International Journal of Computer Applications

Displaying 281-320 of 4117 results

  • White Papers // Feb 2014

    Obfuscrypt: A Novel Confidentiality Technique for Cloud Storage

    In today's IT industry, the more sophisticated data storage is cloud storage. Cloud storage mainly helps Small and Medium scale Enterprises (SMEs) to reduce their investments and maintenance of storage servers. Most of SMEs are outsourcing their data to cloud storage. Users' data that are sent to the cloud have...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    Design of a Dual Signature Scheme Using ECDSA in Set Protocol

    Dual signature is a significant modernization of SET protocol. The function of the dual signature is to guarantee the authenticity and integrity of data. It links two messages wished-for for two different recipients In this case; the customer wants to send the Order Information (OI) to the trader and the...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    Cluster Based Event Driven Routing Protocol (CERP) for Wireless Sensor Network

    Energy efficiency is the main challenge in wireless sensor network. Many routing protocols have been designed to face this challenge. Hierarchical cluster-based routing is one of the efficient techniques to route the sensed data from source node to sink node. The proposed algorithm deals with cluster formation based on different...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    An Effective Way of Using LSB Steganography in Images Along With Cryptography

    Hiding data is a very important thing nowadays as the data travels over various unsecure networks. To avoid this problem cryptography is used which hides the data or scrambles the users' message, but cryptography alone cannot provide total security as the message is still available to perform cryptanalysis. Steganography hides...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    A New Method to Create the Profile and Improving the Queries in Web

    Finding needed information among the existing information on the web can be very time consuming and difficult. To tackle this problem, web personalization systems have been proposed that adapt the contents and services of web sites based on the users' interests. Studying users' behaviors in the past with web usage...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    An Enhanced Approach for Face Recognition of Newborns Using HMM and SVD Coefficients

    The problems of newborn's abduction, mixing, swapping, etc. are increasing day-by-day. This problem has now reached a global aspect, as the consequences have now become critical. The researches performed to meet the challenge are very few. The growing problem motivated a need of sustainable system that can assist the hospital...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    Job Scheduling Problem with Fuzzy Neural Network by Using the MapReduce Model in a Cloud Environment

    Cloud computing is a solution for processing large amounts of data. Therefore, Google introduced map reduce as a programming model for large scale data applications in the cloud environment. Map reduce is used for data processing and parallel computing. The Apache Hadoop is open source implementations of map reduce. However...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    Cooperative Gray Hole Attack Discovery and Elimination Using Credit Based Technique in MANET

    A MANET (Mobile Ad-hoc NETwork) is a network of mobile devices in a self-configuring and infrastructure less environment. The devices in MANET are linked by wireless medium. There are big chances of attacks in MANET due to its natural features including dynamically changing network topology, open medium, no centralized monitoring...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    Triple Indexing: An Efficient Technique for Fast Phrase Query Evaluation

    Phrase query evaluation is an important task of every search engine. Optimizing the query evaluation time for phrase queries is the biggest threat for the current search engine. Usually, phrase queries are a hassle for standard indexing techniques. This is generally because, merging the posting lists and checking the word...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    Privacy Preservation of Mobile Data Using Matrix Transformation

    Data leakage from mobile phones and LBS is increasing with the exponential growth of technology, resulting in an innate risk of privacy threats. To address this issue, a novel method to protect user privacy is proposed in this paper. The proposed algorithms, namely SSET and SIMET, provide efficient means to...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    A Co-Operative Game Theoretic Approach to Improve the Intrusion Detection System in a Network Using Ant Colony Clustering

    Making a network foolproof is a very important task that every Intrusion Detection System should provide to the network. Areas of deployment of IDS are also an important task that helps in efficient functioning of the system. Deploying the IDS in all the systems is a very inefficient strategy that...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    Knowledge Discovery from Static Datasets to Evolving Data Streams and Challenges

    Mining data streams has recently become an important active research work and more widespread in several fields of computer science and engineering. It has proven successfully in many domains such as wireless sensor networks, ATM transactions, search engines, web analysis and weather monitoring. Data steams can be considered a subfield...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    An Acknowledgement Based Intrusion Detection System Using ECDSA for Detecting Malicious Node in MANET

