International Journal of Computer Applications

Displaying 561-600 of 6245 results

  • White Papers // Oct 2014

    Cost and Time Evaluation of Load Balancing and Service Broker Strategies in Multiple Data Centers

    Cloud computing is a boon for almost every sector as it reduces the overall expenditure by making IT infrastructure, services and platform on \"On-demand\" basis. The \"Pay-as-you-go\" policy of cloud technology enables the users to use and pay for the services and computing infrastructure only when they need it without...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Fuzzy Based Effort Estimation Approach

    Besides of these there are many equation based effort estimation techniques like Halstead model, Bailey-Basil model, and Walston-Felix model. Cost and effort estimation are the major concern of any software industry. They are identified with the help of Kilo Line COde (KLOC) which denotes number of, line of code in...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Visual Secret Sharing Between Remote Participants

    Visual cryptography and random grids are forms of visual secret sharing that encrypt a secret image into indecipherable shares. Decryption occurs by printing them onto transparencies and stacking, but this requires participants to be in the physical presence of each other, so this paper addresses the use of visual secret...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Minimum Spanning Tree Based Improved Routing Protocol for Heterogeneous Wireless Sensor Network

    Performing multiple tasks like data aggregation, processing and communication to other Sensor Nodes (SNs) or Base Station (BS) is a very attractive and effective attribute carried out by Wireless Sensor Networks (WSNs). As SNs have limited energy resources, storage capabilities and processing, the network layer protocol has therefore to guarantee...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Application of Feature Selection Methods in Educational Data Mining

    In the recent years, web based learning has emerged as a new field of research due to growth of network and communication technology. These learning systems generate a large volume of student data. Data mining algorithms may be applied on this data set to study interesting patterns. As an example,...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    RUCM: A Measurement Model for Detecting the Most Suitable Code Component From Object Oriented Repository

    Software quality based applications development is the main concern is user satisfaction. It increases the reliability and efficiency of information retrieval and management. As the bundle of code created day-by-day the repository storing such code is regularly migrates the older code in to legacy systems. To develop and facilitate new...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    A Stream Based Implementation of Secured SOA Model Using XML Encryption and XML Signature

    Web service security is essential for SOA-based applications; it has explorative set of technologies such as Simple Object Access Protocol (SOAP), Web Services Description Language (WSDL) and Universal Description, Discovery and Integration (UDDI), and electronic business XML (ebXML). These promote an environment for organizations to communicate in Internet. The inevitable...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Advanced Feedback Encryption Standard Version-1 (AFES-1)

    In this paper, Advanced Feedback Encryption Standard version 1 (AFES-1), the researcher have combined both bit-level and byte level operations on the plain text. The researcher had recently published Multi Way Feedback Encryption Standard version 3 (MWFES-3). MWFES-3 is a byte level encryption algorithm. The authors have capitalized on the...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    A Novel Framework for Cloud Security Against Data Breach

    Cloud computing is the most emerging technology now-a-days. Every internet user accessing cloud services either directly or indirectly without knowing or aware of security aspects because of trust between the user and the cloud service provider. But, this trust is harmed by the malicious user or hacker by breaching the...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Performance Comparison of Diversity Techniques in MIMO Wireless Communication

    The goal for next generation of mobile communication system is to perfectly consistent integrate a broad variety of communication services like high-speed data, video and voice signals, multimedia traffic. In the paper, the authors have analyzed various diversity techniques to find out the optimum scheme for use. Diversity is a...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Comparison of Energy Detection Methods in Cognitive Radio Networks

    Cognitive Radio (CR) is used in mobile communication to make devices and networks better adaptable to changes in environmental parameters such as frequency allocation and regulation. Cognitive Radio (CR) is an emerging new paradigm in wireless communications. Its goal is to make frequency use more efficient by using temporarily unoccupied...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    A Clustering Algorithm in Complex Social Networks

    Complex networks are real graphs (networks) with non-trivial topological features. The empirical study of real-world networks like computer networks and social networks gives insights into the structures and properties of such networks. Identification of community structure is one of the important problems in social networks. Tightly knit group of nodes...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Performance Evaluation of Transport Layer in Cognitive Radio Ad-Hoc Networks

    In this paper, the authors have proposed some changes to MAC protocol for improving the performance of transport layer in cognitive radio ad-hoc networks. They have studied effects of different MAC and routing protocols on TCP in cognitive radio technology enabled environments. They have reviewed performance of TCP in two...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Tree Based Key Generation and Distribution Scheme in WSN

