International Journal of Computer Applications

Displaying 321-360 of 6245 results

  • White Papers // Dec 2014

    Software Refactoring Technique for Code Clone Detection of Static and Dynamic Website

    Now-a-days, cloning of codes or programs of the developer or authorized person leads a positive approach. But the code cloning is done by unauthorized person leads a negative approach. In the recent years, many clone detection tools have been proposed. It produces an over whelming volume of simple clones of...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    A Stream Cipher Based Bit-Level Symmetric Key Cryptographic Technique Using Chen Prime Number

    In this paper, a stream cipher based symmetric key cryptographic technique based on Chen prime number has been proposed. The proposed technique is suitable for encryption and decryption of a large number of files of almost any type. A symmetric key is formed by the sender directly from the plain...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    General Access Structure Secret Sharing in Matrix Projection

    Image secret sharing is a technique which provides security to confidential images by dispersed storages. General access structure image secret sharing provides flexibility for deciding qualified subsets of participants which can reconstruct the original secret image. Non qualified subsets of participants cannot get any information about original secret image. This...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Improving Performance of Cloud Based Transactional Applications Using In-Memory Data Grid

    Browser based applications are used currently to handle data related requirements of educational institutes. Such applications are not scalable due to limited scalability of database servers. The performance of such applications can be improved with the use of cloud computing and In-Memory Data Grid (IMDG). IMDG uses the concept of...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Energy Proficient and Security Protocol for WSN: AODV

    Wireless sensor network is extensively used technology now-a-day in real time application. It consists of a number of autonomous sensor nodes which are organized in various areas of interest to accumulate data and jointly convey that data back to a base station. But the sensor node has limited battery energy...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Survey and Challenges of Mining Customer Data Sets to Enhance Customer Relationship Management

    Data mining is a useful and powerful tool for any organization especially for marketing people. Data mining is used in managing relationships with customers. New trends in Customer Relationship Management - CRM- have growth. One of them is social Customer Relationship Management - CRM. The major problem here is data...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Evaluating and Emerging Payment Card Fraud Challenges and Resolution

    Payment card fraud losses for the card payment industry are generating billions of dollars. In addition to direct damage, the brand name due to fraud can be affected by a lack of customer faith. This cause the deficit is rising, financial institutions and card issuers are constantly new technologies and...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    A Review on Filter Undesired Text From Social Networks

    Online Social Network (OSN) is a social networking service which is a platform to build relations among people who share comfort, actions, backgrounds or real-life connections. Hundreds of thousands of people are using these social networking services for personal use, marketing. Entertainment and business purpose. User security is the main...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Addressing Data Security and Performance Issues on the Cloud

    Cloud computing has, with its advent, brought what IT always dreamt of adding capabilities on the fly without any new investments, thereby also reducing the cost. Be it an individual or a big organization, everyone is using cloud computing either knowingly or unknowingly. If the authors talk about the services...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    XML Based Keyword Search

    The success of information retrieval style keyword search on the web leads to the emergence of XML based keyword search. The text database and XML database differences leads to three new challenges: the users search intention is to be identified, i.e., the XML node types that user wants to search...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    WSN Performance Issues and Various Clustering Methods

    There are several application have been developed with need of self organization for network. To fulfill this requirement need of wireless sensor network in such applications. To manage network efficiently clustering is used. Lots of works have been done in field of Wireless Sensor Networks (WSNs) in last few years....

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Secure Profile Matching for Portable Public Networks

    In portable public networks creation of the new connection is important service. Where an existing client can discover related users bounded by objects nearness of the users. In portable public networks, the authors can provide connection to the best profile matching users only. In general all the peoples frequently fill...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Survey of Strong Authentication Approaches for Mobile Proximity and Remote Wallet Applications - Challenges and Evolution

    Wallet may be described as container application used for configuring, accessing and analyzing data from underlying payment application(s). There are two dominant types of digital wallet applications, proximity wallet and remote wallet. In the payment industry, one often hears about authentication approach for proximity or remote wallets or the underlying...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Applicability of DUKPT Key Management Scheme to Cloud Wallet and Other Mobile Payments

    After discussing the concept of DUKPT based symmetric encryption key management (e.g., for 3DES) and definition of cloud or remote wallet, the paper analyses applicability of DUKPT to different use cases like mobile banking, NFC payment using EMV contactless card and mobile based EMV card emulation, web browser based transaction...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Reverse Engineering

