International Journal of Computer Applications

Displaying 121-160 of 6504 results

  • White Papers // Feb 2015

    Developing Web-Based Semantic and Fuzzy Expert Systems Using Proposed Tool

    Developing the Expert System (ES) using conventional programming languages is very tedious task. Therefore, it is not surprising that tools have been developed that can support the knowledge engineer. Separate tools now exist to support the knowledge acquisition and to support the implementation. Fuzzy set theory is used to capture...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Characteristics of a Fuzzy Project Network Using Statistical Data

    In this paper, characteristics of fuzzy project network using statistical data are discussed in detail in order to calculate the fuzzy critical path, fuzzy earliest times, fuzzy latest times and fuzzy total float. Fuzzy number as fuzzy activity time is constructed using interval estimate by calculating mean, variance and standard...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Annihiliation of Redudant Data in Amalgamation of WSN's Using Data Cleansing

    Now-a-days manufacturing environments are very charismatic and inclement. Traditional Management Information Systems (MISs) have mostly been implemented upon hierarchical architectures, which are inflexible to adapt changes and uncertainties promptly. Next-generation MISs must be agile and adaptable to accommodate changes without significant time delays. It is essential for an MIS to...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Case Study: Outlier Detection on Sequential Data

    Time series data streams are common in wireless sensor networks in nowadays. This type of data is having uncertainty due to the limitation of the measuring equipments or other sources of corrupting noise, leading to uncertain data. As uncertain streaming data is continuously generated, mining algorithms should be able to...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Improving Performance of MANETs Using Multi-Criteria Multipath Routing Protocol

    In recent years, many efforts have been made on routing the data in mobile ad hoc networks efficiently. Subsequently, several specialists have provided distinct routing protocol for ad hoc networks, especially routing protocols using the concept of multiple paths such as AOMDV. This is on the account of the utilization...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    A Conceptual Framework for QoE Measurement and Management in Networked Systems

    Network management of real time applications demands a new approach for an effective service quality provision. The traditional approach of network management based on Quality of Service (QoS) parameters like jitter, throughput, delay and loss cannot give enough details of how user quality demands. Therefore network management approach must start...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Palm Vein Biometric Technology: An Approach to Upgrade Security in ATM Transactions

    Technology advances day-by-day, the growth of malpractice in electronic transactions has also been increasing. Many hacking techniques for traditional passwords had come to authorize an unauthorized person while performing ATM transactions. One of the security mechanism to erase such fraudulent activities (in which an unauthorized person is performing transactions as...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    A Survey on Social Network Analysis for Counter-Terrorism

    Terrorist Activities worldwide has approached the evolution of various high-ended methodologies for analyzing terrorist groups and networks. Existing research found that Social Network Analysis (SNA) is one of the most effective and predictive method for countering terrorism in social networks. The study reviewed various SNA measures for predicting the key...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Trust Based Energy Efficient Clustering Using Genetic Algorithm in Wireless Sensor Networks (TEECGA)

    Wireless sensor networks are gaining lot of popularity because of its widespread applications. They consist of small sensor nodes that are low in battery and computational capability. Mostly these nodes are deployed in remote areas thus it's not easy to replace their batteries. In clustering process, clusters of the sensor...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Pipelined Implementation of Dynamic Rijndael S-Box

    Pipelined architecture for S-Box is proposed in this paper. ROM based look-up table implementation of S-Box requires more memory and introduces unbreakable delay for its access. Pipelined S-Box of combinational logic based implementation gives higher throughput and less delay as compared to that of no pipelined S-Box. 5, 6 and...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Design and Analysis of a Wideband Microstrip Antenna for High Speed WLAN

    Allocation of frequency spectrum for Wireless LAN (WLAN) is different in different countries. This paper presents a myriad of exciting opportunities and challenges for design in the communications arena, including antenna design. The high speed WLAN has many standards and most antennas available do not cover all the standards. This...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    An FPGA Based Minutiae Extraction System for Fingerprint Recognition

    Fingerprint holds a higher priority among other identification techniques such as passwords, keys and ID cards. Biometric systems which include fingerprint recognition, is essential as every individual has a unique fingerprint pattern. An efficient approach towards fingerprint recognition is through the implementation of image processing techniques that can be performed...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Analysis of Triple Band Rectangular Patch Antenna Loaded with Pairs of L Shaped Slots