    Wireless sensor network is become more popular because of its various applications in day-to-day life. Communication security is one of the most important challenges in wireless sensor network. Key generation and distribution are also important in wireless sensor network, so the authors have effective security mechanism for that. Tree based...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Risk Involved in Cloud Data Storage and Its Safety Measures

    Cloud computing is a technology which will facilitate companies or organization to host their services without worrying about IT infrastructure and other supporting services. Usually cloud computing services are delivered by a third party - Cloud Service Provider (CSP) provider who owns the infrastructure. Cloud computing offers an innovative business...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    An Integrated IP-MPLS Architecture for Next Generation Networks

    Next Generation Networks (NGN) is a strategy to achieve the vision of next-generation services for the delivery of quad play data, voice and video anywhere and anytime virtually across any access technology. It integrates the services of 2G/3G/4G networks including IPv4 and IPv6 and incorporates the services of traditional networks...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    A Novel Technique to Improve the Performance of Wireless Sensor Network Using Adaptive Antennas and High-Altitude Platform Communications

    In this paper, the performance of Wireless Sensor Networks (WSN) is improved using adaptive antenna technique and High-Altitude Platforms systems (HAP). An Adaptive Concentric Circular Array (ACCA) is proposed to improve the communications link between sink and sensor nodes. The system is first demonstrated for several scenarios including different cell...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    An Ontology Based Context-Aware Application

    Today, users want to communicate with their smart devices just like the way they want to do with their friends. Just as a friend knows about favorite dish, place to hang out, bank in which the user friends hold an account. The paper gives information about context-aware recommender application with...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    A Novel Approach for Mining Trajectory Patterns of Moving Vehicles

    With the advances in location-acquisition technologies such as Global Positioning System (GPS), Global System for Mobile communications (GSM) etc, increasing amounts of movement data collected from various moving objects such as animals, vehicles, mobile devices, and climate radars have become widely available. Turning a collection of time-geography data into mobility...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    A Simple Approach to SQL Joins in a Relational Algebraic Notation

    Join is an operation in accessing the data from table if number of tables exceeds one. Whenever, the authors need the data which is not available from a single table, then it needs to necessitate using join operation. Sometimes join is required even if there is a single table. It...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Finding Optimal Configuration of DSDV Using Particle Swarm Optimization

    Vehicular Ad-hoc NETwork (VANET) is prominent research area in Mobile Ad-hoc NETwork (MANET). VANET are very dynamic in nature as it has no predefined structure for communication. The performance of VANET dependents on parameter configuration of the protocol used in. The optimal parameter configuration in protocol can improve the QoS...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Mathematical Modelling of Joint Routing and Scheduling for an Effective Load Balancing in Cloud

    Due to the increasing adoption of the cloud in majority of the business, the level of traffic intensity is increasing leading to a challenging situation for traffic management in cloud. There were various algorithms in past that has discussed about the load balancing techniques concerning the cloud environment, but very...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    BER Performance of OFDM with GI in SISO and MIMO System

    To overcome a multipath fading environment with low complexity and to achieve wireless broadband multimedia communication systems, Orthogonal Frequency Division Multiplexing (OFDM) transmission scheme is used. OFDM is one of the applications of a parallel data transmission scheme, which reduces the influence of multipath fading. The performance of OFDM can...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Analysis of DAC MAC RBAC Access Control Based Models for Security

    Access control is the process or mechanism for giving the authority to access the specific resources, applications and system. Access control defines a set of conditions or criteria to access the system and its resources. There are three main accesses control model first is mandatory access control model, second is...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    DH-EAACK Secure Intrusion Detection System to Detect Black Hole Attack in MANET

    Mobile Ad-hoc NETworks (MANETs) type of Ad-hoc wireless network. Due to mobility of nodes, MANET more vulnerable to different types of attacks and security threats. To overcome these challenges Intrusion Detection System (IDS) technique used. By using the schemes of EAACK, this paper proposed dynamic hierarchical intrusion detection architecture that...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    A Lightweight Technique to Prevent Wormhole Attacks in AODV

    Mobile Ad hoc NETwork (MANET) is vulnerable to many types of routing attacks due to its dynamic topology and the collaboration of MANET nodes in finding routing paths. The wormhole attack is considered one of the most threatening attacks. The most popular MANET routing protocols such as Ad-hoc On-demand Distance...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Analyzing and Displaying of Crime Hotspots using Fuzzy Mapping Method

