, which is recently receiving much attention. There are various existing traditional edge detectors which are used to estimate edge magnitude and orientation. The concept of Cellular Automata (CA) also has been used for edge detection making the...

    Provided By International Journal of Computer Applications

  • White Papers // May 2015

    Scam-Alert: Characterizing Work from Home Scams on Social Networks

    Online social networks have become a favorite platform for marketers and advertisers. Due to the wide reach of these networks and low cost of advertisement, there has been an upsurge of marketing and advertising campaigns on social media. Social networks like Facebook, Twitter and Google+ possess the capability to quickly...

    Provided By International Journal of Computer Applications

  • White Papers // May 2015

    A Novel Approach for Developing a Secure and Optimized Algorithm for Implementation of Digital Signature

    Digital signatures can be treated as a digital code that can be embedded with an electronically transmitted data and its property is that it uniquely identifies the sender and ensures that the data has not been modified after the process of digital signing of that data. There are various algorithms...

    Provided By International Journal of Computer Applications

  • White Papers // May 2015

    Distributed Cross-layer Power Control in Pre-equalized Downlink of a MC-CDMA System

    In this paper, the authors determine the optimal powers of mobile users in a Multi-Carrier CDMA (MC-CDMA) system receiving data from a Base Station (BS). The downlink transmission is pre-equalized and the utility function is a generalized Energy Efficiency (EE) based on a cross-layer approach and taking into account the...

    Provided By International Journal of Computer Applications

  • White Papers // May 2015

    An Improved Intrusion System Design using Hybrid Classification Technique

    The data mining is an essential tool for current age technology. It is very useful for various applications such as business intelligence, computational cloud and other research and science based projects. In this presented paper, a new kind of intrusion system design is proposed and their implementation is presented using...

    Provided By International Journal of Computer Applications

  • White Papers // May 2015

    Content based Multimedia Retrieval using Automatic Speech Recognition

    The authors' system deals with retrieval of suitable video based on the user input and voice commands. The microphone takes user voice as input and processes it to convert it into the text. It further checks the repository database of videos to find a video that matches the spoken keyword...

    Provided By International Journal of Computer Applications

  • White Papers // May 2015

    Multiple User Authority Framework for Data Sharing in OSN'S

    Today, all the peoples are using the social websites for the interaction and creating profile and many more purposes. In this paper, it focuses on the restriction access of information which is handling by social websites. All people know Online Social Networks (OSNs) have much more growth in the current...

    Provided By International Journal of Computer Applications

  • White Papers // May 2015

    Dynamic Capacity Planning with Comprehensive Formation of SLAs in Clouds

    The provision of service enabled connectivity is the significant art of clouds. The long-held dream of computing as a utility has become reality in the era of cloud computing. Cloud users are now able to run and access their applications from anywhere in the world on demand. The proposed paper...

    Provided By International Journal of Computer Applications

  • White Papers // May 2015

    Secure Communication using RSA Algorithm for Network Environment

    Secure communication in network environment is primary requirement to access remote resources in a controlled and efficient way. For validation and authentication in e-banking and e-commerce transactions, digital signatures using public key cryptography is extensively employed. To maintain confidentiality, digital envelope, which is the combination of the encrypted message and...

    Provided By International Journal of Computer Applications

  • White Papers // May 2015

    Location Privacy Preserving of Mobile Users using Secured Homomorphism

    In today's highly interconnected world users are increasingly dependent on high end Smartphones and mobile devices. Users arrange and plan their daily routines using such high end devices. These applications often rely on current locations of individual users or a group of users to provide the desired service. By means...

    Provided By International Journal of Computer Applications

  • White Papers // May 2015

    Droid Guard: An Approach to Make Android Secure

    Mobile technology has been through a rapid development during last few decades. Smartphones used now-a-days have dominated the traditional phone sets in many ways and they have become a usual gadget in day-to-day lives. In this paper, authors explain the development and utilization of multitasking security app named "Droid guard"...

