International Journal of Computer Applications

Displaying 601-640 of 5819 results

  • White Papers // Aug 2014

    Frequent Pattern Mining Based on Multiple Minimum Support Using Uncertain Dataset

    Association rule mining plays a major role in decision making in the production and sales business area. It uses minimum support (minsup) and support confidence (supconf) as a base to generate the frequent patterns and strong association rules. Setting a single value of minsup for a transaction set doesn't seem...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    Improved Security Evaluation of the Software by Using PSSS Based Security Analyzer

    After analyze the three security processes (CLASP, SDL and PSSS) it has been selected that the PSSS as security approach to develop a secure project since of its advantages over the other two security processes. The most important objective of PSSS security process is to improve the effectiveness of software...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    A Performance Evaluation for Rate Adaptation Algorithms in IEEE 802.11 Wireless Networks

    The wireless LAN standards IEEE 802.11 (a/b/g) provides multi-rates capabilities. To achieve high network performance, devices need to adapt their transmission rate dynamically under varying conditions. Rate adaption algorithm is a critical component of their performance, only very a few algorithms have been published and the differences between their mechanisms...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    Realization of Combinational Multiplier using Quantum Cellular Automata

    Quantum dot Cellular Automata (QCA) shows promise as a post silicon CMOS, low power computational technology. Nevertheless, to generalize QCA for next generation digital devices, the ability to implement conventional programmable circuits based on NOR, AND and OR gates is necessary. The authors devise a new QCA structure, the QCA...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    Millimeter-Wave Mobile Communications Microstrip Antenna for 5G - A Future Antenna

    In the present scenario, cellular service provider facing bandwidth shortage in conventional cellular system, and delivering high quality, low latency video and multimedia applications using 3G system which is on ground. The 4th generation cellular networks are expected to be implemented in next few years. Here, the authors present the...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    Generation of String Test Input From Web Using Regular Expression

    To generate realistic test data is a challenging for software testers. Realistic test data generation for certain input type is hard to automate and therefore laborious. So in this paper, string inputs will be used from the internet by performing web queries based on the key identifiers appearing in the...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    Mining Educational Data for Students' Placement Prediction Using Sum of Difference Method

    The purpose of higher education organizations have to offer superior education to its students. The proficiency to forecast student's achievement is valuable in affiliated ways associated with organization education system. Students' scores which they got in an exam can be used to invent training set to dominate learning algorithms. With...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    A Pragmatic Approach for Software Maintenance Process

    In this paper, the authors describe the use of a process support tool that is used to collect metrics for upgrading their electronic retail system. The incremental prototype lifecycle approach is used in which each increment is categorized by an effort type and a project component. The different effort types...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    Cluster Based Optimization Routing Strategy for Data Communication in Mobile Computing

    Mobile computing facilitates users to keep the information handy and also continuous access to the application by using mobile computing devices (i.e. Smartphone, palmtop, laptop and tablets) without using wired network. It provides flexible communication to network users; they can access network applications anytime and anywhere. Communication between these devices...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    Client Based Proactive Handoff in Heterogeneous Network

    In the present scenario various wired and wireless networks are contributing in information access for different users. But as the authors are moving towards next generation, the communication is targeting for integration of these wired and wireless networks. Once a client obtains a global address from internet gateway it is...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    An Efficient Clusterhead Election Algorithm for Mobile Ad-Hoc Network

    Mobile Ad hoc NETwork, abbreviated as MANET, is flexible, self-configuring, wireless ad-hoc network. MANET do not require pre-existing or pre-defined infrastructure, instead it configures and creates a network dynamically. All available nodes (devices) in MANET act as routers and are allowed to move freely in any direction, even in and...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    Deterministic HEER Protocol for Heterogeneous Reactive WSNs