    In this paper, the authors present a slotted multiband antenna design achieved by loading a pair of L shaped slots in a Rectangular Micro Strip Antenna (RMSA). The proposed designed antenna resonates at three frequencies namely 2.7 GHz, 3.65 GHz and 5.7 GHz. Proposed antenna designed results in an increment...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Comparative Analysis of Various Attacks on MANET

    Mobile Ad-hoc NETworks (MANETs) is a part of wireless networks. No wires and fixed routers are used in this type of network. It is not everlasting network; it is the short term network. Nodes has the capability to self organize themselves and it follows infrastructure less architecture. Network is formed...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Dual Level Security for Key Exchange Using Modified RSA Public Key Encryption in Playfair Technique

    In this paper, the authors are to provide the dual level security for the key in playfair cipher using modified RSA digital signature scheme. This paper has two phases, in the first phase the key is converted into the ASCII code and in the second phase, this paper is using...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Software Test Process, Testing Types and Techniques

    Software testing is the most critical phase of the Software Development Life Cycle (SDLC). Software under test goes through various phases, which as per the study are test analysis; test planning, test case/data/environment preparation, test execution, bug logging and tracking and closure. There is lot of research which has been...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Performance Analysis of MIMO-OFDM and MISO-OFDM System Based on STBC Code

    MIMO (Multiple Input Multiple Output)-OFDM (Orthogonal Frequency Division Multiplexing) technique is most attractive techniques in wireless communication system and it is very popular for high data rate capacity and against multipath fading. This paper presents performance analysis and a comparative study of OSTBC (Orthogonal Space Time Block Code) over Rayleigh...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Efficient Clustering with Proposed Load Balancing Technique for MANET

    In this paper, an efficient and modified load balancing algorithm is proposed. This paper shows the results of the proposed energy aware load balancing algorithm. Global re-clustering is initiated when the network becomes significantly unbalanced i.e. if the variance of degree of the cluster heads in the network is greater...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Multimodal Biometric Authentication Using ECG and Fingerprint

    Biometric system is a very important recognition system which is used for individual verification and identification. Various types of biometric traits are used in today's world, in which some are used for commercial purpose and few used for verification purpose. Existing authentication techniques are suffer from different errors like mismatch...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    A Concise Model to Evaluate Security of SCADA Systems Based on Security Standards

    SCADA systems are essential for the critical infrastructures, such as electric power, oil, and gas production and distribution systems. Hence, incapacitation or destruction of SCADAs would have a debilitating impact on the defence or economic security of organizations and states. In this paper, the authors study fifteen SCADA cyber security...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    An Enhanced Empirical Method on Choosing the Highest Principal Features and the Number of Hidden Neurons in Principal Component Analysis-Artificial Neural Network Face Recognition Based System

    With fast evolving technology, it is necessary to design an efficient security system which can detect unauthorized access on any system. It's needed to implement an extremely secure, economic and perfect system for face recognition that can protect systems from unauthorized access. So, in this paper, a robust face recognition...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Comparative Analysis of Selective Forwarding Attacks Over Wireless Sensor Networks

    The potential use of Wireless Sensor Networks (WSNs) in many technological situations is extensive. WSNs are employed in numerous areas, such as battlefields, traffic surveillance, healthcare, and environmental monitoring. Many studies have been conducted to improve various aspects of the performance of WSNs, such as energy efficiency, Quality of Service...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Business Intelligence Design Model (BIDM) for University

    Information and knowledge are the backbone of any organization's development because they are used in decision making processes. In addition, the management level of any organization is looking forward to ensure the quality and the effectiveness of the work performances depending on the knowledge to make the right decisions. But...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Image Symmetric Encryption Based on Block Displacement

    In this paper, the authors are explaining the management of security. This will allow users authorization and integrity, accuracy and images security circulating on the internet. Addition to that, more effort is required for an image-based data in the process of encrypting and decrypting the image. Proposed architecture facilities for...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Parking Navigation and Payment System Using IR Sensors and RFID Technology

    The main problem in today's crowded parking facility is congestion and finding a vacant parking space. In this paper, a navigation method is proposed that minimizes the parking time, based on collected real-time vacancy information of parking slots. In the proposed method, a central server in the parking facility collects...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    OpenCL Parallel Blocked Approach for Solving All Pairs Shortest Path Problem on GPU

    All-Pairs Shortest Path Problem (APSP) finds a large number of practical applications in real world. This paper presents a blocked parallel approach for APSP using an open standard framework OpenCL, which provides development environment for utilizing heterogeneous computing elements of computer system and to take advantage of massive parallel capabilities...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    An Improvement of Forgery Video Detection Technique Using Error Level Analysis

    Now-a-days, videos are core part of live entertainment in television and movies, and they are breathing of real entertainment world. People believe movies and video snaps in everywhere of digital media. Digital Photo images are everywhere: on the covers of magazines, in newspapers, in courtrooms, and all over the Internet....

