International Journal of Computer Applications

Displaying 681-720 of 6997 results

  • White Papers // Oct 2014

    Evaluation of Efficient Implementation of Big Data Switch for Iraqi Cellular Phone Service Providers

    Big data is opening up new chance for enterprises to extract insight from large volumes of data in real time and across multiple relational and non-relational data types. It is becoming one of the most important technology directions that have the potential for dramatically changing the way organizations use information...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Design and Analysis of Triple-Band Inverted F-Slot Microstrip Patch Antenna

    Microstrip patch antennas are strong candidates for use in many wireless communications applications. Microstrip patch antennas are also highly preferable for multiband as well as for the WiMAX application. In this paper, a multi-band H-slot microstrip patch antenna for Worldwide interoperability for Microwave Access (WiMAX) is presented. The radiation performance...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Efficient Handwritten Digit Recognition Based on Histogram of Oriented Gradients and SVM

    Automatic Handwritten Digits Recognition (HDR) is the process of interpreting handwritten digits by machines. There are several approaches for handwritten digits recognition. In this paper, the authors have proposed an appearance feature-based approach which process data using Histogram of Oriented Gradients (HOG). HOG is a very efficient feature descriptor for...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    A Novel Technique to Improve the Performance of Wireless Sensor Network Using Adaptive Antennas and High-Altitude Platform Communications

    In this paper, the performance of Wireless Sensor Networks (WSN) is improved using adaptive antenna technique and High-Altitude Platforms systems (HAP). An Adaptive Concentric Circular Array (ACCA) is proposed to improve the communications link between sink and sensor nodes. The system is first demonstrated for several scenarios including different cell...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    An Ontology Based Context-Aware Application

    Today, users want to communicate with their smart devices just like the way they want to do with their friends. Just as a friend knows about favorite dish, place to hang out, bank in which the user friends hold an account. The paper gives information about context-aware recommender application with...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    A Novel Approach for Mining Trajectory Patterns of Moving Vehicles

    With the advances in location-acquisition technologies such as Global Positioning System (GPS), Global System for Mobile communications (GSM) etc, increasing amounts of movement data collected from various moving objects such as animals, vehicles, mobile devices, and climate radars have become widely available. Turning a collection of time-geography data into mobility...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    A Simple Approach to SQL Joins in a Relational Algebraic Notation

    Join is an operation in accessing the data from table if number of tables exceeds one. Whenever, the authors need the data which is not available from a single table, then it needs to necessitate using join operation. Sometimes join is required even if there is a single table. It...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Finding Optimal Configuration of DSDV Using Particle Swarm Optimization

    Vehicular Ad-hoc NETwork (VANET) is prominent research area in Mobile Ad-hoc NETwork (MANET). VANET are very dynamic in nature as it has no predefined structure for communication. The performance of VANET dependents on parameter configuration of the protocol used in. The optimal parameter configuration in protocol can improve the QoS...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Mathematical Modelling of Joint Routing and Scheduling for an Effective Load Balancing in Cloud

    Due to the increasing adoption of the cloud in majority of the business, the level of traffic intensity is increasing leading to a challenging situation for traffic management in cloud. There were various algorithms in past that has discussed about the load balancing techniques concerning the cloud environment, but very...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    BER Performance of OFDM with GI in SISO and MIMO System

    To overcome a multipath fading environment with low complexity and to achieve wireless broadband multimedia communication systems, Orthogonal Frequency Division Multiplexing (OFDM) transmission scheme is used. OFDM is one of the applications of a parallel data transmission scheme, which reduces the influence of multipath fading. The performance of OFDM can...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Analysis of DAC MAC RBAC Access Control Based Models for Security

    Access control is the process or mechanism for giving the authority to access the specific resources, applications and system. Access control defines a set of conditions or criteria to access the system and its resources. There are three main accesses control model first is mandatory access control model, second is...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    DH-EAACK Secure Intrusion Detection System to Detect Black Hole Attack in MANET

    Mobile Ad-hoc NETworks (MANETs) type of Ad-hoc wireless network. Due to mobility of nodes, MANET more vulnerable to different types of attacks and security threats. To overcome these challenges Intrusion Detection System (IDS) technique used. By using the schemes of EAACK, this paper proposed dynamic hierarchical intrusion detection architecture that...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    A Lightweight Technique to Prevent Wormhole Attacks in AODV