    WSNs are playing a crucial role in real world applications. Due to the features of the resource-constrained and battery-aware sensors; in WSNs energy utilization has found to be a major interesting subject of research. WSNs compose battery-powered nodes which are connected with the base station to for certain action or...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    A New Protocol for Resource Discovery in Grid Systems

    Resource discovery is a real challenge in grid systems due to the dynamicity of nodes (i.e. any node can join or leave the system at any moment). This paper proposes a new protocol for resource discovery in dynamic grid systems. The hypothesis is that a grid is composed from a...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    Simulation Based Analysis of TCP Variants Over MANET Routing Protocols Using NS2

    Traditional Transport Layer Protocol Transport Control Protocol (TCP) and User Datagram Protocol (UDP) which perform well on wired networks, but it degrades its performance in case of ad-hoc wireless networks due to the existing problems associated such as misinterpretation of packet loss, frequent path breaks, effect of path length, misinterpretation...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    Performance Analysis Using Bayesian Classification-Case Study of Software Industry

    There has been rapid improvement in the ability to construct software systems, firstly by developing reliable hardware and second by developing effective process oriented methodologies. However there has been a lack of emphasis in people component of software engineering. This paper examines the human component and brings out interesting patterns...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    XML Parsing on Multicore Processors and Data Representation in .NET Tree Control

    In this paper, the authors are to optimize the parsing process of the XML files. There are several ways to parse the XML files. But to comply with the advanced multi-core CPUs and their fast performance the XML parsing logics need to be refined and optimized with parallel processing approach....

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    Improved Novel Routing Algorithm for Congestion Control in Wireless Sensor Network

    In this paper, based upon the concept of improving the novel congestion control scheme in Wireless Sensor Network (WSN). In WSN congestion is an important issue. Congestion occurs at the transport layer of the OSI model. The novel congestion control scheme proposed a rate-based Fairness-Aware Congestion Control protocol (FACC), which...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    Redefining and Extending the Scope of System Development Life Cycle: Perspective of Today's and Futuristic Human-System Interaction Environment

    With the latest innovations in the field of digital computing, communication and interconnecting technology, a new and of its own type of pervasive physical-digital ecosystem has started to emerge and in future it will be more ubiquitous, more dominant, more potent, more useful, more helpful, more usable. Finally, it will...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    Mobile Cloud Computing Security as a Service Using Android

    Cloud computing is from one of the most prominent technologies that are used today. A lot of business is growing using the computational resources on pay per use model. As more and more enterprise applications are shifting to mobile these days security becomes a big issue to be answered. This...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    Performance Analysis of the Encryption Algorithms as Solution to Cloud Database Security

    As the amount of data and information received and sent electronically increases in various small and medium enterprises, companies and organizations, the adoption of cloud Database-as-a-Service (DaaS) is becoming popular in the global business community. The operational burden encountered by users of Traditional Database Systems (TDS), such as configuration, provisioning,...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    Performance Comparison of Routing Protocols of MANET in Real World Scenario Using NS3

    Mobile Ad hoc NETwork (MANET) is a collection of several wireless devices or mobile users that can communicate among themselves over wireless links in a peer to peer basis and thereby creating a dynamic, arbitrary graph. But some adverse characteristics of MANET like dynamic topology, limited bandwidth, link failure and...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    A Survey on Various Enhancements Made on ZRP

    MANET is a self organizing and self configurable infrastructure less network of mobile nodes connected by wireless where the nodes move arbitrarily. Routing is a critical issue in Mobile Ad hoc NETworks (MANETs). One of well-known protocol for ad hoc networks is Zone Routing Protocol (ZRP). However, many useless control...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    An Ensemble Model for Classification of Attacks with Feature Selection Based on KDD99 and NSL-KDD Data Set

    Information security is extremely critical issues for every organization to protect information from unauthorized access. Intrusion detection system has one of the important roles to prevent data or information from malicious behaviors. Basically Intrusion detection system is a classifier that can classify the data as normal or attacks. In this...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    Design and Implementation of Multi-Model Biometric Identification System

