International Journal of Computer Applications

Displaying 601-640 of 4044 results

  • White Papers // Aug 2013

    Cluster Analysis in Data Mining Using K-Means Method

    To find the unknown and hidden pattern from large amount of data of insurance organizations. There are strong customer base required with the help of large database. Cluster analysis is an excellent statistical tool for a large and multivariate database. The clusters analysis with k-means method may be used to...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2013

    Encode Decode Linux Based Partitions to Hide and Explore File System

    One of the big advantages of using Linux is that its security tends to be so much better than that of the competing alternatives. Linux has gained its popularity as an open source operating system and has been used for workstations and servers. Due to the growth of its usage...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2013

    A Review of Data Cleansing Concepts - Achievable Goals and Limitations

    Data Cleansing is an activity involving a process of detecting and correcting the errors and inconsistencies in data warehouse. It deals with identification of corrupt and duplicate data inherent in the data sets of a data warehouse to enhance the quality of data. This paper looked into investigating some research...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2013

    Secured Hash2 Based Message Authentication Code Using GUI Controls

    The message that originated from an authorized user is defined as User Authentication and is provided by Message Authentication Codes (MAC). The provision of assurance that the message is not been modified is defined as Message Authentication and is provided by Hash functions. Authenticated code is generated when MAC uses...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2013

    A Novel Algorithm for Privacy Preserving Distributed Data Mining

    With the development of data mining science and information technology, distributed data mining was considered. Distributed data mining was submitted with different purposes, such as increasing the accuracy of result and using data from multiple sources. With the development of distributed data mining, challenges in this field were introduced soon....

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2013

    Policy Specification in Role Based Access Control on Clouds

    Cloud Computing is a set of IT Services that are provided to a customer over a network and these services are delivered by third party provider who owns the infrastructure and reduce the burden at user's end. Now-a-days researchers devoted their paper access control method to enhance the security on...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2013

    A Review on Mobile Cloud Computing and Issues in It

    Cloud computing is one of the emerging technology in this modern era. Some years back, this concept was related to only simple desktop computers or personal computers and static data centers and so on but now research is going on to implement this concept to mobiles also. So, in this...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2013

    Improved Cluster Partition in Principal Component Analysis Guided Clustering

    Principal Component Analysis (PCA) guided clustering approach is widely used in high dimensional data to improve the efficiency of K- means cluster solutions. Typically, Pearson correlation is used in PCA to provide an eigen-analysis to obtain the associated components that account for most of the variations in the data. However,...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2013

    Multi-Dimensional and Multi-Level Authentication Techniques

    Current authentication schemes suffer from many weaknesses. Textual passwords are widely used; however users tend to choose meaningful words from dictionaries. This makes textual passwords easy to break and vulnerable to dictionary or brute force attacks. Many available graphical passwords face lack of space. Smart cards or tokens can be...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2013

    A Comprehensive Approach for Embodiment of Security Activities with Agile Methodologies

    Agility among the software is seeking importance during the development phase, as it promotes adaptive planning, incremental and evolutionary development with many other features that are lightweight in nature. Security is one of the major issues in today's highly agile software development industry. More emphasize is on to produce a...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2013

    Online Signature Forgery Prevention

    Personal identity verification is of great importance in today's world which is full of frauds and forgeries. A signature being a very good biometric has been since a long time for personal identity verification. Signature verification is the process used to recognize an individual's handwritten signature to prevent fraud. In...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2013

    An Improvement of Wang. Et. Al.'s Remote User Authentication Scheme Against Smart Card Security Breach

    User authentication is one of the fundamental procedures to provide secure communications between user and server over an insecure public channel. Recently, Wang et. al. proposed password-based user authentication scheme based on hash function and modular exponentiation and they claimed that their scheme provides strong authentication than related scheme. But...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2013

    Cryptanalysis and an Efficient Secure ID-Based Remote User Authentication Scheme Using Smart Card

    Remote User authentication protocol is used for verifying the legitimacy of a remote user over insecure network environments. Recently, many secure ID based remote user authentication scheme using smart card have been proposed in the literature. In 2012, they proposed secure ID based remote user authentication scheme using smart card...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2013

    Authentication Schemes for Open Distributed Network: A Classification

    An authentication protocol is a sequence of message exchanges between entities that either distributes secrets to some of those principals or allows the use of some secret to be recognized. Distributed network, such as sensor and mobile ad hoc networks, must conquer a numerous of security challenges to realize their...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2013

