International Journal of Computer Applications

Displaying 2881-2920 of 6997 results

  • White Papers // Jun 2013

    Mapping Process of Relational Schema to OWL Ontologies Using XSLT

    One of the challenges of the semantic Web is to integrate the information already available on the standard Web, usually stored in relational databases. The authors propose in this paper a transformation process from existing relational database schema defined by a set of tables into OWL ontologies using XSLT. This...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    Enhancing Email Security by Signcryption Based on Elliptic Curve

    E-mail plays an important role in mankind communication. It is essential to provide security solutions for the secure transmission of email. The currently used protocols such as PGP and S/MIME are based on public key cryptography that involves huge computational costs due to key generation, key exchange and encryption. In...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    Web Spam Detection Using Timer with Ranking Technique

    Today, Web Spam is a very serious problem for search engine and for the user. The word Web Spam is the combination of two words i.e. Web and Spam. The word web contains thousands of web pages which are used by various search engines to answer the query of the...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    New Approach to Mitigate XML-DOS and HTTP-DOS Attacks for Cloud Computing

    Moving towards cloud computing is accelerating and businesses are trying to present their software in the cloud. Cloud uses SOA and web services to present always accessible services which raise up threats and vulnerabilities. Users need to access cloud from anywhere and this availability comes from presenting services as web...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    Reverse Host Allocation Approach for Virtual Machine Cloud Computing Environment

    Cloud Computing is one the latest and evolving technology in the coming times. It has evolved as a balloon filled up with immense potential of making the world bloom with its applications. Cloud provides them with the higher degree of capability by using its resources and fulfilling the needs of...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    Rules Based Enhancement in Cloud Intrusion Detection System Service

    In cloud environment, chances of intrusion are more with cultivation of intruder's attacks because cloud computing is internet based computing where virtual servers provide software, Platform, Infrastructure or other computing resources to customer on pay-as-you-basis. With increment in need of computing services of cloud computing, demand of security as a...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    Cloud Testing- Types, Service Platforms and Advantages

    The software testing is a oppugn for the IT industry to provide the quality product both for the system based or web-based applications. But the recent news of alleged breakdown of many web-based portals of financial institutions, banks and software companies' shows that something is definitely going wrong with the...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    An Implementation of MD5 Hash Algorithm for RFID Tags

    In this paper, the authors discuss RFID technology, and shows the implementation of MD5 hash algorithm for RFID tags to protect private data from counterfeiting and copying. Privacy and security of RFID tags are discussed and the implementation of this algorithm is shown. Authors present new technology of reading the...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    Performance Analysis of Decision Trees

    In data mining, decision trees are considered to be most popular approach for classifying different attributes. The issue of growing of decision tree from available data is considered in various discipline like pattern recognition, machine learning and data mining. This paper presents an updated survey of growing of decision tree...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    FPGA Implementation of Multistage Knapsack Public Key Cryptosystem

    In this paper, the authors present hardware implementation of multistage trapdoor knapsack public key cryptosystem which is primarily based on Merkle-Hellman scheme. So far, multistage knapsack is not broken and there has not been known a specific attack against this system. Modular multiplier is the critical and fundamental part of...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    Cooperative Bit-Compressed Authentication Scheme Against Compromised Node Attacks in Wireless Sensor Networks

    Sensor nodes deployed at hostile environments suffer compromise node attacks, in which an adversary injects counterfeit data into the sink causing error detection at upper level and energy wastage in en-route sensor nodes. A novel authentication scheme known as, Cooperative Bit-compressed Authentication (CBA) is based on random graph characteristic of...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    Cryptanalysis of Blind Signature Schemes

    Security of the consumer's data over internet is the major problem in present time. In this paper, the authors have analyzed blind signature schemes based on RSA and with taking advantage of elliptic curve cryptography to achieve the security goals. Blind signature scheme is one of the security protocol to...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    Mining Positive and Negative Sequential Pattern in Incremental Transaction Databases

    Positive and negative sequential patterns mining is used to discover interesting sequential patterns in a incremental transaction databases, and it is one of the essential data mining tasks widely used in various application fields. Implementation of this approach, construct tree for appended transactions and will merge this tree with existing...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    Knowledge Mapping Evolution Guided by Data Mining

