International Journal of Computer Applications

Displaying 2881-2920 of 5728 results

  • White Papers // Feb 2013

    Selfish Less Replica Allocation in MANET

    Most of the protocols and algorithms used in MANET, are assuming that all mobile nodes cooperate fully with the functionalities of the network. But some nodes are cooperate partially or not at all cooperating. Network performance and data accessibility, accessing time, query delay are affected by these selfish nodes. The...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2013

    A Novel Quad-band Printed Antenna Design Using a Multi-Slotted Patch for Cellular Communication

    In this paper, the authors propose a quad band patch antenna for mobile communication. The design requirements are to meet the 0.9 GHz, 1.8 GHz, 2.1 GHz and 2.45 GHz bands. The proposed antenna consists of a rectangular patch monopole printed antenna in which slotting technique is used to achieve...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2013

    Bit-Stuffing in 802.11 Beacon Frame: Embedding Non-Standard Custom Information

    In an infrastructure Basic Service Set (BSS) beacon frames are transmitted periodically by the Access Point (AP) and announce the presence of a wireless network. It mainly consists of network specific information and thus one of its main purposes is the "Advertisement" of this information. Based on this information mobile...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2013

    Web Crawler: A Review

    Information Retrieval deals with searching and retrieving information within the documents and it also searches the online databases and internet. Web crawler is defined as a program or software which traverses the Web and downloads web documents in a methodical, automated manner. Based on the type of knowledge, web crawler...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2013

    Efficient Distance Based Q-CSMA/CA Algorithms Wireless Multi Hop Networks

    Carrier sense multiple access type algorithms results the maximum possible throughput in ad hoc networks. Even though the algorithm shows poor results in the delay performance also it shows some heuristic scheduling in the delay performance for the larger arrival rates. To overcome all these drawbacks the authors propose a...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2013

    Resource Consumption Framework for Fault Diagnosis in Cloud

    In the heterogeneous parallel and distributed computing environments like cloud there were many related approaches proposed for fault tolerant execution of workflows. Most of the earlier works involved does not depend on failure prediction of the resources that is really hard to achieve with the tracing of historic failure data...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2013

    Clustering for High Dimensional Data: Density Based Subspace Clustering Algorithms

    Finding clusters in high dimensional data is a challenging task as the high dimensional data comprises hundreds of attributes. Subspace clustering is an evolving methodology which, instead of finding clusters in the entire feature space, it aims at finding clusters in various overlapping or non-overlapping subspaces of the high dimensional...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2013

    Bufferfloat Mitigation for Real-time Video Streaming Using Adaptive Controlled Delay Mechanism

    Bufferbloat is an abnormal phenomenon in current Internet experience where large buffers cause high end-to-end latency and jitter, as well as throughput degradation. The universally applied thumb rule is used to allocate buffers at the nodes, based on the assumption that large size buffers reduce packet loss. Window scaling mechanism...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2013

    Optimal Load and Mobility Aware MAC Protocol for Wireless Sensor Networks

    In mobile environment of Wireless Sensor Networks (WSN), the fixed frame of MAC protocol causes performance degradation such as packet collision due to overloading etc. In this paper an optimal load and mobility aware MAC protocol for WSN is proposed. Each node measures the Received Signal Strength (RSS) from the...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2013

    A Fast Construction of Intrusion Relieved Communication Path Based on Trust Level and Heuristic Search

    An Ad hoc network is subjected to many malicious activities and security threatens because of its wide distribution and heterogeneous nature. Intrusion is one among such activities that comprise confidentiality, integrity or availability of resources. Numerous efforts have been made in the literature to detect intrusion in an Ad hoc...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2013

    Image Hash Using Neural Networks

    Hash functions have been used to generate hash codes for data authentication. Traditionally these functions are generated using byte oriented algorithms like MD5 and others. In this paper, the authors propose a new method of generating hash code for images using neural networks. Three sample images namely, fingerprint, lena and...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2013

    Comparative Analysis of Original AODV and AODV-DOR Routing Protocols in Mobile Ad-Hoc Networks

    An ad hoc network is a group of movable wireless nodes that wants to share or exchange the information without any fixed infrastructure or centralized control. Ad hoc network is a self-configuring network of movable devices which may be connected by a wireless links. The union of these mobile devices...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2013

    Analysis of Different Ranges for Wireless Sensor Node Localization Using PSO and BBO and its Variants

