International Journal of Computer Applications

Displaying 2881-2920 of 4440 results

  • White Papers // Jun 2012

    Optimized Power Schemes for Wireless Sensor Network by Using Threshold Techniques

    One of the main design issues for a sensor network is conservation of the energy available at each sensor node. Optimal routing tries to maximize the duration over which the sensing task can be performed, but requires historical knowledge. This paper proposes Packet Profile Based (PPB) scheme with certain threshold...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2012

    Dependency Analysis Using UML for Component-Based Software Systems: An XMI Approach

    Component-Based Software Development (CBSD) is an important area in the software engineering field. It has become one of the preferred streams for developing large and complex systems by integrating prefabricated software components which have not only made easier the process of software development but has also changed the ways for...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2012

    Study on Software Process Metrics Using Data Mining Tool -A Rough Set Theory Approach

    Software industries are optimizing their resources to obtain the best quality software from minimum cost through identifying the potential resource for the assignments. The process matrices' are supported to increase the efficiency of the project in the development scenario. The process metrics functionalities are determined as per the development of...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2012

    Secure AODV Using Symmetric Key Cryptography with Cyclic Chain Hash Function (CCHF)

    In this paper, the authors analyze the network performance with using Symmetric Key Cryptographic technique applying in AODV routing protocol with Cyclic Chain Hash Function (CCHF). Throughput and end to end delay of KK Cryptographic (KKC) algorithm applying in AODV is less. If Symmetric Key Cryptographic technique used in AODV...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2012

    Assessing Reliable Software Using SPRT Based on LPETM

    Software reliability assessment is increasingly important in developing and testing new software products. Logarithmic Poisson Execution Time Model (LPETM) is a software reliability model which predicts the expected failures and hence related reliability quantities better than existing software reliability models. It uses Non-Homogeneous Poisson Process (NHPP) with a mean value...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2012

    Interworking Architectures in Heterogeneous Wireless Networks: An Algorithmic Overview

    The scarce availability of spectrum and the proliferation of Smartphones, social networking applications, online gaming, etc. Mobile network operators (MNOs) are faced with an exponential growth in packet switched data requirements on their networks. Haven invested in legacy systems (such as HSPA, WCDMA, WiMAX, Cdma2000, LTE, etc.) that have hitherto...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2012

    Efficient Energy Detection Technique in Cognitive Radio Ad-Hoc Network

    Cognitive Radio Ad-Hoc Networks (CRAHNs) is used to solve the current problems of inefficiency in the spectrum allocation and used to deploy highly reconfigurable and self organizing wireless networks. Cognitive radio represents an efficient technology since it allows exploiting the unused radio resources. In this context, spectrum sensing plays very...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2012

    Modified Jelinski-Moranda Software Reliability Model with Imperfect Debugging Phenomenon

    In this paper, the authors have modified the Jelinski-Moranda (J-M) model of software reliability using imperfect debugging process in fault removal activity. The J-M model was developed assuming the debugging process to be perfect which implies that there is one-to-one correspondence between the number of failures observed and faults removed....

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2012

    An Energy Efficient Congestion Control Technique for Wireless Sensor Networks

    WSN are distributed networks with small, light weight wireless sensor nodes. These sensor nodes cooperatively monitor the environment to measure the physical parameter such as temperature, pressure etc. It is data centric. When sensor nodes detect an event, it become active in collecting and transmitting the data, which cause congestion...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2012

    Estimating Trust Value for Cloud Service Providers Using Fuzzy Logic

    Cloud computing has garnered popular support in a relatively short span of time. It is a new method of delivering the distributed resources over internet. It reduces capital expenditure as well as operational expenditure. The number of Cloud Service Providers (CSPs) who provide computing as a utility has increased exponentially...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2012

    Energy Saving and Survival Routing Protocol for Mobile Ad Hoc Networks

    In this paper, the authors propose a method to enhance the life time as well as improve the performance of the Mobile Ad hoc NETworks (MANET). Since MANET consists of devices that run on batteries, having limited amount of energy and due to the self-configuring and dynamic change of topology,...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2012

    Combining Chaotic Encryption and Frequency Watermarking for Prior and Ahead Image Securing

    Applying cryptographic techniques in the field of 2D signal processing is an attractive approach in recent years. Different methods are proposed to ensure prior data protection. Symmetric block encryption schemes, designed on two dimensional chaotic maps, are efficient and secure for real-time image encryption. In the case of numeric data,...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2012

