International Journal of Computer Applications

Displaying 201-240 of 6558 results

  • White Papers // Jan 2015

    A Modified AODV Routing Protocol to Avoid Black Hole Attack in MANETs

    Mobile Ad-hoc NETworks (MANETs) are composed of a set of stations (nodes) communicating through wireless channels, without any fixed backbone support in which nodes are allowed to join and leave the network at any point of time. MANETs are generally more vulnerable to information and physical security threats than wired...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Routing Approaches for Wireless Sensor Network

    A WSN consists of a large number of sensor nodes typically hundreds or thousands. Each sensor node comprises of different components which work together to act like sensor and can sense for some particular application. In this paper, the authors describe the approaches for routing in Wireless Sensor Networks (WSNs)....

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Improving Mobile Money Security with Two-Factor Authentication

    Security is a leading factor for establishing and maintaining customer trust in Mobile Money Services (MMSs). MMSs in Tanzania rely on the use of Personal Identification Number (PIN) as an authentication method. However, a PIN can be easily guessed, forged or misused. This paper explores security challenges in MMSs and...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Low-Cost IP Camera for Traffic Monitoring

    In this paper, the authors present the research conducted to provide low cost traffic monitoring solution to the ever increasing traffic congestion problems. The embedded system created is a low-power system that can replace the expensive and complicated systems that add up to the high installation and controlling costs. The...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Performance and Evolution of Routing Protocol DSR, AODV and AOMDV in MANET

    A Mobile Ad-hoc NETwork (MANET) is a collection of various number of mobile nodes connected through wireless links forming a temporary network without any type of fixed topology, centralized access point and infrastructure. A variety of routing protocols have been proposed and several have been extensively simulated. In this paper,...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Global Positioning System for Object Tracking

    Global Positioning System (GPS) is globally used for the tracking and navigation purpose. GPS is mainly used in the military, farming, civil, transportation and commercial users around the world. Here in this paper, the authors describe how GPS Tracking System works and where it is useful in real world environment....

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Development of a Hybrid Prediction Mechanism Using SMA and EXS Methods for GSM Logical Channel Load Variables

    In a GSM system, the physical channels carry different messages, depending on the information that is to be sent. These messages are carried via channels called logical channels (traffic and control). The logical channels loading impact on the network due to the nature of its variability. The GSM logical channel...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    The Sway of Agile Processes Over Software Maintainability

    Software engineering is escalating in different dimensions at precipitous speed and coercing the developers and researchers to find new ways for easy and swift software development. The induction of agile methodologies is one such step towards achieving these goals. Today the agile processes and techniques are very extensively accepted and...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    A Survey: Deduplication Ontologies

    Cloud computing drive out the need of IT based companies to invest in high computing infrastructure and services used by them. In cloud, the data is dwell into set of networked resources that enable data to be accessed via virtual machines. These data centers are located in various parts of...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Implementation of Reversible Logic Gate in Quantum Dot Cellular Automata

    Quantum dot Cellular Automata (QCA) is a nanotechnology with many attractive features such as higher speed, smaller size, higher switching frequency, higher scale integration and low power consumption. There are many researchers have been reported on the design of reversible logic gates compared to the reversible TR. This paper proposes...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Zonal Based Deterministic Energy Efficient Clustering Protocol for WSNs

    Wireless Sensor Network (WSN) has gained a tremendous attention of researchers due to its vast applications. Wireless sensor network consists of small size and low powered smart sensor nodes deployed in the region to be monitored. Sensor nodes sense the data and send the sensed data to sink directly or...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Topology Control with Radio Interference Detection in Wireless Sensor Network

    Wireless sensor network is a collection of small nodes with sensing environment that will make communication between nodes. Collision free communication in wireless network is performed by medium access control. Energy conservation is important in wireless sensor network that will be performed by topology control. Topology control will route the...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Survey on Routing Protocols

    Recent advances in Wireless Sensor Networks (WSNs) over the last two decades has an more interest in the potential use in applications like combat field, security surveillance, border protection, disaster management. Moreover, researchers have termed the 21st century as the \"Sensor decade\" sensor nodes are remotely deployed in large numbers...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Energy Conservation MAC Protocols with Low Duty Cycling for WSN: A Review

