International Journal of Computer Applications

Displaying 121-160 of 5369 results

  • White Papers // Aug 2014

    MPLI: A Novel Modified Parametric Location Identification for AODV in MANET

    Wireless ad hoc network provides a short range communication medium for mobile devices. In such type of network the components satisfying the infrastructural needs are not presents and each functionalities needs to be performed by inbuilt elements of the nodes which let them work as a router. Routing is one...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    CARF-F: Conditional Active RREQ Flooding-Filter Based Prevention Scheme for AODV in MANET

    Wireless network is a growing field of latest technology because of its increased popularities over the rural and urban areas. Such network provides the mobility based service usage and hence removes the location dependencies for the users of mobile devices such as laptops, cell phones, Tablets and PDA's. These networks...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    Radiation Source Localization Based Genetic and Fuzzy Agents Using Robotics Wireless Sensor Networks

    The recent increasing threat of radiological weapons technologies has highlighted the need for superior detection of hazardous emission sources. One promising area of technological development is radiation source detection using tracing mobile robot. In this paper, a novel algorithm based on GA is proposed for localization problem of such dangerous...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    ADMIT- A Five Dimensional Approach towards Standardization of Network and Computer Attack Taxonomies

    In this paper, the authors propose a five dimensional taxonomy ADMIT which captures five major classifiers to characterize the nature of attacks. These are classification by attack vector, classification by defense, classification by method, classification by impact and classification by attack target. The classification structure of proposed taxonomy described the...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    Performance Investigation of AODV, DSR and DSDV MANET Routing Protocols Using CBR and FTP Traffic

    A wireless MANET is a collection of communication nodes that wants to communicate with each other, but has no fixed infrastructure and no re-determined topology of links. Mobile ad hoc network is a collection of wireless mobile nodes dynamically forming a network topology without the use of any existing network...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    Facial Expression and Visual Speech Based Person Authentication

    Most of the person authentication system lacks perfection due to face poses and illumination variation. One more problem in person authentication is the selection of source for feature generation. In this paper, videos have been recorded with variations in poses. The videos have been taken in normal office lighting condition....

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    Reducing Execution Time of Distributed SELECT Query in Heterogeneous Distributed Database Using Genetic Algorithm

    Centralized unit that coordinates different types of schema running on multiple sites is getting importance now-a-days. Heterogeneous Distributed Database System (HDDS) is the collection of multiple different databases management systems running on multiple systems that are linked together. Query processing is complicated in such cases. In this paper, the authors...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    Mobile Position Estimation Based on Three Angles of Arrival Using an Interpolative Neural Network

    In this paper, the memorization capability of a multilayer interpolative neural network is exploited to estimate a mobile position based on three angles of arrival. The neural network is trained with ideal angles-position patterns distributed uniformly throughout the region. This approach is compared with two other analytical methods, the average-position...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    Improving Energy Efficiency of Grouping Abstraction in Cyber Physical System

    Cyber Physical System (CPS) integrates physical and cyber components for high performance, self-maintenance, self-organization, self-assembly, while the process must be dependable, safe, secure, and efficient in real-time. It supports heterogeneous devices, such as motes, PDAs, laptops, and actuators according to the applications' requirements. This paper describes an improved grouping abstraction...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    Adaptive Energy-Efficient On-Demand Distance Vector Routing Protocol for MANET

    A Mobile Ad-hoc NETwork (MANET) is a collection of wireless mobile nodes forming a temporary network without using any centralized access point, infrastructure, or centralized administration. The proposed Adaptive Energy-efficient On-demand Distance Vector routing (AEODV) Protocol for MANETs that is based on the Ad-hoc On-demand Distance Vector (AODV). The AEODV...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    Public Key Steganography

    In this paper, a new method will be introduced for hiding information in images by using a public key method for ciphering the text before hiding information as well as this public key will be used in determining the position where the information will be hidden by using the last...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    Design of New Hash Algorithm with Integration of Key Based on the Review of Standard Hash Algorithms