    In a Wireless Sensor Network (WSN) accurate location of target node is highly desirable as it has strong impact on overall performance of the WSN. This paper proposes the application of different migration variants of Biogeography-Based Optimization (BBO) algorithm and Particle Swarm Optimization (PSO) for distributed optimal localization of randomly...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2013

    Detection of Linkage Patterns Repeating Across Multiple Sequential Data

    Sequential data mining is a technology for acquiring useful information and patterns from large quantities of sequential data. Research into industrial and commercial applications of sequential data mining is flourishing. The aim of this study is to propose a new method for detecting groups of patterns that appear in a...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2013

    Metrics in Evaluating Software Defects

    Due to the popularity of mobile devices and increasing demands of software applications, more and more individual developers join this industry. However, software defects top at the cost of software development. Software metrics are able to show some indication of software defect. This paper reviews popular static code and object-oriented...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2013

    Investigating the Impact of Random Waypoint and Vector Mobility Models on AODV, OLSR and GRP Routing Protocols in MANET

    A Mobile Ad hoc NETwork (MANET) is a collection of wireless mobile nodes forming a temporary network without the need for base stations or any other preexisting network infrastructure. Due to link instability, node mobility and frequently changing topologies routing becomes one of the core issues in MANETs. this paper...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2013

    Bit and Byte Level Generalized Modified Vernam Cipher Method with Feedback

    In this paper, the authors have introduced a new symmetric key cryptographic method where they have clubbed both bit level and byte level generalized modified vernam cipher method with feedback. Nath et al already developed methods Bit Level Encryption Standard (BLES) Ver-I and Ver-II where they have used extensive bit...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2013

    Ant-Colony-based Algorithm for Multi-Target Tracking in Mobile Sensor Networks

    Target tracking is one of the applications of Mobile Sensor Networks. Mobility management is the important parameter that affects the performance and lifetime of the Mobile sensor networks. So the authors need to manage the mobility in a controlled manner. Existing methods attempt to achieve these requirements for controlled mobility...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2013

    Result Analysis of Virtual IP Address Configuration Protocol

    Mobile ad-hoc networks are known to make as their own network without any defined infrastructure. They can be rapidly vanished and rebuild again. There are some set of applications for MANETs which are diverse, ranging from small static networks that are constrained with the sources of power, large scale mobile,...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2013

    An Optimized Algorithm for Enhancement of Performance of Distributed Computing System

    Distributed Computing System (DCS) presents a platform consisting of multiple computing nodes connected in some fashion to which various modules of a task can be assigned. A node is any device connected to a computer network. Nodes can be computers or various other network applications. A task should be assigned...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2013

    Improved Collaborative Filtering Using Evolutionary Algorithm Based Feature Extraction

    The ubiquity of Collaborative Filtering systems is evident in the wide variety of domains to which they have been applied successfully. However a major challenge to such systems is the high dimensionality and sparsity of the expressed preferences. Dealing effectively with large user profiles would improve the scalability of the...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2013

    Efficient Rectangular to Polar Conversion for Multiband and Multimode Wireless Communications

    The necessity of high data rates wireless communication becomes important for the end-user, especially to support high mobility lifestyle "Always get connected", and demand for the multimedia communication, such as the video phone, live streaming, online gaming, and the Internet. Since wireless communication systems need to deal with multiband and...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2013

    An Approach to Automation Selection of Decision Tree Based on Training Data Set

    In Data mining applications, very large training data sets with several million records are common. Decision trees are very much powerful and excellent technique for both classification and prediction problems. Many decision tree construction algorithms have been proposed to develop and handle large or small training data. Some related algorithms...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2013

    A Novel Weighted Median Switching Filter for Denoising Corrupted Images

    This paper presents a new weighted switching median filter is proposed to restore images corrupted by noise. The neighborhood of a pixel is classified into low corrupted, medium corrupted and highly corrupted regions. Based on this classification the weights associated with the median filter employed for denosing is determined. In...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2013

    Search-Based Software Requirements Selection: A Case Study

    This paper presents a Multi-objective Quantum-inspired Hybrid Differential Evolution (MQHDE) for the solution of software requirements selection problem and its application on a real-world project. As the customer requirements change from time to time, often software products are developed in an iterative or incremental manner so as to deal with...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2013

    Application of Object Oriented Metrics to Java and C Sharp: Comparative Study

    This paper presents the comparative study of various object oriented software metrics and their application on C Sharp and Java language. A set of eleven well established object-oriented metrics are applied on twenty C Sharp and Java programs to measure and compare the important features such as complexity, testability and...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2013