    The energy constraints in the wireless sensor network are under too much consideration. Since WSN is based on relay system and therefore each node participate in complete communication process either as a source, forwarding nodes or as a receiver. This paper presents critical reviews on recent development in various MAC...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Artificial Neural Network Based Electrocardiogram Classification for Biometric Authentication

    In this paper, Multi-Layer Perceptron (MLP) neural network model is used for the classification of ElectroCardioGram (ECG) signals. Out of twelve leads recorded lead II, single lead, is used for analysis. ECG samples from eight normal individuals are recorded regularly almost every month for thirty six months. Input to the...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    An Efficient Keystream for Cryptographic Applications

    The development of stream ciphers has been an effective protection tool for information security. The reliable data protection from the cryptographic point of view imposes the use of highly productive, generators of cryptographic keys in combination with sophisticated traditional algorithms. Now-a-days the use of stream ciphers is very important in...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    SMEH: Stochastic Method of Energy Harvesting for Powering Up Mobile Phones

    The area of energy harvesting has seen various evolutions among the research community. Although various studies have been attempted to address the issues of energy harvesting in the past decade, but very few studies are focused on using RF energy from mobile phones explicitly. Hence, the prime motive of the...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Review of Nature Inspired Algorithms

    In the recent years, lots of researches have researched many algorithms so as to improve performance of the wireless sensor network for to save energy as well as network life time. A mobile ad hoc network MANET is a collection of mobile users node that communicate over wireless links. Research...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Analysis of Jellyfish Reorder Attack on ZRP

    MANETs are more susceptible to attacks than a wired network. High mobility, lack of central administration, etc. are some of the main causes. One of the DoS attacks known as Jellyfish attack is difficult to analyze as well as to detect in MANETs as Jellyfisher nodes follow all the protocol...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    A Review on Workload Prediction of Cloud Services

    In cloud computing user pay only for the amount of services used. There are number of cloud service providers which can be selected on the basis of application needs. The models available for workload prediction of cloud environment till date are analytical or mathematical. The steps involved in capacity planning...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Analysis of Non Simultaneous Sybil Attack on DSR

    Security is one of the most challenging issues in Mobile Ad-hoc NETworks (MANETs). Most of the routing protocols in MANETs do not have an inbuilt mechanism to fight security attacks. Sybil attack is one such attack in which a single physical device takes on multiple identities in network thus behaving...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Software Quality Assurance in Internet of Things

    Internet of Things (IoT) is increasing the connectedness of things and people on a scale that were not imaginable before. The pace of adoption of IoT in market is increasing due to ubiquitous computing and increase in the connectedness of machines and people. But very few parameters exist to check...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Radix Priority Search Tree in Circular Range Searching for GIS

    In this paper, the authors present a method for circular range searching in 2D geographical data for GIS. The proposed is based on the Priority Search Tree (PST) developed by the researcher. McCreight in the mid eighties. The Priority Search Tree is a data structure used for performing semi-infinite range...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    A Review of Techniques Used in EPS and 4G-LTE in Mobility Schemes

    With the extensive proliferation of mobile applications and Smartphone's, there is an increasing trend of technical adoption of 3G (Third Generation). But, with the exponential growing of massive traffic, it is seen that even 3G network is completely not capable of catering to the dynamic needs of the customers. This...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    A Survey on: Secure Data Deduplication on Hybrid Cloud Storage Architecture

    Data deduplication is one of the most important Data compression techniques used for to removing the duplicate copies of repeating data and it is widely used in the cloud storage for the purpose of reduce the storage space and save bandwidth. To keep the confidentiality of sensitive data while supporting...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    A Review on Techniques of Resource Allocation in Cloud Computing

    Cloud computing is the new era of technology; it uses virtualization and automation to provide user with self-service computing products that provide infinite scale at low cost. It serves user in many ways such as Infrastructure-as-a-Service (IaaS), Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS) etc. While serving as an IaaS it is inevitable...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Review on Scheduling of Resources in Cloud Environment

    Cloud computing provides an environment, where a large pool of systems are connected in networks (i.e., private or public), to provide dynamically scalable infrastructure for storage of application, data and file. Resource allocation is a way to assign resources to the needed applications. Cloud service providers use lease manager for...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    A New Tactic to Maintain Privacy and Safety of Imagery Information

