International Journal of Computer Applications

Displaying 81-120 of 5614 results

  • White Papers // Nov 2014

    Energy Efficient Virtual Machine Optimization

    The optimization of energy consumption in the cloud computing environment is the question how to use various energy conservation strategies to efficiently allocate resources. The need of different resources in cloud environment is unpredictable. It is observed that load management in cloud is utmost needed in order to provide QoS....

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Constraint Free Testing Using Service Virtualization

    Service virtualization is the latest trend in the software industry leveraged throughout the application development lifecycle. It has thrived recently due to its ability to address numerous constraints faced while developing and testing a software product. It can break through delays, costs and risks imposed by dependent IT resources that...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    A Survey: Web Based Cyber Crimes and Prevention Techniques

    Offences those are committed against an individual or a group with a criminal motive to intentionally harm the reputation or cause physical or mental harm to the victim using modern telecommunication networks such as the internet (chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS) are termed as...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Application of Blind Deblurring Algorithm for Face Biometric

    Face recognition is one of the most important abilities which the users' use in public security and for identity verification for physical and logical access. It is well known that many image-based face recognition algorithms perform well, when constrained (frontal, well illuminated, high-resolution, sharp, and full) face images are acquired....

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Firewall Anomaly Management: A Survey

    Firewall secures a private network from intrusions from other networks. The firewall has ACLs (Access Control List) that contain rules used to allow or deny incoming traffic. These rules form the security policy of the firewall. The large size and complexity of modern networks result in large and complex firewall...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Scalable and Secure Multi Cloud Architecture for IaaS to Address the Performance Issues

    Security is an important concern to improve in emerging cloud computing to store, manage, analyze and share the sensitive data. Infrastructure-as-a-Service (IaaS) is a provision cloud model attracting all business customers to use cloud by offering on-demand and pay-per-use hardware, storage, servers and other networking components. Present single cloud architectures...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Fast Image Retrieval Method Based on Controlled Self Organization Map Neural Network on Biometric Feature

    Face recognition is proving to exist single of the majority dependable biometric traits for personal recognition. In information face prototype have steady, invariant and idiosyncratic feature for individual recognition Reliable agreement and substantiation are flattering essential for many on a daily basis application. In this paper, the authors are proposing...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Secure Data and Service Access Model for Peer-to-Peer Systems Using Trust Relations

    Peer-To-Peer (P2P) systems are based on collaboration of peers to accomplish tasks. Trust relationship among peers can help to reduce attacks of peers with malicious intent. In this paper, the authors presents algorithms which helps a peer to reason about trustworthiness of other peers based on interactions in the past...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    An Improved RSA Cryptographic System

    In today's life the computer and the communication technologies are very important part of strong economy. That's why the users' need a suitable security standards systems and technologies to meet that security needs. In this paper, the authors introduced RSA cryptosystem and its security aspects. RSA is a public key...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    On the Optimal Learning Rate Size for the Generalization Ability of Artificial Neural Networks in Forecasting TCP/IP Traffic Trends

    Artificial Neural Networks (ANNs) have attracted increasing attention from researchers in many fields. One area in which ANNs have featured prominently is in the forecasting of TCP/IP network traffic trends. Their ability to model almost any kind of function regardless of its degree of nonlinearity, positions them as good candidates...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    A Review of Studies on Change Proneness Prediction in Object Oriented Software

    Predicting change prone class in software is a difficult software engineering process. Selection of wrong effort estimation can delay project completion and can incur unnecessary cost also. This paper is to provide a basis to improve the process of prediction of change prone classes. This paper reports a systematic review...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    An Efficient Technique for Software Fault Prediction in Variance Analysis

    In this paper, the authors are using machine learning method for predicting fault, i.e. support vector machine to predict the accuracy of the model predicted. The proposed models are validated using dataset collected from open source software. The results are analyzed using Area Under the Curve (AUC) obtained from Receiver...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    A Survey of Test Framework

    Software framework is a universal software platform in software application. A framework proposes to provide generic functionality of software. Best practice of framework will be used in very software application. A specific software application changes a framework and reuses it. With test framework improves the reusability of test environment. This...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Securing Data with Encryption and Color Encoding Scheme for Mobile Device

    Today most data is stored & transferred from mobile device like laptops. These devices are prone to theft; also the users transfer the data via network which is not secured. All above reasons forms the backbone for the authors' paper which implements an encryption scheme and color encoding for such...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Wireless Controlling of Appliances Through Voice

    Home automation industry is growing rapidly. Automation systems must comply with the household standards and convenience of usage. This paper involves the design and construction of wireless control of home devices using microcontroller. The automation centers on voice commands and uses low-power RF wireless communication modules which are relatively cheap....

