International Journal of Computer Applications

Displaying 401-440 of 4301 results

  • White Papers // Feb 2014

    Towards Unsupervised and Consistent High Dimensional Data Clustering

    The boosted demand for immense information, the enhanced data acquisition and so do the size and number of dimensions of data is a big challenge for the data mining algorithms. Clustering exercise to collect the data with same characteristics together, for better performance of knowledge based systems. High dimensional and...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    Cued Click Points Graphical Images and Text Password Along with Pixel Based OTP Authentication

    A graphical password uses images or representation of images as passwords. Human brain is easily remembering the graphical image secret word compare to text secret word. There are dissimilar graphical image secret word methods or graphical image secret word software's are available in the market. This paper proposed merges Cued...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    A Novel Secure Remote User Authentication Protocol Using Three Factors

    According to the recent work done in the area of remote user authentication, biometrics based password authentication using smart card is the most interesting and upcoming technology. Many protocols has been designed aiming to combine three authentication factors efficiently in order secure the process of remote user authentication, but failed...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    Web Service Business Policy Customization through Finite State Machine based Semantic Representation

    In this paper, the authors propose a Finite State Machine (FSM) based approach for web service business policy customization that can address two key challenges: automated policy detection and evaluation and dynamic web service deployment. They have applied this technique on insurance domain in order to customize insurance policies for...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    Password-Free Login

    Password-free login is a system that sets the user frees from remembering the passwords used, so that the user can get an easy access to any website of his choice in a common password. The system is basically a password storage website that keeps the entire login ID's and password...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    The Study of Wormhole Attack in Mobile Ad Hoc Network

    In MANET is a collection of autonomous system of mobile nodes connected with each other using wireless link and each node communicates with each other using wireless link that are within its transmission range. The network is unbounded by any fixed infrastructure or any central authority. The dynamic topology and...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    Authentication System for Android Smartphones

    The dawn of the personal computer era gave birth to a new type of criminal, the hacker. Today there is a new even more attractive target for hackers to exploit, the Android Smartphone's. These devices allow the users' to use internet, camera, GPS tracking, and more features. Smartphone's also contain...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    A Practical Quantum Cryptography Transmitter

    The extend success of any communication system essentially depends on the strength of the secrecy of transporting the information between the partners. The classical cryptography for the wired and wireless communication systems cannot withstand against the challenges of new technologies. So, it is necessary to invent a new method to...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    Countermeasures to Database Security: A Survey

    A database is a collection of data of different types, while DBMS is a set of specifications that tells how data is to be stored in a database and how data should be accessed by the components of the database. The data and the metadata when exposed to the outside...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    A Novel Approach for Secure Hidden Community Mining in Social Networks Using Data Mining Techniques

    Social network community contains a group of nodes connected on the basis of certain relationships or same properties. Sometimes it refers to the special kind of network arrangement where the community mining discovers all communities hidden in distributed networks based on their important similarities. Different methods and algorithms have been...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    A Study on the Impact of Wavelet Decomposition on Face Recognition Methods

    Face recognition is a very powerful tool for a biometric authentication. It is the ability to identify person based on his facial characteristics. Face recognition is the important field of pattern recognition. Discrete Wavelet Transform, (DWT), is known as a very powerful tool in the field of image processing, which...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    Algorithm for Tracing Visitors' On-Line Behaviors for Effective Web Usage Mining

    User behavior identification is an important task in web usage mining. Web usage mining is also called as web log mining. The web logs are mainly used to identify the user behavior. There are so many pattern mining methods which enable this user behavior identification. The preprocessing techniques will maximize...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    Comparative Analysis of Architectures for Intrusion Detection Systems Against DoS Attacks in MANETs Based on Chi-Square Test

    A Mobile Ad-hoc NETwork (MANET) is a group of wireless nodes that can be dynamically organized as a multi-hop packet radio network without using any existing infrastructure or centralized administration. MANETs are susceptible to the variety of attacks that threaten their operation and the provided services. MANET is severely affected...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    Analysis and Implementation of the Authentication Protocol 802.1x

    The security of wireless networks against hacker attacks depends on some parameters and special configurations. Authentication is considered as one of the most important security parameter in computer networks. The communication for example between users through the internet must be authenticated by both sides in order to prevent hackers from...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    Review Paper: A Comparative Study on Partitioning Techniques of Clustering Algorithms

