International Journal of Computer Applications

Displaying 601-640 of 6345 results

  • White Papers // Oct 2014

    Cross-Domain Search for Policy Anomalies in Firewall

    Most of the business services have been performing very effectively by using some of the evolving technologies like cloud computing and other architectures etc. But still they have been suffering from security problems due to the undesired actions in their services. So, in this situation firewalls can plays a vital...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Compiler for Detection of Program Vulnerabilities

    Program vulnerabilities may be unwarranted for any organization and may lead to severe system failure. Due to the advancement of technology there has been increase in the area of vulnerability attacks which are exploited by hackers for getting access to the system or insertion of their malicious code. In this...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    D- A Powerful General Purpose Application Programming Language

    The real purpose of a programming language is to communicate a set of instructions to a system, basically a computer. Just like natural languages, programming languages are described using their syntaxes and semantics. This paper presents a comparison of a newly-developed programming language called D with traditional languages like C,...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Data Encryption Techniques for USB

    Universal Serial Bus (USB) external devices are high speed flash/external drives which can boast data transfer speeds, about as large as 5Gbps. Host controlled USB is the fastest way of transferring material to an external device available today. It is easy, convenient and fast to access these USB devices as...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    An Efficient Approach for Detection of Wormhole Attack in Mobile Ad-hoc Network

    Mobile Ad-hoc NETworks (MANETs) consist of a collection of wireless mobile nodes which dynamically exchange data among themselves without the reliance on a fixed base station or a wired resolution network. MANET nodes are typically well known by their precise power, transformation, and memory effects as well as high degree...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Video Watermarking Techniques - A Review

    In this paper, the authors present a rapid growth in the progress of digitization and creation of digital multimedia content. Image and video makes up the majority component in digital multimedia content. The potential solution for protection and prohibiting copyright infringement of multimedia is only using digital watermarks. The characteristic...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    A Secure Lightweight Algorithm for Protecting Network From DoS Attack

    Protecting private networks from various attacks is the primary goal of network managers of a company or office. The attack can be launched either from an insider or outsider. Among these attacks, Denial of Service (DoS) attack is most important and has been attracting the interest of researchers. The authors...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Modeling Function of Nectar Foraging of Honeybees Using Operant Conditioning

    Behaviors of the colonies of small unsophisticated agents have been analyzed in the literature with the purpose of developing efficient algorithms to solve complex, dynamic and burden problems in other societies. Among them, only a few researches have been conducted in the area of swarm cognition which tries to understand...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Dedicated Client Architecture in MapReduce and Its Implications on Performance Considerations

    Big data refers to a large quantity of data that has to be processed at one time. With the advancement of social media and the virtual world, a vast amount of data is created every second. A technique has to be designed to effectively process this ever-increasing collection of information....

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    GIS Augmented Automatic Train Monitoring

    Now-a-days, managing train movement between stations in railways has become staggering task which involve human efforts like data transfer through phone. It is needed to be continuously monitoring the trains approaching from neighboring stations, for safe train movement due to high density of trains on a track. Conventionally, station master...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    An Efficient Framework for Minimizing Project Complexity Using Periodic Software Project Standard Based Linear Ranking

    Application knowledge, skills, and procedure related to software tools have to be examined in a regular basis to identify the complexity related to project management. An Integrated Framework for Risk Response Planning (IF-RRP) was developed for providing support in decision making during project response risk planning. The method, IF-RRP used...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    RSA Cryptography Using Designed Processor and MicroBlaze Soft Processor in FPGAs

    Some applications such as RSA encryption/decryption need integer arithmetic operations with many bits. However, such operations cannot be performed directly by conventional CPUs, because their instruction supports integers with fixed bits, say, 64 bits. Since the CPUs need to repeat arithmetic operations to numbers with fixed bits, they have considerably...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Quad Band H-Slot Microstrip Patch Antenna for WiMAX Application

    Antennas are important components in communication systems and play a role in transmitting and receiving signals. In modern wireless communication systems, multiband antenna has been playing a very important role for wireless service requirements. Now-a-days, antennas with multiband capabilities have been widely required in satellite and mobile communication systems to...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Detection and Classification of Intrusions Using Fusion Probability of HMM