    Engineering is profession involves in constructing, designing, manufacturing, maintaining of systems, products and structures. This paper provides the basic information about reverse software engineering and its advantages and disadvantages of reverse engineering. Today reverse engineering is used in many fields of information technology in form of legacy compatibility, malware analysis,...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    New Image Broadcasting Based on Visual Cryptography and Steganography

    In this paper, the authors present a new security system by combining cryptographic and steganographic technique. The main idea behind the present paper is to divide the participants into different security levels, determining which participant will be able to decrypt the secret image, and which participant will not be able...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    A Survey on Asynchronous MAC Protocols in Wireless Sensor Networks

    Wireless Sensor Network (WSN) has played an important role in the area of environment, agriculture monitoring, traffic control, disaster management etc. Large number of low cost sensor nodes is distributed in specific area of interest such that nodes can communicate with each other. WSN networks have two classifications: structured and...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    BER Performance of 2x2 and 4x4 Transmit Diversity MIMO in Downlink LTE

    Multi-antenna techniques are reported to improve the performance of radio communication systems in terms of their capacity and spectral efficiency. In combination with appropriate receiver technologies they can also provide savings in the required transmit power with respect to target bit error rate. Long Term Evolution (LTE), one of the...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Spam Detection Using Approach of Data Mining for Social Networking Sites

    Increase in number of spam incidents is causing a very serious threat to social networking world which has in turn become an important means of interaction and communication between public users. It is not only dangerous to the public users, but it also covers much of the bandwidth of the...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Differential Drive Adaptive Proportional-Integral-Derivative (PID) Controlled Mobile Robot Speed Synchronization

    In this paper, the authors present the implementation of Proportional Integral Derivative (PID) controlled mobile robot. They propose a mobile robot control method which based on optical encoder. First, the mobile robot counts the number of pulses from optical sensor. This system rejects the denouncing and optical sensor noises and...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Evaluating the Failures of Data Centers in Cloud Computing

    In this paper, the authors present a study on the various features of the cloud computing its models and services. Cloud computing has become the newest concern in IT world to provide various services via internet computing. Thus cloud computing is based on the internet based computing where indispensable collective...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Study on Various Methodologies/Frameworks Used to Achieve Software Quality in Different Organizations

    In this paper, the authors explain that how the various methodologies, frameworks and processes lead to software quality. Numerous methodologies have been introduced on which lot of exploration or research has been made. This paper includes the study of some processes and techniques which have been used by the firms...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    A Survey of Energy Efficient Mobile Sensor Dispatch in Wireless Sensor Network

    In this paper, the authors try to review the sensor dispatch in wireless sensor network. The wireless sensor networks contain static nodes and mobile nodes. In this paper, they discuss movement of multi attribute mobile path and the issues of travelling path of mobile sensor. Mobility in wireless sensor networks...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Performance Evaluation of AODV Routing Protocol Using WiMAX on VANET

    In this paper, performance of AODV routing protocol is simulated and evaluated for highway scenario in WiMAX based VANET. In VANET the node mobility is dynamic and changes their topology frequently, have short period to forward the packets between each other. To overcome this problem WiMAX on VANET is configured...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Threshold Oriented Preemptive Link Repair Decision Based Approach for AODV in MANET

    The routing data for associate infrastructure less network of mobile ad-hoc network is taken into account as an advanced task. Various protocols deal with this routing update like AODV, DSR, etc. All the way through this route construction generally the route failure happens & route repairing mechanism must be initiated...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Validation of a Systematic Approach to Requirements Engineering Process Improvement in SMEs in a Design Science Framework

    Requirements Engineering (RE) acts as a conduit between the needs of system users and the capabilities of software produced. Because of this, many Small and Medium Enterprises (SMEs) have been tempted to invest in improving corresponding processes. Regrettably though, many process improvement approaches for RE do not meet SMEs' needs...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Broadband Microstrip Patch Antenna Using Slot

    A broadband high gain microstrip patch antenna using slot is proposed. The Antenna has low profile with enhanced bandwidth and gain. The slot use on the patch's surface affects the radiation characteristics of proposed antenna. The antenna operating frequency range is 4.4 - 6.4 GHz with VSWR less than 2....

