International Journal of Computer Applications

Displaying 561-600 of 5614 results

  • White Papers // Jul 2014

    Implementation and Evaluation of mpiBLAST-PIO on HPC Cluster

    Due to exponential growth in the size of genomic databases, traditional techniques of sequence search proved to be slow. To address the above problem, an open source and parallel version of BLAST called mpiBLAST was developed by the programmers. In mpiBLAST, the master process distributes the database fragments among worker...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Assessment of Different Attacks and Security Schemes in Vehicular Ad-hoc Network

    The concept of Vehicular Ad hoc NETwork (VANETs) is incorporating data sharing capability and wireless communication. The vehicles are turned in network which provides services that ones used to in offices or homes. VANETs are distinguished from other kinds of ad hoc networks by their hybrid network architectures, node association...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    A Simulated Annealing approach for solving Minimum Manhattan Network Problem

    In this paper, the authors have developed a metaheuristic technique namely simulated annealing for solving the MMN problem. They have also developed several benchmark data sets. With these they have reported their findings and results. In this paper, they address the Minimum Manhattan Network (MMN) problem. It is an important...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Design and Analysis of Distributed Embedded Systems using AADL - Application to the Precision Time Protocol

    Prototyping distributed embedded system can be seen as a collection of many requirements covering many domains. System designers and developers need to describe both functional and non-functional requirements. Building distributed systems is a very tedious task since the application has to be verifiable and analyzable. Architecture Analysis and Design Language...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Web Solution using More Secure Apache HTTP Server with the Concept of Full Virtualization

    Virtualization is the concepts by which the authors can easily run the multiple virtual machines on a single physical machine by sharing the resources. By using the concept of virtualization the \"Unsigned\" memory which is waste also utilize. If they are not having the different machines so they can easily...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Comparison of Web Service Similarity- Assessment Methods

    Due to the advent of service oriented architecture, web services have gained popularity. The need for efficient web service discovery increases because of the enormous growth of the web services. This paper is to addresses the challenge of automated web service discovery and service similarity assessment. It utilizes the WordNet...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Executing Joins Dynamically in Distributed Database System Query Optimizer

    In order to join two sub queries involving data from multiple sites data has to be transmitted from one site to other. While transmitting the data within a network, the factors involved in distributed databases is communication cost and amount of data transmitted. To minimize these factors, join operation is...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Study on Improvisation of Response Time: Impact of Various Parameters in a Cloud-Computing Environment

    Cloud computing has become a key component as well as a measure of success for various organizations today. Apart from benefits obtained, it is important to take into account the location of user-base and data-center, which is essential for performance and security reasons, since the location of data-center and user-base...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Maximizing Lifetime of Heterogeneous Wireless Sensor Network using Heed Protocol

    Wireless Sensor Network (WSN) has significant role in daily life. Many routing protocols have been proposed in recent advances, based on heterogeneity. Achieving the lifetime, deployment of nodes, fault tolerance, and energy efficiency are the main research goals. In this paper, the authors have proposed Hybrid Energy Efficient Distributed protocol...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Hybrid Particle Swarm Optimization (HPSO) for Data Clustering

    Data mining is the collection of different techniques. Clustering information into various clusters is one of the data mining techniques. It is a method, in which each cluster must contain more similar data and have much dissimilarity between inter cluster data. Most of traditional clustering algorithms have disadvantages like initial...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Performance Analysis of LTE and IEEE 802.16 WiMAX in terms of Attenuation and BER via MATLAB: Scenario based ROF Amalgamation as Backhaul Technology

    The possibilities for fiber optics are nearly endless because they are flexible under extreme conditions and the signal do not distort easily. Wireless technology has introduced high speed internet accessibility through wireless broadband. Radio over fiber; the integration of microwave and optical networks is the potential solution for reducing cost...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Trend Projection using Predictive Analytics

    With the growing use of social media networks, trends are being discussed and talked about everywhere. Trend analysis is a skeletal mapping of expected changes or activities occurring in the societies, markets, organizations and the consumers who drive them. Past trends and patterns in the data can be studied and...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Proposing of Collisions Free and Secure Network for IEEE 802.11 WLAN

    IEEE 802.11 wireless network contains various problems such as packets delay and drop because of collision due to the heavy traffic. Packets are dropped either by the buffer overflow or by the MAC layer contentions. Such packet losses decrease throughput. Packet delay is also a result of poor utilization of...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Modification of View Field in Wireless Multimedia Sensor Networks

