International Journal of Computer Applications

Displaying 41-80 of 4617 results

  • White Papers // Sep 2014

    Survey on Energy Efficient Routing Protocols in WSNs

    Wireless Sensor Network (WSN) is a highly distributed network of small and lightweight sensing nodes which are deployed in a large number at multiple locations. These networks are helpful in monitoring the system or environment. These sensor nodes performs sensing, processing and then communicating. Now-a-days, these networks are applied in...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    A Survey on Biometric Templates Binarization

    Due to the wide usage of biometrics, privacy and security concerns cannot be neglected. Biometric template protection systems have been proposed to protect the biometric template against unauthorized use. Many biometric template protection systems require the biometric template to be presented in a binary form. Biometric template binarization is the...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Approaches for Web Spam Detection

    Spam is a major threat to web security. The web of trust is being abused by the spammers through their ever evolving new tactics for their personal gains. In fact, there is a long chain of spammers who are running huge business campaigns under the web. Spam causes underutilization of...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Forecasting Chaotic Stock Market Data Using Time Series Data Mining

    An important financial subject that has attracted researchers' attention for many years is forecasting stock return. Many researchers have contributed in this area of chaotic forecast in their ways. Among them data mining techniques have been successfully shown to generate high forecasting accuracy of stock price movement. Now-a-days, instead of...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Cooperative Communication Simulation Using TCP

    Demand for wireless communication has increased rapidly. Almost everywhere there is a wireless device (phones, laptops, etc.) that need to communicate with other mobile devices in their region or to connect to an internet access point, and they need to exchange data especially via internet. As a result, the need...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Detection Mechanism for Distributed Denial of Service (DDoS) Attack in Mobile Ad-hoc Networks

    Mobile ad hoc networks are non-static networks which formed without any central point communication infrastructure. In addition to node mobility, a ad-hoc is defined by bounded resource constraints such as bandwidth, battery power, and storage space. In this network, the intermediate nodes play role of router which routed the packets...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Adapting K-Means for Clustering in Big Data

    Big data if used properly can bring huge benefits to the business, science and humanity. The various properties of big data like volume, velocity, variety, variation and veracity render the existing techniques of data analysis ineffective. Big data analysis needs fusion of techniques for data mining with those of machine...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    A Parametric Estimation Approach for Effective Cluster Selection in WPAN

    WPAN is the most advanced communication network that combines the capabilities of mobile network and sensor network in a complex global area scenario. This network defines various integrated processes under communication scenario specification. Cluster selection process is the most common requirement of any WPAN scenario because of the mobility feature...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    A Compact Dual Band Monopole Antenna Using Defected Ground Structure

    A very compact microstrip fed dual band antenna is designed for WLAN and WiMAX application. The antenna offers a wide bandwidth of 1.28GHz from 2.396GHz to 3.678GHz. The antenna resonates at around 2.53GHz and 3.37GHz defined by 10dB return loss which covers WLAN (2.4GHz) and WiMAX (3.5GHz). The antenna has...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Study and Analysis of Regression Test Case Selection Techniques

    The activity of re-testing of only those parts of the program or code, in which some modifications are performed to ensure that errors have not been added and the changes do not affect the other parts of the code, which have not been modified is called as regression testing. Regression...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Implementation of Intelligent Wireless Sensor Network Using Geo-Casting Routing

    Wireless Sensor Network (WSN) is the basic and interesting areas among practitioners and researchers in various fields. As sensor nodes are prone to environmental changes and external agents. That's why it is becoming necessary to organize the wireless sensor network which is secure, energy efficient and has prolonged network life....

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Real Time Location Based Tracking Using WIFI Signals

    Now-a-days, the difficult to tracking the mobile devices has become an issue. Various needs are arising for finding out ways of tracking mobile devices. In this paper included different algorithm for location tracking. The activity of tracking includes learning and inference, sensing. Different algorithms have different mechanisms based on which...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    A Performance Study of Various Security Attacks on AODV Routing Protocol in MANET

    Mobile Ad-hoc NETwork (MANET) is a self-configuring wireless network of movable and independent nodes which operate without the support of any permanent infrastructure, hence MANET has dynamic topology. In MANET, each node forwards traffic unrelated to its own use. Despite the proliferation of MANET, it is prone to various attacks...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Tendering Process: Improvement of Analysis and Evaluation of Tenders Based on the Use of Fuzzy Logic and Rule of Proportion

