International Journal of Computer Applications

Displaying 601-640 of 8029 results

  • White Papers // Apr 2015

    Adaptive HMM based Speech Recognition to Recognize Multi-lingual Sentence

    Hidden Markov Models (HMMs) provides an effective framework for the modeling of time-varying sequence of spectral vector. An approach of mapping signal to discrete signal is to define it as a set of acoustic featured symbol over a minimal but constant time interval. This paper is to recognize the speech...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Speech Recognition System: A Review

    To be able to control devices by voice has always intrigued mankind. Today, after intense research, speech recognition system, have made a niche for themselves and can be seen in many walks of life. The accuracy of speech recognition systems remains one of the most important research challenges e.g. noise,...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    A Review on Different Approaches for Speech Recognition System

    In this paper, the authors present the basic idea of speech recognition, proposed types of speech recognition, issues in speech recognition, different useful approaches for feature extraction of the speech signal with its advantage and disadvantage and various pattern matching approaches for recognizing the speech of the different speaker. Now-a-days,...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Enhanced Secure Protocol for Reliable Data Delivery

    The authors are providing the concept of securing the data in the MANET environment to get the high confidentiality rate while transferring the data in the network. The enhanced spread is a concept of transforming the data into the network by dividing the secret message into multiple data parts by...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    3D Modeling and Simulation using Image Stitching

    In recent years, 3D modeling has played an increasingly significant role in various fields, including motion pictures, video game industry, earth science and medical industry. Yet, 3D modeling continues to be a complex and tedious process which involves the use of various high-end devices such as 3D scanners which in...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Optimizing the Algorithm for Secure and Dynamic Cloud Storage using MHT

    With the consistently increasing demand of storing data backup online by millions of users, cloud computing - which provides resources both hardware and software as a service through a network (usually internet) has gained much momentum and attention. Storing data on cloud services relieves the user from the task of...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Applications of Artificial Intelligence in Machine Learning: Review and Prospect

    Machine learning is one of the most exciting recent technologies in artificial intelligence. Learning algorithms in many applications that's users make use of daily. Every time a web search engine like Google or Bing is used to search the internet, one of the reasons that works so well is because...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    An Effort Estimation Model for Software Development using Ensemble Learning

    For a successful project development, it is important for any software organization that the project should be completed within time and budget and the project should have requisite quality. This paper presents an ensemble learning based adaptive neuro-fuzzy approach for software development time estimation. This paper is based on ensemble...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Use of Genetic Approach for Test Case Prioritization from UML Activity Diagram

    Software testing plays an important role for evaluation of the quality of the software. Quality of the software depends upon the kind of testing strategies applied by the software tester who generates valid and invalid test cases for evaluating the quality of software. For optimizing the testing procedure, testing paths...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Scaling the Effectiveness of Existing Compressive Sensing in Multimedia Contents

    Compression has always played a crucial role in storage and transmission of heavier multimedia files. The existences of compression algorithms are more than two decade old. The normal compression algorithms are sometimes not required to process a signal in many cases where the signals are sparse. In such cases, compressive...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Grover's QSA based MC-CDMA Detector

    Multi-Carrier Code Division Multiple Access (MC-CDMA) is considered as one of the major techniques used in 4G broadband wireless services. It combines the advantages of the OFDM systems, of robustness to the multi path effects, and the advantages of CDMA systems, which are high privacy and security. However, a problem...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    A Systematic Review for Assisting the Echolalia Attacked Autism People using Robot and Android Application

    In this paper, the authors investigate in assisting echolalia attacked autism people with the help of mobile application. One of the biggest challenges that the society faces is ensuring that autistic children communicate and interact socially, so that they may develop their skills and consequently, contribute to the society. This...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Cloud Security Issues and Impact on Social Media

    Social networking sites enable users to interact with others and share experiences, feelings and opinions. When the people upload a video on YouTube, the video gets stored in the cloud; when they store photographs on Flickr or post them on Facebook page, the photos are said to get stored in...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Analysis on Cloud Computing Security Issues, Threats and Solutions

    Cloud computing is becoming very popular computing standard for network application. It is the result of existing technologies and paradigms. It is a set of resources and services offered to customers through network or internet. It provides resources that are provided as on request services to end user. It mainly...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    New Scheme for Avoiding Node Compromise Attacks in Wireless Sensor Network

