International Journal of Computer Applications

Displaying 121-160 of 5484 results

  • White Papers // Sep 2014

    RS-MONA: Reliable and Scalable Secure Method to Store and Share Secrete Data for Groups in Cloud

    In this paper, the authors present various issues related to privacy and security while storing user's data on untrusted cloud. In today's world sharing of group resource among the cloud users is a major problem. There is a lot of research being made to find out the issues with these...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Existing Software Stakeholder Practices an Overview

    Software technology is an ever changing and dynamic science. As in other spheres, here too, despite the vast extent of interactive and participatory software practice and theory, there is still little shared understanding amongst those involved. The success of a software project is directly affected by the lack of understanding...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Prevention of Virus Propagation in Mobile Network

    Infections and malwares have the capacity to spread beginning workstation systems into versatile systems with the fast improvement of brilliant phone clients. Currently, there are three disease vectors utilized by portable malware to spoil versatile. A Bluetooth affiliation permits document exchange if the telephone's Bluetooth stack helps OBEX trade -...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Driver Behavior Monitoring Through Sensors and Tracking the Accident Using Wireless Technology

    Monitoring the driver behavior is one of the ways to prevent the fatal accidents and it is necessary to alert the driver when they are drowsy or in a distracted state. Distraction and drowsiness of the driver have been important factors for a large number of major accidents. They reduce...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    HDLC Implementation in Wireless Sensor Networks

    In this paper, the authors aim the designing and implementing an efficient HDLC chip. They use pipelining technique in HDLC register module which increases the throughput of the system and also helps in decreasing the delay of the system. In pipeline technique, number of instructions has been executed at the...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    PI-RTOS: Platform Independent RTOS

    In this paper, the authors propose a real-time operating system kernel for the 32-bit Leon3 processor. A system is said to be Real Time if it is required to complete its work and deliver its services on time. In a real-time system the correctness of its output, is an important...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Software Requirement Engineering Risk Prediction Model

    Analysis of many software program assignments from 2011 through 2014 shows interesting patterns. When the user compare large assignments that have efficiently attained their own cost as well as schedule quotes versus the ones that ran delayed, ended up over spending budget, or maybe ended up, half a dozen popular...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    An Enhanced Energy Aware Coverage Preservation with Static Clustering for WSN

    A Wireless Sensor Network (WSN) consists of a huge number of sensor nodes associated via wireless medium. Nodes in a WSN are organized with limited battery energy and thus improvement on network lifetime by reducing energy-usage is of extreme important. One of the solutions to minimize such energy-usage is associate...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    A Novel Predictive and Non-Predictive Cooperative Model for Routing in Ad Hoc Networks

    Ad hoc networks are formed by intermediate nodes which agree to relay traffic. The link between nodes is broken when a node rejects to relay traffic. Various parameters like depreciation in the energy of a node, distance between nodes and mobility of the nodes play a vital role in determining...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Requirement Risk Identification: A Practitioner's Approach

    Software project development has always been associated with high failure rate. The failure of a software project depends on rooted risks. These risks don't come into face at early stages of requirement gathering and analysis which carried on in the further phases of development greatly affects the cost of a...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    A Cooperative Strategy for Collision Detection and Prevention for Unmanned Ground Vehicles in Military Applications Using WSN Based VANET

    In the recent years, Vehicular Ad hoc NETworks (VENETs) have gained tremendous attention of researchers due to various services they provide and likely to be deployed commercially in coming years. VANET enables vehicles to communicate with each other to avoid any critical situation such as vehicle collision, unseen obstacles etc....

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Optimized Conditional Privacy Preservation Protocol for NFC Applications Using Genetic Algorithm

    In the recent years, the NFC with the combination of smart devices has widened the utilization range of NFC. It is said it will replace the credit card in electronic payment so security is one of the area that is to be checked. Currently the NFC security requires user's public...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Optimal Software Release Time Policy using Goal Programming

    In this paper, the impact of software testing effort and the efficiency on the modeling of software reliability for optimizing the cost in case of release time policy has been discussed. Another important problem in the software development process is to determine when to stop testing and release the software....