    In this paper, the authors propose improvements concerning the analysis and the evaluation of tenders in the tendering process. At first, a new method of analysis and evaluation of tenders using the rule of proportion is proposed. Secondly, the principles of fuzzy logic are introduced in order to reconsider limits...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    An Efficient Approach for Requirement Volatility Identification

    Software development is a dynamic activity. Requirements of the stakeholders keep on changing throughout the lifecycle of a project development. These volatile requirements are considered as a major risk factor during system development in the software industry. Requirement volatility is found to be having a significant impact on schedule &...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Heterogeneity Aware Clustered WSN Using Multi-Hop Communication

    Energy in wireless sensor network is a recent topic of research. To organize the network such a way that should minimize energy dissipation and maximize network stability period and network lifetime. In this paper, a distributed, randomized Heterogeneity Aware Clustering Algorithm (HACA) to organize the sensors in a wireless sensor...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    A Novel Approach Using Dual Active Feature Sample Selection and LTS (Learn to Search)

    Determining the bug signatures (context of bug) is difficult, as it involves mining the execution traces of the program. The discriminative graph mining algorithm is used to identify the bug signatures. It requires manual labeling of the input set to estimate the discriminative sub graphs. To reduce the tedious work...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Network Security Analysis in the Enterprise LANs

    Enterprise Local Area Networks (ELANs) have been expanding following an increase in the number of staff which necessitates establishment of new offices. However, reliability and security of services provided by ELANs need to be ensured at all times to meet expectations of users. In this paper, the network security holes...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Design Analysis of a Hexaband Slot Loaded Microstrip Patch Antenna Using ANN

    In recent years, the requirement for wireless communication systems has increased rapidly demanding quality of service, protection of information and increased data rate for the Wireless Local Area Networks (WLANs). The designing of an antenna is a critical area for the present wireless communication system. It is important to maintain...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    A Comparative Analysis of Offline Signature Verification Using Zernike Moment and Minutiae Using Artificial Neural Network Approach

    Signature verification is the oldest and widely used biometrics offering offline (static) and online (dynamic) verification schemes. It has been observed that offline scheme is more complex because of the absence of stable dynamic characteristics and factors like stylish and unconventional writing styles but still it is more into use...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Congestion Controlled WSN Using Genetic Algorithm with Different Source and Sink Mobility Scenarios

    Wireless Sensor Networks (WSNs) are extremely densely populated and have to handle large bursts of data during high activity periods giving rise to congestion which may disrupt normal operation. It usually occurs when most of the data packets follow one route to reach from source to destination. Thus, there is...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    A Wireless Sensor Network Based Market Parking Scheme

    Parking in major cities, especially around a market vicinity is not only limited but costly. Innovative parking systems to curb this phenomenon are required. This paper proposes a novel and strategic approach using Wireless Sensor Networks (WSNs) as a solution. The WSNs consisting of sensor nodes are known for offering...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Advanced Preprocessing Techniques Used in Web Mining - A Study

    Web based applications are now increasingly becoming more popular among the users across the world. The user interactions with the applications are being tracked by the web log files that are maintained by the web server. For this purpose Web Usage Mining (WUM) is being used. Web usage mining is...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Effective Cluster Based Routing Algorithm for WMNS Using Effective Data Aggregation

    Wireless Mesh Network (WMN) is a key technology, supporting a variety of several emerging and commercially interesting applications. The multi-hop nature of WMNs and the rapid growth of throughput demands lead to multi-channels and multi-radios structures in mesh networks, but the interference of co-channels, as a main problem reduces the...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    The Effect of Mobility Models and Traffic Patterns on the Performance of Routing Protocols in MANETs

    Mobile Ad-hoc NETworks (MANETs) are self-organizing networks which can form a communication network without any fixed infrastructure. Constant Bit Rate (CBR) traffic pattern is very well known traffic model for MANETs which generates data packets at a constant rate. Transmission Control Protocol (TCP) provides reliability to data transferring in all...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Design and Implementation of Appliance Controller Using Traditional or Smart Phone

    Mobile phones are widely used now-a-days, for different application such as wireless control and monitoring due to its availability and ease of use. The implemented system is based on \"Global System Mobile (GSM)\" network by using \"Short Message Service (SMS)\". The design mainly contains a GSM modem and interfacing unit...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Low Complexity Algorithm for Probability Density Estimation Applied in Big Data Analysis