    Numerous micro-devices are interconnected in Wireless Multimedia Sensor Networks (WMSNs), such as surveillance. While due to view field of these multimedia sensors is oriented, blind spots caused by an occlusion is unavoidable, which will impact on surveillance service quality. For reducing this affection and figuring out a real sensing area,...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Implementation of Hybrid Algorithm for Mobility and Routing Issues in MANET

    In this paper, the problem of dynamic multicast routing in mobile ad hoc networks is investigated. Dynamic multicast routing has become a major issue in Manet. Mobile Ad hoc NETworks (MANETs) are collection of wireless mobile nodes, thus connectivity is an issue in this network. Moreover it, the network topology...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    A Performance based Transaction Reduction Algorithm for Discovering Frequent Patterns

    Association rules are the main technique to determine the frequent item set in data mining. When a large number of item sets are processed by the database, it needs to be scanned multiple times. Consecutively, multiple scanning of the database increases the number of rules generation, which then consume more...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Performance Improvement in MIMO-OFDM using BCH Coding and Interleaving

    Advances in wireless communications, such as MIMO and OFDM provide the infrastructure for high spectral efficiency and consequently, high data rate. In this paper, the performance of BCH correcting code is evaluated in comparison with convolutional encoding using interleaved OFDM modulation. The system shows a consistent improvement in BER performance...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Extensive Survey on MIMO Technology using V-BLAST Detection Technique

    Wireless communication using Multiple Input Multiple Output (MIMO) systems increases efficiency for a given total transmits power. Here investigate a novel approach to perform decoding-order optimization in the Vertical Bell Labs lAyered Space-Time (V-BLAST) planning. Allowing for instantaneous transmission of multiple, independently encoded data streams, the V-BLAST transmit-receive method applies...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Performance and Evaluation of Adaptive Dynamic Channel Allocation protocol in Hybrid Multichannel Wireless Mesh Networks

    Today, there are various methods available for increasing the throughput of a multichannel wireless mesh network. These can be either static allocation or dynamic allocation. In this paper, a hybrid multichannel wireless mesh networking architecture is proposed and every mesh node has both static and dynamic interfaces. Static-dynamic Combined Channel...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Implementing a Standard DVB-T System using MATLAB Simulink

    In this paper, the authors describe the simulink implementation of all functional blocks of a standard Digital Video Broadcasting Terrestrial (DVB-T) transmitter and receiver and present the simulation model for DVB-T system according to ETSI EN 300 744 V1.6.1. The implemented model contains all channel coding and modulation building blocks...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Enhancing Data Dynamics and Storage Security for Cloud Computing using Merkle Hash Tree and AES Algorithms

    With increase in the number of cloud users and the amount of sensitive data on cloud, security of cloud has become more important. Massively scalable data centers are provided by the cloud which can be accessed from anywhere and at anytime. Cloud computing allows users to store data and access...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Agile Software Development in Global Software Engineering

    Global software development is the emerging trend in today's industry. The software development industry is investigating the use of agile development methodologies in distributed environment due to its benefits of better communication and coordination, improved productivity and quality. However research has shown that implementing agile practices in global software development...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Performance Enhancement in Routing using Leach and SAR Protocol

    Wireless sensor network are used to monitor the data and collecting the information. Nodes in network sense the data and collect the data then send it to the base station or the sink. However it requires a high power to send data directly to the sink by all the nodes...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Stochastic Heuristic Optimization based Multi-Query Processing in Wireless Sensor Network using Genetic Algorithm

    Wireless sensor network is an infrastructure comprising of sensing, and computing. The communication elements in sensor network give capability to instrument, watch, and respond to events and phenomenon in a particular situation. Query processing in sensor network first transfers the query generated position to the node where the result obtained...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Review of Classifiers for Automated Opinion Mining

    Opinion mining has been a field of great interest and use as it helps the producers to know about the reviews of the product so as to enhance their sales. At the same time it helps the consumers as well to judge which product suits their requirements and whether the...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Mobile Security: A Literature Review

    In this paper, mobile devices are considered as tablet and cell phones which run a mobile Operating System (OS). More specifically, these are Android (Google), iOS (Apple), or BlackBerry OS (RIM). While it is important to note these terms, this literature review is focused primarily on the Android OS security...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Comparative Analysis of Outlier Detection Techniques

