International Journal of Computer Applications

Displaying 441-480 of 4116 results

  • White Papers // Dec 2013

    Group Key Management Protocols for Secure Mobile Multicast Communication: A Comprehensive Survey

    Key management is equally important as compared to any other security measure such as encryption and authentication. With the growing usage of mobile devices and the advent of multicast communication, there has been a significant amount of work carried out in developing an optimum group key management protocol for mobile...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2013

    Performance Analysis of Key Establishment Protocols for Secure System

    Providing security over open and large distributed networks has always been both intriguing and challenging. There is a great chance for malicious individuals to perform disruptive and unethical tasks. Malicious users may attempt to obtain valuable information. So the authors require \"Secure channel\" over insecure network. The secure communication channel...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2013

    Effect of Rushing Attack in AODV and its Prevention Technique

    The MANET incorporates mobile nodes that forward information or packets from node to node without a wired connection. The topology changes rapidly and unproductively, there is no central control for routing of packets hence the communication is on mutual trust. There are many proposed routing protocol in which on-demand routing...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2013

    An Efficient Decision Tree Model for Classification of Attacks with Feature Selection

    Application of Internet is increasing rapidly in almost all the domains including online transaction and data communication, due to which cases of attacks are increasing rapidly. Also security of information in victim computer is an important need, which requires a security wall for identification and prevention of attacks in form...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2013

    Modified 3-D Playfair Stream Cipher

    The purpose of this algorithm is to offer heightened security for data transmission. The data may include any alphabet, numerals, or special characters. This paper proposes an improved version of a 3-D playfair cipher, by improving the complexity of encryption and decryption. The algorithm uses a 5x5 key matrix for...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2013

    Automated Student Advisory Using Machine Learning

    Within recent few years, the number of educational institutes that adopted an information system has been growing very quickly; consecutively the amount of data available in each educational institute database has also increased. Educational data mining is a specific data mining field applied to data originating from educational environments, it...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2013

    Circular Visualization Enhancement through Complementary Interaction

    In today's scenario, most of the applications like web repository generate bulk of heterogeneous data. Visualization helps in the interpretation of meaningful information from huge data generated by these applications. There are many visualization techniques available in literature. Parallel coordinates, glyph and projection techniques are some of the famous data...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2013

    An AHB on Chip Bus Tracer with Real Time Compression for SoC Support

    In this paper, the authors illustrate the System-on-Chip (SoC) debugging and analyses its behavior at several test conditions by verifying the functional aspects of the on-chip bus. Here an Advanced High performance Bus (AHB) is selected, since the AHB bus signals are difficult to observe as they are deeply embedded...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2013

    The Simulation and Analysis of Modified LEACH Protocol Using TOSSIM in Wireless Sensor Networks

    The most important routing protocol LEACH of Wireless Sensor Networks (WSNs) has been incorporated by researcher. LEACH uses the concept of dynamic clustering when sensor nodes are deploying randomly where number of cluster impact on the network. This paper describes the network quality that depends on the optimum selection of...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2013

    Reliability Analysis of the Energy Efficient Cluster Technique for WSN for Mobile Sink

    Presently Wireless Sensor Network (WSN) is very popular in the many of industrial area where the cabling from sensor to sink is difficult. Because of growing use of WSN, it is an emerging topic in the research area. There are various limitation of WSN with high number of node and...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2013

    Attribute Reduction Based Hybrid Anomaly Intrusion Detection Using K-Means and SVM Classifier

    In information security, intrusion detection is the act of detecting actions that attempt to compromise the confidentiality, integrity or availability of a resource. One of the primary challenges to intrusion detection is the problem of misjudgment, misdetection and lack of real time response to the attack. Various data mining techniques...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2013

    Architecting the Network for the Cloud using Security Guidelines

    Cloud computing is the latest emerging technology which offers reduced capital expenditure, complexity, operational risks, maintenance, and increased scalability while providing the services at different abstraction levels, namely Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and Software-as-a-Service (SaaS). A new approach called cloud networking that enables and adds the networking functions and resources...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2013

    Trust Certificate Sequence Exchange (TCSE) for Black Hole Detection in MANET: Reliability Value Based Approach

    A mobile ad hoc network is a temporary network based on movable nodes within a specific range. Due to this motion the information related to nodes is continually changes likewise the addition of new node and its deletion from network is required. Due to this the authenticity of node must...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2013

    An Investigation on the Issues in Cloud Data Security

    Cloud computing is one of the most fascinating technologies which attract the users to outsource their data from local to remote cloud servers using Internet. A large number of cryptographic schemes are available to encrypt the sensitive information and to protect data. Even though it protects the data but it...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2013

    CDTRB: QoS Based Dynamic Topology Control for Ad-Hoc Network

    MANET is an infrastructure less ad hoc network in which nodes can move freely between specific regions. In this region multiple nodes can communicate with each other. Due to this heavy movement of nodes the topology of the connections is continuously changing within a specific transmission range of the network....

