International Journal of Computer Applications

Displaying 281-320 of 8029 results

  • White Papers // Jun 2015

    Velocity Measurement for Passive Bistatic Radars using FM-Radio Broadcast Signal as an Illuminating Signal

    The bistatic radar idea comes in WW2 .The idea of commercial broadcast transmitters comes in 1980 and in 1985, TV waveform was used and in 1999 Lockheed Martins's Silent Sentry was developed. This paper deals with the velocity estimation of a moving target by using bistatic radar. The illuminating signal...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    Benchmarking of AODV Routing Protocol Implemented for Military Software Defined Radio Waveform

    Military wireless networks used for tactical communication are classified as MANETs (Mobile Ad hoc NETworks). These are dynamic, infrastructure-less networks that are well suited for Line Of Sight (LOS) as well as Beyond-Line Of Sight (BLOS) communication. This paper benchmarks the performance of the routing protocol implemented for a high...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    Energy Efficient Scheme for Heterogeneous Wireless Sensor Networks: Research and Challenges

    Wireless Sensor Networks (WSNs) are used in multiplicity arenas which embrace environmental monitoring, healthcare, battle field, biological, home, disaster management and other commercial applications. With the massive progression in the arena of embedded computer and sensor technology, Wireless Sensor Networks (WSNs), that is composed of numerous thousands of sensor nodes...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    Energy Efficient Design for External Cooperative Sensing in Cognitive Radio

    In this paper, the energy efficiency of cooperative sensing in cognitive radio networks is investigated. In cooperative sensing, more energy is consumed in sensing the channel and reporting the results to the fusion detector. To address this issue a very innovative design called external sensing energy efficient technique is proposed...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    Analyzing Network and Energy Efficiency of Android Smartphone Applications

    Mobile phones and tablets can be considered as the first in-carnation of the post-PC era. Their explosive adoption rates lead to the emergence of a variety of applications. Most attractive feature of these applications is that they are available for a variety of OS (Operating System). Many of these applications,...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    Comparative Study of Speed Protocols in Wireless Sensor Network

    Wireless Sensor Network (WSN) is based on distributed event-based system that is different from the traditional communication network. The main goal of the network is to deliver a data packet with the highest efficiency and quality of service. In WSN, Quality-of-Service (QoS) is an important performance indicator, therefore the QoS...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    A Survey on Spectrum Mobility in Cognitive Radio Network

    Cognitive radio technology is an emerging technology which would enable a set of Secondary Users (SUs) to opportunistically use the spectrum allocated to a Primary User (PU) and has potential to serve as a solution to spectrum inefficiency and spectrum shortage problems. However, SUs face number of challenges based on...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    A Hybrid Cryptographic Encryption Technique for Securing Surveillance Digital Images in Mobile Urban Situation Awareness Systems

    With the increase in structural complexities in modern cities, many operations, be they military, police, fire service, intelligence, rescue or other field operations, require localization services and online situation awareness to make them effective. The digital data collected from such systems are sensitive hence security concerns regarding the transmission of...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    A Novel Token Based DME Algorithm in MANET

    Mutual exclusion among the nodes waiting for critical resources is considered as one of the major area of research in MANET. Mutual exclusion allows mobile nodes to share resources among them. Formation of quorum is required for delivery of data with common intermediate node in between them. While communication, data...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    Analysis of Machine Learning Techniques for Intrusion Detection System: A Review

    Security is a key issue to both computer and computer networks. Intrusion Detection System (IDS) is one of the major research problems in network security. IDSs are developed to detect both known and unknown attacks. There are many techniques used in IDS for protecting computers and networks from network based...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    A Multilevel Systematic Approach for Identification of Mobile Learning Multimedia in Low Bandwidth Environment

    The widespread availability and ubiquity of mobile technology to enhance accessibility and communication has resulted into its usage in different educational contexts in developing countries. On the other hand, the mobile devices are facing some critical challenges such as low bandwidth environment, in particular, among others that significantly impede the...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    A Robust Privacy Preservation by Combination of Additive and Multiplicative Data Perturbation for Privacy Preserving Data Mining

    Most of the people's daily activities are now routinely recorded and analyzed by a variety of governmental and commercial organizations for the purpose of security and business related applications. From telephone calls to credit card purchases, from internet surfing to medical prescription refills, the authors generate data with almost every...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    Detection and Implementation of Web-based Attacks using Attribute Length Method