    The clusters are groups of similar data and the degree of relationship is strong between data members of the same cluster and weak between data members of different clusters. Pattern detection is one of the essential challenges in crime mapping and analysis. Data mining can be used to explore crime...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Securing Wireless Sensor Network from Denial of Sleep Attack by Isolating Nodes

    The Wireless Sensor Network (WSN) has gained advancement in new era technology. Beside a small size, sensors have the feature of sensing and collecting the data and small and are used in many areas ranging from detecting temperature to providing security for the home. Other than these, sensors are also...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Message Privacy with Load Balancing Using Attribute Based Encryption

    The notion of Attribute-Based Encryption (ABE) was proposed as an economical alternative to public-key infrastructures. ABE is also a useful building block in various cryptographic primitives such as searchable encryption. For ABE, it is not realistic to trust a single authority to monitor all attributes and hence distributing control over...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Accident Analysis System by Integration of Spatial Data Mining with GIS Web Services

    The world is growing closer due to communication facilities. But this is also having an adverse effect on social, economic growth of any developing country. If the authors observe safety risks like fire, crime and accidents, accidents are having high probabilities along with moderate impact. So they come to know...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Presenting a Hiding Algorithm for Improving Privacy Preserving in Association Rule Mining

    Association rules mining is one of data mining techniques to extract useful patterns in the framework of the law. The major problem of this technique on a database of sensitive information is disclosed to the security and privacy risks. One of the most effective solutions for maintaining privacy in data...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Reviewing Contribution for Mitigating Routing Overhead and Adopting Signal Strength in MANET

    Routing is one of the crucial phenomenons in any networking principles. However, formulation and operation of the routing protocols are not so easy in dynamic topologies like mobile ad hoc network. Since past decade there has been an evolution of various routing protocols in mobile ad hoc network community that...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Techniques of Binarization, Thinning and Feature Extraction Applied to a Fingerprint System

    A large volume of images of fingerprints are collected and stored to be used in various systems such as in access control and IDentification records (ID). Systems for automatic fingerprint recognition perform searches and comparisons with a database. Biometric recognition is based on two fundamental premises: the first is that...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Survey on Data Security for Mobile Devices

    Now-a-days, data security is making a way into market. New techniques of data security have gained interest of many researchers. Encryption-decryption technique is one such way of data security. These techniques not only provide confidentiality, integrity of data but also help in authentication of user. Authentication is possible because encryption-decryption...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Cyber-Attack Classification Using Improved Ensemble Technique Based on Support Vector Machine and Neural Network

    Cyber-attack classification and detection process is based on the fact that intrusive activities are different from normal system activities. Its detection is a very complex process in network security. In current network security scenario various types of cyber-attack family exist, some are known family and some are unknown one. The...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Entropy Variation and J48 Algorithm Based Intrusion Detection System for Cloud Computing

    Now-a-days, cloud computing has achieved formidable impetus where IT infrastructures and applications are provided as service to end users. It provides shared pool of resources in addition with data storage, computer processing power and specialized corporate and user applications. Users can access cloud services any time anywhere and store large...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Web Application Attacks Detection: A Survey and Classification

    The number of attacks is increasing day-by-day, especially the web attacks due to the shift of the majority of companies towards web applications. Therefore, the security of their sensitive data against attackers becomes a crucial matter for all organization and companies. Thus the necessities to use intrusion detection systems are...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Analysis the Performance of MANET Protocol Under Black Hole Attack for E-Mail Application

    A Mobile Ad-hoc NETwork (MANET) is a collection of wireless mobile nodes having ability to communicate with each other without any fixed network infrastructure. Due to the unavailability of controlling entity, routing and network management are done cooperatively by respective nodes. MANET is an autonomous system where each node act...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Cross-Domain Search for Policy Anomalies in Firewall

    Most of the business services have been performing very effectively by using some of the evolving technologies like cloud computing and other architectures etc. But still they have been suffering from security problems due to the undesired actions in their services. So, in this situation firewalls can plays a vital...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Compiler for Detection of Program Vulnerabilities

    Program vulnerabilities may be unwarranted for any organization and may lead to severe system failure. Due to the advancement of technology there has been increase in the area of vulnerability attacks which are exploited by hackers for getting access to the system or insertion of their malicious code. In this...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    RS-MONA: Reliable and Scalable Secure Method to Store and Share Secrete Data for Groups in Cloud