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2013

    Approach Towards Optimum Data Transfer with Various Automatic Variable Key (AVK) Techniques to Achieve Perfect Security with Analysis and Comparison

    In all cryptosystem the key challenge of the designer is to make key unbreakable. Shannon proposed that key would be impossible to break if the key is made time variant. The time variant key can be implemented by changing key from session to session. AVK was one of the noble...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2013

    Surface EMG Signal Amplification and Filtering

    ElectroMyoGraphic (EMG) signals have been widely employed as a control signal in rehabilitation and a means of diagnosis in health care. Signal amplification and filtering is the first step in surface EMG signal processing and application systems. The characteristics of the amplifiers and filters determine the quality of EMG signals....

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2013

    Enabling Indirect Mutual Trust for Cloud Storage Systems

    Cloud computing is a forthcoming revolution in Information Technology (IT) industry because of its performance, accessibility, low cost and many other luxuries. It provides gigantic storage for data and faster computing to customers over the internet. It essentially shifts the database and application software to the large data centers, i.e.,...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2013

    Analyzing the Efficiency of the Packet Hiding Methods Based on the Strong Hiding Commitment Scheme (SHCS)

    In this paper the authors describes about analyze the packet hiding methods. These methods are efficiently hiding the data packets while transferring in the network Medias. To protect the system from the unauthorized users, unauthorized programs, threaten the confidential matters and confirm the system availability to the legal users. The...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2013

    A Novel Method to Access BIOS Through Client Server Technology

    Everyone has secrets and some have more than others. Each and every one wanted to have their data and information to be more secure and confidential. There are many ways to maintain the data and information to be safe. This paper is to be maintained the file or data to...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2013

    An Efficient Security Mechanism to Detect the Packet Droppers in a MANET Under Individual and Collusive Adversarial Models

    Most of the existing security mechanisms for detecting the packet droppers in a mobile ad hoc network generally detect the adversarial nodes performing the packet drop individually wherein false accusations upon an honest node by an adversarial node are also possible. In this paper, the authors propose a security mechanism...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2013

    Third Party Privacy Preserving Protocol for Secure Web Services

    Web services is become major issue in distributed data mining. In the literature the people can found a number of proposals of privacy preserving which can be divided into two major categories that is trusted third party and multiparty based privacy protocols. In case of the trusted third party privacy...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2013

    Comparative Analysis of Energy Efficient Routing Protocols in MANET

    A Mobile Ad hoc NETwork (MANET) is a collection of wireless mobile nodes forming a temporary/short-lived network without any fixed infrastructure where all nodes are free to move about arbitrarily and where all the nodes configure themselves. This paper focus on the energy consumption issues of the routing protocols. This...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2013

    A State of an Art Survey of Intrusion Detection System in Mobile Ad-hoc Network

    Mobile ad hoc networks are more vulnerable to attacks. Due to vulnerability, security in MANETs has been an issue of prime importance in the recent years. The common attack prevention techniques such as cryptographic techniques (authentication/digital signatures) cannot be implemented in MANETs as there is no central controlling device for...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2013

    Natural Language Statement to SQL Query Translator

    A database is an organized collection of data. It is created to store large amount of data and retrieve it efficiently in less amount of time. To retrieve data from the database Structured Query Language (SQL) is used. SQL has its own syntax of query. To retrieve correct data from...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2013

    Dynamic Environment and Snowflake Schema in Real Time Data Services

    The demand for real-time data service is increasing in many applications such as e-commerce, agile manufacturing, telecommunications, network management and transportation management. It is desirable but challenging, the workload may vary dynamically. In this paper the authors propose an approach for managing the dynamic environment using snowflake schema for real...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2013

    Pixel-QUAD Based Reversible Data Hiding for High Embedding Capacity

    Embedding capacity and perceptibility are prime issues in relation to data hiding techniques. There had been techniques for hiding data in reversible fashion. A new term `Pixel-QUAD' is coined in this paper, instead of commonly used `Pixel-Pair' for embedding the watermark data. This paper presents a high embedding capacity technique...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2013