    Data mining simply refers to the extraction of very interesting patterns of the data from the massive data sets. Outlier detection is one of the important aspects of data mining which actually finds out the observations that are deviating from the common expected behavior. Outlier detection and analysis is sometimes...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Cluster Head Selection Protocol using Fuzzy Logic for Wireless Sensor Networks

    Recent trends in field of wireless networks is setting up wireless sensor networks that, senses specified parameter(s) related to environment; processes sensed data and wirelessly communicates it to a base station. Such networks open up a whole new range of applications, including precision agriculture, monitoring and tracking vehicles, animals and...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Comparative Analysis of EH-LEACH with Distinct Angles in a Scalable Network

    Hierarchical routing having cluster based topology is a very propitious approach for improving throughput. Wireless Sensor Networks (WSNs) are distributed networks consisting of sensors deployed randomly to oversee an inaccessible area. Sensors operate on a battery of limited power. The goal of WSN is to improve network lifetime and reliability...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Security System for Vehicle using Number Plate Detection and RFID

    In this paper, vehicle number plate is captured by the camera. And then it compare with the database that is made in the MATLAB. During comparing it uses edge detection and compares pixel to pixel templates that are already define in the program. And after matching the number plate it...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    A Hybrid Algorithm for Association Rule Hiding using Representative Rule

    In the recent years, data mining has emerged as a very popular tool for extracting hidden knowledge from collection of large amount of data. One of the major challenges of data mining is to find the hidden knowledge in the data while the sensitive information is not revealed. Many strategies...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Maintaining Consistency between Caches to Improve Overall Performance in Wireless Sensor Networks

    Wireless Sensor Network (WSN) is an application based network. Wireless sensor network has a wide range of potential, practical and useful applications. Majority of such applications require an optimization to the communication among the sensors, so as to serve data in short latency and with minimal energy consumption. The sensor...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    An Efficient Secure Routing Protocol in MANET Security - Enhanced AODV (SE-AODV)

    A MANET is a collection of independent mobile nodes with self configuring, self administrating features. In MANET initial work for routing was done addressing the path formation between nodes. A network in which any node can join and leave the network, routing protocol addressed for only efficient path formation makes...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    A Survey of Secure Routing Protocols for Wireless Mesh Networks

    Wireless Mesh Network (WMN) is the subsequent pace in the development of wireless architecture which provides wireless internet connectivity in an extensive topographical area. Key advantages of WMNs include simple installation, low cost, self-connectivity of nodes, network flexibility and discovery of newly added nodes. WMN is used to integrate different...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Service based Model using Context Awareness for Ubiquitous Computing

    A semantic network formed relationships and structures for ubiquitous computing which provide mobile services from one node to another. Mobile agents - a kind of ubiquitous computing, entitle service driven architecture with context awareness regardless of the physical interaction and location of users. Based on conceptual service model, context awareness...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Generation of Test Cases from Sliced Sequence Diagram

    UML diagrams are vital design and modeling artifacts. These UML models can also be used to create test cases. In this paper, condition slicing is used and creates test cases from UML sequence diagrams. Test cases can be planned at design level of software development life cycle. But to visualize...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Video Capture Service in the Intelligent Transportation System based on Cloud Computing

    Vehicular networking has significant potential to enable many different applications related to traffic safety and traffic efficiency within intelligent transportation system. In this paper, cloud-based vehicular network architecture is proposed such that the vehicles can share computation resources, storage resources and bandwidth resources. The proposed architecture includes four types of...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Rising up the Performance of Wireless Local Area Network by Varying Fragmentation Threshold using OPNET

    As all can see that the demand of WLAN is increasing gradually, so here it is necessary to improve the performance of WLAN. There are many parameters which can directly affect the performance of WLAN like data rate, modulation scheme, buffer size, RTS threshold etc. One of them is fragmentation...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Application of k-Nearest Neighbour Classification Method for Intrusion Detection in Network Data

    In today's world, increasing number of networks connected to the Internet poses a great challenge on security issues. Many defensive mechanisms exist and one such higher level mechanism is network intrusion detection system. Intrusion detection system is a process of intelligently monitoring the events in an individual system or network,...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    A Novel Technique for Spam Mail Detection using Dendric Cell Algorithm

    Today most of the personal and professional communication is done using the electronic media such as E-mailing, SMS etc. But these all services also suffer from the problem of unwanted messages or the communicating information called spam. The spam message can be an email virus, charity latter, commercial advertisement etc....

