International Journal of Computer Applications

Displaying 41-80 of 5820 results

  • White Papers // Jan 2015

    Evaluating the Research Trends and Techniques for Addressing Wormhole Attack in MANET

    Security issues in Mobile Ad-hoc NETwork (MANET) are veiled by various techniques that were introduced in past decade. Owing to decentralized nature of MANET, the security issues cultivates resulting in welcoming various lethal vulnerabilities. Out of all security issues in MANET, wormhole attack is considered one of the most challenging...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Rough Set Approach for the Classification of Advertisement in the Development of Business Establishment

    In the current age business establishments are basically depends upon advertisement to attain success. In this paper, the authors consider different forms of advertisements then using rough set concept, they find the best possible forms of advertisement. To develop this concept they consider 1000 samples initially and applying correlation techniques...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Intelligent Cluster Routing: An Energy Efficient Approach for Routing in Wireless Sensor Networks

    In recent years development and refinement in energy-efficient design and wireless technologies had made possible the development of new applications for wireless devices. These applications include remote monitoring using micro-sensors in networks and networking of everyday use home appliances. In this paper, the authors describe the approaches for routing in...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Comparative Analysis of MSER and DTW for Offline Signature Recognition

    In this paper, the authors describe the signature as a one of the most robust and widely used trait in biometric verification. The signature is also known as behavioral biometric property. They present comparative analysis of offline signature recognition based on Dynamic Time Warping (DTW) and Maximally Stable Extremely Regions...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    A Survey on Various Cryptographic Algorithms for Security Enhancement

    Cloud systems can be used to enable data sharing capabilities and this is an abundant benefit to the user. As cloud computing is a modern era computing technique that has a grater future and bringing a lot of benefit to the information technology. There are some security requirements when dealing...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Network Management by Tackling Replication Attacks: A Comparative Study

    Network is an interaction or engaging in formal or informal communication among systems to exchange information by mutual assistance or support. The sharing of resources helps the users on the network to communicate with each other. Node in a wireless sensor network that is capable of performance handling, gathering information...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Implementation of High Performance DUC and DDC for Software Defined Radio Applications

    Digital up converters are used at the transmitter side to up convert the baseband signal to intermediate frequency signal. Digital down converters are used at receiver side to down convert intermediate frequency signal to baseband signal. DUC and DDU modules are designed using System generator Xilinx block set and generated...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Semantic Cluster Based Classification for Data Leakage Detection for the Cloud Security

    A novel approach for the data leak detection in the cloud environment is discussed in this paper. The paper uses the semantic based clustering for the anomaly detection to find the data leak. The clustering is further used for the classification to add up for the semi supervised classification. After...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Framework to Detect Malicious Transactions in Database System

    Every organization is associated with huge amount of information which is more valuable. Data is important and so it should be consistent, accurate and correct. Today many approaches are used to protect the data as well as networks from attackers (attacks like SQLIA, Brute-force attack). One way to make data...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Using Ontologies to Model Attacks in an Internet Based Mobile Ad-Hoc Network (iMANET)

    Mobile Ad-hoc NETworks (MANETs) are flexible networks consisting of mobile nodes connected by wireless links. These networks were originally used in military projects such as Defense Advanced Research Projects Agency (DARPA) projects. In this paper, the usage of Semantic Web techniques to secure internet based Mobile Ad-hoc NETworks (iMANETs) has...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Design and Simulation of Random Access Procedure in LTE

    LTE was developed to support the increasing demand of packet data transmission besides the voice data. LTE is characterized by high-data-rate, low-latency and packet optimized radio-access technology. This has its impact on LTE link-layer protocols design. Specifically, peak data rate of 100Mb/s within 20 MHz downlink spectrum allocation and an...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Performance Evaluation of Proactive and Reactive Routing Protocols in Wireless Sensor Networks

    In this paper, the authors study the two different type of routing strategies used in wireless sensor networks i.e. proactive and reactive routing mechanisms. These routing mechanisms are applied in different kind of applications for efficient routing in the network. In this paper, they have studied the different routing protocols...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    A New Tactic to Maintain Privacy and Safety of Imagery Information

    Privacy as well as security is a burning issue to all the users in the field of Information Technology. With the perspective of socio, psychological, organizational, technical, economic and financial ground it is one of the most vital issues in the people every day's life. Presently; security is a prime...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Review on Scheduling of Resources in Cloud Environment

