International Journal of Computer Applications

Displaying 81-120 of 5728 results

  • White Papers // Dec 2014

    Analysis of Traffic Patterns Using Computer Vision and Wireless Sensor Network

    Traffic patterns analysis and solutions for traffic is the emerging field. To determine the patterns of traffic flow and with the help of that data reports can be generated to build the sustainable infrastructure. So that the infrastructures like bridges and fly over will build such that they will be...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Comparison of NBTree and VFI Machine Learning Algorithms for Network Intrusion Detection Using Feature Selection

    The security of computer networks is of great importance. But, with the proliferation of electronic devices and the internet, there has been an exponential rise in malicious activities. The security perpetrators take the advantage of the intricacy of the internet and carry out intrusions. There have been certain researches to...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Examination of Energy Efficiency for MAC Protocol in Wireless Body Area Networks

    Wireless body area networks are widely used for applications such as health care system, where wireless sensors (nodes) monitor the parameter(s) of interest. Sensors play a critical role in many sensor network applications. Mac layer operates on non-beacon and beacon enabled mode. The IEEE 802.15.4 standard provide two modes of...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Secure Data Hiding Using Elliptical Curve Cryptography and Steganography

    Now-a-days information is passing by internet. Hence the security of information has become a fundamental issue. Cryptography is the well-known technique to secure data over network. Steganography is the technique to hide the message in digital media. The Elliptical Curve Cryptography (ECC) is more secure than the existing cryptography models....

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Performance Analysis of Equalization Techniques for MC-CDMA Systems

    Now-a-days in mobile communication systems, very high bit rates are very essential for transmitting the data and to provide good service for a digital network. This high bit rate leads to Inter Symbol Interference (ISI) problems. MC-CDMA technique plays a major role in eliminating these interference problems. In order to...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    CEAACK Based Detector for Malicious Nodes

    MANET stands for Mobile Ad-hoc NETwork. The ad hoc network that is used for mobile communication is called MANET. The MANETS are used when the user is moving. Because MANET does not depends on fixed infrastructure. Wireless networks are used to connect with different networks in MANETs. Security is more...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Evaluation of QoS in the Transmission of Video H.264/SVC for Ad Hoc Networks of Two Jumps

    In this paper, video traffic H.264/SVC will be analyzed as well as evaluation of QoS metrics by PDR, delay, throughput and Jittery regarding mobility scenarios, performing characterization and QoS in the AODV protocol AOMDV in an ideal environment (without traffic) and not ideal with DCF and EDCA traffic. In this...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Security Mechanisms at Different Levels in Cloud Infrastructure

    Cloud computing refers to a set of services and resources offered to its consumers through internet. The user data and applications software shift to highly optimal data i.e. cloud. Either it may be a small or medium business infrastructure must focus on resource and information sharing among various users due...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    An AIMD Distributed Control Law for Load Balancing in Content Delivery Networks

    Content Delivery Networks (CDNs) is the best for overcoming the inherited problems face by internet in modern days. The major idea at the basis of this technology is the delivery at edge points of the network, in proximity to the request areas, to advance the user's perceived performance while off-putting...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Implementing Code Igniter Framework in Open Source Mobile Learning Application

    The concept of learning at any time and any place is unable to get fully implemented yet. The reason is that the currently available e-learning system requires a personal computer to access it. Moreover, users need to find convenient place to access the e-learning. In order to implement the concept,...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Performance of Wireless Network Using Network Coding Over Store and Forward Technique

    In recent year's wireless networks has become a necessity rather than a luxury. Wireless networks suffer in providing high throughput for high end applications like multimedia etc. Network coding is proposed to improve the throughput of the network. In this paper, the authors apply network coding technique at the relay...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Trust Based Clustering and Secure Authentication for Multicast in AD-Hoc

    Ad-hoc network is a dynamic wireless network, composed of mobile nodes without the aid of centralized administration, where nodes have limited transmission range. Security is challenging issue due to the mobility of nodes can lead to dynamic topology, intermediate nodes act as a router can forward packets. Therefore, authentication the...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Practical Analysis Vertical Handover Decision (VHD) Algorithm for WIMAX and WLAN

    Recently the study of efficient Vertical Handover Decision (VHD) algorithm for heterogeneous wireless networks using FR-HMM method which is called as Fuzzy Rule based Hidden Markov Model (FR-HMM) is presented. In this paper, the authors' aim to investigate the performance of this proposed approach under various network conditions the metrics...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Function Point an Effective Planning Tool