    The main definition of intrusion detection system starts with the use in hardware or software so that the data or traffic flows through these devices can be filtered since this traffic may contains some unwanted flow data that may harm to the system. Intrusion detection system is a technique of...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Biclustering of Gene Expression Data Using a Two - Phase Method

    Biclustering is a very useful data mining technique which identifies coherent patterns from microarray gene expression data. A bicluster of a gene expression dataset is a subset of genes which exhibit similar expression patterns along a subset of conditions. Biclustering is a powerful analytical tool for the biologist and has...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Enhanced the Security of Playfair Technique Using Excess 3 Code (XS3) and Ceasar Cipher

    In this paper, the authors are to provide security for the data that contains alphabets and integer values during the transmission, when data is transmitted form sender to receiver. As they know that playfair technique if best for multiple letter encryption, which treats the plain text as single units and...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Design and Implement Enhancing Security in Multi Cloud Storage System Using Distributed File System

    Distributed computing is a quickest developing engineering. It permits business associations to utilize or access diverse applications, store data without access their individual documents. While considering the force, strength and the security of cloud one can't disregard diverse dangers to client's information on distributed storage. Document access guarantee in true...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Multi-Level Data Integrity Service

    Cloud computing is an auspicious computing model that empowers on-demand network access to a shared pool of computing resources. One of the services offered by cloud is moving data into the cloud. Cloud Providers offer storage space to consumers for storing their data. Data moves between cloud providers and consumers...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Secure Cloud Computing with Third Party Auditing: A Survey

    Cloud computing based technology and their impact is growing now-a-day. Cloud computing is used in all the area of business, education, social impact and data miner. The growing demand is because of the on demand service and pay per basis used somehow in the unlimited form. But the uses enhance...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    An Efficient Intruder Avoidance Method for MANETs

    Among all the up to date wireless networks, Mobile Ad-hoc NETwork (MANET) is one amongst the foremost necessary and distinctive applications. Unfortunately, the open medium and remote distribution of MANET create it at risk of numerous kinds of attacks. So, it is crucial to develop efficient intrusion-detection mechanisms to protect...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Artificial Intelligence and Cognitive Analytics Approaches towards Efficient Predictions for Business Intelligence

    Business intelligence techniques no longer just evolve around traditional databases and warehouses, but have leaped into the era of big data. The aim is now to extract as much hidden knowledge from this rich data. The data is highly varying and evolves from various sources. Business improvement strategies usually revolved...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    A Survey of Object Oriented JavaScript Language

    Many of the programmer's moves towards an object oriented programming languages due to its reusability nature, whereas in procedural programming languages reusability is not allowed which may contribute to the high cost of development. Most of web browsers make use of JavaScript as a user interactive program that is a...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    A Novel Method for Preserving Privacy in Big-Data Mining

    As the people daily lives has become digitization which led to an explosion in the collection of data by organization and individuals. Organization pushes their vast amount of data into big data clusters, but most have implemented zero security measures. Protection on confidentiality of these data is very important. In...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Diametrical User Control to Filter the Unwanted Messages from Online Social Networks

    Online Social Networks (OSNs) are the most impulsive standard to provide communication, sharing and disseminate a significant amount of individual life data. Content can be changed based on daily needs in several communication fields (audio, video, image, and text). One of the important aspects of OSN is to give the...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    An Investigational Analysis of different Approaches and Techniques for Time Synchronization in Wireless Sensor Network

    Time synchronization is one of the important research aspect from past decade due to its close correlation on Quality of Service (QoS) attributes in Wireless Sensor Network (WSN). One of the challenging issues is addressing time synchronization is that different WSN applications have particular QoS demands that varies from throughout,...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Survey on How to Read a Dendrogram

    Cluster analysis is one of the most important functionality of data mining. With the advent of such a data mining technology, cluster analysis of items is frequently done in supermarkets. Cluster analysis groups objects based on the information found in the data describing the objects or their relationships. The goal...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Third-Party Application Maintenance Management

    The success and failure of software projects are based on performance indicators such as: compliance to the customer first requirements, customer satisfaction, and software quality, budget overrun, schedule compliance and so on. Certainly, project management approaches and best practices known in the field of software engineering or others have been...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Network Reliable Routing Protocol for Event-Driven Wireless Sensor Network

    Wireless Sensor Networks (WSNs) are a collection of various densely deployed sensor nodes which is implemented in a variety of applications such as home, medical, military, security surveillance and combat field reconnaissance etc. An Event-driven Wireless Sensor Networks (EWSNs) is a type of wireless sensor network in which the desired...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Improved Leach Using Highest Remaining Energy First Based Cluster Head Selection

    Power effectiveness found to be main limitation in WSN due to insufficient battery of sensor nodes. Therefore, the most significant focus of the existing work is to locate the ways to decrease the difficulty of power utilization and will result in improvement in the network stability period and life time....