    Cloud computing provides an environment, where a large pool of systems are connected in networks (i.e., private or public), to provide dynamically scalable infrastructure for storage of application, data and file. Resource allocation is a way to assign resources to the needed applications. Cloud service providers use lease manager for...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    A Review on Techniques of Resource Allocation in Cloud Computing

    Cloud computing is the new era of technology; it uses virtualization and automation to provide user with self-service computing products that provide infinite scale at low cost. It serves user in many ways such as Infrastructure-as-a-Service (IaaS), Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS) etc. While serving as an IaaS it is inevitable...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    A Survey on: Secure Data Deduplication on Hybrid Cloud Storage Architecture

    Data deduplication is one of the most important Data compression techniques used for to removing the duplicate copies of repeating data and it is widely used in the cloud storage for the purpose of reduce the storage space and save bandwidth. To keep the confidentiality of sensitive data while supporting...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    A Survey on Performance Analysis of Different Multiplexing Scheme Used in Passive Optical Network System

    In this paper, the authors review on various multiplexing techniques used for particularly in optical communication to fulfill the demand of modern technology. Sharing of photonics in development of the physical layer within the future web can most likely increase. The photonics leads currently to a more robust usage of...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Load Balancing in Network to Increasing Performance Ratio of Packet Delivery Using Ant Colony Optimization

    Now-a-days, networks grow to become more and more complicated. Network can be wireless or wired with number of nodes. The problem remains the same in order to get best performance of packet delivery. There is need to find shortest path in order accomplish the delivery of packet. It's very difficult...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    A Survey of Privacy Preserving Auditing Techniques for Shared Data in Cloud Computing

    Now-a-days, cloud computing can be termed as service provider on demand. It has become centralized data storage for the huge amount of data. A users must be concerning about the protection and correctness of their data when they outsources their data to remote data storage as a cloud. Public auditing...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    A Survey of Soft Computing Techniques Based Load Balancing in Cloud Computing

    Cloud computing has become a new style of computing over the internet. There are so much advantages to use cloud over the internet as well as some critical issues are also there those must be resolved in order to improve the performance of the cloud. Cloud computing faces several issues...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Improved Routing Protocol for Coverage and Connectivity (RPCC) in Heterogeneous Wireless Sensor Network (HWSN)

    One of the active research fields in wireless sensor network is that of coverage. Coverage can be defined as how well each point of interest is monitored by sensor network. In addition to coverage it is important for a sensor network to maintain connectivity. Both of these are measure of...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Smart Personal Security: A Design Approach

    Recently personal security has become a sensitive issue. Small kids, ladies, as well as aged people need to have their secure against kidnapping, rape, chain snatching respectively. There are different areas & scopes of security. Recent social incidents gave the users motivation to develop personal security system. Kids, aged people...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Cloud Computing Security Framework Based on Elliptical Curve

    Technological advancements in cloud computing due to increased connectivity and exponentially proliferating data has resulted in migration towards cloud architecture that employ dynamic load and access balancing. Cloud computing is technology where the clients' can use high end services in form of software that reside on different servers and access...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Throughput Enhancement for Better QoS in WCDMA Networks

    WCDMA is interference limited multiple access technique and mainly used for transmission of high data rate in the 3rd generation cellular and mobile networks. In conventional Call Admission Control (CAC) techniques, when a new call admit in the system to get admission, it checks whether the call is admitted or...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    A Survey on Routing Protocols for MANET

    Mobile Ad hoc NETworks (MANETs) are a type of computer networks that have mobile devices, self-configured functioning, no static infrastructure and a wireless medium of information sharing. Rapid increase in demand for cellular phones and laptops that use MANETs has been encouraging extensive research in various optimized routing protocols for...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Performance Improvement of Coded OFDM Communication System in AWGN Channel

    OFDM (Orthogonal Frequency Division Multiplexing) is a basic element in the 4G mobile system. The OFDM performance can be improved using the channel coding. The channel coding is a class of signal transformations designed to improve communication system performance. In this paper, the authors discuss the performance improvement of OFDM...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Implementation Oriented Phase Based IRIS Recognition

    Phase based image matching is one of the technique which is used for iris recognition. In this technique phase component present in Two Dimensional (2D) Discrete Fourier Transform (DFT) of given images are used to determine similarity between two images. This technique can be used for developing applications such as...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Time and Load Based Cloud Scheduling Algorithm

