International Journal of Computer Applications

Displaying 441-480 of 5369 results

  • White Papers // Jun 2014

    Predicting Primary Tumors using Multiclass Classifier Approach of Data Mining

    Data mining has been widely adopted in recent years in many fields, especially in the medical field. This paper highlights the prediction of unknown primary tumors in the dataset. The multiclass classifier with random forest is used for classification of multiclass dataset as it gives much higher accuracy than binary...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Offloading Schemes in Mobile Cloud

    Mobile cloud computing can be defined as a technology where the computational intensive tasks from a mobile device are offloaded to nearby cloud to save battery and CPU usage. Cloud computing is one of the emerging technology which is finding its usage everywhere. Mobile cloud is one step ahead of...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Parametric Fault Detection of Analogue Circuits

    In this paper the authors present a new testing approach for analogue circuits based on the digital signature analysis. In this paper, the efficient parametric fault detection approach for analogue circuits using the simulation environment is presented. This approach has three main parts, an Analogue Test Pattern Generator (ATPG), an...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Application Specific Hardware Design Simulation for High Performance Embedded System

    Application specific simulation is challenging task in various real time high performance embedded devices. In this paper specific application is implemented with the help of Xilinx. Xilinx provides SDK and XPS tools, XPS tools used for develop complete hardware platform and SDK provides software platform for application creation and verification....

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Evaluation of K-Means Clustering for Effective Intrusion Detection and Prevention in Massive Network Traffic Data

    With the growth of hacking and exploiting tools and invention of new ways of intrusion, Intrusion detection and prevention is becoming the major challenge in the world of network security. It is becoming more demanding due to increasing network traffic and data on Internet. There are various approaches being utilized...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Performance Analysis on Uncertain Data using Decision Tree

    Data uncertainty is common in emerging applications, such as sensor networks, moving object databases, medical and biological fields. Data uncertainty can be caused by various factors including measurements precision limitation. Data uncertainty is inherited in various applications due to different reasons such as outdated sources or imprecise measurement and transmission...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Security into Cloud Storage with Adding Integrity and Timed Ephemerizer

    Today cloud computing technology is very popular. There are several reasons for using cloud computing. Cloud computing used for internet based computing solution. There are many computer work together into cloud computing. With the help if cloud computing, the individual can now run the application from anywhere. Cloud user does...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Rollback APIs for Cloud Management through AI Planning

    Many administrators operate and manage cloud resource without a safety net. For this inadvertently deleting a virtual disk that results the complete loss of the contained data. Reverting to a previous acceptable state, the facility to undo a collection of changes is widely recognized as valuable support for dependability and...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    SSM-DENCLUE: Enhanced Approach for Clustering of Sequential Data: Experiments and Test Cases

    Clustering web usage data is useful to discover interesting patterns related to user traversals, behavior and their characteristics, which helps for the improvement of better search engines and Web personalization. Clustering web sessions is to group them based on similarity and consists of minimizing the intra-cluster similarity and maximizing the...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Privacy Preserving in Data Mining by Normalization

    Extracting previously unknown patterns from massive volume of data is the main objective of any data mining algorithm. In current days there is a tremendous expansion in data collection due to the development in the field of information technology. The patterns revealed by data mining algorithm can be used in...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Improvement of Pre-processing Capacity of Support Vector Clustering using Neural Network Kernel Functionfor Stream Data Classification

    Pre-processing of data before generation of pattern or classification is major steps. In the phase of pre-processing reduces the noise level of data using different technique of data mining. In current research trend support vector clustering is used for efficient data processing for noise reduction and pattern generation. Support vector...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Assortment of Materialized View: A Comparative Survey in Data Warehouse Environment

    Data warehouse is a repository of large amount of data collected from multiple heterogeneous and distributed data sources. Data warehouse stores lots of data in the form of views, referred as materialized views which provide a base for decision support or OLAP queries. Materialized views store the result of queries...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    An Innovative Transport Layer Protocol for Smart Grid Communications

    The communication technology for power systems a major focus in the development and deployment of smart grid, the SCTP protocol, which was initially designed for transporting signaling messages over IP networks, is now an established in different domain, and lately in Smart Grid communications. SCTP can provide high-performance transmission in...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Artificial Intelligence Approaches for GPS GDOP Classification