    Prerequisite of every estimation technique is effective requirement discovery and planning. FP is observed to be good source of initial planning. While using Function Point (FP), the whole application is brainstormed. Application is planned with gathering all inputs, outputs, inquiries, external interfaces and files. Whereas Use Case Point (UCP) are...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Routing Approaches for Cognitive Radio Ad-Hoc Networks and Challenges

    Cognitive Radio Networks (CRNs) are composed of cognitive devices capable of changing their configurations on Real time, based on the spectrum environment. This capability provides chance to opportunistically reuse the portion of the spectrum as required resigned by the Primary Users (PU's). From another point of view, the tractability in...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Fine Frequency Offset Based Section Synchronization in Cognitive Radio Systems

    In case of low signal to noise ratio scenario is distracted or not uniform in Orthogonal Frequency Division Multiplexing (OFDM) system. So synchronization aspect in Cognitive Radio Systems (CRS) may change the distraction. If Iterative process is used in synchronization then it will be better for some time span but...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Mobile Ad Hoc Network Security Issues

    In this paper, the authors study mobile ad hoc network technology uses and how it can be used in real life applications. As now-a-days lots of Research is going on automotive vehicles, if mobile ad hoc network is used to represent vehicles on roads and vehicle to vehicle communication is...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    An Effectual and Secure Approach for the Detection and Efficient Searching of Network Intrusion Detection System (NIDS)

    The concept behind this particular aspect lies on the fact to determine and customize the simplicity and the most basic scenario. The basicity lies on the fact that the authors have been using the concept of data mining and even the algorithms are included that merely includes the efficiency of...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Burr Type XII Software Reliability Growth Model

    Software Reliability Growth Model (SRGM) is a mathematical model of how the software reliability improves as faults are detected and repaired. The development of many SRGMs over the last several decades have resulted in the improvement of software facilitating many engineers and managers in tracking and measuring the growth of...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Development of Highly Secured Cloud Rendered Log Management System

    A log is a collection of record of events that occurs within an organization containing systems and network. These logs are very important for any organization, because log file will able to record all user activities. As this log files plays vital role and also it contains sensitive information, it...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    A Review on Delay Prediction Techniques in MANET

    For wireless ad hoc networks, routing is much more complex than in traditional wireless systems, due to the lack of centralized control, infrastructure less nature and knowledge of a predetermined topology. The infrastructure less nature of MANETs makes it difficult to ensure the reliability of packet delivery over multi-hop routes....

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Simulating the Tumor Growth with Cellular Automata Models

    Cellular Automata (CA) are mathematical models of systems where time, space and state are discrete. In this paper, two types of cellular automata are studied in order to describe the 2-dimensional free growth of an avascular tumor under the effect of a limited nutrient source. On one hand a deterministic...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Survey on Automated Test Data Generation

    Testing is the process to check the program with the aim to detect errors. Software testing is an expensive and challenging process, typically consuming at least 50% of the total development cost and 35% of total development time. The critical step of software testing is automated test data generation. Automated...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Highly Secure Authentication Scheme

    The increased level of effective security control and transaction fraud in the world of electronic and internet commerce, demands for highly secured identification and personal verification systems. The knowledge based authentication system encourage to user in selecting password for high security. For high security application the proposed scheme presents an...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Implementing Storage as a Service in Cloud Using Network Attached Storage

    Cloud computing is rapidly growing. Still there is need to enhance the cloud computing in terms of availability and security aspects of cloud service. When the authors talk about cloud computing, it means they have ability to share the resources through internet. They can store their data on internet space...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    A New Randomized Order Preserving Encryption Scheme

    Order Preserving Encryption (OPE) schemes have been examined to a great extent in the cryptography literature because of their prospective application to database design. OPE is an appealing method for database encryption as it permits to execute sort and range queries in an efficient manner without decrypting the data. Databases...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Novel Strategies Practicing Quality of Service in MANETs

    Researchers are working on securing MANETs by implementing more and more complex techniques like cryptography, digital signatures and hashing etc. These empirical techniques are highly effective in providing security but also have major influences over throughput, excellences of the system, sustain high cost and thereby degrade the Quality of Service...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Comparison of DSDV, DSR and ZRP Routing Protocols in MANETs