    Comparative Study of the New Generation, Agile, Scalable, High Performance NOSQL Databases

    Relational database is widely used in most of the application to store and retrieve data. They work best when they handle a limited set of data. Handling real time huge volume of data like internet was inefficient in relation database systems. To overcome this problem the "NO-SQL" or "Not Only...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2012

    Performance Analysis of MIMO-OFDM by Spatial Diversity With STBC4

    The main aim of OFDM-MIMO systems is to combine OFDM technology with the techniques of MIMO systems. The growing demand of multimedia services and the growth of Internet related contents lead to increasing interest to high speed communications. OFDM is a type of multichannel modulation that divides a given channel...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2012

    Comparative Analysis of Software Effort Estimation Techniques

    Project Failure is the major problem undergoing nowadays as seen by software project managers. Imprecision of the estimation is the reason for this problem. As software grew in size and importance it also grew in complexity, making it very difficult to accurately predict the cost of software development. This was...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2012

    Web Application Testing with eValid

    The web based applications are powerful and have the ability to provide feature rich content to a wide audience spread across the globe at an economical cost. Hence it is a daunting task to test these applications and with more and more features and testing these applications is becoming even...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2012

    Improved Fault Tolerant Job Scheduler for Optimal Resource Utilization in Computational Grid

    Grid computing provides the ability to access, utilize and control a variety of underutilized heterogeneous resources distributed across multiple administrative domains while it is an error prone environment. The failure of resources affects job execution during runtime. The authors propose a new strategy named Improved Fault Tolerant Job Scheduler (IFTJS)...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2012

    Classification Algorithm Based on MS Apriori for Rare Classes

    Most of the data mining algorithm focuses on frequent patterns, few algorithm emphases on rare items, but rare items also have importance, for example, network intrusion detection, where among various normal connections the authors need to detect the rare malicious connections. Classification of such a non-uniform data set is a...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2012

    Triple Band Planar Antenna for Wireless Communication

    This paper presents a triple band planar antenna for wireless communication. The antenna is printed on FR4 substrate. The patch shape and the ground plane are studied to achieve the desired bandwidth. The reconfiguration of antenna is studied to improve the performance of antenna in terms of the return loss...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2012

    Analysis of Multicast Routing Protocol for Ad Hoc Mobile Wireless Networks

    Mobile Ad-hoc NETworks (MANETs) allow portable mobile devices to establish communication path without having any central infrastructure. In the multicast routing protocol the source based tree and core based tree used for the multicast routing they both are help in the AODV and DVMRP. In this paper the authors describe...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2012

    Energy Optimal Path Algorithm for Routing in Static Adhoc Network Using Greedy Approach (EOGR)

    Wireless ad-hoc networks are excellent area for researchers with an algorithm background. In this paper, the authors have given an algorithmic approach to the problem of routing with minimum energy consumption by the ad hoc network. They have proposed an energy optimal path algorithm used for routing in static ad-hoc...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2012

    A Bio Inspired Energy Efficient Routing Approach to Resolve Broken Link Problem in WSN

    Energy and efficiency are always the main concern in wireless sensor network. In a sensor network the nodes are present with limited energy and with each transmission they loss some energy. Because of this it is required to minimize the rerouting to save the energy loss. The authors proposed an...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2012

    Real Time and Offline Network Intrusion Detection Using Improved Decision Tree Algorithm

    Data mining has been used extensively and broadly by several network organizations. Classification based algorithms provide a significant advantage in order to detect attacks in the training data. Network applications usage is being increased every day as the internet usage is exponentially increasing. In the same way, Network attacks detection...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2012

    Privacy Preservation for WSN: A Survey

    This paper presents a review of privacy-preserving techniques for Wireless Sensor Networks (WSN). A lot of work has been done to enhance efficient use of power and resources in wireless sensor networks with the help of specific routing algorithms and different layers' protocols. As the popularity and uses of wireless...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2012

    SNAuth-SPMAODV: Secure Neighbor Authentication Strict Priority Multipath AODV Against Denial of Service Attack for MANET in Military Scenario

    A Mobile Ad-hoc NETwork (MANET) is a peer-to-peer wireless network where nodes can communicate with each other without infrastructure. Due to this nature of MANET; it is possible that there could be some malicious and selfish nodes that try to compromise the routing protocol functionality and makes MANET vulnerable to...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2012

    Fuzzy Based Optimization for Power Management in Wireless Sensor Networks

    In Wireless Sensor Networks (WSN), sensor node deployment is essential for maximizing the coverage and detection probabilities. But the existing optimization solution suffers from limited energy storage, node death, increased network traffic etc. To solve these issues, the authors propose a fuzzy based optimization model for power management in wireless...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2012