    Running inference algorithms on a huge quantity of data knows some perturbations and looses performance. One of big data aims is the design of fast inference algorithms able to extract hidden information on a big quantity of data. This paper proposes a new low complexity algorithm for probability density estimation...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Dijkstra Shortest Path Algorithm Using Global Positioning System

    Dijkstra's algorithm is used to find the shortest path from one node to another node in a graph. Dijkstra's algorithm is also known as a single source shortest path algorithm. It is applied only on positive weights. In this paper, Global Positioning System (GPS) is used for adding a new...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    An Improved Expectation Maximization Based Semi-Supervised Email Classification Using Naive Bayes and K- Nearest Neighbor

    With the development of internet and the emergence of a large number of text resources, the automatic text classification has become a research hotspot. Emails is one of the fastest and cheapest communication ways that today it has became the part of communication means of millions of people. It has...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Intelligent Linear Data Structure with Self Performance Optimization Capacity: Application on Big Data

    The access to relevant information from a big data container is gaining immense significance. This depends on storage techniques and the organization level. This paper proposes an intelligent linear data structure with an integrated cognitive agent reorganizing periodically the data structure content. The reorganization is based on a confidence interval...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Security Analysis and Performance Evaluation of an Enhanced Two-Factor Authenticated Scheme

    Various security attacks may cause unauthorized access, misuse, modification, or denial of a computer network and network accessible resources. To prevent these attacks various authentication means can be used to provide authenticated key exchange protocols. Authenticated key exchange protocol allows the exchange of session key and also authenticates the identities...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Secure Approach for Location Aided Routing in Mobile Ad Hoc Network

    Mobile Ad-hoc NETworks (MANETs) are self-managing network which consists of distributed nodes that communicate with each other through wireless links with no fixed infrastructure and no centralized control. Due to self-configuring and dynamic nature of these networks routing protocol are susceptible to various types of attacks. The black hole attack...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Fuzzy Rule Based Enhanced Homomorphic Encryption in Cloud Computing

    Now-a-days, internet services are one of the most popular services for transferring data and information. Cloud computing is also based on internet services used for storing, transferring and many more operations related to data & work. As it is based on internet services, security is one of the major concerns...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    An Investigational Study of Energy Conservation Techniques in Hierarchical Routing Protocols in Wireless Sensor Network

    In the advent of wireless networking, Wireless Sensor Network (WSN) has been a constant target of research due to its potential data aggregation techniques in hostile environment. Even after crossing more than a decade, wireless sensor network is still more under research and development and less on commercial deployment when...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Spectrum Sensing Technique Based on CAF and 3rd Order Cumulant for Cognitive Radio

    Cognitive radio system provide the user a solution for spectrum congestion problem, but the effectiveness of the system is only depends on the technique used for spectrum sensing, that how effectively the detection is performing at very low SNR. In this paper, the authors proposed a technique of spectrum sensing...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Design of 4G Antenna for Mobile Handset

    Mobile communication is one of the hottest current areas and is developing extremely fast in present times also led to the advancement of antenna systems in the recent decade. A compact multiband planar antenna is designed for mobile phone applications in this paper. A planar monopole antenna into distributed radiating...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Supervisory Control and Data Acquisition

    Since the advent of control systems, Supervisory Control and Data Acquisition (SCADA) have played an important role in the field of automation. SCADA systems offer a means of controlling remotely located devices in an industrial process. Supervisory control can be combined with data acquisition wherein the data is obtained from...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    A Method for the Selection of Software Testing Automation Framework Using Analytic Hierarchy Process

    Software Test Automation Framework (STAF) is a set of concepts, assumptions or practices that provide support for automated software testing. STAF includes the following for capturing and controlling the test activity, i.e., test objects, library files and reusable scripts etc. In this paper, the authors have identified different types of...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    A Novel Approach of Designing Cryptographic Algorithm with High Confidentiality

    Today's in modern world security is the main issue while communication. Internet is main source for communication but also it is not as much secure as it assume. For secure transmission of data many algorithms have been developed. Steganography and encryption/decryption algorithms are used for confidentiality. Some times to improve...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Building an Object Cloud Storage Service System using OpenStack Swift

    Cloud storage systems are increasingly noticed now-a-days as they are promising elastic capability and high reliability at low cost. In these services, the files are stored in an authenticated cloud storage service center. The most important feature is storage is adjusted dynamically, and there won't be any worry about space...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Performance Evaluation of ODMRP and ADMR using Different Mobility Models

