International Journal of Computer Applications

Displaying 441-480 of 5616 results

  • White Papers // Jul 2014

    An Efficient Technique for Detection of Flooding and Jamming Attacks in Wireless Sensor Networks

    Distributed denial of service attacks are a major threat for wireless sensor network. The aim of these attacks is that genuine users can not use network such as bandwidth, computing power and operating system data structures. Jamming and flooding attacks are one of the most popular attacks on WSN which...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    An Investigation into Access Control in Various Types of Operating Systems

    Access control is a security aspect whose importancy increases with technology advances as it forms the core of any security system. Access control can be applied at the Operating System (OS) level, middle-ware level, or the application level. The objective of this investigation is to give a detailed overview of...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Fault Tolerant ACO using Checkpoint in Grid Computing

    In this paper, the authors proposed an algorithm for fault tolerant distributed computation in a grid by the means of meta-heuristic Ant Colony Optimization (ACO) technique and check-pointing. Load balancing is the process of distributing the workload among the nodes in a grid. The load can be CPU cycles, memory...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Comparative Analysis of a Circularly Polarized Microstrip Antenna with a Cross-Slot using Single and Double Substrate

    In this paper, the authors compare the different parameters for differently configured single substrate circular patch and double substrate square patch microstrip antenna. The proposed antenna 1 is fed by proximity coupled feed whereas the proposed antenna 2 is single fed to excite the antenna. Copper clad substrate is used...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    ROF V/s Traditional Fiber as a Backhaul Technology: Comparisons of Cellular and Ethernet Networks based on SNR and Capacity

    Radio over fiber is the future technology. It will take over all traditional fiber technology, as it offers quality and service up to the requirement of the users. The ROF is being implemented over traditional fiber widely as it offers replacing of optical fiber's high range and also flexible in...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Performance Analysis of ETTH and FTTH In Terms of Cost and Scalability: A Comparative Study carried out on MATLAB

    As a new access network to the home, Ethernet To The Home (ETTH) and Fiber To The Home (FTTH) has the newest development of multimedia applications in which the end users require more and more bandwidth capacity. The main focus in this paper is to conduct a comparative study between...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Bandwidth Allocation Scheduling Algorithms for IEEE 802.16 WiMax Protocol to Improve QoS: A Survey

    In recent times, wireless network is extensively accessed technology to connect remote user terminal with its primary network. QoS is the vital parameter that can be treated wisely when data is transferred between terminal users and network administrators. In WiMax, QoS is determined accurately at MAC layer but bandwidth allocation...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Fuzzy Multi Criteria Approach for Selecting Software Quality Model

    Software quality models have been proposed to evaluate general and definite type of software products. These models were proposed to evaluate scope of software product. There has been an increasing interest in recent times for using multi criteria decision making techniques to present the comparison of software quality models. Earlier...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Analyzing Driving and Road Events via Smartphone

    Travelling in India by road is considered dangerous as traffic conditions are chaotic, the drivers drive recklessly, and the roads are poorly maintained. Therefore, there is need to monitor driver behavior and road condition regularly. In this paper, the authors developed a method that collects data using accelerometer sensor present...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Study of Facial Expression Analysis of Feature Extraction Based on Lip Movement for User Authentication

    The people are living in the 21st century, as the technology grows the security issues are gradually increasing and for those issues there is always a need for improvements in existing methods or there is a hope for new ideas towards this field. As the users use the technology from...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Path Determination using Improved BFS approach in Wireless Sensor Network

    Wireless Sensor Network (WSN) is type of network which consists of a collection of tiny devices called sensor nodes. The effective communication type in sensor network is aggregative communication. In such a path is constructed between all the participant nodes and generate an aggregative path. Each node includes its data...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Performance Evaluation of Three-Node Tandem Communication Network Model with Feedback for First Two nodes Having Non Homogeneous Poisson Arrivals

    Tandem queues are widely used in mathematical modeling of random processes describing the operation of manufacturing systems, supply chains, computer and telecommunication networks. In many of the communication systems the arrivals are time dependent and can be characterized by a non homogeneous poisson process. In this paper, the authors developed...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Current Status of Network Processors

    As number of users is increasing, demands for new applications on internet is increasing, demand for internet video is increasing, users on YouTube, Facebook, Google is also increasing, users are giving preferences to online shopping, new protocols are being introduced more rapidly. It forces significant growth in data traffic. Number...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Modeling Fuzzy Scheduling in Infrastructure as a Service Cloud