    Trusted Cooperative Caching Scheme in Ad-hoc Networks

    This paper investigates about the cooperative caching scheme which allows sharing their cache memory spaces among different node in ad-hoc network. The authors have applied trust model in cooperative caching which prevents malicious node from taking part in caching scenario and hence improves the reliability of the network. As routing...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2012

    Intrusion Detection System Using Bayesian Approach for Wireless Network

    An Intrusion Detection System (IDS) is a software or hardware tool used to detect unauthorized access of a computer system or network. A wireless IDS performs this task exclusively for the wireless network. These systems monitor traffic on user's network looking for and logging threats and alerting personnel to respond....

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2012

    Recuperating Link Structure of Website Using MST

    With the explosive growth of information sources available on the World Wide Web, it has become increasingly necessary for users to utilize automated tools in find the desired information resources, and to track and analyze their usage patterns. These factors give rise to the necessity of creating server side and...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2012

    A Temporal Database Compression with Differential Method

    Now days it is very tedious job to keep files for personal as well as commercial computing. There are various type of compressing technique used, but one step ahead from them available technique is described here. Almost every application the backend used is database. In this proposed technique the authors...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2012

    Mobile Agent Architecture for Intelligent Product to Increase the Effectiveness in End of Life Management

    Sweep the entire product lifecycle information from design to recycling is the great challenge to overcome in manufacturing worldwide. Actually, managing product after-sales information is a key to innovation and launching new products that meet the customers' expectations. To address this objective, the current study proposes architecture for closing the...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2012

    Enhancing Effectiveness of e-Learning Framework Using UML Modeling and Self Regulation: A Case Study

    The ever increasing internet usage around the world has created huge potential for application of ICT in Higher education what is known as e-learning. The e-learning offers the users flexibilities and many advantages which the traditional class room based learning cannot provide. The users can access the digital content anytime,...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2012

    Survey on Offline Finger Print Verification System

    The fingerprint verification, means where "Verification" implies a user matching a fingerprint against a single fingerprint associated with the identity that the user claims. Biometrics can be classified into two types Behavioral (signature verification, keystroke dynamics, etc.) and Physiological (iris characteristics, fingerprint, etc.). Finger Print and signature is one of...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2012

    High-Resolution Fingerprint Matching Using Level 3 Incipient Ridges and Scars

    Biometrics consists of automated methods for identifying and recognizing a person which can be either in the form of physiological or behavioral traits. Some of the features being considered are face, fingerprints, hand geometry, handwriting and voice. Fingerprint friction ridge details are hierarchically divided into 3 different levels which ranges...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2012

    Discovering Substitutable and Composable Semantic Web Services for Web Service Composition

    Semantic web service discovery is an indispensable part of web service composition which is expected to match the user request against multiple service advertisements and provide a set of substitutable and composable services by maintaining the relationship among services. This paper employs indirect backward chaining matchmaking approach to match against...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2012

    Result Analysis of LabVIEW and MatLab in Application of Image Edge Detection

    Edge of an Image is One of the most fundamental and significant futures. Edge detection is always one of the classical studying projects of computer vision and image processing field. It is the first step of image analysis and understanding. The purpose of edge detection is to discover the information...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2012

    Game-Enabling the 3D-Mandelbulb Fractal by Adding Velocity-Induced Support Vectors

    Fractals provide an innovative method for generating 3D images of real-world objects by using computational modeling algorithms based on the imperatives of self-similarity, scale invariance, and dimensionality. Of the many different types of fractals that have come into limelight since their origin, the family of Mandelbrot Set fractals has eluded...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2012

    A Review of Distributed Deadlock Detection Techniques Based on Diffusion Computation Approach

    A deadlock is a system state in which every process in some group requests resources from other processes in the group, and then waits indefinitely for these requests to be satisfied. Deadlocks have a very adverse effect on the efficient working of Operating System therefore they should be either prevented,...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2012

    Ontology Based Cloud Framework

    The fluctuating demands of software and hardware IT infrastructure have resulted in cloud computing to be the fastest growing trend in the Information Technology industry. From a business perspective, organizations adopt cloud computing as they no longer need to buy or maintain expensive and energy-draining equipments. IT administration including licensing...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2012