    Cryptographic hash functions are main building block of message integrity. These functions have many information security applications such as digital signatures, message authentication, data integrity and key derivation. This paper presents comparative study of standard hash algorithms (MD5, SHA-1 and SHA-2), their security aspects and recent attacks. In this paper,...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    Improved Intrusion Detection Technique based on Feature Reduction and Classification using Support Vector Machine and Particle of Swarm Optimization

    Reduces the file size and increase the performances of classification and intrusion detection technique used in current research trend. The reduction of file size and number of attribute used dimension reduction algorithm and optimization algorithm. The authors used genetic algorithm, ANT colony optimization and neural network. In this paper used...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    Improve Reliability and Load Balancing of using ACO Mechanism in Ad hoc Network

    Ad hoc network consist of autonomous self-organized nodes. Nodes use a wireless medium for communication. Thus two nodes can communicate directly if and only if they are within each other's transmission radius. In ad hoc networks, routing not only has to be fast and efficient, but also adaptive to the...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    Balanced Cluster Lifetime Prolonging Protocol for Wireless Sensor Network

    A wireless sensor network with a large number of tiny sensor nodes can be used as an effective tool for gathering data in diverse conditions. One of the crucial matter in wireless sensor networks is developing an energy-efficient routing protocol which has a significant impact on the overall lifetime of...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    Comparative Analysis of FBMC and OFDM Multicarrier Techniques for Wireless Communication Networks

    Multi-Carrier (MC) techniques are highly attractive for the development of modern wireless communication systems such as 4th Generation (4G) and Long Term Evolution (LTE) systems. So far, Orthogonal Frequency Division Multiplexing (OFDM) is the most popular and highly recommended modulation technique for Dynamic Spectrum Access (DSA) and Cognitive Radio (CR)...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    Anomaly Extraction and Mitigation Using Efficient-Web Miner Algorithm

    Today network security, uptime and performance of network are important and serious issues in computer network. Anomaly is deviation from normal behavior affecting network security. Anomaly extraction is identification of unusual flow from network, which is need of network operator. Anomaly extraction aims to automatically find the inconsistencies in large...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    A HMM Improved Neighbor Node Analysis Approach in Mobile Network

    Security is one of the challenging issue for mobile network because of its public access nature. Black hole is the common threat in this network that captures the communication between nodes and disturbs the communication network. In this paper, a black hole preventive routing scheme is presented. The paper as...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    An Intelligent Fuzzy Convex Hull Based Clustering Approach

    Data mining refers to the extraction of knowledge by analyzing the data from different perspectives and accumulates them to form an useful information which could help the decision makers to take appropriate decisions. Classification and clustering has been the two broad areas in data mining. As the classification is a...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    An Enhanced Multi-Agent Based Network Intrusion Detection System Using Shadow Log

    The capability of agent and its distributed problem solving nature makes it useful and powerful; such that it can be utilized in various fields. Various research has been done and currently in progress based on the utilization of the capability of the agents. Here, the authors' focus is on utilization...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    Review of Various Strategies for Gateway Discovery Mechanisms for Integrating Internet-WANET

    The communication range of devices in a Wireless Ad-hoc NETwork (WANET) is inherently limited, but it can be enhanced by interconnecting it to a wired network like the internet, thus forming a hybrid wireless network. This interconnection to improve scalability has been achieved by using gateways, which brings the biggest...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    Implementation of Ultra Low Power Gadget for Mobile Phone

    The increasing popularity of communication has ushered in concern over security-related issues. Today's Smartphone and tablet device are very costly ranging from 300 USD to 600 USD, to avoid them to get forget at any social places, the authors can have gazette which will warn the user (beep) this device...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    Investigating the Effect of Jamming Attacks on Wireless LANS