    Geometrical Dilution Of Precision (GDOP) concept is a powerful and widespread quantify for determining the errors resulting from satellite configuration geometry. GDOP computation is based on the complicated transformation and inversion of measurement matrices that has a time and power burden. Also, basic Back Propagation Neural Network (BPNN) is easy...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Energy-Efficiency Based Analysis of Routing Protocols in Mobile Ad-Hoc Networks (MANETs)

    MANET (Mobile Ad-hoc NETwork) is an actively self organizing and self configuring network without the need of any centralized base station. This is a collection of various mobile nodes that is connected through a wireless medium forming rapidly changing topologies in the network. The MANETs are infrastructure less in nature...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Add-On Security Level for Public Key Cryptosystem Using Magic Rectangle with Column/Row Shifting

    In today's world, security is required to transmit confidential information over the network. Security is also demanded in wide range of applications. Cryptographic algorithms play an important role in providing the data security against malicious attacks. The efficiency of cryptographic algorithm is not only based on its time taken for...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Comparative Study of Enhanced AODV Routing Protocols in VANET

    Vehicular Ad-hoc NETwork (VANET) is a self-organizing and infrastructure less network i.e. used to provide communication between vehicle-to-vehicle and vehicle to Road Side Units (RSUs). It is one of the influencing research area that have been used in wireless communication for the better improvement of Intelligent Transportation Systems (ITS) because...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Scalable Back-Bone-Assisted Hop Greedy Routing for VANET's City Environments (SBHG)

    Vehicle Ad-hoc NETworks (VANETs) play very crucial role in variety of applications, such as co-operative driving, Information sharing, other added services like navigation, internet access etc. A lot more research is required in the optimal routing, sensing the vehicles, safely messages to be broadcasted etc. To reach to the destination...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    An End-Around Approach for Efficient Join Query Processing

    In this paper, the authors introduce a method for producing immediate and result in multi-join query, in homogeneous and heterogeneous environment. In recent years, adaptive or non blocking join algorithms have attracted a lot of attention in streaming applications, where data is provided from autonomous data sources in heterogeneous network...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    A Survey on Lightweight Block Ciphers

    Ubiquitous and pervasive computing is new era of computing and it needs lightweight cryptographic algorithms for security. Lightweight cryptography is used for resource constrained devices (which have limited memory, limited power and less processing capability) such as Radio Frequency IDentification (RFID) tags, contactless smart cards, wireless sensor network, health care...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Mitigating DDoS Using Threshold-Based Filtering in Collaboration with Capability Mechanisms

    Capability based approaches have been a major area of work since long time. They are robust against address spoofing attacks. However, they are vulnerable to a new type of attack called denial-of-capability attack. Also, bandwidth flooding is another serious issue. This paper proposed a novel approach for collaboration of capability...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Solving the Wireless Mesh Network Design Problem Using Genetic Algorithm and Simulated Annealing Optimization Methods

    Mesh clients, mesh routers and gateways are components of Wireless Mesh Network (WMN). In WMN, gateways connect to Internet using wire line links and supply internet access services for users. Multiple gateways are needed, which take time and cost budget to set up, due to the limited wireless channel bit...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    A Framework for Safe Mode Alarm Reporting Technique (SMART) in ATMs

    In current era, with the changes in financial transactional trends, the usage of Automated Teller Machines (ATMs) is excelling around the world to meet the customers need. The technological enhancement in this direction is supporting various aspects relevant to the smooth, safe and secure communication and functionality of Automated Teller...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Study of Attacks in MANET, Attacks on AES, Cryptographically Generated Addresses (CGAs) Methods and Possible Alleviation in IPV6 Over MANET Area

    The Mobile Ad hoc NETwork (MANET) has attracted a lot of attention due to the characteristic of an infrastructure-less construction and multi-hop communication. In MANET, security is major issue, hackers has aimed to disrupt security in the form of IP spoofing or to produce a forged route. In the advancement...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Routing Protocols in MANET: A Survey

    Mobile means moving and ad hoc means temporary with no any fixed infrastructure so mobile ad hoc networks are a class of temporary networks in which nodes are moving without any fixed infrastructure or centralized management. Due to the various applications that use MANETs are such as battlefield, emergency services,...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Validate the Correctness of Object Oriented Program with Regression Testing

    Regression testing is used to validate the correctness of upgrades version of any program or software. The newly introduced features in the system under test are compared with the existing versions which determine the proper implementation of regression testing. The verification is done in a way that the modification made...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Performance Analysis of Turbo Coding with AES for CCSDS Standard