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Adhoc On-Demand Distance Vector - Energy Efficient Approach

    As nodes of Mobile Ad hoc NETwork (MANET) are mobile in nature, overall network lifetime is one of the key challenges in MANET. To improve overall network lifetime along with packet delivery fraction and normalized routing load, this paper proposed an Optimized Multi-hop Routing Ad hoc On-demand Distance Vector protocol...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    A Novel Feature Based Unified Node Data Analysis (FBU-NDA) Based IDS Using AODV in MANET

    MANET is a type of wireless network, which works on radio frequencies and holds short range communication. As it is temporary in nature and is having movable devices for communication which makes such network as infrastructure less. In such network variable conditions of routing will face several issues which degrade...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Survey of Integrity Verification in Multi-Cloud Storage by Efficient Cooperative Provable Data Possession

    Provable Data Possession (PDP) is one of the techniques to ensure the integrity of data in storage outsourcing. Here in this paper, the authors speak to the creation of an efficient PDP method for distributed cloud storage to maintain the scalability of service and data migration. On the basis on...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    An Elliptical Routing Protocol for Wireless Mesh Networks: Performance Analysis

    Wireless Mesh Networks (WMN) is one of the implemented types of MANETs. WMN is wireless network, in which each node can communicate directly with one or other peer nodes. In generally, MANET routing protocols are used in WMN, it arises performance issues. In this paper, the authors propose a new...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Acknowledgment Time Delay Approach to Optimize TCP Performance in Hybrid Networked Systems

    Transmission Control Protocol (TCP) is connection oriented transport protocol used on IP in wireless medium and it insists lossless data transmission in proper order. When TCP is used as a transmission protocol where physical layer is wireless medium, results high packet reordering due to bursty traffic and drastic variation in...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Enhanced CSMA/CA Contention Window for Efficient Random Access in IEEE 802.15.6

    The IEEE 802.15.6 is a new communication standard on Wireless Body Area Network (WBAN) for short-range, wireless communications in the vicinity of, or inside a human body. It is used for medical and non-medical applications. The IEEE 802.15.6 defines a Medium Access Control (MAC) layer compatible with several PHYsical layers...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    A Security Measure for Electronic Business Applications

    With the growth of business over the internet, there is more scope of security vulnerabilities over the internet. Despite of many efforts to make internet safe to the users, there is still a possibility for threats. The client, as well as the merchant for the electronic business, always faces problems...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    A Security Framework for E-Business Applications

    During the electronic business, the clients and the merchants make use of the internet. Thus, the authors can say that the internet, the client, and the merchant are the components for the electronic business. The electronic business involves various categories of businesses. These various types of e-businesses have different types...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    A Review of Elliptic Curve Based Signcryption Schemes

    Signcryption is a new cryptographic approach which provides authentication and encryption simultaneously in a single logical step. The aim is to reduce the cost of signature-then-encryption approach. This cost includes computational cost and communication cost. Furthermore, some signcryption schemes are based on RSA while some are based on elliptic curve....

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Development of Multimodal Biometric Framework for Smartphone Authentication System

    Secret knowledge, like remembering password or token based authentication systems are deemed inconvenience and difficult to use for users such as password may be forgotten or token may be lost. So burdens like remembering password and stolen or forged token based authentication have raised a current trend of biometric authentication...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    P2P Social Network with Dynamic Identity-Based Broadcast Encryption Using Rolls

    Social Network Service (SNS) market is stretch over worldwide, and then there are many security threats by attackers. In addition because sensitive data is concentrated on the central server, privacy can be exposed to SNS provider as well as malicious users. In this paper, the authors suggest the rolls scheme...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    ICORMAN: Extended Version of CORMAN Using Efficient Channel Reuse Method

    Mobile Ad-hoc NETworks (MANETs) are wireless networks in which all nodes are moving freely in the network; also they can leave or enter into the network at any time. The nodes in these types of networks are communicating on-the-move without any base stations. Due to this mobility, inter-node connectivity may...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    An Analytical Model for IEEE 802.15.4/ ZigBee Wireless Sensor Networks with Duty Cycle Mechanism for Performance Prediction and Configuration of MAC Parameters to Achieve QoS and Energy Efficiency

    The IEEE 802.15.4 standard defines a PHYsical (PHY) and Medium Access Control (MAC) layer protocol for low data rate wireless network with low power requirement which makes it ideal PHY/MAC for WSNs. Currently WSNs with combination of IEEE 802.15.4 and ZigBee are being used extensively in industrial applications such as...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Clustering Multi-Attribute Uncertain Data Using Probability Distribution

    Clustering is an unsupervised classification technique for grouping set of abstract objects into classes of similar objects. Clustering uncertain data is one of the essential tasks in mining uncertain data. Uncertain data is typically found in the area of sensor networks, weather data, customer rating data etc. The earlier methods...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Survey on Mobile Ad Hoc Network Routing Protocols