    WLANs (Wireless Local Area Networks) are the most widely used networks in homes as well as in commercial areas. WLANs suffer from various security threats. One of the most important attacks in Denial of Service (DoS) attacks is jamming attacks. As the communication in wireless networks are based on radio...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    Routing Based Congestion Control Metric: RFR

    Mobile Ad hoc NETwork (MANET) is self configurable and adaptive. Due to node mobility the authors cannot predict load on the network which leads to congestion, one of the widely researched area in MANETs. A lot of congestion control techniques and metrics have been proposed to overcome it before its...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    Build Architecture Design for an Intelligent Security System based on Behavior Tracking

    In this paper, the authors investigate architecture design for the smart environment of an intelligent video security system in an academic environment to achieve a high detection rate with a low false alarm rate for tracking human behavior in video sequences. This intelligent, real-time, and continuous monitoring system can access...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    Towards a Modeling Approach Based on Software Components

    The evolution of software engineering has resulted in a significant interest in the development of software. This interest is motivated by the reduction of development time of applications, the requirement of excellent quality, to constantly adapt to changes and be easily used in other applications. Software industry is moving towards...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    Modeling and Minimization of Cyber Attacks Through Optimization Technique

    In this paper, a well known platform Independent language is used to construct various UML models. UML stands for Unified Modeling Language and invented by the researcher. They described all the important diagrams related to static and dynamic representation of the research problem. In the daily routine work on the...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    Load Balancing in WSN Using Node Degree Ratio Based Algorithm

    A sensor network is a network with large number of sensors nodes. Each sensor node is defined with some energy parameters. The energy of every node is limited and irreplaceable. With each communication over the network some amount of energy is lost. One of network architecture defined in sensor network...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    Adaptive Keywords Extraction Using Back Propagation Neural Networks-A Review

    Keyword extraction is important for knowledge management system, information retrieval system and digital libraries and also for general browsing of the web. Keywords are generally the basis of document processing methods such as clustering and retrieval because processing all the words in the document can be slow. In this paper,...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    Improving Performance of Neighbor Discovery in MANET by Using Threshold Value and Time Out Parameter

    In Mobile Ad hoc NETwork (MANET), various protocols and known location services that are used keeps growing, it is necessary for MANET mobile nodes to identify their neighbor's position for effective and truthful communication. However, this MANET process is quite negotiable by attacking mobile node and retrieving their information of...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    Compact Multiband Antenna with Asymmetric CPW Feed with Improved Performance

    Wireless communication has evolved at astonishing rates during the last decade. Many techniques have been developed to meet the needs of multiband and multimedia handset antennas for third generation mobile systems. Some of these techniques involve planar Patch Inverted F (PIFA) Antenna, printed dipole antenna and planar monopole antenna. Among...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    A Comparative Study of Different Density Based Spatial Clustering Algorithms

    Clustering is an important descriptive model in data mining. It groups the data objects into meaningful classes or clusters such that the objects are similar to one another within the same cluster and are dissimilar to other clusters. Spatial clustering is one of the significant techniques in spatial data mining,...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    A Survey on Load Based Routing Techniques

    MANET is a collection of independent mobile nodes where any fixed infrastructure is not available for reliable and efficient communication. In this network all devices are works sender, receiver and router and data is delivered in multiple hops. This routing technique is backbone of the MANET network. Due to its...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    Application of an Evolutionary Optimization Technique to Routing in Mobile Wireless Networks

    In this paper, the authors are to consider the problem of path optimization between the sender and receiver in a dynamic mobile network. A new Adaptive algorithm based on evolutionary technique called Genetic Algorithm (AGA) has been proposed to find out the optimal path in dynamic nature problem. In this...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    Implementation of Cloud Technology for Remote Data Access for Library Management Using ARM11