    Due to the fast development of internet, a huge amount of load increases over data centers every second. This causes scheduling overhead, huge memory demand at data centers. Thus increases overhead effects the load balancing at data centers. So, there is a need of mechanisms which will decrease overhead and...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Double Combinatorial Auction Based Resource Allocation in Cloud Computing by Combinational Using of ICA and Genetic Algorithms

    Computational resources have become cheaper, more powerful and accessible than ever with the development of processing and strong technology and internet success. This technology has realized a new computing model called cloud computing in which resources are provided as a service to users and users can rent them or rent...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Solving Winner Determination Problem in Double Combinatorial Auction by ICA in Cloud Computing

    There are many different ways to allocate resources in cloud computing. The economic methods are some of common ways to resource allocation. The auction-based method has some advantages compared with Fixed-Price method. The double combinatorial auction is one of the proper ways of resource allocation in cloud computing. Resource allocation...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    AES S-Box Construction Using One Dimensional Cellular Automata Rules

    Substitution Box (S-Box) is the only non-linear component in Advanced Encryption Standard (AES) which determine its strength. The Look-Up Table (LUT) based S-Box of conventional AES occupies large storage space, reduced throughput and consumes more power. This paper presents the design of an S-Box based on reversible Cellular Automata (CA)...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Hybrid Security System Based on Wavelet Domain Watermarking and Chaotic Map Cryptography

    In this paper, the authors present a novel hybrid security system that combines wavelet based watermarking with block based chaotic maps cryptography. A watermark is chaotically encrypted before being embedded in the detail coefficients of the wavelet transformed cover image. Using the developed system, the potential of embedding more than...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Simulated Cryptography Algorithm for Enhanced Security of Cloud Data

    Today service providers are achieving ever-increasing transmission over networks due to cloud and web services bang. But information security of user as well as provider is a main apprehension whenever the authors talk about the implementation of network services. In this paper, the proposed work has developed a new cryptography...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Throughput Enhancement of Cognitive Radio Networks Through Improved Frame Structure

    A Cognitive Radio (CR) system exploits spectrum bands that are not fully utilized by the licensed users. For the successful deployment of the technology, the biggest challenge is to make network protocols more adaptive to use the available bandwidth effectively. Various Medium Access Control protocols (MAC) have been proposed by...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    A New Study in Support-Driven Middleware for VANET

    Vehicular Ad-hoc NETwork (VANET) can be used as quite a few apps for instance environmentally friendly keeping track of, commercial infrastructure safety, health care apps, along with targeted visitors handle. The look and continuing development of this kind of purposes should address quite a few problems set through VANET features...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Comparative Analysis of Different Mobility Protocols for VHO Based on MIH Standards

    Mobile user service continuity across heterogeneous wireless access network is a challenging task for designing future generation wireless networks. Existing communication platforms may efficiently utilize heterogeneous architecture rather homogeneous solution for both non-real-time and real-time applications. Such seamless service continuity is obtained by proper vertical handover algorithms and mobility protocols...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Security of Data Storage in Cloud Computing

    With the advent of information technology in day-to-day activities, the need for online services such as storage space, software, platforms etc. is increasing rapidly. This paper lead to the rise of a new concept, the cloud computing. The internet users rely heavily on the cloud computing for various computing resources....

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Reinforcement Based Cognitive Algorithms to Detect Malicious Node in Wireless Networks

    The growth of wireless communication technologies and its applications leads to many security issues. Malicious node detection is one among the major security issues. Adoption of cognition can detect and Prevent malicious activities in the wireless networks. To achieve cognition into wireless networks, the authors are using reinforcement learning techniques....

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    A Survey of Dynamic Replication Strategies in Distributed Systems

    In today's world, effective management and quick retrieval of data is an important issue. It is very challenging task to provide maximum data availability and fault tolerant data access in the distributed systems as it scales over different geographical areas. To handle this issue data has to be replicated on...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    A Dynamic Packet Scheduling Scheme with Multilevel Priority for Wireless Sensor Network

    Packet scheduling is one of the critical issues in wireless sensor networks. In WSNs most existing scheduling mechanisms use FCFS, non-preemptive or preemptive priority algorithms. However, most of these algorithms incur high processing overhead and high end-to-end transmission delay due to the FCFS concept and starvation of real time and...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Performance Evaluation of ODMRP and ADMR using Different Mobility Models