    Biometric recognition used to make personal identification based on pattern recognition methods. This paper use fingerprint and iris recognition systems to build an active serial multimodal biometric identification system. Fingerprint identification algorithm is modified to be modified Delaney triangulation system. In the modified system only the surrounded triangles around each...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    Dynamic Link Adaptation and Routing Protocols in Wireless Sensor Networks Based on Energy Harvesting of MAC Protocols

    The design of energy harvesting device is main part of MAC design. Recently the efficient method for Energy Harvesting (EH) device design for MAC protocols of WSN is studied. Practically this method proven it's efficient in terms of delivery ratio as well as energy consumption. This approach is focused on...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    A Review of Requirement Engineering Issues and Challenges in Various Software Development Methods

    The Requirement Engineering (RE) is a systemic and integrated process of eliciting, elaborating, negotiating, prioritizing, specifying, validating and managing the requirements of a system. The detailed and agreed requirements are documented and specified to serve as the basis for further system development activities. The software industry has moved from traditional...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    Implementing Truthful Routing Path Generation in WSN Through TARF

    Wireless device networks are susceptible to a good set of security attacks, together with those targeting the routing protocol practicality. The multi-hop routing in Wireless Sensor Networks (WSNs) offers very little protection against identity deception through replaying routing data. Associate in nursing oppose will exploit this defect to launch numerous...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    Enhancing the Performance of Geographical Routing Protocol in Highly Dynamic Mobility and Mobility Patterns

    In geographical routing, each node takes the data forwarding decision based on the location information of its one-hop neighbors. Dissemination of location information is the key function of the geographic routing. The location error due to the node mobility models has direct impact on the geographical routing. Node mobility is...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    Network Pattern Analysis Based Vulnerability Measurement Using Attack Graph Hierarchical Visualization Approach

    Network is growing very fast in terms of their users, technologies and devices integrated together for delivering the demanded communication services effectively. Such process requires lots of policies and configurations arrangements to improve availability and reliability of data. Most of the times these changes are performing the desired action but...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    An Overview on Mobile Data Mining

    In early days, the mobile phones are considered to perform only telecommunication operation. This scenario of mobile phones as communication devices changed with the emergence of a new class of mobile devices called the smart phones. These smart phones in addition to being used as a communication device are capable...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    M-ARY PSK Scheme in Cellular Environment

    In digital communication scheme design, the foremost objective is to receive data as analogous as the data sent from the transmitter. To outlook the system's performance it is essential to examine the system in term of probability of error. This paper emphases on comparative performance analysis of M-ary PSK modulation...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    New Genetic Gravitational Search Approach for Data Clustering Using K-Harmonic Means

    In this paper, the new hybrid data clustering approach, gravitational genetic KHM based on Genetic Algorithm (GA), Gravitational Search Algorithm (GSA) and K-Harmonic Means (KHM) is proposed. Data clustering is used to group similar set of objects into set of disjoint classes, object in class are highly similar than the...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    Performance Evaluation of Min-Min and Max-Min Algorithms for Job Scheduling in Federated Cloud

    Cloud computing is a large-scale, economic driven, distributed computing paradigm where abstracted, virtualized, managed computing power, scalable, storage, platforms and services are delivered on demand to customers over internet. It refers to applications delivered as services through the internet and hardware and systems software at data centers providing such services....