    Preserve knowledge, retain know, these are the objectives of a scalable company. The knowledge mapping is graphical techniques which allows preserve and visualize the strategic heritage of the acquired know-how during the years. The authors use Data mining techniques to exploit the different sources of data and to improve the...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    A Vulnerable Scoring Through Code-Based Cloud Storage System with Sheltered Data Forwarding

    Cloud Storage System has a collection of storage servers provides long-standing storage services over the internet. Data privacy becomes a major concern in cloud storage system because user stores their data in third party cloud system. An encryption scheme available for data privacy but it limits the number of functions...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    Performance Analysis and Classification of Clone Attack Detection Procedures in Mobile Wireless Sensor Networks

    Regarding accelerating development of mobile sensor nodes technology, increasing the utilization of them, and also facing with security challenges in these networks; specially clone nodes attack, this paper focuses on exploiting optimum criteria of node clone intrusion detection procedures in mobile wireless sensor networks by using experimental analysis of procedures....

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    Performance Comparison Between Relational and Object-Oriented Databases

    An Object-Oriented database can utilize the benefits of both the design and implementation of any application. Due to the increased popularity of database systems many new database systems based on varying data model and implementation have entered in the market. Database systems have complex architecture but they are the key...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    Development of Prolog for Database Management System

    The authors know that PROLOG is one of the most popular languages based on an inference mechanism and many expert systems are implemented in PROLOG. In this paper, they have selected this language to express the rules and a PROLOG interpreter and its uses as an inference mechanism, taking the...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    Bluetooth Communication Using Hybrid Encryption Algorithm Based on AES and RSA

    A hybrid encryption algorithm based on AES and RSA is proposed to enhance the security of data transmission in Bluetooth communication. E0 algorithm is currently used in transmission of data via Bluetooth between two or more devices. E0 is a 128-bit symmetric stream cipher used in the Bluetooth protocol. Several...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    Data Dashboard-Integrating Data Mining with Data Deduplication

    Many applications deal with huge amount of data and that scattered data needs to be transformed into something relevant and meaningful. To make sense of such data is the need of many applications and areas of technology. The data that is already present is very huge, noisy and has a...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    A Novel Approach to Improve Invisibleness and Robustness of a Digital Watermark in Copyright Protection

    Rapid penetration of internet and advancements in communication technology is a paved way to easy access of digital images. Nevertheless, these advancements also create ways for malicious users to pirate and sell the copyrighted content. Digital watermarking techniques have been deployed in combating the piracy issue. The current digital watermarking...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    FP-Tree Based Association Rule Mining in Academic Social Networks to Refine RDF Framework and FOAF

    In order to analyze large scale social networks, different strategies are being implemented. The traditional methods of data mining are getting transformed to be suitable to the requirements of the web based information available in different structured and unstructured formats. The process of web mining, a versatile methodology of data...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    Multiprotocol Gateway for Wireless Communication in Embedded Systems

    In recent times, various types of devices have used wireless technologies such as RF, GSM, Bluetooth and ZigBee, to give innovative means to embedded systems design. The interoperability among wireless protocols on embedded system devices can avail the user numerous functions that maximize the height of usability. Its realization will...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    A Novel Framework for Virtual Desktop Environment with vApp

    Virtualization technology is transforming today's IT community, offering new possibilities to improve the performance and efficiency of IT infrastructure by a dynamic mapping of the PC resources, enabling to run several applications and operating systems on a single physical system. Virtualization also offers elevated ease of use and error recovery...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    Modeling and Simulation of 2D Mesh Topological Network on Chip (NOC)

    Network-on-Chip (NOC) architecture is an approach to develop large and complex systems on a single chip. In this paper, 2D mesh topological structure has been implemented in Very High speed integrated circuit hardware Description Language (VHDL). The architecture supports physical and architectural level design integration. Basic communication mechanism between resources...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    Systematic Approach in Building Clock Tree for SOC's

    System-on-Chip (SOC) design is defined as an IC, designed by arranging all individual VLSI designs so as to get full functionality for an application. The biggest problem, the authors faced in designing clock trees is skew minimization. The reasons that add to clock skew include loading mismatch at the clocked...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    Low Power BiCMOS SRAM Using 0.18'm Technology

    Rapid advances in the field of very large scale system designs brought memory circuits are continuously regulated and in turn, more number of cells could made possible to integrate on small chip. CMOS technology prove boon to memory circuits, which replaced the most of complex circuits to simpler circuits. But...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    Parallel K-Means Clustering for Gene Expression Data on SNOW