    With the increasing demand of web-based applications, they have become more prone to be exploited by the attackers. This paper is to study the effects of web-based attacks and analyze the log files generated during the attacks. The authors have implemented attribute length method proposed by the author for the...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    A Study of Application of Data Mining and Analytics in Education Domain

    Data mining techniques and algorithms have been used on a large scale in almost all the sectors which range from computer science, manufacturing industry and healthcare industry. A recently introduced concept of academic analytics uses the data mining algorithms on the educational data of students and gives certain insights about...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    Review Paper on Comparative Study of Dual Band Microstrip Patch Antenna

    Microstrip patch antenna is used in many applications such as cellular phone and satellite communication due to their light weight and low profile, for increasing the performance of base station. For developing the microstrip patch antenna printed-circuit method are use. In this paper, the authors survey a dual band microstrip...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    Voice Controlled BOEbot using PointBug Algorithm for Human Robot Interaction using Android Technology

    In this paper, the authors deal with the research that led to the development of a robotic guide or a robot which would act as an aid for the aged category of the society. The robot is developed in such a way that it can be controlled and maneuvered by...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    Prevention of DDoS and Brute Force Attacks on Web Log Files using Combination of Genetic Algorithm and Feed forward Back Propagation Neural Network

    World Wide Web (WWW) has become an ultimate source of information. Traditional services such as banking, education, medicine, defense and transportation are being presented by web applications. Whenever the users make use of any web application, all the activities of the users get automatically get appended into the web log...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    Implementation of GPU using Fine-Grained Parallel Genetic Algorithm

    Many optimization problems have complex search space, which either increase the solving problem time or finish searching without obtaining the best solution. Genetic Algorithm (GA) is an optimization technique used in solving many practical problems in science, engineering, and business domains. Parallel Genetic Algorithm (PGA) has been widely used to...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    Review on Reverse Engineering Techniques of Software Engineering

    Reverse engineering is an approach to extract requirement information application from XML at higher level of abstraction. In the present paper, XML to UML transformation methods has been explored and discussed along with some other related work in reverse engineering. A brief review of reverse engineering shows that the transformation...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    Energy Efficient Clustering Routing Protocol based on LEACH for WSN

    Wireless sensor networks are made up of restricted energy driven resources. When the installation setup of sensor nodes is over usually they are inaccessible to the user. Hence the replacement of battery source is not feasible. In order to boost the life span of the network, the key design issue...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    Enhancing Customer Relationship Management by Integrating Customer and Product Values based on Clustering and Indexing Techniques

    Customer relationship management is not only pure business, but also indicates strong personal bonding within people. Development of this type of bonding drives the business to new levels of success. Once this personal and emotional linkage is built, it is very easy for any organization to identify the actual needs...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    Taxonomy of Tools and Techniques for Network Monitoring and Quality Assurance in 3G Networks

    3G cellular networks changed the face of technology completely by bringing to people's doorsteps high speed internet with improved bandwidth and better quality of experience. This accelerated the development of mobile apps harnessing the newly developed trend of near 24x7 connectivity on mobile phones. Today, the authors have numerous applications...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    New Testing Process for Software Development in Hybrid Electric Vehicles

    In this paper, the authors introduce a new testing process for embedded software development activities in the field of hybrid electric vehicles. The proposed process addresses some deficiencies of the existing testing models in order to improve the performance of HEV embedded software testing activities. The value added is given...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    Interference Mitigation in MC-CDMA System with CFO Compensation based Modified MMSE-FDE Technique

    Multi-carrier Code Division Multiple Access (MC-CDMA) has been an attractive technique for wireless communication because it offers high data rate, high spectral efficiency, large system capacity, less transmit power and less implementation complexity. But due to Carrier Frequency Offset (CFO), which comes into account due to asynchrony between transmitter and...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    A Concept of A-KNN Clustering in Software Engineering

    In software engineering, software decomposition plays a vital role, to increase the quality of the cluster and to handle it properly the software designer decompose the software architecture. The software decomposition is done in various ways and each way provides the different result on same dataset. In software engineering research...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    Virtual Machine Load Balancing: State-of-the-Art and its Research Challenges

    Cloud computing are the most demanding technologies in today's era due to the reduction of cost and complexity of applications, as a result number of users demanding more services of cloud. Thus, for overall cloud performance load balancing in the cloud is an important research area. Cloud handles large number...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    Performance Evaluation of DSR and GRP under Black Hole Attack