    Sensor networks are often deployed in unattended environments, thus leaving these networks vulnerable to false data injection attacks. In a large-scale sensor network individual sensors are subject to security compromises. Numerous authentication schemes have been proposed in the past for protecting communication authenticity and integrity in wireless sensor networks. Most...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    An Energy Aware Multiple Sink Repositioning Algorithm for Improving Lifetime in Wireless Sensor Networks

    In wireless sensor networks, potential sink selection and sink movements are costly in terms of node energy. In this paper, the authors propose k-partitioned minimum depth tree using the optimal search in placing optimal number of sinks in sensor networks for improving the network lifetime maximization. Initially, the optimal number...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Quality of Service Routing in MANET Using Trusted AODV (TS-AODV)

    Mobile Ad-hoc NETworks (MANETs) are wireless networks, self-directed, self-configuring and quickly deployable and operate without infrastructure. It is an impartial network where nodes communicate with each other without the need of any additional resources and move randomly thus forming a dynamic topology. Nodes are often susceptible to failure thus making...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Comparitive Study on Various Cryptographic Techniques

    In today's world of internet technology that covers especially communication network security is a challenging issue. Hackers try to gain control over the people's system and steel data from it. To avoid this providing network security is an important task. Cryptography along with its various methods is used to serve...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Performance Analysis of Asymmetric Cooperative Relaying Schemes for SISO Systems

    One of the most challenging aspects of wireless communication is the wireless channel which is subjected to fading. Fading leads to deterioration of the signal quality at the receiver. Co-operative relaying is considered to be one of the most versatile techniques to overcome fading. In this paper, serial, parallel and...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Braille-Coded Gesture Patterns for Touch- Screens a Character Input Method for Differently Enabled Persons using Mobile Devices

    Mobile phones play an important role not only in a normal person's life but also in the lives of visually impaired and differently enabled people. This paper emerges and grows gradually in the field of interaction systems between mobile phones and visually impaired persons. This paper describes the new Braille-coded...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Detection of Steganographic Intrusion in Cloud

    The customers try to migrate the data from desktop to cloud. The data stored in cloud is targeted by potential threat. A potential threat is caused due to malicious hacker attack or data leakage in cloud. These threats in cloud environment arises the need for providing secure and safe information...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Microscopic Comprehension of P1 Type of Pre Production Defects in Software Development Process

    Existence of defects during software development process is basically attributable to the intrinsic complex nature of software. Hence, various defect management techniques are adopted in software industries in order to enhance the level of confidence during software development process such that the end product is deployed with as minimal defects...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    MORAVIG: An Android Agent for the Project Mobile e-Learning Session

    At present, cloud computing enables new ways to access services anywhere, at any time and using any devices (smart phones, tablet computers, laptops, desktops etc.). The need of deploying distributed applications such as multi-agent systems on handheld devices is becoming more and more important in Massive Open Online Courses (MOOCs)....

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    A Novel Approach for Providing the Customer Churn Prediction Model using Enhanced Boosted Trees Technique in Cloud Computing

    Organizations earns huge amount of money by providing the different services to their customers. In today's world of competition, organizations need to focus on customer relationship management. Retaining the existing customers is as much important as attracting the new customers for an organization. For this purpose, organizations use data mining...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Regional Development Classification Model Using Decision Tree Approach

    Regional development classification is one way to look at differences in levels of development outcomes. Some frequently used methods are the shift shares gain index, the index Williamson and Klassen typology. The development of science in the field of data mining, offers a new way for regional development data classification....

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Review of Effective Human Resource Management Techniques in Agile Software Project Management

    Agile-driven human resource approaches are a departure from plan-driven traditional human resource management approaches. Moreover, research and surveys have shown that adopting agile human resource methodologies are an efficient way of excelling in agile software project management with significant advantages in production costs, time-to-market, complexity and quality improvement over traditional...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Hierarchical Structure Based Job Group Resource Allocation Scheduling Model

    In grid environment, the resource management system schedules the jobs to specific resources with trying to minimize some objective functions. This paper considers the hierarchical structure of grid with multiple level resource schedule model which divides the tasks into group according to minimum execution time assigns and these groups to...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Recent Trends towards Green Clouds by using Fuzzy based Live Migration

    Cloud computing is just a new field in Web computing that provides novel views in internetworking systems and improves problems in the architecture, style and implementation of present communities and knowledge centers. It is the Internet based computing where essential shared servers provide software, infrastructure, platform, devices and other resources...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Study of Green IT: Present to Future