    Mobile Ad hoc NETwork (MANET) is vulnerable to many types of routing attacks due to its dynamic topology and the collaboration of MANET nodes in finding routing paths. The wormhole attack is considered one of the most threatening attacks. The most popular MANET routing protocols such as Ad-hoc On-demand Distance...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Cross-Domain Search for Policy Anomalies in Firewall

    Most of the business services have been performing very effectively by using some of the evolving technologies like cloud computing and other architectures etc. But still they have been suffering from security problems due to the undesired actions in their services. So, in this situation firewalls can plays a vital...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Compiler for Detection of Program Vulnerabilities

    Program vulnerabilities may be unwarranted for any organization and may lead to severe system failure. Due to the advancement of technology there has been increase in the area of vulnerability attacks which are exploited by hackers for getting access to the system or insertion of their malicious code. In this...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    D- A Powerful General Purpose Application Programming Language

    The real purpose of a programming language is to communicate a set of instructions to a system, basically a computer. Just like natural languages, programming languages are described using their syntaxes and semantics. This paper presents a comparison of a newly-developed programming language called D with traditional languages like C,...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Efficiency of Various Approaches for Feature Extraction in Palm Recognition-A Review

    Security plays a very important role in the day-to-day life. In order to avoid unauthorized access by individuals authentication is mandatory in various fields such as industry, government sectors, colleges, online banking, military, etc., The traditional methods such as passwords or ID cards are less secure and forgery is possible....

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Efficient Multipath Routing Protocol Based on Path Survivability Factor

    Mobile Ad-hoc NETwork (MANET) is a collection of mobile devices which can communicate through wireless links. The task of routing protocol is to send packets from source to destination. This is particularly hard in mobile ad hoc networks due to the mobility of the network elements and lack of centralized...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Detection of Malicious Data Using Hybrid of Classification and Clustering Algorithms Under Data Mining

    In today era modern infrastructures and technologies are more prone to various types of accesses. A method that is commonly used for launching these types of attack is popularly known as malware i.e. viruses, Trojan horses and worms, which, when propagate can cause a great damage to commercial companies, private...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    An Algorithm for Retrieving Skyline Points Based on User Specified Constraints Using the Skyline Ordering

    Given a multidimensional data set, a skyline query returns the interesting points that are not dominated by other points. The actual cardinality (s) of a skyline query result may vary substantially from the desired result cardinality (k). An approach called skyline ordering is used that forms a skyline based partitioning...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Cost and Time Evaluation of Load Balancing and Service Broker Strategies in Multiple Data Centers

    Cloud computing is a boon for almost every sector as it reduces the overall expenditure by making IT infrastructure, services and platform on \"On-demand\" basis. The \"Pay-as-you-go\" policy of cloud technology enables the users to use and pay for the services and computing infrastructure only when they need it without...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Fuzzy Based Effort Estimation Approach

    Besides of these there are many equation based effort estimation techniques like Halstead model, Bailey-Basil model, and Walston-Felix model. Cost and effort estimation are the major concern of any software industry. They are identified with the help of Kilo Line COde (KLOC) which denotes number of, line of code in...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Visual Secret Sharing Between Remote Participants

    Visual cryptography and random grids are forms of visual secret sharing that encrypt a secret image into indecipherable shares. Decryption occurs by printing them onto transparencies and stacking, but this requires participants to be in the physical presence of each other, so this paper addresses the use of visual secret...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Minimum Spanning Tree Based Improved Routing Protocol for Heterogeneous Wireless Sensor Network

    Performing multiple tasks like data aggregation, processing and communication to other Sensor Nodes (SNs) or Base Station (BS) is a very attractive and effective attribute carried out by Wireless Sensor Networks (WSNs). As SNs have limited energy resources, storage capabilities and processing, the network layer protocol has therefore to guarantee...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Application of Feature Selection Methods in Educational Data Mining

    In the recent years, web based learning has emerged as a new field of research due to growth of network and communication technology. These learning systems generate a large volume of student data. Data mining algorithms may be applied on this data set to study interesting patterns. As an example,...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    RUCM: A Measurement Model for Detecting the Most Suitable Code Component From Object Oriented Repository

    Software quality based applications development is the main concern is user satisfaction. It increases the reliability and efficiency of information retrieval and management. As the bundle of code created day-by-day the repository storing such code is regularly migrates the older code in to legacy systems. To develop and facilitate new...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    A Stream Based Implementation of Secured SOA Model Using XML Encryption and XML Signature