    Clustering plays a vital role in research area in the field of data mining. Clustering is a process of partitioning a set of data in a meaningful sub classes called clusters. It helps users to understand the natural grouping or cluster from the data set. It is unsupervised classification that...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    Data Mining to Facilitate the Trading

    Financial sector is always full of insecurity, owing to volatility in the financial sector; most of the investors fail to book the profit. It has been observed in this study that maximum percentage of return of a security or indices follows the Benford's law when price of the security or...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    Injection, Detection, Prevention of SQL Injection Attacks

    SQL injections have been always the top most priority for any website and web application. Every web application and website developed in PHP, ASP.NET and JSP which is connected to the database like MySQL, Microsoft SQL Server, and oracle are prone to SQL injection attacks. Most of the websites are...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    Sum of Distance Based Algorithm for Clustering Web Data

    Clustering is a data mining technique used to make groups of objects that are somehow similar in characteristics. The criterion for checking the similarity is implementation dependent. Clustering analyzes data objects without consulting a known class label or category i.e. it is an unsupervised data mining technique. K-means is a...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    Enhanced Security Management Through Detecting and Localizing Spoofing Adversaries in Network System

    Currently, the wireless networks are used worldwide across the globe. Such wireless networks are easily susceptible for variety of attacks. The variety of spoofing attacks can also be easily launched in the wireless environment. Here, this paper presents the new enhanced technique which makes use of the physical property mainly...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    A Study of Effective Load Balancing Approaches in Cloud Computing

    Cloud computing is the most recent technology in today's world of computing and it overcomes deficiencies of traditional ways of computing. Cloud computing is a new way of providing the essential services to cloud users on \"Pay-as-you-go\" basis. Cloud computing provides different features like on demand access, flexibility, instant response,...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    A New Technique for Relational Database Protection

    The great development of computer technologies and the Internet have made duplication and distribution of digital information simpler. This leads to a need for effective copyright protection tools. Watermarking database system is considered a vital technique for copyright protection of database systems. In this paper, the proposed system is a...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    A New Scalable Framework for Emulating Huge Networks

    Network emulation and simulation tools are widely used for preproduction, studies and researches purposes. This success is due to the quality of result they provide compared to the real equipments. Another advantage of the network simulators is that the cost of studies and experiences are exponentially reduced especially for networks...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    Security Testing of Web Applications: Issues and Challenges

    Due to the increasing complexity of web systems, security testing has become indispensable and critical activity of web application development life cycle. Security testing aims to maintain the confidentiality of the data, to check against any information leakage and to maintain the functionality as intended. It checks whether the security...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    An Overview of Inductive Learning Algorithms

    Inductive learning enables the system to recognize patterns and regularities in previous knowledge or training data and extract the general rules from them. In literature there are proposed two main categories of inductive learning methods and techniques. Divide-and-Conquer algorithms also called decision Tree algorithms and Separate-and-Conquer algorithms known as covering...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    Simulation and Detection of LDDoS Attacks Using Queuing Algorithms

    In this paper, the authors aim at the evaluation of queuing algorithms using NS2 simulator. The recent LDDoS attacks cause more severe damage to the TCP based applications than the traditional DDoS attacks. The Congestion Participation Rate (CPR) approach is used for detection and prevention of LDDoS attacks. Earlier approaches...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    Irrigation Scheduling Using WSN

    Irrigation scheduling is a planning and decision making process, the primary decision being: how much water to apply and when to apply it. Agricultural field figures can be obtained either by direct measurements with sensors placed close to the soil, or by remote sensing with sensors placed in aircrafts or...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    Data Extraction and Annotation for Web Databases Using Multiple Annotators Approach-A Review

    Web contain huge amount of information on web sites the user can retrieve this with help of the search input query to web databases & fetch the relevant information. Perhaps web databases return the multiple search output records dynamically on web browser, these search record are containing the deep web...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    A Framework to Subquery Optimization Using Case-Based Reasoning

    Query optimizers in current DataBase Management Systems (DBMS) often face problems such as intolerably long optimization time and/or poor optimization results when optimizing complex sub queries using classical techniques. There are computational environments where metadata acquisition and support is very expensive. A ubiquitous computing environment is an appropriate example where...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    Dynamic Reconfigurable Component for Cloud Computing Resources