    Turbo codes enable reliable communication over power-constrained communication channels at close to Shannon's limit. Further, the performance of the communication system is enhanced by incorporating security mechanism. Security is described as the process of minimizing the vulnerabilities of assets or resources. National Institute of Standards and Technology (NIST) chose Rijndael...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    A Survey on Multicast Routing Protocols for Mobile Ad Hoc Networks

    There are many benefits of multicasting using with network. The communication cost reduced by multicasting for applications that sends the same data to many recipients instead of sending via multiple unicast. This paper gives a general survey of multicast routing protocols in Mobile Ad-hoc NETworks (MANETs). The multicast routing protocols...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Steganography Using Cryptography and Pseudo Random Numbers

    When it comes to information hiding it is always a question whether to use steganography or cryptography. Cryptography scrambles the message so that is it unrecognizable and without proper key the encrypted message is useless. With the help of steganography messages can be passed over the network discreetly as it...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    A Comparative Study of Test Exit Criteria in Software Testing

    Software testing refers to the set of activities carried out on the software with the intent of finding errors. It is one to ascertain that the software meets all its specifications. For any software a very large number of scenarios and input value combinations exist and testing the software for...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Study and Analysis of Dictionary Attack and Throughput in WEP for CRC-32 and SHA-1

    Wireless is a growing area in research and industry. Wired Equivalent Privacy (WEP) or the 802.11b is the most spread standard. It is designed to provide a same security as that of the wired LAN. Wirelesses Local Area Networks (WLANs) have become more prevalent and are widely deployed and used...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    A Review of Various Routing Protocols in VANET

    Vehicular Ad-hoc NETwork (VANET) is a self-organized network that connects vehicle and RSUs. The RSUs can intern be connect to a background network so that many other network applications and services including internet access can be provide to the vehicle for obtaining different services by the user or driver. The...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Automated Air Baggage Security Enhancements with Biometric Recognition Using Programmable Logic Controller

    In this paper, the authors intend to automate and provide a secure, human intervention-free air baggage security cum access system. The paper aims to automate, minimize and quicken the process of air baggage handling and also reduce the discrepancies involved. The simulation has been explained in four phases. The first...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Performance Analysis by Improving Bit Error Rate (BER) Through Various Diversity Techniques in Wireless Communication

    In wireless communication systems antenna diversity is an important technique to combat deep fading to improve the system performance and to increase the channel capacity. The fast and random fluctuation of the received signal strength is usually called fading. Diversity technique has been taken into consideration to mitigate the effects...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Mobile Robot-Dynamic Model Controlling Using Wavelet Network

    In this paper, mobile robot control system for dynamic model is implemented by using wavelet neural network and optimized by depending on PSO algorithm. The paper is divided into two sections. In the first section, the best structure of wavelet neural network controller is selected among different tested structures (by...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    A Gravitational Black Hole Algorithm for Autonomous UCAV Mission Planning in 3D Realistic Environments

    In this paper, the authors address a novel approach to 3D mission planning of UCAVs in constrained environments. To solve this NP-hard problem, Black Hole algorithm (BH) is improved by considering stars gravities information. By modeling UCAV properties, aerospace constraints and DTM of environment, proposed mission planner based on black...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    WebGuard: Enhancing Intrusion Detection in Multi-Tier Web Applications

    In today's world, web applications and internet services have become an integral part of daily life, enabling communication and the management of personal information from anywhere. In order to accommodate humungous increase in demand and data complexity, web applications are moved to multitier design. With the increase in popularity of...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Establishing Correlation Between Size Estimation Metrics and Effort - A Statistical Approach

    For effort estimation, among various inputs, size is the most vital one. The estimation of effort and cost depends on the accurate prediction of the size. Given the central role that software size plays in the software cost estimation, software developers are increasingly focusing on process improvement in the software...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    UML Based Test Case Generation Methods: A Review

    Testing guarantees the quality of software to be developed in terms of presence of errors. A difficult part of software testing entails the generation of test cases. A good test case should have the quality to cover more features of test objective. There are number of methods for test case...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Performance Analysis of Handoff Calls for Quality of Service Using Call Admission Control Algorithm for Data, Video and Voice Traffic

    Call admission control is a very important measure in CDMA system to guarantee the quality of the communicating links. In future wireless networks multimedia traffic will have different QoS requirements. The call admission control is very important measure in CDMA system to guarantee the quality of the communicating link In...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Load Balancing in Distributed Systems Using Diffusion Technique