    Web service security is essential for SOA-based applications; it has explorative set of technologies such as Simple Object Access Protocol (SOAP), Web Services Description Language (WSDL) and Universal Description, Discovery and Integration (UDDI), and electronic business XML (ebXML). These promote an environment for organizations to communicate in Internet. The inevitable...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Advanced Feedback Encryption Standard Version-1 (AFES-1)

    In this paper, Advanced Feedback Encryption Standard version 1 (AFES-1), the researcher have combined both bit-level and byte level operations on the plain text. The researcher had recently published Multi Way Feedback Encryption Standard version 3 (MWFES-3). MWFES-3 is a byte level encryption algorithm. The authors have capitalized on the...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    A Novel Framework for Cloud Security Against Data Breach

    Cloud computing is the most emerging technology now-a-days. Every internet user accessing cloud services either directly or indirectly without knowing or aware of security aspects because of trust between the user and the cloud service provider. But, this trust is harmed by the malicious user or hacker by breaching the...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Performance Comparison of Diversity Techniques in MIMO Wireless Communication

    The goal for next generation of mobile communication system is to perfectly consistent integrate a broad variety of communication services like high-speed data, video and voice signals, multimedia traffic. In the paper, the authors have analyzed various diversity techniques to find out the optimum scheme for use. Diversity is a...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Comparison of Energy Detection Methods in Cognitive Radio Networks

    Cognitive Radio (CR) is used in mobile communication to make devices and networks better adaptable to changes in environmental parameters such as frequency allocation and regulation. Cognitive Radio (CR) is an emerging new paradigm in wireless communications. Its goal is to make frequency use more efficient by using temporarily unoccupied...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    A Clustering Algorithm in Complex Social Networks

    Complex networks are real graphs (networks) with non-trivial topological features. The empirical study of real-world networks like computer networks and social networks gives insights into the structures and properties of such networks. Identification of community structure is one of the important problems in social networks. Tightly knit group of nodes...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Performance Evaluation of Transport Layer in Cognitive Radio Ad-Hoc Networks

    In this paper, the authors have proposed some changes to MAC protocol for improving the performance of transport layer in cognitive radio ad-hoc networks. They have studied effects of different MAC and routing protocols on TCP in cognitive radio technology enabled environments. They have reviewed performance of TCP in two...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    A Review on Trust-Aware and Privacy Preserving Profile Matching System for Personalized User Recommendations in Social Networks

    Trust is becoming a very important part of social network from the security point of view. In this paper, the authors introduce a framework for handling trust in social networks, which is based on reputation mechanism. The reputation mechanism captures the implicit and explicit connections between the network members, analyses...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    A Bee Colony Optimization Algorithm Approach for Software Cost Estimation

    The Software Cost Estimation (SCE) is one of the most important stages of the production cycle of a system. Therefore, the managers need to accurately determine the requirements of the project to have accurate estimations. But given the fact that the SCE is done at the beginning of the system...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Simulating Traffic Lights Control Using Wireless Sensor Networks

    Wireless (magnetic) sensor networks offer a very attractive alternative to inductive loops for vehicular traffic control on freeways and at intersections in terms of cost, ease of deployment and maintenance, and enhanced measurement capabilities. In this paper, the authors propose and simulate a simple and economic wireless sensor network architecture...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Novel Paradigm: Assessment of DOS Flooding Attack Through Energy Aware Routing Over MANET Environment

    One of the most up-and-coming fields for research is mobile ad hoc network. Security is high Priority obligation in wireless ad-hoc network. In ad hoc network the communicating nodes sets new challenges for the security architecture because it doesn't necessarily feed on fixed infrastructure. In the ad-hoc network Denial of...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    New Design of DWDM Based on DCF Technique

    In this paper, physical layer impairments and their impacts on transparent optical networks is studied. Among the impairments the authors mainly focused on in band crosstalk and try to incorporate its effect in the DWDM process. BER due to component crosstalk in a WDM receiver has been studied and computed...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    A Review of Comparative Study of MD5 and SHA Security Algorithm

    Security algorithms or cryptography enables secure communication between two parties in the presence of a third-party or an eavesdropper. It assures the recipient of the message of the authenticity of the claimed source, protects the message against the unauthorized release of the message content by the adversaries, limits the access...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Internet of Everything and Secure Cloud for Real World Data Management

    Now-a-days, the idea of Internet of Things (IoT) is not merely a dream, it is a reality. With the integration of Internet and wireless technologies, connecting number of devices to Internet is exponentially increasing. Now the current scenario of IoT is turning to Internet of Everything (IoE) i.e. smart cities...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2012