    Privacy as well as security is a burning issue to all the users in the field of Information Technology. With the perspective of socio, psychological, organizational, technical, economic and financial ground it is one of the most vital issues in the people every day's life. Presently; security is a prime...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Comparative Analysis of MSER and DTW for Offline Signature Recognition

    In this paper, the authors describe the signature as a one of the most robust and widely used trait in biometric verification. The signature is also known as behavioral biometric property. They present comparative analysis of offline signature recognition based on Dynamic Time Warping (DTW) and Maximally Stable Extremely Regions...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Intelligent Cluster Routing: An Energy Efficient Approach for Routing in Wireless Sensor Networks

    In recent years development and refinement in energy-efficient design and wireless technologies had made possible the development of new applications for wireless devices. These applications include remote monitoring using micro-sensors in networks and networking of everyday use home appliances. In this paper, the authors describe the approaches for routing in...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Rough Set Approach for the Classification of Advertisement in the Development of Business Establishment

    In the current age business establishments are basically depends upon advertisement to attain success. In this paper, the authors consider different forms of advertisements then using rough set concept, they find the best possible forms of advertisement. To develop this concept they consider 1000 samples initially and applying correlation techniques...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Evaluating the Research Trends and Techniques for Addressing Wormhole Attack in MANET

    Security issues in Mobile Ad-hoc NETwork (MANET) are veiled by various techniques that were introduced in past decade. Owing to decentralized nature of MANET, the security issues cultivates resulting in welcoming various lethal vulnerabilities. Out of all security issues in MANET, wormhole attack is considered one of the most challenging...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Semantic Cluster Based Classification for Data Leakage Detection for the Cloud Security

    A novel approach for the data leak detection in the cloud environment is discussed in this paper. The paper uses the semantic based clustering for the anomaly detection to find the data leak. The clustering is further used for the classification to add up for the semi supervised classification. After...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Implementation of High Performance DUC and DDC for Software Defined Radio Applications

    Digital up converters are used at the transmitter side to up convert the baseband signal to intermediate frequency signal. Digital down converters are used at receiver side to down convert intermediate frequency signal to baseband signal. DUC and DDU modules are designed using System generator Xilinx block set and generated...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Network Management by Tackling Replication Attacks: A Comparative Study

    Network is an interaction or engaging in formal or informal communication among systems to exchange information by mutual assistance or support. The sharing of resources helps the users on the network to communicate with each other. Node in a wireless sensor network that is capable of performance handling, gathering information...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    A Survey on Various Cryptographic Algorithms for Security Enhancement

    Cloud systems can be used to enable data sharing capabilities and this is an abundant benefit to the user. As cloud computing is a modern era computing technique that has a grater future and bringing a lot of benefit to the information technology. There are some security requirements when dealing...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    An AES - Based Robust Image Encryption Scheme

    The security of digital information has become a major issue during the last three decades. Encryption is one of the ways to ensure confidentiality for the digital data. Protection of multimedia data is now becoming a big challenge to create a healthy digital world. A large number of algorithms for...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    An Approach to Develop Fast and Efficient Routing for In-Network Aggregation

    Huge scale thick remote Wireless Sensor Networks (WSNs) will be progressively sent in distinctive classes of uses for precise checking. Because of the high thickness of hubs in these networks, it is likely that excess information will be caught by adjacent hubs when sensing an occasion. Since vitality preservation is...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Overview of Relay Selection and Dynamic Resource Allocation for Cooperative Wireless Network

    In the past decades, increasing demand for wireless multimedia and interactive Internet services, along with rapid proliferation of a multitude of communications and computational gadgets, are fuelling intensive research efforts on the design of novel wireless communication systems architectures for high speed, reliable and cost effective transmission solutions. Cooperative relay...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Secure System Framework for Secure Visual Cryptography

    A Visual Cryptography Scheme (VCS) is a secret sharing of secret image shares which involves dividing the secret image into number of shares and a certain number of shares are sent over the network. The decryption process involves stacking of the shares to get the secret image. The main advantage...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Modified Spray Phase to Improve Performance of Binary Spray and Wait Routing Protocol in Delay Tolerant Network

    Delay or Disruption Tolerant Networks (DTN) are a type of wireless network where at the time of message transmission, there may not exist end to end path between source and destination. Node connections in DTN are very intermittent due to sparse node density and mobility. DTNs make use of \"Store...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    A Study of Recommender Systems on Social Networks and Content-based Web Systems