    In recent years a new concept of IT organization emerged, the cloud computing. With this new concept, the resources are dynamically scalable, virtualized and provided to users as a service on the Internet. It is primarily intended to meet the demands of users and allow them access to virtually unlimited...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    A Clustering Based Intrusion Detection System for Storage Area Network

    A Storage Area Network (SAN) is a high-speed and widely used special-purpose network that interconnects different kinds of storage devices with associated data servers on behalf of a larger network of users. SAN security is a specialized field dealing with issues related to the storage industry, it follows the same...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    Cluster Based Energy Efficient Sensing for Cognitive Radio Sensor Networks

    In this paper, a wireless cognitive radio sensor network is considered, where each sensor node is equipped with cognitive radio. As energy consumption is the main problem when using sensors therefore, a new clustering algorithm is developed according to which group of nodes form cluster having a single cluster head....

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    Enhanced Merged Security Levels of BSPS in WLAN

    Security and quality of service are two major problems in wireless communications. This paper concentrated on improving the security levels for Enhanced Bio-cryptic Security-aware Packet Scheduling-algorithm (EBSPS) and also the fast communication between Wireless Node (WN) and Advanced Radius Authentication Server (ARAS). This paper introduces a novel Enhanced Merged Bio-cryptic...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    A Review of Modern Sequential Rule Mining Techniques

    Sequential rule mining is an important data mining task with wide applications. The current algorithms for discovering sequential rules common to several sequences use very restrictive definitions of sequential rules. Among various data mining objectives the mining of frequent patterns has been the focus of knowledge discovery in databases. In...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    AODV Protocol Improvement Using Intelligent Clustering

    In this paper, the authors propose an algorithm for intelligent Cluster Head (CH) election in clustered-AODV-based routing. Initially, the K-mean for clustering the MANET nodes have been used according to their distances between them. Next, the intelligent CH election using soft computing techniques that includes sequential hybrid fuzzy-genetic controller for...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    Data Security and Influence of Cloud Computing in Electronic Commerce Industry

    Cloud computing is an emerging computing technology that uses Internet and central remote servers to maintain data and applications. Cloud computing allows customers and businesses to use applications without installation and access their personal files or data at any corner of the world with Internet access. Presently different types of...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    Semantic Integrity Constraint Rule Discovery and Outlier Detection in Relational Data as a Data Quality Mining Technique

    Data quality is critical to the quality of patterns and analysis obtained from data. One of the important factors plaguing data is violation of Semantic Integrity, leading to inconsistency, in turn resulting in generation of bad patterns or reports when data mining or warehousing techniques are applied on such data....

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    A Comparative Study on the Performance of HZR+ Trees on Query Processing

    Data is being produced in new forms and unimaginable quantities. Researches and other scientific and commercial applications are engrossing the scientific community for their size and need of faster accessibility. The conventional access methods previously available in multidimensional databases are no longer suitable for the new form of data produced....

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    Environment Conscious Public Cloud Scheduling Algorithm with Load Balancing

    Cloud computing is very fruitful area for today's business. It provide lot of advantages like reduction of hardware and software cost for organization. Organization not has to invest a lot of money for their infrastructure and they gain full benefit of their investment. Number of cloud provider also increasing some...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    Scalable Algorithms for Missing Value Imputation

    Statistical imputation techniques have been proposed mainly with the aim of predicting the missing values in the incomplete sets as an essential step in any data analysis framework. K-means-based Imputation, as a representative statistical imputation method, has been producing satisfied results in terms of effectiveness and efficiency in handling popular...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    Synergic Impact of Inhibitors of Cloud Computing --FISM and FMICMAC Approach

    Cloud services enable continent on demand network access to a shared pool of configurable computing resources. Data migration within cloud is complicated. Cloud computing strategy is subjected to many inhibitors. This paper deals with the deployment of Fuzzy Interpretive Structural Modeling (FISM) to model the interrelationships among the inhibitors of...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Improvement of Adaptive Target Tracking Protocol (ATTP) in Wireless Sensor Networks