    Mobile Ad-hoc NETwork (MANET) is a group of wireless mobile nodes generating a network not by using any existing infrastructure. MANET is a collection of mobile nodes equipped with a wireless-transmitter and receiver that in contact with each other via bi-directional wireless links either directly or indirectly. An encroachment detection...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    An Algorithm for Automated View Reduction in Weighted Clustering of Multiview Data

    Clustering multiview data is one of the major research topics in the area of data mining. Multiview data can be defined as instances that can be viewed differently from different viewpoints. Usually while clustering data the differences among views are ignored. In this paper, a new algorithm for clustering multiview...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    A Trustworhty Model for Reliable Cloud Service Discovery

    Cloud computing is a new model for delivering new applications and services. Its adoption is gaining ground because most of the services provided by the cloud are of low cost and readily available for use. Despite many promises by the cloud service providers, users remain much concerned about the general...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    PSO Based Multidimensional Data Clustering: A Survey

    Data clustering is considered as one of the most promising data analysis methods in data mining and on the other side k-means is the well known partitional clustering technique. Nevertheless, k-means and other partitional clustering techniques struggle with some challenges where dimension is the core concern. The different challenges associated...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    A Novel Secure Remote User Authentication Protocol Using Three Factors

    According to the recent work done in the area of remote user authentication, biometrics based password authentication using smart card is the most interesting and upcoming technology. Many protocols has been designed aiming to combine three authentication factors efficiently in order secure the process of remote user authentication, but failed...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    Web Service Business Policy Customization through Finite State Machine based Semantic Representation

    In this paper, the authors propose a Finite State Machine (FSM) based approach for web service business policy customization that can address two key challenges: automated policy detection and evaluation and dynamic web service deployment. They have applied this technique on insurance domain in order to customize insurance policies for...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2014

    Classification of Documents Using Effective Pattern Taxonomy

    Text mining is a technique helps users in extracting useful information from large amount of database available digitally on web or text data. Pattern taxonomy based model containing sequential pattern used to perform the task. EPT (Effective Pattern Taxonomy) method helps in extracting useful patterns in the text documents by...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2014

    Text Mining Methods and Techniques

    In recent years growth of digital data is increasing, knowledge discovery and data mining have attracted great attention with coming up need for turning such data into useful information and knowledge. The use of the information and knowledge extracted from a large amount of data benefits many applications like market...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2014

    An Efficient Feature Selection Technique Using Supervised Fuzzy Information Theory

    The feature selection is one of the key processes for knowledge acquisition. Some data set is multidimensional and larger in size. When this data set is used for classification it may end with wrong results and it may also occupy more resources especially in terms of time. Most of the...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2014

    Network Intrusion Detection Using Semi Supervised Support Vector Machine

    The use of internet is growing bit by bit and therefore huge amount of security threats faced in front of computer network system. Due to these threats secrecy of the information which is available in the network system is highly affected. To protect the users' network system from these threats,...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2014

    Wavelet Based Artificial Light Receptor - A Feature Extraction Model for Face Recognition

    In this paper, the authors present a novel biologically inspired and wavelet based model for extracting features of faces from face images. The biological knowledge about the distribution of light receptors, cones and rods, over the surface of the retina, and the way they are associated with the nerve ends...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2014

    Automatic Accident Alert and Safety System Using Embedded GSM Interface

    The system envisioned is an automatic collision detection and warning system relying on GPS module and a GSM modem. The vehicle to be safeguarded is to be fitted with the system sturdily ensuring good mechanical coupling with the entire chassis. In the case of an accident the system detects it...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2014

    Techniques to Detect Spammers in Twitter- A Survey

    With the rapid growth of social networking sites for communicating, sharing, storing and managing significant information, it is attracting cybercriminals who misuse the Web to exploit vulnerabilities for their illicit benefits. Forged online accounts crack up every day. Impersonators, phishers, scammers and spammers crop up all the time in Online...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2014

    Data Mining Model for Money Laundering Detection in Financial Domain

    One of the likeliest problems faced by the banks is the way the nature of money transaction takes place is not always known to the bank. One such problem consisting large amounts of money transferring through various accounts by the same person or entity is money laundering. Money laundering system...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2014

    RAID 5 Installations on Linux and Creating File System

    RAID is basically for two things. First is to increase the performance by striping data across multiple drives, thus it can allow multiple drives to supply or take data stream simultaneously. Second it can replicate data across multiple drives to supply so it reduces the risk associated with single failed...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2014

    Cloud Data Storage Security Techniques and Security Issues on Mobile Device

    Cloud computing is the new technology of the networking. User's data is stored on the cloud storage servers maintained by service provider. Cloud computing is a revolution which has made world of internet more like a place of dynamic storage. It has made a lot of changes in infrastructure side....