    Comparative Analysis of Different Imputation Methods to Treat Missing Values in Data Mining Environment

    Data cleaning is one of the important step of KDD (Knowledge Discovery in Database) process. One critical problem in data cleaning is the presence of missing values. Various approaches have proposed to find & replace such missing data including use of mean value, use of global constant, replace by more...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2013

    Investigation of Data Mining Techniques in Fraud Detection: Credit Card

    In recent times the more secure data transfer takes place almost by means of internet. Apart from the corporate companies, publics also started using the network media. At the same time the risk also increases in secure data transfer. One of the major issue among them is credit card fraud...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2013

    A Search Space Reduction Algorithm for Mining Maximal Frequent Itemset

    Mining of frequent itemset plays important role in data mining applications. The algorithms which are used to generate the frequent patterns must perform efficiently. Because the overall performance of association rule mining based on fast discovery of frequent pattern. Many MFI approaches need to recursively construct many candidates, they also...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2013

    Data Delivery Increment Using CVAR Protocol for Urban VANET

    In vehicular ad hoc network due to high dynamic the data dissemination makes a big issue. Delivery ratio getting low in the road junctions as the vehicles departure into different directions. Existing schemes such as mobile cluster assisted routing for urban VANET has attempted to increase the delivery ratio in...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2013

    Ant Colony Optimization Based Modified AOMDV for Multipath Routing in MANET

    In this paper, modified Ad-hoc On-demand Multipath Distance Vector (AOMDV) for multipath routing using ant colony for Mobile Ad hoc NETworks (MANETs) is presented. For this purpose, Ant-AODV is used for comparison with Ant-AOMDV. The idea behind the working of Ant-AODV and Ant-AOMDV is that the RREQ message packets are...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2013

    POR: Privacy-Preserving On-Demand Routing Scheme to Mitigate Malicious Nodes in Mobile Ad Hoc Networks

    A Mobile Ad hoc NETwork (MANET) is a collection of wireless mobile hosts forming a temporary network without the aid of any centralized administration or standard support services. Providing privacy and security is a critical problem when implementing MANET in an adversarial environment. A malicious node may pose a serious...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2013

    Recovering Host Overloading in Cloud Using Virtual Machines

    Virtualization provides an efficient solution to the objectives of the cloud computing paradigm by facilitating creation of Virtual Machines (VMs) over the underlying physical servers, leading to improved resource utilization and intellection. Virtualization proposes to create a virtual version of a device or a resource likely to virtualize a server,...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2013

    QoS Based Vertical Handoff Algorithm for Next Generation of Wireless Network

    In this paper the authors present the different issue of vertical handoffs in heterogeneous wireless networks. The uses of wireless communications are popular and increasing its demand over worldwide. In the world everyone likes to be connected seamlessly any time any where through the best network and good service. The...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2013

    A Taxonomy and Survey of Scheduling Algorithms in Cloud: Based on Task Dependency

    Cloud computing has made the dream of scalability of resources on demand come true. As the usage of the resources on the cloud involves cost, their optimal utilization is vital. Various scheduling algorithms are being designed and implemented seamlessly to achieve this goal. One of the factors that have a...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2013

    Software Design Pattern & Mining Approach - A Novel Query Search Analysis to Identify Relevant Information

    Design pattern is a reusable module to improve the problem and defines solution among all those methods techniques & algorithms to choose the best one then applies for their requirement. When designing a system or end product usually need to control how an object is used and prevent users from...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2013

    Network Security Issues in Context of RSNA and Firewall

    Wireless LAN deployments should be made as secure as possible. Network security is a major issue in wired and wireless network. Wireless network is more vulnerable to attack. Vulnerability is the threat to the network in the form of virus or the way used by attacker in order to breach...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2013

    Intrusion Detection in MANET Using Neural Networks and ZSBT

    Mobile ad-hoc network is a collection of mobile nodes that organize themselves into a network without any predefined infrastructure. The characteristics of MANET are dynamic topology; bandwidth and energy constrained and limited physical security. Due to the dynamic nature of the network, these networks can be easily vulnerable to attacks....