    Wireless mobile ad-hoc network is characterized as network without any physical connections. In this network there is no fixed topology due to the mobility of nodes, interference, multipath propagation and path loss. Many Routing protocols have been developed to overcome these characteristics. This paper is to review existing mobile ad-hoc...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Novel Modified Playfair Cipher Using a SquareMatrix

    In this paper, the authors explain about encryption and decryption of text using a secret password provided by the user. The encryption machine takes the password and source message as input and generates a cipher text based on modified Playfair Cipher algorithm using dynamic rectangular matrix. The decryption machine takes...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Cooperation Aware Layer Three Multi Path Routing Using QoS Approach for MANET

    Routing protocols in Mobile Ad-hoc NETworks (MANETs) need to accommodate its dynamic characteristics such as node mobility, non-availability of central control etc. Node mobility increase challenges to the routing protocols with respect to attainment of the desired level of Quality of services. Apart from own communication, MANET nodes have to...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    An Insight Into Software Crowdsourcing: How Crowd Can Transform the Business Model for Technology Service Providers

    Crowdsourcing is a distributed computing model which enables sharing of human efforts in form of ideas, non-hierarchical decision making; utilization of human intelligence and collaboration on complex real world problems that otherwise cannot be solved by any individual person, machine or organization easily. It leverage machine learning, automation, artificial intelligence...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    A Genetic-Fuzzy Algorithm for Load Balancing in Multiprocessor Systems

    With the increasing use of computers in research contributions, added requirement for faster processing is now an important necessity. Parallel Processing describes the concept of running tasks which can be run simultaneously on several processors. Load balancing is very important problem in multiprocessor systems. In this paper, the authors introduce...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Survey on Grid Based Energy Efficient Routing Protocols in Wireless Sensor Networks

    Sensor nodes in Wireless Sensor Networks (WSNs) have limited energy, range, memory and computational power. In WSN, it is an important task to send measured data at regular intervals from an area of interest for time sensitive applications to a base station or sink for further processing to meet the...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Genetic Algorithm and Probabilistic Neural Networks for Fingerprint Identification

    Existing security methods rely on knowledge based on approaches like password or token based on approaches like access cards. Such method is not very secure, biometrics such as fingerprint, face and voice offer means of personal identification and provide increased security because they rely on who the user are. In...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    An Improved Leader Selection Approach for Improving Network QoS

    To improve the effectiveness and QoS of service in a sensor network there are number of communication and localization architectures followed by sensor network. One of such architecture is leader selection architecture. This architecture restrict the communication to short distances so that the energy consumption of a node is reduces....

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Survey on Energy Efficient Routing Protocols in WSNs

    Wireless Sensor Network (WSN) is a highly distributed network of small and lightweight sensing nodes which are deployed in a large number at multiple locations. These networks are helpful in monitoring the system or environment. These sensor nodes performs sensing, processing and then communicating. Now-a-days, these networks are applied in...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    A Survey on Biometric Templates Binarization

    Due to the wide usage of biometrics, privacy and security concerns cannot be neglected. Biometric template protection systems have been proposed to protect the biometric template against unauthorized use. Many biometric template protection systems require the biometric template to be presented in a binary form. Biometric template binarization is the...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Approaches for Web Spam Detection

    Spam is a major threat to web security. The web of trust is being abused by the spammers through their ever evolving new tactics for their personal gains. In fact, there is a long chain of spammers who are running huge business campaigns under the web. Spam causes underutilization of...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Forecasting Chaotic Stock Market Data Using Time Series Data Mining

    An important financial subject that has attracted researchers' attention for many years is forecasting stock return. Many researchers have contributed in this area of chaotic forecast in their ways. Among them data mining techniques have been successfully shown to generate high forecasting accuracy of stock price movement. Now-a-days, instead of...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Cooperative Communication Simulation Using TCP

    Demand for wireless communication has increased rapidly. Almost everywhere there is a wireless device (phones, laptops, etc.) that need to communicate with other mobile devices in their region or to connect to an internet access point, and they need to exchange data especially via internet. As a result, the need...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Improving Credit Card Fraud Detection Using a Meta-Classification Strategy

    One of the issues facing credit card fraud detection systems is that a significant percentage of transactions labeled as fraudulent are in fact legitimate. These "False alarms" delay the detection of fraudulent transactions and can cause unnecessary concerns for customers. In this paper, over 1 million unique credit card transactions...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Towards Security Risk-Oriented Mal Activity Diagram

