International Journal of Computer Applications

Displaying 441-480 of 3909 results

  • White Papers // Sep 2013

    An Accurate Revelation of the Similarity Between Clusters

    The structure of the data set playing a vital role in data mining. In concept of data mining information recovery and pattern identification nothing but data clustering. There are multiple clustering algorithms have been commenced to clustering categorical data. Unfortunately these algorithms created an incomplete information. In recent times cluster...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2013

    Spammer Detection by Extracting Message Parameters from Spam Emails

    Traditional and present methods to detect spam emails have been working quite well but they take no measures to detect and occlude the malicious actions of the spammers. In this paper, a combination of certain parameters of an email is considered to cluster legit emails and spam emails. Initially, this...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2013

    Analysis of Detection of Multiple Attackers in Wireless Networks

    Wireless networks are usually deployed in hostile environment where an adversary can masquerade some internal nodes which may launch various inside attacks which may leads to reduction in network performance. Although the identity of a node can be verified through cryptographic authentication, conventional security approaches are not always desirable because...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2013

    Improvising Performance with Security of AODV Routing Protocol for MANETs

    Networks are used in different fields. Its popularity has motivated the emergence of Mobile Ad-hoc NETworks (MANETs). A mobile Ad-hoc network is a decentralized wireless system which forms a fast changing network. Because of its dynamic nature and changing topology as well as wireless nature, MANET is a growing dynamic...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2013

    Design and Development of a Novel Algorithm for Search on Encrypted File

    In this paper, the authors concerned with the study and analysis of computer security, encryption methods in order to provide an effective security system through search on encrypted file. Everyone has secrets and some have more than others. Each and every one wanted to have their data and information to...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2013

    Association Rule Mining Algorithm's Variant Analysis

    Association rule mining is a vital technique of data mining which is of great use and importance. For Association Rule mining various new techniques have been developed but concept for the newly developed algorithms remains the same. These recent developments are basically modifications to previous ones which introduce some minute...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2013

    Mining Functional Dependency in Relational Databases Using FUN and Dep-Miner: A Comparative Study

    Database is a collection of tables of data items, if the database is organized according to relational model it is called relational database. In a relational database, a logical and efficient design is just as critical. A poorly designed database may provide erroneous information, or may even fail to work...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2013

    Survey on Intrusion Detection System Using Machine Learning Techniques

    In today's world, almost everybody is affluent with computers and network based technology is growing by leaps and bounds. So, network security has become very important, rather an inevitable part of computer system. An Intrusion Detection System (IDS) is designed to detect system attacks and classify system activities into normal...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2013

    Watermark Based Copyright Protection for Relational Database

    As information hiding, the digital watermark techniques have been attracting more interests in both research and industrial fields. Relational database is widely used in many information systems, as a tool for storing and managing a data. Major issue to protect the copyright of relational data. In order to make watermarking...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2013

    LSB Steganography Based on Variable Key Encryption

    In this paper the authors have explored a new dimension in image steganography and propose a deft method for image - secret data - keyword (steg key) based sampling, encryption and embedding the former with a variable bit retrieval function. The keen association of the image, secret data and steg...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2013

    Performance Analysis of TCP in Wireless Network

    TCP is one of core protocols of the internet protocol suite. It has in built mechanism to behave network friendly. Within a connection TCP can guarantees such as in order delivery or reliable data transmission using retransmission techniques. In this paper, the comparison of performance of TCP over the wired...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2013

    Advanced Model of Software Testing Management

    Software testing is the most important phase of the software development life cycle. Software testing is essential to ensure software quality. Software quality very much depends on \"Software Testing\". And \"Software Testing\" is also very much dependent on \"Validation\". To improve the software quality is a great challenge in front...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2013

    A Secure Crypto Based ECG Data Communication Using Modified SPHIT and Modified Quasigroup Encryption

    In recent years, wireless body area sensor network is one of the important aspects for the development of the healthcare applications. But, it has several issues based on the security and authentication during the transmission of the data. Because of the influence of the hackers, more importance is been given...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2013

    Performance Observation of Distinct Routing Protocols Under IPV6 Environment

    In a Mobile Ad hoc NETwork (MANET), the topology of the network may change rapidly and unexpectedly due to mobility of nodes. Routing protocols operate differently under distinct environments. Thus, it is necessary to analyze the behavior of different routing protocols under distinct environments. Thus, setting up routes that meet...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2013