    In Adaptive Target Tracking Protocol (ATTP), at first, the total area that the target would appear there is estimated, after that some candidate wakening up areas and volunteer sampling time intervals are defined. Then by using an Extended Kalman Filter (EKF)-based estimation technique and energy consumption model, the best candidate...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    An Energy-Efficient Grid Based Clustering Topology for a Wireless Sensor Network

    Wireless Sensor Network (WSN) is an emerging technology. It is predicted that in future, WSN will change the human life totally. Energy optimization in Wireless Sensor Network (WSN)is one of the challenging issue. Wireless Sensor Network composed of a set of tiny sensor nodes. The nodes are continuously sense and...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Filtering Template Driven Spam Mails Using Vector Space Models

    Spam became a big problem to the society. Some spammers are using templates for sending spam. To send a particular promotion they create some template and merge the details of receivers with the template. Similarities can find among these mails and easily ignore the forthcoming spam. Most high volume spam...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Indirect Coupling Method of Chip Impedance Matched Dipole Antenna for UHF RFID Tag

    Radio Frequency Identification is the wireless technology that uses radio waves to automatically identify items within certain proximity. This process involves tagging items with a transmitter which will send bursts of information. Passive RFID tag consists of a microchip connected with an antenna. The passive tag uses the electromagnetic pulse...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Multiple Event Source Routing (MESR) for Energy Efficient Wireless Sensor Network

    The Wireless Sensor Network (WSN) is used to sense different events occurring at different sections of the remote network. The sensor nodes have limited battery power, and the nature of their deployment makes recharging almost impossible. To limit the power drain, efficient communication protocols are needed. This paper proposes Multiple...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Analytical Comparison of Usability Measurement Methods

    Usability plays very important role in fulfilling the quality requirements of a software system as it expresses the relationship between the software and its application domain. If the software system is usable then it is more productive, useful and thus it satisfies user's expectations. Inspite of such importance of usability...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Timer Based Location Management in Cellular Network Using Cache Memory

    Location management is essential task in current cellular system. Mobility prediction is widely used to assist handoff management, resource reservation and service pre-configuration. Location management methods are to find out mobile unit current location. Location update and paging have to maintain efficiently to minimize location management cost in cellular network....

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    EFB Grid Based Structure for Discovering Quality Clusters in Density Based Clustering

    Clustering is one of the important data mining techniques which discover clusters in many real-world data sets. Recent algorithms attempt to find clusters in subspaces of high dimensional data. Density based clustering algorithms uses grid structure for partitioning each dimensions into intervals (bins) which yields good computation and quality results...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Design and Develop ECC for Wireless Sensor Network

    Wireless Sensor Networks consist of sensor nodes and few powerful control mobile laptops performing activities like routing, data aggregation etc over wireless media. These kinds of networks are getting popular these days because of small size, ease of handle and installation. Because of this property they are used in environment...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Managing Versioning Activities to Support Tracking Progress of Distributed Agile Teams

    Development Progress in agile methods is based on the amount of "Working software" completed by team members. Changes to the source code might be introduced that affect the working software. Team members face difficulties in understanding and sharing changes that affect development progress especially in distributed projects. They may not...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    A CRT Based Encryption Methodology for Secure Communication in MANET

    MANETs are well known for their flexibility and ease of communication. The communication is purely based on trust, without any need of authentication. This often leads to insecure communication, causing information tampering. The traditional means of security are not sufficient to safeguard against the inherent dangers of MANET. Researchers around...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Cluster Based Efficient Key Management and Authentication Technique for Wireless Sensor Networks

    To achieve security in wireless sensor networks, it is important to be able to encrypt messages sent among sensor nodes. Keys for encryption purposes must be agreed upon by communicating nodes. The security attacks are due to the compromise of the large part of the network which can cause node...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    KeywordSearch on XML Repository with Relevance Ranking

    Extensible Markup Language (XML) is a simple text format which was designed to describe data using custom tags. The use of custom tags makes XML extremely flexible and enables it to not only describe structured data like information from a table of relational database but also semi-structured data. An XML...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Refinement of K-Means and Fuzzy C-Means

    Clustering is widely used technique in data mining application for discovering patterns in large data set. In this paper the K-Means and Fuzzy C-Means algorithm is analyzed and found that quality of the resultant cluster is based on the initial seeds where it is selected either sequentially or randomly. For...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Improved Task Scheduling on Parallel System Using Genetic Algorithm

