International Journal of Computer Applications

Displaying 41-80 of 5728 results

  • White Papers // Dec 2014

    Reliability of Fingerprint Verification in Ghana

    Biometric recognition refers to the automatic recognition of individuals based on their physiological and/or behavioral characteristics. It is used to confirm an individual's identity rather than using an identification card. Unique identifiers of humans include fingerprints, hand geometry, earlobe geometry and retina. Fingerprint verification is one of the most reliable...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    A Survey of Misbehavior Detection Scheme in DTN

    In this paper, the authors try to review the various problems and their solution in Delay Tolerant Network (DTN) while routing the packets. In this paper, going to discuss and see the overview of various methods used in the DTN. They are simbet and bubble rap which are the DTN...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    The Power of Emotional Intelligence

    Artificial Intelligence (AI) has been one of the most widely discussed topics in computer science or electronics since its introduction back in 1956. In this paper, various aspects of emotional intelligence would be reviewed. Present systems would be discussed along with their better implementation using Brain Emotional Learning. The authors...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Implementation of an Object Oriented Model to Analyze Relative Progression of Source Code Versions with Respect to Software Quality

    Many object oriented metrics have been explored and successfully applied by researchers to measure distinct aspects of software quality. Metrics are believed to be early indicators of qualitative parameters to give an idea as to how far a software engineering process has been well-implemented. However, using these metrics in isolation...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Software Testing Process Model from Requirement Analysis to Maintenance

    It is infeasible to develop quality software without software testing. Software testing typically consumes 40-50% of development efforts, even more efforts for systems that require higher levels of reliability. It is a significant part of the software development process. If a software defect is found in latter stages of development...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    MIMO-OFDM with Enhanced Channel Estimation Based on DFT Interpolation

    In practical wireless communication systems, the transmitter sends the information out through a multipath fading channel. At the receiver side, the received information distorted by the channel characteristic (due to multipath fading). So, in order to recover the transmitted information accurately, the channel effect must be known at the receiver....

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Software Refactoring Technique for Code Clone Detection of Static and Dynamic Website

    Now-a-days, cloning of codes or programs of the developer or authorized person leads a positive approach. But the code cloning is done by unauthorized person leads a negative approach. In the recent years, many clone detection tools have been proposed. It produces an over whelming volume of simple clones of...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    A Stream Cipher Based Bit-Level Symmetric Key Cryptographic Technique Using Chen Prime Number

    In this paper, a stream cipher based symmetric key cryptographic technique based on Chen prime number has been proposed. The proposed technique is suitable for encryption and decryption of a large number of files of almost any type. A symmetric key is formed by the sender directly from the plain...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    General Access Structure Secret Sharing in Matrix Projection

    Image secret sharing is a technique which provides security to confidential images by dispersed storages. General access structure image secret sharing provides flexibility for deciding qualified subsets of participants which can reconstruct the original secret image. Non qualified subsets of participants cannot get any information about original secret image. This...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Spam Filtering Using K Mean Clustering with Local Feature Selection Classifier

    In this paper, the authors present a comprehensive review of recent developments in the application of machine learning algorithms to Spam filtering, focusing on textual approaches. They are trying to introduce various spam filtering methods from Naive Bias to Hybrid methods for spam filtering, they are also introducing types of...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    A Hybridized Robust Watermarking Scheme Based on Fast Walsh-Hadamard Transform and Singular Value Decomposition Using Genetic Algorithm

    In this paper, a robust Hybridized Watermarking scheme based on Fast Walsh Hadamard Transform (FWHT) and Singular Value Decomposition (SVD) using Genetic Algorithm (GA) is presented. The host image is subjected to FWHT and SVD. The singular values of SVD of host image are modified with singular values of watermark....