    A Mobile Ad-hoc NETwork (MANET) is a collection of wire-less mobile nodes forming a temporary network without using any existing infrastructure. Mobile Ad-Hoc is a dynamic, multi-hop and autonomous networks composed by wireless mobile nodes. MANETS are subject to rapid and unpredictable changes. MANETS are inexpensive wireless communication network. The...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    A Study of Different Parallel Implementations of Single Source Shortest Path Algorithms

    The authors present a study of parallel implementations of Single Source Shortest Path (SSSP) algorithms. In the last three decades number of parallel SSSP algorithms have been developed and implemented on the different type of machines. They have divided some of these implementations into two groups, first are those where...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Two Level Centre of Gravity Computation - An Important Parameter for Offline Signature Recognition

    This paper proposed feature extraction method based on centre of gravity for offline signature. Similar to other biometric measures, signatures have inherent variability and so pose a difficult recognition problem. Signature probably is one of the oldest biometric recognition methods, with high legal acceptance Signature has been a distinguishing feature...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Mining Attributes Patterns of Defective Modules for Object Oriented Software

    Defect prediction is the process of predicting the fault prone module using some pre-mined patterns or rules. Several statistical and mathematical strategies have been used in recent past to these rules. However, the interpretability of these rules is the matter of concern. In real development process an expert is required...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    An Operational Framework for Alert Correlation using a Novel Clustering Approach

    Intrusion Detection System (IDS) is a well known security feature and widely implemented among practitioners. However, since the creation of IDS the enormous number of alerts generated by the detection sensors has always been a setback in the implementation environment. Moreover due to this obtrusive predicament, two other problems have...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Software Testing-Three P-S Paradigm and Limitations

    Software Testing is an important area of research in the field of software engineering because it is the deciding factor for successful project release and directly proportion to software quality and reliability. A lot of research has been already done in this field, likely to be leveraged in future as...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Comparative Analysis of Classification Algorithms on Different Datasets using WEKA

    Data mining is the upcoming research area to solve various problems and classification is one of main problem in the field of data mining. In this paper, the authors use two classification algorithms J48 (which is java implementation of C4.5 algorithm) and multilayer perceptron alias MLP (which is a modification...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Personalization and Clustering of Similar Web Pages

    Over the last decade, clich?d information age has justly arrived. Moreover, the evolution of the Internet into the Global Information Infrastructure, together with the massive popularity of the Web, has also enabled the ordinary citizen to become not just a consumer of information, but also a part of it. In...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Multiuser Detection Using Zero Forcing Successive Interference Cancellation for WCDMA

    The performance of the WCDMA system is degraded due to the various network impairments such as interference, fading & noise and also due to network load. The work in this presents performance analysis of Zero Forcing Successive Interference Cancellation (ZF-SIC) scheme for the multiuser detection in the WCDMA environment. The...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Trusted Destination Sequenced Distance Vector Routing Protocol for Mobile Ad-hoc Network

    A Mobile Ad-hoc NETwork (MANET) is a self-organized system comprised of mobile wireless nodes with peer relationships. MANETs can operate without fixed infrastructure and can survive rapid changes in the network topology. Due to multi-hop routing and absence of any trusted third party in open environment, MANETs are vulnerable to...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    A GUI for Automatic Extraction of Signature from Image Document

    A New method for Extracting signature from image document is proposed based on the auto cropping method. This method improves the performance of security system based on signature images as well as provides the region of interest of the used image for the biometric system. This method also reduces the...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Analytical Evaluation of a Hybrid Chaotic Shift Keying [CS-QCSK] in a CDMA System

    In recent years, various chaos based modulation schemes were evolved, of which the CS-DCSK modulation technique provides a better BER performance and bandwidth efficiency, due to its code domain approach. The QCSK modulation technique provides double benefit, namely: higher data rate with similar BER performance and same bandwidth occupation as...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Opinion Mining of M Learning Reviews using Soft Computing Techniques

    Internet has increasingly become the place for online learning, and exchange of ideas. The rapid development in wireless technology offering fast data transfer has lead to mobile device revolution. With the ease of access of mobile devices like mobile phones, PDAs, tablet PCs and high bandwidth through wireless, there is...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Boosting Data Exchange Efficiency Using Developed Multi-Layer Simulation Models

    Rapid developments in communication and information technologies and the ever growing network user's demands have made network traffic efficiency a prominent problem in today's internet. as users come and go, so do the packets they send: internet performance is therefore largely governed by these inevitable natural fluctuations, it is therefore...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    A Democratic Head Election Strategy for Clustering in Wireless Sensor Network

