International Journal of Computer Applications

Displaying 81-120 of 8029 results

  • White Papers // Jul 2015

    Value Additive Activities in ERP Projects: A Consultant's View

    Enterprise Resource Planning (ERP) system in present days has become mandatory enterprise solution software mostly for large and medium scale industries. There are involvement of project managers, business users, super users, top management from the business, vendors and many other stake holders. As the enterprise system is a complex one...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Neural Networks and Machine Learning for Pattern Recognition

    Using the ANN (Artificial Neural Network) to recognize images is of great importance to researchers in the ANN field. This paper represents an application study for using the neural networks and Machine Learning (ML) to recognize the English alphabet (A-Z) through the use of pattern recognition techniques in image processing...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Detecting and Classifying Morphed Malwares: A Survey

    In this era, most of the antivirus companies are facing immense difficulty in detecting morphed malwares as they conceal themselves from detection. Malwares use various techniques to camouflage themselves so as to increase their lifetime. These obscure methods cannot completely impede analysis, but it prolongs the process of analysis and...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Malware Detection Techniques in Android

    Mobile phones have become an important need of today. The term mobile phone and Smartphone are almost identical now-a-days. Smartphone market is booming with very high speed. Smartphones have gained such a huge popularity due to wide range of capabilities they offer. Currently android platform is leading the Smartphone market....

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Enhancing Dynamic Capacity Scheduler for Data Intensive Jobs

    Management of big data is a challenging issue. The MapReduce environment is the widely used key solution for data intensive jobs. The authors will analyze map reduce pipelining and along with processing of map phase and reduce phase. Core schedulers FIFO, fair and capacity schedulers have been discussed. The scheduler...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Performance Analysis of WSN based Technologies: ZigBee and WiMax

    Wireless sensor network is composed of hundreds or thousands of sensor nodes scattered in a geographical area and one or multiple sinks collecting information or transmitting it through wireless channels. ZigBee and WiMAX are the most advancing communication technologies of wireless sensor network. WiMAX is a standard IEEE 802.16 based...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    A Survey Report on Speech Recognition System

    Speech recognition is the process of converting an acoustic waveform into text containing the similar information conveyed by speaker. This paper presents a report on an Automatic Speech Recognition System (ASR) for different language under different accent. The paper describes the methods used and comparative study of the performance of...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    An Accuracy Improvement of Detection of Profile-Injection Attacks in Recommender Systems using Outlier Analysis

    E-commerce recommender systems are affected by various kinds of profile-injection attacks where several fake user profiles are entered into the system to influence the recommendations made to the users. The authors have used Partition Around Medoid (PAM) and Enhanced Clustering Large Applications based on RANdomized Search (ECLARANS) clustering algorithms of...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Thwarting Sybil Attack using ElGamal Algorithm

    MANET is an independent and infrastructureless network comprising of self-configurable mobile nodes connected via wireless links. MANET is susceptible to various attacks because of some loopholes present in MANET like dynamic topology, zero central administration, limited physical security etc. MANET is prone to numerous malicious attacks one such attack among...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Real Time Intrusion and Wormhole Attack Detection in Internet of Things

    There are currently more objects connected to the Internet than people in the world. This gap will continue to grow, as more objects gain the ability to directly interface with the Internet. Providing security in IoT is challenging as the devices are resource constrained, the communication links are lossy, and...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Software System Integration - Middleware - An Overview

    Software system integration is essential where communication between different applications running on different platform is needed. Suppose a system designed for payroll running with human resource system. The integration of different softwares written in different language and based on different platforms can be tricky. In that situation a middleware is...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    A Novel Approach in Improving Data Mining using Comparative Method of FPM

    Data mining is the procedure of distinguishing helpful example from expansive measure of information. Web mining is the procedure of discovering web design from web information. Web connection mining uses information from log record. Web connection mining discovering helpful things from log record. Log record contains all the client activities....