    Peer to Peer Secure Communication in Mobile Environment: A Novel Approach

    Peer-to-Peer (P2P) communicating is a networking and distributed communication paradigm which allows symmetric sharing of messages between two entities, ideally without any interception from any third entity. Privacy in peer-to-peer communication is, however, can be compromised via a large number of approaches. It is therefore a need of the hour...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2012

    Evaluation of Different Classification Techniques for WEB Data

    The growth of data-mining applications such as classification and clustering has shown the need for machine learning algorithms to be applied to large scale data. In this paper, the authors present the comparison of different classification techniques using Waikato Environment for Knowledge Analysis or in short, WEKA. WEKA is open...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2012

    Implementing Semantic Query Optimization in Relational Databases

    A semantic query is a query pertaining to knowledge or data that is expressed purely on the basis of a common business vocabulary, without any reference to how or where the data is stored. Semantic query refers to database queries that are based on concepts, properties and instances defined in...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2012

    A Robust Video Copy Detection System Using TIRI-DCT and DWT Fingerprints

    A video copy detection system that is based on content fingerprinting can be used for video indexing and copyright applications. Most of the video copy detection algorithms proposed so far focus mostly on coping with signal distortions introduced by different encoding parameters; however, these algorithms do not cope well with...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2012

    Review of Search Based Techniques in Software Testing

    The most effort seeking job in software testing is the generation of test cases. The success of testing pursuit highly depends on the effectiveness of the test cases. Various approaches have been proposed to ease the task of test case generation and to perform software testing. It has witnessed a...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2012

    A Novel Method for Identifiying the Keyless Authentication Entry System Using Mobile for Auto Mobiles (CAR)

    Mobile technology plays a vital role in modern era. In the emerging trend of speech technologies, speech/non-speech detection is an unsolved problem, which affects numerous speech related applications. One of the major reasons for these thefts is the unauthenticated access to the car doors and engine. Recently the Remote keyless...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2012

    Empirical Comparison of Test Data Generation Techniques Using Activity Diagrams

    UML (Unified Modeling Language) is now a leading standard for defining software processes. Test data generation is advantageous in early phases of software development. Activity diagrams are user and developers' friendly because of the ease in their understanding. Many papers have presented techniques for test data generation using activity diagrams....

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2012

    Dynamically Avoiding the Substantial Throughput Penalty of FRR

    The TCP protocol incorporates flow control mechanisms to attempt the best utilization of network bandwidth. The most common mechanism in use is documented by RFC 2581 and is sometimes called TCP Reno. Most TCP implementations severely penalize a connection's throughput in case of packet loss, and regain that throughput as...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2012

    Multipath Routing Protocol Using Cross-Layer Based QoS Metrics for IEEE 802.11e WLAN

    To achieve Quality of Service (QoS) support for multimedia traffic, IEEE 802.11e specifies Hybrid Coordination Function (HCF) Controlled Channel Access (HCCA) technique. When it is applied in multi-hop networks, the performance results, however, reveal that there is significant degradation of throughput with high delay at high load conditions. This is...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2012

    A Short Term Solution to Implement Applications About Moving Points on Top of Existing DBMSs

    There is an increasing demand for applications about moving objects (e.g., humans, animals, cars, etc). The best way to develop robust and efficient software solutions consists in putting them on top of a spatiotemporal database storing the trajectories of the moving objects. Unfortunately, the database management systems today part of...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2013

    An Optimized Low Loss Energy-Aware Routing Protocol for Wireless Sensor Networks

    Routing is a process of selecting paths in a Wireless Sensor Network. According to the key challenges in WSNs are fault tolerance, network lifetime, and communication management. The communication in WSN includes node to node communication. This communication includes optimal route selection, route maintenance etc. to compete with user expectations...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2013

    Surveillance of Real Time Video Streams by Using Hill Climbing Algorithm

    Data mining is the application of statistical techniques and programmatic algorithms to discover previously unnoticed relationships within the data. With the development of software and hardware, video surveillance systems have been not only widely used in the security realm, but also in daily life in hotels, supermarkets, banks, schools and...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2013

    WSN Performance Parameters of AODV, DYMO, OLSR and IERP in RWP Mobility Model Through Qualnet

    Wireless Sensors are devices that monitor and record their surroundings physical and environmental parameters and transmit them continuously to one of the source sensors. A collection of such wireless sensors form a network called Wireless Sensor Networks. This technology is considered to be the best for the study of performance...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2013

