International Journal of Computer Applications

Displaying 321-360 of 5728 results

  • White Papers // Oct 2014

    Video Watermarking Techniques - A Review

    In this paper, the authors present a rapid growth in the progress of digitization and creation of digital multimedia content. Image and video makes up the majority component in digital multimedia content. The potential solution for protection and prohibiting copyright infringement of multimedia is only using digital watermarks. The characteristic...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    An Efficient Approach for Detection of Wormhole Attack in Mobile Ad-hoc Network

    Mobile Ad-hoc NETworks (MANETs) consist of a collection of wireless mobile nodes which dynamically exchange data among themselves without the reliance on a fixed base station or a wired resolution network. MANET nodes are typically well known by their precise power, transformation, and memory effects as well as high degree...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Data Encryption Techniques for USB

    Universal Serial Bus (USB) external devices are high speed flash/external drives which can boast data transfer speeds, about as large as 5Gbps. Host controlled USB is the fastest way of transferring material to an external device available today. It is easy, convenient and fast to access these USB devices as...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    D- A Powerful General Purpose Application Programming Language

    The real purpose of a programming language is to communicate a set of instructions to a system, basically a computer. Just like natural languages, programming languages are described using their syntaxes and semantics. This paper presents a comparison of a newly-developed programming language called D with traditional languages like C,...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    A Simple Approach to SQL Joins in a Relational Algebraic Notation

    Join is an operation in accessing the data from table if number of tables exceeds one. Whenever, the authors need the data which is not available from a single table, then it needs to necessitate using join operation. Sometimes join is required even if there is a single table. It...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    A Novel Approach for Mining Trajectory Patterns of Moving Vehicles

    With the advances in location-acquisition technologies such as Global Positioning System (GPS), Global System for Mobile communications (GSM) etc, increasing amounts of movement data collected from various moving objects such as animals, vehicles, mobile devices, and climate radars have become widely available. Turning a collection of time-geography data into mobility...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    An Ontology Based Context-Aware Application

    Today, users want to communicate with their smart devices just like the way they want to do with their friends. Just as a friend knows about favorite dish, place to hang out, bank in which the user friends hold an account. The paper gives information about context-aware recommender application with...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    A Novel Technique to Improve the Performance of Wireless Sensor Network Using Adaptive Antennas and High-Altitude Platform Communications

    In this paper, the performance of Wireless Sensor Networks (WSN) is improved using adaptive antenna technique and High-Altitude Platforms systems (HAP). An Adaptive Concentric Circular Array (ACCA) is proposed to improve the communications link between sink and sensor nodes. The system is first demonstrated for several scenarios including different cell...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Fuzzy Approach for the Synthesis of Mass Exchange Network

    Absorption, stripping, extraction, leaching, adsorption, and ion exchange; all are the indispensable mass exchange operations used in chemical industries. The purpose of Mass-Exchange Networks (MENs) is to use mass (e.g., water) more efficiently, decreasing simultaneously the waste discharged to the environment and the raw material used and thus optimizing the...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Performance Enhancement of Database Driven Technique Using Cynosure Method in Cloud

    Cloud computing is characterized by illusion of infinite computing resources, shared infrastructure, elimination of an up-front commitment by cloud users, ability to pay for use as needed, and secernent its users and operators. These above mentioned characteristics inflict new challenges to database applications entertained in the cloud, some of them...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Sensor Information Management Using Cloud Computing

    Wireless Sensor Network (WSN) and cloud computing are the present day technologies which enable novel and attractive solutions for information gathering and accessing it across the globe. There is a meticulous research going on in the labs and universities on these areas. However, there are obstacles that must be overcome...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Secure Live VM Migration in Cloud Computing: A Survey

    Cloud Computing (CC) refers to delivering applications, platform used to execute user application and Infrastructure to fulfill user hardware requirement as a service over internet. Virtual Machine (VM) is normally stored on data centers who consist of set of physical servers where VM is executing to fulfill service when gets...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Capacity Management for Virtualized Data Centers using ECIES and Scheduling

    With the growth internet development cloud computing is novel technique to serve better and secure services. E-business is growing rapidly with the development of Internet. The cloud computing provides on demand self service methodology that authorizes users to request resources dynamically as a best benefit. The use of cloud computing...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Improving Task Scheduling in Large Scale Cloud Computing Environment Using Artificial Bee Colony Algorithm