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    A Survey on Different types of Intrusion Detection Systems

    Modern network systems have abundant trouble in security vulnerabilities like buffer overflow, bugs in Microsoft web, SQL injection, security of applications and operating systems, sniffer attack. Also, wireless devices mostly personal computers, sensors, personal digital assistants and Smartphones became economically doable as a result of advances in communication and manufacturing...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Preventing Phishing Attacks: A Novel Approach

    Phishing is the process of acquiring sensitive information by masquerading as a sensitive entity. Such attacks in turn make it possible for an adversary to orchestrate Denial-Of-Service (DOS) attacks or have sensitive data leaked from an application. With increasing reliance of people on internet based transactions, phishing attacks have also...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    A Review on Multiple Chaotic Maps for Image Encryption with Cryptographic Technique

    In the present time, due to the rapid growth of digital communication and multimedia application, security becomes an important issue of communication, storage and transmission of digital data such as image, audio and video. Chaotic map based encryption is one of the ways to ensure high security of the image...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Study of Congestion Control in Multi-Flow in MANET

    Mobile ad-hoc network is a next generation communication to provide cost free communication with independent decision making system, but now-a-days, that is under research because number of pit fall in current scenario like route fluctuation, security and congestion, so all above problem solve with different technique base, here only resolve...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    SCIDR: A Scalable Cluster based Inter-Domain Routing Protocol for Heterogeneous MANET

    The area of Mobile Ad-hoc NETwork (MANET) has already been a topic of attention from past decade among the research community owing to its potential communication advantages as well as issues associated with it. However, the cases of inter-domain routing in the MANET have challenges furthermore compared to conventional MANET...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Influencing Social Networks for P2P Substance-Based File Distribution in Disjointed MANETs

    Conceptual Current shared P2P document imparting routines in versatile specially appointed system Mobile Ad-hoc NETworks (MANETs) can be ordered into three gathering flooding-based, notice based and social contact-based. The initial two gatherings of strategies can without much of a stretch have high overhead and low adaptability. They are primarily created...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Packet Forwarding Misbehaviour Isolation using Fuzzy Trust-based Secure Routing in MANET

    Mobile Ad-hoc NETworks (MANETs) are much more susceptible to various attacks because of openness in network topology and being away of a centralized administration in management. As an outcome of that, more malicious nodes are often comes in and goes out without being detected from the network topology. Hence, MANET...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Performance Analysis of AODV, DSR and DSDV in MANETS

    A Mobile Ad-hoc NETwork (MANET) is a progressive self-gestalt and infrastructure-less network of mobile node or static node connected without any wires. Each node in a MANET is independent to move in any direction and its link to another node very fast and forward packet to other node which is...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    A Novel Technique for Effective Optimization of Cross Domain Network Protocol for Redundancy Removal in Firewall Policies

    In today's rapidly progressing professional world, internet is being used as a medium for almost every operation. Firewalls are extensively implemented to prevent unauthorized access to concealed networks and secure them. Based upon the applied policies a firewall can approve or decline the data packet by scrutinizing them. The large...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Detection and Prevention of Sybil Attack in MANET Using MAC Address

    A mobile ad-hoc network is a network that does not relay on fixed infrastructure. It is a collection of independent mobile nodes that can communicate to each other via radio waves. These networks are fully distributed and can work at any place without the help of any fixed infrastructure as...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Detecting Packet Dropping Misbehaving Nodes using Support Vector Machine (SVM) in MANET

    Mobile Ad-hoc NETwork (MANET) is suffering with various attacks due to the infrastructure-less network. Hence, MANET needs very specific security methods to detect false entrance of the misbehavior nodes. The networks work well if the nodes are trusty and act rightly cooperatively. In this paper, the authors are identifying and...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Review on Congestion Control Methods for Network Optimization in MANET

    Ad-hoc network is a multi-hop temporary self-organized network consisting of many mobile nodes without any infrastructure. When the packets arriving at a node cannot be forwarded, they are dropped. Congestion occurs in a network if the number of packets being sent through the network is greater than the capacity of...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Simulation Study and Implementation of Different Mobile Ad-Hoc Network (MANET) Routing Protocol Under Network Traffic

    The performance of different routing protocols has been widely studied. Many routing protocols for ad-hoc networks have been proposed till now. Amongst the most popular ones are Ad-hoc On-demand Distance Vector (AODV) routing protocol, Dynamic Source Routing (DSR) protocols and Destination Sequenced Distance Vector (DSDV). The authors study the performance...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Cluster Based Authentication Scheme (CBAS) for Secure Routing in MANET

    Mobile Ad-hoc NETwork (MANET) consists of a collection of independent mobile nodes connected by wireless links, where they can join or leave the network at any time. Due to infrastructure-less and mobility in nature, secure routing is essential in MANET to transmit packets from source to the destination. There are...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Two Level Encryption based on One Time Pad and Koblitz Method of Encoding

    With the advent of technology, traditional encryption techniques are facing challenges in key distribution and protection. This paper proposes a novel method of encryption using one time pad and elliptic curve cryptography. Given plain text will be encrypted using one time pad. The resulting cipher text will be encoded using...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    On Determining the Most Effective Subset of Features for Detecting Phishing Websites

    Phishing websites are a form of mimicking the legitimate ones for the purpose of stealing user's confidential information such as usernames, passwords and credit card information. Recently machine learning and data mining techniques have been a promising approach for detection of phishing websites by distinguishing between phishing and legitimate ones....