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Constructing MICDS Algorithm for Data Transmission Using Maximal Independent Set in Network Graph

    Wireless Sensor Networks (WSNs) is a distributed wireless network which consists of a large number of small (sensor) nodes with sensing, computation and wireless communication capabilities. These sensor nodes work together to monitor various applications and they communicate with each other in multiple hops or directly, with the objective of...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    On the Number of Anchor Nodes for the Localization of Smart Energy Meters (SEM) in an African Environment

    The number of anchor nodes required for accurate localization is an important problem in the wireless sensor network research community. The error associated with localization is high when anchor nodes are not optimally placed in the network. No matter how the network is set up, the error associated with localization...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Analysis of Security Issues in Electronic Payment Systems

    The emergence of e-commerce has created new financial needs that in many cases cannot be effectively fulfilled by the traditional payment systems. Recognizing this, virtually all interested parties are exploring various types of electronic payment systems, issues surrounding electronic payment system and digital currency. Broadly, electronic payment systems can be...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Survey of Different Clustering Algorithms Used to Increase the Lifetime of Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) have gained increasing attention from both the research community and actual user. WSN consists of a large number of sensor nodes which are deployed over an area to perform local computations based on information gathered from surroundings and send this information to the main location. Each...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Web Application Vulnerabilities: A Survey

    In the last few years, the discovery of World Wide Web (WWW) has grown very much. Today, WWW applications are routinely utilized in security critical environments, like e-commerce, medical, financial, and military systems etc. WWW systems are an organization of infrastructure elements, like web databases and servers, and application-specific code,...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Design and Development of Energy Measurement System Based on the Android Platform

    In late years, smart-devices became very popular. This paper presents an application of power monitoring system using android application, which is convenient and efficient to achieve visualization of real time signals that are received from smart meters via GSM module. This application can be used by the consumer for measurement...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Mobile Ad-Hoc Networks Routing Protocol and Its Challenges: - A Survey

    MANET is collection of mobile nodes that can able to communicate with each other. Mobile nodes main purpose is to communicate and sharing the information over the network. As the authors know that MANET providing the support of real time application and multimedia application which can requires various aspects. These...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    SINR and Cost Based Vertical Handoff Scheme for K-Tier Heterogeneous Wireless Network

    The Vertical Hand Off (VHO) plays the key role in an integrated heterogeneous for mobility. The Heterogeneous Wireless Network (HWN) consists of different kind of networks like 2nd Generation 2G, GSM to 4th Generation 4G Long Term Evolution (LTE). The HWN aims to provide all kind of services like voice,...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Wi-Fi Calling

    In this paper, the authors aim to study the Generic Access Network (GAN) system. Generic Access Network (GAN) is a telecommunications system that extends mobile voice, data and multimedia IP Multimedia Subsystem/Session Initiation Protocol (IMS/SIP) applications over IP networks. Unlicensed Mobile Access (UMA) is the commercial name used by mobile...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Security Enhancement in GSM Using A3 Algorithm

    The GSM (Global System for Mobile communications) is widely used cellular standard in the world. Recently, the mobile industry has experienced an extreme increase in the number of its users. Thus the GSM network with the greatest worldwide number of users succumbs to several security vulnerabilities. Security is a burning...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Implementation of SAAS Compiler in Intranet

    In this paper, the authors explain about the successful use of web-based interface to C, C++ and Java compilers. There are several benefits that make networked software desirable. A web-based application can be used remotely access by the users throughout any network connection and making it platform independent by any...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Identification System Using Mobile Device Enabled NFC

    Smartphone are becoming more deployed, and such as a way for identification and authentication. The personal identification on mobile devices has attracted a lot of attention in the few years. In this paper, the authors propose an identification system based on Smartphone enabled NFC. The idea is to combing the...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Dynamic Channel Distribution with Power Sharing and Bit Insertion for Downlink Multiuser OFDMA

    An imminent mobile and telecommunication system must sustain not only accepted speech services however several other benefits such as wireless multimedia, small circuit switching and packet dependent data transmission are also being considered. For the realization of the above services with an attractive modulation procedure whose properties makes it possible...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    A New Mathematical Model of Exception Handling in Java Object Oriented Language

    The researcher already published several papers where the authors tried to explain the various aspects of object oriented language like Java using some simple mathematical model or functions. The authors have already studied the general properties of Java language such as object, class, inheritance, multithreaded concepts using simple mathematical concepts....