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2012

    Defect Prevention Technique Used in Test Case for Quality Improvement

    To produce high quality software both software developers and testers need continuous improvement in their work methodologies and processes. In this paper, the authors develop the test case which drives from use case and applying Defect Classification scheme (ODC) at every test for classifying the defects. For this they conduct...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2012

    ACO Based Clustering Protocol for Resource Constrained Mobile Adhoc Networks

    Mobile Ad-hoc NETworks (MANETs) are increasingly popular with recent advancements in computer and communications technologies. A Mobility-Based Clustering (MBC) protocol for wireless ad hoc network with mobile nodes works well in an energy constrained network environment, where a node elects itself as a cluster-head based on its residual energy and...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2012

    Performance Evaluation of Stable AODV Routing Protocol Under Different Mobility Models

    Mobile Ad hoc Networks are infrastructure less networks. Nodes themselves do routing and forwarding functions. Topology changes due to node movement. Frequent changes in topology leads to more route breaks. This in turn leads to reduction in Packet Delivery Ratio (PDR). It is desired that routing protocols should select stable...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2012

    An Efficient SKM Framework for Data Authentication and Its Application to the Adhoc Networks

    The Internet and various other forms of electronic communication is such an essential thing to move up with this periodic global world and indulging security is another gradient to climb defeating those black hats. One essential aspect for secure communications is that of cryptography. In previous approaches RSA and ECC...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2012

    Quasi-Dynamic Scheduling in Wireless Broadcast Networks

    The broadcasting nature of wireless networks provides an inherent advantage of utilizing the broadcast gain. To improve the efficiency of the network gain associated with multiuser diversity should be optimally exploited simultaneously keeping in mind the problems of wireless networks. One of the most notable problems which the authors have...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2012

    Validation of UML Class Model Through Finite-State Machine

    The Unified Modeling Language (UML) is an independent to programming language which has a collection of modeling tools through which software engineers and researcher represent the complex research problems in the diagrammatic form. The various tools represent the static as well as the dynamic behavior of an object-oriented software system....

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2012

    Antenna Selection in MIMO Cognitive Radio

    Wireless users use Radio Frequency (RF) channels for data and message communication. The recent research reviles that the most appropriate to tackle the issues related to spectrum utilization is a function of time and space calls for dynamic access strategies that adapt to the electromagnetic environment. Cognitive radio is one...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2012

    Halftone Image Watermarking Based on Visual Cryptography

    In this paper, the authors have proposed digital watermarking scheme for halftone images based on visual cryptography scheme. The scheme does not embed the watermark directly on the halftone image instead watermark will be divided into the parts called as shares. The scheme not only protects the watermark but also...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2012

    Avoiding PBP in Network Mobility Handoff Management

    Mobile Computing has become very important in recent years due to increase in the number of mobile devices. The major issue is providing seamless mobility to them. Mobile IP developed by the IETF allows users to move from one network to another network while having a fixed IP address. Applying...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2012

    Economic Denial of Sustainability (EDoS) in Cloud Services Using HTTP and XML Based DDoS Attacks

    Cloud Computing, a new wave in the Internet revolution, transforms the kind of services provided over the Internet. The Cloud Services can be viewed from two perspectives, one as Cloud Service Provider and the other as Cloud Service Consumer. Assurance of security in the Cloud Service is a major challenge...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2012

    Integrated Bayes Network and Hidden Markov Model for Host Based IDS

    Today Internet is more popular for many users and business applications such as banking, social networks, education, entertainment, scientific research, and recently cloud computing. The number of services provided by the internet service providers through Internet is rapidly increasing. For many applications security has become a serious issue for anyone...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2012

    An Accurate Grid -Based PAM Clustering Method for Large Dataset

    Clustering is the procedure to group similar objects together. Several algorithms have been proposed for clustering. Among them, the K-means clustering method has less time complexity. But it is sensitive to extreme values and would cause less accurate clustering of the dataset. However, K-medoids method does not have such limitations....