    The exponential growth in the amount of data brings in new challenges for data analysis. Gene expression dataset is one such type of data necessitating analytical methods to mine patterns implicit in it. Although clustering has been a popular way to analyze such dataset, the increase in size of dataset...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    Recommender System: Review

    One of the major data mining applications is Recommender System. It is the intelligent system that basically investigate the dataset present in existing system and based on which it will give some suggestions to the user regarding further process. In this paper, the authors discuss various techniques proposed for recommendations...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    Auction for License Management in Cloud Computing Environment

    Cloud computing is a recent technology for computing through a virtual environment. In cloud computing resources are provided virtually for computation, storage and developing application. To access these resources user will have to take an authentication from the cloud service provider. To get authentication user will have to provide some...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    Consumer Trust Model in Online Transaction

    The problem of online trading is lack of trust. Usually it results into difficulty in online transaction between buyer and seller. Trust is defined as willingness of a person to be vulnerable in a circumstance that they cannot control with the positive expectation that the trustee will not take undue...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    A SRAM Memory Cell Design in FPGA

    In this paper, the authors design a memory cell in Field Programmable Gate Array (FPGA) that consumes lesser power with reduced delay constraint. In the existing system, the FPGA is based on 10T Static Random Access Memory (SRAM) cell configuration in which power consumption is relatively high. The proposed paper...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    The Role of Business Process Model in Customer Centric eGovernment System

    The development of customer centric eGovernment systems, for better services and reliable information to citizen, is increasing in developed and developing countries as part of eGovernment initiatives. This paper provides an opportunity to redesign government processes and also to improve efficiency and effectiveness within government institution. A review of literature...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    SRAM Cell Performance in Deep Submicron Technology

    In this paper, the authors deal with the design opportunities of Static Random Access Memory (SRAM) for lower power consumption and propagation delay. Here, they have analyzed both read margin for read ability and write margin for SRAM write ability. Static noise margin affects both read margin and write margin....

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    Analyzing the Effect of Various Fading Models on MANET Routing Protocols

    Wireless technologies are getting immense popularity, as new devices like PDAs, tablets and laptops are getting affordable to people. These devices comprehend the use of internet and other LAN services using various wireless standards. One of these standards is IEEE 802.11, and this standard uses routing protocols other than conventional...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    A Reactive Energy-Alert Algorithm for MANET and Its Impact on Node Energy Consumption

    Mobile Ad-hoc NETworks (MANETs) are self organized networks whose nodes are free to move randomly while being able to communicate with each other without the help of an existing network infrastructure. In MANET, the routing protocols have to route the packets depending on the MANET constraints such as battery power...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    An Unconditionally Stable Front End Low Noise Amplifier Design for 2.4 GHz ISM Band

    In this paper, the authors present the design and simulation of a 2.4 GHz ISM band front end single stage Low Noise Amplifier (LNA) for wireless transceiver system. This amplifier uses AVAGO ATF-54143 transistor which is a low noise and high dynamic range Pseudomorphic high electron mobility transistor. The proposed...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    Performance Evaluation of Scheduling Services for VoIP in WiMAX Networks

    WiMAX is a high speed, wireless broadband access technology for large coverage area. It provides IP based connectivity to the stationary, mobile as well as nomadic users. Voice over Internet Protocol (VoIP) through WiMAX is the most prominent telecommunication service. In this paper, simulative investigations have been done for VoIP...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    Patch Loaded DRA for Broadband WLAN Applications

    Over the past few years' researchers were focusing on investigations of Dielectric-Resonator Antenna (DRA) technology as an alternative to traditional antennas due to its high radiation efficiency, lightweight, small size, low profile and low dissipation loss. A wideband patch loaded Dielectric Resonator Antenna (DRA) is discussed here. The rectangular ring...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    Cluster Based Channel Model and Performance Analysis for MIMO Satellite Formation Flying Communication Systems

    Satellite formation flying is an essential capability for many space missions that allow several closely spaced smaller satellites to be deployed. Depending on mission requirements, the ground receive station may carry several antennas and receive signal from each of the satellites in order to increase spectral efficiency and Quality of...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Performance Analysis of Mobile Memory with Optimization

    As it known that mobile phones has low end configuration so the authors need memory optimization and network bandwidth reduction. These are very important factor for mobile developer because storage memory is very limited ranging from 64K to 200K bytes and the heap memory is ranging from 200K to500K bytes....