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Examine the Performance of Different Topologies Using Opnet 14.5 in ZigBee Sensor Network

    In this paper, the authors are implemented in ZigBee using IEEE 802.15.4 protocol stack, it is most widely used technique in wireless sensor network for low rate wireless personal area network. In this paper, three topologies are used i.e. mesh, tree and hybrid topology. The hybrid topology is implemented by...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    EDLT: An Extended DLT to Enhance Load Balancing in Cloud Computing

    In recent years, cloud computing has gained prominence and most companies are applying some kind of cloud computing technology in their company or part of it. Growing number of clients who are willing to use cloud services has made load balancing an eminent challenge in this field. A general approach...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Energy Optimization for Large Scale Wireless Sensor Network Using Real-Time Dynamics

    Energy depletion in Wireless Sensor Network (WSN) is one of the most focused research area in wireless network which is yet to witness a potentially significant mitigation techniques for ensuring substantial energy preservation. Owing to the resource constraints as well as low computational capability of the sensor mote, usually the...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Wireless Fingerprint Attendance Marking System

    In this paper, the authors explain based upon the idea of making the attendance system automated by using the concept of biometric scanning. The attendance marking system is very tedious when it is done manually. This paper aims at trying to make it digital through the use of fingerprint module...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Performance of Wireless Network Using Network Coding Over Store and Forward Technique

    In recent year's wireless networks has become a necessity rather than a luxury. Wireless networks suffer in providing high throughput for high end applications like multimedia etc. Network coding is proposed to improve the throughput of the network. In this paper, the authors apply network coding technique at the relay...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Trust Based Clustering and Secure Authentication for Multicast in AD-Hoc

    Ad-hoc network is a dynamic wireless network, composed of mobile nodes without the aid of centralized administration, where nodes have limited transmission range. Security is challenging issue due to the mobility of nodes can lead to dynamic topology, intermediate nodes act as a router can forward packets. Therefore, authentication the...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Performance Analysis of Equalization Techniques for MC-CDMA Systems

    Now-a-days in mobile communication systems, very high bit rates are very essential for transmitting the data and to provide good service for a digital network. This high bit rate leads to Inter Symbol Interference (ISI) problems. MC-CDMA technique plays a major role in eliminating these interference problems. In order to...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    CEAACK Based Detector for Malicious Nodes

    MANET stands for Mobile Ad-hoc NETwork. The ad hoc network that is used for mobile communication is called MANET. The MANETS are used when the user is moving. Because MANET does not depends on fixed infrastructure. Wireless networks are used to connect with different networks in MANETs. Security is more...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Evaluation of QoS in the Transmission of Video H.264/SVC for Ad Hoc Networks of Two Jumps

    In this paper, video traffic H.264/SVC will be analyzed as well as evaluation of QoS metrics by PDR, delay, throughput and Jittery regarding mobility scenarios, performing characterization and QoS in the AODV protocol AOMDV in an ideal environment (without traffic) and not ideal with DCF and EDCA traffic. In this...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Security Mechanisms at Different Levels in Cloud Infrastructure

    Cloud computing refers to a set of services and resources offered to its consumers through internet. The user data and applications software shift to highly optimal data i.e. cloud. Either it may be a small or medium business infrastructure must focus on resource and information sharing among various users due...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Analysis of Traffic Patterns Using Computer Vision and Wireless Sensor Network

    Traffic patterns analysis and solutions for traffic is the emerging field. To determine the patterns of traffic flow and with the help of that data reports can be generated to build the sustainable infrastructure. So that the infrastructures like bridges and fly over will build such that they will be...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Comparison of NBTree and VFI Machine Learning Algorithms for Network Intrusion Detection Using Feature Selection

    The security of computer networks is of great importance. But, with the proliferation of electronic devices and the internet, there has been an exponential rise in malicious activities. The security perpetrators take the advantage of the intricacy of the internet and carry out intrusions. There have been certain researches to...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Examination of Energy Efficiency for MAC Protocol in Wireless Body Area Networks

    Wireless body area networks are widely used for applications such as health care system, where wireless sensors (nodes) monitor the parameter(s) of interest. Sensors play a critical role in many sensor network applications. Mac layer operates on non-beacon and beacon enabled mode. The IEEE 802.15.4 standard provide two modes of...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    An Approach to Detection of SQL Injection Attack Based on Dynamic Query Matching