    In this paper, the authors present various issues related to privacy and security while storing user's data on untrusted cloud. In today's world sharing of group resource among the cloud users is a major problem. There is a lot of research being made to find out the issues with these...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    An Efficient Gateway Election Algorithm for Clusters in MANET

    The dynamic nature of mobile ad hoc network brought several constraints like scalability, robust connectivity, limited power constraints etc. Several cluster based routing algorithms have been proposed for large scale ad hoc networks. In cluster-based routing, the network is logically divided into groups called clusters. This grouping is to sustain...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    A Compact Dual Band Monopole Antenna Using Defected Ground Structure

    A very compact microstrip fed dual band antenna is designed for WLAN and WiMAX application. The antenna offers a wide bandwidth of 1.28GHz from 2.396GHz to 3.678GHz. The antenna resonates at around 2.53GHz and 3.37GHz defined by 10dB return loss which covers WLAN (2.4GHz) and WiMAX (3.5GHz). The antenna has...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Study and Analysis of Regression Test Case Selection Techniques

    The activity of re-testing of only those parts of the program or code, in which some modifications are performed to ensure that errors have not been added and the changes do not affect the other parts of the code, which have not been modified is called as regression testing. Regression...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Implementation of Intelligent Wireless Sensor Network Using Geo-Casting Routing

    Wireless Sensor Network (WSN) is the basic and interesting areas among practitioners and researchers in various fields. As sensor nodes are prone to environmental changes and external agents. That's why it is becoming necessary to organize the wireless sensor network which is secure, energy efficient and has prolonged network life....

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Real Time Location Based Tracking Using WIFI Signals

    Now-a-days, the difficult to tracking the mobile devices has become an issue. Various needs are arising for finding out ways of tracking mobile devices. In this paper included different algorithm for location tracking. The activity of tracking includes learning and inference, sensing. Different algorithms have different mechanisms based on which...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Intelligent Linear Data Structure with Self Performance Optimization Capacity: Application on Big Data

    The access to relevant information from a big data container is gaining immense significance. This depends on storage techniques and the organization level. This paper proposes an intelligent linear data structure with an integrated cognitive agent reorganizing periodically the data structure content. The reorganization is based on a confidence interval...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    An Improved Expectation Maximization Based Semi-Supervised Email Classification Using Naive Bayes and K- Nearest Neighbor

    With the development of internet and the emergence of a large number of text resources, the automatic text classification has become a research hotspot. Emails is one of the fastest and cheapest communication ways that today it has became the part of communication means of millions of people. It has...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Dijkstra Shortest Path Algorithm Using Global Positioning System

    Dijkstra's algorithm is used to find the shortest path from one node to another node in a graph. Dijkstra's algorithm is also known as a single source shortest path algorithm. It is applied only on positive weights. In this paper, Global Positioning System (GPS) is used for adding a new...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Low Complexity Algorithm for Probability Density Estimation Applied in Big Data Analysis

    Running inference algorithms on a huge quantity of data knows some perturbations and looses performance. One of big data aims is the design of fast inference algorithms able to extract hidden information on a big quantity of data. This paper proposes a new low complexity algorithm for probability density estimation...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    An Investigational Study of Energy Conservation Techniques in Hierarchical Routing Protocols in Wireless Sensor Network

    In the advent of wireless networking, Wireless Sensor Network (WSN) has been a constant target of research due to its potential data aggregation techniques in hostile environment. Even after crossing more than a decade, wireless sensor network is still more under research and development and less on commercial deployment when...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Fuzzy Rule Based Enhanced Homomorphic Encryption in Cloud Computing

    Now-a-days, internet services are one of the most popular services for transferring data and information. Cloud computing is also based on internet services used for storing, transferring and many more operations related to data & work. As it is based on internet services, security is one of the major concerns...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Secure Approach for Location Aided Routing in Mobile Ad Hoc Network

    Mobile Ad-hoc NETworks (MANETs) are self-managing network which consists of distributed nodes that communicate with each other through wireless links with no fixed infrastructure and no centralized control. Due to self-configuring and dynamic nature of these networks routing protocol are susceptible to various types of attacks. The black hole attack...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Security Analysis and Performance Evaluation of an Enhanced Two-Factor Authenticated Scheme