    A Mobile Ad-hoc NETwork (MANET) is a collection of wireless mobile nodes dynamically forming a network topology without the use of existing network infrastructure or centralized administration. Routing is a significant issue and challenge in MANET. Routing is a task of directing data packets from a source node to a...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Machine Learning Based Traffic Classification Using Low Level Features and Statistical Analysis

    In this paper, data mining technique is used to present the concept of attack data analysis and traffic classification. Here the system is completely an automated system that contains packet capturing, processing of multiple attack logs, labeling of network traffic based on low level features and applying the classification algorithm...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Cross Layer Techniques Used for Improving TCP Performance in Wireless Networks: A Proposed Technique

    Transmission Control Protocol (TCP) running in the Transport Layer of layered architecture models like OSI, has been struggling with poor performance in wireless networks. Various probable solutions have been established by researchers worldwide. One branch of solutions uses the cross layer design for improving TCP performance. Cross layer design violates...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Evaluating the Performance of MPLS and Frame-Relay Using OPNET Modeler

    Multi-Protocol Label Switching (MPLS) technique is one of the latest technologies, which is escalating dramatically because of the great benefits especially in the field of VPN. It is now progressing very quickly to be the number one technology for connecting networks of service providers around the world. In this paper,...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Implementation and Result Analysis of Secure Strategy for High Speed Transmission and Efficient Collection of Data in Wireless Sensor Network

    In this paper, the authors are to provide security in WSNs (Wireless Sensor Networks) as well as to provide the strategy to collect the high speed data in an efficient manner. Sensor networks are usually deployed in hostile and unattended environment where an adversary can read and modify the content...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    A Comparative Study of ANFIS Membership Function to Predict ERP User Satisfaction Using ANN and MLRA

    An Enterprise Resource Planning (ERP) system is packaged business software that integrates organizational process and functions into a unified system. Many researchers and practitioners agree that Enterprise Resource Planning (ERP) systems are the most important development in terms of corporate use of Information Technology (IT) in the 1990s. In this...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    A Framework for Secure Mobile Database Transactions Using Cryptographic Co-Processor

    The increase in the adoption of database systems by the corporate in key data management technology for their day-to-day operations. So, decision-making becomes crucial for the security of data that is managed by these systems. The damage and misuse of data affects not only the single user or application, but...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Introduction of NDN with Comparison to Current Internet Architecture Based on TCP/IP

    Over the years number of people using internet has escalated. The primary motive of the Internet has been revised. To deal with this drastic change, network architecture has to be redesigned considering future trends. The future architecture of Internet can be developed only after scrutinizing various aspects of current Internet...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Hybrid Technique of Pre Shared Key and Entropy Variation for DDOS Detection

    Here, in this paper an effective technique for the detection of intrusion is proposed. The model is based on the hybrid combinatorial method of pre-shared key exchange and entropy variation. The data to be sent is first authenticated by the local router by comparing the shared key between them. The...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Privacy Preserving Dynamic Recommender System

    A recommender system is now becoming main decision maker in today's word. It provides information for specific items such as books, news, cloths and many more. Personalization is now becoming common term for improving e-commerce services and attracts more users. Today's recommender system provides suggestion for specific items but drawback...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Elliptic Curve Cryptography with Hill Cipher Generation for Secure Text Cryptosystem

    Cryptography is an art to protect secret information from attacks. This idea of information security leads to the evolution of cryptography. In this paper, an idea is proposed in which hill cipher is generated with Elliptic Curve Cryptography (ECC) to provide better security and proper security coverage. Hill Cipher is...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Automation Framework for Testing Android Mobiles

    Android mobiles are playing key role in mobile market. OEMs (Original Equipment Manufacturer) are focusing on Android mobiles as the cost of production is comparatively low comparing to other mobile platforms. In order to keep the time to market very short, the testing cycles need to be reduced. Android mobile...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Energy Efficient and Improved Certificate Revocation Technique for Mobile Ad Hoc Networks

    Mobile Ad-hoc NETworks (MANETs) are self-organizing as well as self configurable with an open network environment. The nodes during this network will be a part of can freely leave from the network. Therefore, the wireless and dynamic natures of MANET create them a lot of vulnerable in the direction of...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Efficient Content Discovery in P2P-Multimedia System