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Efficient Load Balancing Schema using Multiple Mobile Sink

    Ensuring efficient and fast data aggregation technique is one of the challenging tasks when it is considered for large-scale Wireless Sensor Network (WSN). The problems of presence of single sink, distance between sink and cluster, as well as type of presence of dynamic task to be performed within different cluster...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    A Review on Triangle based Techniques in Biometric Gait Recognition

    Biometric system is an analysis of unique biological features of human being. The purpose is used for human security and identification. Different conventional biometric (such as face recognition, iris, fingerprint, etc.) methods are used for security and identification purpose, but they can capture only by physical control or at a...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Relation between the Distance and the Performance of Soft Biometrics

    Delicate biometric data extricated from a human body (e.g., tallness, sex, skin shade, hair color, etc.) is subordinate data effortlessly recognized at a separation yet it is not completely unique without anyone else in distinguishment assignments. Be that as it may, this delicate data can be expressly combined with biometric...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    A Study on High Rate Shrew DDOS Attack

    Denial of service attacks is frequently presenting an increasing threat to the global inter-networking infrastructure in networking area. The algorithm for TCP congestion control algorithm is highly efficient for the various networking areas and operations as well its internal assumption of end-system cooperation results are well prone to attack by...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Design of an Intelligent Voice Controlled Home Automation System

    Automation is a trending topic in the 21st century making it play an important role in everyone's daily lives. The main attraction of any automated system is reducing human labor, effort, time and errors due to human negligence. With the development of modern technology, Smartphones have become a necessity for...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Improving E-Mail Spam Classification using Ant Colony Optimization Algorithm

    In recent days, electronic mail system is a store and forward mechanism used for the purpose of exchanging documents across computer network through Internet. Spam is an unwanted mail which contains unsolicited and harmful data that are irrelevant to the specified users. In the proposed system, the spam classification is...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Securing Images in Cloud using Hyper Chaos with User Authentication

    Security in the cloud is the top most concern. To achieve trust and preserve the privacy of data stored in third-party cloud storage has emerged as a key research area. To achieve this, several different techniques have been proposed based on cryptography. Secret sharing schemes and chaos based encryption have...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Privacy - Preserving Public Authentication for Shared Data in Cloud

    Data security is an important in cloud. Access control is major issue to secure the stored data in cloud. Thus, the proposing privacy preserving authenticated access control scheme for securing shared data in cloud. In the proposed paper, supports authenticated access control for anonymous user to share data on cloud...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Dual Fingerprints Fusion for Cryptographic Key Generation

    Secured data transfer is a critical issue through open networks due to attackers and intruders. This paper presents a new cryptographic key generation algorithm from dual fingerprint biometric template; the suggested approach has simplified the generation of cryptographic keys and reduces the complexity of traditional cryptosystem. Fingerprints are permanent throughout...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    A Novel Cryptographic Key Distribution Scheme for Cloud Platforms

    The problem of secure data transmission on cloud environments is addressed in the proposed security model. The data security is quite important on cloud environments because they belongs the users. The security layer is defined or implemented between the cloud user and server end to ensure the security of data...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Influence Maximization on Mobile Social Network using Location based Community Greedy Algorithm

    A mobile social network plays an important role as the spread of information and influence in the form of "Word-of-mouth". It is basic thing to find small set of influential people in a mobile social network such that targeting them initially. It will increase the spread of the influence. The...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Comparison of 3G and LTE with Other Generation

    In this paper, the authors give an overview of wireless mobiles, starting form First Generation (1G) based on analogue system in 1980, while Second Generation (2G) which sets initial digital standards focuses on capacity and coverage. Emergence of GSM also belongs to 2G. After that Third Generation (3G) continues with...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Feasibility Study of Backtracking Algorithm for Virtual Cluster Migration in Cloud Computing

    Cloud Computing (CC) is an emerging field in which research scholars from academia and industry professional contribute their knowledge to understand and propagate the dimensions of its applications. One of the popular services in CC is Infrastructures as a Service (IaaS) by which the customers can rent a highly configured...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2010