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2013

    A Comparative Analysis of Different Categorical Data Clustering Ensemble Methods in Data Mining

    Over the past decades, a prevalent amount of work has been done in the data clustering research under the unsupervised learning technique in data mining. Moreover a myriad of algorithms and methods has been proposed focusing on clustering different data types, representation of cluster models, and accuracy rates of the...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Load Balancing in Distributed Systems Using Diffusion Technique

    The purpose of load balancing algorithm is to distribute the excess load from heavily loaded nodes to under loaded nodes. A new dynamic load balancing algorithm is proposed based on diffusion approach (DDD) for homogeneous systems where the processing capacities of all nodes in the system are equal. The proposed...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Investigations on Multi Pumped Fiber Raman Amplifiers Over WDM in Optical Communication System

    Fiber Raman amplifiers are important component of wavelength division multiplexed fiber-optic communication systems. The number of pumps, determination of powers, wavelengths and pumping schemes are main design criteria to operate these amplifiers. This paper investigates the effect of counter propagating pumping in fiber Raman amplifier. Pumping options like single, two...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Intrusion Detection in Wireless Networks Using FUZZY Neural Networks and Dynamic Context-Aware Role Based Access Control Security (DCARBAC)

    This paper proposes a Dynamic Context Aware Role Based Access Control Security Service Which Provides Multi-Level Authentications and Authorization. This model help the building of Secure Devices efficiently .This security service in a Dynamic Environment uses Fuzzy Logic theory And the DCARBAC to change the Privileges. The System uses the...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Defensive Mechanisms of Selective Forward Attack in Wireless Sensor Networks

    Wireless sensor networks are composed of a large number of sensors and their major challenge is energy consumption in order to prolong the life time of the network. From the security point of view, detecting schemes must be very light to increase the life time of the network. In this...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Fuzzy Controlled Architecture for Performance Tuning of Database Management System

    Database Management Systems deliver higher performance only when they are properly tuned. Database tuning is complicated due to the fact that several conflicting tuning parameters have to be adjusted simultaneously for a variety of workload types and the highly unpredictable traffic patterns. The DataBase Administrator (DBA) has to be an...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    A Secure Money Transaction Scheme (Identification Scheme) Using Elliptic Curves

    Identification protocols have an important role for building secure communications amongst two or more entities over the internet. In this paper, the authors introduce a new identification scheme (or money transaction protocol) based on the elliptic curve Diffie - Hellman problem. They show that their protocol meets the security attributes...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    An Efficient on Demand Load Balancing Routing Protocol for MANETs (EDLBP)

    MANETs are networks capable of communicating in a set of small, low cost, low power sensing devices. A wireless sensor networks is totally based on the limiting factor i.e. energy consumption. A wireless sensor network consists of large number of sensor nodes distributed or scattered in particular network region. MANETs...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Ant Based Algorithm for Load Balancing in Mobile Ad Hoc Networks

    Mobile ad hoc networks are infrastructure-less networks consisting of wireless, possibly mobile nodes which are organized in peer-to-peer and autonomous fashion. Each node is also a router that forwards data packets to its proper destination. A new family of algorithms inspired by Swarm Intelligence has come into existence to provide...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    A Novel Architecture Style: Diffused Cloud for Virtual Computing Lab

    Using Eucalyptus Systems' private cloud solution, an institute can build Virtual Computing Lab (VCL) that can satisfy the requirements of an institute, but it is assumed that infinite computing resources are available on demand thereby eliminating the need for cloud computing users to plan far ahead for provisioning.. However, due...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Artificial Neural Network Based Intrusion Detection System: A Survey

    Detecting unknown or modified attacks is one of the recent challenges in the field of IDS. Anomaly based IDS can play a very important role in this case. In the first part of this paper, the authors will focus on how ANN is recently used to address these issues. Number...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Comparing CORBA and Web-Services in View of a Service Oriented Architecture

    The concept of Service Oriented Architecture revolves around registering services as tasks. These tasks are accomplished collectively by various disparate components seamlessly connected to one another. The task of interlinking these components may be considered amongst the most convoluted and difficult tasks currently faced by software practitioners. This paper attempts...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Mining Association Rule in Classified Data for Course Recommender System in e-Learning

    The ADTree (Alternating Decision Tree) is a supervised classification technique that combines decision trees with the predictive accuracy into a set of classification rules & association rule algorithms are used to show the relationship between data items. Here in this paper the authors combine these two algorithms & apply it...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Combination of Clustering, Classification and Association Rule Based Approach for Course Recommender System in e-Learning