    A Mobile Ad-hoc NETwork (MANET) is a collection of wire-less mobile nodes forming a temporary network without using any existing infrastructure. Mobile Ad-Hoc is a dynamic, multi-hop and autonomous networks composed by wireless mobile nodes. MANETS are subject to rapid and unpredictable changes. MANETS are inexpensive wireless communication network. The...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    A Study of Different Parallel Implementations of Single Source Shortest Path Algorithms

    The authors present a study of parallel implementations of Single Source Shortest Path (SSSP) algorithms. In the last three decades number of parallel SSSP algorithms have been developed and implemented on the different type of machines. They have divided some of these implementations into two groups, first are those where...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Two Level Centre of Gravity Computation - An Important Parameter for Offline Signature Recognition

    This paper proposed feature extraction method based on centre of gravity for offline signature. Similar to other biometric measures, signatures have inherent variability and so pose a difficult recognition problem. Signature probably is one of the oldest biometric recognition methods, with high legal acceptance Signature has been a distinguishing feature...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Mining Attributes Patterns of Defective Modules for Object Oriented Software

    Defect prediction is the process of predicting the fault prone module using some pre-mined patterns or rules. Several statistical and mathematical strategies have been used in recent past to these rules. However, the interpretability of these rules is the matter of concern. In real development process an expert is required...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    An Operational Framework for Alert Correlation using a Novel Clustering Approach

    Intrusion Detection System (IDS) is a well known security feature and widely implemented among practitioners. However, since the creation of IDS the enormous number of alerts generated by the detection sensors has always been a setback in the implementation environment. Moreover due to this obtrusive predicament, two other problems have...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Software Testing-Three P-S Paradigm and Limitations

    Software Testing is an important area of research in the field of software engineering because it is the deciding factor for successful project release and directly proportion to software quality and reliability. A lot of research has been already done in this field, likely to be leveraged in future as...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Comparative Analysis of Classification Algorithms on Different Datasets using WEKA

    Data mining is the upcoming research area to solve various problems and classification is one of main problem in the field of data mining. In this paper, the authors use two classification algorithms J48 (which is java implementation of C4.5 algorithm) and multilayer perceptron alias MLP (which is a modification...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Personalization and Clustering of Similar Web Pages

    Over the last decade, clich?d information age has justly arrived. Moreover, the evolution of the Internet into the Global Information Infrastructure, together with the massive popularity of the Web, has also enabled the ordinary citizen to become not just a consumer of information, but also a part of it. In...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Multiuser Detection Using Zero Forcing Successive Interference Cancellation for WCDMA

    The performance of the WCDMA system is degraded due to the various network impairments such as interference, fading & noise and also due to network load. The work in this presents performance analysis of Zero Forcing Successive Interference Cancellation (ZF-SIC) scheme for the multiuser detection in the WCDMA environment. The...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Trusted Destination Sequenced Distance Vector Routing Protocol for Mobile Ad-hoc Network

    A Mobile Ad-hoc NETwork (MANET) is a self-organized system comprised of mobile wireless nodes with peer relationships. MANETs can operate without fixed infrastructure and can survive rapid changes in the network topology. Due to multi-hop routing and absence of any trusted third party in open environment, MANETs are vulnerable to...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    A GUI for Automatic Extraction of Signature from Image Document

    A New method for Extracting signature from image document is proposed based on the auto cropping method. This method improves the performance of security system based on signature images as well as provides the region of interest of the used image for the biometric system. This method also reduces the...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Analytical Evaluation of a Hybrid Chaotic Shift Keying [CS-QCSK] in a CDMA System

    In recent years, various chaos based modulation schemes were evolved, of which the CS-DCSK modulation technique provides a better BER performance and bandwidth efficiency, due to its code domain approach. The QCSK modulation technique provides double benefit, namely: higher data rate with similar BER performance and same bandwidth occupation as...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Opinion Mining of M Learning Reviews using Soft Computing Techniques

    Internet has increasingly become the place for online learning, and exchange of ideas. The rapid development in wireless technology offering fast data transfer has lead to mobile device revolution. With the ease of access of mobile devices like mobile phones, PDAs, tablet PCs and high bandwidth through wireless, there is...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Boosting Data Exchange Efficiency Using Developed Multi-Layer Simulation Models