    A large number of web applications, especially those deployed by companies for e-business operations involve high reliability, efficiency and confidentiality. Such applications are often written in script languages like PHP embedded in HTML, allowing establishing connection to databases, retrieving data, and putting them in the Web. One of the most...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Multicriteria Decision Analysis Method for Evaluation of Software Architectures

    Software architectures is a critical aspect in the design and development of software. Architecture of software is a collection of design decisions that are expensive to change. Software architectures are generally designed with particular functional and non-functional requirements. Organizations often need to choose software architecture for future development from several...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2011

    A New Collaborative Trust Enhanced Security Model for Distributed System

    Designing a distributed system with the characteristics of reliability and trustworthiness is an important issue. Yet another important issue in the distributed system is the access to remote system which can be achieved on the basis of certain access rights, policies or authorization semantics. The aim of this paper is...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2010

    Efficient Joining and Leaving for Receiver Driven Multicast Congestion Control

    Multimedia applications such as video conferencing, multiparty video games, military applications news feeds, video-audio transmission and IP TV etc. are today and next generation demand in user life. Multicast communication is better than broadcast and unicast as communication scheme to handle above stated application. Multicast is one to group communication...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    CAFSM: A Communicating Adaptive Finite State Machine for Personalized Multimedia Streaming

    In this paper, the authors present the design of a multimedia presentation system which permits the dynamic adaptation of the content. The Communicating Adaptive Finite State Machine (CAFSM) presented in this paper, has been used to describe the multimedia streaming and presentation system proposed here. This system is driven by...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2011

    Contemporary Cryptography and Arguments for Classical Cryptography's Endurance Alongside the Propitious Quantum Cryptography

    Is the newly born quantum cryptography the ultimate solution for information security? A technique needs to be both theoretically strong and practically viable. But quantum cryptography comes to naught in the latter. The authors present here some of the quantum's theoretical weaknesses like lack of digital signatures (or any algorithm)...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2011

    A New Symbolic Dissimilarity Measure for Multivalued Data Type and Novel Dissimilarity Approximation Techniques

    In this paper a new statistical measure for estimating the degree of dissimilarity between two symbolic objects whose features are multi-valued type is proposed. In addition two new simple representation techniques viz., interval type and magnitude type for the computed dissimilarity between the symbolic objects are introduced. The dissimilarity matrices...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2010

    Dynamic Web Service Composition Based on Operation Flow Semantics

    Dynamic Web service composition is a process of building a new value added service using available services to satisfy the requester's complex functional need. In this paper, the authors propose the broker based architecture for dynamic Web service composition. The broker plays a major role in effective and efficient discovery...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    The Optimal Resource Discovery and Allocation Algorithm for One Hop Using Anonymous Arbitrary Topology

    A distributed system consists of, possibly heterogeneous, computing nodes connected by communication network that do not share memory or clock. One of the main benefits of distributed systems is resource sharing which speeds up computation, enhances data availability and reliability. However resources must be discovered and allocated before they can...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Data Privacy in Data Engineering, the Privacy Preserving Models and Techniques in Data Mining and Data Publishing: Contemporary Affirmation of the Recent Literature

    Privacy preserving for data engineering methods like mining and publishing etc., with the advancement of the rapid development of technologies like Internet and distributed computing has turned out to be one of the most important research areas of interest and has also triggered a serious issue of concern in accordance...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    User Behavior Modeling Based on Adaptive Gaussian Mixture Model

    A remarkable technological development has been witnessed due to the recent advancements in the area of science and technology. This made the users to access the Internet and store the information retrieved in various databases at various servers across the globe, making World Wide Web as an information gateway. This...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Prediction of Pitting Corrosion Characteristics Using Artificial Neural Networks

    Precorroded steel A-106 B specimens were prepared at different surface roughness. These specimens were immersed in corrosive ferric chloride solution in different concentrations (1.5, 3.0, 4.5, 6.0% wt.) at specified durations to initiate primarily the pitting corrosion. The corrosion pits distribution depends on the corrosive concentration, degree of surface roughness,...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Student's Opinion on Adopting Pair Programming as a Teaching and Learning Tool

    Research in the realm of Pair Programming in computer science students has begun to explore the methods for accomplishing the benefits. However, valid measurements of the opinion on adopting a pair programming in the practical sessions are required to be drawn, before concluding. An Attitude Survey Test (AST) was conducted...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Advanced Cost Based Graph Clustering Algorithm for Random Geometric Graphs

