International Journal of Computer Applications

Displaying 641-680 of 5728 results

  • White Papers // Jul 2014

    Generation of Dynamic Group Digital Signature

    In today's world management of electronic documents is a very tedious job. As electronic documents are used for all the transactions the authentication of the document is very important. Digital signatures are the best methods to provide authenticity. Many existing schemes for digital signatures are proposed. In this paper, a...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Traffic Analysis, a Wise Approach to Detect Compromised Nodes in Wireless Sensor Networks

    Existence of self-similarity and repeated patterns in network traffic makes it possible to predict network parameters. This phenomenon can also be seen in behavior of wireless sensor networks. Self-similarity can be used to propose security solutions in computer and sensor networks. However, sensor networks suffer from several constraints such as...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    A Novel Feature Clustering Algorithm for Evaluation of Descriptive Type Examination

    Objective type of examination evaluation is easy in computer world, but the descriptive type of question evaluation is more complex and there is no significant research has been taken place. So many descriptive type examinations like university exams, GRE etc., have been conducting from long time which is being evaluated...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Software Project Contracts and Scheduling by GRGA and EVM

    The well planned SPLC (Software Project Life Cycle) doesn't give certainty about the completion of project in time and budget. The PMP (Project Management Processes), pregnant processes, rework, some float types and review process, always, put stumbling block for completion of project in time. Apart from this defined process, there...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Allocation of Join and Semi Join Operations based on Dynamic Selectivity Factor in a Distributed Database Query

    Distributed databases are gaining popularity due to advancement in technology of computer networks and due to need of the business. In distributed databases as data is located at different sites, so to get access to a particular type of data requires a query to be subdivided into sub-queries and executing...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    A Light-Weight Trust based Mobility Aware Routing Algorithm for Mobile Ad Hoc Networks

    Security and mobility is always a wide research area of the mobile ad hoc network. In this paper, a new technique is proposed to apply secure as well as mobility aware routing in mobile ad hoc networks. For applying security the packet forwarding behavior of the nodes is used and...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Performance Analysis of a Prioritized Multilevel Access Allocation Scheme for Data Calls in GSM Networks

    The demand of voice and data services on the Global System for Mobile communications (GSM) is unprecedented in the annals of the history of telecommunication systems. As a result, Grade of Service (GoS) is no longer stable in the face of this high demand. This paper explores the use of...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    A New Approach to Enhance Performance of OFDM using BCH and Newly Designed Filter

    Orthogonal Frequency Division Multiplexing (OFDM) is a multicarrier communication technique and it has capability to rise above the frequency-selective fading problem, which is common in wireless broadband communications. This has made it popular since last few years. The OFDM system suffers from a number of drawbacks such as the high...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Design and Implementation of Hidden based Web Retrieval using Innovative Vision-based Segmentation

    The authors assimilate the extracted information from a conference website to acquire the clean and high superiority academic data. This paper has subsequent contributors: they propose a novel vision-based page segmentation algorithm, which use DOM tree to compensate the information loss of classical vision-based segmentation algorithm. They transform the conference...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Channel Estimation based on Kalman Filtering with BER Reduction in MIMO-OFDM Systems

    MIMO-OFDM is one of the emerging communication schemes which provide efficient communication with multi-carrier modulation. MIMO technology uses spatial diversity technique by using multiple antennas at the transmitter and the receiver side. In MIMO systems, the data streams arriving from different path with different time are combined at the receiver...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Analysis of Stock Crime using Graph Mining

    Graph mining is the use of most important structure of graph to obtain frequent patterns of information. It has board range of applications. This technique can be used to find the probability of persons doing crime in the stock market .Some case studies of people involved in stock crime were...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    File Integrity Maintenance Tool for Secure Information Storage in Cloud

    In current scenario, modern technologies have completely changed the lives of the people. Every facility is available online through internet. People do their business through online services by being at home. This changing trend brought the concept of cloud computing where various physical servers (may be at different locations) are...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Time Series Data Mining in Real Time Surface Runoff Forecasting through Support Vector Machine

    In this paper, the author's present support vector machine based model for forecasting the runoff-rainfall events. A SVM based model is either implemented through radial base or gaussian based kernel functions. SVM uses precipitation, temperature, sediment, rainfall, water level and discharge as input variable parameters. In this paper, the Sequential...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Fraud Detection in Credit Card by Clustering Approach