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2014

    Bridging the Performance Gap Between Manual and Automatic Compilers with Intent-Based Compilation

    In spite of years of research in automatic parallelization, progress has been slow in terms of tools that can consistently generate scalable, portable and efficient code for multiple architectures. Moreover, a substantial difference in efficiency exists between code generated automatically and code generated by an expert programmer. Although the fact...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2014

    Web Query Processing Approaches - A Survey and Comparison

    World Wide Web (WWW) or simply web is interconnection of hypertext documents through internet and accessed with the help of web browser. There are varieties of web browsers now available through which one can access web search results that may yield text, image, videos and other multimedia. The web search...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2014

    AN Effective Parallel XML Fuzzy Query Processing

    Representation and handling of inexactness in information has become the major issues in modern database system and next generation information systems. In order to deal with the information inexactness, fuzzy logic is integrated with various database model and theories. This paper presents a query processing model could coupled with fuzzy...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2014

    Adaptation of Cuckoo Search for Documents Clustering

    Automatic clustering of unstructured documents has become an essentially indispensible task, especially when dealing with the increasing electronic documents. Automatic clustering of documents involves document designation to a sub-group based on its content. K-means is one of the most popular unsupervised clustering algorithms, though the quality of its results relies...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2014

    Secure Data Hiding in H.264/AVC10 Video Using Intra Pulse Code Modulation Macro Block

    H.264 is well known compression standard for raw video. Data hiding using general techniques will not sustain under this scheme. The authors propose a data hiding approach in IPCM block. Where these IPCM encoded macro blocks are modified in order to hide the desired data. In general video, the numbers...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2014

    Attributes Selection for Predicting Students' Academic Performance using Education Data Mining and Artificial Neural Network

    Education data mining plays an important role in predicting students' performance,. It is a very promising discipline which has an imperative impact. In this paper students' performance is evaluated and some attributes are selected which generate rules by means of association rule mining. Artificial neural network checks accuracy of the...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2014

    Asymmetric Key-Value Split Pattern Assumption Over MapReduce Behavioral Model

    Actual quantifiability is a concept in MapReduce that is based on two assumptions: every mapper is cautious, i.e., does not exclude any reducer's key-value split pattern choice from consideration, and every mapper respects the reducer's key-value split pattern preferences, i.e., deems one reducer's key-value split pattern choice to be infinitely...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2014

    A Schematic Analysis on Selective-RDF Database Stores

    RDF has gained great interest in both academia and industry as an important language to describe graph data. With the increasing amount of RDF data which is becoming available, efficient and scalable nowadays has become a challenge to achieve the semantic web vision. The RDF model has attracted the attention...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2014

    Web Usage Mining: An Approach

    PL-WAP tree mining algorithm was a great improvement over the WAP tree algorithm which was earlier used for mining in the server web logs. This was basically done to find out frequent sequence patterns. In WAP-tree mining, the authors used to engage in continuous reconstruction of intermediate WAP trees for...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2014

    Preparing Data Sets for the Data Mining Analysis Using the Most Efficient Horizontal Aggregation Method in SQL

    A huge amount of time is needed for making the dataset for the data mining analysis because data mining practitioners required to write complex SQL queries and many tables are to be joined to get the aggregated result. The traditional SQL aggregations prepare the data sets in vertical layout that...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2014

    Security Related Risks and their Monitoring in Cloud Computing

    Cloud services is one of the most rapidly growing services over internet, which at the same time also faces serious security challenges. Recently, several cloud-storage service providers started to provide encryption protection to client data in the cloud. However, encryption imposes significant limits on data. In this paper, the authors...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2014

    Error Evaluation on K- Means and Hierarchical Clustering with Effect of Distance Functions for Iris Dataset

    In data clustering (a sub field of data mining), k-means and hierarchical based clustering algorithms are popular due to its excellent performance in clustering of large data sets. This paper presents two different comparative studies which includes various data clustering algorithms for analyzing best one with minimum clustering error. The...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2010