    Service Oriented Architecture for Remote Sensing Satellite Telemetry Data Implemented on Grid Computing

    Remote sensing satellite TM data has been implemented on the cloud computing in the authors' previous paper and in this paper they will implement it on the grid computing, hence, comparative study will be done with cloud computing implementation to show the value of the research. This paper illustrates how...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2013

    Scalability in Vertical Handoff for Wi-Fi and Bluetooth Networks

    Vertical handoff techniques deal with the scenario in which the mobile node can move between different network access technologies. This paper represents vertical handoff between Wi-Fi and Bluetooth wireless network. When mobile node travels from one network to other network or from one place to other place it require battery...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2013

    Exploitation of Server Log Files of User Behavior in Order to Inform Administrator

    All requests that are send to website server are stored in a file called server file log, all pages users observe or all user's requests to the Server are stored in that file. In this paper, the authors are going to investigate the user's behavior by web usage mining through...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2013

    Detection of Phishing Emails Using Feed Forward Neural Network

    Phishing emails are messages designed to fool the recipient into handing over personal information, such as login names, passwords, credit card numbers, account credentials, social security numbers etc. Fraudulent emails harm their victims through loss of funds and identity theft. They also hurt Internet business, because people lose their trust...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2013

    Embedding Linux With Ability to Analyze Network Traffic on a Development Board Based on FPGA

    In recent years, there has been an increased usage of embedded systems in different areas such as automation, telecommunications and medicine. These systems are widely used in these areas due to their portability, low cost and excellent performance. For embedded systems that require hardware and software integration, the system designer...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2013

    Novel Method of Apriori Algorithm Using Top Down Approach

    Association rule mining is one of the important and most popular data mining techniques. It extracts interesting correlations, frequent patterns and associations among sets of items in the transaction databases or other data repositories. Apriori algorithm is an influential algorithm for mining frequent itemsets for Boolean association rules. Firstly, the...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2013

    Vehicle Detector Method for Complex Environments on Embedded Linux Platform

    Traffic surveillance and investigation is important to increase the safety on roads. Vehicle detection and tracking in road surveillance is classical task in computer vision and critical component in modern traffic monitoring system. Intelligent Transport System (ITS) brings advanced computing, sensing and telecommunication technologies to transport related problems. Many traffic...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2013

    Design and Implementation of Microcode Based Built-In Self-Test for Fault Detection in Memory and Its Repair

    Memories are the most dominating blocks present on a chip. All types of chips contain embedded memories such as a ROM, SRAM, DRAM, and flash memory. Testing of these memories is a very tedious and challenging job as area over head, testing time and cost of the test play an...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2013

    Impacts of Data Mining on Relational Database Management System Centric Business Environments

    The aim of this research is to discover and analyze the crucial impacts of Data Mining (DM) on Relational DataBase Management System (RDBMS) centric business domains. The theme is to clarify the situation of having rich set of data in relational repository with the advancement of storage capacity but no...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2013

    Mobile Ad-Hoc Network (MANET): Security Issues Regarding Attacks

    In this paper, the authors discuss the mobile ad hoc network: security issues regarding attacks. Owe to the vulnerable nature of the mobile ad hoc network, there are numerous security threats that disturb the development of it. In the history of communication, the present time period has advent the mobile...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2013

    Link Based Cluster Ensemble Framework - Clustering Categorical Data for Internet Security Applications

    In recent years, an increasing number of security threats have brought serious risks to the internet. Internet security is needed for providing protection from internet related threats whose are threatening the availability of the internet, and the privacy of its users. One best solution for providing internet security is to...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2013

    Smart- Store Metadata File Systems by using Semantic R-Tree

    Existing search mechanisms of DHT-based P2P systems allow every individual keyword to be mapped to a set of documents/nodes across the network that contains the keyword. Lookup time and Data traffic is increased. In this design proposes a decentralized semantic-aware metadata organization, called Smart Store, which exploits semantics of files...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2013

    Cloud Computing: Implementing NAS in Directing Digital Images without Local Storage

    Cloud computing provides the facility to access shared resources and common infrastructure, offering services on-demand over the network to perform operations that meet changing business needs. It is a ubiquitous, convenient, network access (storage, applications and services). In this paper, the authors investigate that the photographs can be directly emerged...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2013