    Fraud is an unauthorized activity taking place in electronic payments systems, but these are treated as illegal activities. Fraud detection methods are continuously developed to defend criminals in adapting to their strategies. Fraud can be identified quickly and easily through fraud detection techniques. In this paper, clustering approach is used...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Improvement on Gossip Routing Protocol using TOSSIM in Wireless Sensor Networks

    Multicast routing protocols in the networks are inefficient to handle high priority traffic, network congestion, excessive processing of control information and retransmission procedures. Gossiping routing protocol is suitable and controlled form of reducing the overhead of routing protocols for forwarding a message. Gossiping protocol is characterized by each node randomly...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    On Randomized Minimal MapReduce Sets for Filtering Expressions

    An intention of MapReduce sets for filtering expressions analysis has to suggest criteria how filtering expressions in filtering data can be defined in a meaningful way and how they should be compared. Similitude based MapReduce sets for filtering expression analysis and MapReduce sets for assignment is expected to adhere to...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Optimized Fault Tolerance in Distributed Environment

    Vehicular ad-hoc networks represent a rapidly emerging and particularly challenging class of Mobile Ad hoc NETworks (MANETs). VANETs are distributed and self organizing communication networks built up from travelling vehicles. In this paper, the authors have considered controlled latency process by managing the time span between updates for fault tolerance...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Semi Markov Approach for Asymptotic Performance Analysis of a Standby System with Server Failure

    In this paper the asymptotic performance of a cold standby system with two identical units is analyzed. When a unit fails it is inspected by a server to check the feasibility of repair or replacement. If repair is not feasible, unit is replaced by new. The server is subjected to...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Improvement on LEACH Protocol in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) have great potential to support several important wireless applications, including real-time multimedia communication, medical applications, surveillance using sensor networks, industrial applications, military surveillance and home networking applications. But there are two challenging issues communication bandwidth and energy is very important to design wireless and mobile systems...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Implicit Aspect Identification Techniques for Mining Opinions: A Survey

    Gathering information by finding out what other people think is always been a common behavior. It has become necessary to summarize the information obtained due to its growing availability and popularity in the form of online review sites and personal blogs. Aspect extraction is one major step for mining opinions....

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Software Faults Emulation by Software Fault Injection

    In computer science, an emulator is hardware or software or both that duplicates (or emulates) the functions of one computer system (the guest) in another computer system (the host), different from the first one, so that the emulated behavior closely resembles the behavior of the real system (the guest).The computer...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Non-Invertible Online Signature Biometric Template Protection via Shuffling and Trigonometry Transformation

    In this paper, the authors describe a novel approach to a cancelable template protection scheme that secures online handwritten signature samples in the reference database of a biometric verification system. They propose a renewable-noninvertible transformation process named bio-trigono comprising two consecutive steps. First, a shuffling scheme is applied to a...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    A Genetic Algorithm Approach using Improved Fitness Function for Classification Rule Mining

    Classification rule mining from huge amount of data is a challenging issue in data mining. Classification rules describe the relationship between predicting attributes and class label attribute and thus assign class label to unseen predicting attribute values. In this paper, a genetic algorithm approach with modified fitness function for discovering...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Transient Analysis of Communication Network Model with Homogeneous Poisson arrivals and Dynamic Bandwidth Allocation

    Queuing models play a dominant role in many communication systems for optimum utilization of the resources. In this paper, the authors develop and analyze a two node tandem communication network model with feedback for the first node, with an assumption that the arrivals follow homogeneous Poisson process. In this model,...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Quality of Service during Handover in Heterogeneous Wireless Network

    In a cellular network, handoff is a process of transferring a Mobile Station (MS) from one Base Station (BS) or channel to another as the user is on the move. The handover process must take care of several parameters e.g. the handover scheme that is being used; number of free...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Time Quantum based CPU Scheduling Algorithm

    In this paper, the authors introduce a new CPU scheduling algorithm called time quantum based CPU scheduling algorithm which acts as preemptive based on the arrival time. The algorithm helps to improve the average waiting time of round robin algorithm in real time uni-processor-multi programming operating system. CPU scheduling is...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Load balancing and Congestion Control in Mobile Ad-hoc Network using Ant Colony Optimization

    Within few years mobile ad hoc has fetched more attention due to plug and play infrastructure less network. Mobile ad hoc wireless networks consist entirely of wireless nodes, placed together in an impromptu manner, i.e. with minimal forethought. All device/nodes have routing capabilities and forward data packets for other devices...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Amended Biometric Authentication using Secret Sharing