    In recent years a lot of work has been done on Wireless Sensor Network (WSN) as it find its application in many applications including environmental monitoring and military field surveillance. In these applications tiny sensor nodes are deployed across the application regions. Data gathered by the sensor nodes are periodically...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    New Optimized Network Selection Decision In Heterogeneous Wireless Networks

    The expected growth in Radio Access Technologies (RAT's) such as wireless technologies (802.11a, 802.11b, 802.15, 802.16, etc.) and cellular networks (GPRS, UMTS, HSDPA, LTE, etc.) requires efficient vertical handoff algorithm. Variety of Vertical Handoff Algorithms (VHA) has been proposed to help the user to select dynamically the Best Access Network...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    5G: Future Mobile Technology-Vision 2020

    Currently, Mobile operators are busy with deployment of 4G technology namely, LTE-advanced or WIMAX 802.16m. This 4G technology will be concluded within two years. 5G technology is not standardizing yet, probably 5G standard will define in two to three years, and its deployment will start around 2020. In future, people...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    A Novel Approach for Heart Disease Diagnosis Using Data Mining and Fuzzy Logic

    Cardiovascular disease is a term used to describe a variety of heart diseases, illnesses, and events that impact the heart and circulatory system. A clinician uses several sources of data and tests to make a diagnostic impression but it is not necessary that all the tests are useful for the...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Performance Evaluation of Mobile Ad Hoc Networks with Reactive and Proactive Routing Protocols and Mobility Models

    Mobile Ad hoc Network is a collection of wireless mobile nodes dynamically forming a temporary network without the aid of any established infrastructure or centralized administration. Routing protocols in mobile ad hoc network helps node to send and receive packets. In this paper, the authors are doing study of AODV,...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Change Requests Artifacts to Assess Impact on Structural Design of SDLC Phases

    Current escalating demands on software, software developers to be obliged to generate software that can be altered, which escape from the risk of mortifying the software structural-design of the "SDLC phases". Degraded software structural-design is problematic because it makes the system more prone to defects and change requests turn to...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Arresting Wormhole Attack in Ad Hoc Network Using Cumulative Threshold Transmission Rate

    A mobile ad hoc network is a collection of mobile nodes that are interconnected via a wireless medium forwards packet to other nodes through multi hop mechanism. The genuine intermediaries relay the packets intended for the indirect radio range destination node. The cooperation existing between the intermediate nodes acts as...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Measuring Maintenance Effort in Object Oriented Software with Indirect Coupling

    Measurement of maintenance effort in object oriented software engineering is one of the major challenges. Coupling among classes is one of the major factors determining the maintenance effort. Coupling is measured as strength of interconnection or interdependence between different parts of the Classes in object oriented software. It is widely...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    A Stable Covering Set-Based Leader Election Algorithm (SCLEA) for Mobile Adhoc Distributed Systems

    Leader election process is known as the task of selecting a particular node or a process to be a unique leader of the distributed system. Many algorithms were proposed for leader election in classical, wired distributed systems. However, with the advent of wireless communication technology, the domain of distributed computing...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Hybrid Domain Based Steganography Using BPS, LSB and IWT

    The Steganography used to transport information from one place to other place through public channel in covert way. In this paper, the authors propose Hybrid domain Steganography using BPS, LSB and IWT (HSBLI). The payload is decomposed into two equal parts say part 1 and part 2. The cover and...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    A New SDLC Framework with Autonomic Computing Elements

    The autonomic complex nervous system of human has ability to manage itself. It adapts changes in its environment and manages by self-healing, self-protection and self-optimization. This gave a robust idea to manage current complex engineering systems and reduce big efforts in maintenance in terms of cost and time of technically...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Model Driven Adaptation and Usability for Context Aware User Interfaces

    In recent years, given the development of networks and technological innovations, the user mobility has increased so much. That is why the interactive applications must be executed on both mobile devices as PDAs, mobile phones and PC. The user is then progressing in a varied and dynamic environment. Therefore, the...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Performance Evaluation of MIPv6 and HMIPv6 in Terms of Key Parameters

    Mobile IPv6 (MIPv6) and Hierarchical Mobile IPv6 (HMIPv6) both are the mobility management solution proposed by the Internet Engineering Task Force (IETF) to support IP Mobility. There are various types of parameters which have been proposed and used to describe the system performance in the form of mobility of MIPv6...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    A Novel Algorithm to Select Cluster Heads with Highest and Balanced Energy in Wireless Sensor Networks