    Comparative Study of Data Mining Tools and Analysis with Unified Data Mining Theory

    Today almost everyone has access to huge amount of data. Several wide spread organizations have their own large data repositories, data warehouses, which are still expanding with queries over data and the need for extraction of most beneficial data pattern and refined knowledge. This necessity is followed by the requirement...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2013

    Java Web Deployment in Cloud Computing

    Cloud Computing is a revolutionary IT field in today's world. Several technologies like java; python provides deployment on clouds using respective tools. In this paper, the web deployment in cloud computing with java and the performance issues of the java deployment on a cloud is discussed. There are several tools...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2013

    Computer Aided Technique for Finger Print Image Enhancement and Minutiae Extraction

    Biometrics is the science and technology of measuring and analyzing biological data of human body, extracting a feature set from the acquired data, and comparing this set against to the template set in the database. Biometric techniques are gaining importance for personal authentication and identification as compared to the traditional...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2013

    An Intellectual Approach for Providing Secure Environment in Real World Web Application

    In recent years, widespread adoption of the internet has resulted in rapid advancement in information technologies. Internet is used by the general population for the purposes such as financial transactions, educational activities and countless other activities. This development of the Internet use has unfortunately been accompanied by a growth of...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2013

    Password Authentication System Using New Intense Secure Algorithm in Mobile and Server in Two Way Communications

    Authentication is a process of determining whether a particular individual should be allowed to access a system or an application. According to Email, the unauthorized people easy to hack other user email Id. Authentication is the first line of defense against compromising confidentiality and integrity Traditional login password may not...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2013

    Mapping Process of Relational Data to OWL Class Instances Using XSLT

    Ontologies are widely used in many domains and evolve as domains change. From the other side, the relational database technology has ensured the best facilities for storing, updating and manipulating the information of problem domain. The authors propose in this paper a transformation process from existing data in relational databases...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2013

    Combined Keyword Search Over Encrypted Cloud Data Providing Security and Confidentiality

    In this paper, the authors propose multi-user searchable encryption with the help of order preserve encryption for providing efficient encrypted data. when proposed these constructions it formally defines the multiuser settings for ranked keyword search by using searchable symmetric encryption and order preserve symmetric encryption. Consider a data owner is...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2013

    Architectural Framework for Secure Composite Web Services

    The exorbitant growth in the field of web services technology has challenged the web developers, vendors and researchers to design and development a variety of enterprise web applications for diverse organizations. Since, security is considered to be an essential part in the development of web applications, web services security has...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2013

    Process Optimization Time for a Service in 4G Network by SNMP Monitoring and IAAS Cloud Computing

    This paper discusses the energy consumption problem of 4G network devices that use a much higher energy compared to the 3G network for example, due to heavy applications that require multiple resources. To overcome this problem, a combination was proposed between network monitoring in 4G, which is based on SNMP...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2013

    Mitigating Vulnerabilities in 3-Factor Based Authentication

    Remote user authentication schemes are use to identify a user in the distributed environment. There are three different factors commonly use for authentication purpose named as password, smart card and biometric. It is been observed that authentication protocols designed till date are based on password. Normally, password is used as...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2013

    A New Approach to Manage and Utilize Cloud Computing Underused Resources

    In this paper, a new approach for driving a better cloud computing IaaS Services is presented. This approach focuses on extending the available cloud computing platform infrastructure by harvesting underused generic computing resources that are widely available within public domains such as universities and organizations. Most of the current cloud...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2013

    Improving the Intrusion Detection Using Discriminative Machine Learning Approach and Improve the Time Complexity by Data Mining Feature Selection Methods

    As the dependence of daily life is increasing on Internet technology, the attacks on the systems, servers are also rapidly increasing. The motives of attacks are to steal the confidential data from the systems or making the system unavailable to the authorized users. An effective approach is required to detect...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2013

    Trust and Shortest Path Selection Based Routing Protocol for MANET

    Mobile Ad-hoc NETwork (MANET) comprises a Collection of wireless nodes that does not rely on any fixed infrastructure or base station. Trust based routing in MANET is challenging task due to its on demand dynamic nature which makes it susceptible to various types of attacks such as black holes, Byzantine,...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2013