    Visual cryptography is a secret sharing scheme where a secret image gets divided into number of pieces called shares and not a single share disclose any information about secret image. There are some automated methods to identify and verify the user based on the physiological characteristics. To deal with such...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    A Novel Approach to Cluster Search Result based on Search Goals

    In present days, World Wide Web (WWW) provides a platform for users to satisfy their information needs, for this purpose search engine tools are commonly used. Available search engine give result for a particular query in the form of flat rank list, which works well for non-ambiguous query. But, in...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    An Effective Authentication Method for Document Type Color Images with Data Repairing Capabilities

    This is new authentication scheme based on the secret sharing method with a data repair capability for document type color images via the use of Portable Network Graphics (PNG) image. And generate the authentication signals to each block of image, which together with the binarized block content, this authentication signals...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    An Efficient Trust Management Technique for Delay Tolerant Network

    Delay Tolerant Networks (DTNs) have high end-to-end latency, which is often faces disconnection, and unreliable wireless connections. It does not mean a delay service instead DTNs provides a service where network imposes disruption or delay. It operates in challenged networks with extremely limited resources such as memory size, CPU processing...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    An Extended Version of Four-Square Cipher using 10 X 10 Matrixes

    Now-a-days web based attacks is an issue in the internet data transmission. Many cryptographic algorithms are developed to secure the data over the communication. The existing algorithm uses alphabets only. In this paper, the authors proposed an algorithm which uses an innovative cryptographic digraph substitution method to provide a stronger...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Calculating Dynamic Time Quantum for Round Robin Process Scheduling Algorithm

    Process scheduling using round robin algorithm makes use of a fixed amount of time quantum that is assigned to each process to complete its execution. If the process is able to complete its execution within this time period, it is discarded from the ready queue otherwise it goes back to...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Implementation and Evaluation of mpiBLAST-PIO on HPC Cluster

    Due to exponential growth in the size of genomic databases, traditional techniques of sequence search proved to be slow. To address the above problem, an open source and parallel version of BLAST called mpiBLAST was developed by the programmers. In mpiBLAST, the master process distributes the database fragments among worker...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Assessment of Different Attacks and Security Schemes in Vehicular Ad-hoc Network

    The concept of Vehicular Ad hoc NETwork (VANETs) is incorporating data sharing capability and wireless communication. The vehicles are turned in network which provides services that ones used to in offices or homes. VANETs are distinguished from other kinds of ad hoc networks by their hybrid network architectures, node association...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    A Simulated Annealing approach for solving Minimum Manhattan Network Problem

    In this paper, the authors have developed a metaheuristic technique namely simulated annealing for solving the MMN problem. They have also developed several benchmark data sets. With these they have reported their findings and results. In this paper, they address the Minimum Manhattan Network (MMN) problem. It is an important...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Design and Analysis of Distributed Embedded Systems using AADL - Application to the Precision Time Protocol

    Prototyping distributed embedded system can be seen as a collection of many requirements covering many domains. System designers and developers need to describe both functional and non-functional requirements. Building distributed systems is a very tedious task since the application has to be verifiable and analyzable. Architecture Analysis and Design Language...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Web Solution using More Secure Apache HTTP Server with the Concept of Full Virtualization

    Virtualization is the concepts by which the authors can easily run the multiple virtual machines on a single physical machine by sharing the resources. By using the concept of virtualization the \"Unsigned\" memory which is waste also utilize. If they are not having the different machines so they can easily...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Comparison of Web Service Similarity- Assessment Methods

    Due to the advent of service oriented architecture, web services have gained popularity. The need for efficient web service discovery increases because of the enormous growth of the web services. This paper is to addresses the challenge of automated web service discovery and service similarity assessment. It utilizes the WordNet...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Executing Joins Dynamically in Distributed Database System Query Optimizer

    In order to join two sub queries involving data from multiple sites data has to be transmitted from one site to other. While transmitting the data within a network, the factors involved in distributed databases is communication cost and amount of data transmitted. To minimize these factors, join operation is...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2012

    Review of WLAN Qos Enhancements in MAC Layer to Improve Business Process

    IEEE 802.11e-2005 or 802.11e is an approved amendment to the IEEE 802.11 standard that defines a set of Quality of Service enhancements for wireless LAN applications through modifications to the Media Access Control (MAC) layer. The standard is considered of critical importance for delay-sensitive applications, such as Voice over Wireless...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2012

    Protection Mechanism using Cryptography and Robust Watermarking for Color Images

    Exchange of large amount of multimedia data have become feasible with the explosive growth of internet technology. People can easily copy and modify the digital product which leads to the piracy problems which is spreading over the internet and thus poses a great threat to the ownership rights. Digital Right...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2012