    Data mining also known as Knowledge Discovery in Database is the process of discovering new pattern from large data set. E-learning is the electronically learning & teaching process. Course Recommender System allows one to study the behavior of student regarding the courses. In Course Recommender System in E-learning, the authors...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Introduction of a Triple Prime Symmetric Key Block Cipher

    This paper proposes to put forward an innovative algorithm for symmetric key block cipher named as "Triple Prime Symmetric Key Block Cipher with Variable Key-Spaces (TPSKBCVK)" that employs triple prime integers as private key-spaces of varying lengths to encrypt data files. Principles of modular arithmetic have been elegantly used in...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Optimum Power Utilization in Wireless Sensor Network Using Partition Technique

    the authors Propose Balanced, Localized, Robust, Dynamic state changing and energy efficient spanning tree approaches for Wireless sensor networks which they call Balanced Energy Efficient SPanning Tree with Sleep scheduling (BEESP-SS). In this paper first, they construct the spanning tree based on RNG (Relative Neighborhood Graph) after that they find...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    A Novel Scalable Group Key Management Protocol

    Secure and reliable group communication is an active area of research. The main issue in secure group communication is group dynamics and key management. Group key management brings challenges on scalability for multicast security. Member joining and member leaving from the group is the main challenge in designing secure and...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Design and Reliability Analysis of a Class of Irregular Fault-Tolerant Multistage Interconnection Networks

    Parallel processing can be used to design high performance computing systems. In a parallel computer inter-connecting processors and linking them efficiently to the memory modules is not an easy task. Therefore, there is a requirement of an interconnection network that provides the desired connectivity and performance at minimum cost. Multistage...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Usage of Variable Structure Congestion Control Protocol (VCP) in Buffer Overflow Attack Blocker

    In this paper, the authors proposed the usage of "Variable structure congestion control protocol" in network communication to avoid buffer overflow thereby preventing buffer overflow attacks. In general transferring a signal between connected clients are done through "Transmission control protocol" in which only two states are clearly shown i.e. either...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    A Simple Algebraic Model Based Polyalphabetic Substitution Cipher

    Cryptography is considered to be a disciple of science of achieving security by converting sensitive information to an un-interpretable form such that it cannot be interpreted by anyone except the transmitter and intended recipient. An innumerable set of cryptographic schemes persist in which each of it has its own affirmative...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    An Effective Method for Association Rule Mining Based on Transactional Matrix

    Focus of this paper is to present a new method based on transactional matrix for finding association rules more efficiently. Apriori algorithm is one of the classical algorithms for finding association rules, but it has limitations of number of times database scanned is too large and number of candidate item...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Content Based Image Retrieval Using Wavelet Based Multi-Resolution Analysis

    Content Based Image Retrieval (CBIR) is an emerging area of engineering application focusing on algorithms and methods to extract image features from a query image and retrieve similar images from large archives. It has found extensive application in medical imaging for both retrieval and automatic archiving. In this paper it...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Audio Encryption in Handsets

    A novel method to encrypt audio (sound) stream of data by applying chaos is discussed. A pair of one-dimensional logistic maps is used for generating a chaotic sequence. The routine tests of encryption are performed and the results are observed. The proposed scheme is then implemented in real time on...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Online Financial Algorithms: Competitive Analysis

    Analysis of algorithms with complete knowledge of its inputs is sometimes not up to the authors' expectations. Many times they are surrounded with such scenarios where inputs are generated without any prior knowledge. Online Algorithms have found their applicability in broad areas of computer engineering. Among these, an online financial...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Performance Evaluation of Audio Codecs Using VoIP Traffic in Wireless LAN using RSVP

    VoIP has become an interesting topic of research in both the internet and the telecommunication industry. The tremendous increase in popularity of VoIP services is a result of huge growth in broadband access. In wired as well as in wireless communication, VoIP is expected to completely replace the traditional telephony...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    DWT and DCT Based Robust Iris Feature Extraction and Recognition Algorithm for Biometric Personal Identification

    Human iris is one of the most reliable biometric because of its uniqueness, stability and noninvasive nature. Thus it has attracted the attention of biometrics based identification and verification research and development community. In this paper, a new approach of iris image feature extraction technique based on the statistical properties...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Auto-Label Threshold Generation for Multiple Relational Classifications Based on SOM Network

    Classification and Association rule mining are two basic tasks of Data Mining. Classification rules mining finds rules that partition the data into disjoint sets. This paper is based on MrCAR (Multi-relational Classification AlgoRithm) and Kohonen's Self-Organizing Maps (SOM) approach. SOM is a class of typical Artificial Neural Networks (ANN) with...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    An Encryption Algorithm for Secure Data Transmission