    Secure Approach for Data in Cloud Computing

    Previously, computer software was not written with security in mind; but because of the increasing frequency and sophistication of malicious attacks against information systems, modern software design methodologies include security as a primary objective. With cloud computing systems seeking to meet multiple objectives, such as cost, performance, reliability, maintainability, and...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2013

    Implementation of Modified Hybrid Port Knocking (MHPK) with Strong Authentication

    Port Knocking is an important concept to secure services provided by the servers. By a predefined port knocking sequence server identify whether the request is a legitimate request for a service. In this paper, the authors present an analyzing the network security concept of Port Knocking and assesses their suitability...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2013

    Iris Texture Analysis for Security Systems

    Biometrics, which refers to authentication based on his or her physiological or behavioral characteristics, its capability to distinguish authorized person and an unauthorized. Since biometric characteristics are distinctive as it cannot be forgotten or it cannot be lost, for identification person has to be present physically. Biometric is more reliable...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2013

    Minimum Energy Multicast Routing in Mobile Ad-Hoc Network

    A Mobile Ad-hoc NETwork (MANET) is a collection of mobile nodes. It can be constructed anywhere without any infrastructure. The mobile nodes are equipped with energy-limited batteries. An important issue in such a network is to minimize the total energy consumption for each operation. In MANET each node acts as...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2013

    Anti-Piracy for Movies Using Forensic Watermarking

    In the past decade internet worked perfectly with distribution of the digital data for pictures, music and videos. Although digital data have many advantages over analogue data, the rightful ownership of the digital data source is at of risk. The copyright protection for digital media becomes an important issue of...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2013

    Hierarchical Group Key Management Using Threshold Cryptography in Wireless Sensor Networks

    In Wireless Sensor Networks (WSNs), data transmission is secured by authenticating secret keys. Secure key management is most important for network reliability and consistency. In this paper, a hierarchical group key management technique using threshold cryptography in Wireless Sensor Networks is proposed. The technique considers hierarchical sensor network, where sensing...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2013

    Pattern Mining Method for Hospital Facility Review Using Optimized Nonlinear Mathematical Model

    The development of discovering appealing, valuable and important patterns from large spatial datasets is stated as spatial data mining. From the preceding hospital location analyses technique, the locations are predicted from the hospital dataset using pattern mining technique. In terms of road weight age computation the location analyses technique is...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2013

    DAP-LECP: Dos Attack Prevention and Low Energy Consumption Protocol for Wireless Sensor Networks

    The wide-spread deployment of Wireless Sensor Networks (WSN) promises extensive applications in military and civilian fields. So far the major research focus has been to make WSN more useful and scalable in order to cope with future challenges of communication technologies, small emphasis is placed till now for the secure...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2013

    Cyber Reconnaissance: An Alarm Before Cyber Attack

    Today's cyber world is more than the internet. It is interdependent networks containing telecommunication network, embedded system and critical infrastructures. Malicious attacks on critical infrastructure become a major threat to business and government operations. An easy and fast access to network makes business successful and makes sensitive information more vulnerable...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2013

    Optimization of Software Testing for Discrete Testsuite Using Genetic Algorithm and Sampling Technique

    Though Software Testing plays a vital role to produce better quality products, but it is time consuming and incurs expenditure. The more test will be conducted, products will be finer. Hence, testing is must for software development. Another side of testing is spending much money on it because people will...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2013

    A Novel Approach for Wormhole Detection in MANET

    The active operational environment of Mobile Ad hoc NETwork (MANET) makes it exposed to a variety of network attacks. Thus reducing the vulnerability is becoming a top priority. Wireless networks are susceptible to many attacks, including an attack known as the wormhole attack, has become a challenging work. The wormhole...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2013

    Two Level Authentication and Packet Marking Mechanism for Defending Against DoS and DDoS Attacks

    Denial of Service (DoS) attacks presents a serious problem for Internet communications. IP source address spoofing is used by DoS and DDoS attacks on targeted victim. IP spoofing to forge the source IP address of the packet, and thereby hide the identity of source. This makes hard to detect and...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2013

    A Threat Model Approach for Classification of Network Layer Attacks in WSN

    Wireless Sensor Networks (WSN) comprise an emerging technology which has received a significant attention from the research community. Several small and low cost devices are included in the sensor networks which are self organizing ad hoc systems. WSNs are susceptible to many types of attacks at various layers of networks...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2013