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Security Enhancement in MANETS Using the Concept of Leader Nodes

    In this paper, the authors aim to detect the malicious behavior of the nodes by first selecting some set of leader nodes. The leader nodes are those set of nodes in a network which monitor the whole network of nodes. The set of leader nodes is referred as the dominating...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Sybil Attack and Its Proposed Solution

    In a reverse social engineering attack, the attacker does not start contact with the victim. Rather, the victims initiate the contacts. Because of this, trust is established between the victim and the attacker as the victim is the entity that established the relationship. Social engineering, in terms of information security,...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    A New Approach to Distributed Energy - Efficient Cluster for Heterogeneous WSNs

    A wireless sensor network consists of inexpensive power constrained sensors collecting data from the environment and transmits it towards the base station in a concerted way. Energy saving and extending the network lifetime is one of the main challenge in wireless sensor networks. In this paper, the Distributed Energy Efficient...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Auditing Mechanism for Ensuring Data Storage Security in Cloud Computing

    Now-a-days most of the firms are shown interested to place their data in a cloud based networks because of its utilities and problems with traditional data storage tools. If the users are storing data outside of its environment means outsourced it leads to privacy issues. Also considerable factor is that...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Improved Transport Layer Protocol for Congestion Control in Wireless Sensor Networks

    In wireless sensor networks, congestion occurs when multiple sensor nodes try to transmit data at the same time. Congestion may lead to packet drops and increased delay which in turn leads to lower throughput and delivery ratio. Thus congestion is an important aspect that should be considered while designing transport...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Rigorous Design of Moving Sequencer Atomic Broadcast with Malicious Sequencer

    In this paper, the authors investigate a mechanism to tolerate malicious nature of sequencer in moving sequencer based atomic broadcast in distributed systems. Various mechanisms are already given for moving sequencer based atomic broadcast like RMP, DTP, Pin Wheel and mechanism proposed by the researcher. But none of these mechanisms...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Quad Band H-Slot Microstrip Patch Antenna for WiMAX Application

    Antennas are important components in communication systems and play a role in transmitting and receiving signals. In modern wireless communication systems, multiband antenna has been playing a very important role for wireless service requirements. Now-a-days, antennas with multiband capabilities have been widely required in satellite and mobile communication systems to...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Analysis the Performance of MANET Protocol Under Black Hole Attack for E-Mail Application

    A Mobile Ad-hoc NETwork (MANET) is a collection of wireless mobile nodes having ability to communicate with each other without any fixed network infrastructure. Due to the unavailability of controlling entity, routing and network management are done cooperatively by respective nodes. MANET is an autonomous system where each node act...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Biclustering of Gene Expression Data Using a Two - Phase Method

    Biclustering is a very useful data mining technique which identifies coherent patterns from microarray gene expression data. A bicluster of a gene expression dataset is a subset of genes which exhibit similar expression patterns along a subset of conditions. Biclustering is a powerful analytical tool for the biologist and has...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Detection and Classification of Intrusions Using Fusion Probability of HMM

    The main definition of intrusion detection system starts with the use in hardware or software so that the data or traffic flows through these devices can be filtered since this traffic may contains some unwanted flow data that may harm to the system. Intrusion detection system is a technique of...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Artificial Intelligence and Cognitive Analytics Approaches towards Efficient Predictions for Business Intelligence

    Business intelligence techniques no longer just evolve around traditional databases and warehouses, but have leaped into the era of big data. The aim is now to extract as much hidden knowledge from this rich data. The data is highly varying and evolves from various sources. Business improvement strategies usually revolved...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    A Survey of Object Oriented JavaScript Language

    Many of the programmer's moves towards an object oriented programming languages due to its reusability nature, whereas in procedural programming languages reusability is not allowed which may contribute to the high cost of development. Most of web browsers make use of JavaScript as a user interactive program that is a...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    An Efficient Intruder Avoidance Method for MANETs