    The high capacity computing units like super computers, clusters are need to be virtualized and necessarily served to the consumers with their specific requirements, because perhaps resources underutilized. This paper addresses the results of lease scheduling in the Infrastructure-as-a-Service (IaaS) cloud in the uncertain conditions, and use of fuzzy logic...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Adoptive Neuro-Fuzzy Inference System for Traffic Noise Prediction

    An Adaptive Neuro-Fuzzy Inference System (ANFIS) is implemented to evaluate traffic noise under heterogeneous traffic conditions of Nagpur city, India. The major factors which affect the traffic noise are traffic flow, vehicle speed and honking. These factors are considered as input parameters to ANFIS model for traffic noise estimation. The...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    TTSM: Trust Threshold Security Model for User Assured Security in Cloud Computing

    Internet and networks applications are growing very fast & hence the importance and value of the exchanged data over internet are increasing. Cloud computing technology is used to handle such scalable growth in data and the users. It supports the dynamic elasticity for increased number of application, processes, users and...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Development and Implementation of Controller Area Network (CAN) Device Driver for a 32-Bit RISC Architecture based RENESAS Micro-Processor Series with AUTOSAR Software Conformance

    Device drivers abstract away the technical details and the complexity associated with interfacing a peripheral with the controller network. This in-turn increases the simplicity and reliability of the application software, in-turn reducing the product's time to market. Device drivers provide an interface platform for binding the processor-dependent physical layer and...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Optimized Antenna for 5.2GHz Applications

    Most of the communications in the century is accomplished through the wireless medium. There are various standards for simultaneous running of different applications. WLAN (Wireless Local Area Network) is a common wireless communication standard. Among the five bands announced by IEEE in 802.11 standards for wireless LAN, two most common...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Spyware Detection based upon Hybrid Approach In Android Smartphones

    Smartphones, which were once a luxury product has now become a household product. This transformation has been due to the vast amount of functionalities which a smart phone provides in just a single device. Smartphone OS, such as Android, is an open source mobile platform that enables the users to...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Low Cost Embedded System for Voltage Sag Analysis

    In this paper, the authors describe the development of low cost embedded system for detecting and analyzing the voltage sags in the ac supply. The proposed system have the capabilities of real time acquisition of voltage signal using an Embedded Controller and display its parameters in a graphical user interface...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Comparative Study of Different Models before Feature Selection and AFTER Feature Selection for Intrusion Detection

    A network data set may contain a huge amount of data and processing this huge amount of data is one of the most challenges task for network based Intrusion Detection System (IDS). Normally these data contain lots of redundant and irrelevant features. Feature selection approaches are used to extract the...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    A Survey of Reconfigurable Architectures

    A new architecture type that is recently evolving is the reconfigurable architecture which combines the benefits of ASIPs (Application Specific Instruction Set Processors) and FPGAs (Field Programmable Gate Arrays). Reconfigurable computing combines software flexibility with high performance hardware. FPGAs are generally employed to construct a reconfigurable block as it provides...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    A Survey: Sparse Traffic Grooming and RWA Assignment Schemes in Optical Network

    Traffic grooming has become a very important issue on optical network, as optical networks provide a very high speed data transmission for huge amount of data. A sparse grooming network with only a fractional of nodes having grooming functionalities may achieve the same performance as the one in which all...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    DC Shunt Motor Control using Wavelet Network

    In this paper, a dc shunt motor with fixed speed control system is presented, a wavelet neural network control scheme is proposed to control the speed of shunt DC motor, the Wavelet Neural Network (WNN) is used and optimized using Particle Swarm Optimization (PSO) algorithm. The performance is measured depending...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Cryptanalysis to Secure System

    In this paper, the authors describe how to implement 3D password. As it is free from textual password as well as graphical password. Hence it is free from attackers. 3D password is used to overcome the drawbacks of previously existing security or authentication schemes. 3D password is well created by...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Instruction Customization: A Challenge in ASIP Realization

    An Application Specific Instruction set Processors (ASIP) or alternatively known as customized processor is a processor designed for a particular application or for a set of applications. Earlier surveys show that though a significant research has been done for this most promising processor design technology, still approaches used in them...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    PAPR Reduction in OFDM System using Wavelet SLM and PTS Technique