    A Vision Based Hand Gesture Interface for Controlling VLC Media Player

    Human Computer Interaction can acquire several advantages with the introduction of different natural forms of device free communication. Gestures are a natural form of actions which the authors often use in user's daily life for interaction, therefore to use it as a communication medium with computers generates a new paradigm...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2010

    Performance Analysis of a Novel Double Error Correcting Code for Image Transmission Over UWB Channel

    In the previous correspondence the authors introduced a binary double error correcting long code (8 2 5), for 100% data correction. This paper evaluates the BER performance of UWB system using (8 2 5) code over UWB (SV) channel for image transmission. The simulation results presented here uses BPSK, as...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2010

    An Analytical Study on Knowledge Sharing in Web Based Education

    The focus of Higher Education (HE) in the present scenario is global based and it has been growing appreciably facing challenges in the process of evolving as a commercial one. This global approach has created awareness amongst HE institutions to revamp their methodologies in teaching and related issues. In the...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2010

    A Novel Progressive Sampling Based Approach for Effective Mining of Association Rules

    Mining Association Rules from huge databases is one of the important issues that need to be addressed. This paper presents a new sampling based association rule mining algorithm that uses a progressive sampling approach based on negative border and Frequent Pattern Growth (FP Growth) algorithm for finding the candidate item...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2010

    Web Cache Optimization in Semantic Based Web Search Engine

    With the tremendous growth of information available to end users through the Web, search engines come to play ever a more critical role. Nevertheless, because of their general-purpose approach, it is always less uncommon that obtained result sets provide a burden of useless pages. The next-generation Web architecture, represented by...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2010

    A New Grid Architecture Using JMF for Video-On-Demand Applications

    Grid computing was used only in scientific laboratories for many years. Only during the last few years, it is evolving into a business-innovating technology that is driving commercial adoption. In this paper, a Grid-based multimedia application for the distributed tailoring and streaming of media files is proposed. An innovative multimedia...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2010

    Exploiting Need of Heterogeneous Data Mining Environment Based on Mobile Computing Environments

    Today the concept of Data Mining services is not alone sufficient. Data mining services play an important role in the field of Communication industry. Data mining is also called knowledge discovery in several database including mobile databases and for heterogeneous environment. In this paper, the authors discuss and analyze the...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2012

    An Efficient and Secure Nonlinear Programming Outsourcing in Cloud Computing

    Cloud Computing provides a appropriate on-demand network access to a shared pool of configurable computing resources which could be rapidly deployed with much more great efficiency and with minimal overhead to management. This paper deals with the secure outsourcing of nonlinear programming. It provides a practical mechanism design which fulfils...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    A Compendium on Service Oriented Architecture and Service Level Agreements

    Service Oriented Architecture provides an effective application integration and on-demand services provision. It supports loose coupling structure of the services which provides effective service management and also effective usage of the existing services. SOA gives strong support to business Innovation if implemented properly with proper understanding of the Principles of...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Multiagent Framework Based Interactive Job Management for Grid

    Grid, a hardware and software infrastructure that provides dependable, consistent, pervasive and inexpensive access to high end computational capabilities, with intelligent cooperative agents, enable the system to well-suited for many types of services and autonomously adapt to users computation needs as well as dynamically changing computing resource environments. Grid technologies...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Assuring Security and Privacy for Extensible Access Control in Open Web Services by Using Finger Print Identification

    In recent years, web services have become a new application over the open, complex internet. In that, web services security issues have become more and more important. But, there is no effective access control method to assure the web service security. This paper proposes a simple and effective formalization of...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Predicate Based Algorithm for Malicious Web Page Detection Using Genetic Fuzzy Systems and Support Vector Machine

    In the era of internet, users are keen to discover more in the web. As the number of web pages increases day-by-day malicious web pages are also increasing proportionally. This paper focus on detecting maliciousness in a web page using genetically evolved fuzzy rules. The above formed rules are filtered...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Moving Objects Tracking in Video by Graph Cuts and Parameter Motion Model

    The tracking of moving objects in a video sequence is an important task in different domains such as video compression, video surveillance and object recognition. In this paper, the authors propose an approach for integrated tracking and segmentation of moving objects from image sequences where the camera is in movement....