    Encryption is of prime importance when confidential data is transmitted over the network. Varied encryption algorithms like AES, DES, RC4 and others are available for the same. The most widely accepted algorithm is AES algorithm. The authors have proposed a new algorithm based on the concept used by Rijmen and...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    An Optimized Approach for Selecting an Optimal Number of Cell Site Locations in Cellular Networks

    Wireless communication has seen gigantic advancement all the way through past years. The maturity of newer generations of technology and boost up in user mobility has created the need and demand for wireless networks that has triggered considerable technological advances as well as the investigation of optimization algorithms to support...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Performance Analysis of Controlled Scalability in Unstructured Peer-to-Peer Networks

    In unstructured peer-to-peer networks, the analysis of scalability is a challenging task due to the unpredictable nature of churn rate. Specifically, in the P2P file sharing applications, peers join and leave the overlay network in a dynamic fashion increase the complexity of the network and leads to a huge wastage...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Security Aspects of Cloud Computing

    Cloud Computing is the new buzz word in today' s computing world. Although there is huge buzz, many people are confused as to exactly what cloud computing is, especially as the term can be used to mean almost anything. The paper is categorized in three parts. The first part of...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Fast Content Aware Video Retargeting

    When a video is displayed on a smaller screen than originally intended, some of the information in the video is necessarily lost. In this paper, the authors introduce video retargeting that adapts video to better suit the target display, minimizing the important information lost. They can remove uninteresting part from...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Mechanism for Implementation of Load Balancing Using Process Migration

    The feature of load sharing or load balancing involves migration of running processes from highly loaded workstations of a network to the lightly-loaded or idle workstations of the network. This paper describes load balancing techniques to share the workload of the workstations belonging to a particular network to gain better...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    An Efficient Location Based Reactive Multi-Path Routing Protocol for MANET

    A mobile ad hoc network consists of wireless nodes that move frequently. Movement of nodes results in a change in routes, requiring some mechanism for determining new routes. In this paper, the authors propose an approach to utilize location information to improve performance of routing protocols for ad hoc networks....

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Neural Networks in ERP and CRM

    Enterprise Resource Planning (ERP) is a very popular term nowadays which integrates all the major functions like Finance, Controlling, Production, Selling and Distribution, Personnel, Quality Control, Material management of the concern. ERP is applicable both in big and medium size industries. CRM mainly concentrates to satisfy the consumers at a...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    New Clustering Algorithm for Vector Quantization Using Walsh Sequence

    In this paper, the authors present an effective clustering algorithm to generate codebook for Vector Quantization (VQ). Constant error is added every time to split the clusters in LBG, resulting in formation of cluster in one direction which is 1350 in 2- dimensional case. Because of this reason clustering is...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Multi Criteria Decision Making Approach for Selecting Effort Estimation Model

    Effort Estimation has always been a challenging task for the Project managers. Many researchers have tried to help them by creating different types of models. This has been already proved that none is successful for all types of projects and every type of environment. Analytic Hierarchy Process (AHP) has been...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    A Review of Financial Accounting Fraud Detection Based on Data Mining Techniques

    With an upsurge in financial accounting fraud in the current economic scenario experienced, Financial Accounting Fraud Detection (FAFD) has become an emerging topic of great importance for academic, research and industries. The failure of internal auditing system of the organization in identifying the accounting frauds has lead to use of...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    A Comparative Study of Association Rule Algorithms for Course Recommender System in E-learning

    A course Recommender System plays an important role in predicting the course selection by student. Here the authors consider the real data from Moodle course of their college & they try to obtain the result using Weka. Association rule algorithms are used to find out the best combination of courses...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Ontology Based Information Retrieval: A Case Study for Sports and Eminent Personalities Domain

    The objective of this paper is to develop software framework to improve information creation, maintenance and retrieval by introducing semantic technologies. This paper analyzes the drawbacks of traditional keyword based search engines and proposes the need for semantic based intelligent information retrieval systems. It also analyzes technologies specified by W3C,...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    AES Keys and Round Functions for Data Security

    Security is a basic requirement of an organization in the world to keep their information secure from their competitors. AES is the most recent algorithm which includes encryption with the help of reliable keys. It is used to protect the data including banking, financial, and government information. In this paper,...

    Provided By International Journal of Computer Applications