    Cloud storage has been a recent topic of technology in which the most applications are being taken place because of its inherent advantages. The cloud storage could be used to optimize the places like Libraries on which this paper mainly focuses on. Library has always been an area of optimization...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    A Process to Improve the Throughput and Reduce the Delay and Packet Loss in Ad-Hoc Wireless Network

    A network is a collection of two or more computer systems which connected with each other. It is type of replace of information to communicate with one another. It is an association or set up of computer devices which are involved with the communication facilities. When number of computer is...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    Face and Hand Gesture Recognition Using Principle Component Analysis and KNN Classifier

    Gesture recognition pertains to recognizing meaningful expressions of motion by a human, involving the hands, arms, face, head, and/or body. It is of utmost importance in designing an intelligent and efficient human - computer interface. The applications of gesture recognition are manifold, ranging from sign language through medical rehabilitation to...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    A Wearable Wireless Device for Effective Human Computer Interaction

    Human computer interaction is a branch in which developer makes user friendly system. Now-a-days, many persons suffer from carpal tunnel syndrome and repetitive strain injuries due to continuous use of mouse. To avoid such serious problem of injuries and pains, a wearable wireless device is proposed in this paper. The...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    A New Approach to Semi-Blind Channel Estimation for MIMO Wireless Communication System

    A new approach to Semi-Blind Channel Estimation (SBCE) technique for Multiple Input Multiple Output (MIMO) wireless communication system is proposed. It combines the Least Square (LS) and Minimum Mean Square Error (MMSE) Training Based Channel Estimation (TBCE) scheme with whitening rotation based Orthogonal Pilot Maximum Likelihood (OPML) Semi-Blind Channel Estimation...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2014

    Managing Risks in the System Analysis and Requirements Definition Phase

    System analysis and requirements definition is a risky phase. It is susceptible to different types of risk factors from the initial preliminary investigation till the final delivery of the requirements document. Risks reside in this phase are considered the ones with the highest severity among other phases. Being the first...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Improving Credit Card Fraud Detection Using a Meta-Classification Strategy

    One of the issues facing credit card fraud detection systems is that a significant percentage of transactions labeled as fraudulent are in fact legitimate. These "False alarms" delay the detection of fraudulent transactions and can cause unnecessary concerns for customers. In this paper, over 1 million unique credit card transactions...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Towards Security Risk-Oriented Mal Activity Diagram

    Recently security has become one of the major concerns in Information System (IS) development. Different security modeling language or security extension is used to model security features of IS. Mal Activity Diagram (MAD) is used at the design stage to represent security aspect. But it cannot model all the security...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    A Session Based Spatial Domain Multiple Image Hiding Technique Using Variable Bit Replacement and Multiple Passwords

    For hiding secret information in images, there exists a large variety of Steganography techniques. The Least Significant Bit (LSB) insertion method is the most common and easiest method for embedding messages in an image in spatial domain but it has some limitations such as it is easier to understand using...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    A Novel Energy Efficient Authentic Reliable Routing Protocol (EEARRP) for Scalable Mobile Ad Hoc Networks

    This paper proposes a novel Energy Efficient Authentic Reliable Routing Protocol (EEARRP) to attain better authenticity in scalable mobile ad hoc networks. To decrease the signature verification expenditure and message communication expenditure a mechanism with message recovery is employed. The proposed authentic scheme is to minimize the size of the...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Web Information Retrieval Using WordNet

    Information retrieval (IR) is the area of study concerned with searching documents or information within documents. The user describes information needs with a query which consists of a number of words. Finding weight of a query term is useful to determine the importance of a query. Calculating term importance is...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Mobile Device Security: A Survey on Mobile Device Threats, Vulnerabilities and Their Defensive Mechanism

    Mobile communication has become a serious business tool nowadays. Mobile devices are the major platform for the users to transfer and exchange diverse data for communication. These devices are variably used for applications like banking, personal digital assistance, remote working, m-commerce, internet access, entertainment and medical usage. However people are...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    A Survey on Cloud Providers and Migration Issues