    In this paper, the authors are interested to provide fast content discovery in P2P multimedia systems. To constructs AVL tree for best efficient search peer in P2P multimedia system. Gossip protocol to exchange information to its neighboring peers and which chunks to be downloaded from which peer. An issue in...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Protecting Location Privacy in Wireless Sensor Networks Against a Local Eavesdropper - A Survey

    This paper presents the review of the existing privacy techniques in Wireless Sensor Networks (WSN). There are two main categories of privacy preservation in WSN. They are data privacy and the context privacy. This paper presents the context privacy. In context privacy, the authors focus on location privacy. Location privacy...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Efficiency Privacy Preservation Scheme for Distributed Digital Document Using Cache-Cache Mechanism

    In data mining, Privacy preservation plays a major role to provide an efficient communication for the users. Several methods have been employed for privacy preservation scheme they are Secured Multiparty Computation (SMC), Data Transformation Technique (DTT) and Cryptographic Technique. Most of the recent works concentrated on SMC and DTT as...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Comprehensive Exploration for Proposing Hybrid Scheme Upon Congestion Avoidance Algorithms

    Congestion free services are ultimate preference of every network consumer and service providers. Variety of parameters like packet dropping rate, latency, jitter, throughput, bandwidth, fair response of resources, link utilization and queue length are responsible to fabricate or reduce congestion. Current TCP model for high speed networks is unstable and...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Ontology Based Semantic Querying of the Web using Prot?g

    Currently, the Web is primarily composed of documents written in HTML. Information on the web is designed for human consumption. Retrieval of information on web is mostly restricted to keyword searches. This limitation may be overcome by semantic web which is an intelligent and meaningful web proposed by Sir Tim...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    A Review on Empirical Data Collection and Analysis of Bertoni's Model at 1.8 GHz

    In any kind of network planning it is the central task to estimate and thus analyze propagation characteristics of a radio system through a medium in order to state accuracy in signal parameters for efficient network planning. The system must necessarily incorporate in itself the ability to predict the accurateness...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Data Mining Considering the Instances of Item-Sets

    In the field of computer science, data mining is the process that attempts to discover patterns in large data sets. However it deals mostly with the relationship between two or more item objects. For example A to B, where 'A' and 'B' are the item objects. But in the real...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    An Efficient Key Management Scheme with Key Agreement to Mitigate Malicious Attacks for Wireless Mesh Network

    In the recent times the IT industry has been witnessing rapid development in wireless communication technologies such as 3G, 4G, etc. Wireless Mesh Network is one such promising wireless communication technology which provides high bandwidth internet connectivity in a sizable geographic area at a much lower cost than with classic...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Wi-Rover: A Wi-Fi Controlled Remotely Operated Video Enhanced Receiver

    The aim of the system is to demonstrate the use of wireless digital communication over the internet to control and communicate with a vehicular system. Design a rover which has the capability to navigate based on the commands issued to it remotely by an operator. Rover should provide a communication...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Adaptive Layered Approach Using Machine Learning Techniques with Gain Ratio for Intrusion Detection Systems

    Intrusion Detection System (IDS) has increasingly become a crucial issue for computer and network systems. Optimizing performance of IDS becomes an important open problem which receives more and more attention from the research community. In this paper, A multi-layer intrusion detection model is designed and developed to achieve high efficiency...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Evaluating FDDI on the Basis of Throughput and Response Time

    FDDI is an optical standard for data transmission which gave a transmission speed of 100 Mbit/s in a local area network. The throughput and response time is a measure of performance of a network. The performance of the FDDI system depend on various parameters namely ring latency, TTRT, number of...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    The Goals of Parity Bits in Quantum Key Distribution System

    The basic foundation behind cryptography as a discipline was to research how valuable data, information can be protected from unauthorized parties, such as adversaries. Quantum cryptography is one of the recent advancement occurred within that discipline. However, this cryptographic algorithm still at its early stages, where there is no wide...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Clustering Web Usage Data Using Concept Hierarchy and Self Organizing Map

    Clustering Web Usage data is one of the important tasks of Web Usage Mining, which helps to find Web user clusters and Web page clusters. Web user clusters establish groups of users exhibiting similar browsing patterns and Web page clusters provide useful knowledge to personalized Web services. Different types of...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Survey of Fault Prediction Methods in Object Oriented Systems

    Develop an efficient system is one of the main challenges for software developers, who has been concerned with reliability related issues as they build and deployed. This paper surveys various fault prediction techniques and measuring quality parameters in object oriented systems. The survey includes traditional techniques like Fault tree analysis,...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    A Survey on Cloud Computing for Mobile Users: Making Smartphones Last Longer with Computation Offload

    Cloud computing is Modern day's wonder. It is not a product but a service, which provides shared resources, software, and information to computers and other devices like Smartphone's as a utility over a network mainly internet. Resources namely memory, storage space, processor, etc are not available at user's end explicitly....