    Architectural Framework for Secure Composite Web Services

    The exorbitant growth in the field of web services technology has challenged the web developers, vendors and researchers to design and development a variety of enterprise web applications for diverse organizations. Since, security is considered to be an essential part in the development of web applications, web services security has...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2013

    Cryptanalysis and an Efficient Secure ID-Based Remote User Authentication Scheme Using Smart Card

    Remote User authentication protocol is used for verifying the legitimacy of a remote user over insecure network environments. Recently, many secure ID based remote user authentication scheme using smart card have been proposed in the literature. In 2012, they proposed secure ID based remote user authentication scheme using smart card...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2013

    Authentication Schemes for Open Distributed Network: A Classification

    An authentication protocol is a sequence of message exchanges between entities that either distributes secrets to some of those principals or allows the use of some secret to be recognized. Distributed network, such as sensor and mobile ad hoc networks, must conquer a numerous of security challenges to realize their...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2013

    Comparative Study of Data Mining Tools and Analysis with Unified Data Mining Theory

    Today almost everyone has access to huge amount of data. Several wide spread organizations have their own large data repositories, data warehouses, which are still expanding with queries over data and the need for extraction of most beneficial data pattern and refined knowledge. This necessity is followed by the requirement...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2013

    Java Web Deployment in Cloud Computing

    Cloud Computing is a revolutionary IT field in today's world. Several technologies like java; python provides deployment on clouds using respective tools. In this paper, the web deployment in cloud computing with java and the performance issues of the java deployment on a cloud is discussed. There are several tools...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2013

    Computer Aided Technique for Finger Print Image Enhancement and Minutiae Extraction

    Biometrics is the science and technology of measuring and analyzing biological data of human body, extracting a feature set from the acquired data, and comparing this set against to the template set in the database. Biometric techniques are gaining importance for personal authentication and identification as compared to the traditional...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2013

    An Intellectual Approach for Providing Secure Environment in Real World Web Application

    In recent years, widespread adoption of the internet has resulted in rapid advancement in information technologies. Internet is used by the general population for the purposes such as financial transactions, educational activities and countless other activities. This development of the Internet use has unfortunately been accompanied by a growth of...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2013

    Password Authentication System Using New Intense Secure Algorithm in Mobile and Server in Two Way Communications

    Authentication is a process of determining whether a particular individual should be allowed to access a system or an application. According to Email, the unauthorized people easy to hack other user email Id. Authentication is the first line of defense against compromising confidentiality and integrity Traditional login password may not...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2013

    Mapping Process of Relational Data to OWL Class Instances Using XSLT

    Ontologies are widely used in many domains and evolve as domains change. From the other side, the relational database technology has ensured the best facilities for storing, updating and manipulating the information of problem domain. The authors propose in this paper a transformation process from existing data in relational databases...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2013

    Combined Keyword Search Over Encrypted Cloud Data Providing Security and Confidentiality

    In this paper, the authors propose multi-user searchable encryption with the help of order preserve encryption for providing efficient encrypted data. when proposed these constructions it formally defines the multiuser settings for ranked keyword search by using searchable symmetric encryption and order preserve symmetric encryption. Consider a data owner is...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2013

    Algorithms for Task Consolidation Problem in a Cloud Computing Environment

    Cloud computing has recently emerged as a new paradigm for hosting and delivering services over the Internet. Task consolidation problem in cloud computing systems became an important approach to streamline resource usage which improves energy efficiency. The task consolidation is also known as workload consolidation problem which is the process...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2013

    Efficient and Robust Multimodal Biometric System for Feature Level Fusion (Speech and Signature)

    A Pattern can be characterized by more or less rich & varied pieces of information of different features. The fusion of these different sources of information can provide an opportunity to develop more efficient biometric system which is known as multimodal biometric System. Multimodal biometrics is the combination of two...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2013

    Data Understanding Analysis for Analytical Mining IDS

    With the ephemeral time every information stands a greater risk of being exposed than ever before. System's security is endangered in a blink and intrusion takes place. Keeping this in mind, the effectiveness of various data mining approaches are discussed. Some methods involved in classification and clustering are stated. Analysis...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2013

    Query Processing Performance and Searching Over Encrypted Data by Using an Efficient Algorithm