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Study of Various Decision Tree Pruning Methods with Their Empirical Comparison in WEKA

    Classification is important problem in data mining. Given a data set, classifier generates meaningful description for each class. Decision trees are most effective and widely used classification methods. There are several algorithms for induction of decision trees. These trees are first induced and then prune sub-trees with subsequent pruning phase...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Resource Management Schemes for QoS in Hybrid Wireless Networks

    The Hybrid Wireless Network (HWN) such as WLAN, Cellular, ad hoc networks is not only used for transferring voice but also to support data, video and multimedia. In addition, the key issues pertaining to the hybrid networks are managing radio resources, increased successful handover rate and routing management. Although researchers...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Performance Analysis in Dynamic VLR based Location Management Scheme for the Omni Directional Mobility Movement for PCS Networks

    Location management plays an important role in guaranteeing the effective operation of Personal Communication services (PCS). In this paper a dynamic VLR (Visitor Location Register) based location management is introduced for PCS networks. In this, MSC gathers the details about Mobile Terminals (MT) and performs location registration. This scheme is...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Hybrid Optimized Back Propagation Learning Algorithm for Multi-Layer Perceptron

    Standard neural network based on general back propagation learning using delta method or gradient descent method has some great faults like poor optimization of error-weight objective function, low learning rate, instability .This paper introduces a hybrid supervised back propagation learning algorithm which uses trust-region method of unconstrained optimization of the...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Taxonomy Based Data Marts

    The aim of this paper is to depict new approach called taxonomy based data marts which add a new layer for the categorization of the queries using data warehouse which is the database that contains data relevant to organization information and respond quickly to multi dimensional analytical queries. The new...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Path Planning in Swarm Robots Using Particle Swarm Optimisation on Potential Fields

    This paper presents a novel implementation of Particle Swarm Optimization (PSO) for finding the most optimal solution to path planning problem for a swarm of robots. The swarm canvasses through the configuration space having static obstaclesby applying PSO on potential fields generated by the target. The best possible path by...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    FPGA Based High Speed Double Precision Floating Point Divider

    Floating point arithmetic is widely used in many areas, especially scientific computation and signal processing. For many signal processing, and graphics applications, it is acceptable to trade off some accuracy (in the least significant bit positions) for faster and better implementations. Division is the third basic operation of arithmetic. However,...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    A Comparative Study for Optimization of Video File Compression in Cloud Environment

    Many organizations like hospitals for telemedicine, journalism for live-telecast and academies are using a service video-on-demand for delivering the lectures and research contents to the remote locations across the globe. The videos to be broadcasted are time and resource consuming due to the large amount of data and due to...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Handoff Mechanism Using Spectrum Pool

    In this paper, spectrum pool is one of the efficient techniques for spectrum sensing selection. Cognitive radio always preferred for accessing free channels efficiently with minimum handoff delay .The performance of spectrum pool has been implemented and compared with conventional handoff mechanism. Spectrum handoff occurs when primary user appears and...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    A Fast Approach to Clustering Datasets Using DBSCAN and Pruning Algorithms

    Among the various clustering algorithms, DBSCAN is an effective clustering algorithm used in many applications. It has various advantages like no a priori assumption needed about the number of clusters, can find arbitrarily shaped clusters and can perform well even in the presence of outliers. However, the performance is seriously...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    K-Nearest Neighbor Classification Approach for Face and Fingerprint at Feature Level Fusion

    Biometric system that based on single biometric called uni-modal biometrics usually suffers from problems like imposter's attack or hacking, unacceptable error rate and low performance. So the need of using multimodal biometric system arises in such cases. The aim of this paper is to study the fusion at feature extraction...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    An Efficient Security Model in Cloud Computing Based on Soft Computing Techniques

    In recent years, Cloud computing is one of the most attractive technological research area because of its flexibility as well as cost efficiency. Generally in a cloud the data are transferred among the client and the server. While the transferring of the data takes place, security becomes the major concern....