    Survey on Sequential Pattern Mining Algorithms

    Sequential pattern mining is a significant data-mining method for determining time-related behavior in sequence databases. The information achieved from sequential pattern mining can be used in marketing, medical records, sales analysis, and so on. Existing methods only focus on the concept of frequency because of the assumption that sequences' behaviors...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2013

    An Impact of Biometric System Applications Services on Biometric Service Market

    ISO (International Organization for Standardization) and IEC (the International Electro-technical Commission) form the specialized system for worldwide standardization. The first standard of this deals with the threat and countermeasure of biometrics and biometric system application models. Additionally, this international standard provides requirements and guidelines for the secure and privacy -...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2013

    Programmer Protocol for Identification and Defense of Latest Web Application Security Threats Using Open Source Tools

    There has been an exponential increase in the number of attacks on web applications during the recent years. This paper presents a guideline for programmers to develop robust web applications in terms of security by identification of latest web application security vulnerabilities and devising their control using open source dynamic...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2013

    Performance Evaluation of Large Scaled Applications Using Different Load Balancing Tactics in Cloud Computing

    There is no doubt that workload distribution in cloud computing is one of the most important factors that regulates and dictates, directly or indirectly, its behavior and affects system performance. But geographical location of the datacenter and the user group is also an important factor that affects the overall performance...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2013

    A Tripartite Signcryption Scheme with Applications to E-Commerce

    Achieving confidentiality and authentication in e-commerce transactions are among the primary security goals. In this paper, a new cryptographic scheme is proposed which guarantees the authenticity of the customer and ensures the confidentiality of the communications among the bank, the merchant and the customer. The proposed solution is the use...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2013

    Algorithms for Task Consolidation Problem in a Cloud Computing Environment

    Cloud computing has recently emerged as a new paradigm for hosting and delivering services over the Internet. Task consolidation problem in cloud computing systems became an important approach to streamline resource usage which improves energy efficiency. The task consolidation is also known as workload consolidation problem which is the process...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2013

    Efficient and Robust Multimodal Biometric System for Feature Level Fusion (Speech and Signature)

    A Pattern can be characterized by more or less rich & varied pieces of information of different features. The fusion of these different sources of information can provide an opportunity to develop more efficient biometric system which is known as multimodal biometric System. Multimodal biometrics is the combination of two...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2013

    Data Understanding Analysis for Analytical Mining IDS

    With the ephemeral time every information stands a greater risk of being exposed than ever before. System's security is endangered in a blink and intrusion takes place. Keeping this in mind, the effectiveness of various data mining approaches are discussed. Some methods involved in classification and clustering are stated. Analysis...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2013

    Modular Approach for Face Recognition System Using Multilevel Haar Wavelet Transform, Improved PCA and Enhanced Back Propagation Neural Network

    With rapidly developing technology, it is important to invent an efficient and effective security system that will help to detect unauthorized access on any system. Hence it is essential necessary to implement a highly secure, economic and reliable face recognition system to enable the protection of computer systems from unauthorized...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2013

    Review and Analysis of the Security Issues in MANET

    Mobile Ad-hoc NETworks (MANETs) are one of the fastest emerging networks. MANET is a unstructured network in which nodes are mobile. This mobility may leads to insecurity in MANET. BFOA (Bacterial Foraging Optimization Algorithm) is a Bio-inspired Algorithm. This algorithm simulates behavior of bacteria that can be effectively applied in...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2013

    Resource Allocation with Improved Min-Min Algorithm

    A distributed system is a software system in which components located on networked computers communicate and coordinate their actions by passing messages. Most of the existing solutions on task scheduling and resource management in distributed computing environment are based on the traditional client/ server model, enforcing a homogeneous policy on...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2013

    An Efficient ID-Based Proxy Signcryption Scheme Without Bilinear Pairings

    Signcryption is a cryptographic primitive which simultaneously provides both confidentiality and authenticity in a single logical step. Signcryption based on elliptic curves provides the same level of security using smaller keys compared to schemes based on the discrete logarithm problem over finite fields. Identity-based cryptography serves as an efficient alternative...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2013

    Intrusion Detection and Prevention System: Issues and Challenges

    In spite of the tremendous growth of technologies in computer networking and information technology, still the authors lack in preventing their resources from theft/attacks. This problem is very big as far as industry/ companies are concerned. As maximum of the organizations are facing an increasing number of threats every day...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Performance Enhancement of TCP Using ECN and Snoop Protocol for Wi-Max Network