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Graph Based Approach for Mining Frequent Sequential Access Patterns of Web Pages

    The Internet has impacted almost every aspect of users' society. Since the number of web sites and web pages has grown rapidly, discovering and understanding web users' surfing behavior are essential for the development of successful web monitoring and recommendation systems. To capture users' web access behavior, one promising approach...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Sign Language to Number by Neural Network

    In this paper is presented an automatic deaf language to number recognition system. Sign language number recognition system lays down foundation for hand shape recognition which addresses real and current problems in signing in the deaf community and leads to practical applications. The scheme is based on Neural Network (NN)...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    A Novel Dual Band Circular Microstrip Patch Antenna for Wireless Applications

    A novel simple circular microstrip antenna of radius=16.625mm, a substrate of relative permittivity ?-4.2 and thickness h=1.6mm is proposed to operate for multiband applications. The measured frequencies are found to be 2.2875GHz and 2.475GHz.The simulation of the proposed antenna is done on IE3D software. 1. INTRODUCTION Microstrip antenna are used...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Recognition of Facial Expressions for Images Using Neural Network

    Globally terrorism continues to destroy the lives of people. To identify the terrorist amongst the other people is very difficult rather impossible. This exploratory study aims at investigating the effects of terrorism to recognize emotions. The current paper presents a view-based approach to the representation and recognition of human facial...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    The Study of Adoption of Neural Network Approach in Fingerprint Recognition

    Fingerprint identification and verification are one of the well established methods for implementing security aspects. This technique has become mature due to lots of research in this area. One more feature of artificial intelligence is clubbed with image processing for fingerprint that is artificial neural network. ANN is used at...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    ALiterature Review of Image Retrieval Based on Semantic Concept

    This paper attempts to provide a comprehensive review and characterize the problem of the semantic gap that is the key problem of content-based image retrieval and the current attempts in high-level semantic-based image retrieval being made to bridge it. Major recent publications are included in this review covering different aspects...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    An ANN Based Two Pass-Two Phase Adaptive Filtering of a Digital Image Corrupted by SPN

    Images get contaminated due to different noises at various stages of processing and salt and Pepper is one such noise. The noise removal approach used for filtering mainly differs in their basic methodologies, but the purpose is to suppress different types and percentage of noise. Some of the filtering schemes...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2010

    Roundtrip Engineering Using Unified Modeling Language with Rational Rose and JAVA

    Sometimes documentation only available for the post delivery maintenance is the source code itself. This happens all too frequently when maintaining legacy systems, i.e. software in current use but developed not earlier than 15 or 20 years .Under these circumstances, maintaining the code can be extremely difficult. One way of...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2010

    A Method for Cross-Language Retrieval of Chunks Using Monolingual and Bilingual Corpora

    Information Retrieval (IR) is a crucial area of Natural Language Processing (NLP) and can be defined as finding documents whose content is relevant to the query need of a user. Cross-Language Information Retrieval (CLIR) refers to a kind of information retrieval in which the language of the query and that...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2010

    Enhancement of Image Resolution by Binarization

    Image segmentation is one of the principal approaches of image processing. The choice of the most appropriate Binarization algorithm for each case proved to be a very interesting procedure itself. In this paper, the authors have done the comparison study between the various algorithms based on Binarization algorithms and propose...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2010

    Performance Improvement in Large Graph Algorithms on GPU Using CUDA: An Overview

    The basic operations on the graphs with millions of vertices are common in various applications. To have faster execution of such operations is very essential to reduce overall computation time. Today's Graphics Processing Units (GPUs) have high computation power and low price. This device can be treated as an array...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2010

    Optimal Coordination of Directional Overcurrent Relays Using Particle Swarm Optimization Technique

    The main function of the protective devices in the power system is to detect and remove the selected faulty parts as fast as possible. Directional over current relays are commonly used for the protection of interconnected sub transmission systems, distribution systems, or as a secondary protection of transmission systems. For...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2010

    A Strategic Approach for Risk Analysis of Production Software Systems

    Defects in production software can incur heavy damage to a business operation; yet most current approaches to software security assessment focus primarily on new code development. The paper aims at introducing a strategic approach for reducing the operational security risk. The familiar top-down structured development process used by internal development...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2010

    Offline Signature Recognition Using Hidden Markov Model (HMM)

    HMM has been used successfully to model speech and online signature in the past two decades. The success has been attributed to the fact that these biometric traits have time reference. Only few HMM based offline signature recognition systems have be developed because offline signature lack time reference. This paper...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2010