    The exponential growth in users of computer over the years has impacted environment drastically. A primary concern of this paper is to study the transformation of computer state from grey to green. Green IT is basically referred to green computing. This paper shows how the emerging green technology reduces the...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Automatic Obligation Generation and Monitor System for Privacy Policy to DBMS

    Data stored in the database includes personnel and sensitive data. Privacy policies in the database management system can control collection, access and disclosure of data. Policies are used to specify obligation. Obligation is certain actions or condition which has to be satisfied for accessing data. This paper is to enable...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    A Secure Private Cloud Server Implementation for Data Storage

    Cloud computing has recently reached popularity in computer networking world which provide centralized data storage service, remote accessibility and many more cloud is very new, safe, and advanced technology it provides remote access service and centralized data storage service to the cloud consumers and its domain client in cloud. This...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Improving the Life of the Wireless Sensor Network using Energy Harvesting Clustering

    In the modern era, Wireless Sensor Network (WSN) has seen new horizons among the research community. It has largest range of applications in most of the fields. Its beauty lies in its application area and it can be deployed anywhere. WSN has low cost, low power sensor nodes, can be...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Big Data: Concept, Handling and Challenges: An Overview

    In today's world, every tiny gadget is a potential data source, adding to the huge data bank. Also, every bit of data generated is practically valued, be it enterprise data or personal data, historical or transactional data. This data generated through large customer transactions, social networking sites is varied, voluminous...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    A Concern Towards Data Security in Cloud Computing

    Cloud computing is one of the emerging innovative trend of IT technology today. This trend has got remarkable advancement in computing world. Although cloud is boon to computing world but its adoption in IT sector is lack behind due to many issues. In this paper, the authors focus on most...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    A Novel Design of SET-CMOS Half Subtractor and Full Subtractor

    Single electron transistor have high integration density, ultra-low power dissipation, ultra-small size, unique coulomb blockade oscillation characteristics which makes an attractive technology for future low power VLSI/ULSI systems. The single electron transistor have extremely poor driving capabilities so that direct application to practical circuits is a yet almost impossible, to...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Efficient Storage Management over Cloud using Data Compression without Losing Searching Capacity

    Now-a-days, due to social media, people may communicate with each other, share their thoughts and moments of life in form of texts, images or videos. The authors are uploading their private data in terms of photos, videos, and documents on internet websites like Facebook, WhatsApp, Google+ and YouTube etc. In...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    An Energy-Saving Routing Algorithm for Wireless Body Sensor Network using Data Compression Technique

    A Wireless Sensor Network (WSN) is used to monitor the environmental condition. There consist of N number of sensor nodes which are connected to each other and they are clustered in to different groups. There have a Cluster Head (CH) which is used to manage the Cluster Members (CMs). when...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    A Study of SQL of Injections Techniques and their Prevention Methods

    Rapid evolution of technology and increasing necessity of storing data and securing it as well gave rise to various techniques to secure it along with the new innovative malicious techniques to have a hazardous impact on the organization by wrecking the database and manipulating data. In this paper, the authors...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    An FP Tree based Approach for Extracting Frequent Pattern from Large Database by Applying Parallel and Partition Projection

    There are lots of data mining tasks such as association rule, clustering, classification, regression and others. Among these tasks association rule mining is most prominent. One of the most popular approaches to find frequent item set in a given transactional dataset is association rule mining. Frequent pattern mining is one...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Fuzzy based Probability Factor Calculation for Number of Cluster Estimation to K-Mean by using Apriori

    Data mining is a powerful and a new field having various techniques. It converts the raw data into useful information in various research fields. Clustering is used to collect similar data in a group. It is a process of putting similar data into groups. A popular technique for clustering is...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2012

    The Computerized Pen Drive

    This paper proposes an extremely innovative and creative pen-drive model which is totally computerized. The Imagination of a pen drive with a display and in-build USB ports has resulted in the development of this paper. The overall idea of this proposal is to build a pen drive which can be...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2012

    Selecting the Best Supervised Learning Algorithm for Recommending the Course in e-Learning System

    Now a day E-learning is becoming popular as it helps to fulfill the necessities of remote students and helps the teaching-learning process in Education system. Course Recommender System in E-Learning is a system which recommend the course to the student based on the choice of various student collected from huge...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2012

    Best Combination of Machine Learning Algorithms for Course Recommendation System in e-Learning