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    A Mechanism to Preserve Private Data in Social Networking System

    Social Networking System (SNS) like Facebook and Twitter have gained more popularity in this new era. It allows millions of individuals to create online profiles and share their personal information with vast networks of friend's. SNS allows third party extensions to access the users' information through Application Programming Interface (API)....

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    A Greedy Algorithm Approach for Mobile Social Network

    With the proliferation of mobile devices and wireless technologies, mobile social network systems used more. A mobile social network has important role in social network. The Process of finding influential nodes is NP-hard. Greedy rule with demonstrable approximation guarantees will provide smart approximation. A divide-and-conquer method with parallel computing mechanism...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Cloud Computing: A Survey on Cloud Computing

    The internet is marvelous technology of the computing world. The most exhaustive technology that internet dispense, is the Cloud Computing. It provides instrumental values to the customers and cloud service providers. With the advent of cloud computing the client uses the resources like hardware, software or storage, that are offered...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Comparison Analysis of Link Prediction Algorithms in Social Network

    Social network depicts the relationship like friendship, common interests etc. among various individuals. Social network analysis deals with analysis of these social relationships. Link prediction algorithms are used to predict these social relationships. Given a social network graph in which a node represents a user and an edge represents the...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Filtering Intrusion Detection Alarms using Ant Clustering Approach

    With the growth of cyber attacks, information safety has become an important issue all over the world. Many firms rely on security technologies such as Intrusion Detection Systems (IDSs) to manage information technology security risks. IDSs are considered to be the last line of defense to secure a network and...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Testing Android Anti-Malware Against Malware Obfuscations

    There is an increasing threat of malware on mobile. Since Android is the most popular and maximum sold mobile phone, the malware attack on Android mobile is increasing day by day. The commercial antimalware products available in the market can detect common and old malwares easily. Different types of transformations...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Big Data: Tools and Technologies in Big Data

    Big data can be defined as data which requires latest technologies other than the traditional tools and techniques to handle it, due to its unstructured nature. Huge volume, various varieties and high velocity create lots of other challenges and issues regarding its management and processing. Big data is growing at...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Reduction of Leakage Power in Half-Subtractor Using AVL Technique Based on 45nm CMOS Technology

    The analytical paper of arithmetic circuits plays an important role in designing of any VLSI system. Subtractor is one of them. Half subtractor is being designed using Adaptive Voltage Level (AVL) techniques. This design consumed less power as compare to conventional design. The authors can reduce the value of total...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    CMOS Design of Area and Power Efficient Multiplexer using Tree Topology

    In this paper, a design of 16:1 tree type multiplexer has been presented using GDI and PTL technique. The proposed design consists of 31 NMOS and 15 PMOS. The proposed multiplexer is designed and simulated using DSCH 3.1 and MICROWIND 3.1 on 180nm technology. Performance comparison of proposed multiplexer with...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Privacy Preserving Association Rule Mining using Horizontally Partition Data: Review Paper

    In data mining is used to extract interested pattern or knowledge from large amount of data using many data mining technique. However it may also display sensitive information about individuals compromising the individual right to privacy when a collection of data is split among various parties. Now each and every...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Knowledge Discovery From Web Usage Data: An Efficient Implementation of Web Log Preprocessing Techniques

    Web Usage Mining (WUM) refers to extraction of knowledge from the web log data by application of data mining techniques. WUM generally consists of web log preprocessing, web log knowledge discovery and web log pattern analysis. Web log preprocessing is a major and complex task of WUM. Elimination of noise...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    A Technique of Data Fusion for Effective Text Retrieval

    The goal of information retrieval systems is to provide useful information for user's information need. For a collection of documents and a given query, an IR system returns a ranked list of documents. Different IR systems based on IR models such as vector space, smart vector space, extended Boolean, latent...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    A Review on Knowledge Discovery Using Text Classification Techniques in Text Mining