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    Memory Virtualization Technique for Efficient Access of Data Resources in Cloud Environment

    Working in cloud environment and accessing its services is fascinating task. It is one of modern technological areas to work upon it for development of nation and increase economy rate. The paper deals with improving desktop cloud computing services with the help of technique called memory virtualization. Since virtualization is...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    Analysis of Private Cloud Construction Using Microsoft Cloud Solution

    In recent years, organizations tend to use private cloud to provide their own services to users. There are many ways to build private cloud using one of the solutions produced by many companies such as Microsoft, VMware, Citrix, etc. This paper aims to present detailed analysis steps to build and...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    Parallel Job Scheduling in Cloud with Lookahead and Workload Consolidation

    The cloud computing paradigm enables consumers to run their applications in remote data centers. Many of these applications may be complex which requires parallel processing capabilities. Parallel job scheduling techniques mainly focus on improving responsiveness and utilization. For a data center that deals with parallel jobs, it is important to...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    Verifying Outsourced Replicated Data in Cloud Computing Storage Systems

    Storage-as-a-Service (SaaS) offered by Cloud Service Providers (CSPs) enables customers to store and retrieve almost unlimited amount of data by paying fees metered in GB/month. For an increased level of scalability, availability and durability, some customers may want their data to be replicated on multiple servers across multiple data centers....

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Performance Evaluation using Various Models in Distributed Component based Systems

    Over the years, several models were proposed to analyze the performance of distributed component based system with the view of improving system's performance. Traditional methods of prediction such as Petri nets and queuing networks exploit the benefits of component engineering paradigm, such as division of work and reuse. The authors...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Survey of Algorithm: Scheduling Systems and Distributed Resource Management in Grid

    Grid computing is the form of distributed computing where the resources of various computers are shared to solve a particular problem. Grid can be used for a variety of purposes. Job scheduling is used to schedule the user jobs to appropriate resources in grid environment. The resources in the grid...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    NER-FL: A Novel Named Entity Recognizer of Farsi Language using the Web-Based Natural Language Processors and Semantic Annotations

    Named entity recognition is a main task in the NLP area that has yielded multiple web-based natural language processors gaining popularity in the semantic Web community for extracting knowledge from web data. These processors are generally located as pipelines, using dedicated APIs and various taxonomy for extracting, classifying and disambiguating...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2012

    Secure Communication in Unstructured P2P Networks Based on Reputation Management and Self Certification

    In unstructured P2P networks there is a possible of malicious codes and false transactions. It generates the false identities in order to perform false transactions with other identities. The proposed method uses the concept of DHT and reputation management which provides efficient file searching. The self certification (RSA ALGORITHM and...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2012

    Minimization of Average Delay, Routing Load and Packet Loss Rate in AODV Routing Protocol

    A Mobile Ad-hoc NETwork (MANET) is characterized by energy-limited nodes, bandwidth-constrained, variable-capacity wireless links and dynamic topology, leading to frequent and unpredictable connectivity changes. Since the number of nodes can be large in the network, finding a route to a destination requires frequent exchange of routing control information among the...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2012

    Enhanced Framework to Evaluate Performance & Functionality of Web Applications

    A system's efficiency is always determined by the performance like how the system responses to an input and what/ when /where the expected output is obtained, as performance and functionality are the most important features in a web application. Due to lack of multi-directional analysis, most of the software's are...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2012

    Issues of Cyber Laws and IPR in Software Industry and Software Process Model

    In conventional requirement engineering functional requirements are much focused. If non-functional requirements including cyber space issues are not specified in advance, software will be a matter of cyber accident affecting the society and economy. The greatest threat of risk to software industry, engineering process and education is due to lack...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2012

    A Novel Technique to Protect Wireless Network Against Accidental Association

    With increasing numbers of corporate and organizations deploying wireless network and allowing the company personnel to access the internet or the wired backbone through wireless access points are increasingly getting exposed to hacking attacks. Due to easy hacking tools and less concerns about the security threats of the deployed, various...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2012

    Simulation and Emulation Approach for the Performance Evaluation of Adaptive Modulation and Coding Scheme in Mobile WiMAX Network

    WiMAX is the IEEE 802.16e standard-based wireless technology, provides Broadband Wireless Access (BWA) for Metropolitan Area Networks (MAN). Being the wireless channels are precious and limited, adapting the appropriate Modulation and Coding Scheme (MCS) for the state of the radio channel leads to an optimal average data rate. The standard...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2012