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    ACCFLA: Access Control in Cloud Federation Using Learning Automata

    In recent years, cloud computing has been applied increasingly and most of the companies, have considered some kinds of cloud strategies to use in their organizations. Growing request for services causes overload on a single cloud. Cloud federation is an ideal solution to overcome continuous increasing requests by users. Identity...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    An Efficient Approach for Mobile Agent Security

    Mobile agent technology provide a computing infrastructure in which a program in the form of a software agent can run at any host, suspend its execution, transfer itself to another host and resume execution at the new host. As the agent migrated between multiple hosts that are trusted to different...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    USB Based Dynamic Authentication Alert System for Computers

    In this paper, an innovative mechanism to convert a USB drive into a key has been introduced. A unique key file is written on to the drive which acts as the authentication mechanism to access the user's computer. This device can be used to lock or unlock the system by...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    A Review of Exposure and Avoidance Techniques for Phishing Attack

    Now-a-days, internet is a broadly used technology for the different application such as online reservation, for shopping, transaction of amount online from the bank, sending email, etc. are becoming more widespread day-by-day but there are abundant chances to hack the data. Phishing is a novel kind of website/network attack which...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Bandwidth and Radiation Management of GSM System Using Neural Networks

    Bandwidth and the radiation pattern of an antenna play a crucial role in long as well as short distance communication. Now-a-days, the increasing population and the unequal use of communication channels are making it difficult to manage the bandwidth of a communication system. Also, the radiation of the antenna is...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Bandwidth and Radiation Management of GSM System Using Fuzzy Logic

    Bandwidth and the radiation pattern of an antenna play a crucial role in long as well as short distance communication. Now-a-days, the increasing population and the unequal use of communication channels are making it difficult to manage the bandwidth of a communication system. Also, the radiation of the antenna is...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Optimization of Tasks in Mobile Cloud Computing

    Mobile cloud computing is a new platform for the execution of mobile applications where cloud performs the stimulating computing-intensive tasks and storing data in place of the mobile devices and provides them an illusion of infinite computing resources. This research paper considers a cloud based mobile computing system consisting of...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Survey on Privacy Permission Management Approaches for Android OS Applications

    Smartphone's have been becoming popular and mobile users are increasingly relying on them to store and handle personal information. The intake of smart phone devices for email writing, online bank transactions growing with growth of the Smartphone market and accessing other forms of sensitive content has lead to the emergence...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    A Protective Mechanism to Avoid Warm Hole and Sink-Hole Attack in Wireless Ad Hoc Network: Survey

    Wireless ad-hoc network is autonomous and infrastructure less network. Wireless ad hoc network is particularly vulnerable due to its primary characteristics, like open medium, dynamic topology, distributed cooperation, and capability constraint. Routing plays an important role in the security of the entire network. Secure transmission of information in wireless ad-hoc...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    State of Art Approaches to Build Cross Platform Mobile Application

    Mobile application market has grown exponentially. The market is becoming increasingly fragmented with at least five important mobile platforms making native development of mobile applications a challenging and costly endeavor. Cross-platform development might alleviate this situation. Cross platform tools support to develop the applications for multiple platforms in less time...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Performance Study of Star Topology in Small Internetworks

    In this paper, the authors study the performance of star topology in a Small Internetworks. In this network model, general LANs models are used and a simulated environment is formed where many applications are in used at a time and their mutual effects thereof. They were performed simulations using OPNET...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Proposed Method for Detecting Objects

    Most of object detection and classification algorithms are only locating regions in the image, whether it is within a template-sliding mask or interested region blobs. However, such regions may be ambiguous, especially when the object of interest is very small, unclear, or anything else. This paper presents proposed algorithm for...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    A Novel Approach of Cluster Based Routing in Mobile Ad Hoc Networks

    The research on the various issues in Mobile Ad hoc NETworks (MANETs) are getting popularity because of its challenging nature and all time connectivity to communicate. MANET is a random deployable network where devices mobile with dynamic topology. In the network topology, each device is termed as a node and...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Intelligent Vehicle Theft Control Using Embedded System

    In today's world almost every common man owns a vehicle. Theft is a common issue which everyone faces in parking and sometimes driving near insecure places. Vehicle security and accident prevention is more challenging. So in order to bring a solution for this problem the proposed system can be implemented....