    An Essential of Security in Vehicular Ad Hoc Network

    Vehicular Ad-Hoc Networks (VANET) are a specific type of wireless ad-hoc networks, formed with short range wireless communication devices, each one representing a vehicle on the road or a static device. Developing applications and protocols for Vehicular Ad-Hoc Networks (VANETs) poses unique security challenges, induced by the devices being used,...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2010

    Highly Dynamic Ad Hoc on Demand Distance Vector (HDAODV) Routing Protocol for MANET

    Mobile ad-hoc network is an emerging trend and it has to face many challenges and issues. Routing in these networks is highly complex due to moving nodes and hence many protocols have been developed. Routing in ad hoc networks is a very challenging issue due to nodes mobility, dynamic topology,...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2010

    Automatic Defect Detection and Counting In Radiographic Weldment Images

    Digital Image Analysis is one of the most challenging and important tasks in many scientific and engineering applications. Extracting the Region Of Interest (ROI) from the image and recognition in image processing are very important steps. When these tasks are manually performed, it is tedious and difficult involving human experts....

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Performance Comparison of Server Load Distribution with FTP and HTTP

    A Web server's constraint on the number of pages it can serve simultaneously is largely because of two factors: the bandwidth available and the Web server itself. When a website is popular and if there is only one web server responding to all the incoming HTTP requests for a website...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Secure MANET Using Two Head Cluster in Hierarchal Cooperative IDS

    In modern era of technology wireless networks are widely used for data communication throughout the world. Mobile Ad-hoc NETwork (MANET) is one of the type in which each device works as an independent node and also as a router for forwarding data between nodes of the MANET. MANET has no...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    ID3 Classifier for Pupils' Status Prediction

    Predicting the pupil's status is the primary goal. Many studies have been made by a large number of scientists to explore the prediction of their research. One best solution is predicting the results based on the data source by applying some data mining techniques. This paper is to identify the...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Efficient Approaches for Improving the Performance Metrics of Wireless Intrusion System

    Security has become one of the major problems that wireless ad-hoc networks face today. With considering limited energy resources and specific attack detection, this paper focus on wireless node behavior based anomaly intrusion detection system and deals only with MAC features and network features behavior of wireless node. This paper...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Modeling Complex Adaptive Systems Using Learning Fuzzy Cognitive Maps

    This paper presents Learning Fuzzy Cognitive Maps (LFCM) as a new paradigm, or approach, for modeling Complex Adaptive Systems (CAS). This technique is the fusion of the advances of the fuzzy logic, formal neural network, and reinforcement learning where they are suitable for modeling systems in artificial life domain of...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    An Optimal Fast Full Search Motion Estimation and Suboptimal Motion Estimation Algorithms

    The new fast full search motion estimation algorithm for optimal motion estimation is proposed in this paper. The Fast Computing Method (FCM) which calculates the tighter boundaries faster by exploiting the computational redundancy and the Best Initial Matching Error Predictive Method (BIMEPM) which predicts the best initial matching error that...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    NEMIDSOFT, A Web-Based Software as an Aid to the Identification of Nematodes

    The genus Merlinius includes plant-parasitic nematode species and is of great practical importance. This paper describes a web-based identification tool (which has been described by the authors under the name of Nemidsoft) that uses morphological characters and morphometrical data. The characters and data used are the same as the polytomous...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Artificial Neural Networks Based Classification Technique for Iris Recognition

    Iris recognition is one of the challenging problems inhuman computer interaction. An automated iris recognition system requires an efficient method for classification of iris region in the face sequence, extraction of iris features, and construction of classification model. In recent years, Neural Networks (NN) has demonstrated excellent performance in a...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Cloudtarun: Application Simulated Over GAE Using Android Emulators

    Cloud Platform is a platform where cloud applications runs. It is an online platform, which works over internet. Cloud Platform has been constructed of three layers: "SaaS", "PaaS", and "IaaS". Many companies in market i.e. Google, Microsoft, IBM etc used to provide cloud platform on per click basis and as...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Power and Time Efficient Structural Cloud for Hierarchical Peer to Peer Networking

    Cloud computing is a promising profitable infrastructure framework that assures to eradicate the requirement for sustaining expensive computing facilities by companies and institutes alike. Information systems supported on the cloud computing and Peer-to-Peer (P2P) model are now receiving popularity. In the cloud computing form, a cloud of servers sustain few...

    Provided By International Journal of Computer Applications