International Journal of Computer Applications

Displaying 481-520 of 6245 results

  • White Papers // Nov 2014

    Mobility Management Across Heterogeneous Access Networks

    To satisfy customer demand for a high mobility services in heterogeneous network; mobile protocol is needed to make intelligent and optimized handover. This paper is a comparative study between mobility management solutions such as (MIPv6, NEMO, FHMIP and MIPv6 integrated with IEEE802.21) in heterogeneous networks to find out which of...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Cross Site Request Forgery: Preventive Measures

    Cross Site Request Forgery (CSRF) is considered as one of top vulnerability in today's web, where an untrusted website can force the user browser to send the unauthorized valid request to the trusted site. Cross Site Request Forgery (CSRF) will let the integrity of the legitimate user. So far many...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Performance Analysis of Multiple Access Techniques for Broadband Power Line Communication System

    Broadband over power lines is the way of providing internet services to customers using high frequency signals integrated in the power wiring. For uplink internet services data signals are modulated and coupled into the overhead power lines. For the downlink data signals are decoupled at the consumer's premises. BPL can...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Decoding of PBCH in LTE

    Based on GSM/EDGE and UMTS/HSPA technologies LTE (Long Term Evolution) is the latest advancement in the cellular technology. LTE is backed by most 3GPP and 3GPP2 service providers and is commonly known as 4G. Designed to meet the needs of high speed data and mass media transport LTE is the...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Modified RSA Digital Signature Scheme for Data Confidentiality

    As the people know that digital signature is an authentication mechanism that enables the creator of a message to attach a code that acts as a signature. This signature guarantees the source authenticity and integrity of a message. Digital signature provides three types of services such as authentication, message integrity...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Advanced Intrusion Detection System with Prevention Capabilities

    Today, with the advent of internet, everyone can do information exchange and resource sharing. Even business organization and government agencies are not behind in this move to reach users for their decision making and for business strategies. But at the same time, with ease of use and availability of various...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    An Approach for Development of Multitenant Application as SaaS Cloud

    Software-as-a-Service (SaaS) is one of the striking features of cloud computing. SaaS has revolutionized the software engineering very significantly. SaaS eliminates the requirement of customers (tenants) to purchase, install and maintenance of infrastructure and software. Customers only have to pay for services provided by SaaS vendors. Multi-tenancy in SaaS application...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Improved Security Levels of WLAN Through DBSPS

    Wireless network plays a vital role in the field of Information and Communication Technology (ICT). Security to the wireless network is a major challenge to the researchers and practitioners. Especially Wireless Local Area Networks (WLANs) are more prone to security threats. This paper introduces a novel technique Double Bio-cryptic Security-aware...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Profiling of Test Cases with Clustering Methodology

    Software testing is an imperative task in software development process. Software testing is used to identify the correctness, completeness and quality of the software product or system. Till date, software testing is considered as a very expensive activity as it takes a lot of testing efforts, time and cost to...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Reversible Data Hiding for Security Applications

    In this paper, the authors discuss about RDH technique in encrypted image. In this paper RDH use single-level-2D-DWT and optimal transfer mechanism. Original image is converted into number to string which is having some numeric values. In the RDH technique a host image is taken and is divided into two...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Biometric Identification Using Electroencephalography

    In this paper, the authors investigate the use of brain activity for person identification. A biometric system is a technological system that uses information about a person. Research on brain signals show that each individual has a unique brain wave pattern. Electroencephalography signals generated by mental tasks are acquired to...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    A Failure Node Detection Based on Discrete Selection in WSNs

    Now-a-days, Wireless Sensor Networks (WSNs) applications are frequently used in various technologies for reducing the cost of manufacturing portable wireless sensor nodes. It trend to deploy the large number of portable wireless sensors in WSNs to increase the Quality of Service (QoS). The QoS is mainly affected by the life...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Sensitive Data Exposure Prevention Using Dynamic Database Security Policy

    Today, the internet has become a 4th necessity for human after air, water and food. The internet is widely used for business. Now-a-days, billions of transactions are done online with the use of different applications. In today's world threats to security is becoming more and more sensitive issue, lots of...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    A System for Green Personal Integrated Mobility: Compensation Engine