    Among all the up to date wireless networks, Mobile Ad-hoc NETwork (MANET) is one amongst the foremost necessary and distinctive applications. Unfortunately, the open medium and remote distribution of MANET create it at risk of numerous kinds of attacks. So, it is crucial to develop efficient intrusion-detection mechanisms to protect...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Multi-Level Data Integrity Service

    Cloud computing is an auspicious computing model that empowers on-demand network access to a shared pool of computing resources. One of the services offered by cloud is moving data into the cloud. Cloud Providers offer storage space to consumers for storing their data. Data moves between cloud providers and consumers...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Secure Cloud Computing with Third Party Auditing: A Survey

    Cloud computing based technology and their impact is growing now-a-day. Cloud computing is used in all the area of business, education, social impact and data miner. The growing demand is because of the on demand service and pay per basis used somehow in the unlimited form. But the uses enhance...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Enhanced the Security of Playfair Technique Using Excess 3 Code (XS3) and Ceasar Cipher

    In this paper, the authors are to provide security for the data that contains alphabets and integer values during the transmission, when data is transmitted form sender to receiver. As they know that playfair technique if best for multiple letter encryption, which treats the plain text as single units and...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Design and Implement Enhancing Security in Multi Cloud Storage System Using Distributed File System

    Distributed computing is a quickest developing engineering. It permits business associations to utilize or access diverse applications, store data without access their individual documents. While considering the force, strength and the security of cloud one can't disregard diverse dangers to client's information on distributed storage. Document access guarantee in true...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Application of Feature Selection Methods in Educational Data Mining

    In the recent years, web based learning has emerged as a new field of research due to growth of network and communication technology. These learning systems generate a large volume of student data. Data mining algorithms may be applied on this data set to study interesting patterns. As an example,...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    RUCM: A Measurement Model for Detecting the Most Suitable Code Component From Object Oriented Repository

    Software quality based applications development is the main concern is user satisfaction. It increases the reliability and efficiency of information retrieval and management. As the bundle of code created day-by-day the repository storing such code is regularly migrates the older code in to legacy systems. To develop and facilitate new...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Visual Secret Sharing Between Remote Participants

    Visual cryptography and random grids are forms of visual secret sharing that encrypt a secret image into indecipherable shares. Decryption occurs by printing them onto transparencies and stacking, but this requires participants to be in the physical presence of each other, so this paper addresses the use of visual secret...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Minimum Spanning Tree Based Improved Routing Protocol for Heterogeneous Wireless Sensor Network

    Performing multiple tasks like data aggregation, processing and communication to other Sensor Nodes (SNs) or Base Station (BS) is a very attractive and effective attribute carried out by Wireless Sensor Networks (WSNs). As SNs have limited energy resources, storage capabilities and processing, the network layer protocol has therefore to guarantee...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Cost and Time Evaluation of Load Balancing and Service Broker Strategies in Multiple Data Centers

    Cloud computing is a boon for almost every sector as it reduces the overall expenditure by making IT infrastructure, services and platform on \"On-demand\" basis. The \"Pay-as-you-go\" policy of cloud technology enables the users to use and pay for the services and computing infrastructure only when they need it without...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Fuzzy Based Effort Estimation Approach

    Besides of these there are many equation based effort estimation techniques like Halstead model, Bailey-Basil model, and Walston-Felix model. Cost and effort estimation are the major concern of any software industry. They are identified with the help of Kilo Line COde (KLOC) which denotes number of, line of code in...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    A Novel Method for Preserving Privacy in Big-Data Mining

    As the people daily lives has become digitization which led to an explosion in the collection of data by organization and individuals. Organization pushes their vast amount of data into big data clusters, but most have implemented zero security measures. Protection on confidentiality of these data is very important. In...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Diametrical User Control to Filter the Unwanted Messages from Online Social Networks

    Online Social Networks (OSNs) are the most impulsive standard to provide communication, sharing and disseminate a significant amount of individual life data. Content can be changed based on daily needs in several communication fields (audio, video, image, and text). One of the important aspects of OSN is to give the...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Efficient Content Discovery in P2P-Multimedia System