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Real-Time Scheduling with DVS and Harvesting Energy Constraints

    In real-time embedded system, that must carry their own power source and cannot depends on the power outlet on the wall, apart from feasibly schedule the set of tasks, power management is also the major issue because without power the system is useless. In this paper, the authors propose a...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Load Optimization in Mobile Network Using Traffic Engineering

    In a typical modern computer networks the presence of mixed traffic, and there is a steady increase in the share multimedia traffic. Each type of traffic has its own requirements for Quality of Service (QoS). With regard, to that the authors formulate the basic requirements for QoS for voice and...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Migration of Services to the Cloud Environment: Challenges and Best Practices

    Cloud computing is coming-up as a new generation business paradigm with significant potential to increase the agility and lower the costs. Business people are looking for better ways to migrate their existing applications to a cloud-based infrastructure to enjoy the immense cloud potential. However, the security risks, lack of mature...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Crawling the Hidden Web: An Approach to Dynamic Web Indexing

    The majority of the websites encapsulating online information are dynamic and hence too sophisticated for many traditional search engines to index. With the ever growing quantity of such hidden web pages, this issue continues to raise diverse opinions between the research and practitioner among the web mining communities. Several aspects...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Degradation Measures in Free Space Optical Communication (FSO) and it's Mitigation Techniques - A Review

    Unlike radio and microwave systems, Free Space Optics (FSO) is an optical technology which requires no spectrum licensing or frequency coordination with other users and provides secure transmission because of negligible interception by using point-to-point laser signals in conjunction with low errors than that of optical fiber transmission. This paper...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Perceptible MOS Factor Achieved During Voice Transmission in IEEE 802.1Q Standard for Video Conferencing

    In the upcoming 4G networks can provide better quality parameters values than 3G networks. Video conferencing is IP based connectivity to N number of users in the geographical coverage area in order to obtain good quality parameters like throughput, delay, jitter, traffic pattern in sending/receiving end of users. Streaming protocol...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Secure Message Transmission Using Lagrange Polynomial Interpolation and Huffman Coding

    In this paper, an algorithm for secure transmission of message is proposed based on Lagrange's interpolation. The message is viewed as a polynomial of degree n where n is kept secret and transmitted to the receiver's side using the concept of a digital envelope. As any nth degree polynomial is...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Multipath Rate Based Congestion Control for Mobile Ad Hoc Networks

    In Mobile Ad-hoc NETworks (MANET) traditional congestion control mechanism encounters new challenges such as packet losses, bandwidth degradation and frequent link failures. Congestion degrades the performance of Mobile Ad-hoc NETwork (MANET) and hence, it can be greatly reduced by using multipath routing and rate control techniques. In this paper, a...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Sensor-Cloud: A Hybrid Framework for Remote Patient Monitoring

    Remote patient monitoring is a crucial/decisive issue in healthcare system. Healthcare systems strive to improve the quality of service and cost effectiveness of care. Due to the distributed computing nature of wireless sensor network, they play an important role in providing solution to healthcare obstacles based on real time data....

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Quality Based Bottom-Up-Detection and Prevention Techniques for DDOS in MANET

    The Distributed Denial of Service attack (DDoS) is a major threat to current internet security in MANET. Although the DDoS mechanism is widely understood, its detection is a very hard task because of the similarities between normal traffic and useless packet, sent by compromising host to their victims. Quality reducing...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Energy Efficient Coverage for Mobile Sensor Network

    Wireless sensor networks comprise the platform of a broad range of applications related to security system, surveillance, military, health care, and environmental monitoring. The sensor coverage problem has received lots of attention, being considerably driven by recent research in affordable and efficient integrated electronic devices. This problem is centered on...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Impact of Warehouse Management System in a Supply Chain