    Providing Internet services over wireless links has grown rapidly in recent years. TCP (Transmission Control Protocol) has been performing well over the traditional wired networks where packet losses occur mostly because of congestion, it cannot react efficiently in wireless networks, which suffer from significant non-congestion-related losses due to reasons such...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    A Blind DCT Domain Digital Watermarking for Biometric Authentication

    In this paper, an efficient blind digital image watermarking algorithm using mapping technique is presented. The algorithm can embed or hide an entire image or pattern (logo) directly into the original image. The embedding process is based on changing the selected DCT coefficients of the host image to odd or...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    A Hybrid Genetic Algorithm Approach to a Departmental Class Timetabling Problem Using Efficient Data Structures

    The application of Genetic Algorithm with a local search operation performed within its loop has provided very accurate results, but the algorithm take a lot of time to arrive at an optimal solution. This paper describes the use of a Hybrid Genetic Algorithm using efficient data structures to automate the...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    An Image Compression Algorithm for Discontinuous Series of Similar Pixels

    This paper represents lossy compression technique which can be effectively used for correlated pixels in both continuous and discontinuous series. Generally, compression is achieved by reducing redundancy through removal of similar pixels. Here, dependency of effective compression over their continuity has been removed. The efficiency of the proposed method has...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2011

    DDCA in Cellular Network Using Fuzzy Rule Based Multiagent System

    Present mobile networks have different Quality of Service (QoS) requirements to support increasing need with major objectives such as better admission control, effective bandwidth utilization, and fault tolerance. So the network aims at satisfying their demands without much degradation of quality in terms of call dropping and call blocking. It...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Implementation Analysis of RETT-Gen Routing Protocol

    Wireless sensor networks are composed of a large number of sensor nodes with limited energy resources energy efficiency is a key design issue that needs to be enhanced in order to improve the life span of the entire network. In RETT-gen, the authors transform the expected lifetime of each sensor...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Simplification of Boolean Algebra Through DNA Computing

    DNA Computing utilizes the properties of DNA for performing the computations. The computations include arithmetic and logical operations such as simplification of Boolean expression to its simplest form. Boolean function can be built from ANDs, ORs, and NOTs using minterm expansion. However, a practicing computer engineer will very rarely be...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    A Novel Multiple Key Block Ciphering Mechanism with Reduced Computational Overhead

    Cryptanalysis of symmetric key cryptography encourages large key size and complex operations to achieve message confidentiality. All these techniques pose computational overhead at both the sender & receiver ends. In this paper, the authors propose a simple yet powerful Block Cipher Multiple Key Symmetric Encryption (BCMKSE) algorithm for achieving both...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Study of RSA and Proposed Variant Against Wiener's Attack

    The paper discusses encryption schemes such as public key algorithms (RSA) and One Time Pads. It also discusses various attacks on the RSA algorithm. A brief introduction to Modular Arithmetic, which is the core arithmetic of almost all public key algorithms, has been given. In this paper, the authors propose...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Routing Approaches in Delay Tolerant Networks: A Survey

    Delay Tolerant Networks (DTNs) have evolved from Mobile Ad Hoc NETworks (MANET). It is a network, where contemporaneous connectivity among all nodes doesn't exist. This leads to the problem of how to route a packet from one node to another, in such a network. This problem becomes more complex, when...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    A New Text Mining Approach Based on HMM-SVM for Web News Classification

    Since the emergence of WWW, it is essential to handle a very large amount of electronic data of which the majority is in the form of text. This scenario can be effectively handled by various Data Mining techniques. This paper proposes an intelligent system for online news classification based on...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2011

    Optimization of Spatial Association Rule Mining Using Hybrid Evolutionary Algorithm

    Spatial data refer to any data about objects that occupy real physical space. Attributes within spatial databases usually include spatial information. Spatial data refers to the numerical or categorical values of a function at different spatial locations. Spatial metadata refers to the descriptions of the spatial configuration. Application of classical...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2011

    DNA Based Cryptography: An Approach to Secure Mobile Networks

    Security has always been the main concern in data communication and networking. Mobile Networks are highly vulnerable to security attacks and pose a great challenge for the wireless networks being used today. Since the mode of communication is open, these networks do not carry any inherent security and hence are...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    An Overview on Tools for Peer to Peer Network Simulation