    Digital Watermarking using CDMA Technology

    Digital watermarking is defined as a process of embedding data (watermark) into an image to protect the owner's right to that data. Along with the explosive growth of the Internet, digital media is very easily accessible by unauthorized persons. This gives birth to the relatively new research field of "Digital...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2010

    A Fast Codesign Approach for Low Cost Applicationspecific- System on Programmable Chip (SoPC) : Application to Sensor Network

    Systems on programmable chip, as system on chip, are composed by software and hardware. Therefore a codesign based approach is needed to meet the functional requirements. While classic codesign flows are long and involve complex and expensive design tools, this paper presents a fast but efficient codesign flow. To reduce...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2012

    A Newer Secure Communication, File Encryption and User Identification Based Cloud Security Architecture

    Cloud computing platform gives people the opportunity for sharing resources, services and information among the people of the whole world. In private cloud system, information is shared among the persons who are in that cloud. Because of this, different security related problems have grown in this platform. This paper work...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2012

    A Novel Approach for Reduction in CFO at Channel Estimator in WiMax OFDM System

    During Multicarrier transmission in OFDM (Orthogonal Frequency Division Multiplexing), the signal suffers due to fading environment and results in timing and frequency errors at the receiver end. An efficient timing and frequency offset estimation algorithm has been designed in VHDL using ISE XILINX 10.1. The maximum value at which the...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2012

    An IPM-CFAPSO Based Hybrid Method for Multiple Objective Minimizations Using TCPS

    This paper presents an Interior Pont Method (IPM) and variant of Particle Swarm Optimization (CFAPSO) based hybrid method to solve optimal power flow in power system incorporating Flexible AC Transmission Systems (FACTS) such as Thyristor Controlled Phase Shifter (TCPS) for minimization of multiple objectives. The proposed IPM-CFAPSO algorithm identifies the...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2012

    Semantic Based Document Clustering: A Detailed Review

    Document clustering, one of the traditional data mining techniques, is an unsupervised learning paradigm where clustering methods try to identify inherent groupings of the text documents, so that a set of clusters is produced in which clusters exhibit high intra-cluster similarity and low inter-cluster similarity. The importance of document clustering...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2012

    Implementation of Neural Network Back Propagation Training Algorithm on FPGA

    This paper presents the implementation of trainable Artificial Neural Network (ANN) chip, which can be trained to implement certain functions. Usually training of neural networks is done off-line using software tools in the computer system. The neural networks trained off-line are fixed and lack the flexibility of getting trained during...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2012

    Peak-to-Average Power Ratio Analysis for Golden Coded MIMO Systems

    The combination of the Orthogonal Frequency-Division Multiplexing (OFDM) technique and the Multiple-Input Multiple-Output (MIMO) architecture has emerged as a promising candidate for future wireless communications. The Space-Time Block Coding (STBC) technique permits to fully take advantage of MIMO-OFDM systems and to effectively improve the channel capacity and the spatial diversity....

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2012

    Goal Oriented Requirements Engineering for Non-Functional Factors

    Requirements phase is the most important stage in the software development process. If the requirements have not been captured correctly, the whole development process will fail and will results in time and monetary costs. The Goal Oriented Requirements Engineering (GORE) approach helps in defining, eliciting, organizing, analyzing and refining the...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2012

    A Goal-Oriented Workflow Scheduling in Heterogeneous Distributed Systems

    In heterogeneous distributed systems like grid and cloud computing infrastructures, the major problem is the task scheduling which can have much impact on system performance. For some reasons, such as heterogeneous and dynamic features and the dependencies among the requests, this issue is known as a NP-hard problem. In this...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2012

    Customized Data Exchange Gateway (DEG) for Automated File Exchange Across Networks

    This paper addresses a customized solution to ensure security of the trusted network while receiving files from applications residing on less trusted networks. The solution is a four layered secured file transfer service which controls and authenticates the data transfer through service blocking mechanism and digital signatures at the first...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2012

    Extensive Study on Coverage and Network Lifetime Issues in Wireless Sensor Networks

    Wireless sensor networks have a broad variation of applications within the surveillance, military, atmosphere monitoring and medical fields. Coverage and connectivity of sensor networks demonstrates how well a region is monitored. The coverage issues have been studied extensively. Particularly the coverage with respect to connectivity and network lifetime effectiveness is...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2012