    In this paper, the authors are interested to provide fast content discovery in P2P multimedia systems. To constructs AVL tree for best efficient search peer in P2P multimedia system. Gossip protocol to exchange information to its neighboring peers and which chunks to be downloaded from which peer. An issue in...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Protecting Location Privacy in Wireless Sensor Networks Against a Local Eavesdropper - A Survey

    This paper presents the review of the existing privacy techniques in Wireless Sensor Networks (WSN). There are two main categories of privacy preservation in WSN. They are data privacy and the context privacy. This paper presents the context privacy. In context privacy, the authors focus on location privacy. Location privacy...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Efficiency Privacy Preservation Scheme for Distributed Digital Document Using Cache-Cache Mechanism

    In data mining, Privacy preservation plays a major role to provide an efficient communication for the users. Several methods have been employed for privacy preservation scheme they are Secured Multiparty Computation (SMC), Data Transformation Technique (DTT) and Cryptographic Technique. Most of the recent works concentrated on SMC and DTT as...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Comprehensive Exploration for Proposing Hybrid Scheme Upon Congestion Avoidance Algorithms

    Congestion free services are ultimate preference of every network consumer and service providers. Variety of parameters like packet dropping rate, latency, jitter, throughput, bandwidth, fair response of resources, link utilization and queue length are responsible to fabricate or reduce congestion. Current TCP model for high speed networks is unstable and...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Ontology Based Semantic Querying of the Web using Prot?g

    Currently, the Web is primarily composed of documents written in HTML. Information on the web is designed for human consumption. Retrieval of information on web is mostly restricted to keyword searches. This limitation may be overcome by semantic web which is an intelligent and meaningful web proposed by Sir Tim...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    A Review on Empirical Data Collection and Analysis of Bertoni's Model at 1.8 GHz

    In any kind of network planning it is the central task to estimate and thus analyze propagation characteristics of a radio system through a medium in order to state accuracy in signal parameters for efficient network planning. The system must necessarily incorporate in itself the ability to predict the accurateness...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Data Mining Considering the Instances of Item-Sets

    In the field of computer science, data mining is the process that attempts to discover patterns in large data sets. However it deals mostly with the relationship between two or more item objects. For example A to B, where 'A' and 'B' are the item objects. But in the real...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    An Efficient Key Management Scheme with Key Agreement to Mitigate Malicious Attacks for Wireless Mesh Network

    In the recent times the IT industry has been witnessing rapid development in wireless communication technologies such as 3G, 4G, etc. Wireless Mesh Network is one such promising wireless communication technology which provides high bandwidth internet connectivity in a sizable geographic area at a much lower cost than with classic...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Wi-Rover: A Wi-Fi Controlled Remotely Operated Video Enhanced Receiver

    The aim of the system is to demonstrate the use of wireless digital communication over the internet to control and communicate with a vehicular system. Design a rover which has the capability to navigate based on the commands issued to it remotely by an operator. Rover should provide a communication...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Adaptive Layered Approach Using Machine Learning Techniques with Gain Ratio for Intrusion Detection Systems

    Intrusion Detection System (IDS) has increasingly become a crucial issue for computer and network systems. Optimizing performance of IDS becomes an important open problem which receives more and more attention from the research community. In this paper, A multi-layer intrusion detection model is designed and developed to achieve high efficiency...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Evaluating FDDI on the Basis of Throughput and Response Time

    FDDI is an optical standard for data transmission which gave a transmission speed of 100 Mbit/s in a local area network. The throughput and response time is a measure of performance of a network. The performance of the FDDI system depend on various parameters namely ring latency, TTRT, number of...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    The Goals of Parity Bits in Quantum Key Distribution System

    The basic foundation behind cryptography as a discipline was to research how valuable data, information can be protected from unauthorized parties, such as adversaries. Quantum cryptography is one of the recent advancement occurred within that discipline. However, this cryptographic algorithm still at its early stages, where there is no wide...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Clustering Web Usage Data Using Concept Hierarchy and Self Organizing Map

    Clustering Web Usage data is one of the important tasks of Web Usage Mining, which helps to find Web user clusters and Web page clusters. Web user clusters establish groups of users exhibiting similar browsing patterns and Web page clusters provide useful knowledge to personalized Web services. Different types of...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Survey of Fault Prediction Methods in Object Oriented Systems

    Develop an efficient system is one of the main challenges for software developers, who has been concerned with reliability related issues as they build and deployed. This paper surveys various fault prediction techniques and measuring quality parameters in object oriented systems. The survey includes traditional techniques like Fault tree analysis,...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    A Survey on Cloud Computing for Mobile Users: Making Smartphones Last Longer with Computation Offload

    Cloud computing is Modern day's wonder. It is not a product but a service, which provides shared resources, software, and information to computers and other devices like Smartphone's as a utility over a network mainly internet. Resources namely memory, storage space, processor, etc are not available at user's end explicitly....