    From the most promising area of networking, the concept of using the services of cloud computing is on a great consideration nowadays. As a result it's a crucial time for corporate IT leaders to know their opportunities, innovating their creations on a higher level and utilizing their resources for new...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    A New Trust Model for Improved Identity Privacy in Cellular Networks

    Cellular networks have evolved through various generations, starting with 1G, followed by 2G and then by 3G, cellular networks have come a long way. A recent technology that has marked the beginning of 4G is Long Term Evolution (LTE). While transmission technologies, authentication mechanisms, confidentiality protection, etc., improved significantly through...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    OLMRP: Hierarchical Outflow Load-Balancing Multicast Routing Protocol for Congestion Control in Ad Hoc Networks

    This paper, proposes a new multicast routing protocol for mobile ad hoc networks that handles the congestion to improve the Quality of routing service. Part of the proposed protocol introduced a MAC layer level solution called Group Level Multicasting (GLM) that effectively handles the multicasting at one hop level mesh...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Design of Reversible Random Access Memory

    Reversible logic has become immensely popular research area and its applications have spread in various technologies for their low power consumption. In this paper, the authors proposed an efficient design of random access memory using reversible logic. In the way of designing the reversible random access memory they proposed a...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Comparison Based Performance Analysis of UDP/CBR and TCP/FTP Traffic Under AODV Routing Protocol in MANET

    The transmission of information in a MANET relies on the performance of the traffic scenario (application traffic agent and data traffic) used in a network. The traffic scenario determines the reliability and capability of information transmission, which necessitates its performance analysis. The objective of this paper is to compare the...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    The Performance as an Emergent Property of the Integration of ERP Systems in Organizations: Empirical Evidence from Two Moroccan Industries

    The interest in the impact of ERP system integration on business performance aroused a great debate which is not yet settled. Some studies emphasize a positive effect while others are based on the concept of Solow's productivity paradox and emphasize a negative effect of this investment on business performance. The...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Using Enumeration in a GA Based Intrusion Detection

    In the last few years there has been a tremendous increase in connectivity between systems which has brought about limitless possibilities and opportunities. Unfortunately security related problems have also increased at the same rate. Computer systems are becoming increasingly vulnerable to attacks. These attacks or intrusions based on flaws in...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Mobile Adhoc Network Under the Adaptive TCP Variants Techniques for Maximization of Throughput

    It is an ad-hoc network which is set up by wireless mobile computers (or nodes) which moves randomly in the places that have no network infrastructure or hard to reach location. Since the nodes communicate with each other to gather network information. They cooperate by forwarding data packets to other...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Towards Setting up IBM Cloud Computing VCL at Abdelmalek Essaadi University

    The need for adopting Cloud Computing in Morocco and the experience ongoing of VCL implementation at Abdelmalek Essaadi University are described in this paper. Students, Faculty and administrative staff can take great benefits from on-demand, flexible and real time services, provided by the IBM Cloud Computing initiative VCL. The installation...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    An Encryption Algorithm for End-to-End Secure Data Transmission in MANET

    Encryption is of prime importance when confidential data is transmitted over wireless network. Numerous encryption algorithms like AES, DES, RC4 and others are available for the same. The most widely accepted algorithm is AES algorithm. The authors have proposed a new algorithm based on the concept used by Rijmen and...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Design and Implementation of Radio Link Control as a Part of the WCDMA Radio Interface Protocols by Using SDL

    The Universal Mobile Telecommunication System (UMTS) is the most powerful technology in the Third Generation (3G) mobile communication and it is the base for the 4G technology. The Wide band Code Division Multiple Accessing (WCDMA) is the radio access technique for the UMTS system. The Radio Link Control (RLC) Protocol...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Broadcast ID Based Detection and Correction of Black Hole in MANETs