    A Trust Model for Identifying Malicious Behavior in P2P Networks

    Peer-To-Peer (P2P) systems allow all peers to communicate and share resources with equal responsibility thereby eliminating the need for central authorities. These networks have gained wide popularity in providing services ranging from file sharing to distributed computing applications. In P2P networks the peers can join or leave the system dynamically...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Low Cost Embedded System for Voltage Sag Analysis

    In this paper, the authors describe the development of low cost embedded system for detecting and analyzing the voltage sags in the ac supply. The proposed system have the capabilities of real time acquisition of voltage signal using an Embedded Controller and display its parameters in a graphical user interface...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Comparative Study of Different Models before Feature Selection and AFTER Feature Selection for Intrusion Detection

    A network data set may contain a huge amount of data and processing this huge amount of data is one of the most challenges task for network based Intrusion Detection System (IDS). Normally these data contain lots of redundant and irrelevant features. Feature selection approaches are used to extract the...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    A Survey of Reconfigurable Architectures

    A new architecture type that is recently evolving is the reconfigurable architecture which combines the benefits of ASIPs (Application Specific Instruction Set Processors) and FPGAs (Field Programmable Gate Arrays). Reconfigurable computing combines software flexibility with high performance hardware. FPGAs are generally employed to construct a reconfigurable block as it provides...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    A Survey: Sparse Traffic Grooming and RWA Assignment Schemes in Optical Network

    Traffic grooming has become a very important issue on optical network, as optical networks provide a very high speed data transmission for huge amount of data. A sparse grooming network with only a fractional of nodes having grooming functionalities may achieve the same performance as the one in which all...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    DC Shunt Motor Control using Wavelet Network

    In this paper, a dc shunt motor with fixed speed control system is presented, a wavelet neural network control scheme is proposed to control the speed of shunt DC motor, the Wavelet Neural Network (WNN) is used and optimized using Particle Swarm Optimization (PSO) algorithm. The performance is measured depending...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Cryptanalysis to Secure System

    In this paper, the authors describe how to implement 3D password. As it is free from textual password as well as graphical password. Hence it is free from attackers. 3D password is used to overcome the drawbacks of previously existing security or authentication schemes. 3D password is well created by...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Instruction Customization: A Challenge in ASIP Realization

    An Application Specific Instruction set Processors (ASIP) or alternatively known as customized processor is a processor designed for a particular application or for a set of applications. Earlier surveys show that though a significant research has been done for this most promising processor design technology, still approaches used in them...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    PAPR Reduction in OFDM System using Wavelet SLM and PTS Technique

    Recently researchers have developed many techniques to solve high PAPR problem. These techniques have some merits and demerits. The concentration of this research work is especially upon the SeLected Mapping (SLM) and Partial Transmit Sequence (PTS) techniques using wavelet transforms Inverse Discrete Wavelet Transform (IDWT) and DWT instead of conventional...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Energy Efficient Routing with MAX-Min Energy Scheme in Ad-hoc On-Demand Multipath Distance Vector routing for MANET

    During the past few years, there has been increasing interest in the design of energy efficient protocols for wireless ad-hoc networks. Node within an ad hoc network generally relies on batteries (or exhaustive energy sources) for power. Since these energy sources have a limited lifetime, power availability is one of...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Energy Efficient Ad-hoc Routing Protocol for Disaster Scenario

    Due to decentralization and infrastructure less characteristics of ad hoc networks, it can be established in any environment without pre-existing infrastructure with ease of deployment. There are many issues for designing of ad hoc network like MAC layer protocol, security, mobility of nodes, routing protocol, quality of service etc. The...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Calculating Page Pertinence for Web Referencing a New Approach

    Every day, more than three billion queries are performed on Google. To take advantage of opportunities that the user are offered by the search engines, it is important for their website to achieve high rankings in search results, in order to reach a larger customer base, increasing its business in...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    A Comparative Study of Defense Mechanisms against SYN Flooding Attack

    Distributed Denial-of-Service (DDoS) flooding attacks are a serious threat to the security of the internet. A DDoS attack makes a machine or network resources not usable by the legitimate clients. A SYN flood is a form of denial-of-service attack. An attacker sends SYN requests continuously to a target system to...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    An Approach to Enhance the Energy Efficiency of RFID Protocol using NTP Protocol

    A Wireless Sensor Networks (WSN) is a type of self organizing and self managing network which is not made of permanently of sensor nodes of the condition of not having internet infrastructure. A wireless sensor network consists of a large number of nodes spread over a specific area where the...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Recursive Ensemble Approach for Incremental Learning of Non-Stationary Imbalanced Data