    Provided By International Journal of Computer Applications

  • White Papers // May 2015

    A Secure License Key Generation using FBPS

    Secure message transmission is generally required for the system where transmitted message need to be verified at the receiver end. Fibonacci develops the reversible encryption algorithms as mentioned in below technique. The technique considers a message as binary string on which the Fibonacci Based Position Substitution (FBPS) method is applied....

    Provided By International Journal of Computer Applications

  • White Papers // May 2015

    Performance Evaluation of Secure Asymmetric Key Exchange Mechanisms for 4G Networks

    The 4G network are cellular network which provides higher bandwidth and fast speed but there are few security flaws and thus to protect the users privacy, a very well defined security support is mandatory. The attacker can launch a variety of active and passive attacks. Thus security mechanism is to...

    Provided By International Journal of Computer Applications

  • White Papers // May 2015

    Multi-Dimensional Success Factors of Agile Software Development Projects

    In this paper, the authors focus on providing a multi-dimensional view of success factors in agile software development projects. This paper starts by surveying the literature for the success factors of agile software development projects. Therefore, it surveys the success factors that were published in research papers, articles and technical...

    Provided By International Journal of Computer Applications

  • White Papers // May 2015

    Implementation of Malware Analysis using Static and Dynamic Analysis Method

    Malware analysis is a process to perform analysis of malware and how to study the components and behavior of malware. On this paper, it will use two methods of malware analysis, static analysis and dynamic analysis. Static analysis is a method of malware analysis which done without running the malware....

    Provided By International Journal of Computer Applications

  • White Papers // May 2015

    An Innovative Evolution on 3D Multimedia Technology

    3D multimedia provides an exclusive mix of multimedia and communication design process, design of 3D animation media and virtual reality and 3D media connected with real and virtual studio and on-location multimedia evolution. It not only focuses on the practice and theory of the technical tools and techniques required for...

    Provided By International Journal of Computer Applications

  • White Papers // May 2015

    An Efficient Edge Server Selection in Content Delivery Network using Dijkstra's Shortest Path Routing Algorithm with Euclidean Distance

    The performance enhancement of the edge server in content delivery network is the budding area of the research in the fields of modern information technology and communication engineering so that the web users or the cloud users across the network get faster service irrespective of any geographic locations during browsing...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Urdu Character Recognition Using Principal Component Analysis

    This paper proposes a method for Urdu language text search in image based Urdu Text. In the proposed method two databases of images have been created; first one for training purpose and another for testing purpose. Training database is named 'TrainDatabase' and testing database as 'TestDatabase'. Training database consists of...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    A Feature Subset Selection Method Based on Symmetric Uncertainty and Ant Colony Optimization

    Feature subset selection is one of the key problems in the area of pattern recognition and machine learning. Feature subset selection refers to the problem of selecting only those features that are useful in predicting a target concept i.e. class. Most of the data acquired through different sources are not...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Using Bloom Filter Array (BFA) to Speed up the Lookup in Distributed Storage System

    Today's storage systems have a major issue for the long-term storage of massive amounts of unstructured data. The reliability and availability of that fortune of data become important factors. So, distributed storage system is essential for many large-scale organizations. It is challenging that how to access the distributed data from...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Smartcard Based Android Application for Public Transport Ticketing System

    The large amount of growth in India's population has increased the demand on the transport systems. In the areas of public transport, it has become essential to consider effective technologies that will ease the system of transport. This paper presents the design of a public transport ticketing system that harnesses...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Suitable Node Deployment Based on Geometric Patterns Considering Fault Tolerance in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) consist of small power-constrained nodes with sensing, computation and wireless communication capabilities. These nodes are deployed in the sensing region to monitor especial events such as temperature, pollution, etc. They transmit their sensed data to the sink in a multi-hop manner. The sink is the interface...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Enhancement of Color Images by Scaling the DCT Coefficients and Interpolation