    Applying Data Visualization and Mining Techniques to Improvise Luxury Goods Promotion through E-Retail

    Data mining has been used by researchers and key organizations for variety of purpose to improve the business intelligence processes. The research paper explains the use of data mining to promote selling of luxury goods with in e-retailing value chain in order to facilitate process of data analysis and decision...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2011

    A Hybrid Image Mining Technique using LIM-based Data Mining Algorithm

    The field of image retrieval and mining has become a vibrant research area due to speedy enhancement in the volume of digital image databases. Now-a-days, a large portion of information is in visual form; it is essential and certainly pleasing to search for images by content. Image mining has a...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2011

    Mining Frequent Itemsets from Large Data Sets using Genetic Algorithms

    Association rules are the most important tool to discover the relationships among the attributes in a database. The existing association rule mining algorithms are applied on binary attributes or discrete attributes, in case of discrete attributes there is a loss of information and these algorithms take too much computer time...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2010

    A Novel CSUA based Data Mining Approach for Mobile Computing Environments

    Data mining services play an important role in the field of communication industry. Data mining is also called knowledge discovery in several database including mobile databases. In this paper, the authors discuss and analyze the consumptive behavior based on data mining technology. They discuss and analyze different aspects of data...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2010

    Methods for Mining Cross Level Association Rule In Taxonomy Data Structures

    Mining of association rules mainly focuses at a single conceptual level. In a large database of transaction, where each transaction consists of a set of items and taxonomy on items, it is required to find out the associations at multiple conceptual levels. In this paper, multilevel association rule mining algorithms...

    Provided By International Journal of Computer Applications

  • White Papers // May 2011

    Frequent Pattern Mining of Trajectory Coordinates using Apriori Algorithm

    Frequent pattern mining has been an emerging and active field in data mining research for over a decade. Abundant literature has been emerged from this research and tremendous progress has been made in numerous research frontiers. This paper, provide an application of the modified Apriori algorithm in coordinate sets of...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2011

    A Comprehensive Survey of Privacy Preserving Algorithm of Association Rule Mining in Centralized Database

    The recent advancement in data mining technology to analyze vast amount of data has played an important role in several areas of business processing. Data mining also opens new threats to privacy and information security if not done or used properly. The main problem is that from non-sensitive data, one...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2010

    Anonymity: An Assessment and Perspective in Privacy Preserving Data Mining

    Privacy preserving data mining techniques depends on privacy, which captures what information is sensitive in the original data and should therefore be protected from either direct or indirect disclosure. Secrecy and anonymity are useful ways of thinking about privacy. This privacy should be measureable and entity to be considered private...

    Provided By International Journal of Computer Applications

  • White Papers // May 2011

    Evaluation of Three Simple Imputation Methods for Enhancing Preprocessing of Data with Missing Values

    One of the important stages of data mining is preprocessing, where the data is prepared for different mining tasks. Often, the real-world data tends to be incomplete, noisy and inconsistent. It is very common that the data are not obtainable for every observation of every variable. So the presence of...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Query Recommendation in Hidden Web Search Engine Using Web Log Mining Techniques

    Today, a large amount of information on the web is available only via search interfaces; the users are required to type in the set of keywords in search form in order to get the desired results from some websites. These websites are generally referred to as the hidden web or...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Improving the Cluster Efficiency on Sea Level Rise Dataset Using Data Discretization

    Rising sea levels, an effect of global warming, is a cause of concern and it is likely to affect the developing countries. With respect to the dataset published for research at the world bank, clustering a data mining technique is applied to detect the most likely to be affected regions....

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Continuous Prediction of Closed Frequent Itemsets From High Speed Distributed Data Streams Using Parallel Mining on Manifold Windows With Varying Size

    Continuous prediction of closed frequent item sets from high speed distributed data streams is an active research work, which is because of the conflict to the process time taken to perform mining consistent item sets from current records and high alacrity transmission time in data streams. By the motivation gained...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Hybrid Model with Super Resolution and Decision Boundary Feature Extraction and Rule Based Classification of High Resolution Data

    Data mining is defined as the process of applying specific algorithms for extracting patterns from data. Data mining strategies can be grouped into classification, prediction, estimation, association rule mining and clustering. Satellite images are used these days. With the help of high resolution image the authors can extract the features...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    Dynamic Current Mode Logic Realization of Digital Arithmetic Circuits