    User's Verification to Prevent Malicious Access in Web-Based Forums

    In this paper, the authors aims to address the issue of malicious accounts that are created and used to imitate real users in web-based forums. In fact, form bots are used to create fake users on forums for several purposes. As a result hundreds of fake users start appearing in...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Low Cost Embedded System for Voltage Sag Analysis

    In this paper, the authors describe the development of low cost embedded system for detecting and analyzing the voltage sags in the ac supply. The proposed system have the capabilities of real time acquisition of voltage signal using an Embedded Controller and display its parameters in a graphical user interface...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Comparative Study of Different Models before Feature Selection and AFTER Feature Selection for Intrusion Detection

    A network data set may contain a huge amount of data and processing this huge amount of data is one of the most challenges task for network based Intrusion Detection System (IDS). Normally these data contain lots of redundant and irrelevant features. Feature selection approaches are used to extract the...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    A Survey of Reconfigurable Architectures

    A new architecture type that is recently evolving is the reconfigurable architecture which combines the benefits of ASIPs (Application Specific Instruction Set Processors) and FPGAs (Field Programmable Gate Arrays). Reconfigurable computing combines software flexibility with high performance hardware. FPGAs are generally employed to construct a reconfigurable block as it provides...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    A Survey: Sparse Traffic Grooming and RWA Assignment Schemes in Optical Network

    Traffic grooming has become a very important issue on optical network, as optical networks provide a very high speed data transmission for huge amount of data. A sparse grooming network with only a fractional of nodes having grooming functionalities may achieve the same performance as the one in which all...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    DC Shunt Motor Control using Wavelet Network

    In this paper, a dc shunt motor with fixed speed control system is presented, a wavelet neural network control scheme is proposed to control the speed of shunt DC motor, the Wavelet Neural Network (WNN) is used and optimized using Particle Swarm Optimization (PSO) algorithm. The performance is measured depending...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Cryptanalysis to Secure System

    In this paper, the authors describe how to implement 3D password. As it is free from textual password as well as graphical password. Hence it is free from attackers. 3D password is used to overcome the drawbacks of previously existing security or authentication schemes. 3D password is well created by...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Instruction Customization: A Challenge in ASIP Realization

    An Application Specific Instruction set Processors (ASIP) or alternatively known as customized processor is a processor designed for a particular application or for a set of applications. Earlier surveys show that though a significant research has been done for this most promising processor design technology, still approaches used in them...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    PAPR Reduction in OFDM System using Wavelet SLM and PTS Technique

    Recently researchers have developed many techniques to solve high PAPR problem. These techniques have some merits and demerits. The concentration of this research work is especially upon the SeLected Mapping (SLM) and Partial Transmit Sequence (PTS) techniques using wavelet transforms Inverse Discrete Wavelet Transform (IDWT) and DWT instead of conventional...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Energy Efficient Routing with MAX-Min Energy Scheme in Ad-hoc On-Demand Multipath Distance Vector routing for MANET

    During the past few years, there has been increasing interest in the design of energy efficient protocols for wireless ad-hoc networks. Node within an ad hoc network generally relies on batteries (or exhaustive energy sources) for power. Since these energy sources have a limited lifetime, power availability is one of...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Energy Efficient Ad-hoc Routing Protocol for Disaster Scenario

    Due to decentralization and infrastructure less characteristics of ad hoc networks, it can be established in any environment without pre-existing infrastructure with ease of deployment. There are many issues for designing of ad hoc network like MAC layer protocol, security, mobility of nodes, routing protocol, quality of service etc. The...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Calculating Page Pertinence for Web Referencing a New Approach

    Every day, more than three billion queries are performed on Google. To take advantage of opportunities that the user are offered by the search engines, it is important for their website to achieve high rankings in search results, in order to reach a larger customer base, increasing its business in...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    A Comparative Study of Defense Mechanisms against SYN Flooding Attack

    Distributed Denial-of-Service (DDoS) flooding attacks are a serious threat to the security of the internet. A DDoS attack makes a machine or network resources not usable by the legitimate clients. A SYN flood is a form of denial-of-service attack. An attacker sends SYN requests continuously to a target system to...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    An Approach to Enhance the Energy Efficiency of RFID Protocol using NTP Protocol

    A Wireless Sensor Networks (WSN) is a type of self organizing and self managing network which is not made of permanently of sensor nodes of the condition of not having internet infrastructure. A wireless sensor network consists of a large number of nodes spread over a specific area where the...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Recursive Ensemble Approach for Incremental Learning of Non-Stationary Imbalanced Data