    Data mining is process of identify the knowledge from large data set. Knowledge discovery from textual database is a process of extracting interested or non-retrieval pattern from unstructured text document. With rapid growing of information increasing trends in people to extract knowledge from large text document. A text mining frame...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2014

    Secure System Practices and Data Access Management in Wireless Sensor Network

    Wireless Sensor Networks (WSN) are a heterogeneous system with a collection of sensors distributed unbalanced patterns in remote areas, and often in unfriendly environments, without any pre-deployed architecture, and with limited hardware inside them. As the use of wireless sensor networks continuously growing, it should require efficient security mechanisms. Therefore...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2014

    Security-SLA and Signature Scheme for Cloud Network

    Cloud computing is used for management of resources applications and information as services over the cloud. The resources used in cloud are usually distributed as services. Cloud resources are majorly delivered to the customers in terms of services and the security here is implemented through the infrastructure security metrics via...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2014

    Design of Modified Exclusive-128 Bit NLFSR Stream Cipher and Randomness Test

    In this paper, the authors describe modified exclusive-128 NLFSR stream cipher which generates 128 bit key-streams using only NLFSR element as its main function and XOR operation. It consists of different sizes of NLFSRs both in Fibonacci and Galois configurations which offer better trade-off between the algorithm security and hardware...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2014

    VHDL based Hardware Architecture of a High Performance Image Edge Detection Algorithm

    In this paper the authors present the software and hardware implementation of a low cost and high performance image edge detection algorithm. This algorithm will be used as part of a complete vision based driver assistance system. The main challenge consists in realizing a real-time implementation of edge detection algorithm...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2014

    Efficiency of Small- and Medium-sized Tofu Enterprises (SME) in Salatiga using Data Envelopment Analysis (DEA)

    The rise of US Dollars exchange rate to Rupiah in September 2013 has had an impact on all industries in Indonesia, especially tofu enterprises. The rising prices of raw materials require them to have an ability to survive and remain competitive. Productivity is one of the main indicators to estimate...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2014

    Synchronous Relaying of Sensor Data

    In this paper the authors have put forth a novel methodology to relay data obtained by inbuilt sensors of smart phones in real time to remote database followed by fetching of this data. Smart phones are becoming very common and they are laced with a number of sensors that can...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2014

    Comparison of BP and SVM on SLA based Masquerader Detection in Cloud

    Cloud computing is a new dynamics in the IT sector which imitates the pay per use modality of many commodity items. Organizations can use the new offerings in the IT field without significant capital investment. However, there is scrutiny in adoption of cloud computing in organizations as there are many...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2014

    Framework for Offloading Android Applications using Cloud

    The usage of Smartphone is increasing rapidly over the last few years. Due to their mobility and good connectivity, Smartphone is increasing thrice as compared to PCs. However they are still constrained by limited processing power, memory and battery. Thus, the applications cannot be made very rich. In this paper,...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2014

    Application of Optimization Technique to Tune PID Controller for a Level Process

    In any processes industry, process variables that need to be controlled are temperature, level, pressure and flow. This paper deals with an application of genetic algorithm to find the PID controller values to control the liquid level in the cylindrical tank. A process is identified as First Order Plus Dead...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2014

    A Sophisticated Job Scheduling Approach to Minimize the Time Consumption at Computational Cloud

    Cloud computing is an evolving paradigm of this new world. Time complexities have demanded sophisticated scheduling algorithms form the user to prevent the over burden of the cloud servers. Although the cloud servers are fast in comparison to the other platforms of servers but still a good scheduling algorithm would...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2014

    Keystroke Dynamic Authentication in Mobile Cloud Computing

    One of the important challenges in Mobile Cloud Computing (MCC) is related to the authentication of users. There is increasing demand for suitable authentication method for accessing to the shared information via the Internet through Cloud Service Provider (CSP). Personal identification number is the most common mechanism for authentication in...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2014

    Mining Multiple Text Sequence with Key Management

    A text stream is a sequence of chronologically ordered documents, being generated in various forms. The multiple text streams that are correlated to each other by sharing common topics. The authors' aim is to extract the knowledge of the text stream from the listed documents. In particular, vulnerabilities could include...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    An Extension of MAC Protocol for Mobility Detection and Efficient Data Transmission

    In this paper, the authors introduce an extension of MAC protocol for mobility detection of nodes and efficient data transmission in mobile, multihop wireless sensor network. Here for mobility detection, receiving power of the node is consider by the transmitting node. If gradual degradation in communication link does due to...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    Mining Web Access Patterns using Root-set of Suffix Trees