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2012

    Modeling, Analysis & Implementation of Improved AODV Routing Protocol in MANETs

    Network topology can change quickly and unpredictably in Mobile Ad-hoc NETworks (MANETs), since there may exist a large number of independent ad hoc connections. All the routing protocols use a basic technique of route request transmission i.e. blind flooding which causes a lot of overheads in terms of end to...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2012

    A Novel Approach for Image Encryption by New M Box Encryption Algorithm Using Block Based Transformation Along with Shuffle Operation

    In the present brutal competitive world, security is prime factor to transmit confidential data over the internet. Cryptographic algorithms play very important role in providing the data security against the various attacks. The specific characteristics of image, like high transmission rate with limited bandwidth, correlation among pixels, redundancy and requirement...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2012

    Adaptive SQL Analysis & Refactoring System Model

    In any form of education continuous learning and training plays an important role while knowledge and skills are equally important. In a given domain, an automated system for training skills and active learning is an effective form of learning. This paper presents a system that helps in active learning and...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2012

    DDoS Attack Detection and Attacker Identification

    DDoS attack is a form of DoS attack in which attacker uses authorized user IP address to attack on a particular victim. Of the two types of attack it falls in the active category. The main aim of the attacker is to jam the resources in order to deny services...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2012

    Symmetric Key Cryptography Using Two-Way Updated -Generalized Vernam Cipher Method: TTSJA Algorithm

    In this paper, the authors have introduced a new updated two-way generalized vernam cipher method called TTSJA. Chatterjee et.al developed a method where they used three independent methods such as MSA, NJJSAA and modified generalized vernam cipher method. Nath et al already developed some symmetric key methods where they have...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2012

    MROSE: To Determine Tool Selection and to Understand Model-Driven Software Evolution

    Growing interest in the model driven approaches has largely increased the number of tools into the model driven development environment. Previous research has shown that the stakeholders often do not use or know all of the tools available in the model evolution environment that they regularly use. The common solution...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2012

    Design of Real Time Data Acquisition with Multi Node Embedded Systems

    This paper is about the application of data acquisition systems in industrial requirements for real time execution of events with industrial process control and automation. Multiple embedded nodes are measuring various industrial parameters to monitor and control industrial process. Data acquired from each node is processed, displayed and sent to...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2012

    Design and Implementation of Embedding Web Server for Real Time Data Acquisition and Logging System

    Real time data acquisition and logging system allow real time local and remote data acquisition and logging involve in industrial processes. The application runs in a PC with a web server. The interaction with physical quantities to be measured is performing with specific hardware or PC standard interfaces such as...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2012

    Mining Association Rules from Web Logs by Incorporating Structural Knowledge of Website

    One of the basic problems with the Association Rule discovery is that when Mining Algorithms are applied on Web Access Logs, the total number of generated rules is found to be very large. For finding useful results from these rules, the analyzer needs to look into large rule-set. Moreover, the...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2012

    Securely Web-Based Application for Construction Material Testing

    The main aim of this paper was to develop and evaluate securely web-based application for construction material testing using object-oriented technology and parameterized queries for SQL command queries. The SQL queries for the web application of construction material testing were modified by adjusting their codes which included connection strings, authorization...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2012

    Analysis on Scheduling and Load Balancing Techniques in Wireless Mesh Networks

    The Wireless Mesh Network (WMN) has become the focus of much research since they allow increased network coverage, low cost and easy deployment. WMN includes the Internet GateWays (IGW), mesh routers and mesh clients forming three layer architecture. Throughput and fairness are major issues in WMN as the network needs...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2012

    Enhancement of Routes Performance in MANET Avoiding Tunneling Attack

    MANET consists of spatially distributed autonomous small devices which creates a self connected environment. MANETs are originally motivated by military applications such as border surveillance and battlefield monitoring; today MANET can be used in many civilian applications, including home automation, healthcare, traffic control and habitat/environment monitoring. Basic security services of...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2012

    New Modified 256-Bit MD5 Algorithm with SHA Compression Function

    In the past few years, there have been significant research advances in the analysis of hash functions and it was shown that none of the hash algorithm is secure enough for critical purposes whether it is MD5 or SHA-1. Nowadays scientists have found weaknesses in a number of hash functions,...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2012

    Optimizing the Web Cache Performance by Clustering Based Pre-Fetching Technique Using Modified ART1

    Web caching is a technique which is used to reduce user perceived latency when user is accessing the Web pages. Web pre-fetching is a scheme where Web pages are pre-fetched into the intermediate server (proxy) cache before user accessing it. These two techniques can complement each other since the Web...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2012

    A Survey on Challenges of Integrating Web Service in Cloud Computing

    One of the most emerging techniques now a day is web service. The Web Service (WS) is provided by an international standard called World Wide Web Consortium (W3C). The communication between the systems in the network is enhanced by this service. Cloud Computing (CC) provides better improvement in the functionality...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2012