    Learning non-stationary data stream is much difficult as many real world data mining applications involve learning from imbalanced data sets. Imbalance dataset consist of data having minority and majority classes. Classifiers have high productivity accuracy on majority classes and Low productivity accuracy on minority classes. Imbalanced class partition over data...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Wavelet based Power Quality Monitoring in Grid Connected Wind Energy Conversion System

    Recently renewable energy resources especially wind power integration has been far increased in the electric power distribution system. To utilize wind power more effectively, wind energy conversion system is interfaced to grid through power electronics interfaces. In this paper, monitoring of various power quality disturbances at the point of common...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Secure Data communication and Cryptography based on DNA based Message Encoding

    Information flows throughout the network that may be of local or of global scope. It is mandatory to secure that information to prevent from unauthorized access of it by any node in the path. There are various users and organizations who want to prevent their crucial data from attackers and...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    A Study on Recent Advancements in MIMO-FBMC Systems

    MultiCarrier (MC) techniques when combined with Multiple Input Multiple Output (MIMO) technology increases the throughput and QOS of the system. OFDM with its unique capability of converting the frequency selective channel into a set of frequency flat channel have proved to be one of the best multicarrier technique that can...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Improved Performance of AODV Routing Protocol with Increasing Number of Nodes using Traveling Salesman Problem

    A mobile ad hoc network is a self-configuring and self organizing infrastructure less network of mobile nodes; these nodes are dynamic in nature and are capable of communicating with each other without the use of a network infrastructure or any centralized administration. With the ease of deployment and the infrastructure...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Finger Knuckle Print Identification using Gabor Features

    One of the current trends in biometric human identification is the development of new emerging modalities. Knuckle biometrics is one of such promising modalities. Texture pattern produced by the finger knuckle bending is highly unique and makes the surface a distinctive biometric identifier. This paper presents feature based identification methods...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Mobile Learning a new Wave of Learning: A Survey among University of Dodoma Students

    Mobile technologies are increasingly becoming an integral part of student's lives in academia. Devices such as Smartphone, tablets, and e-book readers connect users to the world instantly, heightening access to information and enabling interactivity with others. Applications that run on these devices let users not only consume but also discover...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Construction of Local Instance Repositories in Personalized Ontological profiles using CosInfo Feature Clustering Method

    The online user profiles are represented using ontologies. Personalized ontology is recently introduced technique for gathering online information. Many models are utilizing only knowledge from either a global knowledge base or user local information, which requires high computational resources. In this paper, authors proposed LIR, Local Instance Repositories, which are...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Analysis of a Known Offline E-Coin System

    In 2012, the authors presented the user recoverable offline e-coin system with rapid anonymity revoking. The authors claimed that their system can accomplish the security needs of e-coin scheme such as unlinkability, over-spending checking, anonymity control and rapid anonymity revoking on overspending. They added prove unforgeability characteristic. But, in this...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    A Survey on Sybil Attack in Vehicular Ad-hoc Network

    Vehicular ad-hoc network is new and emerging technology. Researchers are gaining interest in this technology. Due to its open nature it is vulnerable to various attacks. Sybil attack is one of them. Various defense techniques have been given by researchers. In this paper, the authors briefly explain those defense techniques,...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Automation of Software Cost Estimation using Neural Network Technique

    Software cost estimation is one of the most challenging tasks in software engineering. Over the past years the estimators have used parametric cost estimation models to establish software cost, however the challenges to accurate cost estimation keep evolving with the advancing technology. A detailed review of various cost estimation methods...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    A Policy and Trust-based Secure Communication Protocol in Information Systems

    Security in information systems has increased importance, as end users have become more responsive of securely sharing or exchanging the vast amount of information. The organizations that do sensitive work such as those with defense contracts, passport issuing agencies, military activities, and health care data at health-insurance, are in need...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Multilayer Intrusion Detection in MANET

    Intrusion detection system plays a major role in Mobile Adhoc NETwork (MANET). There are lots of attacks in MANET due to its vulnerabilities. Many Intrusion Detection System (IDS) like standalone IDS, Hierarchical IDS, Distributed IDS, cooperative IDS are available in MANET but still suffers due to multilayer attacks such as...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Generating the Best Fit Key in Cryptography using Genetic Algorithm

    The goal of network security is to provide a secure, effective and private communication between the sender and the receiver. In order to achieve a high level of security, data is sent in the encrypted form to its intended recipient. But, tampering with the text and eavesdropping have assumed colossal...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Comparative Analysis of Design Methodologies for Parallel FIR Filter