    Various security attacks may cause unauthorized access, misuse, modification, or denial of a computer network and network accessible resources. To prevent these attacks various authentication means can be used to provide authenticated key exchange protocols. Authenticated key exchange protocol allows the exchange of session key and also authenticates the identities...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Comparative Study on Exterior RCC Beam Column Joint Subjected to Monotonic Loading

    Computer simulation offers the potential for improved understanding of the local and global mechanisms that determine the response of structures to severe loading. The research presented here focuses on development of a finite element model using ABAQUS software to be used in investigating the behavior of reinforced concrete exterior beam-column...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Comparative Study of Various Next Generation Network-Business Process Frameworks

    The growth in telecommunication industry in technology, forced the necessity to shape up the existing business models. A business process can be defined as a flow of business activities. The paper discusses the impact of different process frameworks along the various key parameters that synthesizes views from areas such as...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Operating Systems: Basic Concepts and Challenges Against Virtualization

    Operating Systems (OS) act as fundamentals to the basic computer systems in today's world. An OS is the communication between the software the user use and the hardware that lies underneath. Every electronic signal talks with their operating system to understand the work it has to do or the way...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Dependency Mapper Based Efficient Job Scheduling and Load Balancing in Green Clouds

    Cloud computing is usually recognized as a technology which has significant impact on IT. However, cloud computing still has many crucial problems. In a cloud computing system, load balancing is the most central issue in the system i.e. to distribute the load in an efficient manner. It plays a very...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    An Analytical Model for IEEE 802.15.4/ ZigBee Wireless Sensor Networks with Duty Cycle Mechanism for Performance Prediction and Configuration of MAC Parameters to Achieve QoS and Energy Efficiency

    The IEEE 802.15.4 standard defines a PHYsical (PHY) and Medium Access Control (MAC) layer protocol for low data rate wireless network with low power requirement which makes it ideal PHY/MAC for WSNs. Currently WSNs with combination of IEEE 802.15.4 and ZigBee are being used extensively in industrial applications such as...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Clustering Multi-Attribute Uncertain Data Using Probability Distribution

    Clustering is an unsupervised classification technique for grouping set of abstract objects into classes of similar objects. Clustering uncertain data is one of the essential tasks in mining uncertain data. Uncertain data is typically found in the area of sensor networks, weather data, customer rating data etc. The earlier methods...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    P2P Social Network with Dynamic Identity-Based Broadcast Encryption Using Rolls

    Social Network Service (SNS) market is stretch over worldwide, and then there are many security threats by attackers. In addition because sensitive data is concentrated on the central server, privacy can be exposed to SNS provider as well as malicious users. In this paper, the authors suggest the rolls scheme...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    ICORMAN: Extended Version of CORMAN Using Efficient Channel Reuse Method

    Mobile Ad-hoc NETworks (MANETs) are wireless networks in which all nodes are moving freely in the network; also they can leave or enter into the network at any time. The nodes in these types of networks are communicating on-the-move without any base stations. Due to this mobility, inter-node connectivity may...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    A Review of Elliptic Curve Based Signcryption Schemes

    Signcryption is a new cryptographic approach which provides authentication and encryption simultaneously in a single logical step. The aim is to reduce the cost of signature-then-encryption approach. This cost includes computational cost and communication cost. Furthermore, some signcryption schemes are based on RSA while some are based on elliptic curve....

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Development of Multimodal Biometric Framework for Smartphone Authentication System

    Secret knowledge, like remembering password or token based authentication systems are deemed inconvenience and difficult to use for users such as password may be forgotten or token may be lost. So burdens like remembering password and stolen or forged token based authentication have raised a current trend of biometric authentication...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    A Security Measure for Electronic Business Applications

    With the growth of business over the internet, there is more scope of security vulnerabilities over the internet. Despite of many efforts to make internet safe to the users, there is still a possibility for threats. The client, as well as the merchant for the electronic business, always faces problems...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    A Security Framework for E-Business Applications

    During the electronic business, the clients and the merchants make use of the internet. Thus, the authors can say that the internet, the client, and the merchant are the components for the electronic business. The electronic business involves various categories of businesses. These various types of e-businesses have different types...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Congestion Controlled WSN Using Genetic Algorithm with Different Source and Sink Mobility Scenarios

    Wireless Sensor Networks (WSNs) are extremely densely populated and have to handle large bursts of data during high activity periods giving rise to congestion which may disrupt normal operation. It usually occurs when most of the data packets follow one route to reach from source to destination. Thus, there is...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    A Wireless Sensor Network Based Market Parking Scheme