    Data is the central asset of today's dynamically operating organization and their business. This data is usually stored in database. A major consideration is applied on the security of that data from the unauthorized access and intruders. Data encryption is a strong option for security of data in database and...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2013

    Modeling Flight Software from Architectural Design Patterns

    This paper discusses how Software design patterns are applicable to Flight SoftWare (FSW) domain. The application of design patterns is particularly important in this domain to improve the quality of software and reduce the flight software anomalies which lead to major losses. Generic architectural design patterns for real-time software components...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2013

    A Statistical Process Control to Monitor the Software Quality

    Software is the only man made Omni Present system contributing immensely providing complex and critical services to mankind. It's increasing popularity and usefulness enforces one to measure the software quality. In this paper time domain failure data is applied to Statistical Process Control (SPC) method to monitor the quality of...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2013

    Real Time Resource Allocation Methodology and Quality Based Framework in Cloud Computing

    Cloud computing provides resources and services as per user's demand. User can pay for these services as per their use. Many cloud users can request no. of resources or services simultaneously. So resource allocation should be cost effective, reliable and efficient. There are lots of criteria which should be considered...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2013

    Enhancement of Online Course Development Based on a Public Cloud Computing Infrastructure

    There are several websites which offer a user with several courses. But the current Online Course structure had failed because of several reasons. Firstly the user have to pay, if the server is down user cannot access the website. The major problem was infrastructure and 24/7 support. To overcome the...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2013

    I-2ACK: Preventing Routing Misbehavior in Mobile Ad Hoc Networks

    Mobile Ad-hoc NETwork (MANET) is considered as network without infrastructure where communication between the mobile nodes solely depends on the routing protocols which work on assumption that nodes are fully cooperative. In the presence of misbehaving nodes, most of the routing protocols show dropped performance and in some case whole...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2013

    Issues and Imperatives of Adhoc Networks

    MANET is a self organized, self configurable network having no infrastructure, and in which the mobile nodes move arbitrarily. The mobile nodes can receive and relay packets as a router. Routing is a critical issue and an efficient routing protocol makes the MANET reliable. The provision of Quality of Service...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2013

    Evaluating the Performance of Wireless Network Using OPNET Modeler

    Wireless networks have biggest constraint of limited bandwidth in comparison to wired networks but in spite of this constraint wireless networks are becoming popular day by day on account of their flexibility, mobility as well as inexpensive physical medium (air). This paper aims to simulate wireless local area network. The...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2013

    Environmental Scrutinizing System Based on Soft Computing Technique

    Artificial intelligent techniques are very much needed to design the environmental monitoring systems. These systems must be smart enough so that all the decisions taken by the system must be accurate. Soft Computing (SC) it is a set of computational methods that attempt to determine satisfactory approximate solutions to find...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2013

    Design an Algorithm for Data Compression Using Pentaoctagesimal SNS

    Compression is the science and art of representing the information in a compact form rather than its original or uncompressed form in data storage or transmission. Data compression is storing data in a format that requires less space than usual. Nowadays, data compression is a common requirement in telecommunication industry....

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2013

    A Packet Priority Approach to Mitigate Starvation in Wireless Mesh Network with Multimedia Traffic

    Wireless Mesh Networks (WMN) faces the inherent problem of increased end to end delay over a multiple hop wireless link. The delay becomes more obvious as the number of hops count between the source and destination increases. Experimental results have shown two hop neighbors face starvation when there are one...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2013

    Signal Strength Based Hello Flood Attack Detection and Prevention in Wireless Sensor Networks

    Wireless sensor network is a highly distributed network of small lightweight wireless sensor nodes, deployed in large numbers to monitor the environment or system. These sensor networks have limitations of system resources like battery power, radio range and processing capability. Low processing power and wireless connectivity make such networks vulnerable...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2013

    A Parallel Approach to Combined Association Rule Mining

    Data Mining carried out using traditional methodologies of Support-Confidence framework and Association Rule Mining yield an enormous number of inefficient rules or patterns in a certain amount of time. In this paper, a parallel approach to Combined Mining has been implemented that not only generates rules which are "Actionable" but...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2013

    Bagged SVM Classifier for Software Fault Prediction

    Defective modules in the software pose considerable risk by decreasing customer satisfaction and by increasing the development and maintenance costs. Therefore, in software development life cycle, it is essential to predict defective modules in the early stage so as to improve software developers' ability to identify the defect-prone modules and...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2013