    Mobile ad hoc network is a dynamic network which formed by collection of wireless nodes without any centralized support. Due its features mobile ad hoc network is more prone to security attacks. Black hole attack is one of them. Black hole attack is type of security attack in which all...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    Implementation of Secure Software Design and their Impact on Application

    Vulnerability is associated with the system and it is a big risk for system and result in surplus maintenance cost. It is due to many reasons those are not considered during the stages of System Development Life Cycle (SDLC). During SDLC it may be reduced to minimum level. Millions of...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    Maintainability Prediction of Object Oriented Software by using Adaptive Network based Fuzzy System Technique

    Today estimating the software size, cost and effort, effectively and accurately is probably the biggest challenge faced by software developers. It has major implications for the management of software development because both the over and under estimations have direct impact for causing damage to software companies. This process of changing...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    A Vertical Partitioning Algorithm for Distributed Object Oriented Databases

    Object Oriented DataBases (OODBs) is becoming popular day-by-day and being used in a large number of application domains. In order to support homogeneous distributed OODBs a clear understanding of partitioning of class and how to do it by using different partitioning algorithms is needed. In this paper, an algorithm for...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    AgileUAT: A Framework for User Acceptance Testing based on User Stories and Acceptance Criteria

    User Acceptance Testing (UAT) has widespread implications in the software community. It involves not only the end-user, but the Quality Assurance (QA) team, developers, business analysts and top level management. UAT is conducted with the aim of developing confidence of the user in the software product. UAT is generally performed...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    A Survey on Unsupervised Machine Learning Algorithms for Automation, Classification and Maintenance

    In this paper, the authors perform a comprehensive survey of methodologies and techniques used for unsupervised machine learning that are used for learn complex, highly non-linear models with millions parameters to used large amount of unlabeled data. Deep Belief Networks (DBNs) and sparse coding are the two well-known techniques of...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    Cache based Side Channel Attack on AES in Cloud Computing Environment

    As cloud services become more pervasive, works in the recent past have uncovered vulnerabilities unique to such systems. The use of virtualization to isolate computational tasks from ones carried out by adversaries that co-reside with it is growing rapidly. This trend has been precipitated by the failure of today's operating...

    Provided By International Journal of Computer Applications

  • White Papers // May 2015

    Cognitive Radio Network A New Paradigm in Wireless Communication

    In wireless communication system, radio spectrum is the most valuable and limited resource. Due to traditional fixed spectrum allocation policy, there is a problem of spectrum under-utilization in licensed band whereas an unlicensed band is getting overcrowded. A new device called Cognitive Radio (CR) is introduced which allows unlicensed users...

    Provided By International Journal of Computer Applications

  • White Papers // May 2015

    Cognitive Radio Network - A New Paradigm in Wireless Communication

    In wireless communication system, radio spectrum is the most valuable and limited resource. Due to traditional fixed spectrum allocation policy, there is a problem of spectrum under-utilization in licensed band whereas an unlicensed band is getting overcrowded. A new device called Cognitive Radio (CR) is introduced which allows unlicensed users...

    Provided By International Journal of Computer Applications

  • White Papers // May 2015

    Management of Channelization Codes of WCDMA

    Third Generation (3G) mobile devices and services will enable wireless communications to provide online, real-time connectivity and varied range of services. Reconfigurations of downlink dedicated channels are often necessary during call setup to eliminate code blocking encountered in 3G WCDMA systems. Orthogonal Variable Spreading Factor (OSVF) is the management scheme...

    Provided By International Journal of Computer Applications

  • White Papers // May 2015

    Radio over Fiber (RoF) Technology an Integration of Microwave and Optical Network for Wireless Access

    Radio-over-Fiber (RoF) technology is an integration of microwave and optical networks. It has emerged as a potential solution for increasing capacity and mobility as well as decreasing costs in the broadband access network. The concept of RoF means to transport information over optical fiber by modulating light with Radio Frequency...

    Provided By International Journal of Computer Applications

  • White Papers // May 2015

    Encryption Protected Reversible Data Hiding for Secret Communication

    Security has become an important issue with the proliferation of digital communication. Multimedia sources such as images play an important role in security of data communication. Data hiding technique can be used to implant secret data in host images where existence of data is undisclosed which reduces chances of unauthorized...

    Provided By International Journal of Computer Applications

  • White Papers // May 2015

    A Survey on Fault Detection and Fault Tolerance in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) have the potential of significantly enhancing the people's ability to monitor and interact with their physical environment. WSN are inherently fault-prone and the reliability of WSN is affected by faults that may occur due to various reasons such as malfunctioning hardware and software glitches, dislocation or...