    Data Mining is the extraction of hidden predictive information from large database which can be used in various commercial applications like bioinformatics, E-commerce etc. Association Rule, classification and clustering are three different algorithms in data mining. Course Recommender System plays an important role in identifying the behavior of students interested...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2012

    Ontology Based Specifications for Software Reliability Advancement

    Presently, achieving highly reliable software from the customer's perspective is a demanding job for all software engineers and reliability engineers. Consequently, reliability may be defined by the user's requirements. In addition, specifications are the basis for software development. Therefore, all means applicable ought to substantiate the specifications concerning requirements. To...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2012

    Software Reliability Estimation Models: A Comparative Analysis

    Software reliability is the ability of the software to perform its specified function under some specific condition. Reliability can be associated with both hardware and software. The hardware reliability can easily be evaluated since hardware get wear out but in case of software it be very difficult. In fact the...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2012

    Sector Based Multi-Hop Clustering Protocol for Wireless Sensor Networks

    Minimization of energy consumption is a critical design requirement for most Wireless Sensor Networks (WSNs) applications. WSNs are composed of small, energy constrained sensor nodes. The random deployment of sensor nodes in many applications requires unattended operation. The primary goal of WSNs is how to collect sensed information in energy...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2012

    Performance Evaluation of a LAN Under Different Ethernet Wiring Standards with Different Frame Size

    In this paper, the authors simulate an office LAN using IT Guru Opnet 9.1 and then they calculate the performance of this network under 10BaseT and 100BaseT Ethernet wiring standards with different frame size and finally they compare the results i.e. which standard perform better for which frame size. They...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2012

    RFID Technology for Smart Vehicle Control Using Traffic Signal & Speed Limit Tag Communication

    Traffic violations are a major problem. Monitoring these traffic violations by human intervention over a wider area is too complicated due to the increasing population. The main motive behind this paper is to reduce these reckless accidents for which the authors propose a system that governs and controls the speed...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2012

    Virtualization and Their Security Threats

    Few issues in the IT arena are regarded with more interest and passion than virtualization. Virtualization refers to technologies designed to provide a layer of abstraction between computer hardware systems and the software running on them. Here, the authors are discussing the key concepts of virtualization if you want to...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2012

    A Survey of Multibiometric Systems

    Most biometric systems deployed in real-world applications are unimodal. Using unimodal biometric systems have to contend with a variety of problems such as: Noise in sensed data; Intra-class variations; Inter-class similarities; Non-universality; Spoof attacks. These problems have addressed by using multibiometric systems, which expected to be more reliable due to...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2012

    Performance Comparison of IPv4 and IPv6 Using Windows XP and Windows 7 Over Gigabit Ethernet LAN

    In this Paper, the authors have evaluated the performance of IPv4 and IPv6 using Windows XP and Windows 7. In this paper TCP (Transmission Control Protocol) Throughput and UDP (User Datagram Protocol) Throughput have been compared for protocol IPv4 and IPv6. Experimental results showed that Windows XP provides better results...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2012

    Storage Aggregation Over a Network

    The most valuable asset of any organization is data. Should this data be lost, it can be a potential threat to any business. Any enterprise/company cannot afford such business interruptions. Such companies normally use the client server model to store their data. In the client-server model, all the data is...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2012

    Software Testing for Embedded Systems

    In the recent years, embedded systems have become so complex that the development and testing time is becoming extremely time consuming. As embedded systems include more and more functions for new services, embedded systems are presenting challenges with respect to the attributes of security, scalability availability, and performance with deterministic...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2012

    Analysis and Performance Evaluation of Software System Usability

    Usability is the methodology used to determine the software performance. Usability is basically used to determine the strength and weakness of an application from the end user point of view. Questionnaires have been used to evaluate user interface of different application. This paper is a survey and analysis of the...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2012

    A Newer Secure Communication, File Encryption and User Identification Based Cloud Security Architecture

    Cloud computing platform gives people the opportunity for sharing resources, services and information among the people of the whole world. In private cloud system, information is shared among the persons who are in that cloud. Because of this, different security related problems have grown in this platform. This paper work...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2012

    A Novel Approach for Reduction in CFO at Channel Estimator in WiMax OFDM System

    During Multicarrier transmission in OFDM (Orthogonal Frequency Division Multiplexing), the signal suffers due to fading environment and results in timing and frequency errors at the receiver end. An efficient timing and frequency offset estimation algorithm has been designed in VHDL using ISE XILINX 10.1. The maximum value at which the...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2012