    Everybody rely on recommendations in everyday life from other people either orally or by reviews printed in newspapers or websites. Recommender systems are a subfamily of information filtering systems that explore to predict the 'Rating' or 'Preference' that user would give to an item. These systems are best known for...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    RS-MONA: Reliable and Scalable Secure Method to Store and Share Secrete Data for Groups in Cloud

    In this paper, the authors present various issues related to privacy and security while storing user's data on untrusted cloud. In today's world sharing of group resource among the cloud users is a major problem. There is a lot of research being made to find out the issues with these...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    An Efficient Gateway Election Algorithm for Clusters in MANET

    The dynamic nature of mobile ad hoc network brought several constraints like scalability, robust connectivity, limited power constraints etc. Several cluster based routing algorithms have been proposed for large scale ad hoc networks. In cluster-based routing, the network is logically divided into groups called clusters. This grouping is to sustain...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Comparative Study on Exterior RCC Beam Column Joint Subjected to Monotonic Loading

    Computer simulation offers the potential for improved understanding of the local and global mechanisms that determine the response of structures to severe loading. The research presented here focuses on development of a finite element model using ABAQUS software to be used in investigating the behavior of reinforced concrete exterior beam-column...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Comparative Study of Various Next Generation Network-Business Process Frameworks

    The growth in telecommunication industry in technology, forced the necessity to shape up the existing business models. A business process can be defined as a flow of business activities. The paper discusses the impact of different process frameworks along the various key parameters that synthesizes views from areas such as...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Operating Systems: Basic Concepts and Challenges Against Virtualization

    Operating Systems (OS) act as fundamentals to the basic computer systems in today's world. An OS is the communication between the software the user use and the hardware that lies underneath. Every electronic signal talks with their operating system to understand the work it has to do or the way...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Dependency Mapper Based Efficient Job Scheduling and Load Balancing in Green Clouds

    Cloud computing is usually recognized as a technology which has significant impact on IT. However, cloud computing still has many crucial problems. In a cloud computing system, load balancing is the most central issue in the system i.e. to distribute the load in an efficient manner. It plays a very...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    An Analytical Model for IEEE 802.15.4/ ZigBee Wireless Sensor Networks with Duty Cycle Mechanism for Performance Prediction and Configuration of MAC Parameters to Achieve QoS and Energy Efficiency

    The IEEE 802.15.4 standard defines a PHYsical (PHY) and Medium Access Control (MAC) layer protocol for low data rate wireless network with low power requirement which makes it ideal PHY/MAC for WSNs. Currently WSNs with combination of IEEE 802.15.4 and ZigBee are being used extensively in industrial applications such as...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Clustering Multi-Attribute Uncertain Data Using Probability Distribution

    Clustering is an unsupervised classification technique for grouping set of abstract objects into classes of similar objects. Clustering uncertain data is one of the essential tasks in mining uncertain data. Uncertain data is typically found in the area of sensor networks, weather data, customer rating data etc. The earlier methods...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    P2P Social Network with Dynamic Identity-Based Broadcast Encryption Using Rolls

    Social Network Service (SNS) market is stretch over worldwide, and then there are many security threats by attackers. In addition because sensitive data is concentrated on the central server, privacy can be exposed to SNS provider as well as malicious users. In this paper, the authors suggest the rolls scheme...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    ICORMAN: Extended Version of CORMAN Using Efficient Channel Reuse Method

    Mobile Ad-hoc NETworks (MANETs) are wireless networks in which all nodes are moving freely in the network; also they can leave or enter into the network at any time. The nodes in these types of networks are communicating on-the-move without any base stations. Due to this mobility, inter-node connectivity may...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    A Review of Elliptic Curve Based Signcryption Schemes

    Signcryption is a new cryptographic approach which provides authentication and encryption simultaneously in a single logical step. The aim is to reduce the cost of signature-then-encryption approach. This cost includes computational cost and communication cost. Furthermore, some signcryption schemes are based on RSA while some are based on elliptic curve....