    The purpose of load balancing algorithm is to distribute the excess load from heavily loaded nodes to under loaded nodes. A new dynamic load balancing algorithm is proposed based on diffusion approach (DDD) for homogeneous systems where the processing capacities of all nodes in the system are equal. The proposed...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Investigations on Multi Pumped Fiber Raman Amplifiers Over WDM in Optical Communication System

    Fiber Raman amplifiers are important component of wavelength division multiplexed fiber-optic communication systems. The number of pumps, determination of powers, wavelengths and pumping schemes are main design criteria to operate these amplifiers. This paper investigates the effect of counter propagating pumping in fiber Raman amplifier. Pumping options like single, two...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Intrusion Detection in Wireless Networks Using FUZZY Neural Networks and Dynamic Context-Aware Role Based Access Control Security (DCARBAC)

    This paper proposes a Dynamic Context Aware Role Based Access Control Security Service Which Provides Multi-Level Authentications and Authorization. This model help the building of Secure Devices efficiently .This security service in a Dynamic Environment uses Fuzzy Logic theory And the DCARBAC to change the Privileges. The System uses the...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Defensive Mechanisms of Selective Forward Attack in Wireless Sensor Networks

    Wireless sensor networks are composed of a large number of sensors and their major challenge is energy consumption in order to prolong the life time of the network. From the security point of view, detecting schemes must be very light to increase the life time of the network. In this...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Fuzzy Controlled Architecture for Performance Tuning of Database Management System

    Database Management Systems deliver higher performance only when they are properly tuned. Database tuning is complicated due to the fact that several conflicting tuning parameters have to be adjusted simultaneously for a variety of workload types and the highly unpredictable traffic patterns. The DataBase Administrator (DBA) has to be an...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    A Secure Money Transaction Scheme (Identification Scheme) Using Elliptic Curves

    Identification protocols have an important role for building secure communications amongst two or more entities over the internet. In this paper, the authors introduce a new identification scheme (or money transaction protocol) based on the elliptic curve Diffie - Hellman problem. They show that their protocol meets the security attributes...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    An Efficient on Demand Load Balancing Routing Protocol for MANETs (EDLBP)

    MANETs are networks capable of communicating in a set of small, low cost, low power sensing devices. A wireless sensor networks is totally based on the limiting factor i.e. energy consumption. A wireless sensor network consists of large number of sensor nodes distributed or scattered in particular network region. MANETs...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Ant Based Algorithm for Load Balancing in Mobile Ad Hoc Networks

    Mobile ad hoc networks are infrastructure-less networks consisting of wireless, possibly mobile nodes which are organized in peer-to-peer and autonomous fashion. Each node is also a router that forwards data packets to its proper destination. A new family of algorithms inspired by Swarm Intelligence has come into existence to provide...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    A Novel Architecture Style: Diffused Cloud for Virtual Computing Lab

    Using Eucalyptus Systems' private cloud solution, an institute can build Virtual Computing Lab (VCL) that can satisfy the requirements of an institute, but it is assumed that infinite computing resources are available on demand thereby eliminating the need for cloud computing users to plan far ahead for provisioning.. However, due...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Artificial Neural Network Based Intrusion Detection System: A Survey

    Detecting unknown or modified attacks is one of the recent challenges in the field of IDS. Anomaly based IDS can play a very important role in this case. In the first part of this paper, the authors will focus on how ANN is recently used to address these issues. Number...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Comparing CORBA and Web-Services in View of a Service Oriented Architecture

    The concept of Service Oriented Architecture revolves around registering services as tasks. These tasks are accomplished collectively by various disparate components seamlessly connected to one another. The task of interlinking these components may be considered amongst the most convoluted and difficult tasks currently faced by software practitioners. This paper attempts...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Mining Association Rule in Classified Data for Course Recommender System in e-Learning

    The ADTree (Alternating Decision Tree) is a supervised classification technique that combines decision trees with the predictive accuracy into a set of classification rules & association rule algorithms are used to show the relationship between data items. Here in this paper the authors combine these two algorithms & apply it...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Combination of Clustering, Classification and Association Rule Based Approach for Course Recommender System in e-Learning

    Data mining also known as Knowledge Discovery in Database is the process of discovering new pattern from large data set. E-learning is the electronically learning & teaching process. Course Recommender System allows one to study the behavior of student regarding the courses. In Course Recommender System in E-learning, the authors...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Introduction of a Triple Prime Symmetric Key Block Cipher