    This paper presents the enhancement of color images in the frequency domain with interpolation. The novelty in the authors' approach is the treatment of the chromatic components, while previous techniques treated only the luminance components and the enhanced image is interpolated with bicubic interpolation. After interpolation, the interpolated surface is...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Decentralized Dynamic Query Optimization Based on Mobiles Agents for Large Scale Data Integration Systems

    The query processing in large scale distributed mediations systems raises new problems and presents real challenges: efficiency of access, communication, confidentiality of access, availability of data, memory allocation. In this paper, the authors propose an execution model based on mobile agents for the distributed dynamic query optimization. In this model,...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Modeling Academic Performance Evaluation Using Fuzzy C-Means Clustering Techniques

    In this paper, the authors explore the applicability of Fuzzy C-Means clustering technique to student allocation problem that allocates new students to homogenous groups of specified maximum capacity, and analyze effects of such allocations on the academic performance of students. This paper also presents a Fuzzy set and Regression analysis...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Use of Genetic Algorithm in Quality Measurement

    Assigning access specifier is not an easy task as it decides over all security of any software though there are many metrics tools available in a market to measure the security at early stage. But in this case assignment of access specifier is totally based on the human judgment and...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Do Programming Languages Influence the Impact of Software Changes?

    During a software development process, changes happen in almost every phase: requirements, design implementation, and maintenance. Software-change impact analysis, or simply impact analysis (IA), has been recognized as a key maintenance activity. IA aims at estimating the potentially impacted entities of a system due to a proposed change. In this...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    SMSCQA: System for Measuring Source Code Quality Assurance

    Today software systems play a critical role in various aspects of human life, and become part of everyday life. Many of these systems are essential for the completion of day-to-day activities. The increased reliance on computer applications, and organization that produced software puts more and more strain on software developers...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    MAC and Routing Layer Supports for QoS in MANET: A Survey

    In Mobile Ad Hoc NETworks (MANET), Providing QoS guarantee is difficult task due to unreliable Wireless nature of Link, Mobility, Lacking of Centralized Coordination and Channel contention. For Real-time applications (such as video, audio) QoS is More important on transmissions. Many efforts are put on ad hoc networks at both...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    A Self-Organizing Neural Scheme for Door Detection in Different Environments

    Doors are important landmarks for indoor mobile robot navigation and also assist blind people to independently access unfamiliar buildings. Most existing algorithms of door detection are limited to work for familiar environments because of restricted assumptions about color, texture and shape. In this paper, the authors propose a novel approach...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    A Framework for Integrated Routing Protocols for Mobile Ad Hoc Network

    A Mobile Ad Hoc NETwork (MANET) is a collection of wireless mobile nodes that can dynamically form a network without using any pre-existing fixed infrastructure. Due to the mobility of the nodes, routing in mobile ad hoc network is not an easy task. A Number of mobile ad hoc routing...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Cryptanalysis Techniques for Stream Cipher: A Survey

    Stream Ciphers are one of the most important cryptographic techniques for data security due to its efficiency in terms of resources and speed. This paper aims to provide a comprehensive survey that summarizes the existing cryptanalysis techniques for stream ciphers. It will also facilitate the security analysis of the existing...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    User Behavior Modeling Based on Adaptive Gaussian Mixture Model

    A remarkable technological development has been witnessed due to the recent advancements in the area of science and technology. This made the users to access the Internet and store the information retrieved in various databases at various servers across the globe, making World Wide Web as an information gateway. This...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Prediction of Pitting Corrosion Characteristics Using Artificial Neural Networks

    Precorroded steel A-106 B specimens were prepared at different surface roughness. These specimens were immersed in corrosive ferric chloride solution in different concentrations (1.5, 3.0, 4.5, 6.0% wt.) at specified durations to initiate primarily the pitting corrosion. The corrosion pits distribution depends on the corrosive concentration, degree of surface roughness,...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Student's Opinion on Adopting Pair Programming as a Teaching and Learning Tool