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Real-Time Scheduling with DVS and Harvesting Energy Constraints

    In real-time embedded system, that must carry their own power source and cannot depends on the power outlet on the wall, apart from feasibly schedule the set of tasks, power management is also the major issue because without power the system is useless. In this paper, the authors propose a...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Load Optimization in Mobile Network Using Traffic Engineering

    In a typical modern computer networks the presence of mixed traffic, and there is a steady increase in the share multimedia traffic. Each type of traffic has its own requirements for Quality of Service (QoS). With regard, to that the authors formulate the basic requirements for QoS for voice and...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Migration of Services to the Cloud Environment: Challenges and Best Practices

    Cloud computing is coming-up as a new generation business paradigm with significant potential to increase the agility and lower the costs. Business people are looking for better ways to migrate their existing applications to a cloud-based infrastructure to enjoy the immense cloud potential. However, the security risks, lack of mature...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Crawling the Hidden Web: An Approach to Dynamic Web Indexing

    The majority of the websites encapsulating online information are dynamic and hence too sophisticated for many traditional search engines to index. With the ever growing quantity of such hidden web pages, this issue continues to raise diverse opinions between the research and practitioner among the web mining communities. Several aspects...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Degradation Measures in Free Space Optical Communication (FSO) and it's Mitigation Techniques - A Review

    Unlike radio and microwave systems, Free Space Optics (FSO) is an optical technology which requires no spectrum licensing or frequency coordination with other users and provides secure transmission because of negligible interception by using point-to-point laser signals in conjunction with low errors than that of optical fiber transmission. This paper...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Perceptible MOS Factor Achieved During Voice Transmission in IEEE 802.1Q Standard for Video Conferencing

    In the upcoming 4G networks can provide better quality parameters values than 3G networks. Video conferencing is IP based connectivity to N number of users in the geographical coverage area in order to obtain good quality parameters like throughput, delay, jitter, traffic pattern in sending/receiving end of users. Streaming protocol...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Secure Message Transmission Using Lagrange Polynomial Interpolation and Huffman Coding

    In this paper, an algorithm for secure transmission of message is proposed based on Lagrange's interpolation. The message is viewed as a polynomial of degree n where n is kept secret and transmitted to the receiver's side using the concept of a digital envelope. As any nth degree polynomial is...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Multipath Rate Based Congestion Control for Mobile Ad Hoc Networks

    In Mobile Ad-hoc NETworks (MANET) traditional congestion control mechanism encounters new challenges such as packet losses, bandwidth degradation and frequent link failures. Congestion degrades the performance of Mobile Ad-hoc NETwork (MANET) and hence, it can be greatly reduced by using multipath routing and rate control techniques. In this paper, a...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Sensor-Cloud: A Hybrid Framework for Remote Patient Monitoring

    Remote patient monitoring is a crucial/decisive issue in healthcare system. Healthcare systems strive to improve the quality of service and cost effectiveness of care. Due to the distributed computing nature of wireless sensor network, they play an important role in providing solution to healthcare obstacles based on real time data....

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Quality Based Bottom-Up-Detection and Prevention Techniques for DDOS in MANET

    The Distributed Denial of Service attack (DDoS) is a major threat to current internet security in MANET. Although the DDoS mechanism is widely understood, its detection is a very hard task because of the similarities between normal traffic and useless packet, sent by compromising host to their victims. Quality reducing...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Energy Efficient Coverage for Mobile Sensor Network

    Wireless sensor networks comprise the platform of a broad range of applications related to security system, surveillance, military, health care, and environmental monitoring. The sensor coverage problem has received lots of attention, being considerably driven by recent research in affordable and efficient integrated electronic devices. This problem is centered on...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Impact of Warehouse Management System in a Supply Chain