    Data Mining in Education- An Experimental Study

    Data mining first proved to be beneficial to business related fields such as marketing and consumer related service enhancements. Slowly it has made its way toward other fields such as medicine, science, engineering, and education. The focus of this paper is to review several applications of data mining in education...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2013

    Entropy Based Anomaly Detection System to Prevent DDoS Attacks in Cloud

    Cloud Computing is a recent computing model; provides consistent access to wide area distributed resources. It revolutionized the IT world with its services provision infrastructure, less maintenance cost, data and service availability assurance, rapid accessibility and scalability. Grid and Cloud Computing Intrusion Detection System (GCCIDS) detects encrypted node communication and...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2013

    Induced Redundancy Based Lossy Data Compression Algorithm

    A Wireless Sensor Network (WSN) is an increasingly important mechanism for enabling continuous monitoring and sensing of physical variables like temperature, humidity etc. The tiny sensor nodes are powered by low capacity batteries. As the WSNs are usually deployed in remote areas, battery replacement becomes difficult. To minimize the power...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2013

    Job Scheduling in Grid Computing with Cuckoo Optimization Algorithm

    Computational grid is a hardware and software infrastructure that provides dependable, inclusive and credible to other computing capabilities. Grid computing intercommunicated with a set of computational resources on a large scale. Scheduling independent jobs is an important issue in such areas as computational grid. Scheduling is the process of assigning...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2013

    Target Tracking Using Personalized Data Management

    In this paper, personalized data management which is a scheme used to answer queries based on user preferences is suggested to be used for target tracking application in the wireless sensor network. This scheme enables faster recovery by reducing search results according to the type of target and environment. At...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Performance Evaluation of Audio Codecs Using VoIP Traffic in Wireless LAN using RSVP

    VoIP has become an interesting topic of research in both the internet and the telecommunication industry. The tremendous increase in popularity of VoIP services is a result of huge growth in broadband access. In wired as well as in wireless communication, VoIP is expected to completely replace the traditional telephony...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    DWT and DCT Based Robust Iris Feature Extraction and Recognition Algorithm for Biometric Personal Identification

    Human iris is one of the most reliable biometric because of its uniqueness, stability and noninvasive nature. Thus it has attracted the attention of biometrics based identification and verification research and development community. In this paper, a new approach of iris image feature extraction technique based on the statistical properties...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Auto-Label Threshold Generation for Multiple Relational Classifications Based on SOM Network

    Classification and Association rule mining are two basic tasks of Data Mining. Classification rules mining finds rules that partition the data into disjoint sets. This paper is based on MrCAR (Multi-relational Classification AlgoRithm) and Kohonen's Self-Organizing Maps (SOM) approach. SOM is a class of typical Artificial Neural Networks (ANN) with...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    An Encryption Algorithm for Secure Data Transmission

    Encryption is of prime importance when confidential data is transmitted over the network. Varied encryption algorithms like AES, DES, RC4 and others are available for the same. The most widely accepted algorithm is AES algorithm. The authors have proposed a new algorithm based on the concept used by Rijmen and...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    An Optimized Approach for Selecting an Optimal Number of Cell Site Locations in Cellular Networks

    Wireless communication has seen gigantic advancement all the way through past years. The maturity of newer generations of technology and boost up in user mobility has created the need and demand for wireless networks that has triggered considerable technological advances as well as the investigation of optimization algorithms to support...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Performance Analysis of Controlled Scalability in Unstructured Peer-to-Peer Networks

    In unstructured peer-to-peer networks, the analysis of scalability is a challenging task due to the unpredictable nature of churn rate. Specifically, in the P2P file sharing applications, peers join and leave the overlay network in a dynamic fashion increase the complexity of the network and leads to a huge wastage...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Security Aspects of Cloud Computing

    Cloud Computing is the new buzz word in today' s computing world. Although there is huge buzz, many people are confused as to exactly what cloud computing is, especially as the term can be used to mean almost anything. The paper is categorized in three parts. The first part of...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Fast Content Aware Video Retargeting

    When a video is displayed on a smaller screen than originally intended, some of the information in the video is necessarily lost. In this paper, the authors introduce video retargeting that adapts video to better suit the target display, minimizing the important information lost. They can remove uninteresting part from...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Mechanism for Implementation of Load Balancing Using Process Migration