    In this paper, the authors present a component of the ongoing research project Integrated Real-time Mobility Assistant (IRMA). The component's name is compensation engine. IRMA is a software system that targets the personal mobility in a near future scenario, based on green, shared and public transports. IRMA handles end-to-end itineraries...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Customer - Management Relationship Service Using Android

    Digital computing plays an important role for the development of the business communication system. Monitoring and tracking the information in various fields is critical and mainly important growth of business application. In this paper, smart marketing is responsible for the well deployed constrains for the business growth. The authors proposed...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    A Survey of Free Space Optical Communication Network Channel Over Optical Fiber Cable Communication

    In the recent past, Free-Space Optical communication (FSO) proved to be an important replacement to radio frequency communication. In optical fiber cable communication, there is a disadvantage that optical fiber gets damaged in a long distance installation. Radio frequency communication also deals with limitations of bandwidth and data rate. In...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Reduction of Handover Latency by Horizontal Distance Measurement Using GPS

    Mobile communication towers are used in many personal and industrial purposes. It provides a continuous connectivity to Mobile Nodes (MN) and permits them to change their connection point from current access point to new base station while needed. Handover has become an essential part in mobile communication system because of...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    K-Nearest Neighbor for Uncertain Data

    The classifications of uncertain data become one of the tedious processes in the data-mining domain. The uncertain data are contains tuples with different data and thus to find similar class of tuples are a complex process. The attributes which have a higher level of uncertainty needs to be treated differently...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    ETL Based Cleaning on Database

    In this paper, the authors analyze the problem of data cleaning and automatically identifying the "Incorrect and inconsistent data" in the dataset. Extraction, Transformation and Loading (ETL) are the different steps for cleaning a data warehouse. Authors have implemented different algorithms like: cleanString, cleanNumber, hit ratio, check data dictionary, check...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Survey on Comparative Analysis of Queries over Historical Time Series

    Most search engine queries are time dependent in retrieving the results. Time series analysis plays an important role in predicting the status of the query, at every time stamp to retrieve efficiently. Studies have shown that different approaches are used for different queries over time series. Generally they are broadly...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Data Relationship Query in Relational DB, NoSQL DB and Graph DB

    Every nation has vast amount of census data and analysis of these data is the value for nation as source citations, correlating and corroborating sources, relevance or findings contradictions. These census data may relate in any form based on family group records, friendship, co-worker and etc. In this paper, the...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Efficient Algorithms for Pattern Mining in Spatiotemporal Data

    Spatio-temporal data is any information relating to space and time. It is continually updated data with 1TB/hr are greatly challenging their ability to digest the data. With that data, it is unable to gain exact information. Data mining models contains many statistical models such as regression models of various kinds,...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    JIBCA: Jaccard Index Based Clustering Algorithm for Mining Online Review

    Sentiment analysis, also known as opinion mining, is the analysis of the feelings (i.e. attitudes, emotions and opinions) behind the words. Sentiment analysis involves classifying the opinions as positive, negative, or neutral. Classification of textual objects in accordance with sentiment is considered to be a more difficult task than classification...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Database Tamper Detection and Analysis

    Database as an enterprise data information aggregation is a core component its security is essential. The data and the metadata when exposed to the outside world may endanger the security of the DBMS. Therefore, securing data and assuring that the database should be accessed by authorized users is necessary. In...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Low Power High Speed 64 Bit SRAM Architecture Using SCCMOS and Drowsy Cache Concept

    With the development of technology with each passing days, the demand for low power, high speed and high density memory for portable devices is increasing proportionally. The power consumption and battery life has become the major concerns for VLSI industry. But as the technology scales down it gives rise to...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    All Optical Reversible NOR Gates using TOAD

    In recent past, reversible logic is emerged as a promising computing paradigm with applications in low-power CMOS, quantum computing, optical computing and nanotechnology. Optical logic gates become potential component to work at macroscopic (light pulses carry information), or quantum (single photon carries information) levels with high efficiency. In this paper,...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Performance Analysis of Different M-ARY Modulation Techniques in Cellular Mobile Communication

    Cellular communication systems are the most widely used wireless communication systems. It is the users' primary need today to achieve the higher data rates in limited spectrum bandwidth to improve the performance of signals. The authors know digital communication system outperforms analog ones in terms of noise performance and flexibility....