    This paper proposes to put forward an innovative algorithm for symmetric key block cipher named as "Triple Prime Symmetric Key Block Cipher with Variable Key-Spaces (TPSKBCVK)" that employs triple prime integers as private key-spaces of varying lengths to encrypt data files. Principles of modular arithmetic have been elegantly used in...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Optimum Power Utilization in Wireless Sensor Network Using Partition Technique

    the authors Propose Balanced, Localized, Robust, Dynamic state changing and energy efficient spanning tree approaches for Wireless sensor networks which they call Balanced Energy Efficient SPanning Tree with Sleep scheduling (BEESP-SS). In this paper first, they construct the spanning tree based on RNG (Relative Neighborhood Graph) after that they find...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    A Novel Scalable Group Key Management Protocol

    Secure and reliable group communication is an active area of research. The main issue in secure group communication is group dynamics and key management. Group key management brings challenges on scalability for multicast security. Member joining and member leaving from the group is the main challenge in designing secure and...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Design and Reliability Analysis of a Class of Irregular Fault-Tolerant Multistage Interconnection Networks

    Parallel processing can be used to design high performance computing systems. In a parallel computer inter-connecting processors and linking them efficiently to the memory modules is not an easy task. Therefore, there is a requirement of an interconnection network that provides the desired connectivity and performance at minimum cost. Multistage...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Usage of Variable Structure Congestion Control Protocol (VCP) in Buffer Overflow Attack Blocker

    In this paper, the authors proposed the usage of "Variable structure congestion control protocol" in network communication to avoid buffer overflow thereby preventing buffer overflow attacks. In general transferring a signal between connected clients are done through "Transmission control protocol" in which only two states are clearly shown i.e. either...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    A Simple Algebraic Model Based Polyalphabetic Substitution Cipher

    Cryptography is considered to be a disciple of science of achieving security by converting sensitive information to an un-interpretable form such that it cannot be interpreted by anyone except the transmitter and intended recipient. An innumerable set of cryptographic schemes persist in which each of it has its own affirmative...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    An Effective Method for Association Rule Mining Based on Transactional Matrix

    Focus of this paper is to present a new method based on transactional matrix for finding association rules more efficiently. Apriori algorithm is one of the classical algorithms for finding association rules, but it has limitations of number of times database scanned is too large and number of candidate item...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Content Based Image Retrieval Using Wavelet Based Multi-Resolution Analysis

    Content Based Image Retrieval (CBIR) is an emerging area of engineering application focusing on algorithms and methods to extract image features from a query image and retrieve similar images from large archives. It has found extensive application in medical imaging for both retrieval and automatic archiving. In this paper it...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Audio Encryption in Handsets

    A novel method to encrypt audio (sound) stream of data by applying chaos is discussed. A pair of one-dimensional logistic maps is used for generating a chaotic sequence. The routine tests of encryption are performed and the results are observed. The proposed scheme is then implemented in real time on...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Online Financial Algorithms: Competitive Analysis

    Analysis of algorithms with complete knowledge of its inputs is sometimes not up to the authors' expectations. Many times they are surrounded with such scenarios where inputs are generated without any prior knowledge. Online Algorithms have found their applicability in broad areas of computer engineering. Among these, an online financial...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Performance Evaluation of Audio Codecs Using VoIP Traffic in Wireless LAN using RSVP

    VoIP has become an interesting topic of research in both the internet and the telecommunication industry. The tremendous increase in popularity of VoIP services is a result of huge growth in broadband access. In wired as well as in wireless communication, VoIP is expected to completely replace the traditional telephony...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    DWT and DCT Based Robust Iris Feature Extraction and Recognition Algorithm for Biometric Personal Identification

    Human iris is one of the most reliable biometric because of its uniqueness, stability and noninvasive nature. Thus it has attracted the attention of biometrics based identification and verification research and development community. In this paper, a new approach of iris image feature extraction technique based on the statistical properties...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Auto-Label Threshold Generation for Multiple Relational Classifications Based on SOM Network

    Classification and Association rule mining are two basic tasks of Data Mining. Classification rules mining finds rules that partition the data into disjoint sets. This paper is based on MrCAR (Multi-relational Classification AlgoRithm) and Kohonen's Self-Organizing Maps (SOM) approach. SOM is a class of typical Artificial Neural Networks (ANN) with...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    An Encryption Algorithm for Secure Data Transmission