    The feature of load sharing or load balancing involves migration of running processes from highly loaded workstations of a network to the lightly-loaded or idle workstations of the network. This paper describes load balancing techniques to share the workload of the workstations belonging to a particular network to gain better...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    An Efficient Location Based Reactive Multi-Path Routing Protocol for MANET

    A mobile ad hoc network consists of wireless nodes that move frequently. Movement of nodes results in a change in routes, requiring some mechanism for determining new routes. In this paper, the authors propose an approach to utilize location information to improve performance of routing protocols for ad hoc networks....

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Defensive Mechanisms of Selective Forward Attack in Wireless Sensor Networks

    Wireless sensor networks are composed of a large number of sensors and their major challenge is energy consumption in order to prolong the life time of the network. From the security point of view, detecting schemes must be very light to increase the life time of the network. In this...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Fuzzy Controlled Architecture for Performance Tuning of Database Management System

    Database Management Systems deliver higher performance only when they are properly tuned. Database tuning is complicated due to the fact that several conflicting tuning parameters have to be adjusted simultaneously for a variety of workload types and the highly unpredictable traffic patterns. The DataBase Administrator (DBA) has to be an...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    A Secure Money Transaction Scheme (Identification Scheme) Using Elliptic Curves

    Identification protocols have an important role for building secure communications amongst two or more entities over the internet. In this paper, the authors introduce a new identification scheme (or money transaction protocol) based on the elliptic curve Diffie - Hellman problem. They show that their protocol meets the security attributes...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    An Efficient on Demand Load Balancing Routing Protocol for MANETs (EDLBP)

    MANETs are networks capable of communicating in a set of small, low cost, low power sensing devices. A wireless sensor networks is totally based on the limiting factor i.e. energy consumption. A wireless sensor network consists of large number of sensor nodes distributed or scattered in particular network region. MANETs...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Ant Based Algorithm for Load Balancing in Mobile Ad Hoc Networks

    Mobile ad hoc networks are infrastructure-less networks consisting of wireless, possibly mobile nodes which are organized in peer-to-peer and autonomous fashion. Each node is also a router that forwards data packets to its proper destination. A new family of algorithms inspired by Swarm Intelligence has come into existence to provide...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    A Novel Architecture Style: Diffused Cloud for Virtual Computing Lab

    Using Eucalyptus Systems' private cloud solution, an institute can build Virtual Computing Lab (VCL) that can satisfy the requirements of an institute, but it is assumed that infinite computing resources are available on demand thereby eliminating the need for cloud computing users to plan far ahead for provisioning.. However, due...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Artificial Neural Network Based Intrusion Detection System: A Survey

    Detecting unknown or modified attacks is one of the recent challenges in the field of IDS. Anomaly based IDS can play a very important role in this case. In the first part of this paper, the authors will focus on how ANN is recently used to address these issues. Number...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Comparing CORBA and Web-Services in View of a Service Oriented Architecture

    The concept of Service Oriented Architecture revolves around registering services as tasks. These tasks are accomplished collectively by various disparate components seamlessly connected to one another. The task of interlinking these components may be considered amongst the most convoluted and difficult tasks currently faced by software practitioners. This paper attempts...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Mining Association Rule in Classified Data for Course Recommender System in e-Learning

    The ADTree (Alternating Decision Tree) is a supervised classification technique that combines decision trees with the predictive accuracy into a set of classification rules & association rule algorithms are used to show the relationship between data items. Here in this paper the authors combine these two algorithms & apply it...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Combination of Clustering, Classification and Association Rule Based Approach for Course Recommender System in e-Learning

    Data mining also known as Knowledge Discovery in Database is the process of discovering new pattern from large data set. E-learning is the electronically learning & teaching process. Course Recommender System allows one to study the behavior of student regarding the courses. In Course Recommender System in E-learning, the authors...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Image Retrieval Techniques for Color based Images from Large Set of Database

    In content-based image retrieval, interactive systems have attracted a lot of research interest in recent years. Comparatively early systems, which focused on fully automatic strategies, recent approaches have supporting many are concentrated. Assuming that a user is looking for a set of images with similar feature using the query concept...

    Provided By International Journal of Computer Applications