    In this paper, the authors realize a high performance arithmetic circuits which is faster and have lower power consumption using a new dynamic logic family of CMOS and to analyze its performance for arithmetic circuits. This new dynamic logic family is known as Dynamic Current Mode Logic (DyCML). DyCML circuits...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    Accelerated Combinatorial Optimization Using Graphics Processing Units and C++ AMP

    In the course of less than a decade, Graphics Processing Units (GPUs) have evolved from narrowly scoped application specific accelerators to general-purpose parallel machines capable of accommodating an ever-growing set of algorithms. At the same time, programming GPUs appears to have become trapped around an attractor characterized by ad-hoc practices,...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    Design and Analysis of Large Data Processing Techniques

    As massive data acquisition and storage becomes increasingly affordable, a large number of enterprises are employing statisticians to make the sophisticated data analysis. Particularly, information extraction is done when the data is unstructured or semi-structured in nature. There are emerging efforts taken by both academia and industry on pushing information...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    Energy Efficient Task Scheduling and Data Allocation Strategy in Heterogeneous Environment with Real Time Constraints

    In this paper, the authors concentrate on the problem of high energy consumption in heterogeneous environment regarding data allocation scheme in distributed database and task scheduling policies in real-time system. They will focus on soft real time system application having if any deadline is missed then time penalty is occurred....

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    Performance Evaluation of Improved Skew Detection and Correction Using FFT and Median Filtering

    In this paper, the authors present a new skew detection and correction technique using FFT and median filtering. It is found that there are many techniques based on skew correction which have been proposed so far by different researchers. It has been found that the most of existing techniques introduce...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    Thermal Uniformity-Aware Application Mapping for Network-on-Chip Design

    Ensuring thermal-uniformity in an integrated circuit chip is very essential for its correct operation. Thus, in the Network-on-Chip (NoC) based system design as well, it is essential to attach cores of the application core graph to the routers in the topology graph so that thermal uniformity across the chip is...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    Power Optimization of 8:1 MUX Using Transmission Gate Logic (TGL) with Power Gating Technique

    In this paper, the authors aim at reducing power and energy dissipation in Transmission Gate Logic (TGL) multiplexer CMOS circuits comprise of reducing the power supply voltages, power supply current and delay with economical charge recovery logic. This paper designs an 8:1 multiplexer with CMOS Transmission Gate Logic (TGL) using...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    Effective Sentiment Analysis of Social Media Datasets Using Naive Bayesian Classification

    Effective sentiment analysis of social media datasets using naive Bayesian classification involves extraction of subjective information from textual data. A normal human can easily understand the sentiment of a document written in natural language based on its knowledge of understanding the polarity of words (uni-gram, bi-gram and n-grams) and in...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    Development of Beowulf Cluster to Perform Large Datasets Simulations in Educational Institutions

    In this paper, the authors present the design and development of the Beowulf cluster that can be used by institutions to perform research that requires high performance computing. In many industries and scientific applications there is often a need to analyze large datasets using computational power of distributed and parallel...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    Parallel Implementation of the Max-Min Ant System for the Travelling Salesman Problem on GPU

    In this paper, the authors have proposed an approach to implement ant colony optimization algorithm especially max-min ant system for solving travelling salesman problem on GPU. GPUs are specially designed microprocessor for graphical operation and can be used for general purpose operations. ACO is a nature based inspired algorithm based...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    An Efficient Multi-Path Delay Commutator Architecture

    The Fast Fourier Transform (FFT) and its Inverse Fast Fourier Transform (IFFT) is one of the fundamental operations in the field of Digital Signal Processing (DSP). A Fast Fourier Transform (FFT) is an algorithm to compute the Discrete Fourier Transform (DFT) and its inverse. A Fourier transforms converts time to...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    A Novel Case Base Indexing Model Based on Power Set Tree

    CBR has been successfully applied to the areas of planning, diagnosis, law and decision making among others. It uses useful prior cases to solve the new problems. CBR must accurately retrieve similar prior cases for getting a good performance. Throughout this paper, the novel case base indexing model based on...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    An Efficient Algorithm for Mining Coherent Association Rules

    There are many data mining techniques for finding association rules with the predefined minimum support from transaction databases. However, common problems with existing approaches are that an appropriate minimum support is difficult to determine and that the derived rules convey common-sense knowledge. Mining association rules without minimum support threshold is...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    High Performance Implementation of Universal Gate Using Low Power Source Gating Technique