    EMCV: Enhancing the Security of the Mobile Commerce Using Voice Features

    M-Commerce is an emerging market. As with any emerging market there are some significant opportunities and risks .In M-Commerce security risk is major risk which this proposed system will try to remove. The most important element of M-Commerce is security issues and how this proposed system can make it safe...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2012

    Performance of Multimedia Traffic in OLSR Routing Protocol with Weighted Fair Queuing

    An Ad hoc wireless network consists of mobile terminals communicating with each other without the help of traditional infrastructure for communication. Optimized Link State Protocol (OLSR) is a proactive routing protocol, wherein routes are discovered and updated continuously and available when required. Hello messages are generated by each node to...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2012

    A Novel Architecture of Ontology-Based Semantic Web Crawler

    Finding meaningful information among the billions of information resources on the Web is a difficult task due to growing popularity of the Internet. The future of World Wide Web (WWW) is the Semantic Web, where ontologies are used to assign (agreed) meaning to the content of the Web. On the...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2012

    Energy Efficient Protocols for Wireless Sensor Networks: A Survey and Approach

    Wireless Sensor Networks have limited resources with traditional data gathering techniques. One of the limitations of wireless sensor nodes is its inherent limited energy resource. Therefore, designing an effective wireless sensor network to maximizing the lifetime of sensor node in order to minimize maintenance and maximize overall system performance becomes...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2012

    Security Issues in Cloud Computing: A survey

    Cloud computing is attracting great attention nowadays. The elastic nature of cloud makes it suitable for almost any type of organization. The major challenge faced by cloud users and providers are security concerns towards cloud services. These security issues acts as a barrier in the growth of cloud computing. The...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2012

    A Survey of Regression Testing in SOA

    Service-Oriented Architecture (SOA) has changed the way business enterprises get aligned with technology with a very fast pace keeping the demand of re-alignment time very short. Testing of services becomes equally important in SOA implementation in the context of enterprise architecture, business re-alignment and so on maintaining quality. Unit and...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2012

    A Novel Approach to Use ZnO Thin Film as a Switching in Dynamic Random Access Memory (DRAM) Cell

    Resistance switching Random Access Memory (RRAM) has drawn considerable attention for the application in non-volatile memory element in semiconductor memory devices. A ZnO thin film now assumed to be useful for Dynamic Random Access Memory (DRAM) cell. In this paper the authors provide a framework to its use as a...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2012

    A Comprehensive Study and Performance Analysis of Facsimile Transmission Using GSM Fixed Wireless Terminal

    Facsimile continues to be communication bedrock for transmitting sensitive business critical documents with legal standing. Traditional facsimile uses PSTN network for communication. As the mobile technology advances, fixed wireless terminals are being used to connect landline devices such as telephone, fax machines etc and transmit using the mobile phone networks....

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2012

    PAPR and Bandwidth Analysis of SISO-OFDM/WOFDM and MIMO OFDM/WOFDM (Wimax) for Multi-Path Fading Channels

    In today's wireless communication, the efficient utilization of resources is the main concentration of engineers and spectrum of the most significant resources. So the aim is to exploit the bandwidth in a competent manner. From the report of FCC it is known that the 70% of spectrum occupied by several...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2012

    Embedded Bluetooth server

    This paper describes the method and progress of developing BeagleBoard-xM as wireless server. In this paper, the authors are going to use BeagleBoard-xM, which is a new low-cost low-power platform based on the Texas Instruments (TI) DM 3730 processor architecture. The DM3730 processor has dual core architecture consisting of ARM...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2012

    Robustness of Heuristic Resource Allocation Techniques in Grid Computing System

    Grid computing system consists of machines with varied computational capabilities. These systems assist in the computing of large amounts of complicated tasks in scientific and engineering areas. It may operate in an environment where system performance features degrade due to unpredictable changes, inaccuracies in the estimation of task execution times...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2012