    With the rapidly growing uses of World Wide Web (WWW) for various important and sensitive purposes it becomes a sensible necessity to find out the interesting web access patterns from the web access sequences tracked by users frequently. Web access sequential patterns can be used to achieve business intelligence for...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    An Efficient Text Clustering Approach using Biased Affinity Propagation

    Based on an effective clustering algorithm seeds affinity propagation-in this paper an efficient clustering approach is presented which uses one dimension for the group of the words representing the similar area of interest with that the authors have also considered the uneven weighting of each dimension depending upon the categorical...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Design and Implementation of an Improved Routing Algorithm using Frequent Item Set Mining

    In this paper the authors present how routers can manage large amount of data packets as routers exchange information with each other to find the best possible route to a destination thus graphs represent a more general class of structures than sets, sequences, lattices and trees. Since on web heavy...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    An Effective Authentication Method for Document Type Color Images with Data Repairing Capabilities

    This is new authentication scheme based on the secret sharing method with a data repair capability for document type color images via the use of Portable Network Graphics (PNG) image. And generate the authentication signals to each block of image, which together with the binarized block content, this authentication signals...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    An Extended Version of Four-Square Cipher using 10 X 10 Matrixes

    Now-a-days web based attacks is an issue in the internet data transmission. Many cryptographic algorithms are developed to secure the data over the communication. The existing algorithm uses alphabets only. In this paper, the authors proposed an algorithm which uses an innovative cryptographic digraph substitution method to provide a stronger...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Design and Analysis of Distributed Embedded Systems using AADL - Application to the Precision Time Protocol

    Prototyping distributed embedded system can be seen as a collection of many requirements covering many domains. System designers and developers need to describe both functional and non-functional requirements. Building distributed systems is a very tedious task since the application has to be verifiable and analyzable. Architecture Analysis and Design Language...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Implementation and Evaluation of mpiBLAST-PIO on HPC Cluster

    Due to exponential growth in the size of genomic databases, traditional techniques of sequence search proved to be slow. To address the above problem, an open source and parallel version of BLAST called mpiBLAST was developed by the programmers. In mpiBLAST, the master process distributes the database fragments among worker...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Optimized Fault Tolerance in Distributed Environment

    Vehicular ad-hoc networks represent a rapidly emerging and particularly challenging class of Mobile Ad hoc NETworks (MANETs). VANETs are distributed and self organizing communication networks built up from travelling vehicles. In this paper, the authors have considered controlled latency process by managing the time span between updates for fault tolerance...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Improvement on LEACH Protocol in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) have great potential to support several important wireless applications, including real-time multimedia communication, medical applications, surveillance using sensor networks, industrial applications, military surveillance and home networking applications. But there are two challenging issues communication bandwidth and energy is very important to design wireless and mobile systems...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Improvement on Gossip Routing Protocol using TOSSIM in Wireless Sensor Networks

    Multicast routing protocols in the networks are inefficient to handle high priority traffic, network congestion, excessive processing of control information and retransmission procedures. Gossiping routing protocol is suitable and controlled form of reducing the overhead of routing protocols for forwarding a message. Gossiping protocol is characterized by each node randomly...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Quality of Service during Handover in Heterogeneous Wireless Network

    In a cellular network, handoff is a process of transferring a Mobile Station (MS) from one Base Station (BS) or channel to another as the user is on the move. The handover process must take care of several parameters e.g. the handover scheme that is being used; number of free...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Optimising OSPF Database by Intra-Area Summarization: A New Approach

    With the growing demand of communication, the need for networking is increasing day-by-day. Networking being the backbone of computer industry faces the greatest challenge. Factors like cost, time and memory size utilization are always the bottle neck for this industry. Various methods are available for dealing this problem. Protocols like...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Intrusion Detection System using Traffic Prediction Model

    In wireless network, the authors will not limit the boundaries of network because it makes vulnerable association among the users. Therefore, the detection of intrusion attacks in wireless networks is challenging security issues. The various types of attacks can be detected by using various methods. The change or modification in...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Text Categorization Comparison between Simple BPNN and Combinatorial Method of LSI and BPNN

    In this paper, the authors proposed a text categorization comparison between simple BPNN and combinatorial method of LSI and BPNN. In the traditional error back propagation network, the weight adjustment process gets block in a local minima and also the training speed of such network is very slow which leads...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Dynamic Partial Reconfiguration Implementation of AES Algorithm