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    A Survey on Sensors Lifetime Enhancement Techniques in Wireless Sensor Networks

    In the past years, Wireless Sensor Networks (WSNs) have gained increasing attention from both the users and researchers. It is used in various fields which include environmental, healthcare, military and other commercial applications. Sensor nodes are battery powered so energy constraints on nodes are very strict. When battery gets discharged,...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Performance Evaluation of ODMRP and ADMR using Different Mobility Models

    A Mobile Ad-hoc NETwork (MANET) is a collection of wire-less mobile nodes forming a temporary network without using any existing infrastructure. Mobile Ad-Hoc is a dynamic, multi-hop and autonomous networks composed by wireless mobile nodes. MANETS are subject to rapid and unpredictable changes. MANETS are inexpensive wireless communication network. The...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    A Study of Different Parallel Implementations of Single Source Shortest Path Algorithms

    The authors present a study of parallel implementations of Single Source Shortest Path (SSSP) algorithms. In the last three decades number of parallel SSSP algorithms have been developed and implemented on the different type of machines. They have divided some of these implementations into two groups, first are those where...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Two Level Centre of Gravity Computation - An Important Parameter for Offline Signature Recognition

    This paper proposed feature extraction method based on centre of gravity for offline signature. Similar to other biometric measures, signatures have inherent variability and so pose a difficult recognition problem. Signature probably is one of the oldest biometric recognition methods, with high legal acceptance Signature has been a distinguishing feature...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Mining Attributes Patterns of Defective Modules for Object Oriented Software

    Defect prediction is the process of predicting the fault prone module using some pre-mined patterns or rules. Several statistical and mathematical strategies have been used in recent past to these rules. However, the interpretability of these rules is the matter of concern. In real development process an expert is required...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    An Operational Framework for Alert Correlation using a Novel Clustering Approach

    Intrusion Detection System (IDS) is a well known security feature and widely implemented among practitioners. However, since the creation of IDS the enormous number of alerts generated by the detection sensors has always been a setback in the implementation environment. Moreover due to this obtrusive predicament, two other problems have...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Software Testing-Three P-S Paradigm and Limitations

    Software Testing is an important area of research in the field of software engineering because it is the deciding factor for successful project release and directly proportion to software quality and reliability. A lot of research has been already done in this field, likely to be leveraged in future as...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Comparative Analysis of Classification Algorithms on Different Datasets using WEKA

    Data mining is the upcoming research area to solve various problems and classification is one of main problem in the field of data mining. In this paper, the authors use two classification algorithms J48 (which is java implementation of C4.5 algorithm) and multilayer perceptron alias MLP (which is a modification...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Personalization and Clustering of Similar Web Pages

    Over the last decade, clich?d information age has justly arrived. Moreover, the evolution of the Internet into the Global Information Infrastructure, together with the massive popularity of the Web, has also enabled the ordinary citizen to become not just a consumer of information, but also a part of it. In...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Multiuser Detection Using Zero Forcing Successive Interference Cancellation for WCDMA

    The performance of the WCDMA system is degraded due to the various network impairments such as interference, fading & noise and also due to network load. The work in this presents performance analysis of Zero Forcing Successive Interference Cancellation (ZF-SIC) scheme for the multiuser detection in the WCDMA environment. The...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Trusted Destination Sequenced Distance Vector Routing Protocol for Mobile Ad-hoc Network

    A Mobile Ad-hoc NETwork (MANET) is a self-organized system comprised of mobile wireless nodes with peer relationships. MANETs can operate without fixed infrastructure and can survive rapid changes in the network topology. Due to multi-hop routing and absence of any trusted third party in open environment, MANETs are vulnerable to...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    A GUI for Automatic Extraction of Signature from Image Document

    A New method for Extracting signature from image document is proposed based on the auto cropping method. This method improves the performance of security system based on signature images as well as provides the region of interest of the used image for the biometric system. This method also reduces the...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Analytical Evaluation of a Hybrid Chaotic Shift Keying [CS-QCSK] in a CDMA System

    In recent years, various chaos based modulation schemes were evolved, of which the CS-DCSK modulation technique provides a better BER performance and bandwidth efficiency, due to its code domain approach. The QCSK modulation technique provides double benefit, namely: higher data rate with similar BER performance and same bandwidth occupation as...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Opinion Mining of M Learning Reviews using Soft Computing Techniques

    Internet has increasingly become the place for online learning, and exchange of ideas. The rapid development in wireless technology offering fast data transfer has lead to mobile device revolution. With the ease of access of mobile devices like mobile phones, PDAs, tablet PCs and high bandwidth through wireless, there is...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Boosting Data Exchange Efficiency Using Developed Multi-Layer Simulation Models

    Rapid developments in communication and information technologies and the ever growing network user's demands have made network traffic efficiency a prominent problem in today's internet. as users come and go, so do the packets they send: internet performance is therefore largely governed by these inevitable natural fluctuations, it is therefore...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    A Democratic Head Election Strategy for Clustering in Wireless Sensor Network