    In the face of scheduling, the tasks are scheduled by using different scheduling algorithms. Each scheduling algorithm has own particularity and complexity during Scheduling. In order to get the minimum time for the execution of the task the scheduling algorithm must be good, once the performance of the scheduling algorithm...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Power - Aware Virtual Machine Consolidation Considering Multiple Resources with Live Migration

    Today the computing technologies require high level of efficiency and infrastructure that datacenters were unable to provide previously. Lack of efficient infrastructure can serve only limited number of users and simultaneously emits large amount of carbon footprint and over utilizes electrical power. Virtualization emerged as prime technique for service management...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Dependency Mapper Based Efficient Job Scheduling and Load Balancing in Green Clouds

    Cloud computing is usually recognized as a technology which has significant impact on IT. However, cloud computing still has many crucial problems. In a cloud computing system, load balancing is the most central issue in the system i.e. to distribute the load in an efficient manner. It plays a very...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Operating Systems: Basic Concepts and Challenges Against Virtualization

    Operating Systems (OS) act as fundamentals to the basic computer systems in today's world. An OS is the communication between the software the user use and the hardware that lies underneath. Every electronic signal talks with their operating system to understand the work it has to do or the way...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Comparative Study of Various Next Generation Network-Business Process Frameworks

    The growth in telecommunication industry in technology, forced the necessity to shape up the existing business models. A business process can be defined as a flow of business activities. The paper discusses the impact of different process frameworks along the various key parameters that synthesizes views from areas such as...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Comparative Study on Exterior RCC Beam Column Joint Subjected to Monotonic Loading

    Computer simulation offers the potential for improved understanding of the local and global mechanisms that determine the response of structures to severe loading. The research presented here focuses on development of a finite element model using ABAQUS software to be used in investigating the behavior of reinforced concrete exterior beam-column...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    An Efficient Gateway Election Algorithm for Clusters in MANET

    The dynamic nature of mobile ad hoc network brought several constraints like scalability, robust connectivity, limited power constraints etc. Several cluster based routing algorithms have been proposed for large scale ad hoc networks. In cluster-based routing, the network is logically divided into groups called clusters. This grouping is to sustain...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    RS-MONA: Reliable and Scalable Secure Method to Store and Share Secrete Data for Groups in Cloud

    In this paper, the authors present various issues related to privacy and security while storing user's data on untrusted cloud. In today's world sharing of group resource among the cloud users is a major problem. There is a lot of research being made to find out the issues with these...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Existing Software Stakeholder Practices an Overview

    Software technology is an ever changing and dynamic science. As in other spheres, here too, despite the vast extent of interactive and participatory software practice and theory, there is still little shared understanding amongst those involved. The success of a software project is directly affected by the lack of understanding...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Prevention of Virus Propagation in Mobile Network

    Infections and malwares have the capacity to spread beginning workstation systems into versatile systems with the fast improvement of brilliant phone clients. Currently, there are three disease vectors utilized by portable malware to spoil versatile. A Bluetooth affiliation permits document exchange if the telephone's Bluetooth stack helps OBEX trade -...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Driver Behavior Monitoring Through Sensors and Tracking the Accident Using Wireless Technology

    Monitoring the driver behavior is one of the ways to prevent the fatal accidents and it is necessary to alert the driver when they are drowsy or in a distracted state. Distraction and drowsiness of the driver have been important factors for a large number of major accidents. They reduce...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    HDLC Implementation in Wireless Sensor Networks

    In this paper, the authors aim the designing and implementing an efficient HDLC chip. They use pipelining technique in HDLC register module which increases the throughput of the system and also helps in decreasing the delay of the system. In pipeline technique, number of instructions has been executed at the...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    PI-RTOS: Platform Independent RTOS

    In this paper, the authors propose a real-time operating system kernel for the 32-bit Leon3 processor. A system is said to be Real Time if it is required to complete its work and deliver its services on time. In a real-time system the correctness of its output, is an important...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Software Requirement Engineering Risk Prediction Model