    Learning non-stationary data stream is much difficult as many real world data mining applications involve learning from imbalanced data sets. Imbalance dataset consist of data having minority and majority classes. Classifiers have high productivity accuracy on majority classes and Low productivity accuracy on minority classes. Imbalanced class partition over data...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Wavelet based Power Quality Monitoring in Grid Connected Wind Energy Conversion System

    Recently renewable energy resources especially wind power integration has been far increased in the electric power distribution system. To utilize wind power more effectively, wind energy conversion system is interfaced to grid through power electronics interfaces. In this paper, monitoring of various power quality disturbances at the point of common...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Secure Data communication and Cryptography based on DNA based Message Encoding

    Information flows throughout the network that may be of local or of global scope. It is mandatory to secure that information to prevent from unauthorized access of it by any node in the path. There are various users and organizations who want to prevent their crucial data from attackers and...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    A Study on Recent Advancements in MIMO-FBMC Systems

    MultiCarrier (MC) techniques when combined with Multiple Input Multiple Output (MIMO) technology increases the throughput and QOS of the system. OFDM with its unique capability of converting the frequency selective channel into a set of frequency flat channel have proved to be one of the best multicarrier technique that can...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Improved Performance of AODV Routing Protocol with Increasing Number of Nodes using Traveling Salesman Problem

    A mobile ad hoc network is a self-configuring and self organizing infrastructure less network of mobile nodes; these nodes are dynamic in nature and are capable of communicating with each other without the use of a network infrastructure or any centralized administration. With the ease of deployment and the infrastructure...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Finger Knuckle Print Identification using Gabor Features

    One of the current trends in biometric human identification is the development of new emerging modalities. Knuckle biometrics is one of such promising modalities. Texture pattern produced by the finger knuckle bending is highly unique and makes the surface a distinctive biometric identifier. This paper presents feature based identification methods...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Mobile Learning a new Wave of Learning: A Survey among University of Dodoma Students

    Mobile technologies are increasingly becoming an integral part of student's lives in academia. Devices such as Smartphone, tablets, and e-book readers connect users to the world instantly, heightening access to information and enabling interactivity with others. Applications that run on these devices let users not only consume but also discover...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Construction of Local Instance Repositories in Personalized Ontological profiles using CosInfo Feature Clustering Method

    The online user profiles are represented using ontologies. Personalized ontology is recently introduced technique for gathering online information. Many models are utilizing only knowledge from either a global knowledge base or user local information, which requires high computational resources. In this paper, authors proposed LIR, Local Instance Repositories, which are...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Analysis of a Known Offline E-Coin System

    In 2012, the authors presented the user recoverable offline e-coin system with rapid anonymity revoking. The authors claimed that their system can accomplish the security needs of e-coin scheme such as unlinkability, over-spending checking, anonymity control and rapid anonymity revoking on overspending. They added prove unforgeability characteristic. But, in this...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    A Survey on Sybil Attack in Vehicular Ad-hoc Network

    Vehicular ad-hoc network is new and emerging technology. Researchers are gaining interest in this technology. Due to its open nature it is vulnerable to various attacks. Sybil attack is one of them. Various defense techniques have been given by researchers. In this paper, the authors briefly explain those defense techniques,...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Automation of Software Cost Estimation using Neural Network Technique

    Software cost estimation is one of the most challenging tasks in software engineering. Over the past years the estimators have used parametric cost estimation models to establish software cost, however the challenges to accurate cost estimation keep evolving with the advancing technology. A detailed review of various cost estimation methods...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    A Policy and Trust-based Secure Communication Protocol in Information Systems

    Security in information systems has increased importance, as end users have become more responsive of securely sharing or exchanging the vast amount of information. The organizations that do sensitive work such as those with defense contracts, passport issuing agencies, military activities, and health care data at health-insurance, are in need...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Multilayer Intrusion Detection in MANET

    Intrusion detection system plays a major role in Mobile Adhoc NETwork (MANET). There are lots of attacks in MANET due to its vulnerabilities. Many Intrusion Detection System (IDS) like standalone IDS, Hierarchical IDS, Distributed IDS, cooperative IDS are available in MANET but still suffers due to multilayer attacks such as...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Generating the Best Fit Key in Cryptography using Genetic Algorithm

    The goal of network security is to provide a secure, effective and private communication between the sender and the receiver. In order to achieve a high level of security, data is sent in the encrypted form to its intended recipient. But, tampering with the text and eavesdropping have assumed colossal...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Comparative Analysis of Design Methodologies for Parallel FIR Filter