    Parking in major cities, especially around a market vicinity is not only limited but costly. Innovative parking systems to curb this phenomenon are required. This paper proposes a novel and strategic approach using Wireless Sensor Networks (WSNs) as a solution. The WSNs consisting of sensor nodes are known for offering...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Advanced Preprocessing Techniques Used in Web Mining - A Study

    Web based applications are now increasingly becoming more popular among the users across the world. The user interactions with the applications are being tracked by the web log files that are maintained by the web server. For this purpose Web Usage Mining (WUM) is being used. Web usage mining is...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Effective Cluster Based Routing Algorithm for WMNS Using Effective Data Aggregation

    Wireless Mesh Network (WMN) is a key technology, supporting a variety of several emerging and commercially interesting applications. The multi-hop nature of WMNs and the rapid growth of throughput demands lead to multi-channels and multi-radios structures in mesh networks, but the interference of co-channels, as a main problem reduces the...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    A Novel Approach Using Dual Active Feature Sample Selection and LTS (Learn to Search)

    Determining the bug signatures (context of bug) is difficult, as it involves mining the execution traces of the program. The discriminative graph mining algorithm is used to identify the bug signatures. It requires manual labeling of the input set to estimate the discriminative sub graphs. To reduce the tedious work...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Network Security Analysis in the Enterprise LANs

    Enterprise Local Area Networks (ELANs) have been expanding following an increase in the number of staff which necessitates establishment of new offices. However, reliability and security of services provided by ELANs need to be ensured at all times to meet expectations of users. In this paper, the network security holes...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Design Analysis of a Hexaband Slot Loaded Microstrip Patch Antenna Using ANN

    In recent years, the requirement for wireless communication systems has increased rapidly demanding quality of service, protection of information and increased data rate for the Wireless Local Area Networks (WLANs). The designing of an antenna is a critical area for the present wireless communication system. It is important to maintain...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    A Comparative Analysis of Offline Signature Verification Using Zernike Moment and Minutiae Using Artificial Neural Network Approach

    Signature verification is the oldest and widely used biometrics offering offline (static) and online (dynamic) verification schemes. It has been observed that offline scheme is more complex because of the absence of stable dynamic characteristics and factors like stylish and unconventional writing styles but still it is more into use...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    A Performance Study of Various Security Attacks on AODV Routing Protocol in MANET

    Mobile Ad-hoc NETwork (MANET) is a self-configuring wireless network of movable and independent nodes which operate without the support of any permanent infrastructure, hence MANET has dynamic topology. In MANET, each node forwards traffic unrelated to its own use. Despite the proliferation of MANET, it is prone to various attacks...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Tendering Process: Improvement of Analysis and Evaluation of Tenders Based on the Use of Fuzzy Logic and Rule of Proportion

    In this paper, the authors propose improvements concerning the analysis and the evaluation of tenders in the tendering process. At first, a new method of analysis and evaluation of tenders using the rule of proportion is proposed. Secondly, the principles of fuzzy logic are introduced in order to reconsider limits...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    An Efficient Approach for Requirement Volatility Identification

    Software development is a dynamic activity. Requirements of the stakeholders keep on changing throughout the lifecycle of a project development. These volatile requirements are considered as a major risk factor during system development in the software industry. Requirement volatility is found to be having a significant impact on schedule &...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Heterogeneity Aware Clustered WSN Using Multi-Hop Communication

    Energy in wireless sensor network is a recent topic of research. To organize the network such a way that should minimize energy dissipation and maximize network stability period and network lifetime. In this paper, a distributed, randomized Heterogeneity Aware Clustering Algorithm (HACA) to organize the sensors in a wireless sensor...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Acknowledgment Time Delay Approach to Optimize TCP Performance in Hybrid Networked Systems

    Transmission Control Protocol (TCP) is connection oriented transport protocol used on IP in wireless medium and it insists lossless data transmission in proper order. When TCP is used as a transmission protocol where physical layer is wireless medium, results high packet reordering due to bursty traffic and drastic variation in...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Enhanced CSMA/CA Contention Window for Efficient Random Access in IEEE 802.15.6

    The IEEE 802.15.6 is a new communication standard on Wireless Body Area Network (WBAN) for short-range, wireless communications in the vicinity of, or inside a human body. It is used for medical and non-medical applications. The IEEE 802.15.6 defines a Medium Access Control (MAC) layer compatible with several PHYsical layers...

    Provided By International Journal of Computer Applications