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    A New Approach for Extraction of Pattern Frames in Text Mining

    Due to the rapid growth in World Wide Web (WWW) and data availability, text mining has become one of the most important fields in data mining. Text mining refers to the technique which is useful to find the information from a huge volume of digital documents. Many existing text mining...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    High Performance Multicast Routing Protocol in Mobile Ad-Hoc Network

    In this paper, the authors intend to improve the performance of MANETs - Mobile Ad-hoc NETworks handling high volume traffic by introducing an enhanced tree based multicast routing protocol with efficient management of topology and groups with an improvised label mechanism capable of building alternate paths and secure better transmission...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    A Zeroth-Order Resonance Patch Antenna for Dual Band Operations with Broad E-Plane Beam Widths

    In this paper, design of probe fed Zeroth Order Resonance (ZOR) antenna with dual frequency operation is presented. The mushroom structure is placed at the center of the geometry and the grounded via to have the desired ZOR response. The feed is connected between the inner ring and the mushroom...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Application of Multimedia Technology in Database and IT Service Management

    Multimedia is a blend of two or more media such as text, sound, graphics, animation and video, to effectually converse ideas to the users and this could be in linear or non-linear form. The application of multimedia technology to database and IT service management has improved enormously in recent times....

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Routing Protocols Used for CRN : A Survey

    Cognitive Radio (CR) is an emerging technology in the wireless communication. CR nodes have the capability to change its transmission or reception efficiently without interfering with licensed users. The network formed with CR nodes communicating with each other is called Cognitive Radio Network (CRN). CRN utilizes the unutilized frequency spectrum....

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Modeling and Simulation of CSMA/CA Slotted and Unslotted Mode in Zigbee Routing Schemes

    Zigbee is basically a self organizing digital radio network. It is based on IEEE 802.15.4 standard used for Wireless Sensor Network (WSN). This paper is related to CSMA/CA slotted and unslotted mode on IEEE 802.15.4 based wireless sensor network using three routing schemes. The simulation model is done by using...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Analysis of Security Issues in VoIP

    The most common way of communication is obviously through voice exchange. There are mainly two ways by which voice can be easily transmitted over a network: PSTN (Public Switched Telephone Network) and VoIP (Voice over Internet Protocol). The VoIP is relatively new and is gaining more and more popularity as...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Design and Implementation of Appliance Controller Using Traditional or Smart Phone

    Mobile phones are widely used now-a-days, for different application such as wireless control and monitoring due to its availability and ease of use. The implemented system is based on \"Global System Mobile (GSM)\" network by using \"Short Message Service (SMS)\". The design mainly contains a GSM modem and interfacing unit...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    The Effect of Mobility Models and Traffic Patterns on the Performance of Routing Protocols in MANETs

    Mobile Ad-hoc NETworks (MANETs) are self-organizing networks which can form a communication network without any fixed infrastructure. Constant Bit Rate (CBR) traffic pattern is very well known traffic model for MANETs which generates data packets at a constant rate. Transmission Control Protocol (TCP) provides reliability to data transferring in all...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Low Probability Cluster Head Selection Energy Efficient Routing in MANET Using DEEC

    Mobile Ad-hoc NETwork (MANET) is the prominent area of research to make wireless networking more robust and reliable for packet delivery among nodes of a small or big network through wireless channel. The routing protocols are also designed to keep in mind that the energy consumption of wireless nodes should...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    A Cooperative Strategy for Collision Detection and Prevention for Unmanned Ground Vehicles in Military Applications Using WSN Based VANET

    In the recent years, Vehicular Ad hoc NETworks (VENETs) have gained tremendous attention of researchers due to various services they provide and likely to be deployed commercially in coming years. VANET enables vehicles to communicate with each other to avoid any critical situation such as vehicle collision, unseen obstacles etc....