    Provided By International Journal of Computer Applications

  • White Papers // May 2015

    Implementation Issues and Analysis of Cryptographic Algorithms based on Different Security Parameters

    Cyber security plays a vital role in data communication in every aspect of information exchange through internet. Data has to be secured from unauthorized users and should be transmitted to the intended receiver with confidentiality and integrity. Cryptography is a technique which provides the security by encrypting and decrypting the...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Framework for Social Network Data Mining

    Social networks have become a vital component in personal life. People are addicted to social network features, updating their profile page and collaborating virtually with other members have become daily routines. Social networks contain massive collection of data. Web data mining is a new trend in the current research body....

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    A Hybrid Approach to Association Rule Hiding

    Data mining is a technique for summarizing and identifying similar patterns in data. Data mining can take different approaches and build different models depending upon the type of data involved and the objectives. In this paper, the authors follow the association rules approach for finding the correlation relationships among large...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2013

    Differential Precision Rectifier Using Single CMOS DVCC

    Three novel differential precision rectifier circuits are realized using single CMOS differential voltage current conveyor. One of the realized differential precision rectifiers provides half wave voltage output. The other two circuits give full wave voltage outputs. Among the two full wave differential precision rectifiers, one circuit provides single ended voltage...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2013

    Error Identification and Correction for Memory Application Using Majority Logic Decoder and Detector

    Nano-memory is a new memory storage technology which may be used for memory applications such as aerospace, nano-bioengineering, etc. It provides smaller, faster and lower energy device. This technology blends together tiny carbon nano-tubes with conventional semi-conductor. During encoding and decoding process, the error may occur in the codeword which...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2013

    Design of Efficient Complementary Pass Transistor Based Modified Booth Encoder Array Multiplier

    In this paper, a method to build a faster array multiplier based on radix-4 modified Booth encoder, which is broadly used for the signed multiplication applications with less area and power is presented. This is achieved by optimizing the overall interconnection delay in the partial product array and by scheming...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2013

    Different Parameter Analysis of CMOS Charge Sharing Latch Comparator Using 90nm Technology

    In the present paper, mainly power consumption of circuit is main issue for every designer. This paper mainly dealing with the implementation of CMOS charge sharing latch comparator and analysis of it using different parameter in 90nm. For the implementation of new design the features of two important comparator are...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2013

    A Survey on Closed Frequent Pattern Mining

    The identification of association rule mining has attracted many researchers. Several algorithms for effective discovery of association rule have been proposed. With the vast literature of closed frequent item set discovery and association rule mining, still the authors are not able to say that they have found solution for most...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2013

    Designing of 8-Bit Synchronous FIFO Memory Using Register File

    FIFO is implies first in first out using queue methodology for memories read and write of any information and data using some control logic. The whole work of FIFO is fully dependent on the control circuitry and clock domain. It is often used to control the flow of data from...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2013

    Charge Redistribution Based 8 Bit SAR ADC

    An 8-bit 10 MS/s SAR A/D converter is presented. In the circuit design, a capacitor switched D/A converter architecture, dynamic latched comparator architecture and low power SAR logic are utilized. Design challenges and considerations are also discussed. This proposed converter is implemented based on 0.29um CMOS logic process. With a...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2013

    Implementation of Boolean Functions Through Multiplexers with the Help of Shannon Expansion Theorem

    Implementation of Boolean function through multiplexer can be done by various multiplexers depending upon the select lines. Implementation of Boolean functions can be done by various methods, but in this particular paper stress is more on multiplexers. Through Shannon expansion theorem, it is easy for the users to implement the...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Low Power High Speed 16x16 Bit Multiplier Using Vedic Mathematics

    High-speed parallel multipliers are one of the keys in RISCs (Reduced Instruction Set Computers), DSPs (Digital Signal Processors) and graphics accelerators and so on. Array multiplier, Booth multiplier and Wallace tree multipliers are some of the standard approaches used in implementation of binary multiplier which are suitable for VLSI implementation....