    In a supply chain, warehousing function is very critical as it acts as a node in linking the material flows between the supplier and customer. In today's competitive market environment companies are continuously forced to improve their warehousing operations. Many companies have also customized their value proposition to increase their...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Fast Computation of the Shortest Path Problem Through Simultaneous Forward and Backward Systolic Dynamic Programming

    A systolic parallel system based on simultaneous forward and backward dynamic programming is proposed for the solution of the shortest path problem. The speed-up advantage of this fast systolic solution to this problem is very important in applications such as shortest-path routing in wireless networks for instance. The merit of...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Secured Wireless Data Communication

    Security of data in army stations is an important issue. In early systems, at the time of information transmission between two army stations, it can be hacked by terrorists, spies and enemies. Cryptography is a very important system employed for this purpose. There are various types of algorithms available for...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    A Novel Technique to Detect Faces in a Group Photo

    Digital Image Processing plays a vital role in several applications. One of the applications is detection of people faces in a digital photo. Several research works have been progressing in the field of face identification and matching, facial expressions identification, smile detection, etc. Any application related to face, first step...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Contextual Ontology: A Storage Tool for Extracting Context from Web Pages

    Contextual ontology helps in the knowledge-full indexing of documents, providing semantic structure to the document. The named entity and the associated keywords can be a clue to the contextual sense of the documents in the corpus. The proposed technique for the information retrieval creates the ecology of ontology which stores...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    A Support to Neuromotor Rehabilitation Based on Multimedia Enhanced Hypnosis

    The proposed work stems from positive tests obtained in the past using hypnosis enhanced by multimedia technology as a learning support for people with cognitive disabilities. The present study intends to test the effectiveness of this technique in patients underlying rehabilitation after cerebral ischemic stroke. Reference is made in this...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Use of MapReduce for Data Mining and Data Optimization on a Web Portal

    This paper studied the design, implementation and evaluation of a MapReduce tool targeting distributed systems, and multi-core system architectures. MapReduce is a distributed programming model originally proposed by Google for the ease of development of web search applications on a large number of clusters of computers. The authors addressed the...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Energy Efficient Dynamic Route Discovery Protocol for Mobile Ad Hoc Networks

    A mobile ad hoc network is a collection of wireless nodes that have a dynamic topology and rely on batteries for their operation. Routing in these ad hoc networks is highly complex as there is no central coordinator in contrast to cellular networks. Many routing protocols have been developed for...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Performance Analysis of Peer to Peer Video on Demand System Using V-Chaining Mechanism

    Video on demand is a popular multimedia application on the internet. Now a day's peer to peer video on demand is the most popular technique that captures most of the users on the internet. Therefore, the authors have proposed a video on demand based on the peer to peer network...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Performance Improvement in a Multi Cluster Using a Modified Scheduling and Global Memory Management with a Novel Load Balancing Mechanism

    In Cluster Computing Environment the data latency time has significant impact on the performance when the data is accessed across clusters. In this case, streamlining data access through the usage of the memory management technique with a proper scheduling mechanism will improve the performance of the entire operation. Memory management...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Analysing the Media Streaming for QoS in Content Delivery Networks

    The prediction of performance in CDN (Content Delivery Network) used to improve the technology development. The proposed analysis used how to design a network according to the applications of CDN network experiments with different workloads. This paper shows the variations of any parameter must affect the performance of content delivery...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Impact of Mobility on the Performance of Wireless Network Scenario Using Distance Vector Routing Protocol

    The main reason for degradation in mobile ad-hoc network performance as a result of node mobility due to the traffic control overhead required for maintaining routes in the case of table-driven protocol and maintaining routes in the case of on-demand protocol. The performance completes goes down when the mobility comes...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Routing with Congestion Control in Computer Network Using Neural Networks

    The neural networks are widely used to solve the routing problem and to manage the congestion in the computer networks. In this paper, two methods are proposed to solve this problem. In the first method a feed forward neural network is included in a central node to determine the complete...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Biometric Folder Locking System Using Fuzzy Vault for Face

    Locking folders effectively protects data from malicious programs, such as viruses, worms, and Trojans. Biometric template protection is a hot topic of research recently. Fuzzy vault is a recently developed construct which binds secret key (Password) and biometric information to provide template protection. In this paper, the authors propose a...

    Provided By International Journal of Computer Applications