    Recently researchers have developed many techniques to solve high PAPR problem. These techniques have some merits and demerits. The concentration of this research work is especially upon the SeLected Mapping (SLM) and Partial Transmit Sequence (PTS) techniques using wavelet transforms Inverse Discrete Wavelet Transform (IDWT) and DWT instead of conventional...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Energy Efficient Routing with MAX-Min Energy Scheme in Ad-hoc On-Demand Multipath Distance Vector routing for MANET

    During the past few years, there has been increasing interest in the design of energy efficient protocols for wireless ad-hoc networks. Node within an ad hoc network generally relies on batteries (or exhaustive energy sources) for power. Since these energy sources have a limited lifetime, power availability is one of...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Energy Efficient Ad-hoc Routing Protocol for Disaster Scenario

    Due to decentralization and infrastructure less characteristics of ad hoc networks, it can be established in any environment without pre-existing infrastructure with ease of deployment. There are many issues for designing of ad hoc network like MAC layer protocol, security, mobility of nodes, routing protocol, quality of service etc. The...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Calculating Page Pertinence for Web Referencing a New Approach

    Every day, more than three billion queries are performed on Google. To take advantage of opportunities that the user are offered by the search engines, it is important for their website to achieve high rankings in search results, in order to reach a larger customer base, increasing its business in...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    A Comparative Study of Defense Mechanisms against SYN Flooding Attack

    Distributed Denial-of-Service (DDoS) flooding attacks are a serious threat to the security of the internet. A DDoS attack makes a machine or network resources not usable by the legitimate clients. A SYN flood is a form of denial-of-service attack. An attacker sends SYN requests continuously to a target system to...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    An Approach to Enhance the Energy Efficiency of RFID Protocol using NTP Protocol

    A Wireless Sensor Networks (WSN) is a type of self organizing and self managing network which is not made of permanently of sensor nodes of the condition of not having internet infrastructure. A wireless sensor network consists of a large number of nodes spread over a specific area where the...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Recursive Ensemble Approach for Incremental Learning of Non-Stationary Imbalanced Data

    Learning non-stationary data stream is much difficult as many real world data mining applications involve learning from imbalanced data sets. Imbalance dataset consist of data having minority and majority classes. Classifiers have high productivity accuracy on majority classes and Low productivity accuracy on minority classes. Imbalanced class partition over data...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Wavelet based Power Quality Monitoring in Grid Connected Wind Energy Conversion System

    Recently renewable energy resources especially wind power integration has been far increased in the electric power distribution system. To utilize wind power more effectively, wind energy conversion system is interfaced to grid through power electronics interfaces. In this paper, monitoring of various power quality disturbances at the point of common...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Secure Data communication and Cryptography based on DNA based Message Encoding

    Information flows throughout the network that may be of local or of global scope. It is mandatory to secure that information to prevent from unauthorized access of it by any node in the path. There are various users and organizations who want to prevent their crucial data from attackers and...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    A Study on Recent Advancements in MIMO-FBMC Systems

    MultiCarrier (MC) techniques when combined with Multiple Input Multiple Output (MIMO) technology increases the throughput and QOS of the system. OFDM with its unique capability of converting the frequency selective channel into a set of frequency flat channel have proved to be one of the best multicarrier technique that can...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Improved Performance of AODV Routing Protocol with Increasing Number of Nodes using Traveling Salesman Problem

    A mobile ad hoc network is a self-configuring and self organizing infrastructure less network of mobile nodes; these nodes are dynamic in nature and are capable of communicating with each other without the use of a network infrastructure or any centralized administration. With the ease of deployment and the infrastructure...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Finger Knuckle Print Identification using Gabor Features

    One of the current trends in biometric human identification is the development of new emerging modalities. Knuckle biometrics is one of such promising modalities. Texture pattern produced by the finger knuckle bending is highly unique and makes the surface a distinctive biometric identifier. This paper presents feature based identification methods...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Mobile Learning a new Wave of Learning: A Survey among University of Dodoma Students

    Mobile technologies are increasingly becoming an integral part of student's lives in academia. Devices such as Smartphone, tablets, and e-book readers connect users to the world instantly, heightening access to information and enabling interactivity with others. Applications that run on these devices let users not only consume but also discover...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Construction of Local Instance Repositories in Personalized Ontological profiles using CosInfo Feature Clustering Method

    The online user profiles are represented using ontologies. Personalized ontology is recently introduced technique for gathering online information. Many models are utilizing only knowledge from either a global knowledge base or user local information, which requires high computational resources. In this paper, authors proposed LIR, Local Instance Repositories, which are...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Load Balancing in Distributed Systems Using Diffusion Technique