    A simulation is an attempt to model a system in order to study it scientifically. Simulations are the most popular tool for examine Peer-to-Peer (P2P) applications. The cost of implementation of simulated model is less than that of large-scale experiments and, if carefully constructed, the simulated model can be more...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Analysis of Parallel Merge Sort Algorithm

    The parallel computing on loosely coupled architecture has been evolved now days because of the availability of fast, inexpensive processors and advancements in communication technologies. The aim of this paper is to evaluate the performance of parallel merge sort algorithm on loosely coupled architecture and compare it with theoretical analysis...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    A Global QoS-Aware Service Composition in Wireless Sensor Networks

    Wireless Sensor Networks (WSN) present a challenging programming environment because of their limited resources, heterogeneity and highly dynamic nature. Service Oriented Computing (SOC) can simplify application development by hiding platform-specific capabilities behind services. Their services are dynamically discovered and used at run time, enabling application to be platform independent and...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2011

    Universal Steganalysis Using Feature Selection Strategy for Higher Order Image Statistics

    The purpose of image steganalysis is to detect the presence of hidden message in cover photographic images. Supervised learning is an effective and commonly used method to cope with difficulties of unknown image statistics and unknown steganography. Present paper proposes; a universal approach for steganalysis for detecting presence of hidden...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2011

    Provable Secured Hash Password Authentication

    The techniques such as Secured Socket Layer (SSL) with client side certificates are well known in the security research community, most commercial web sites rely on a relatively weak form of password authentication, the browser simply sends a user's plaintext password to a remote web server, often using SSL. Even...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    DU-Regs: Online Dynamic Approach to Visualize Impact Analysis for Regression Testing

    Software evolution is an ongoing process carried out by software maintainer's in order to meet the increasing demand, pressure and requirements for extending base applications for adding new functionalities, for fixing bugs or for adapting software to the changing environments. As a result, it establishes the need for estimating and...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    An Efficient Detection and Resolution of Generalized Deadlocks in Distributed Systems

    In this paper, the authors propose a new algorithm to detect and resolve distributed deadlocks in the generalized model. The initiator of the proposed algorithm diffuses the probes along the outgoing edges of Wait-For Graph (WFG) and collects the replies that carry the dependency information between processes directly. However, the...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Scalable Rekeying Limited to Subgroup Using Hybrid key Trees

    Maintaining security is a critical issue in any group communication protocols. The objective of security in a group communication is to ensure the access only to the legitimate members of the multicast group. The entry and eviction of the members are the main criteria to change the group key and...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Neural Network Implementation for Integer Linear Programming Problem

    Integer Linear Programming Problem (ILPP) is a special case of Linear Programming Problem (LPP) in which a few or all the decision variables are required to be non-negative integers. For solving ILPP, normally Gomory cutting plane or Branch and Bound technique is used. In this paper, for implementation of the...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Fuzzy Grading for Content Management in E-Learning Systems

    The authors are motivated by the concept of refinement in e-learning systems so as to provide more support for the e-learners. A technique has been proposed for providing a customized knowledge in the form of graphics, text, analogy etc by grading mechanism using fuzzy techniques through which the knowledge level...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2011

    Improving Performance of Algorithms in Distributed Computing with Perspective of Green Information Technology

    In Distributed Computing approach, it is followed to assign a job to a processor if it is idle. The focus is now on how to optimize resources to decrease the energy consumption by volumes of computing equipments to deal with green and sustainability issues. So that to save environment from...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Differential Learning Algorithm for Artificial Neural Networks

    Artificial Neural Networks (ANN) is extremely useful to relate the nonlinearly depending outputs with the inputs. Various architectures are available for the ANNs to speed up the training period and reduce the square error. In this paper, new classes of neural networks with differential feedback are presented. The different orders...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Retrieval of Offline Handwritten Signatures

    Similarity retrieval of images is an important task in database applications. In such applications, effective organization and retrieval of images can be achieved through indexing. In this paper, the problem of quick retrieval of offline signatures in the context of database of signature images is addressed. The proposed methodology retrieves...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Offline Signature Verification: An Approach Based on Score Level Fusion

    In this paper, the authors propose a new approach for offline signature verification based on score level fusion of distance and orientation features of centroids. The proposed method employs symbolic representation of offline signatures using bi-interval valued feature vector. Distance and orientation features of centroids of offline signatures are used...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Iterative Search with Incremental MSR Difference Threshold for Bi Clustering Gene Expression Data