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Development of Multimodal Biometric Framework for Smartphone Authentication System

    Secret knowledge, like remembering password or token based authentication systems are deemed inconvenience and difficult to use for users such as password may be forgotten or token may be lost. So burdens like remembering password and stolen or forged token based authentication have raised a current trend of biometric authentication...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Design of 4G Antenna for Mobile Handset

    Mobile communication is one of the hottest current areas and is developing extremely fast in present times also led to the advancement of antenna systems in the recent decade. A compact multiband planar antenna is designed for mobile phone applications in this paper. A planar monopole antenna into distributed radiating...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Spectrum Sensing Technique Based on CAF and 3rd Order Cumulant for Cognitive Radio

    Cognitive radio system provide the user a solution for spectrum congestion problem, but the effectiveness of the system is only depends on the technique used for spectrum sensing, that how effectively the detection is performing at very low SNR. In this paper, the authors proposed a technique of spectrum sensing...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    A Method for the Selection of Software Testing Automation Framework Using Analytic Hierarchy Process

    Software Test Automation Framework (STAF) is a set of concepts, assumptions or practices that provide support for automated software testing. STAF includes the following for capturing and controlling the test activity, i.e., test objects, library files and reusable scripts etc. In this paper, the authors have identified different types of...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Supervisory Control and Data Acquisition

    Since the advent of control systems, Supervisory Control and Data Acquisition (SCADA) have played an important role in the field of automation. SCADA systems offer a means of controlling remotely located devices in an industrial process. Supervisory control can be combined with data acquisition wherein the data is obtained from...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Building an Object Cloud Storage Service System using OpenStack Swift

    Cloud storage systems are increasingly noticed now-a-days as they are promising elastic capability and high reliability at low cost. In these services, the files are stored in an authenticated cloud storage service center. The most important feature is storage is adjusted dynamically, and there won't be any worry about space...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    A Novel Approach of Designing Cryptographic Algorithm with High Confidentiality

    Today's in modern world security is the main issue while communication. Internet is main source for communication but also it is not as much secure as it assume. For secure transmission of data many algorithms have been developed. Steganography and encryption/decryption algorithms are used for confidentiality. Some times to improve...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Generate Optimized GUI Test Sequence Using GA and Fuzzy Logic

    A software system is composed of multiple modules. These modules and procedures are integrated via some user friendly environment such as graphical interface. End user is very much interested in the effective working of this graphical interface. To satisfy the user in terms of available graphical options, it is required...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Implementation of Model-View-Controller Architecture Pattern for Business Intelligence Architecture

    In this paper, the authors present a new approach to develop the strategy of model-view-controller architecture pattern in Business Intelligence (BI) architecture. The Business Intelligence (BI) architecture consists of the ETL tools and processes, the data warehouse, the technical infrastructure, and the user-interface tools. The major issue related to Business...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Study on Influence of Cognitive Load for Software Developer's Performance Using BPNN Algorithm

    The development process involved developers contribution based the user cognitive thinking in the real time process. The developer's performance is dynamic as per their cognitive load. The cognitive load is un-deterministic as well hidden and integrated in the developer's process. This paper attempt to identify software developer cognitive measure which...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Analysis and Design of Multi Share Secret Message Sharing using Visual Cryptography

    Visual cryptography is a special encryption technique to hide information in images in such a way that it can be decrypted by the human visual system. It is secret sharing scheme which uses images distributed as shares such that, when the shares are superimposed, the original image is revealed. In...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    A Security Measure for Electronic Business Applications

    With the growth of business over the internet, there is more scope of security vulnerabilities over the internet. Despite of many efforts to make internet safe to the users, there is still a possibility for threats. The client, as well as the merchant for the electronic business, always faces problems...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    A Security Framework for E-Business Applications

    During the electronic business, the clients and the merchants make use of the internet. Thus, the authors can say that the internet, the client, and the merchant are the components for the electronic business. The electronic business involves various categories of businesses. These various types of e-businesses have different types...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Acknowledgment Time Delay Approach to Optimize TCP Performance in Hybrid Networked Systems

    Transmission Control Protocol (TCP) is connection oriented transport protocol used on IP in wireless medium and it insists lossless data transmission in proper order. When TCP is used as a transmission protocol where physical layer is wireless medium, results high packet reordering due to bursty traffic and drastic variation in...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Enhanced CSMA/CA Contention Window for Efficient Random Access in IEEE 802.15.6