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Comparative Analysis of Metastability with D Flip Flop in CMOS Circuits

    The appropriate choice of flip-flop topologies is of essential importance in the design of integrated circuits for CMOS VLSI high-performance and high-speed circuits. The understanding of the suitability of the flip-flops and select the best topology for a given application is important to meet the need of the design to...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Design and Modeling of Schmitt Trigger-Based Sub-Threshold 8T SRAM for Low Power Applications

    In this paper, the authors present the design of schmitt trigger-based 8T SRAM Architecture for low power sub-threshold (or) near-threshold CMOS SRAM for power constrained applications. Power consumption, power dissipation and leakage power are the main factors in the IC design. Memory unit is the primary block in design of...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Mode Enabled Coprocessor for Precision Multipliers

    Multiplication and division are the two elementary operations essential for the core computing process or for the arithmetic operation. These two operations are also the most critical functions carried out by the processors, as the multiplication requires more number of steps for the computation, limiting the overall performance of the...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    A Novel Design of Half and Full Adder Using Basic QCA Gates

    VLSI technology, although has made remarkable progress in the past, this progress may be slowed down in future. This paper presents the novel design of half adder and full adder using reduced number of QCA gates. This design utilizes the unique characteristics of QCA to design a half and a...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    A Novel VLSI Architecture of Multiplier on Radix - 4 using Redundant Binary Technique

    By implementing the existing method of multiplication and accumulation structure in real time applications, occurs some difficulties like some hard multiples, and getting partial products in multiplication stage, it was not useful for higher radix values. The covalent redundant binary booth encoding algorithm overcomes the hard multiple generation problem and...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Low Power ALU Design Considering PVT Variations

    ALU is one of the most important components in a microprocessor that carries out the arithmetic and logical operations. This paper highlights the techniques in designing a low power ALU in nanometer CMOS. Different 10 transistor full adders are compared and chosen the Full adder with least power dissipation to...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Evaluation of Efficient Implementation of Big Data Switch for Iraqi Cellular Phone Service Providers

    Big data is opening up new chance for enterprises to extract insight from large volumes of data in real time and across multiple relational and non-relational data types. It is becoming one of the most important technology directions that have the potential for dramatically changing the way organizations use information...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Design and Analysis of Triple-Band Inverted F-Slot Microstrip Patch Antenna

    Microstrip patch antennas are strong candidates for use in many wireless communications applications. Microstrip patch antennas are also highly preferable for multiband as well as for the WiMAX application. In this paper, a multi-band H-slot microstrip patch antenna for Worldwide interoperability for Microwave Access (WiMAX) is presented. The radiation performance...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Efficient Handwritten Digit Recognition Based on Histogram of Oriented Gradients and SVM

    Automatic Handwritten Digits Recognition (HDR) is the process of interpreting handwritten digits by machines. There are several approaches for handwritten digits recognition. In this paper, the authors have proposed an appearance feature-based approach which process data using Histogram of Oriented Gradients (HOG). HOG is a very efficient feature descriptor for...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Efficiency of Various Approaches for Feature Extraction in Palm Recognition-A Review

    Security plays a very important role in the day-to-day life. In order to avoid unauthorized access by individuals authentication is mandatory in various fields such as industry, government sectors, colleges, online banking, military, etc., The traditional methods such as passwords or ID cards are less secure and forgery is possible....

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Fuzzy Approach for the Synthesis of Mass Exchange Network

    Absorption, stripping, extraction, leaching, adsorption, and ion exchange; all are the indispensable mass exchange operations used in chemical industries. The purpose of Mass-Exchange Networks (MENs) is to use mass (e.g., water) more efficiently, decreasing simultaneously the waste discharged to the environment and the raw material used and thus optimizing the...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Performance Enhancement of Database Driven Technique Using Cynosure Method in Cloud

    Cloud computing is characterized by illusion of infinite computing resources, shared infrastructure, elimination of an up-front commitment by cloud users, ability to pay for use as needed, and secernent its users and operators. These above mentioned characteristics inflict new challenges to database applications entertained in the cloud, some of them...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Sensor Information Management Using Cloud Computing

    Wireless Sensor Network (WSN) and cloud computing are the present day technologies which enable novel and attractive solutions for information gathering and accessing it across the globe. There is a meticulous research going on in the labs and universities on these areas. However, there are obstacles that must be overcome...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2012