    The importance of DSP systems with low power, low area and high performance appear to be increasing with no visible sign of saturation. Digital filters play a vital role in digital systems where Finite Impulse Response (FIR) filters are one of the most widely used fundamental devices. This review paper...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Fast Detection Process for Downlink in LTE Networks

    In this paper, the authors introduce a simple detection method that gives a better performance with minimum computational complexity for the Long Term Evolution (LTE) mobile communication system. The LTE communication system has been simulated using MATLAB7 programming language. An approximated linear baseband model for the two modulation techniques used...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    PAPR Reduction in LTE Down Link using a Hybrid Repeated Clipping and SQRT Companding

    The orthogonal frequency division multiplexing is one of the widely used modulation techniques in the broadband wireless technology. One of the main problems of the OFDM is the high peak-to-average power ratio of transmitting signal due to the superposition of many subcarriers. This paper presents a new hybrid peak-to-average power...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    The Optimization of Inter cell Handover Dynamics in a GSM Network

    Efficient handover mechanism in a GSM network is one of the parameters critical to GSM network service quality i.e. Quality-of-Service (QoS) and customer satisfaction. Ongoing calls are being transferred through the process of handover from one cell to another as the users move through the coverage areas of the cellular...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Architecture based Comparison of Semantic Web Service Composition Processes

    Semantic web services development become rapidly increased as dynamic changes are occurred. Various approaches are adopted to develop composite service systematically. This paper aims to make development process easier by classifying the literature on web services composition based approaches like selection, discovery, orchestration, choreography, mediation and automatic composition to facilitate...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    A Survey on SVM Classifiers for Intrusion Detection

    Intrusion detection is an emerging area of research in the computer security and networks with the growing usage of internet in everyday life. An intrusion detection is an important in assuring security of network and its different resources. Intrusion detection attempts to detect computer attacks by examining various data records...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Comparison of Cache Page Replacement Techniques to Enhance Cache Memory Performance

    Caching is a very important technique for improving the computer system performance, it employed to hide the latency gap between memory and the CPU by exploiting locality in memory accesses. In modern computer architectures a page miss cause the several hundred CPU cycles. In a memory hierarchy, a cache performs...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Discovery of Fuzzy Hierarchical Association Rules

    A number of techniques have been developed to turn data into useful knowledge. Most of the algorithms in data mining find association rules among transactions using binary values and at single concept level. However it will be more exciting to discover hierarchical association rules for decision makers. In this paper...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    An Energy Efficient Clustering Algorithm based on Boundary Nodes Allocation for WSN

    Instead of various advantages of wireless sensor networks, there is always a constraint related to energy consumption resulting in reduced lifetime of a wireless sensor network. In this paper, an energy efficient algorithm is proposed considering allocation of boundary nodes, removing clashes among clusters while distributing nodes thereby reducing overall...

    Provided By International Journal of Computer Applications

  • White Papers // May 2013

    An Improved Algorithm for Bayes Classifier to Handle Correlated Attributes

    Classification can be defined as a target function which maps attribute value of objects to predefined class. One objective is to divide the objects into proper group and other objective is to predict the class of unknown records. Bayesian classifier classifies and predicts the class of objects on the basis...

    Provided By International Journal of Computer Applications

  • White Papers // May 2013

    Handling Missing Value in Decision Tree Algorithm

    Now-a-days all the decisions making and large data analysis is made using computer applications. In such kind of application the authors use the data mining techniques to analyses them. Different domains of research like management, engineering, medical, education are frequently using these techniques. Data mining in educational system is an...

    Provided By International Journal of Computer Applications

  • White Papers // May 2013

    Improvement of S-DES Technique by Use of Key Bunch Matrix and Randomizers

    In this modern age information sharing and transfer has increased exponentially. The information shared is vulnerable to unauthorized access and inception. Cryptography is used to provide secrecy in message transmission. The Simplified Data Encryption Standard or in short S-DES algorithm is used to encrypt messages to form secret text. The...

    Provided By International Journal of Computer Applications

  • White Papers // May 2013

    Implementing Swati Verma's Digital Signature Schemes based on Integer Factorization and Discrete Logarithms

    A digital signature is a cryptographic method for verifying the identity of an individual. It can be a process, computer system, or any other entity, in much the same way as a handwritten signature verifies the identity of a person. Digital signatures use the properties of public-key cryptography to produce...

    Provided By International Journal of Computer Applications