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Survey of Integrity Verification in Multi-Cloud Storage by Efficient Cooperative Provable Data Possession

    Provable Data Possession (PDP) is one of the techniques to ensure the integrity of data in storage outsourcing. Here in this paper, the authors speak to the creation of an efficient PDP method for distributed cloud storage to maintain the scalability of service and data migration. On the basis on...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    An Elliptical Routing Protocol for Wireless Mesh Networks: Performance Analysis

    Wireless Mesh Networks (WMN) is one of the implemented types of MANETs. WMN is wireless network, in which each node can communicate directly with one or other peer nodes. In generally, MANET routing protocols are used in WMN, it arises performance issues. In this paper, the authors propose a new...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Adhoc On-Demand Distance Vector - Energy Efficient Approach

    As nodes of Mobile Ad hoc NETwork (MANET) are mobile in nature, overall network lifetime is one of the key challenges in MANET. To improve overall network lifetime along with packet delivery fraction and normalized routing load, this paper proposed an Optimized Multi-hop Routing Ad hoc On-demand Distance Vector protocol...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    A Novel Feature Based Unified Node Data Analysis (FBU-NDA) Based IDS Using AODV in MANET

    MANET is a type of wireless network, which works on radio frequencies and holds short range communication. As it is temporary in nature and is having movable devices for communication which makes such network as infrastructure less. In such network variable conditions of routing will face several issues which degrade...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Optimized Conditional Privacy Preservation Protocol for NFC Applications Using Genetic Algorithm

    In the recent years, the NFC with the combination of smart devices has widened the utilization range of NFC. It is said it will replace the credit card in electronic payment so security is one of the area that is to be checked. Currently the NFC security requires user's public...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Optimal Software Release Time Policy using Goal Programming

    In this paper, the impact of software testing effort and the efficiency on the modeling of software reliability for optimizing the cost in case of release time policy has been discussed. Another important problem in the software development process is to determine when to stop testing and release the software....

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Detection Mechanism for Distributed Denial of Service (DDoS) Attack in Mobile Ad-hoc Networks

    Mobile ad hoc networks are non-static networks which formed without any central point communication infrastructure. In addition to node mobility, a ad-hoc is defined by bounded resource constraints such as bandwidth, battery power, and storage space. In this network, the intermediate nodes play role of router which routed the packets...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Cooperative Communication Simulation Using TCP

    Demand for wireless communication has increased rapidly. Almost everywhere there is a wireless device (phones, laptops, etc.) that need to communicate with other mobile devices in their region or to connect to an internet access point, and they need to exchange data especially via internet. As a result, the need...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    A Parametric Estimation Approach for Effective Cluster Selection in WPAN

    WPAN is the most advanced communication network that combines the capabilities of mobile network and sensor network in a complex global area scenario. This network defines various integrated processes under communication scenario specification. Cluster selection process is the most common requirement of any WPAN scenario because of the mobility feature...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Adapting K-Means for Clustering in Big Data

    Big data if used properly can bring huge benefits to the business, science and humanity. The various properties of big data like volume, velocity, variety, variation and veracity render the existing techniques of data analysis ineffective. Big data analysis needs fusion of techniques for data mining with those of machine...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Application of k-Nearest Neighbour Classification Method for Intrusion Detection in Network Data

    In today's world, increasing number of networks connected to the Internet poses a great challenge on security issues. Many defensive mechanisms exist and one such higher level mechanism is network intrusion detection system. Intrusion detection system is a process of intelligently monitoring the events in an individual system or network,...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Cluster Head Selection Protocol using Fuzzy Logic for Wireless Sensor Networks

    Recent trends in field of wireless networks is setting up wireless sensor networks that, senses specified parameter(s) related to environment; processes sensed data and wirelessly communicates it to a base station. Such networks open up a whole new range of applications, including precision agriculture, monitoring and tracking vehicles, animals and...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Comparative Analysis of EH-LEACH with Distinct Angles in a Scalable Network

    Hierarchical routing having cluster based topology is a very propitious approach for improving throughput. Wireless Sensor Networks (WSNs) are distributed networks consisting of sensors deployed randomly to oversee an inaccessible area. Sensors operate on a battery of limited power. The goal of WSN is to improve network lifetime and reliability...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Mobile Security: A Literature Review