    Parallel Processing refers to the concept of speeding-up the execution of a task by dividing the task into multiple fragments that can execute simultaneously, each on its own processor i.e. it is the simultaneous processing of the task on two or more processors in order to obtain faster results. It...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Energy-Efficient Communication Methods in Wireless Sensor Networks: A Critical Review

    A Wireless Sensor Network (WSN) has important applications such as remote ecological monitoring and target tracking. This has been enabled by the availability, particularly in recent years, of sensors that are smaller in size and smart. These sensors are equipped with wireless interfaces with which they can communicate with one...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    The Comprehensive Approach for Data Security in Cloud Computing: A Survey

    Cloud Computing is becoming next stage platform in the evolution of the internet. It provides the customer an enhanced and efficient way to store data in the cloud with different range of capabilities and applications. Service provider capable and having a technique to protect their client data to ensure security...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    The Classification and Analysis of Risks in Reengineering System

    Software engineering has become an important field of computer science and an active research field. Due to new trend and technology most of the software is in need of change. Any software that has crossed a decade are incapable of satisfying customer need with current technology is named legacy system....

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Conceptual Mapping of Insurance Risk Management to Data Mining

    Insurance industry contributes largely to the economy therefore risk management in this industry is very much necessary. In the insurance parlance, the risk management is a tool identifying business opportunities to design and modify the insurance products. Risk can have severe impact in case not managed properly and timely. The...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Anytime Anywhere- Remote Monitoring of Attendance System Based on RFID Using GSM Network

    RFID means Radio Frequency IDentification is a wireless identification technique which becomes very popular these days and is used for the identification of physical objects like products, humans, etc by the use of radio frequency. This technique is much more advantageous, safe, secure and easy with lower overhead in contrast...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2013

    Survey on FPGA-Based Pipelined Architecture for RC5 Encryption

    In current scenario, electronic devices handling confidential information. In these devices encryption algorithm proposed have been satisfy to protect the confidential information and known for their cryptographic applications. The extensively use of reconfigurable processor like FPGA for cryptographic application which have reduced the time to market of hardware logic. In...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2013

    A New Hybrid Algorithm to Solve the Task Scheduling Problem in Grid Computing

    The new generation of networks, distributed systems, grid computing, which allows users to share files and Users need to use different sources to provide. Grid computing system as one of the competing technologies for cloud computing can be considered to have many advantages for users. One goal of grid computing...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2013

    Analysis of Different Routing Techniques for Opportunistic Data Transfer

    This paper deals with various routing techniques for efficient data transfer in MANET. MANET is a wireless infrastructure-less network where mobile devices communicate through wireless links. To make the communication of wireless network as good as that of the wired ones is the challenging issue. The high link quality involves...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2013

    Employee Searching Based on User and Query Dependent Ranking

    The growth of the Web and the Internet leads to the development of an ever increasing number of interesting application classes. The most common method used now in companies is normal recruitment process. If a company wants an employee immediately, the only way for recruitment is advertising in any media....

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2013

    A Fuzzy Classifier Based on Product and Sum Aggregation Reasoning Rule

    This paper proposes the algorithm ProSum to perform the supervised classification of the data. In the proposed algorithm data is fuzzified by using type membership function to give the feature belongingness of each pattern to each class. By using Product Aggregation Reasoning Rule (PARR) and Sum Aggregation Reasoning Rule (SARR),...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2013

    Simulation Design and Performance Analysis for VoIP in Cognitive Radio Networks

    Increasing popularity of VoIP systems has witnessed applications in emerging technologies like Cognitive Radio Networks (CRN). The stringent QoS requirements in VoIP coupled with complexities in CRN have initiated intensive research in the field of performance analysis and optimizations guided by simulation results. However, in the absence of any standard...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2013

    Modified RLE with Timestamp Storage for Slow Gradient Variable Data

    The ultra-low power embedded devices are generally battery-operated and have limited data memory. The efficient use of memory is very important as the data memory of the device is limited. Run-length encoding has attracted much attention as an important data compression technique because of its simplicity and potentially low complexity....