    An IPM-CFAPSO Based Hybrid Method for Multiple Objective Minimizations Using TCPS

    This paper presents an Interior Pont Method (IPM) and variant of Particle Swarm Optimization (CFAPSO) based hybrid method to solve optimal power flow in power system incorporating Flexible AC Transmission Systems (FACTS) such as Thyristor Controlled Phase Shifter (TCPS) for minimization of multiple objectives. The proposed IPM-CFAPSO algorithm identifies the...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2012

    Semantic Based Document Clustering: A Detailed Review

    Document clustering, one of the traditional data mining techniques, is an unsupervised learning paradigm where clustering methods try to identify inherent groupings of the text documents, so that a set of clusters is produced in which clusters exhibit high intra-cluster similarity and low inter-cluster similarity. The importance of document clustering...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2012

    Implementation of Neural Network Back Propagation Training Algorithm on FPGA

    This paper presents the implementation of trainable Artificial Neural Network (ANN) chip, which can be trained to implement certain functions. Usually training of neural networks is done off-line using software tools in the computer system. The neural networks trained off-line are fixed and lack the flexibility of getting trained during...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2012

    Peak-to-Average Power Ratio Analysis for Golden Coded MIMO Systems

    The combination of the Orthogonal Frequency-Division Multiplexing (OFDM) technique and the Multiple-Input Multiple-Output (MIMO) architecture has emerged as a promising candidate for future wireless communications. The Space-Time Block Coding (STBC) technique permits to fully take advantage of MIMO-OFDM systems and to effectively improve the channel capacity and the spatial diversity....

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2012

    Security Risks in Bluetooth Devices

    Bluetooth provides a short range (usually up to a maximum of 100 meters) wireless communication between devices making it convenient for users and thus eliminating the need for messy cables. According to Bluetooth Special Interest Group (2006), "Bluetooth wireless technology is the most widely supported, versatile and secure wireless standard...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2012

    Structural Clustering Multimedia Documents: An Approach Based on Semantic Sub-Graph Isomorphism

    The works that used graphs to represent documents has referred to the richness of these expressive tools. However, the exploited graph theory could be of great interest concerning the evaluation of similarity between these documents, both in documentary classification and the information retrieval. In structural classification of the documents, object...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2012

    Ultra Encryption Standard (UES) Version-IV: New Symmetric Key Cryptosystem with Bit-Level Columnar Transposition and Reshuffling of Bits

    The present paper is an extension of the previous work of the authors i.e. UES version-II and III. Roy et al recently developed few efficient encryption methods such as UES version-I, Modified UES-I, UES version-II, UES version-III. Nath et al developed some methods such as TTJSA, TTSJA and DJMNA which...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2012

    Evaluation of Object Oriented Requirements Engineering Frameworks: A Study

    With the growing demand of Object Oriented paradigm in the development of large scale information system, a "Good" requirements engineering framework has become essential for analysis of requirements and related models for such system. Though various proposals of requirements engineering frameworks are exist in the literatures but they are varied...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2012

    Analysis of Distributed Algorithms to Remove Correlations for Reducing Average Download Time in Peer - to - Peer Networks

    The Peer-To-Peer (P2P) networks are widely used for internet file sharing. In general the file download can take minutes or hours depending on the level of network congestion or the service capacity fluctuations. In this paper, the authors consider two major factors that have significant impact on average download time,...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2012

    Defense of DDoS Attacks Using Traffic Analysis at Router Level

    Efficient Distributed Denial-of-Service (DDoS) is a rapidly growing problem. The multitude and variety of both the attacks and the defense approaches is overwhelming. This paper presents taxonomies for classifying attacks and defenses, and thus provides researchers with a better understanding of the problem and the current solution space. The attack...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2012

    An Enhanced Geographical Routing Protocol for Wireless Mesh Networks, 802.11s

    Wireless Mesh Networks (WMNs) have emerged as a key technology for next generation wireless networking. The performance of these networks depends on routing protocols. IEEE 802.11s is one of the emerged standards designed to build WMNs for the classical standard 802.11. It defines the HWMP (Hybrid Wireless Mesh Protocol) as...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2012

    Monopole Triple Band Circular Patch Antenna Using Defected Ground Structure for IMT 2000/UMTS/ WLAN/WiMAX Applications