    Rapid developments in communication and information technologies and the ever growing network user's demands have made network traffic efficiency a prominent problem in today's internet. as users come and go, so do the packets they send: internet performance is therefore largely governed by these inevitable natural fluctuations, it is therefore...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    A Democratic Head Election Strategy for Clustering in Wireless Sensor Network

    In recent years a lot of work has been done on Wireless Sensor Network (WSN) as it find its application in many applications including environmental monitoring and military field surveillance. In these applications tiny sensor nodes are deployed across the application regions. Data gathered by the sensor nodes are periodically...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    New Optimized Network Selection Decision In Heterogeneous Wireless Networks

    The expected growth in Radio Access Technologies (RAT's) such as wireless technologies (802.11a, 802.11b, 802.15, 802.16, etc.) and cellular networks (GPRS, UMTS, HSDPA, LTE, etc.) requires efficient vertical handoff algorithm. Variety of Vertical Handoff Algorithms (VHA) has been proposed to help the user to select dynamically the Best Access Network...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    5G: Future Mobile Technology-Vision 2020

    Currently, Mobile operators are busy with deployment of 4G technology namely, LTE-advanced or WIMAX 802.16m. This 4G technology will be concluded within two years. 5G technology is not standardizing yet, probably 5G standard will define in two to three years, and its deployment will start around 2020. In future, people...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    A Novel Approach for Heart Disease Diagnosis Using Data Mining and Fuzzy Logic

    Cardiovascular disease is a term used to describe a variety of heart diseases, illnesses, and events that impact the heart and circulatory system. A clinician uses several sources of data and tests to make a diagnostic impression but it is not necessary that all the tests are useful for the...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Performance Evaluation of Mobile Ad Hoc Networks with Reactive and Proactive Routing Protocols and Mobility Models

    Mobile Ad hoc Network is a collection of wireless mobile nodes dynamically forming a temporary network without the aid of any established infrastructure or centralized administration. Routing protocols in mobile ad hoc network helps node to send and receive packets. In this paper, the authors are doing study of AODV,...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Change Requests Artifacts to Assess Impact on Structural Design of SDLC Phases

    Current escalating demands on software, software developers to be obliged to generate software that can be altered, which escape from the risk of mortifying the software structural-design of the "SDLC phases". Degraded software structural-design is problematic because it makes the system more prone to defects and change requests turn to...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Arresting Wormhole Attack in Ad Hoc Network Using Cumulative Threshold Transmission Rate

    A mobile ad hoc network is a collection of mobile nodes that are interconnected via a wireless medium forwards packet to other nodes through multi hop mechanism. The genuine intermediaries relay the packets intended for the indirect radio range destination node. The cooperation existing between the intermediate nodes acts as...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Measuring Maintenance Effort in Object Oriented Software with Indirect Coupling

    Measurement of maintenance effort in object oriented software engineering is one of the major challenges. Coupling among classes is one of the major factors determining the maintenance effort. Coupling is measured as strength of interconnection or interdependence between different parts of the Classes in object oriented software. It is widely...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    A Stable Covering Set-Based Leader Election Algorithm (SCLEA) for Mobile Adhoc Distributed Systems

    Leader election process is known as the task of selecting a particular node or a process to be a unique leader of the distributed system. Many algorithms were proposed for leader election in classical, wired distributed systems. However, with the advent of wireless communication technology, the domain of distributed computing...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Hybrid Domain Based Steganography Using BPS, LSB and IWT

    The Steganography used to transport information from one place to other place through public channel in covert way. In this paper, the authors propose Hybrid domain Steganography using BPS, LSB and IWT (HSBLI). The payload is decomposed into two equal parts say part 1 and part 2. The cover and...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    A New SDLC Framework with Autonomic Computing Elements

    The autonomic complex nervous system of human has ability to manage itself. It adapts changes in its environment and manages by self-healing, self-protection and self-optimization. This gave a robust idea to manage current complex engineering systems and reduce big efforts in maintenance in terms of cost and time of technically...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Model Driven Adaptation and Usability for Context Aware User Interfaces

    In recent years, given the development of networks and technological innovations, the user mobility has increased so much. That is why the interactive applications must be executed on both mobile devices as PDAs, mobile phones and PC. The user is then progressing in a varied and dynamic environment. Therefore, the...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Performance Evaluation of MIPv6 and HMIPv6 in Terms of Key Parameters