    Recently security has become one of the major concerns in Information System (IS) development. Different security modeling language or security extension is used to model security features of IS. Mal Activity Diagram (MAD) is used at the design stage to represent security aspect. But it cannot model all the security...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    A Session Based Spatial Domain Multiple Image Hiding Technique Using Variable Bit Replacement and Multiple Passwords

    For hiding secret information in images, there exists a large variety of Steganography techniques. The Least Significant Bit (LSB) insertion method is the most common and easiest method for embedding messages in an image in spatial domain but it has some limitations such as it is easier to understand using...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    A Novel Energy Efficient Authentic Reliable Routing Protocol (EEARRP) for Scalable Mobile Ad Hoc Networks

    This paper proposes a novel Energy Efficient Authentic Reliable Routing Protocol (EEARRP) to attain better authenticity in scalable mobile ad hoc networks. To decrease the signature verification expenditure and message communication expenditure a mechanism with message recovery is employed. The proposed authentic scheme is to minimize the size of the...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Web Information Retrieval Using WordNet

    Information retrieval (IR) is the area of study concerned with searching documents or information within documents. The user describes information needs with a query which consists of a number of words. Finding weight of a query term is useful to determine the importance of a query. Calculating term importance is...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Mobile Device Security: A Survey on Mobile Device Threats, Vulnerabilities and Their Defensive Mechanism

    Mobile communication has become a serious business tool nowadays. Mobile devices are the major platform for the users to transfer and exchange diverse data for communication. These devices are variably used for applications like banking, personal digital assistance, remote working, m-commerce, internet access, entertainment and medical usage. However people are...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    A Survey on Cloud Providers and Migration Issues

    From the most promising area of networking, the concept of using the services of cloud computing is on a great consideration nowadays. As a result it's a crucial time for corporate IT leaders to know their opportunities, innovating their creations on a higher level and utilizing their resources for new...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    A New Trust Model for Improved Identity Privacy in Cellular Networks

    Cellular networks have evolved through various generations, starting with 1G, followed by 2G and then by 3G, cellular networks have come a long way. A recent technology that has marked the beginning of 4G is Long Term Evolution (LTE). While transmission technologies, authentication mechanisms, confidentiality protection, etc., improved significantly through...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    OLMRP: Hierarchical Outflow Load-Balancing Multicast Routing Protocol for Congestion Control in Ad Hoc Networks

    This paper, proposes a new multicast routing protocol for mobile ad hoc networks that handles the congestion to improve the Quality of routing service. Part of the proposed protocol introduced a MAC layer level solution called Group Level Multicasting (GLM) that effectively handles the multicasting at one hop level mesh...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Design of Reversible Random Access Memory

    Reversible logic has become immensely popular research area and its applications have spread in various technologies for their low power consumption. In this paper, the authors proposed an efficient design of random access memory using reversible logic. In the way of designing the reversible random access memory they proposed a...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Comparison Based Performance Analysis of UDP/CBR and TCP/FTP Traffic Under AODV Routing Protocol in MANET

    The transmission of information in a MANET relies on the performance of the traffic scenario (application traffic agent and data traffic) used in a network. The traffic scenario determines the reliability and capability of information transmission, which necessitates its performance analysis. The objective of this paper is to compare the...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    The Performance as an Emergent Property of the Integration of ERP Systems in Organizations: Empirical Evidence from Two Moroccan Industries

    The interest in the impact of ERP system integration on business performance aroused a great debate which is not yet settled. Some studies emphasize a positive effect while others are based on the concept of Solow's productivity paradox and emphasize a negative effect of this investment on business performance. The...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Using Enumeration in a GA Based Intrusion Detection

    In the last few years there has been a tremendous increase in connectivity between systems which has brought about limitless possibilities and opportunities. Unfortunately security related problems have also increased at the same rate. Computer systems are becoming increasingly vulnerable to attacks. These attacks or intrusions based on flaws in...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Mobile Adhoc Network Under the Adaptive TCP Variants Techniques for Maximization of Throughput

    It is an ad-hoc network which is set up by wireless mobile computers (or nodes) which moves randomly in the places that have no network infrastructure or hard to reach location. Since the nodes communicate with each other to gather network information. They cooperate by forwarding data packets to other...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Towards Setting up IBM Cloud Computing VCL at Abdelmalek Essaadi University