    This paper presents a circular patch multiband monopole microstrip antenna using DGS (Defected Ground Structure) technique. In this monopole multiband antenna L-shaped defects are inserted into both sides of ground plane of patch antenna forming a defected ground structure. The antenna exhibits three simulated bands and impedance bandwidth of lower...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2012

    Integrated Manufacturing Management Using Internet of Things

    The integration between Programmable Logic Controllers (PLCs) and supervision and control software's has been a critical factor for industrial production management. The goal of this paper is to show a new approach for development of an integration framework for industrial processes using the best practices of Service Oriented Architecture (SOA)...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2012

    BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification Using Fingerprint and Face Recognition

    This paper suggests the multimodal biometrics system for identity verification using two traits: face and fingerprint. The proposed system is intended to use for the training database includes a face and four fingerprint images for each individual. The final decision is made by first individual score of face and fingerprint...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2012

    Analysis and Design of Bio-Info-Collaborator Service Model to Collaborate Multiple Heterogeneous Bioinformatics Web Services

    In this paper, an approach to generate a mechanism for bioinformatics web services to register them with a Data Collaborator Web Service has been presented. The aim of this approach is to create new collaborator service model using existing web services. Up to now, the focus has been on answering...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2012

    Hepatitis Prediction Model Based on Data Mining Algorithm and Optimal Feature Selection to Improve Predictive Accuracy

    Data mining techniques are widely used in classification and prediction in the field of bioinformatics. This even helps in identifying the relationships and patterns in the data which helps in construction of prediction model. Classification and prediction model supports medical diagnosis which helps in improving the quality of patients. Noisy...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2012

    OAODV Routing Algorithm for Improving Energy Efficiency in MANET

    In Mobile Ad-hoc NETworks (MANETs), there is no fixed infrastructure. One of the most widely used routing protocols for an ad hoc network is the Ad hoc On Demand Distance Vector routing protocol, abbreviated as AODV. In the conventional AODV routing protocol, source node forwards RREQ (Route Request) packet to...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2012

    An Efficient Mining Algorithm for Determining Related Item Sets Using Classification and Association Rules

    In the present days, data mining is the advanced research area because it is one of the important steps in the knowledge discovery process. This paper presents an experimental study of finding the frequent item sets by classifying the data base transactions into classes by using Decision tree induction based...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2012

    Steganography Enhancement by Combining Text and Image Through Wavelet Technique

    The rapidly proliferated information and evolution of digital technologies by Information hiding in multimedia data has improved the ease of access to digital information enabling reliable, faster and efficient storage, transfer and processing of digital data and leads to the consequence of making the illegal production and redistribution of digital...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2012

    Optimization of Decision Rules in Fuzzy Classification

    There are various advances in data collection that can intelligently and automatically analyze and mine knowledge from large amounts of data. World Wide Web as a global information system has flooded the users with a tremendous amount of data and information Discovery of knowledge and decision-making directly from such huge...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2012

    The Replication in Varying Fanout Indexing Technique for Skewed Access Patterns in the Wireless Mobile Environments

    Due to limited battery power, the most important issue in mobile computing is energy saving. The energy efficiency can be achieved through indexed data organization over wireless channels. In this paper, the authors explore the balanced and imbalanced index tree with varying fanout over skewed data. They purpose a varying...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2012

    Survey on Sink Repositioning Techniques in Wireless Sensor Networks

    Sink relocation is essential in wireless sensor network since relocating sink can balance the traffic load in the midst of multiple nodes and thereby decrease the miss rate of real-time packets. The main constraint in wireless sensor networks is limited energy supply at the sensor nodes so it is important...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2012

    Enhancing the Quality of Service in MANETs by Improving the Routing Techniques

    The aim of this paper is to modify the existing MANET reactive Multipath routing protocol Ad hoc On-demand Distance Vector (AOMDV). Since the Route discovery and route maintenance of AOMDV Routing protocol lead to a high number of unsuccessful packet deliveries from the source nodes to the destination nodes during...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2012

    Effect of Increasing Load on WLAN Analyzed Through OPNET Simulator

    Wireless LAN has very important property of LAN sharing make it advantageous in Ad-Hoc networks. In WLAN each node has Wi-Fi capability. In this paper, the authors are analyzing such a WLAN network in which they increase load by increasing traffic and analyze the effect of increasing traffic, they also...

    Provided By International Journal of Computer Applications