    Analysis of many software program assignments from 2011 through 2014 shows interesting patterns. When the user compare large assignments that have efficiently attained their own cost as well as schedule quotes versus the ones that ran delayed, ended up over spending budget, or maybe ended up, half a dozen popular...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    An Enhanced Energy Aware Coverage Preservation with Static Clustering for WSN

    A Wireless Sensor Network (WSN) consists of a huge number of sensor nodes associated via wireless medium. Nodes in a WSN are organized with limited battery energy and thus improvement on network lifetime by reducing energy-usage is of extreme important. One of the solutions to minimize such energy-usage is associate...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    A Novel Predictive and Non-Predictive Cooperative Model for Routing in Ad Hoc Networks

    Ad hoc networks are formed by intermediate nodes which agree to relay traffic. The link between nodes is broken when a node rejects to relay traffic. Various parameters like depreciation in the energy of a node, distance between nodes and mobility of the nodes play a vital role in determining...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Requirement Risk Identification: A Practitioner's Approach

    Software project development has always been associated with high failure rate. The failure of a software project depends on rooted risks. These risks don't come into face at early stages of requirement gathering and analysis which carried on in the further phases of development greatly affects the cost of a...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    A Cooperative Strategy for Collision Detection and Prevention for Unmanned Ground Vehicles in Military Applications Using WSN Based VANET

    In the recent years, Vehicular Ad hoc NETworks (VENETs) have gained tremendous attention of researchers due to various services they provide and likely to be deployed commercially in coming years. VANET enables vehicles to communicate with each other to avoid any critical situation such as vehicle collision, unseen obstacles etc....

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Optimized Conditional Privacy Preservation Protocol for NFC Applications Using Genetic Algorithm

    In the recent years, the NFC with the combination of smart devices has widened the utilization range of NFC. It is said it will replace the credit card in electronic payment so security is one of the area that is to be checked. Currently the NFC security requires user's public...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Optimal Software Release Time Policy using Goal Programming

    In this paper, the impact of software testing effort and the efficiency on the modeling of software reliability for optimizing the cost in case of release time policy has been discussed. Another important problem in the software development process is to determine when to stop testing and release the software....

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Adhoc On-Demand Distance Vector - Energy Efficient Approach

    As nodes of Mobile Ad hoc NETwork (MANET) are mobile in nature, overall network lifetime is one of the key challenges in MANET. To improve overall network lifetime along with packet delivery fraction and normalized routing load, this paper proposed an Optimized Multi-hop Routing Ad hoc On-demand Distance Vector protocol...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    A Novel Feature Based Unified Node Data Analysis (FBU-NDA) Based IDS Using AODV in MANET

    MANET is a type of wireless network, which works on radio frequencies and holds short range communication. As it is temporary in nature and is having movable devices for communication which makes such network as infrastructure less. In such network variable conditions of routing will face several issues which degrade...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Survey of Integrity Verification in Multi-Cloud Storage by Efficient Cooperative Provable Data Possession

    Provable Data Possession (PDP) is one of the techniques to ensure the integrity of data in storage outsourcing. Here in this paper, the authors speak to the creation of an efficient PDP method for distributed cloud storage to maintain the scalability of service and data migration. On the basis on...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    An Elliptical Routing Protocol for Wireless Mesh Networks: Performance Analysis

    Wireless Mesh Networks (WMN) is one of the implemented types of MANETs. WMN is wireless network, in which each node can communicate directly with one or other peer nodes. In generally, MANET routing protocols are used in WMN, it arises performance issues. In this paper, the authors propose a new...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Acknowledgment Time Delay Approach to Optimize TCP Performance in Hybrid Networked Systems

    Transmission Control Protocol (TCP) is connection oriented transport protocol used on IP in wireless medium and it insists lossless data transmission in proper order. When TCP is used as a transmission protocol where physical layer is wireless medium, results high packet reordering due to bursty traffic and drastic variation in...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Enhanced CSMA/CA Contention Window for Efficient Random Access in IEEE 802.15.6

    The IEEE 802.15.6 is a new communication standard on Wireless Body Area Network (WBAN) for short-range, wireless communications in the vicinity of, or inside a human body. It is used for medical and non-medical applications. The IEEE 802.15.6 defines a Medium Access Control (MAC) layer compatible with several PHYsical layers...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    A Security Measure for Electronic Business Applications