    Exploring Competitive Intelligence By Extracting Frequent Pattern of Data Mining in Mobile Computing Environment

    Competitive intelligence is vital part of data mining system in which client server model can invasive with mobile computing for communication now-a-days. This paper explores Competitive intelligence used for data discovery through data mining system. Data is mined from data warehouse based on knowledge discovery for further decision. As knowledge...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    Secured Services in Cloud Computing Environment

    Securing data is always of vital importance and because of the critical nature of cloud computing and large amounts of complex data it carries, the need is even important. Cryptographic algorithms are one of the most important areas in security. They are processes that protect data by making sure that...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    Improvement of Quality of Service (QoS) Over a Wide Area Network (WAN) Using Multiprotocol Label Switching Traffic Engineering (MPLS-TE)

    Bandwidth refers to the amount of data that can be transmitted in a specific time over a wireless or wired medium. It is an important factor that is used to analyze network performance, design new networks, and understand the internet. Multi-Protocol Label Switching (MPLS) originated from tag switching and enables...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    Automated Creating a Data Warehouse from Unstructured Semantic Data

    The use and analysis of unstructured semantic data such as text files, semantic web, and etc which have been included the bulk of the available data sources, such as Internet due to their high volume and the extent of their resources is very complicated and time consuming process. In this...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    Weka: A Tool for Data Preprocessing, Classification, Ensemble, Clustering and Association Rule Mining

    The basic principle of data mining is to analyze the data from different perspectives, classify it and recapitulate it. Data mining has become very popular in each and every application. Though the authors have large amount of data but they don't have useful information in every field. There are many...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    A Survey on Phishing Attacks

    In the last few years, a large number of internet users are increasing additionally different companies, banks and service providers are providing services online. So various sensitive and financial data are becomes online now in these days. This aspect of internet users are an evolution for the users' but the...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    A Survey of Wireless Sensor Networks in Key Management Scheme

    In this paper, the authors present an entire study of Key Management Schemes for wireless sensor networks. Key Management Schemes (KMS) suggested in the literature, it is difficult for a warning network designer to learn exactly that KMS best connects in a certain WSN application. This review, that the KMS...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2013

    An Efficient Intelligent Clustering Tool based on Hybrid Fuzzified Algorithm for Electrical Data

    Fuzzified optimization based data clustering is one of the important data mining tool which is active research of real world problems. This paper proposed Fuzzified Particle Swarm Optimization and K-Harmonic Means algorithm (FPSO+KHM) for clustering the electrical data systems. The partitioned clustering algorithms are more suitable for clustering large datasets....

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2013

    An Innovative Approach to Detect the Gray-Hole Attack in AODV Based MANET

    The wireless arena has been experiencing exponential growth in now-a-days. Wireless devices are now playing an ever-increasingly important role in the people lives. An ad hoc network might consist of several home-computing devices, including notebooks, handheld PCs, and so on. Each node will be able to communicate directly with other...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2013

    Secure Routing Using Clustering Algorithm

    Wireless sensor network are build up of various autonomous sensors which are responsible for monitoring environmental or physical conditions, such as temperature, sound and pressure. And pass their data through the network to the sink node. There are various applications for wireless sensor network, and security is very important for...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2013

    Fuzzy Crime Investigation Framework for Tracking Data Theft Based on USB Storage

    Since the lives of the persons are on the edge after being convicted in digital crimes. The main goal of digital forensics is to extract accurate evidence which determines whether the convict is guilty or not. The recent challenge is due to the big size of data that the investigator...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2013

    Enhanced Bandwidth Utilization in Image Steganography with Enhanced Data Security

    In this paper, a new method is proposed for image steganography that involves double encryption as well as compression of a message followed by its subsequent hiding in a digital image. In the first instance, original data is encrypted using flexible matrix. Further, encrypted data is encrypted and compressed using...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2013

    Sensitive Attributes Based Privacy Preserving in Data Mining Using k-anonymity

    Data mining is the process of extracting interesting patterns or knowledge from huge amount of data. In recent years, there has been a tremendous growth in the amount of personal data that can be collected and analyzed by the organizations. Organizations such as credit card companies, real estate companies and...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2013