    The goal of biclustering in a gene expression data matrix is to find a submatrix such that the genes in the submatrix show highly correlated activities across all conditions in the submatrix. A measure called Mean Squared Residue (MSR) is used to simultaneously evaluate the coherence of rows and columns...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Image Compression with Adaptive Arithmetic Coding

    An image compression method using the wavelet transform, zero tree coding and adaptive arithmetic coding has been proposed. Here a novel static zeroth order adaptive arithmetic coder is being explored to improve the compression ratio. The proposed method decomposes an image into several sub band images using the discrete wavelet...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Root Cause Analysis of Congestion in Wireless Sensor Network

    In wireless sensor networks data, which get generated, is not always same; some data may be more important than others and having different priorities. As deployment sizes and data rates grow, congestion becomes a major problem in these networks. The congestion results in arbitrary dropping of data packets that reduce...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2011

    AI Applications to Distribution System with Distributed Generation

    In this paper, Artificial Neural Network, one of the Artificial Intelligence (AI) techniques, for the Volt/Var control in power distribution systems with Dispersed Generation (DG) is proposed. Artificial neural networks have been considered due to their ability for real time control, simpler calculations and adaptability to different operating conditions. Neuro-controllers...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Optimizing Delivery Mechanisms in Wireless Mesh Network with QOS Constraints

    In this paper, the authors have considered a Wireless Mesh Network (WMN) with multiple Internet GateWays (IGW) and wired network support for maximizing the delivery in the WMN access network. They have considered the WMN in IEEE 802.11s framework that nodes can transit from one IGW region to the other...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Privacy and Utility Preserving Task Independent Data Mining

    Today's world of universal data exchange, there is a need to manage the risk of unintended information disclosure. Publishing the data about the individuals, without revealing sensitive information about them is an important problem. Kanonymization is the popular approach used for data publishing. The limitations of K- anonymity were overcome...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Fingerprint Core Point Detection Algorithm Using Orientation Field Based Multiple Features

    Fingerprint recognition is a widely used biometric identification mechanism. In case of correlation based fingerprint recognition detection of a consistent registration point is a crucial issue; this point can be a core point of a fingerprint. Many techniques have been proposed but success rate is highly dependent on input used...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Survey on Frequent Item Set Mining Algorithms

    Many researchers invented ideas to generate the frequent itemsets. The time required for generating frequent itemsets plays an important role. Some algorithms are designed, considering only the time factor. The authors' paper includes depth analysis of algorithms and discusses some problems of generating frequent itemsets from the algorithm. They have...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Ant Colony Optimization Technique Applied in Network Routing Problem

    In this paper, the Ant Colony Optimization Technique has been applied in different network models with different number of nodes and structure to find the shortest path with optimum throughput. Three variations of the Ant Colony Optimization Technique, ACO1, ACO2 and ACO3 has been proposed and applied on different standard...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2011

    A Novel Approach for Managing Channels in Wireless Network

    In this paper, the authors propose a Channel Management Algorithm at the Access Points (APs) of Wireless Local Area Network (WLAN) in order to maximize the efficiency of the network by managing users on different channels such that the overall throughput is maximized. They start with the channel assignment at...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    A Novel Cluster Based Routing Algorithm for Hybrid Mobility Model in VANET

    This paper proposes a new approach for cluster based routing algorithm for hybrid mobility model to regulating the vehicular traffic. The authors' approach uses a new hybrid mobility model combining random way point and group mobility model using static and dynamic sources and a novel cluster based routing algorithm. To...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Human Recognition in Passive Environment Using Bidirectional Associative Memory

    Automated Human recognition is challenging area to identify the human based on characteristics such as behavioral or physical. In this paper, the authors propose a noble approach for identifying the human by combining the two biometric face and ear recognition through bidirectional associative memory. This approach can be more suitable...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2011

    MIMO Based Efficient JPEG Image Transmission and Reception by Multistage Receivers

    This paper deals with the efficient transmission of JPEG compressed images over Multiple Input Multiple Output (MIMO) systems using spatial multiplexing. By exploiting the spatial multiplexing using multiple antennas; data-rate, reliability, and throughput can be improved. The JPEG compressed image is divided into different quality layer and the antenna path...

    Provided By International Journal of Computer Applications