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    An Analysis of Power and Stability in 6T, NC, Asymmetric, PP, and P3SRAM Bit-Cells Topologies in 45nm CMOS Technology

    In modern digital architectures, more and more emphasis has been laid on increasing the number of SRAMs in a SoC. However, with the increase in the number of SRAMs, the power requirement also increases, which is not desired. This calls for an urgent need for an SRAM with low dynamic...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Computer Modeling to Predict the Impact of Cold Air Stream on Multi-Chip Memory

    RAM was a specialized electronic chip which multiple Integrated Circuits (ICs), semi-conductor or other discrete components were packaged onto a unifying substrate. Facilitating their use as a single component (as though a larger IC). This paper presented model calculated the temperature distribution on four parallel memory modules and studied the...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    A Low Power 90nm Technology Based CMOS Digital Gates with Dual Threshold Transistor Stacking Technique

    Scaling of transistor features sizes has improves performance, increase transistor density and reduces the power consumption. A chip's maximum power consumption depends on its technology as well as its implementation. As technology scales down and CMOS circuits are powered by lower supply voltages, leakage current becomes significant. Static power is...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Design and Development of Nanoelectronic Binary Decision Tree Device Based on CMOS and QCA (Quantum-Dot Cellular Automata) Nanotechnology

    Evolution of micro-electronics towards miniaturization is one of the main motivations for nano-technology. CMOS technology has been targeted to integrate more and more devices per unit area of silicon-substrate, but there is limitation in scaling-down CMOS circuits/devices. Like nano-technology, QCA (Quantum-dot Cellular Automata) is another alternate technology having ability to...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Artificial Neural Network for Performance Modeling and Optimization of CMOS Analog Circuits

    In this paper, the authors present an implementation of multi-layer feed forward Neural Networks (NN) to optimize CMOS analog circuits. For modeling and design recently neural network computational modules have got acceptance as an unorthodox and useful tool. To achieve high performance of active or passive circuit component neural network...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Basic Logic Gate Realization Using Quantum Dot Cellular Automata Based Reversible Universal Gate

    Quantum-dot Cellular Automata (QCA) is a new technology for development of logic circuits based on nanotechnology, and it is a one of the alternative for designing high performance computing over existing CMOS technology. The research on reversible circuits is going on both VLSI and QCA based design due to low...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Energy Efficient Implementation for Arithmetic Application in CMOS Full Adders

    The overall view of this paper is to attain high speed, low power full adder cells with alternative logic cells that lead to have reduced power delay product. Two high-speed and low-power full adder cells designed with an alternative internal logic structure and pass-transistor logic styles that lead to have...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Implementation of X-Tree Structure for Multidimensional Data Ranking

    In this modern world, travelling has become as normal routine for most of the people in the cities. At the same time, frequency of happening of accidents also increasing alarmingly. Also one cannot avoid health care and should take proper health checks in hospitals periodically. At the time of accidents,...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2013

    Development of Application Programming Interface for Testing the Services of Embedded System

    Target based testing in an embedded system is a complex and difficult task. This paper, in the perspective of software solution, presents a generic API for testing the target embedded system. Companies developing products based on embedded systems understand the fact high quality and unique application software plays an important...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2012

    Development of a Mobile Based Device Remote Control with Voice Acknowledgment

    It is said that "The only thing which make human beings stand different from rest of the world is the people's brain". The history of men gives the ever raising graph of their outstanding dedication to science and technology. There was a time when man used the language of signs,...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Implementation of Multi-Level Trust in Privacy Preserving Data Mining against Non-Linear Attack

    The study of perturbation based Privacy Preserving Data Mining (PPDM) approaches introduces random perturbation that is number of changes made in the original data. The limitation of existing work is single level trust on data miners but proposed work is focus on perturbation based PPDM to multilevel trust. When data...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Object based Accountability Framework for Information Sharing in Cloud Computing

    Cloud computing is one of the biggest thing in computing in recent time. Cloud computing uses the internet and the central remote servers to support different data and applications. Cloud computing is that emerging technology which is used for providing various computing and storage services over the Internet. In the...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    A Study on Cloud Simulation Tools

    Cloud computing is an emerging technology, advancing quickly in IT due to the flexibility of using computing without buying any infrastructure but by using as pay-per-use model. It is risky to evaluate the performance of cloud environments as cloud computing adoption increases. The simulation technology has become a powerful tool...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2012

    Design and Evaluation of a Cell Phone Pointing Interface for Interaction with Large Projector Based Displays

    The availability of mobile phones enhanced with different sensors increased the possibility of using the mobile devices in various applications in ubiquitous computing. Mobile phones can be used as interaction device with other devices such as large projected displays. In this paper, the authors propose a design of a cell...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Recent Trends towards Green Clouds by using Fuzzy based Live Migration

    Cloud computing is just a new field in Web computing that provides novel views in internetworking systems and improves problems in the architecture, style and implementation of present communities and knowledge centers. It is the Internet based computing where essential shared servers provide software, infrastructure, platform, devices and other resources...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Study of Green IT: Present to Future