    Area, speed and cost were used to be the main concerns in the VLSI industry and power consumption was the secondary consideration. But, now-a-days, power is given equal importance as area and speed. The increasing demand for mobile electronic devices which require complex functionality and high speed has increased the...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Design of Yagi-Uda Antenna Using Microstrip Circuit

    Yagi-Uda antenna is a practical radiator in the HF (3-30MHz), VHF (30-300MHz) and UHF (300-3000MHz). Yagi - Uda antenna using microstrip circuits is a very demanding structure in the 4G cellular applications. Using microstrip circuits, size of Yagi-Uda antenna can be designed in mm dimension as compared to the Yagi-Uda...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Reconfigurable CPL Adiabatic Gated Logic -RCPLAG Based Universal NAND/NOR Gate

    In precursory efforts, authors have illustriously consolidated the benefits of CPL based circuits and adiabatic logic conjoint the use of clock for even combinational blocks and reported the power diminution. With the adhibition of clock in combinational blocks, the same circuit topology may be employed for sequential behavior as manifested...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Design and Verification of AMBA APB Protocol

    The SoC (System on Chip) uses AMBA (Advanced Microcontroller Bus Architecture) as an on-chip bus. APB (Advanced Peripheral Bus) is one of the components of the AMBA bus architecture. APB is low bandwidth and low performance bus used to connect the peripherals like UART, keypad, timer and other peripheral devices...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    Performance Analysis of Various Fragmentation Techniques in Runtime Partially Reconfigurable FPGA

    Reconfigurable devices, such as Field Programmable Gate Arrays (FPGAs), are very popular in today's embedded systems design due to their low-cost, high-performance and flexibility. Partially Run-Time Reconfigurable (PRTR) FPGAs allow hardware tasks to be placed and removed dynamically at run-time. A novel 2D area fragmentation metric that takes into account...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    Application of Association Rule Mining to Help Determine the Process of Career Selection

    The enormous data present at a university can be analyzed to generate useful information regarding the career paths chosen by students over the last few years. This information can not only be used by the students for analyzing the scope of their chosen career path but also by various authorities...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    A High Slew Rate Buffer Amplifier Employing MTCMOS Technique for Flat Panel Display

    In this paper, the authors address a low power, high speed class AB buffer amplifier topology for liquid crystal display applications which offer a rail-to-rail common mode input range. The presented circuit use two comparator circuit inside it to enhance the slewing capabilities with a limited power consumption and it...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    A New Optimized Real-Time Disk Scheduling Algorithm

    In this paper, a new approach of disk scheduling has been proposed to improve the throughput of modern storage device. After the invention of disk with movable head, researchers are making efforts continuously to improve the I/O performance by implementing many intelligent scheduling algorithms of disk accesses. Speeds of processor...

    Provided By International Journal of Computer Applications

  • White Papers // May 2011

    Design and Implementation of a Tool for Web Data Extraction and Storage using Java and Uniform Interface

    In this paper, the authors deal with web content mining. While browsing the web, the user has to go through many pages of the Internet, filter the data and download related documents and files. This task of searching and downloading is time consuming. Sometimes the search queries call for specific...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2011

    A Survey on Assorted Approaches to Graph Data Mining

    Graph mining has become a popular area of research in recent years because of its numerous applications in a wide variety of practical fields, including computational biology, sociology, software bug localization, keyword search and computer networking. Different applications result in graphs of different sizes and complexities. Graph mining is an...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2010

    Attribute Reduction using Forward Selection and Relative Reduct Algorithm

    Attribute reduction of an information system is a key problem in rough set theory and its applications. Rough set theory has been one of the most successful methods used for feature selection. Rough set is one of the most useful data mining techniques. This paper proposes relative reduct to solve...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2010

    A Novelty Approach for Finding Frequent Itemsets in Horizontal and Vertical Layout- HVCFPMINETREE

    In the modern world, people are faced with influx of massive data. Though such trend is most welcome, it poses a challenge to space-time requirement. So the imperative need is to find more efficient algorithms to manage such problem. There are so many existing algorithms to find frequent itemsets in...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2011

    Advanced Signal Processing Techniques for Feature Extraction in Data Mining

    In this paper, the authors give a description of various signal processing techniques that are in use for processing time series databases for extracting relevant features for pattern recognition. In addition to describe the normally used signal processing methods, they also present a novel signal processing technique, which is a...

    Provided By International Journal of Computer Applications