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Learning Quality and Speed in Networks of Neurons and Knowledge of Behavior Problems

    This paper introduced to the basic tasks to increase the speed networks and neurons and important way for optimal training and focus on solving problems and improving the quality and increasing efficiency. And focusing on the self-sufficiency of the work leads one to know the mistakes and determined and do...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Exploitation of Cross-Site Scripting (XSS) Vulnerability on Real World Web Applications and Its Defense

    Attacks on web applications are growing rapidly with the opening of new technologies, HTML tags and JavaScript functions. Cross-Site Scripting (XSS) vulnerabilities are being exploited by the attackers to steal web browser's resources (cookies, credentials etc.) by injecting the malicious JavaScript code on the victim's web applications. The existing techniques...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Performance Analysis of MPI (mpi4py) on Diskless Cluster Environment in Ubuntu

    Now-a-days Cluster computing has become a crying need for the processing of large scale data. For computing large amount of data, which need huge execution time, the run time can be reduced using multiple processors and task distribution through cluster computing. It is the technique of sharing two or more...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    An Algorithm to Evaluate Iceberg Query Using Compacted Bitmap Vector

    The data storing and retrieving are playing a major role in the data clustering and data warehousing techniques. The effectiveness of a data retrieving method depends upon the data specific queries for retrieving the data from the database. Iceberg query is a unique class of aggregation query, which computes aggregate...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Defect Prediction for Object Oriented Software Using Support Vector Based Fuzzy Classification Model

    In software development research, early prediction of defective software modules always attracts the developers because it can reduces the overall requirements of software development such as time and budgets and increases the customer satisfaction. In the current context, with constantly increasing constraints like requirement ambiguity and complex development process, developing...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    New Component Composition Metrics for Component Based Software Development

    Component Based Software Engineering (CBSE) is an environment which uses software components as main building block during designing and creation of a software system. A Component is a software entity with independent identity which has a perceptible reusable interface. This property motivates the programmer to design and develop Software using...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Intelligent Security System with Wireless Sensors

    Wireless sensor networks emphasize in most of the real world applications such as military applications, medical field and home appliances and so on. Sensors used in such applications do not provide any confidentiality, however it is been used in almost all the areas in user's day-to-day life. Usually sensors were...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Online Cleaning of Wireless Sensor Data Resulting in Improved Context Extraction

    Wireless Sensors enable fine grain monitoring of activities of individual and social interest. Typically these sensors sense & send data continuously directly or through other sensor nodes to a base station. Wireless Sensor Data are inherently noisy and have frequent random spikes due to dynamic nature of the medium. Hence,...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    An Overview of PAPR Reduction Techniques in OFDM Systems

    OFDM is an attractive signaling scheme for communication systems and adopted in many wireless standards. One of the challenging issues for OFDM system is its high Peak-to-Average Power Ratio (PAPR) which limits its applications in communication systems. In fact, the PAPR problem is one of the most detrimental aspects in...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    PAPR Analysis of FFT and Wavelet Based OFDM Systems for Wireless Communications

    OFDM is an efficient modulation technique for wideband digital communication and adopted in many wireless standards. A major drawback of OFDM modulation is the high Peak-to-Average Power Ratio (PAPR) of the transmitted signal which limits its applications in communication systems. Traditionally, OFDM is implemented using FFT. On the other hand,...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Reliable Geographic Routing Protocol (RGRP) Towards Improving Quality of Service (QoS) in Heterogeneous Mobile Ad Hoc Networks

    Developing Quality of Service (QoS) aware routing protocol is an ever demanding task for Mobile Ad hoc NETworks (MANETs). This research aims in developing Reliable Geographic Routing Protocol (RGRP) towards improving Quality of Service (QoS) in heterogeneous MANET. RGRP is an adaptive on-demand geographic routing protocol which builds efficient paths...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Cost-Throughput Analysis of a Modified TCP for Optical Burst Switched Networks

    Performance of existing TCP implementations over Optical Burst Switched (OBS) networks is not satisfactory, as they suffer from false congestion detection. As the contention induced losses are more common than congestion induced losses in OBS, the TCP reduces the congestion window even when there is no congestion. This effect, in...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Advanced Partial Image Encryption Using Two-Stage Hill Cipher Technique

    Information security is a fast growing research field which includes numerous problems in it. Partial image encryption is one of the important problems in the field of image information security. This paper describes the partial image encryption in two ways using hill cipher technique. First encryption technique uses two slightly...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Improving Throughput of RC4 Algorithm Using Multithreading Techniques in Multicore Processors