    The purpose of load balancing algorithm is to distribute the excess load from heavily loaded nodes to under loaded nodes. A new dynamic load balancing algorithm is proposed based on diffusion approach (DDD) for homogeneous systems where the processing capacities of all nodes in the system are equal. The proposed...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Investigations on Multi Pumped Fiber Raman Amplifiers Over WDM in Optical Communication System

    Fiber Raman amplifiers are important component of wavelength division multiplexed fiber-optic communication systems. The number of pumps, determination of powers, wavelengths and pumping schemes are main design criteria to operate these amplifiers. This paper investigates the effect of counter propagating pumping in fiber Raman amplifier. Pumping options like single, two...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Intrusion Detection in Wireless Networks Using FUZZY Neural Networks and Dynamic Context-Aware Role Based Access Control Security (DCARBAC)

    This paper proposes a Dynamic Context Aware Role Based Access Control Security Service Which Provides Multi-Level Authentications and Authorization. This model help the building of Secure Devices efficiently .This security service in a Dynamic Environment uses Fuzzy Logic theory And the DCARBAC to change the Privileges. The System uses the...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Defensive Mechanisms of Selective Forward Attack in Wireless Sensor Networks

    Wireless sensor networks are composed of a large number of sensors and their major challenge is energy consumption in order to prolong the life time of the network. From the security point of view, detecting schemes must be very light to increase the life time of the network. In this...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Fuzzy Controlled Architecture for Performance Tuning of Database Management System

    Database Management Systems deliver higher performance only when they are properly tuned. Database tuning is complicated due to the fact that several conflicting tuning parameters have to be adjusted simultaneously for a variety of workload types and the highly unpredictable traffic patterns. The DataBase Administrator (DBA) has to be an...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    A Secure Money Transaction Scheme (Identification Scheme) Using Elliptic Curves

    Identification protocols have an important role for building secure communications amongst two or more entities over the internet. In this paper, the authors introduce a new identification scheme (or money transaction protocol) based on the elliptic curve Diffie - Hellman problem. They show that their protocol meets the security attributes...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    An Efficient on Demand Load Balancing Routing Protocol for MANETs (EDLBP)

    MANETs are networks capable of communicating in a set of small, low cost, low power sensing devices. A wireless sensor networks is totally based on the limiting factor i.e. energy consumption. A wireless sensor network consists of large number of sensor nodes distributed or scattered in particular network region. MANETs...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Ant Based Algorithm for Load Balancing in Mobile Ad Hoc Networks

    Mobile ad hoc networks are infrastructure-less networks consisting of wireless, possibly mobile nodes which are organized in peer-to-peer and autonomous fashion. Each node is also a router that forwards data packets to its proper destination. A new family of algorithms inspired by Swarm Intelligence has come into existence to provide...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    A Novel Architecture Style: Diffused Cloud for Virtual Computing Lab

    Using Eucalyptus Systems' private cloud solution, an institute can build Virtual Computing Lab (VCL) that can satisfy the requirements of an institute, but it is assumed that infinite computing resources are available on demand thereby eliminating the need for cloud computing users to plan far ahead for provisioning.. However, due...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Artificial Neural Network Based Intrusion Detection System: A Survey

    Detecting unknown or modified attacks is one of the recent challenges in the field of IDS. Anomaly based IDS can play a very important role in this case. In the first part of this paper, the authors will focus on how ANN is recently used to address these issues. Number...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Comparing CORBA and Web-Services in View of a Service Oriented Architecture

    The concept of Service Oriented Architecture revolves around registering services as tasks. These tasks are accomplished collectively by various disparate components seamlessly connected to one another. The task of interlinking these components may be considered amongst the most convoluted and difficult tasks currently faced by software practitioners. This paper attempts...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Mining Association Rule in Classified Data for Course Recommender System in e-Learning

    The ADTree (Alternating Decision Tree) is a supervised classification technique that combines decision trees with the predictive accuracy into a set of classification rules & association rule algorithms are used to show the relationship between data items. Here in this paper the authors combine these two algorithms & apply it...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Combination of Clustering, Classification and Association Rule Based Approach for Course Recommender System in e-Learning