    The IEEE 802.15.6 is a new communication standard on Wireless Body Area Network (WBAN) for short-range, wireless communications in the vicinity of, or inside a human body. It is used for medical and non-medical applications. The IEEE 802.15.6 defines a Medium Access Control (MAC) layer compatible with several PHYsical layers...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Survey of Integrity Verification in Multi-Cloud Storage by Efficient Cooperative Provable Data Possession

    Provable Data Possession (PDP) is one of the techniques to ensure the integrity of data in storage outsourcing. Here in this paper, the authors speak to the creation of an efficient PDP method for distributed cloud storage to maintain the scalability of service and data migration. On the basis on...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    An Elliptical Routing Protocol for Wireless Mesh Networks: Performance Analysis

    Wireless Mesh Networks (WMN) is one of the implemented types of MANETs. WMN is wireless network, in which each node can communicate directly with one or other peer nodes. In generally, MANET routing protocols are used in WMN, it arises performance issues. In this paper, the authors propose a new...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Adhoc On-Demand Distance Vector - Energy Efficient Approach

    As nodes of Mobile Ad hoc NETwork (MANET) are mobile in nature, overall network lifetime is one of the key challenges in MANET. To improve overall network lifetime along with packet delivery fraction and normalized routing load, this paper proposed an Optimized Multi-hop Routing Ad hoc On-demand Distance Vector protocol...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    A Novel Feature Based Unified Node Data Analysis (FBU-NDA) Based IDS Using AODV in MANET

    MANET is a type of wireless network, which works on radio frequencies and holds short range communication. As it is temporary in nature and is having movable devices for communication which makes such network as infrastructure less. In such network variable conditions of routing will face several issues which degrade...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Optimized Conditional Privacy Preservation Protocol for NFC Applications Using Genetic Algorithm

    In the recent years, the NFC with the combination of smart devices has widened the utilization range of NFC. It is said it will replace the credit card in electronic payment so security is one of the area that is to be checked. Currently the NFC security requires user's public...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Optimal Software Release Time Policy using Goal Programming

    In this paper, the impact of software testing effort and the efficiency on the modeling of software reliability for optimizing the cost in case of release time policy has been discussed. Another important problem in the software development process is to determine when to stop testing and release the software....

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Detection Mechanism for Distributed Denial of Service (DDoS) Attack in Mobile Ad-hoc Networks

    Mobile ad hoc networks are non-static networks which formed without any central point communication infrastructure. In addition to node mobility, a ad-hoc is defined by bounded resource constraints such as bandwidth, battery power, and storage space. In this network, the intermediate nodes play role of router which routed the packets...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Cooperative Communication Simulation Using TCP

    Demand for wireless communication has increased rapidly. Almost everywhere there is a wireless device (phones, laptops, etc.) that need to communicate with other mobile devices in their region or to connect to an internet access point, and they need to exchange data especially via internet. As a result, the need...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    An Efficient Approach for Event based Clustering for Wireless Sensor Network

    The Wireless Sensor Networks (WSNs) is one of the highly adopted field of research in recent years of scientific world. A WSN consists of sensors also known as motes which are distributed over a geographical area to monitor physical or environmental conditions and to transfer their sensed data cooperatively through...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Low Probability Cluster Head Selection Energy Efficient Routing in MANET Using DEEC

    Mobile Ad-hoc NETwork (MANET) is the prominent area of research to make wireless networking more robust and reliable for packet delivery among nodes of a small or big network through wireless channel. The routing protocols are also designed to keep in mind that the energy consumption of wireless nodes should...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    A Cooperative Strategy for Collision Detection and Prevention for Unmanned Ground Vehicles in Military Applications Using WSN Based VANET

    In the recent years, Vehicular Ad hoc NETworks (VENETs) have gained tremendous attention of researchers due to various services they provide and likely to be deployed commercially in coming years. VANET enables vehicles to communicate with each other to avoid any critical situation such as vehicle collision, unseen obstacles etc....

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Requirement Risk Identification: A Practitioner's Approach

    Software project development has always been associated with high failure rate. The failure of a software project depends on rooted risks. These risks don't come into face at early stages of requirement gathering and analysis which carried on in the further phases of development greatly affects the cost of a...

    Provided By International Journal of Computer Applications