    In recent years a lot of work has been done on Wireless Sensor Network (WSN) as it find its application in many applications including environmental monitoring and military field surveillance. In these applications tiny sensor nodes are deployed across the application regions. Data gathered by the sensor nodes are periodically...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    New Optimized Network Selection Decision In Heterogeneous Wireless Networks

    The expected growth in Radio Access Technologies (RAT's) such as wireless technologies (802.11a, 802.11b, 802.15, 802.16, etc.) and cellular networks (GPRS, UMTS, HSDPA, LTE, etc.) requires efficient vertical handoff algorithm. Variety of Vertical Handoff Algorithms (VHA) has been proposed to help the user to select dynamically the Best Access Network...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    5G: Future Mobile Technology-Vision 2020

    Currently, Mobile operators are busy with deployment of 4G technology namely, LTE-advanced or WIMAX 802.16m. This 4G technology will be concluded within two years. 5G technology is not standardizing yet, probably 5G standard will define in two to three years, and its deployment will start around 2020. In future, people...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    A Novel Approach for Heart Disease Diagnosis Using Data Mining and Fuzzy Logic

    Cardiovascular disease is a term used to describe a variety of heart diseases, illnesses, and events that impact the heart and circulatory system. A clinician uses several sources of data and tests to make a diagnostic impression but it is not necessary that all the tests are useful for the...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Performance Evaluation of Mobile Ad Hoc Networks with Reactive and Proactive Routing Protocols and Mobility Models

    Mobile Ad hoc Network is a collection of wireless mobile nodes dynamically forming a temporary network without the aid of any established infrastructure or centralized administration. Routing protocols in mobile ad hoc network helps node to send and receive packets. In this paper, the authors are doing study of AODV,...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Change Requests Artifacts to Assess Impact on Structural Design of SDLC Phases

    Current escalating demands on software, software developers to be obliged to generate software that can be altered, which escape from the risk of mortifying the software structural-design of the "SDLC phases". Degraded software structural-design is problematic because it makes the system more prone to defects and change requests turn to...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Arresting Wormhole Attack in Ad Hoc Network Using Cumulative Threshold Transmission Rate

    A mobile ad hoc network is a collection of mobile nodes that are interconnected via a wireless medium forwards packet to other nodes through multi hop mechanism. The genuine intermediaries relay the packets intended for the indirect radio range destination node. The cooperation existing between the intermediate nodes acts as...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Measuring Maintenance Effort in Object Oriented Software with Indirect Coupling

    Measurement of maintenance effort in object oriented software engineering is one of the major challenges. Coupling among classes is one of the major factors determining the maintenance effort. Coupling is measured as strength of interconnection or interdependence between different parts of the Classes in object oriented software. It is widely...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    A Stable Covering Set-Based Leader Election Algorithm (SCLEA) for Mobile Adhoc Distributed Systems

    Leader election process is known as the task of selecting a particular node or a process to be a unique leader of the distributed system. Many algorithms were proposed for leader election in classical, wired distributed systems. However, with the advent of wireless communication technology, the domain of distributed computing...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Hybrid Domain Based Steganography Using BPS, LSB and IWT

    The Steganography used to transport information from one place to other place through public channel in covert way. In this paper, the authors propose Hybrid domain Steganography using BPS, LSB and IWT (HSBLI). The payload is decomposed into two equal parts say part 1 and part 2. The cover and...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    A New SDLC Framework with Autonomic Computing Elements

    The autonomic complex nervous system of human has ability to manage itself. It adapts changes in its environment and manages by self-healing, self-protection and self-optimization. This gave a robust idea to manage current complex engineering systems and reduce big efforts in maintenance in terms of cost and time of technically...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Model Driven Adaptation and Usability for Context Aware User Interfaces

    In recent years, given the development of networks and technological innovations, the user mobility has increased so much. That is why the interactive applications must be executed on both mobile devices as PDAs, mobile phones and PC. The user is then progressing in a varied and dynamic environment. Therefore, the...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Performance Evaluation of MIPv6 and HMIPv6 in Terms of Key Parameters

    Mobile IPv6 (MIPv6) and Hierarchical Mobile IPv6 (HMIPv6) both are the mobility management solution proposed by the Internet Engineering Task Force (IETF) to support IP Mobility. There are various types of parameters which have been proposed and used to describe the system performance in the form of mobility of MIPv6...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    A Novel Algorithm to Select Cluster Heads with Highest and Balanced Energy in Wireless Sensor Networks