    Mobile IPv6 (MIPv6) and Hierarchical Mobile IPv6 (HMIPv6) both are the mobility management solution proposed by the Internet Engineering Task Force (IETF) to support IP Mobility. There are various types of parameters which have been proposed and used to describe the system performance in the form of mobility of MIPv6...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    A Novel Algorithm to Select Cluster Heads with Highest and Balanced Energy in Wireless Sensor Networks

    A wireless sensor network consists of large number of sensor nodes limited by a small energy spread in a large geographical area. Many algorithm collect information from the network by using clustering. LEACH is the most famous and popular one from this algorithm to maintain the energy efficiency of sensor...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Energy Efficient Data Aggregation Using Voronoi Based Genetic Clustering Algorithm in WSN

    Wireless Sensor Network is an major emerging technique in wireless communication technology for application across a wide array of domains such as the military surveillance, medical diagnosis, weather forecasting, fire detection alarming systems, etc. One of the main challenges of wireless sensor network (WSN) is how to improve its time...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Design, Implementation and Integration of Heterogeneous Applications

    This paper is about integrating heterogeneous web applications using web services. A SOAP web service is being used to integrate applications like ASP.NET, Java and database. As usage of internet is expanding and the concept of web service is gaining publicity so there is a growing market demand for more...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Analysis of Different Pheromone Decay Techniques for ACO Based Routing in Ad Hoc Wireless Networks

    Ant Colony Optimization (ACO) technique deals with exploratory behavior of ants while finding food by following a path based on the concentration of the pheromone. A major limitation with ACO algorithm is "Stagnation". This occurs when all ants try to follow same path to reach the destination due to higher...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Adaptive Self-Correcting Floating Point Source Coding Methodology for a Genomic Encryption Protocol

    The authors address the problem of creating an adaptive source coding algorithm for a genomic encryption protocol using a small alphabet such as the nucleotide bases represented in the genetic code. For codewords derived from an alphabet of N plaintext with probability of occurrence, p, the authors describe a mapping...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Nonradiating Edges Gap-Coupled Multiple Resonator Dual and Tri-Band Microstrip Antennas

    A rectangular microstrip antenna for dual band and tri-band is developed using a parasitic technique. Single rectangular microstrip is splitted into multiple resonators along the width and gap coupled to non-radiating edges. The proposed structure gives sufficient separation between the operating frequencies increasing bandwidth for dual band and tri-band. It...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Efficient Conceptual Rule Mining on Text Clusters in Web Documents

    Text mining is a modern and computational approach attempts to determine new, formerly unidentified information by pertaining techniques from normal language processing and data mining. Clustering, one of the conventional data mining techniques is an unsubstantiated learning pattern where clustering techniques attempt to recognize intrinsic groupings of the text documents,...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Comparative Analysis of Lossless Text Compression Techniques

    Data compression is an effective means for saving storage space and channel bandwidth. There are two main types of compression lossy and lossless. This paper will deal with lossless compression techniques named Huffman, Arithmetic, LZ-78 and Golomb coding. The paper attempts to do comparative analysis in terms of their compression...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    SMDS: Secure Model for Cloud Data Storage

    Cloud computing is a computing technique, where a large group of systems are connected to private or public networks, where data owner can store his data on remote systems and frees himself from storage burden and uses the data on-demand, anytime, everywhere. As, a Cloud data user does not possess...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Fly Over the Clouds or Drive Through the Crowd: A Cloud Adoption Framework in Action

    Flying over the clouds or driving through the crowd, to work in an auto-managed and scalable environment or to get overwhelmed with the management as well as the development techniques and costly resources. That is a common problem facing most small to medium sized organizations. Cloud computing has been a...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Long Irregular LDPC Coded OFDM with Soft Decision

    OFDM with Quadrature Amplitude Modulation (QAM) technique can be used for high speed optical applications. Increasing the order of modulation, the Bit Error Rate (BER) increases. Forward Error Correction (FEC) coding like LDPC coding is generally used to improve the BER performance. LDPC provides large minimum distance and also the...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Intelligent Online E-Learning Systems: A Comparative Study

    The growth in the field of Information Technology (IT) has been very fast in last few decades and the various applications depending on IT are also changing very drastically. One of the very popular IT applications is online teaching and learning. The main focus of this paper is to survey...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Performance of an Endian Operating System for Step Topology

    In the current scenario, distributed computing approach is most popular approach for computing the processes known as subtasks, subroutines, macro's etc due to low cost involvement and minimum execution time. In the present work, the computer systems are attached with the help of static interconnection through step topology in which...

    Provided By International Journal of Computer Applications