    Data mining also known as Knowledge Discovery in Database is the process of discovering new pattern from large data set. E-learning is the electronically learning & teaching process. Course Recommender System allows one to study the behavior of student regarding the courses. In Course Recommender System in E-learning, the authors...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Introduction of a Triple Prime Symmetric Key Block Cipher

    This paper proposes to put forward an innovative algorithm for symmetric key block cipher named as "Triple Prime Symmetric Key Block Cipher with Variable Key-Spaces (TPSKBCVK)" that employs triple prime integers as private key-spaces of varying lengths to encrypt data files. Principles of modular arithmetic have been elegantly used in...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Optimum Power Utilization in Wireless Sensor Network Using Partition Technique

    the authors Propose Balanced, Localized, Robust, Dynamic state changing and energy efficient spanning tree approaches for Wireless sensor networks which they call Balanced Energy Efficient SPanning Tree with Sleep scheduling (BEESP-SS). In this paper first, they construct the spanning tree based on RNG (Relative Neighborhood Graph) after that they find...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    A Novel Scalable Group Key Management Protocol

    Secure and reliable group communication is an active area of research. The main issue in secure group communication is group dynamics and key management. Group key management brings challenges on scalability for multicast security. Member joining and member leaving from the group is the main challenge in designing secure and...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Design and Reliability Analysis of a Class of Irregular Fault-Tolerant Multistage Interconnection Networks

    Parallel processing can be used to design high performance computing systems. In a parallel computer inter-connecting processors and linking them efficiently to the memory modules is not an easy task. Therefore, there is a requirement of an interconnection network that provides the desired connectivity and performance at minimum cost. Multistage...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Usage of Variable Structure Congestion Control Protocol (VCP) in Buffer Overflow Attack Blocker

    In this paper, the authors proposed the usage of "Variable structure congestion control protocol" in network communication to avoid buffer overflow thereby preventing buffer overflow attacks. In general transferring a signal between connected clients are done through "Transmission control protocol" in which only two states are clearly shown i.e. either...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    A Simple Algebraic Model Based Polyalphabetic Substitution Cipher

    Cryptography is considered to be a disciple of science of achieving security by converting sensitive information to an un-interpretable form such that it cannot be interpreted by anyone except the transmitter and intended recipient. An innumerable set of cryptographic schemes persist in which each of it has its own affirmative...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    An Effective Method for Association Rule Mining Based on Transactional Matrix

    Focus of this paper is to present a new method based on transactional matrix for finding association rules more efficiently. Apriori algorithm is one of the classical algorithms for finding association rules, but it has limitations of number of times database scanned is too large and number of candidate item...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Content Based Image Retrieval Using Wavelet Based Multi-Resolution Analysis

    Content Based Image Retrieval (CBIR) is an emerging area of engineering application focusing on algorithms and methods to extract image features from a query image and retrieve similar images from large archives. It has found extensive application in medical imaging for both retrieval and automatic archiving. In this paper it...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Audio Encryption in Handsets

    A novel method to encrypt audio (sound) stream of data by applying chaos is discussed. A pair of one-dimensional logistic maps is used for generating a chaotic sequence. The routine tests of encryption are performed and the results are observed. The proposed scheme is then implemented in real time on...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Online Financial Algorithms: Competitive Analysis

    Analysis of algorithms with complete knowledge of its inputs is sometimes not up to the authors' expectations. Many times they are surrounded with such scenarios where inputs are generated without any prior knowledge. Online Algorithms have found their applicability in broad areas of computer engineering. Among these, an online financial...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Performance Evaluation of Audio Codecs Using VoIP Traffic in Wireless LAN using RSVP

    VoIP has become an interesting topic of research in both the internet and the telecommunication industry. The tremendous increase in popularity of VoIP services is a result of huge growth in broadband access. In wired as well as in wireless communication, VoIP is expected to completely replace the traditional telephony...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    DWT and DCT Based Robust Iris Feature Extraction and Recognition Algorithm for Biometric Personal Identification

    Human iris is one of the most reliable biometric because of its uniqueness, stability and noninvasive nature. Thus it has attracted the attention of biometrics based identification and verification research and development community. In this paper, a new approach of iris image feature extraction technique based on the statistical properties...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Auto-Label Threshold Generation for Multiple Relational Classifications Based on SOM Network

    Classification and Association rule mining are two basic tasks of Data Mining. Classification rules mining finds rules that partition the data into disjoint sets. This paper is based on MrCAR (Multi-relational Classification AlgoRithm) and Kohonen's Self-Organizing Maps (SOM) approach. SOM is a class of typical Artificial Neural Networks (ANN) with...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    An Encryption Algorithm for Secure Data Transmission