    Framework for Cloud Computing Platform with a Virtualized Network Infrastructure

    After the development of cloud computing technology and internet, manufacture of cloud computing, which is operated independently by the third party, with high scalability and low energy consumed, become a new network manufacturing mode, this paper starts with the cloud Service models overview, and then the paper discusses the usage...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2012

    Application of Logistic Regression to Predict Over Target Baseline of Software Projects

    Earned Value Analysis (EVA) is a project management technique (Stephan and Mario, 2006). It is one of the most effective performance measurement tools for controlling and managing the development projects. EVAt assists, the project manager to cognize the project status and predicts future performance. The objective of this paper is...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2012

    Processor Co-Allocation Enabling Advanced Reservation of Jobs Using Priorities in MultiCluster Systems

    Grid Computing is intended to provide resource sharing and solve huge amount of complicated problems. In Multicluster Systems, jobs may require co-allocation, that is, the simultaneous allocation of resources such as processors in multiple clusters. Such jobs may have low runtimes because they access more number of resources. In processor...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2012

    Renewed Approach of Integration WLAN & UMTS and Handover

    People all over the world want to stay connected by audio as well as video services.3G provide this facility. WLAN provides better data speeds at lower rates. In a wireless network various multiple access technologies such as wireless LAN and UMTS are used because cellular networks like UMTS provide various...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2012

    Superiority of Blowfish Algorithm in Wireless Networks

    Encryption algorithm plays a crucial role in information security which guarantees the recent growing internet and network applications. They are used to secure the data in wireless networks against malicious attacks but securing data also consumes resources such as C.P.U time, Memory, battery power, encryption time etc. In this paper,...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2012

    A Hybrid System for Multimedia Conferencing on Android Technology

    Communication plays an important role in today's time. Globalization has led the need for crossover communication. Therefore multimedia system plays an important role in the overall communication between regions. Multimedia system provides seamless provision of multimedia services to its user. The conferencing system ensures that voice, video and other media...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2012

    ANFIS Based Spam Filtering Model for Social Networking Websites

    Spam is flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. There are various types of spam such as email spam, forum spam, online classified ads spam, attachment spam, social networking spam...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2012

    Location Manager Based Handover Method for LEO Satellite Networks

    Low Earth Orbit (LEO) satellite made a great impact to the scientists towards the end of the previous decade because of its some interesting features such as low propagation delay, low power requirements and the ability to communicate with handheld terminals. That's why future satellite networks are now conceived as...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2012

    Performance Analysis of IEEE 802.3 Using IGRP and EIGRP Routing Protocols

    With the growing need to distribute applications across multiple networks and the availability of high capacity, high-performance intermediate switching nodes and networks, an efficient routing mechanism has become the core requirement. This paper compares the performance of intra-domain routing protocols such as Enhanced Interior Gateway Protocol (EIGRP) and Interior Gateway...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2012

    Decentralized Principles: New Modular Software Development Principles, a Robust Object Oriented Approach

    Modularity as an object oriented principle helps to develop appropriate large-scale and complex software. But modularity has some deficits such as modular decomposition etc., which is not allowed widely using modularity in software development in current years. In this paper some principles have been provided for increase modularity of software...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2012

    A Flexible Tool for Discovery and Selection of Sensor Web Registry Services with Extended SOA Framework

    Sensor Web Services are recently emerged as promising technology and have potential usage in a wide range of application domain. However due to advancement of OGC SWE standard, the discovery and selection of Sensor Web Registry services throughout heterogeneous environment become a challenging task. Many approaches and frameworks have been...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2012

    Energy Efficient Finite Range Query Scheme for Detecting Mobile Adversary Replica Nodes in Wireless Sensor Networks

    With the growing demand in Wireless Sensor Network (WSN), adversary attack on sensor node becomes major issue in current WSN deployment. The replica nodes which are generated by attackers receive the valuable information from the network in turn sends to the adversaries and at the same time transmits inappropriate message...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2012

    New Paradigm for Software Reliability Estimation

    In common parlance, the traditional software reliability estimation methods often rely on assumptions like statistical distributions that are often dubious and unrealistic. This paper analyzes the assumptions of traditional reliability estimation methods and further evaluates the practical viability of the predictions offered by these models in the current scenario. The...

    Provided By International Journal of Computer Applications