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2013

    Performance Measure of Similis and FP-Growth Algorithm

    Exploration, analysis of data and to know patterns from large data repository has become the need of an hour. Data Mining Technology provides the solution to meet the market trends. Mining association rule is one of the main application areas of Data Mining. It gives a set of customer transactions...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2013

    Ontological Paradigm for Focused Crawling Based on Lexical Analysis

    The semantic web is a synergetic movement led by International standards body, the WWW Consortium (W3C).It aims at converting the current web dominated by unstructured and semi structured documents into a "Web of data". Here two techniques of semantic web crawling are reviewed, one is ontology based and other is...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2013

    Analysis of Cluster Based Target Tracking in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs), is one of the most emerging technologies in recent years. Signal processing between sensor nodes to the base station is most important task for these networks. Target tracking in WSN mainly focuses on localization and object tracking. This paper addresses various cluster based target tracking techniques...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2013

    Improved Trustful Routing Protocol to Detect Wormhole Attack in MANET

    Mobile ad hoc networks are comprised of nodes that must cooperate to dynamically establish routes using wireless links. Routes may involve multiple hops with each node acting as a host and router. Since ad hoc networks typically work in an open un-trusted environment with little physical security, they are subject...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2013

    Implementation of QoS of Different Multimedia Applications in WLAN

    In last deeecade wireless communication becomes a crucial ar a in communication networks. As increasing demand in the field of wireless communication Quality of Service (QoS) becomes an important consideration for supporting variety of applications that utilizes network resources. In this quality of service for different Multimedia it presents the...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2013

    Survey on Auction Based Scheduling in Grid and Cloud Environment

    Grid and Cloud Computing allow the user to execute applications on a third-party infrastructure by paying for the access to the remote resources. Scheduling and resource management is an important aspect for effective execution of an application. This paper addresses various auction based scheduling in grid and cloud environments. To...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2013

    Fast and Secure Authentication Using Double Token Based Scheme for WLANs

    Authentication can provide security by preventing unauthorized usage and negotiating the credentials for secure communication. Nevertheless, it induces heavy overhead to communications, further deteriorating the Quality of Service (QoS). Analyzing QoS and security impact of authentication, therefore, becomes critical to developing efficient authentication schemes. In this paper, the authors propose...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2013

    A New Approach to Design Programmable Secure Network Interface Card

    In this paper, Secure Network Interface Card (SNIC) Architecture is proposed, to provide secure video communication without extra overhead on host processor of receiver. PROM based security model is developed & its integration with Network Interface is described. The approach adopted here to design SNIC, is based on remote reference...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2013

    A Review: Data Mining Over Multi-Relations

    In this paper, Multi-relational data mining enables pattern mining from multiple tables. Multi-relational data mining algorithms can be used as practical proposal to overcome the deficiency of conventional algorithms. Multi-relational data mining algorithms directly extract frequent patterns from different registers in efficient manner without need of transfer the data in...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2013

    The Multi-Tier Architecture for Developing Secure Website with Detection and Prevention of SQL-Injection Attacks

    SQL injection is an attack methodology that targets the data residing in a database. The attack takes advantage of poor input validation in code and website administration. SQL Injection Attacks occur when an attacker is able to insert a series of SQL statements into a 'query' by manipulating user input...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2013

    Using Container Architecture to Detect Intrusion for Multitier Web Application

    An intrusion detection system is a computer-based information system designed to collect information about malicious activities in a set of targeted IT resources, analyze the information, and respond according to a predefined security policy. The most common computer intrusion detection systems detect signatures of known attacks by searching for attack-specific...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2013

    Signcryption Scheme That Utilizes Elliptic Curve for Both Encryption and Signature Generation

    Signcryption is a relatively new technique in public key cryptography, that perform both the functions of digital signature and encryption in a single step, in a way that is more efficient than signing and encrypting separately. Signcryption scheme can achieve authentication and encryption simultaneously, it successfully prevents mutual cheating in...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2012

    Biometric Authentication with Face Recognition Using Principal Component Analysis and Feature Based Technique

    In today's fast paced networked world, the need to maintain the security of information or physical property is becoming both increasingly important and increasingly difficult. Recently, a ground breaking technology; biometrics, which is still a subject of growing research became available to allow verification of "True" individual identity. This is...

    Provided By International Journal of Computer Applications