    The need for adopting Cloud Computing in Morocco and the experience ongoing of VCL implementation at Abdelmalek Essaadi University are described in this paper. Students, Faculty and administrative staff can take great benefits from on-demand, flexible and real time services, provided by the IBM Cloud Computing initiative VCL. The installation...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    An Encryption Algorithm for End-to-End Secure Data Transmission in MANET

    Encryption is of prime importance when confidential data is transmitted over wireless network. Numerous encryption algorithms like AES, DES, RC4 and others are available for the same. The most widely accepted algorithm is AES algorithm. The authors have proposed a new algorithm based on the concept used by Rijmen and...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Design and Implementation of Radio Link Control as a Part of the WCDMA Radio Interface Protocols by Using SDL

    The Universal Mobile Telecommunication System (UMTS) is the most powerful technology in the Third Generation (3G) mobile communication and it is the base for the 4G technology. The Wide band Code Division Multiple Accessing (WCDMA) is the radio access technique for the UMTS system. The Radio Link Control (RLC) Protocol...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Broadcast ID Based Detection and Correction of Black Hole in MANETs

    A wireless ad-hoc network is a collection of mobile nodes with no pre-established infrastructure, forming a temporary network. In the absence of a fixed infrastructure, nodes have to cooperate in order to provide the necessary network functionality. One of the principal routing protocols used in Ad hoc networks is AODV...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    An Advanced Door Lock Security System Using Palmtop Recognition System

    Biometric technology is used to identify a person based on his/her physical behavioral characteristics. One of the extensive uses of biometric technology is a fingerprint recognition system. The technology has broad use mainly for its easiness, reliability and accuracy in human identification process. This presents work done on minutiae based...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Data Communication in Mobile Wireless Sensor Networks

    A Mobile Wireless Sensor Network (M-WSN) derives its name by considering either mobile sink or mobile sensor nodes within the Wireless Sensor Network (WSN). As the sensor nodes are energy constrained, energy efficiency is the main aspect to be considered in any applications. By considering mobile sensor nodes in WSN,...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Design and Performance Evaluation of an Optimized Disk Scheduling Algorithm (ODSA)

    Management of disk scheduling is a very important aspect of operating system. Performance of the disk scheduling completely depends on how efficient is the scheduling algorithm to allocate services to the request in a better manner. Many algorithms (FIFO, SSTF, SCAN, C-SCAN, LOOK, etc.) are developed in the recent years...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    DDoS Attacks Impact on Network Traffic and Its Detection Approach

    A Denial of Service (DoS) attack is a malicious effort to keep endorsed users of a website or web service from accessing it, or limiting their ability to do so. A Distributed Denial of Service (DDoS) attack is a type of DoS attack in which many computers are used to...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Security Concerns of Object Oriented Software Architectures

    Testing and measuring the security of software system architectures is a difficult task. An attempt is made in this paper to analyze the issues of architecture security of object-oriented software's using common security concepts to evaluate the security of a system under design. Object oriented systems are based on various...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Bit Error Rate Evaluation of IEEE 802.16 (WiMAX) in OFDM System

    This paper investigates several modulation techniques for IEEE 802.16 (WiMAX) based OFDM system including BPSK, QPSK, 8PSK and various levels of QAMs. The system performance is gained by dynamically choosing the modulation technique based on the channel conditions. The performance of OFDM system is accessed by using computer simulations performed...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Effect of Tiling in Row Mean of Column Transformed Image as Feature Vector for Iris Recognition with Cosine, Hadamard, Fourier and Sine Transforms

    Iris recognition is a biometric authentication method that uses pattern-recognition techniques based on high-resolution images of the irises of an individual's eyes. Iris recognition has been a fast growing, challenging and interesting area in real-time applications. A large number of iris recognition algorithms have been developed for decades. This paper...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Soft Computing Particle Swarm Optimization Based Approach for Class Responsibility Assignment Problem

    Soft computing approach like swarm optimization can be used in the software development environment also for developing effective software. Software development and testing cost must be reduced and optimized so that companies can survive and sustain in the market. Object oriented analysis and design is used for developing complex real...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Architecting Distributed Domain Reducer in Cloud Environment

    Clouds computing is a recent technology used to represent a different way to architect and remotely manage computing resources; it is sharing resources/information as-a - service using internet. It describes both a platform and type of application. A Cloud computing platform dynamically provisions configures, reconfigures and de-provision servers as needed....