    A wireless sensor network consists of large number of sensor nodes limited by a small energy spread in a large geographical area. Many algorithm collect information from the network by using clustering. LEACH is the most famous and popular one from this algorithm to maintain the energy efficiency of sensor...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Energy Efficient Data Aggregation Using Voronoi Based Genetic Clustering Algorithm in WSN

    Wireless Sensor Network is an major emerging technique in wireless communication technology for application across a wide array of domains such as the military surveillance, medical diagnosis, weather forecasting, fire detection alarming systems, etc. One of the main challenges of wireless sensor network (WSN) is how to improve its time...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Design, Implementation and Integration of Heterogeneous Applications

    This paper is about integrating heterogeneous web applications using web services. A SOAP web service is being used to integrate applications like ASP.NET, Java and database. As usage of internet is expanding and the concept of web service is gaining publicity so there is a growing market demand for more...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Analysis of Different Pheromone Decay Techniques for ACO Based Routing in Ad Hoc Wireless Networks

    Ant Colony Optimization (ACO) technique deals with exploratory behavior of ants while finding food by following a path based on the concentration of the pheromone. A major limitation with ACO algorithm is "Stagnation". This occurs when all ants try to follow same path to reach the destination due to higher...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Adaptive Self-Correcting Floating Point Source Coding Methodology for a Genomic Encryption Protocol

    The authors address the problem of creating an adaptive source coding algorithm for a genomic encryption protocol using a small alphabet such as the nucleotide bases represented in the genetic code. For codewords derived from an alphabet of N plaintext with probability of occurrence, p, the authors describe a mapping...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Nonradiating Edges Gap-Coupled Multiple Resonator Dual and Tri-Band Microstrip Antennas

    A rectangular microstrip antenna for dual band and tri-band is developed using a parasitic technique. Single rectangular microstrip is splitted into multiple resonators along the width and gap coupled to non-radiating edges. The proposed structure gives sufficient separation between the operating frequencies increasing bandwidth for dual band and tri-band. It...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Efficient Conceptual Rule Mining on Text Clusters in Web Documents

    Text mining is a modern and computational approach attempts to determine new, formerly unidentified information by pertaining techniques from normal language processing and data mining. Clustering, one of the conventional data mining techniques is an unsubstantiated learning pattern where clustering techniques attempt to recognize intrinsic groupings of the text documents,...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Comparative Analysis of Lossless Text Compression Techniques

    Data compression is an effective means for saving storage space and channel bandwidth. There are two main types of compression lossy and lossless. This paper will deal with lossless compression techniques named Huffman, Arithmetic, LZ-78 and Golomb coding. The paper attempts to do comparative analysis in terms of their compression...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    SMDS: Secure Model for Cloud Data Storage

    Cloud computing is a computing technique, where a large group of systems are connected to private or public networks, where data owner can store his data on remote systems and frees himself from storage burden and uses the data on-demand, anytime, everywhere. As, a Cloud data user does not possess...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Fly Over the Clouds or Drive Through the Crowd: A Cloud Adoption Framework in Action

    Flying over the clouds or driving through the crowd, to work in an auto-managed and scalable environment or to get overwhelmed with the management as well as the development techniques and costly resources. That is a common problem facing most small to medium sized organizations. Cloud computing has been a...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Long Irregular LDPC Coded OFDM with Soft Decision

    OFDM with Quadrature Amplitude Modulation (QAM) technique can be used for high speed optical applications. Increasing the order of modulation, the Bit Error Rate (BER) increases. Forward Error Correction (FEC) coding like LDPC coding is generally used to improve the BER performance. LDPC provides large minimum distance and also the...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Intelligent Online E-Learning Systems: A Comparative Study

    The growth in the field of Information Technology (IT) has been very fast in last few decades and the various applications depending on IT are also changing very drastically. One of the very popular IT applications is online teaching and learning. The main focus of this paper is to survey...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Performance of an Endian Operating System for Step Topology

    In the current scenario, distributed computing approach is most popular approach for computing the processes known as subtasks, subroutines, macro's etc due to low cost involvement and minimum execution time. In the present work, the computer systems are attached with the help of static interconnection through step topology in which...

    Provided By International Journal of Computer Applications