    Web Supported Query Taxonomy Classifier

    A new approach called Web Supported Query Taxonomy Classifier is introduced in this paper, which generates better searching results. The authors combine WSQ, Web Supported Queries approach with Query Classification in which bridging classifier and category selection method is used for classification of queries. In this paper, Query categorization will...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2012

    Forest Fire Detection Through Wireless Sensor Network Using Type-2 Fuzzy System

    Fire detection is always been a crucial challenge for human, moreover detecting fire using automated sensors definitely requires efficient and accurate ways. Since fire depends on more than one physical/environmental condition simultaneously, so in this paper, the authors have used fuzzy type-2 logic for fire detection. Fuzzy gives best results...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2012

    Peer to Peer Secure Communication in Mobile Environment: A Novel Approach

    Peer-to-Peer (P2P) communicating is a networking and distributed communication paradigm which allows symmetric sharing of messages between two entities, ideally without any interception from any third entity. Privacy in peer-to-peer communication is, however, can be compromised via a large number of approaches. It is therefore a need of the hour...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2012

    Evaluation of Different Classification Techniques for WEB Data

    The growth of data-mining applications such as classification and clustering has shown the need for machine learning algorithms to be applied to large scale data. In this paper, the authors present the comparison of different classification techniques using Waikato Environment for Knowledge Analysis or in short, WEKA. WEKA is open...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2012

    Implementing Semantic Query Optimization in Relational Databases

    A semantic query is a query pertaining to knowledge or data that is expressed purely on the basis of a common business vocabulary, without any reference to how or where the data is stored. Semantic query refers to database queries that are based on concepts, properties and instances defined in...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2012

    Security Risks in Bluetooth Devices

    Bluetooth provides a short range (usually up to a maximum of 100 meters) wireless communication between devices making it convenient for users and thus eliminating the need for messy cables. According to Bluetooth Special Interest Group (2006), "Bluetooth wireless technology is the most widely supported, versatile and secure wireless standard...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2012

    Structural Clustering Multimedia Documents: An Approach Based on Semantic Sub-Graph Isomorphism

    The works that used graphs to represent documents has referred to the richness of these expressive tools. However, the exploited graph theory could be of great interest concerning the evaluation of similarity between these documents, both in documentary classification and the information retrieval. In structural classification of the documents, object...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2012

    Ultra Encryption Standard (UES) Version-IV: New Symmetric Key Cryptosystem with Bit-Level Columnar Transposition and Reshuffling of Bits

    The present paper is an extension of the previous work of the authors i.e. UES version-II and III. Roy et al recently developed few efficient encryption methods such as UES version-I, Modified UES-I, UES version-II, UES version-III. Nath et al developed some methods such as TTJSA, TTSJA and DJMNA which...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2012

    Evaluation of Object Oriented Requirements Engineering Frameworks: A Study

    With the growing demand of Object Oriented paradigm in the development of large scale information system, a "Good" requirements engineering framework has become essential for analysis of requirements and related models for such system. Though various proposals of requirements engineering frameworks are exist in the literatures but they are varied...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2012

    Analysis of Distributed Algorithms to Remove Correlations for Reducing Average Download Time in Peer - to - Peer Networks

    The Peer-To-Peer (P2P) networks are widely used for internet file sharing. In general the file download can take minutes or hours depending on the level of network congestion or the service capacity fluctuations. In this paper, the authors consider two major factors that have significant impact on average download time,...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2012

    Defense of DDoS Attacks Using Traffic Analysis at Router Level

    Efficient Distributed Denial-of-Service (DDoS) is a rapidly growing problem. The multitude and variety of both the attacks and the defense approaches is overwhelming. This paper presents taxonomies for classifying attacks and defenses, and thus provides researchers with a better understanding of the problem and the current solution space. The attack...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2012

    Performance of MANET Routing Protocols Considering Impact of Node Density Under Different Traffic Patterns

    A mobile ad-hoc network has certain characteristics such as dynamic topology, limited bandwidth, and energy-constraint etc, which imposes new demand on the routing protocols. This paper specially aims to study and investigate the performance of one proactive routing protocol-DSDV and two reactive protocols-AODV and DSR for mobile ad-hoc networks under...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2012

    A Study of Wireless Environment by Means of Multiple Wireless Nodes

    Researchers are designing new MANET routing protocols and comparing and improving existing MANET routing protocols before any routing protocols are standardized using simulations. In this paper, Investigators for experimental purpose, considered 10 and 20 multiple random wireless nodes in 250mx250m terrain area and routing protocol DSR and find out the...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2012