    Research in the realm of Pair Programming in computer science students has begun to explore the methods for accomplishing the benefits. However, valid measurements of the opinion on adopting a pair programming in the practical sessions are required to be drawn, before concluding. An Attitude Survey Test (AST) was conducted...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Advanced Cost Based Graph Clustering Algorithm for Random Geometric Graphs

    There is an increasing interest in the research of clustering or finding communities in complex networks. Graph clustering and graph partitioning algorithms have been applied to this problem. Several graph clustering methods are come into the field but problem lies in the model espoused by the state-of-the-art graph clustering algorithms...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Image Steganography Based on a Parameterized Canny Edge Detection Algorithm

    Steganography is the science of hiding digital information in such a way that no one can suspect its existence. Unlike cryptography which may arouse suspicions, steganography is a stealthy method that enables data communication in total secrecy. Steganography has many requirements, the foremost one is irrecoverability which refers to how...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Simulation and Implementation of Grid-connected Inverters

    Solar, wind and hydro are renewable energy sources that are seen as reliable alternatives to conventional energy sources such as oil or natural gas. However, the efficiency and the performance of renewable energy systems are still under development. Consequently, the control structures of the grid-connected inverter as an important section...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Optimizing Outdoor Propagation Model Based on Measurements for Multiple RF Cell

    This paper intends to explain outdoor RF attenuation path loss behavior under certain restrictions. This paper has been conducted in Nablus city to develop and optimize a suitable propagation model based on one of the existing propagation models based on outdoor measurements for 900 MHz, where a local GSM system...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    A Survey on Bandwidth Guaranteed Routing Techniques in Wireless Mesh Networks

    A Wireless Mesh Network is defined as an infrastructure network working with in as ad hoc mode. In a multi-hop wireless mesh network; it is always preferable to choose a path with higher throughput between a pair of source /destination nodes to fully exploit the network capacity. Since Wireless Mesh...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Congestion Estimation Techniques in Sensor Networks: A Survey

    In WSN or in sensor network the congestion causes the various severe conditions as it causes, data packet loss, energy inefficiency and also it diminishes the lifespan of WSN. In WSN, the major challenge is to diminish the congestion problem in the transmission of data packets between sources to destination....

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Feature-Based Clustering of Web Data Sources

    The proliferation of web data sources increasingly demands the integration of these sources. To facilitate the integration process, a pre-analysis step is required to classify and group data sources into their correct domains. In this paper, the authors propose a feature-based clustering approach for clustering web data sources without any...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    A Novel Approach of 3D Object Watermarking Algorithm Using Vertex Normal

    The concept of 3D Watermarking algorithm which is non blind and must be robust against different attack is the novel area of research. There are huge requirement of developing a robust and effective watermarking strategies to protect the illegal distribution of proprietary 3D objects. In the proposed algorithm which alter...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Performance Evaluation and Analysis of Reactive Routing Protocols in MANET

    MANET is the collection of mobile devices which formed a self configuring infrastructure less temporary network. In this paper the authors are doing performance evaluation and analysis of three reactive routing protocols (DSR, AODV and TORA) in MANET for different performance metrics Such as Average Throughput, Packet Delivery ratio, Packet...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Survey on Security Schemes for Biometric Privacy

    Biometric is the science of establishing the identity of on individual based on physical or behavioral traits such as face, fingerprint, Iris. The increasing popularity of biometrics offers personal identification systems greater security and convenient than password authentication system. A biometric system operates by acquiring raw biometric data from a...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Knowledge Acquisition Tool for Classification Rules Using Genetic Algorithm Approach

    Classification Rule Mining (CRM) is a data mining technique for discovering important classification rules from large dataset. This work presents an efficient genetic algorithm for discovering significant IF-THEN rules from a given dataset. The proposed algorithm consists of two main steps. First step generates set of classification rules and the...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2012