    Encryption is of prime importance when confidential data is transmitted over the network. Varied encryption algorithms like AES, DES, RC4 and others are available for the same. The most widely accepted algorithm is AES algorithm. The authors have proposed a new algorithm based on the concept used by Rijmen and...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    An Optimized Approach for Selecting an Optimal Number of Cell Site Locations in Cellular Networks

    Wireless communication has seen gigantic advancement all the way through past years. The maturity of newer generations of technology and boost up in user mobility has created the need and demand for wireless networks that has triggered considerable technological advances as well as the investigation of optimization algorithms to support...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Performance Analysis of Controlled Scalability in Unstructured Peer-to-Peer Networks

    In unstructured peer-to-peer networks, the analysis of scalability is a challenging task due to the unpredictable nature of churn rate. Specifically, in the P2P file sharing applications, peers join and leave the overlay network in a dynamic fashion increase the complexity of the network and leads to a huge wastage...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Security Aspects of Cloud Computing

    Cloud Computing is the new buzz word in today' s computing world. Although there is huge buzz, many people are confused as to exactly what cloud computing is, especially as the term can be used to mean almost anything. The paper is categorized in three parts. The first part of...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Fast Content Aware Video Retargeting

    When a video is displayed on a smaller screen than originally intended, some of the information in the video is necessarily lost. In this paper, the authors introduce video retargeting that adapts video to better suit the target display, minimizing the important information lost. They can remove uninteresting part from...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Mechanism for Implementation of Load Balancing Using Process Migration

    The feature of load sharing or load balancing involves migration of running processes from highly loaded workstations of a network to the lightly-loaded or idle workstations of the network. This paper describes load balancing techniques to share the workload of the workstations belonging to a particular network to gain better...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    An Efficient Location Based Reactive Multi-Path Routing Protocol for MANET

    A mobile ad hoc network consists of wireless nodes that move frequently. Movement of nodes results in a change in routes, requiring some mechanism for determining new routes. In this paper, the authors propose an approach to utilize location information to improve performance of routing protocols for ad hoc networks....

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Neural Networks in ERP and CRM

    Enterprise Resource Planning (ERP) is a very popular term nowadays which integrates all the major functions like Finance, Controlling, Production, Selling and Distribution, Personnel, Quality Control, Material management of the concern. ERP is applicable both in big and medium size industries. CRM mainly concentrates to satisfy the consumers at a...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    New Clustering Algorithm for Vector Quantization Using Walsh Sequence

    In this paper, the authors present an effective clustering algorithm to generate codebook for Vector Quantization (VQ). Constant error is added every time to split the clusters in LBG, resulting in formation of cluster in one direction which is 1350 in 2- dimensional case. Because of this reason clustering is...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Multi Criteria Decision Making Approach for Selecting Effort Estimation Model

    Effort Estimation has always been a challenging task for the Project managers. Many researchers have tried to help them by creating different types of models. This has been already proved that none is successful for all types of projects and every type of environment. Analytic Hierarchy Process (AHP) has been...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    A Review of Financial Accounting Fraud Detection Based on Data Mining Techniques

    With an upsurge in financial accounting fraud in the current economic scenario experienced, Financial Accounting Fraud Detection (FAFD) has become an emerging topic of great importance for academic, research and industries. The failure of internal auditing system of the organization in identifying the accounting frauds has lead to use of...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    A Comparative Study of Association Rule Algorithms for Course Recommender System in E-learning

    A course Recommender System plays an important role in predicting the course selection by student. Here the authors consider the real data from Moodle course of their college & they try to obtain the result using Weka. Association rule algorithms are used to find out the best combination of courses...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Ontology Based Information Retrieval: A Case Study for Sports and Eminent Personalities Domain

    The objective of this paper is to develop software framework to improve information creation, maintenance and retrieval by introducing semantic technologies. This paper analyzes the drawbacks of traditional keyword based search engines and proposes the need for semantic based intelligent information retrieval systems. It also analyzes technologies specified by W3C,...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    AES Keys and Round Functions for Data Security

    Security is a basic requirement of an organization in the world to keep their information secure from their competitors. AES is the most recent algorithm which includes encryption with the help of reliable keys. It is used to protect the data including banking, financial, and government information. In this paper,...

    Provided By International Journal of Computer Applications