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Modified Fast Recovery Algorithm for Performance Enhancement of TCP-NewReno

    One of the keys to the success of the Internet is relying on using efficient congestion control mechanisms. Congestion control is required not only to prevent congestion collapse in the network, but also to improve network utilization. Without congestion control, a sending node may continue transmitting packets that may be...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Intelligent Traffic Light System to Prioritized Emergency Purpose Vehicles Based on Wireless Sensor Network

    The use of Wireless Sensor Network (WSN) has proved to be a very beneficial in the design of adaptive and dynamic traffic light intersection system that will minimize the waiting time of vehicles and also manage the traffic load at the intersection adaptively. In this paper, the authors propose an...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Generating All Navigational Test Cases Using Cyclomatic Complexity From Design Documents for Mobile Application

    This is new mobile world; lots for even the simplest mobile application there can be many Navigational Paths. The challenge at Design phase is to identify all possible paths, generate code and validations for each one of them. Generating all possible test paths and test cases are difficult to achieve...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    BAIDS: Detection of Blackhole Attack in MANET by Specialized Mobile Agent

    The inbuilt flexibility along with easy set-up and low maintenance cost causes MANETs to be increasingly useful in catastrophe management, battlefield surveillance; etc. The infrastructure-less performance of MANET has made it more vulnerable to intrusion than ever before making the security of network all the more acute. As the previously...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Computer Mouse Using Eye Tracking System Based on Houghman Circle Detection Algorithm with Grid Analysis

    Large numbers of input devices are available for human interaction with modern computer systems which are operated by hands and a few of them through gestures made using fingers and body movements. The advancements in assistive technology have proposed many concepts for controlling the input and mouse movements by detecting...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Retrial Queuing System with Starting Failure, Single Vacation and Orbital Search

    This paper is concerned with the analysis of a single server retrial queue with vacation and orbital search. The server is subject to starting failure and repair. At the completion epoch of each service, the server may take a single vacation. After vacation completion, the server searches for the customers...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    A Dual Fuzzy Entropy Model for QoS Routing in MANET

    Congestion leads to bandwidth degradation and, packet losses thereby causing retransmissions and higher energy drain rate by the nodes in Mobile Ad-hoc NETworks (MANET). So providing Quality of Service (QoS) and reducing congestion levels are some of the major issues to be addressed in these networks. However, use of appropriate...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    A New Weighted Graph-Based Partitioning Algorithm for Decentralized Nonlinear Model Predictive Control of Large-Scale Systems

    This paper proposes a grouping algorithm for partitioning large-scale nonlinear dynamical systems based on graph theory. The algorithm incorporates a novel scheme to quantify the strengths of graph edges, representing the degree of couplings among the system variables via sensitivity functions. This leads to a weighted graph topology with different...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    A Soft Computing Based Adaptive Call Admission Control Scheme for Bi-Class Traffic in CDMA Cellular Network

    Soft handoff in CDMA cellular system increases system capacity as compared to hard handoff as interference is reduced by transmitting signals as lower power level. A CDMA cellular system involving voice and data calls is considered in this paper. The model proposed in this paper is for data and voice...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Numerical Modelling of Concrete Tensile Strength Test by Wrapping Scripting Language with Compiled Library

    The importance of engineering simulation is increasing day by day with the increase of computing power. The finite element analysis method is one of the widely used approaches for this purpose. To achieve optimum simulation, there is no alternative to take complete control over the code which proprietary commercial codes...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    A Comparative Study of Routing Protocols in E-Health Applications for Heterogeneous Interfaced Mobile Ad-Hoc Grid

    Mobile computing has become an indispensable way of life in recent years. Recent advancement in Mobile phones and other handheld devices have enabled them of using various types of networks, which were meant for computers only. The integration of such devices into heterogeneous grids has emerged new research challenges. Different...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    An Efficient Fuzzy Based Congestion Control Technique for Wireless Sensor Networks

    In Wireless Sensor Networks (WSN), congestion causes overall channel quality to degrade and loss rates to increase, leads to buffer drops and increased delays, and tends to be grossly unfair toward nodes whose data has to traverse a larger number of radio hops. In order to control the congestion in...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Prediction of Course Selection by Student Using Combination of Data Mining Algorithms in E-learning

    Course recommender system aims at predicting the best combination of courses selected by students. Here in this paper, the authors present how the combination of clustering algorithm-Simple K-means Algorithm & association rule algorithm-Apriori Association Rule is useful in Course Recommender system. If they use only the Apriori association rule algorithm...

    Provided By International Journal of Computer Applications