    PHR Model Using Cloud Computing and Attribute Based Encryption

    Cloud computing, is an emerging computing environment which allows users to remotely store the data in one centralized place. This facilitates on demand scalable services as well as efficient management and sharing of data. However, there have been wide privacy concerns as data is outsourced to third party servers and...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2013

    TMS320C6713 DSK Implementation of G.711 Coded VoIP Signal

    The quality of speech signal over a VoIP system is degraded by various network layer problems which include jamming, jitter, packet loss. Different types of noises also degrade the quality of speech signal such as external noise and quantization noise. This paper improves the quality of VoIP speech signal affected...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2013

    Reusability: Component Retrieval Based on MDL Format

    The keyword based approach that is primarily used in descriptive methods for component retrieval operation is not precise. In keyword-based approach, a candidate asset is selected whenever the keywords that form its representation match all or most of the keywords of the query. Keyword search retrieve large number of candidate...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2013

    Grid Enabled Environment for Image Processing Applications: A Review

    Grid computing is an emerging technology which is finding its importance in handling large volumes of data. It is used to share and coordinate the distributed processing resources to achieve supercomputing capability. A high end computing facility and mass data storage is needed for any image processing applications which are...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2013

    Software Developing with Agile Methods and Combination of Architecture

    Over the past decades the service oriented architecture is a viewpoint of software architecture in which using Loosely Coupled services to support business processes is suggested. Now-a-days most of the software has been established based on the service designing and implementing. Due to this, this paper examines architecture and its...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2013

    Applying Logical Scoring Preference Method for Semantic Web Service Selection

    In today's scenario web services have become a magnificent paradigm as the Web is moving towards a collection of services that interoperate through the Internet. Pooled with Semantic Web technologies, Web Services can be definitely interpreted and selected based on the consumers' requirements. In this paper an attempt has been...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2013

    Using Mobile Phone Network for Urban Traffic Management

    The transition record of mobile phones across Base Transceiver Stations can be used as useful data for urban traffic management. While, most of the urban traffic users are mobile users, thus the count of such users can be used as a count of traffic users on urban roads. Using this...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2013

    Comparative Analysis of AODV, DSR, GRP, OLSR and TORA by Varying Number of Nodes with FTP and HTTP Applications Over MANETs

    Recent years have witnessed an extreme growth in research and development in the field of Wireless Networks. The special focus has been on Ad-hoc Networks especially Mobile Ad-hoc NETwork (MANET). Mobile ad-hoc network is a dynamic instant mutihop radio infrastructure-less temporary network of wireless mobile nodes in which each participating...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2013

    Optimization of Software Testing for Discrete Testsuite Using Genetic Algorithm and Sampling Technique

    Though Software Testing plays a vital role to produce better quality products, but it is time consuming and incurs expenditure. The more test will be conducted, products will be finer. Hence, testing is must for software development. Another side of testing is spending much money on it because people will...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2013

    A Novel Approach for Wormhole Detection in MANET

    The active operational environment of Mobile Ad hoc NETwork (MANET) makes it exposed to a variety of network attacks. Thus reducing the vulnerability is becoming a top priority. Wireless networks are susceptible to many attacks, including an attack known as the wormhole attack, has become a challenging work. The wormhole...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2013

    Two Level Authentication and Packet Marking Mechanism for Defending Against DoS and DDoS Attacks

    Denial of Service (DoS) attacks presents a serious problem for Internet communications. IP source address spoofing is used by DoS and DDoS attacks on targeted victim. IP spoofing to forge the source IP address of the packet, and thereby hide the identity of source. This makes hard to detect and...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2013

    Hierarchical Group Key Management Using Threshold Cryptography in Wireless Sensor Networks

    In Wireless Sensor Networks (WSNs), data transmission is secured by authenticating secret keys. Secure key management is most important for network reliability and consistency. In this paper, a hierarchical group key management technique using threshold cryptography in Wireless Sensor Networks is proposed. The technique considers hierarchical sensor network, where sensing...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2013

    Pattern Mining Method for Hospital Facility Review Using Optimized Nonlinear Mathematical Model

    The development of discovering appealing, valuable and important patterns from large spatial datasets is stated as spatial data mining. From the preceding hospital location analyses technique, the locations are predicted from the hospital dataset using pattern mining technique. In terms of road weight age computation the location analyses technique is...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2013

    DAP-LECP: Dos Attack Prevention and Low Energy Consumption Protocol for Wireless Sensor Networks