    In a supply chain, warehousing function is very critical as it acts as a node in linking the material flows between the supplier and customer. In today's competitive market environment companies are continuously forced to improve their warehousing operations. Many companies have also customized their value proposition to increase their...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Fast Computation of the Shortest Path Problem Through Simultaneous Forward and Backward Systolic Dynamic Programming

    A systolic parallel system based on simultaneous forward and backward dynamic programming is proposed for the solution of the shortest path problem. The speed-up advantage of this fast systolic solution to this problem is very important in applications such as shortest-path routing in wireless networks for instance. The merit of...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Secured Wireless Data Communication

    Security of data in army stations is an important issue. In early systems, at the time of information transmission between two army stations, it can be hacked by terrorists, spies and enemies. Cryptography is a very important system employed for this purpose. There are various types of algorithms available for...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    A Novel Technique to Detect Faces in a Group Photo

    Digital Image Processing plays a vital role in several applications. One of the applications is detection of people faces in a digital photo. Several research works have been progressing in the field of face identification and matching, facial expressions identification, smile detection, etc. Any application related to face, first step...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Contextual Ontology: A Storage Tool for Extracting Context from Web Pages

    Contextual ontology helps in the knowledge-full indexing of documents, providing semantic structure to the document. The named entity and the associated keywords can be a clue to the contextual sense of the documents in the corpus. The proposed technique for the information retrieval creates the ecology of ontology which stores...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    A Support to Neuromotor Rehabilitation Based on Multimedia Enhanced Hypnosis

    The proposed work stems from positive tests obtained in the past using hypnosis enhanced by multimedia technology as a learning support for people with cognitive disabilities. The present study intends to test the effectiveness of this technique in patients underlying rehabilitation after cerebral ischemic stroke. Reference is made in this...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Use of MapReduce for Data Mining and Data Optimization on a Web Portal

    This paper studied the design, implementation and evaluation of a MapReduce tool targeting distributed systems, and multi-core system architectures. MapReduce is a distributed programming model originally proposed by Google for the ease of development of web search applications on a large number of clusters of computers. The authors addressed the...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Energy Efficient Dynamic Route Discovery Protocol for Mobile Ad Hoc Networks

    A mobile ad hoc network is a collection of wireless nodes that have a dynamic topology and rely on batteries for their operation. Routing in these ad hoc networks is highly complex as there is no central coordinator in contrast to cellular networks. Many routing protocols have been developed for...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Performance Analysis of Peer to Peer Video on Demand System Using V-Chaining Mechanism

    Video on demand is a popular multimedia application on the internet. Now a day's peer to peer video on demand is the most popular technique that captures most of the users on the internet. Therefore, the authors have proposed a video on demand based on the peer to peer network...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Performance Improvement in a Multi Cluster Using a Modified Scheduling and Global Memory Management with a Novel Load Balancing Mechanism

    In Cluster Computing Environment the data latency time has significant impact on the performance when the data is accessed across clusters. In this case, streamlining data access through the usage of the memory management technique with a proper scheduling mechanism will improve the performance of the entire operation. Memory management...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Analysing the Media Streaming for QoS in Content Delivery Networks

    The prediction of performance in CDN (Content Delivery Network) used to improve the technology development. The proposed analysis used how to design a network according to the applications of CDN network experiments with different workloads. This paper shows the variations of any parameter must affect the performance of content delivery...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Impact of Mobility on the Performance of Wireless Network Scenario Using Distance Vector Routing Protocol

    The main reason for degradation in mobile ad-hoc network performance as a result of node mobility due to the traffic control overhead required for maintaining routes in the case of table-driven protocol and maintaining routes in the case of on-demand protocol. The performance completes goes down when the mobility comes...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Routing with Congestion Control in Computer Network Using Neural Networks

    The neural networks are widely used to solve the routing problem and to manage the congestion in the computer networks. In this paper, two methods are proposed to solve this problem. In the first method a feed forward neural network is included in a central node to determine the complete...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Biometric Folder Locking System Using Fuzzy Vault for Face

    Locking folders effectively protects data from malicious programs, such as viruses, worms, and Trojans. Biometric template protection is a hot topic of research recently. Fuzzy vault is a recently developed construct which binds secret key (Password) and biometric information to provide template protection. In this paper, the authors propose a...

    Provided By International Journal of Computer Applications