    There is an increasing interest in the research of clustering or finding communities in complex networks. Graph clustering and graph partitioning algorithms have been applied to this problem. Several graph clustering methods are come into the field but problem lies in the model espoused by the state-of-the-art graph clustering algorithms...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Image Steganography Based on a Parameterized Canny Edge Detection Algorithm

    Steganography is the science of hiding digital information in such a way that no one can suspect its existence. Unlike cryptography which may arouse suspicions, steganography is a stealthy method that enables data communication in total secrecy. Steganography has many requirements, the foremost one is irrecoverability which refers to how...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Simulation and Implementation of Grid-connected Inverters

    Solar, wind and hydro are renewable energy sources that are seen as reliable alternatives to conventional energy sources such as oil or natural gas. However, the efficiency and the performance of renewable energy systems are still under development. Consequently, the control structures of the grid-connected inverter as an important section...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Optimizing Outdoor Propagation Model Based on Measurements for Multiple RF Cell

    This paper intends to explain outdoor RF attenuation path loss behavior under certain restrictions. This paper has been conducted in Nablus city to develop and optimize a suitable propagation model based on one of the existing propagation models based on outdoor measurements for 900 MHz, where a local GSM system...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    A Survey on Bandwidth Guaranteed Routing Techniques in Wireless Mesh Networks

    A Wireless Mesh Network is defined as an infrastructure network working with in as ad hoc mode. In a multi-hop wireless mesh network; it is always preferable to choose a path with higher throughput between a pair of source /destination nodes to fully exploit the network capacity. Since Wireless Mesh...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Congestion Estimation Techniques in Sensor Networks: A Survey

    In WSN or in sensor network the congestion causes the various severe conditions as it causes, data packet loss, energy inefficiency and also it diminishes the lifespan of WSN. In WSN, the major challenge is to diminish the congestion problem in the transmission of data packets between sources to destination....

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Feature-Based Clustering of Web Data Sources

    The proliferation of web data sources increasingly demands the integration of these sources. To facilitate the integration process, a pre-analysis step is required to classify and group data sources into their correct domains. In this paper, the authors propose a feature-based clustering approach for clustering web data sources without any...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    A Novel Approach of 3D Object Watermarking Algorithm Using Vertex Normal

    The concept of 3D Watermarking algorithm which is non blind and must be robust against different attack is the novel area of research. There are huge requirement of developing a robust and effective watermarking strategies to protect the illegal distribution of proprietary 3D objects. In the proposed algorithm which alter...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Performance Evaluation and Analysis of Reactive Routing Protocols in MANET

    MANET is the collection of mobile devices which formed a self configuring infrastructure less temporary network. In this paper the authors are doing performance evaluation and analysis of three reactive routing protocols (DSR, AODV and TORA) in MANET for different performance metrics Such as Average Throughput, Packet Delivery ratio, Packet...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Interference Reduction Technique in Mobile Adhoc Networks Using Mathematical Prediction Filters

    Interference is one of the major degrading factors of Mobile Ad Hoc NETworks (MANET). Since, MANET transmits over the single wireless channel; packets of the same flow interfere with each other greatly. This mutual interference causes the bottleneck over the network. Further, predicting interference accurately around a transmitter or receiver...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Green IT: A Study and Analysis of Environmental Impact of Social Networks and Search Engines

    Green IT is a hot topic today and will continue to be an important issue for several years to come and Social Networks and Search Engines too. The use of IT has exploded in several areas, improving human lives and work and offering convenience along with several other benefits. Today...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    A Hybrid of Self Organized Feature Maps and Parallel Genetic Algorithms for Uncertain Knowledge

    The need to handle uncertainty and vagueness in real world becomes a necessity for developing good and efficient systems. Fuzzy rules and their usage in fuzzy systems help too much in solving these problems away from the complications of probability mathematical calculations. Fuzzy rules deals will words and labels instead...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    A New Image Quality Metric Using System Visual Human Characteristics

    Several Human Visual System (HVS) based quality metrics have been developed in recent years to measure the quality distortions caused by digital image coding techniques. Because of the complicated nature of the HVS characteristics, these metrics do not provide acceptable correlation with perceptual evaluations of the distortion. Recent studies by...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Using P System with GPU Model to Design and Implement a Public Key Cryptography