    Dynamic Source Quick Route Rebuilding Algorithm for Random-Access OFDMA Adhoc Network

    This paper focuses on maintaining message continuity in a mobile ad hoc network. The Dynamic Source Quick Route Rebuilding Algorithm (DSQRRA) provides continuity in packet routing to reach the next possible neighboring node in order to avoid resending the packet from the source. DSQRRA calls for mobility management and scalable...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Two-Hop Relay-Based Vehicular Network in WiMAX

    In mobile communication, routing data through intermediate mobile node is a challenging task due to high mobility of nodes which causes rapid change in network topology and frequent disconnection between pair of nodes. To address these issues, Mobile Relay Station (MRS) is introduced into the network based on IEEE 802.16j...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Comparative Study of Fuzzy k-Nearest Neighbor and Fuzzy C-Means Algorithms

    Fuzzy clustering techniques handle the fuzzy relationships among the data points and with the cluster centers (may be termed as cluster fuzziness). On the other hand, distance measures are important to compute the load of such fuzziness. These are the two important parameters governing the quality of the clusters and...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2011

    Study of Routing Protocols in Mobile Ad Hoc Networks

    To support group oriented service which is said to be the primary application that are addressed by Mobile Ad hoc NETworks (MANETs) in recent years, multicast routing is used. Hence there is a need to design stable and reliable multicast routing protocols for MANETs. In recent years several multicast routing...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2011

    Network Management Architecture Approaches Designed for Mobile Ad hoc Networks

    Mobile Ad hoc NETworks (MANETs) play an important role in the pervasive computing to support a wide range of applications. MANETs are self-organizing networks formed spontaneously from a set of mobile devices without any pre-existing fixed infrastructure or administrative support. Network management plays a vital role in the well-being of...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2011

    Detection and Extinguishing Forest Fires Using Wireless Sensor and Actor Networks

    Forests are rich containment of resources and they play a vital role in preserving and maintaining the environment. The major hazard of the forests is forest fire as the consequence of the forest fire is catastrophic in nature. Hence, it is of great importance that forest fire occurrence must be...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2011

    Effect of Mobility on Performance of MANET Routing Protocols Under Different Traffic Patterns

    The mobility of nodes in a mobile ad-hoc network results in frequent changes of network topology making routing in MANETs a challenging task. The primary objective of this paper is to study and investigate the performance of one proactive routing protocol-DSDV and two reactive protocols-AODV and DSR for mobile ad-hoc...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2011

    Simulation of Video Transmission Over Wireless IP Network in Fedora Environment

    Due to the very large and quick growth of the wireless network and increasing demand for multimedia information on the web, video transmission over the wireless network has received tremendous attention from academe and industry. Transmission of real-time video typically has bandwidth, delay, and loss requirements. Video transmission over wireless...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2011

    Network-on-Chip Design for High Performance Demanding Multimedia Application

    Systems-on-Chip architecture integrates several heterogeneous components on a single chip. A key challenge is to design the communication between the different entities of a SoC in order to minimize the communication overhead. Network-on-Chip (NoC) is a new approach for communication infrastructure of Systems-on-Chip (SoC) design, which provides network based solution...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2011

    Orthogonal Frequency Division Multiplexing Based Wireless Communication System for Digital Broadcast Applications

    Orthogonal Frequency Division Multiplexing (OFDM) is a technique that allows digital data to be efficiently and reliably transmitted over a radio channel even in heavy multipath environment. In the present paper, the authors have investigated an OFDM based wireless Communication system by transmitting and receiving a compressed image. The Bit...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2011

    Text Based Image Recognition Using Multilayer Perceptron

    The ultimate objective of any OCR is to simulate the human reading capability. Optical Character Recognition, usually abbreviated to OCR, is the mechanical or electronic translation of images of handwritten, typewritten or printed text into machine. Character Recognition refers to the process of converting printed Text documents into translated Unicode...

    Provided By International Journal of Computer Applications