    The exponential growth in users of computer over the years has impacted environment drastically. A primary concern of this paper is to study the transformation of computer state from grey to green. Green IT is basically referred to green computing. This paper shows how the emerging green technology reduces the...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Cloud Computing for ODL Institutions - An Overview

    Cloud computing as a new kind of advanced technology accelerates the innovation for the computer industry in recent times. Recently the All India Council for Technical Education (AICTE) has signed an MOU (Memorandum Of Understanding) with Microsoft for cloudy wares, for its seven million students and half a million staff...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Performance based Analysis of Cloudlet Architectures in Mobile Cloud Computing

    With modern Smartphones and powerful mobile devices, mobile apps provide many advantages to the community but it has also grown the demand for online availability and accessibility. Cloud computing is provided to be widely adopted for several applications in mobile devices. However, there are many advantages and disadvantages of using...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    A Survey of Various Methodologies for Hiding Sensitive Association Rules

    Data mining and hiding are the future research directions in the field of knowledge engineering. The main challenges in data mining are finding the sensitive association and hide them without revealing sensitive information. The association rule hiding is a process in which the original database is modified in such way...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Protected Authentication by Login Credential and OTP for Cloud Based Application

    Today life can't begin internet and all the general purpose applications are available from website, out of these applications mostly applications are uses cloud computing technology. So cloud computing technology will become one of the new prototypes for the internet based application. It has huge environment and open distributed system....

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Trend Analysis based on Access Pattern over Web Logs using Hadoop

    There is an invariable progress and extension of the World Wide Web which has resulted into the generation of log files having enormous magnitude of data. Log files incorporate traits of user behavior, therefore it is essential to analyze log data and acquire knowledge from it. Web mining techniques primarily...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    An Observed Model Approach for Testing GUI Model Driven Interface in Water-Flow Model

    Graphical-User Interface (GUI) -based software applications are with the job of verifying that these tasks can be performed using the software; and that the software does not "Behave badly". A set of use cases with high-level descriptions is also given to the testers. The tester executes these high-level steps by...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2010

    Comparative Analysis of Automatic Speaker Recognition using Kekre's Fast Codebook Generation Algorithm in Time and Transform Domain

    In this paper, the authors proposed an approach based on Kekre's Fast Code book Generation (KFCG) algorithm in the transform domain. KFCG is used for feature extraction in both the training and testing phases. Three methods for codebook generation have been used. In the 1st method, codebooks are generated from...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Home Automation Systems - A Study

    With the increase in consumption of energy and population, there is a grave need to conserve energy in every way possible. The inability to access and control the appliances from remote locations is one of the major reasons for energy loss. A web or an android application is used by...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Suitability of Existing Software Development Life Cycle (SDLC) in Context of Mobile Application Development Life Cycle (MADLC)

    Mobile technology has seen a steep rise in its demand and usage, which has further increased the need for specialized software for mobile devices. For developing mobile applications, existing software development process models are incorporated. But looking at the remarkable growth of mobile devices, the complexity involved in development of...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    A Protocol Design for Ubiquitous Object Categorization and Communication Through Query Language

    An autonomous and intelligent computing object that can be accessed by anything, anytime and anywhere is known as ubiquitous object. An environment in which these objects are present is known as ubiquitous computing environment. Advancement in computing technologies resulting in the growth of computer technologies and computer based applications; there...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    Test Scheduling of Stacked 3D SoCs with Thermal Aware Considerations

    Today's electronic designs have become prone to errors and defects due to the ever increasing complexity and compactions. This has resulted into imparting of much more importance to VLSI testing. Testing is mandatory and has to be performed on each manufactured product. Low cost and good defect coverage are the...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    Performance Analysis of Dual Core, Core 2 Duo and Core i3 Intel Processor

    Performance analysis is a more efficient method of improving processor performance. This paper discusses heavily on performance analysis of dual core, core 2 duo and core i3 Intel architectures. The paper described the evolution of Intel architectures and gave the reason for testing the performances of the systems. All experiment...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2015

    Performing Big Data Over Cloud on a Test-Bed

    Data analytics has been rapidly growing in a variety of application areas like mining business intellect for processing the huge amount of data. MapReduce programming paradigm adds itself well to these data-intensive analytics jobs, given its one of the well-known ability to scale-out and force several machines to parallel process...

    Provided By International Journal of Computer Applications