    In this paper, mobile devices are considered as tablet and cell phones which run a mobile Operating System (OS). More specifically, these are Android (Google), iOS (Apple), or BlackBerry OS (RIM). While it is important to note these terms, this literature review is focused primarily on the Android OS security...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Comparative Analysis of Outlier Detection Techniques

    Data mining simply refers to the extraction of very interesting patterns of the data from the massive data sets. Outlier detection is one of the important aspects of data mining which actually finds out the observations that are deviating from the common expected behavior. Outlier detection and analysis is sometimes...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Maintaining Consistency between Caches to Improve Overall Performance in Wireless Sensor Networks

    Wireless Sensor Network (WSN) is an application based network. Wireless sensor network has a wide range of potential, practical and useful applications. Majority of such applications require an optimization to the communication among the sensors, so as to serve data in short latency and with minimal energy consumption. The sensor...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    An Efficient Secure Routing Protocol in MANET Security - Enhanced AODV (SE-AODV)

    A MANET is a collection of independent mobile nodes with self configuring, self administrating features. In MANET initial work for routing was done addressing the path formation between nodes. A network in which any node can join and leave the network, routing protocol addressed for only efficient path formation makes...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Security System for Vehicle using Number Plate Detection and RFID

    In this paper, vehicle number plate is captured by the camera. And then it compare with the database that is made in the MATLAB. During comparing it uses edge detection and compares pixel to pixel templates that are already define in the program. And after matching the number plate it...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    A Hybrid Algorithm for Association Rule Hiding using Representative Rule

    In the recent years, data mining has emerged as a very popular tool for extracting hidden knowledge from collection of large amount of data. One of the major challenges of data mining is to find the hidden knowledge in the data while the sensitive information is not revealed. Many strategies...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    An Integrated Approach to Support Knowledge Representation, Sharing and Perception over Web2.0

    Web 2.0 technologies provide the communication medium which allows collaborators to share and communicate ideas. These technologies, however, exhibit limited support for knowledge transfer which is more than a communication problem. It is still unclear how people can communicate, over the Web 2.0, cognitive activities which they undertake during the...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    An Empirical Performance Evaluation of AODV and DSR using ALERT Protocol in MANET

    Recent advances in portable computing and wireless technologies are opening up exciting possibilities for the future of wireless mobile networking. A Mobile Ad hoc NETwork (MANET), sometimes called a mobile mesh network, is a self-configuring network of mobile devices connected by wireless links to exchange necessary information. Unlike traditional mobile...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Multimodal Biometric Identification System: Fusion of Iris and Fingerprint

    In this paper, the authors propose a biometric person identification system based on fusion of Iris and fingerprint images. This paper attempts to improve the performance of iris and fingerprint-based identification system by combining the individual features obtained by implementing Iris and fingerprint identification system. There exist techniques to provide...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Design and Implementation of a Home Automatedn System based on Arduino, Zigbee and Android Application

    Due to the proliferation of modern technology, these days, the world is increasingly experienced the use of wireless devices. The devices such as remote control and GSM phone could provide means for monitoring and controlling home appliances in a more convenient way. This paper has explored the concept of home...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Design of 4G Antenna for Mobile Handset

    Mobile communication is one of the hottest current areas and is developing extremely fast in present times also led to the advancement of antenna systems in the recent decade. A compact multiband planar antenna is designed for mobile phone applications in this paper. A planar monopole antenna into distributed radiating...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Spectrum Sensing Technique Based on CAF and 3rd Order Cumulant for Cognitive Radio

    Cognitive radio system provide the user a solution for spectrum congestion problem, but the effectiveness of the system is only depends on the technique used for spectrum sensing, that how effectively the detection is performing at very low SNR. In this paper, the authors proposed a technique of spectrum sensing...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    A Method for the Selection of Software Testing Automation Framework Using Analytic Hierarchy Process

    Software Test Automation Framework (STAF) is a set of concepts, assumptions or practices that provide support for automated software testing. STAF includes the following for capturing and controlling the test activity, i.e., test objects, library files and reusable scripts etc. In this paper, the authors have identified different types of...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Supervisory Control and Data Acquisition