    In this paper, the authors report Partial Reconfiguration (PR) by which selected areas of an FPGA can be reconfigured during runtime. Today cryptographic algorithms are not safe also embedded cryptographic hardware is costly. Hence to make it cost effective and to provide more secureness reconfigurable hardware such as FPGA is...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Design and Implementation of Weather Monitoring and Controlling System

    Weather monitoring plays an important role in human life, so the collection of information about the temporal dynamics of weather changes is very important. In any industry during certain hazards it is very important to monitor weather. The fundamental aim of this paper is to develop an embedded system to...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Disk I/O Performance-per-Watt Analysis for Cloud Computing

    Assessing disk I/O performance and power consumption associated with a given cloud workload is important especially for workloads that are bounded by disk I/O. Disk performance becomes a bottleneck for achieving higher performance and lower power consumption especially when memory size is not enough to process large blocks of data....

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Performance and Evaluation of Adaptive Dynamic Channel Allocation protocol in Hybrid Multichannel Wireless Mesh Networks

    Today, there are various methods available for increasing the throughput of a multichannel wireless mesh network. These can be either static allocation or dynamic allocation. In this paper, a hybrid multichannel wireless mesh networking architecture is proposed and every mesh node has both static and dynamic interfaces. Static-dynamic Combined Channel...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Performance Improvement in MIMO-OFDM using BCH Coding and Interleaving

    Advances in wireless communications, such as MIMO and OFDM provide the infrastructure for high spectral efficiency and consequently, high data rate. In this paper, the performance of BCH correcting code is evaluated in comparison with convolutional encoding using interleaved OFDM modulation. The system shows a consistent improvement in BER performance...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Maximizing Lifetime of Heterogeneous Wireless Sensor Network using Heed Protocol

    Wireless Sensor Network (WSN) has significant role in daily life. Many routing protocols have been proposed in recent advances, based on heterogeneity. Achieving the lifetime, deployment of nodes, fault tolerance, and energy efficiency are the main research goals. In this paper, the authors have proposed Hybrid Energy Efficient Distributed protocol...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Study on Improvisation of Response Time: Impact of Various Parameters in a Cloud-Computing Environment

    Cloud computing has become a key component as well as a measure of success for various organizations today. Apart from benefits obtained, it is important to take into account the location of user-base and data-center, which is essential for performance and security reasons, since the location of data-center and user-base...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Executing Joins Dynamically in Distributed Database System Query Optimizer

    In order to join two sub queries involving data from multiple sites data has to be transmitted from one site to other. While transmitting the data within a network, the factors involved in distributed databases is communication cost and amount of data transmitted. To minimize these factors, join operation is...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Performance Analysis of LTE and IEEE 802.16 WiMAX in terms of Attenuation and BER via MATLAB: Scenario based ROF Amalgamation as Backhaul Technology

    The possibilities for fiber optics are nearly endless because they are flexible under extreme conditions and the signal do not distort easily. Wireless technology has introduced high speed internet accessibility through wireless broadband. Radio over fiber; the integration of microwave and optical networks is the potential solution for reducing cost...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Hybrid Particle Swarm Optimization (HPSO) for Data Clustering

    Data mining is the collection of different techniques. Clustering information into various clusters is one of the data mining techniques. It is a method, in which each cluster must contain more similar data and have much dissimilarity between inter cluster data. Most of traditional clustering algorithms have disadvantages like initial...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Priority based Fuzzy Decision Packet Scheduling Algorithm for QOS in Wireless Sensor Network

    As the WSN getting involved in multi-objective system it needs to cope up with different types of data and to properly transfer them according to their requirements. Since the different kind of data have different delay and bandwidth requirements constrains which needed to be fulfilled without exceeding the node internal...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Throughput Optimization using Transition Probability on MAC Layer in Mobile- Ad hoc Network

    In MANET, since the system changes randomly, it is generally impossible to predict with certainty the state of a node at a given point in the future but the statistical properties of the system's future can be predicted. These statistical properties are important in many applications. A Markov chain can...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Algorithmic Analysis of an Efficient Packet Scheduler for Optimizing the QoS of VoIP Networks

    Owing to the emerging realities in the Information and Communication Technology (ICT) industry, where data traffic is growing much faster than traditional voice traffic, there is now a global growing desire to migrate to digital form of communication. The trend is focused in transporting voice over data networks rather than...

    Provided By International Journal of Computer Applications