    A wireless sensor network consists of large number of sensor nodes limited by a small energy spread in a large geographical area. Many algorithm collect information from the network by using clustering. LEACH is the most famous and popular one from this algorithm to maintain the energy efficiency of sensor...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Energy Efficient Data Aggregation Using Voronoi Based Genetic Clustering Algorithm in WSN

    Wireless Sensor Network is an major emerging technique in wireless communication technology for application across a wide array of domains such as the military surveillance, medical diagnosis, weather forecasting, fire detection alarming systems, etc. One of the main challenges of wireless sensor network (WSN) is how to improve its time...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Design, Implementation and Integration of Heterogeneous Applications

    This paper is about integrating heterogeneous web applications using web services. A SOAP web service is being used to integrate applications like ASP.NET, Java and database. As usage of internet is expanding and the concept of web service is gaining publicity so there is a growing market demand for more...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Analysis of Different Pheromone Decay Techniques for ACO Based Routing in Ad Hoc Wireless Networks

    Ant Colony Optimization (ACO) technique deals with exploratory behavior of ants while finding food by following a path based on the concentration of the pheromone. A major limitation with ACO algorithm is "Stagnation". This occurs when all ants try to follow same path to reach the destination due to higher...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Adaptive Self-Correcting Floating Point Source Coding Methodology for a Genomic Encryption Protocol

    The authors address the problem of creating an adaptive source coding algorithm for a genomic encryption protocol using a small alphabet such as the nucleotide bases represented in the genetic code. For codewords derived from an alphabet of N plaintext with probability of occurrence, p, the authors describe a mapping...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Nonradiating Edges Gap-Coupled Multiple Resonator Dual and Tri-Band Microstrip Antennas

    A rectangular microstrip antenna for dual band and tri-band is developed using a parasitic technique. Single rectangular microstrip is splitted into multiple resonators along the width and gap coupled to non-radiating edges. The proposed structure gives sufficient separation between the operating frequencies increasing bandwidth for dual band and tri-band. It...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Efficient Conceptual Rule Mining on Text Clusters in Web Documents

    Text mining is a modern and computational approach attempts to determine new, formerly unidentified information by pertaining techniques from normal language processing and data mining. Clustering, one of the conventional data mining techniques is an unsubstantiated learning pattern where clustering techniques attempt to recognize intrinsic groupings of the text documents,...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Comparative Analysis of Lossless Text Compression Techniques

    Data compression is an effective means for saving storage space and channel bandwidth. There are two main types of compression lossy and lossless. This paper will deal with lossless compression techniques named Huffman, Arithmetic, LZ-78 and Golomb coding. The paper attempts to do comparative analysis in terms of their compression...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    SMDS: Secure Model for Cloud Data Storage

    Cloud computing is a computing technique, where a large group of systems are connected to private or public networks, where data owner can store his data on remote systems and frees himself from storage burden and uses the data on-demand, anytime, everywhere. As, a Cloud data user does not possess...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Fly Over the Clouds or Drive Through the Crowd: A Cloud Adoption Framework in Action

    Flying over the clouds or driving through the crowd, to work in an auto-managed and scalable environment or to get overwhelmed with the management as well as the development techniques and costly resources. That is a common problem facing most small to medium sized organizations. Cloud computing has been a...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Long Irregular LDPC Coded OFDM with Soft Decision

    OFDM with Quadrature Amplitude Modulation (QAM) technique can be used for high speed optical applications. Increasing the order of modulation, the Bit Error Rate (BER) increases. Forward Error Correction (FEC) coding like LDPC coding is generally used to improve the BER performance. LDPC provides large minimum distance and also the...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Intelligent Online E-Learning Systems: A Comparative Study

    The growth in the field of Information Technology (IT) has been very fast in last few decades and the various applications depending on IT are also changing very drastically. One of the very popular IT applications is online teaching and learning. The main focus of this paper is to survey...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Performance of an Endian Operating System for Step Topology

    In the current scenario, distributed computing approach is most popular approach for computing the processes known as subtasks, subroutines, macro's etc due to low cost involvement and minimum execution time. In the present work, the computer systems are attached with the help of static interconnection through step topology in which...

    Provided By International Journal of Computer Applications