    Simulators are limited by the available resources on the GPU as well as the CPU. Simulation of P systems with active membrane using GPUs is a new concept in the development of applications for membrane computing. P systems are an alternative approach to extract all performance available on GPUs due...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Unsupervised Approach for Retrieving Shots From Video

    Acquiring the video information based on user requirement is an important research that attracts the attention of most of the researchers today. This paper proposes an unsupervised shot transition detection algorithm using Auto Associative Neural Network (AANN) for retrieving video shots. The work further identifies the type of shot transition,...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Literature Survey on Cross-Layer Design Architecture for Bandwidth Management in Mobile Ad-Hoc Networks

    In a Mobile Ad-hoc Network, the wireless nodes usually self-configure to exchange information without the help of any centralized infrastructure or administrator. There is high mobility and rapid deployment of the mobile nodes. Hence, there is need for multi-hop transmission where nodes can forward other nodes information. A Cross-layer design...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    A Method for Measuring Semantic Similarity of Documents

    With the documents increasing amount available in local or Web repositories, the comparison methods have to analyze large documents sets with different types and terminologies to obtain a response with minimum documents and with as much useful content to the user. For large documents sets where each document can contain...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Performance Analysis of MANET Reactive Routing Under Security

    Security is an essential service for wired and wireless network communications. The success of Mobile Ad hoc NETworks (MANET) mainly depends on people's confidence in its security. In a MANET, a collection of mobile hosts with wireless network interfaces form a network without the aid of any fixed infrastructure or...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Correction of Verbs in English Corpus by Using the Concept of AI

    The present paper aims at automated correction of verb from huge English corpus and addition of verbs at run time through single sentence. The approach deals with salient issues in the applications that use the artificial intelligence with respect to three key properties. The basic differences between the approaches and...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Avoiding Cybercrime Pandemic in Cashless Society Using HMM

    Internet fraudulent activities are increasing dramatically in the availability of technology resources like telecommunication networks, mobile communications, and E-commerce. Fraud is a major problem in electronic payment systems. With this increased availability has come a new form of criminal activity that takes advantage of electronic payment system, namely cybercrime, mobile-crime,...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Software Reliability Prediction Using Neural Networks

    Predicting the Software reliability is a pertinent issue and it is a major concern of software developers and engineers in changing environment considerations. Software reliability models are developed to estimate the probability of failure free operation of the software for a long time. Many Software Reliability Growth Models (SRGM) were...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Suitable Node Deployment Based on Geometric Patterns Considering Fault Tolerance in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) consist of small power-constrained nodes with sensing, computation and wireless communication capabilities. These nodes are deployed in the sensing region to monitor especial events such as temperature, pollution, etc. They transmit their sensed data to the sink in a multi-hop manner. The sink is the interface...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Enhancement of Color Images by Scaling the DCT Coefficients and Interpolation

    This paper presents the enhancement of color images in the frequency domain with interpolation. The novelty in the authors' approach is the treatment of the chromatic components, while previous techniques treated only the luminance components and the enhanced image is interpolated with bicubic interpolation. After interpolation, the interpolated surface is...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Decentralized Dynamic Query Optimization Based on Mobiles Agents for Large Scale Data Integration Systems

    The query processing in large scale distributed mediations systems raises new problems and presents real challenges: efficiency of access, communication, confidentiality of access, availability of data, memory allocation. In this paper, the authors propose an execution model based on mobile agents for the distributed dynamic query optimization. In this model,...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Modeling Academic Performance Evaluation Using Fuzzy C-Means Clustering Techniques

    In this paper, the authors explore the applicability of Fuzzy C-Means clustering technique to student allocation problem that allocates new students to homogenous groups of specified maximum capacity, and analyze effects of such allocations on the academic performance of students. This paper also presents a Fuzzy set and Regression analysis...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Use of Genetic Algorithm in Quality Measurement

    Assigning access specifier is not an easy task as it decides over all security of any software though there are many metrics tools available in a market to measure the security at early stage. But in this case assignment of access specifier is totally based on the human judgment and...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    Do Programming Languages Influence the Impact of Software Changes?

    During a software development process, changes happen in almost every phase: requirements, design implementation, and maintenance. Software-change impact analysis, or simply impact analysis (IA), has been recognized as a key maintenance activity. IA aims at estimating the potentially impacted entities of a system due to a proposed change. In this...

    Provided By International Journal of Computer Applications