    A wireless ad-hoc network is a collection of mobile nodes with no pre-established infrastructure, forming a temporary network. In the absence of a fixed infrastructure, nodes have to cooperate in order to provide the necessary network functionality. One of the principal routing protocols used in Ad hoc networks is AODV...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    An Advanced Door Lock Security System Using Palmtop Recognition System

    Biometric technology is used to identify a person based on his/her physical behavioral characteristics. One of the extensive uses of biometric technology is a fingerprint recognition system. The technology has broad use mainly for its easiness, reliability and accuracy in human identification process. This presents work done on minutiae based...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Data Communication in Mobile Wireless Sensor Networks

    A Mobile Wireless Sensor Network (M-WSN) derives its name by considering either mobile sink or mobile sensor nodes within the Wireless Sensor Network (WSN). As the sensor nodes are energy constrained, energy efficiency is the main aspect to be considered in any applications. By considering mobile sensor nodes in WSN,...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Design and Performance Evaluation of an Optimized Disk Scheduling Algorithm (ODSA)

    Management of disk scheduling is a very important aspect of operating system. Performance of the disk scheduling completely depends on how efficient is the scheduling algorithm to allocate services to the request in a better manner. Many algorithms (FIFO, SSTF, SCAN, C-SCAN, LOOK, etc.) are developed in the recent years...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    DDoS Attacks Impact on Network Traffic and Its Detection Approach

    A Denial of Service (DoS) attack is a malicious effort to keep endorsed users of a website or web service from accessing it, or limiting their ability to do so. A Distributed Denial of Service (DDoS) attack is a type of DoS attack in which many computers are used to...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Security Concerns of Object Oriented Software Architectures

    Testing and measuring the security of software system architectures is a difficult task. An attempt is made in this paper to analyze the issues of architecture security of object-oriented software's using common security concepts to evaluate the security of a system under design. Object oriented systems are based on various...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Bit Error Rate Evaluation of IEEE 802.16 (WiMAX) in OFDM System

    This paper investigates several modulation techniques for IEEE 802.16 (WiMAX) based OFDM system including BPSK, QPSK, 8PSK and various levels of QAMs. The system performance is gained by dynamically choosing the modulation technique based on the channel conditions. The performance of OFDM system is accessed by using computer simulations performed...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Effect of Tiling in Row Mean of Column Transformed Image as Feature Vector for Iris Recognition with Cosine, Hadamard, Fourier and Sine Transforms

    Iris recognition is a biometric authentication method that uses pattern-recognition techniques based on high-resolution images of the irises of an individual's eyes. Iris recognition has been a fast growing, challenging and interesting area in real-time applications. A large number of iris recognition algorithms have been developed for decades. This paper...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Soft Computing Particle Swarm Optimization Based Approach for Class Responsibility Assignment Problem

    Soft computing approach like swarm optimization can be used in the software development environment also for developing effective software. Software development and testing cost must be reduced and optimized so that companies can survive and sustain in the market. Object oriented analysis and design is used for developing complex real...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Architecting Distributed Domain Reducer in Cloud Environment

    Clouds computing is a recent technology used to represent a different way to architect and remotely manage computing resources; it is sharing resources/information as-a - service using internet. It describes both a platform and type of application. A Cloud computing platform dynamically provisions configures, reconfigures and de-provision servers as needed....

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Modified Fast Recovery Algorithm for Performance Enhancement of TCP-NewReno

    One of the keys to the success of the Internet is relying on using efficient congestion control mechanisms. Congestion control is required not only to prevent congestion collapse in the network, but also to improve network utilization. Without congestion control, a sending node may continue transmitting packets that may be...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Intelligent Traffic Light System to Prioritized Emergency Purpose Vehicles Based on Wireless Sensor Network

    The use of Wireless Sensor Network (WSN) has proved to be a very beneficial in the design of adaptive and dynamic traffic light intersection system that will minimize the waiting time of vehicles and also manage the traffic load at the intersection adaptively. In this paper, the authors propose an...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Generating All Navigational Test Cases Using Cyclomatic Complexity From Design Documents for Mobile Application