    Since the advent of control systems, Supervisory Control and Data Acquisition (SCADA) have played an important role in the field of automation. SCADA systems offer a means of controlling remotely located devices in an industrial process. Supervisory control can be combined with data acquisition wherein the data is obtained from...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Building an Object Cloud Storage Service System using OpenStack Swift

    Cloud storage systems are increasingly noticed now-a-days as they are promising elastic capability and high reliability at low cost. In these services, the files are stored in an authenticated cloud storage service center. The most important feature is storage is adjusted dynamically, and there won't be any worry about space...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    A Novel Approach of Designing Cryptographic Algorithm with High Confidentiality

    Today's in modern world security is the main issue while communication. Internet is main source for communication but also it is not as much secure as it assume. For secure transmission of data many algorithms have been developed. Steganography and encryption/decryption algorithms are used for confidentiality. Some times to improve...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Generate Optimized GUI Test Sequence Using GA and Fuzzy Logic

    A software system is composed of multiple modules. These modules and procedures are integrated via some user friendly environment such as graphical interface. End user is very much interested in the effective working of this graphical interface. To satisfy the user in terms of available graphical options, it is required...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Implementation of Model-View-Controller Architecture Pattern for Business Intelligence Architecture

    In this paper, the authors present a new approach to develop the strategy of model-view-controller architecture pattern in Business Intelligence (BI) architecture. The Business Intelligence (BI) architecture consists of the ETL tools and processes, the data warehouse, the technical infrastructure, and the user-interface tools. The major issue related to Business...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Study on Influence of Cognitive Load for Software Developer's Performance Using BPNN Algorithm

    The development process involved developers contribution based the user cognitive thinking in the real time process. The developer's performance is dynamic as per their cognitive load. The cognitive load is un-deterministic as well hidden and integrated in the developer's process. This paper attempt to identify software developer cognitive measure which...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Analysis and Design of Multi Share Secret Message Sharing using Visual Cryptography

    Visual cryptography is a special encryption technique to hide information in images in such a way that it can be decrypted by the human visual system. It is secret sharing scheme which uses images distributed as shares such that, when the shares are superimposed, the original image is revealed. In...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    An Efficient Approach for Event based Clustering for Wireless Sensor Network

    The Wireless Sensor Networks (WSNs) is one of the highly adopted field of research in recent years of scientific world. A WSN consists of sensors also known as motes which are distributed over a geographical area to monitor physical or environmental conditions and to transfer their sensed data cooperatively through...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    A Survey on Biometric Templates Binarization

    Due to the wide usage of biometrics, privacy and security concerns cannot be neglected. Biometric template protection systems have been proposed to protect the biometric template against unauthorized use. Many biometric template protection systems require the biometric template to be presented in a binary form. Biometric template binarization is the...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Survey on Energy Efficient Routing Protocols in WSNs

    Wireless Sensor Network (WSN) is a highly distributed network of small and lightweight sensing nodes which are deployed in a large number at multiple locations. These networks are helpful in monitoring the system or environment. These sensor nodes performs sensing, processing and then communicating. Now-a-days, these networks are applied in...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Forecasting Chaotic Stock Market Data Using Time Series Data Mining

    An important financial subject that has attracted researchers' attention for many years is forecasting stock return. Many researchers have contributed in this area of chaotic forecast in their ways. Among them data mining techniques have been successfully shown to generate high forecasting accuracy of stock price movement. Now-a-days, instead of...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Approaches for Web Spam Detection

    Spam is a major threat to web security. The web of trust is being abused by the spammers through their ever evolving new tactics for their personal gains. In fact, there is a long chain of spammers who are running huge business campaigns under the web. Spam causes underutilization of...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Survey on Grid Based Energy Efficient Routing Protocols in Wireless Sensor Networks

    Sensor nodes in Wireless Sensor Networks (WSNs) have limited energy, range, memory and computational power. In WSN, it is an important task to send measured data at regular intervals from an area of interest for time sensitive applications to a base station or sink for further processing to meet the...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    A Genetic-Fuzzy Algorithm for Load Balancing in Multiprocessor Systems

    With the increasing use of computers in research contributions, added requirement for faster processing is now an important necessity. Parallel Processing describes the concept of running tasks which can be run simultaneously on several processors. Load balancing is very important problem in multiprocessor systems. In this paper, the authors introduce...

    Provided By International Journal of Computer Applications