    RC4 is the most widely used stream cipher around. So, it is important that it runs cost effectively, with minimum encryption time. In other words, it should give higher throughput. In this paper, a mechanism is proposed to improve the throughput of RC4 algorithm in multi-core processors using multithreading. The...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Filter Augmented JPEG Algorithms: A Critical Performance Study for Improving Bandwidth

    In the recent years, use of Digital Image Communication has increased exponentially in the day to day activities. Joint Photographic Experts Group (JPEG) is the most widely used still image compression standard for bandwidth conservation. In this paper, it is proposed and critically studied a new set of JPEG Compression...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    AntMeans: A New Hybrid Algorithm Based on Ant Colonies for Complex Data Mining

    The artificial learning is a scientific discipline that covers many aspects of study in mathematics, statistics and algorithms. The techniques of artificial learning have been widely used in extracting knowledge from data, but the authors are now facing new challenges "Complex data." The improvement of data mining techniques has become...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Priority Based Distributed Job Processing System

    This paper proposes a framework for implementing a Priority Based Job processing system that has the capability to specify the priority of a job at the time of submission, execute the job at as per the priority at the job processor end. The framework will scale horizontally as well as...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Hybridize Dynamic Symmetric Key Cryptography Using LCG

    In the present paper, a block cipher is presented which deals with a dynamic symmetric key cryptographic method using substitution and transposition technique. In this paper a dynamic secret key is generated using Linear Congruential Generator (LCG). The striking feature of the present work is creation of a new secret...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Slot Coupled Ultra Wideband and Multiband Monopole Antennas for Wireless Applications

    This paper presents a CPW fed capacitive coupled circular shaped monopole antenna. Ground dimensions of the geometry are used to tune the proposed antenna's input impedance (impedance bandwidth). Furthermore, these ground dimensions can be used to make antenna operating either in ultra wideband or multiband mode. Besides these dimensions, the...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Classification of Task Partitioning and Load Balancing Strategies in Distributed Parallel Computing Systems

    Distribution of the tasks amongst the various computing nodes is itself an intellectually challenging problem in the high performance distributed computing systems. To choose the appropriate strategy for the required system is difficult without the meaningful comparison of the existing task partitioning and load balancing strategies. The effectiveness of the...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Efficient Migration - A Leading Solution for Server Consolidation

    Server consolidation of virtual machines is very much essential in a cloud environment for energy conservation and cost cutting .Consolidation can be achieved through live migration of virtual machines. The authors propose a modified bin packing algorithm for Server Consolidation that avoids unnecessary migrations and minimizes the instantiation of new...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    QoS Aware Power Efficient Multicast Routing Protocol (QoS-PEMRP) with Varying Mobility Speed for Mobile Ad Hoc Networks

    Power efficient multicast routing is one of the key issues in the field of mobile ad hoc networks. Multicasting is a term which refers to delivering data packets to a group of mobile nodes from an intended source. Quality of Service enlarges the support level of predictable performance for network...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Reliable Peer Discovery in Content-Aware Overlay Network

    Peer to Peer (P2P) file sharing protocol and ad hoc wireless routing protocol shares many intriguing similarities even though they operate on a totally different level of a network. With the popularity of P2P application for resource sharing and the availability of resources has motivated the researchers to examine the...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    An Agent-Based Decision Model for Electronic Payment System

    Customers agent sent into the network for shopping are always faced with some complex choices of products, prices and brands. This paper presents a supporting scheme to solve the problems faced by agent in decision making in purchasing online products. The authors' model consist consists of negotiating semantic for customer...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Contract (Akad) in Online Banking

    Internet banking is the latest alternative used by the client to deal with the bank. In this way, the customer can surf the bank website without the hassles of queuing and waiting at the counter. This paper will discuss about Internet banking services in terms of Islamic transaction. Where, this...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Analytical Comparison of Symmetric Encryption and Encoding Techniques for Cloud Environment

    Cryptography in the field of information technology is an art to protect data privacy using standard mathematical techniques. Cloud computing, one of the emerging techniques to lease computing resources on demand, makes use of remote data storage where data owner does not possess direct control over her data. To protect...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Content Based Image Retrieval Using Clustering

    This paper presents novel techniques for image retrieval using the clustering features extracted from images based on Row Mean Clustering, Column Mean clustering, Row Mean DCT Clustering, Column Mean DCT Clustering, Row Mean Wavelet Clustering and Column Mean Wavelet Clustering. The proposed techniques are compared with well known traditional technique...

    Provided By International Journal of Computer Applications