    The wide-spread deployment of Wireless Sensor Networks (WSN) promises extensive applications in military and civilian fields. So far the major research focus has been to make WSN more useful and scalable in order to cope with future challenges of communication technologies, small emphasis is placed till now for the secure...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2013

    Cyber Reconnaissance: An Alarm Before Cyber Attack

    Today's cyber world is more than the internet. It is interdependent networks containing telecommunication network, embedded system and critical infrastructures. Malicious attacks on critical infrastructure become a major threat to business and government operations. An easy and fast access to network makes business successful and makes sensitive information more vulnerable...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2013

    Metrics in Evaluating Software Defects

    Due to the popularity of mobile devices and increasing demands of software applications, more and more individual developers join this industry. However, software defects top at the cost of software development. Software metrics are able to show some indication of software defect. This paper reviews popular static code and object-oriented...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2013

    Investigating the Impact of Random Waypoint and Vector Mobility Models on AODV, OLSR and GRP Routing Protocols in MANET

    A Mobile Ad hoc NETwork (MANET) is a collection of wireless mobile nodes forming a temporary network without the need for base stations or any other preexisting network infrastructure. Due to link instability, node mobility and frequently changing topologies routing becomes one of the core issues in MANETs. this paper...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2013

    Anti-Piracy for Movies Using Forensic Watermarking

    In the past decade internet worked perfectly with distribution of the digital data for pictures, music and videos. Although digital data have many advantages over analogue data, the rightful ownership of the digital data source is at of risk. The copyright protection for digital media becomes an important issue of...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2013

    Robust Digital Watermarking for Compressed 3D Models based on Polygonal Representation

    Multimedia has recently played an increasingly important role in various domains, including Web applications, movies, video game and medical visualization. The rapid growth of digital media data over the Internet, on the other hand, makes it easy for anyone to access, copy, edit and distribute digital contents such as electronic...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2013

    Performance Evaluation of Sextic Curve Cryptography and Probability Symmetric Curve Cryptography in Wireless Sensor Networks

    In this paper, the authors starts with a brief introduction of the different coordinate systems prevailing in cryptography, aims in developing security measures which could save atleast some amount of time in the execution processes. For this purpose, the sextic curve and the probability symmetric curve are considered. Simulation exercises...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2013

    Detection of Malware by using Sequence Alignment Strategy and Data Mining Techniques

    Malware is basically malicious software or programs which are a major challenge or major threats for the computer and different computer applications in the field of IT and cyber security. Traditional anti-viral packages and their upgrades are typically released only after the malware's key characteristics have been identified through infection....

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2013

    Comparison of IR Models for Text Classification

    As there is availability of large amount of data on the web, but due to constraints web is only used for browsing and searching. Traditional IE uses NLP techniques such as lexicons, grammars, whereas web applies machine learning and pattern mining techniques to exploit the syntactical patterns or layout structures...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2013

    Uniformity Level Approach to Fingerprint Ridge Frequency Estimation

    Stages of fingerprint image enhancement include segmentation, normalization, filtering, binarization and filtering. Each of these stages has proved to be very essential for achieving a well enhanced fingerprint image. The major prerequisites to filtering a fingerprint image are ridge orientation and frequency estimations. While ridge orientation estimation is done to...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2013

    A Novel Cluster-Chain based Routing Protocol to Prolong the Lifetime of WSN

    In Wireless Sensor Networks life time of the network depends on the energy of the nodes, where energy consumption is mostly used for data transmission rather than sensing and processing. Also, in the WSN, the choice of routing protocol plays an important role in utilizing the energy of nodes efficiently....

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2013

    Impact of Software Design Aspects on Usability

    Software usability of software system specified how much user feels comfort and attract towards specific system environment, on the other hand software designing is also an important factor affecting software system success. Usability is not a function of time although researchers have come up with various models and matrices relating...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2013

    Speeding-Up Phase-Locked Loops Based on Adaptive Loop Bandwidth

    In this paper, the authors describe three techniques for controlling the loop filter of the PLL for high operating speed. The proposed fast-locking PLL reduces the pull-in time and enhances the switching speed, while maintaining better noise bandwidth. Extended loop bandwidth enhancement is achieved by the adaptive control on the...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2013

    Prevention of DoS and Memory Attacks: Enhanced 3-Way Handshake

    In today's world most organizations are moving from wire connected LAN to wireless LAN. The phenomenal popularity of the 802.11 network standards stems from the fact that they provide for wireless connections with ease and convenience. Recently, security holes have been identified in the operation of 802.11 networks, and the...

    Provided By International Journal of Computer Applications