    Encryption is of prime importance when confidential data is transmitted over the network. Varied encryption algorithms like AES, DES, RC4 and others are available for the same. The most widely accepted algorithm is AES algorithm. The authors have proposed a new algorithm based on the concept used by Rijmen and...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    An Optimized Approach for Selecting an Optimal Number of Cell Site Locations in Cellular Networks

    Wireless communication has seen gigantic advancement all the way through past years. The maturity of newer generations of technology and boost up in user mobility has created the need and demand for wireless networks that has triggered considerable technological advances as well as the investigation of optimization algorithms to support...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Performance Analysis of Controlled Scalability in Unstructured Peer-to-Peer Networks

    In unstructured peer-to-peer networks, the analysis of scalability is a challenging task due to the unpredictable nature of churn rate. Specifically, in the P2P file sharing applications, peers join and leave the overlay network in a dynamic fashion increase the complexity of the network and leads to a huge wastage...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Security Aspects of Cloud Computing

    Cloud Computing is the new buzz word in today' s computing world. Although there is huge buzz, many people are confused as to exactly what cloud computing is, especially as the term can be used to mean almost anything. The paper is categorized in three parts. The first part of...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Fast Content Aware Video Retargeting

    When a video is displayed on a smaller screen than originally intended, some of the information in the video is necessarily lost. In this paper, the authors introduce video retargeting that adapts video to better suit the target display, minimizing the important information lost. They can remove uninteresting part from...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Mechanism for Implementation of Load Balancing Using Process Migration

    The feature of load sharing or load balancing involves migration of running processes from highly loaded workstations of a network to the lightly-loaded or idle workstations of the network. This paper describes load balancing techniques to share the workload of the workstations belonging to a particular network to gain better...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    An Efficient Location Based Reactive Multi-Path Routing Protocol for MANET

    A mobile ad hoc network consists of wireless nodes that move frequently. Movement of nodes results in a change in routes, requiring some mechanism for determining new routes. In this paper, the authors propose an approach to utilize location information to improve performance of routing protocols for ad hoc networks....

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Neural Networks in ERP and CRM

    Enterprise Resource Planning (ERP) is a very popular term nowadays which integrates all the major functions like Finance, Controlling, Production, Selling and Distribution, Personnel, Quality Control, Material management of the concern. ERP is applicable both in big and medium size industries. CRM mainly concentrates to satisfy the consumers at a...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    New Clustering Algorithm for Vector Quantization Using Walsh Sequence

    In this paper, the authors present an effective clustering algorithm to generate codebook for Vector Quantization (VQ). Constant error is added every time to split the clusters in LBG, resulting in formation of cluster in one direction which is 1350 in 2- dimensional case. Because of this reason clustering is...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Multi Criteria Decision Making Approach for Selecting Effort Estimation Model

    Effort Estimation has always been a challenging task for the Project managers. Many researchers have tried to help them by creating different types of models. This has been already proved that none is successful for all types of projects and every type of environment. Analytic Hierarchy Process (AHP) has been...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    A Review of Financial Accounting Fraud Detection Based on Data Mining Techniques

    With an upsurge in financial accounting fraud in the current economic scenario experienced, Financial Accounting Fraud Detection (FAFD) has become an emerging topic of great importance for academic, research and industries. The failure of internal auditing system of the organization in identifying the accounting frauds has lead to use of...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    A Comparative Study of Association Rule Algorithms for Course Recommender System in E-learning

    A course Recommender System plays an important role in predicting the course selection by student. Here the authors consider the real data from Moodle course of their college & they try to obtain the result using Weka. Association rule algorithms are used to find out the best combination of courses...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Ontology Based Information Retrieval: A Case Study for Sports and Eminent Personalities Domain

    The objective of this paper is to develop software framework to improve information creation, maintenance and retrieval by introducing semantic technologies. This paper analyzes the drawbacks of traditional keyword based search engines and proposes the need for semantic based intelligent information retrieval systems. It also analyzes technologies specified by W3C,...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    AES Keys and Round Functions for Data Security

    Security is a basic requirement of an organization in the world to keep their information secure from their competitors. AES is the most recent algorithm which includes encryption with the help of reliable keys. It is used to protect the data including banking, financial, and government information. In this paper,...

    Provided By International Journal of Computer Applications