    Performance Analysis of Various Modulation Techniques in Multipath Ad-Hoc Network Using Tree Based Interleaver for Iterative IDMA Systems

    In recent years, the Interleave-Division Multiple-Access (IDMA) scheme has attracted the attention of researchers to be a promising candidate for next generation networks. And Since then numerous technical papers about IDMA have been published in the literature. In this paper, the authors have simulated the IDMA scheme with various interleavers...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2012

    Simulation Study of Black Hole and Jellyfish Attack on MANET Using NS3

    Wireless networks are gaining popularity to its peak today, as the user's wants wireless connectivity irrespective of their geographic position. There is an increasing threat of attacks on the Mobile Ad-hoc NETworks (MANET). The attacks studied in this paper are against the routing protocols in Mobile ad hoc network. The...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2012

    Performance Analysis of Energy Efficient Clustering Algorithms for Wireless Sensor Network

    Wireless Sensor Networks (WSN) is emerging in various fields like wildlife monitoring, mining industries, security surveillance. The efficiency of sensor networks strongly depends on the routing protocol used. Routing protocols providing an optimal data transmission route from sensor nodes to sink to save energy of nodes in the network. This...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2012

    Enhanced Expanding Ring Search Algorithm for AODV

    A wireless Ad Hoc network is a collection of mobile nodes that form a dynamic, autonomous network. Nodes communicate with each other without depending on any infrastructure (e.g. access points or base stations). Hence, in these networks each node acts as a host and as a router. Reactive routing protocols...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2012

    Comparative Analysis of Energy Efficient Routing Protocol for Wireless Sensor Network

    A wireless sensor network is consists of hundreds or thousands of nodes that are densely deployed in a large geographical area. These nodes are commonly used for continuously monitoring applications. Also these sensor nodes have small batteries. The energy consumption is the main issue in WSN's. The efficient routing protocol...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2012

    Security Model that Prevents Data Leakage in Distributed Mobile Systems Using Surrogate Objects

    Devices such as smart phones are considered to be the most common communication devices in current scenario. Recently, mobile phones are not only used for voice and message communication but also, sending and receiving important data such as social security numbers, bank account details and passwords, so it is important...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2012

    Security of Data in Cloud Based E-Governance System

    The overwhelming success and the rapid growth of the Internet change the people lives; the way they interact, learn and work. Now a day's most of the organizations including government deliver their services through internet. E-governance is the application of information and communication technologies to exchange information between government and...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2012

    Location Traced Hybrid Detection of Node Replication Attack in Mobile Wireless Sensor Network

    The wireless sensor network is used to solve problems in real world such as industrial and environmental Sensing. There are two types of Wireless Sensor Network, Mobile and Static. They are the Wireless Sensor Network are prone to attacks. The most prominent attack in Wireless Sensor Network is node replication...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2011

    PKI Endorsement Functions for Network Users

    Computer Business Systems and automated business transactions require robust and rigorous security measures. Public key cryptography supports security mechanisms such as confidentiality, integrity, authentication and non-repudiation. A Public Key Infrastructure (PKI) is a foundation on which other applications, systems and Network components are built. Gatefree is a user endorsement gateway...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2011

    Improving P2P in Cloud Computing Based on Performance

    Cloud computing platform is a set of scalable large-scale data server clusters, it provides computing and storage services to customers. The basic study about the architecture of current cloud computing system shows that it's a central structured one; i.e. All the data nodes are indexed by a master server, but...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2011

    A Modified Genetic Algorithm for Process Scheduling in Distributed System

    The problem of process scheduling in distributed system is one of the important and challenging area of research in computer engineering. Scheduling in distributed operating system has an important role in overall system performance. Process scheduling in distributed system can be defined as allocating processes to processor so that total...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2011

    An Evolutionary Multi Label Classification Using Associative Rule Mining for Spatial Preferences

    Multi-label spatial classification based on association rules with Multi Objective Genetic Algorithms (MOGA) is proposed to deal with multiple class labels problem which is hard to settle by existing methods. In this paper, the authors adapt problem transformation for the Multi label classification. They use Hybrid evolutionary algorithm for the...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2011

    Efficient Utility of Dual Cameras in a Mobile Device

    Modern handheld devices like mobile phones and tablets feature two digital cameras - one in the front and one at the back. Though the back camera (which is of higher resolution and quality) is used for general purpose photography, under certain specific conditions the photographs taken care of unacceptable quality....

    Provided By International Journal of Computer Applications