    Event Reducing Mechanism for Cloud Architecture

    Development, implementation and maintenance of Enterprise Application are very difficult; there are several challenges like dependencies of services, response time, linking of implementation and services and rigidity of services exist in Enterprise Applications. Several approaches have been discussed so far to address the challenges of Enterprise Application Development. But several...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2012

    Worm Secure Protocol for Wormhole Protection in AODV Routing Protocol

    A Mobile Ad-hoc NETwork (MANET) is characterized by mobile nodes, multihop wireless connectivity, Non infrastructural environment and dynamic topology. In Ad Hoc network routing is the reactive on-demand philosophy where routes are established only when required. Stable Routing, Security and Power efficiency are the major concerns in this field. The...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2012

    Genetic Approach for Service Selection Problem in Composite Web Service

    Services are the basic amass that aims to support the building of business application in a more flexible and interoperable manner for enterprise collaboration. Satisfying the needs of service consumer and to become accustomed to changing needs, service composition is performed to compose the various capabilities of available services. With...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2012

    Anti-Patterns in Open Source Software Development

    In software engineering, an Anti-pattern (or Anti-pattern) is a pattern that may be commonly used but is ineffective and/or counterproductive in practice. Anti-patterns or bad practices are not novel; they are ordinary in software industry, and have been since software's inception. The foundation of anti-patterns initiated in 1980 and continued...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2012

    Data Warehouse Implementation of Examination Databases

    A data warehouse is an asset for an enterprise and exists for the benefit of an entire enterprise including business unit, individual customer, Student etc. Data in a data warehouse does not conform specifically to the preferences of any single enterprise entity. Instead, it is intended to provide data to...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2012

    The Role of Class Diagram in Estimating Software Size

    One of the subjects related to software engineering is software measurement. Software measurement itself includes different topics that estimating software size is one of them. Various methods have been proposed for estimating software size. Each studies this topic from specific approach. Since UML is a well-known notation for representing object-oriented...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2012

    Analysis of WIMAX Physical Layer Using Spatial Diversity

    IEEE 802.16 standard for Broadband Wireless Access (BWA) and its associated industry consortium, Worldwide interoperability for Microwave Access (WiMAX) forum promise to offer high data rate over large areas to a large number of users where broadband is unavailable. The emergence of WiMAX has attracted significant interests from all the...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2012

    Efficient Pheromone Adjustment Techniques in ACO for Ad Hoc Wireless Network

    Ant Colonies have emergent problem solving nature like food foraging of Ants etc.,. Such problem solving nature of Ant Colonies have inspired emergence of efficient routing algorithms, especially in Ad Hoc Wireless Networks (AWN). They get inspiration from Ants which use simple rules with no direct communication and finds the...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2012

    Multipath Data Transfer Scheme for Virtual Private Networks

    The emerging automated world necessitates an elaborate infrastructure to comply with the growing traffic and ensure a reliable mode of communication. This paper proposes a multi path Virtual Private Network (VPN) with assuaging options through which remote sites are connected over a shared provider network. It articulates a scheme with...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2012

    A Modified Projected K-Means Clustering Algorithm with Effective Distance Measure

    Clustering high dimensional data has been a big issue for clustering algorithms because of the intrinsic sparsity of the data points. Several recent research results signifies that in case of high dimensional data, even the notion of proximity or clustering possibly will not be significant. K-Means is one of the...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2012

    Approach of Association Rules Mining for Service Discovery in Mobile Adhoc Network

    The Service Discovery in Mobile Ad-hoc NETworks (MANET) is a difficult task because of the changing nature of such networks. Different services are available in MANET considering time and location. Many varying traditional solutions to service discovery of Internet are not well suited for MANET because of their Ad hoc...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2012

    Performance Comparison of AODV and DYMO MANET Protocols Under Wormhole Attack Environment