    Reliable Data Collection in EWSN Based Wireless Sensor Network

    The recent development in wireless technology, has led to reduce the problems in the day-to-day life. Similarly the wireless sensor technology also emerged as powerful technology. Congestion is the major issue on which many research has been done. Typically in event driven WSN the data that is generated is of...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2013

    Comparative Study of Live Virtual Machine Migration Techniques in Cloud

    Virtualization technology is currently becoming increasingly popular and valuable in cloud computing environments due to the benefits of server consolidation, live migration, and resource isolation. Live virtual machine migration is the process of moving virtual machine from one physical host to other without disturbing the users. Effective migration of virtual...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2013

    Investigation of Multi Band Microstrip Line Fed Antenna Using DGS Technique for WLAN/WiMAX Applications

    Recently, there are rapid developments in wireless communications, and in order to satisfy the IEEE 802.11 WLAN/WiMAX standards, the printed monopole antennas are required. A multiband planar monopole antenna fed by microstrip line feed with Defected Ground Structure (DGS) is presented for simultaneously satisfying Wireless Local Area Network (WLAN) and...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2013

    Performance of AODV, GRP and OLSR Routing Protocols in Adhoc Network with Directional Antennas

    Wireless ad hoc network is a decentralized type of wireless network, it does not rely on a preexisting infrastructure. These types of networks are used in situations where temporary network connectivity is needed. This paper explores the effect of using directional antennas in ad hoc network. Antenna patterns of omni...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2013

    Crime Analysis Using K-Means Clustering

    Data mining in the study and analysis of criminology can be categorized into main areas, crime control and crime suppression. In today's world security is an aspect which is given higher priority by all political and government worldwide and aiming to reduce crime incidence. As data mining is the appropriate...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2013

    NSIS-Based Quality of Service Management in IMS Network

    The next generation network requires a suitable QoS that can increase number of users and revenues. The IMS (IP Multimedia Subsystem) import new taxation strategy flow based and QoS management policy-based. The QoS management poses a competition in terms of limitations of physical resources and the onset of congestion, which...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2013

    Sensor Deployment and Mobile Target Detection in Wireless Sensor Networks

    WSNs are generally composed of small-sized battery-operated devices with embedded sensing and wireless communication capabilities. The authors propose an optimization framework for the problem of positioning sensors where the sensing quality depends on the distance from the sensor node. In their approach, they consider two main objectives: minimizing the number...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2013

    Stochastic Analysis of DSS Queries for a Distributed Database Design

    Optimization of query in distributed database system is one of the dominant subjects in the field of database theory. Depending upon the placement of data a query can be described as centralized or distributed query. The processing of distributed query is entirely different from the centralized query as in the...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2013

    Performance Analysis of MANET Routing Protocols - A Comparative Study

    Efficient routing has always been a matter of concern for Mobile Ad-hoc NETworks (MANETs). While reactive protocols are competing with the performance of proactive protocols, hybrid protocols have attempted to brew the best of the both. This paper reviews some of the selected literature regarding MANET routing protocols and studies...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2013

    An AntNet-Based Load Balancing Algorithm for Grid Computing Environments

    As a result of the rapid growth of computational needs, grid computing is gaining more and more attention. It becomes a viable high-performance alternative to the traditional supercomputing environments. However, grid performance can still be improved by effectively and efficiently utilizing the available grid resources using a good load balancing...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2013

    Schema Level and Data Level Mapping Composition

    Schema mappings and data mappings constitute essential building blocks of data integration, data exchange and peer-to-peer data sharing systems. At present, either schema-level mappings or data-level mappings are used for data sharing purposes. In this paper the authors consider the semantics of bi-level mapping that combines the schema-level and data-level...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2013

    Improving Security Measures on Grid Computing

    The purpose of this paper was to come out with a theoretical framework to standardize the solutions to the existing security challenges. The principal objectives were to contribute to the ongoing research to help improve the security measures on grid computing. Hypervisor security model, host/platform security model, security communication model...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2013

    Provident Routing Scheme Rely on Swarm Astuteness for MANET

    Mobile ad-hoc network dynamically changes its topology and also it doesn't have proper infrastructure. So, it is necessary to provide the route stability. Already several routing methodologies are available for MANET. But those are not take the delay occurs in the network into account. As the topology of the network...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2013