    This is new mobile world; lots for even the simplest mobile application there can be many Navigational Paths. The challenge at Design phase is to identify all possible paths, generate code and validations for each one of them. Generating all possible test paths and test cases are difficult to achieve...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    BAIDS: Detection of Blackhole Attack in MANET by Specialized Mobile Agent

    The inbuilt flexibility along with easy set-up and low maintenance cost causes MANETs to be increasingly useful in catastrophe management, battlefield surveillance; etc. The infrastructure-less performance of MANET has made it more vulnerable to intrusion than ever before making the security of network all the more acute. As the previously...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Computer Mouse Using Eye Tracking System Based on Houghman Circle Detection Algorithm with Grid Analysis

    Large numbers of input devices are available for human interaction with modern computer systems which are operated by hands and a few of them through gestures made using fingers and body movements. The advancements in assistive technology have proposed many concepts for controlling the input and mouse movements by detecting...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Retrial Queuing System with Starting Failure, Single Vacation and Orbital Search

    This paper is concerned with the analysis of a single server retrial queue with vacation and orbital search. The server is subject to starting failure and repair. At the completion epoch of each service, the server may take a single vacation. After vacation completion, the server searches for the customers...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    A Dual Fuzzy Entropy Model for QoS Routing in MANET

    Congestion leads to bandwidth degradation and, packet losses thereby causing retransmissions and higher energy drain rate by the nodes in Mobile Ad-hoc NETworks (MANET). So providing Quality of Service (QoS) and reducing congestion levels are some of the major issues to be addressed in these networks. However, use of appropriate...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    A New Weighted Graph-Based Partitioning Algorithm for Decentralized Nonlinear Model Predictive Control of Large-Scale Systems

    This paper proposes a grouping algorithm for partitioning large-scale nonlinear dynamical systems based on graph theory. The algorithm incorporates a novel scheme to quantify the strengths of graph edges, representing the degree of couplings among the system variables via sensitivity functions. This leads to a weighted graph topology with different...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    A Soft Computing Based Adaptive Call Admission Control Scheme for Bi-Class Traffic in CDMA Cellular Network

    Soft handoff in CDMA cellular system increases system capacity as compared to hard handoff as interference is reduced by transmitting signals as lower power level. A CDMA cellular system involving voice and data calls is considered in this paper. The model proposed in this paper is for data and voice...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Numerical Modelling of Concrete Tensile Strength Test by Wrapping Scripting Language with Compiled Library

    The importance of engineering simulation is increasing day by day with the increase of computing power. The finite element analysis method is one of the widely used approaches for this purpose. To achieve optimum simulation, there is no alternative to take complete control over the code which proprietary commercial codes...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    A Comparative Study of Routing Protocols in E-Health Applications for Heterogeneous Interfaced Mobile Ad-Hoc Grid

    Mobile computing has become an indispensable way of life in recent years. Recent advancement in Mobile phones and other handheld devices have enabled them of using various types of networks, which were meant for computers only. The integration of such devices into heterogeneous grids has emerged new research challenges. Different...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    An Efficient Fuzzy Based Congestion Control Technique for Wireless Sensor Networks

    In Wireless Sensor Networks (WSN), congestion causes overall channel quality to degrade and loss rates to increase, leads to buffer drops and increased delays, and tends to be grossly unfair toward nodes whose data has to traverse a larger number of radio hops. In order to control the congestion in...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Prediction of Course Selection by Student Using Combination of Data Mining Algorithms in E-learning

    Course recommender system aims at predicting the best combination of courses selected by students. Here in this paper, the authors present how the combination of clustering algorithm-Simple K-means Algorithm & association rule algorithm-Apriori Association Rule is useful in Course Recommender system. If they use only the Apriori association rule algorithm...

    Provided By International Journal of Computer Applications