    A Mobile Ad-Hoc network, or MANET, is an infrastructure less, self-configuring network. All wireless devices in MANETs are connected through wireless links. Mobile wireless networks are more vulnerable to information and physical security threats than fixed wireless networks. Due to the use of open and shared broadcast wireless channel and...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2012

    Studies on Research and Development in Web Mining MANET Protocols Under Wormhole Attack Enent

    World Wide Web has changing into one amongst the foremost comprehensive data resources. It most likely, if not perpetually, covers the data requirement for any user. However the net demonstrates several radical variations to traditional information containers such as databases in schema, volume, topic coherence etc. Web mining techniques could...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2012

    On the Estimationof the Software Effort and Schedule Using Constructive Cost Model - II and Functional Point Analysis

    Cost estimation is an important aspect for making high-quality management decisions in the software industry. It is also related to determining how much effort and schedule are needed to complete the task on time. The challenge is to predict the accuracy of software development effort and schedule. Several models and...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2011

    A Co-Operative Intrusion Detection System in Mobile Ad-Hoc Network

    Mobile ad-hoc networking has become an exciting and important technology in recent year because of the rapid proliferation of wireless devices. The security of data becomes more important with the increased use of commercial application over wireless network environments; there were several problems of security in wireless networks due to...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2012

    Social Impact of Internet Access: A Survey

    Internet is a network of networks that consists of millions of private, public, academic, business, and government networks, of local to global scope. Today, the Internet is a public, cooperative, and self-sustaining facility accessible to hundreds of millions of people worldwide. A social networking service is an online service, platform,...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2012

    An Integrated Framework for Malware Collection and Analysis for Botnet Tracking

    In proposed framework, the authors have used Honypots as malware capturing tool. The proposed system design is unique in the sense that the information regarding the configuration of honeypot on which malware sample has been captured is saved with malware sample in the malware data-base. This system configuration information saved...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2012

    Analyzing Digital Signature Robustness with Message Digest Algorithms

    In this paper, the authors have analyzed the robustness of various message digest with respect to digital signature. The repetitive sequences in the digest will decrease the robustness of the message digest as it can lead to same message digest for differing message blocks. In this paper, the robustness of...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2012

    Alternate Path Approach to Avoid Intrusion Detection in Wireless Sensor Networks

    Wireless Sensor Network (WSN) is a new computing paradigm that emerged from the fusion of the SCADA systems and ad-hoc networks technologies. WSN derives the networking characteristics of ad-hoc network and combines it with the hardware facilities of tiny wireless sensors. Once a sufficient number of nodes have been deployed,...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2012

    Vertical Handover Decision (VHD) Algorithms in Fourth Generation Heterogeneous Wireless Networks

    One of major objectives of the Fourth Generation wireless network architecture is to facilitate seamless mobility of users between heterogeneous networks while satisfying QoS requirements. Vertical Handover Decision (VHD) algorithms are essential components of the architecture of the Fourth Generation (4G) heterogeneous wireless networks. These algorithms need to be designed...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2012

    An Approach Initiating Security Protocol Towards Cloud Computing

    Cloud computing is a long awaited and now implemented dream of having interactive services and software applications, at reduced operational cost in the IT market, at highly automated and performance-based system, an on-demand services and these are just a few of the advantages that what cloud computing bring to users...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2012

    A More Secure Hashing Scheme for Information Authentication

    The protection of information authentication is based on cryptographically secure hash function. A function that compresses an arbitrarily large message into a fixed small size message digest' is known as a hash function. The most currently used hash functions are based on block ciphers and the dedicated hash functions e.g....

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2012

    Wireless Sensor Networks and Security Challenges

    Wireless Sensor Networks (WSN) is an emerging technology and have great potential to be employed in critical situations like battlefields and commercial applications such as building, traffic surveillance, habitat monitoring and smart homes and many more scenarios. One of the major challenges wireless sensor networks face today is security. While...

    Provided By International Journal of Computer Applications