    CPDP Scheme to Provide Data Integrity in Multicloud

    Now-a-days, cloud storage service is a faster profit growth point by providing a position-independent, low -cost platform, comparably scalable for client's data. The construction of cloud computing environment is based on interfaces and open architecture. It has cloud capable to include multiple internal and external cloud services together to provide...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2013

    NAODV-Distributed Packet Dropping Attack Detection in MANETs

    Mobile Ad hoc NETwork (MANET) is a self configuring network in which mobile nodes are connected by wireless link. Communication in MANET is done with the help of cooperation of nodes in the network. Due to its intrinsic properties like dynamic network topology, open medium, and lack of central monitoring...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2013

    Enhanced Management of Certificate Caching and Revocation Lists in VANET

    Vehicular network security is an important field and it is agreed that digital signature certificates are becoming the main authentication technique in this environment. The high number of vehicles and their continuous location change bring some difficulties in the exchange of these certificates and in their revocation. This paper covers...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2013

    C-LAS Relief-An Improved Feature Selection Technique in Data Mining

    Feature selection or feature subset selection is a process of reducing the attribute space in the feature set. It is also stated that feature selection is a technique of identifying a subset of features. These subsets of features are selected by removing irrelevant or redundant features in the feature set....

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2013

    Investigation of Peer Grouping Methods in Peer-to-Peer Computing Networks

    The Peer-To-Peer (P2P) technology provides support to build virtual computing system over the internet which is dedicated for large scale computation problems. In such systems to achieve higher scalability and decentralization participating peers are classified into different groups. In P2P computing systems each peer group is responsible to carry out...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2013

    Intuitive Approach to Use Intelligent Database for Prediction

    The concept of intelligent databases was introduced in 1980's, as expectations from the conventional databases had increased over the time. A database which could manage information on its own was much anticipated. Over the years, there has been significant development and advances in this field. Different approaches of integrating AI/DB...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2014

    Verification IP for Routing Switch Based on Network Layer Protocol, Using SystemVerilog

    Today, in the world of ASICs and System-on-Chip (SoC) designs which consists of millions of transistors and gates, verification is the process which consumes most of design efforts and time. One of the major stresses for the verification engineer is to verify the given design in best possible manner. For...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2014

    Bottle-Necks of Cloud Security- A Survey

    A tremendous necessity has enlarged its domain in security in cloud computing. This paper is a survey more specific to different security issues that are raised in cloud computing environment. However, cloud computing is one of the recent researches immersing trends for hosting and delivering services over the internet. It...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2014

    Intrusion Detection by Forensic Method in Private Cloud using Eucalyptus

    Cloud computing has become the mature term which has dealt from single user to large enterprises. The private cloud platform building framework eucalyptus has great pace of development within short span of time. Achieving AWS (Amazon Web Services) compatible features development along with scalability and sustainability has introduced several issues...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2014

    Security Issues and Their Techniques in DBMS - A Novel Survey

    Now-a-days a database security has become an important issue in technical world. The main objective of database security is to forbid unnecessary information exposure and modification data while ensuring the availability of the needed services. A numbers of security methods have been created for protecting the databases. Many security models...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2014

    Classifier System in Cloud Environment to Detect Denial of Service Attack

    Cloud computing is a modern style of computer services. This system has some of similarities with distributed systems, through using network environment features. Therefore the security is one of most critical issues in this type of environment. Because of vast number of users become connected to the network with times,...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2014

    An Improved Proxy Blind Signature Scheme with Forward Security

    In this paper the authors present a proxy blind signature scheme with forward security mechanism. The proposed digital signature scheme combines the two special-purpose signature schemes, blind signature and proxy signature. In this signature scheme, the original signer gives authority to another entity which is known as a proxy signer,...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2014

    Mining Frequent Sequences for Emails in Cyber Forensics Investigation

    The goal of digital forensics process is to preserve any evidence in its most original form while performing a structured investigation by collecting, identifying and validating the digital information for the investigation of particular digital crime. Today the people are living in the information age, all the information which is...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2014

    Presentation of an Extended Version of the PageRank Algorithm to Rank Web Pages Inspired by Ant Colony Algorithm

    The general search engines represent various results in their lists, which is very time consuming to check. One way to limit the search engine results is to use ranking pages algorithm in web. One of the most important ranking algorithms of web pages in the internet is known as \"PageRank\",...

    Provided By International Journal of Computer Applications