    The importance of DSP systems with low power, low area and high performance appear to be increasing with no visible sign of saturation. Digital filters play a vital role in digital systems where Finite Impulse Response (FIR) filters are one of the most widely used fundamental devices. This review paper...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Fast Detection Process for Downlink in LTE Networks

    In this paper, the authors introduce a simple detection method that gives a better performance with minimum computational complexity for the Long Term Evolution (LTE) mobile communication system. The LTE communication system has been simulated using MATLAB7 programming language. An approximated linear baseband model for the two modulation techniques used...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    PAPR Reduction in LTE Down Link using a Hybrid Repeated Clipping and SQRT Companding

    The orthogonal frequency division multiplexing is one of the widely used modulation techniques in the broadband wireless technology. One of the main problems of the OFDM is the high peak-to-average power ratio of transmitting signal due to the superposition of many subcarriers. This paper presents a new hybrid peak-to-average power...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    The Optimization of Inter cell Handover Dynamics in a GSM Network

    Efficient handover mechanism in a GSM network is one of the parameters critical to GSM network service quality i.e. Quality-of-Service (QoS) and customer satisfaction. Ongoing calls are being transferred through the process of handover from one cell to another as the users move through the coverage areas of the cellular...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Architecture based Comparison of Semantic Web Service Composition Processes

    Semantic web services development become rapidly increased as dynamic changes are occurred. Various approaches are adopted to develop composite service systematically. This paper aims to make development process easier by classifying the literature on web services composition based approaches like selection, discovery, orchestration, choreography, mediation and automatic composition to facilitate...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    A Survey on SVM Classifiers for Intrusion Detection

    Intrusion detection is an emerging area of research in the computer security and networks with the growing usage of internet in everyday life. An intrusion detection is an important in assuring security of network and its different resources. Intrusion detection attempts to detect computer attacks by examining various data records...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Comparison of Cache Page Replacement Techniques to Enhance Cache Memory Performance

    Caching is a very important technique for improving the computer system performance, it employed to hide the latency gap between memory and the CPU by exploiting locality in memory accesses. In modern computer architectures a page miss cause the several hundred CPU cycles. In a memory hierarchy, a cache performs...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Discovery of Fuzzy Hierarchical Association Rules

    A number of techniques have been developed to turn data into useful knowledge. Most of the algorithms in data mining find association rules among transactions using binary values and at single concept level. However it will be more exciting to discover hierarchical association rules for decision makers. In this paper...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    An Energy Efficient Clustering Algorithm based on Boundary Nodes Allocation for WSN

    Instead of various advantages of wireless sensor networks, there is always a constraint related to energy consumption resulting in reduced lifetime of a wireless sensor network. In this paper, an energy efficient algorithm is proposed considering allocation of boundary nodes, removing clashes among clusters while distributing nodes thereby reducing overall...

    Provided By International Journal of Computer Applications

  • White Papers // May 2013

    An Improved Algorithm for Bayes Classifier to Handle Correlated Attributes

    Classification can be defined as a target function which maps attribute value of objects to predefined class. One objective is to divide the objects into proper group and other objective is to predict the class of unknown records. Bayesian classifier classifies and predicts the class of objects on the basis...

    Provided By International Journal of Computer Applications

  • White Papers // May 2013

    Handling Missing Value in Decision Tree Algorithm

    Now-a-days all the decisions making and large data analysis is made using computer applications. In such kind of application the authors use the data mining techniques to analyses them. Different domains of research like management, engineering, medical, education are frequently using these techniques. Data mining in educational system is an...

    Provided By International Journal of Computer Applications

  • White Papers // May 2013

    Improvement of S-DES Technique by Use of Key Bunch Matrix and Randomizers

    In this modern age information sharing and transfer has increased exponentially. The information shared is vulnerable to unauthorized access and inception. Cryptography is used to provide secrecy in message transmission. The Simplified Data Encryption Standard or in short S-DES algorithm is used to encrypt messages to form secret text. The...

    Provided By International Journal of Computer Applications

  • White Papers // May 2013

    Implementing Swati Verma's Digital Signature Schemes based on Integer Factorization and Discrete Logarithms

    A digital signature is a cryptographic method for verifying the identity of an individual. It can be a process, computer system, or any other entity, in much the same way as a handwritten signature verifies the identity of a person. Digital signatures use the properties of public-key cryptography to produce...

    Provided By International Journal of Computer Applications