    With the growth of business over the internet, there is more scope of security vulnerabilities over the internet. Despite of many efforts to make internet safe to the users, there is still a possibility for threats. The client, as well as the merchant for the electronic business, always faces problems...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Building a Trust Model for Generating and Validating Assurance Keys Between Consumers in E-Commerce

    This paper investigates trust building among members of Virtual Communities (VC) as an effective way in E-Commerce from the Consumer-to-Consumer (C2C) perspective. So it reviews studies in E-Commerce, which focus on trust building in the other party. It also reviews websites operating in the same area, the most common of...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Enhancing Security of Cloud Computing Using Elliptic Curve Cryptography

    Cloud computing is a form of distributed computing environment. It provides an environment where thousands of computers work in parallel to perform a job in much less times than traditional client server model. This parallelism happens because of low cost virtualization of hardware resources. Cloud computing abstracts the complexity of...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Data Interpretation and Transmission Techniques for High Performance Computing Machines

    Now a day's efficient and fast interpretation and transmission techniques are becoming more and more vital for the machine designers to take optimum result from limited resources. The quality for interpretation of the instructions and transmissions are becoming the back bone for the success of any modern computing machines. The...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    The Location Conscious Mobile Phones in Cloud

    At the present time, mobile technology is part of day to day life and activities and the mobile flora and fauna are rising, with Smartphone's and tablets being the principal growth drivers. The mobile phones are no longer just another device; the people rely on their capabilities in work and...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    A Survey on Video Inpainting

    Video inpainting is a growing area of research. Many algorithms have been developed so far among which some are directly extended from the image inpainting algorithms. In this survey various patch based and object based video inpainting techniques are reviewed considering its merits and demerits. Inpainting also known as retouching...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Overlapping Patterns Recognition with Linear and Non-Linear Separations Using Positive Definite Kernels

    The detection of overlapping patterns in unlabeled data sets referred as overlapping clustering is an important issue in data mining. In real life applications, overlapping clustering algorithm should be able to detect clusters with linear and non-linear separations between clusters. The authors propose in this paper an overlapping clustering method...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    PSO Based TCSC Placement for Security Enhancement

    Flexible AC Transmission System (FACTS) devices play a vital role in improving the static as well as dynamic performance of the power system. The location and size of these devices play a major role in deciding the extent to which the goal of improving the system performance is achieved in...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Cloud Computing: "The Silver Lining"

    In the last few years, the emergence of cloud computing has been receiving quite some attention. A typical business question deals with how to equip user requirements to utilize the full potential of the market without taking any risk or over-investment in wrong choices. That is why a cloud model...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    A Semi-Linear Relation Between Inputs and Outputs of DES S-Boxes

    The Data Encryption Standard (DES) is the most widely used cryptosystem developed by a team of cryptographers working at IBM. DES has been cryptanalyzed intensively by researchers, but no efficient attack has been found on DES so far. This is mainly due to the lack of an obvious algebraic relation...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    An Approach on Semi-Distributed Load Balancing Algorithm for Cloud Computing System

    Cloud computing is deployed in the data centre where physical machine are virtualized. Cloud computing being the new technology has both advantages and disadvantages; one of the issues which cloud computing faces is load balancing. More than one virtual machine runs above the Virtualization. Load balancing in cloud computing is...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    A Review of Parallelization Tools and Introduction to Easypar

    Multi-core processors have paved the way to increase the performance of any application by the virtue of benefits of parallelization. However, exploiting parallelism from a program is not easy, as it requires parallel programming expertise. In addition, manual parallelization is a cumbersome, time consuming and inefficient process. A number of...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Prediction of Final Result and Placement of Students Using Classification Algorithm

    The quality higher education is required for growth and development of country. Professional education is one of the pillars of higher education. Data mining techniques aim to discover hidden knowledge in existing educational data, predict future trends and use it for betterment of higher educational institutes as well as students....

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Stereo Matching Using Multi-Resolution Images on CUDA

    Stereo matching technique is used to estimate the depth of objects in an image acquired from real time scenes. The basic algorithm is not very complex but is computationally exhaustive and hinders its usage for real time applications. However, this algorithm is highly data parallel and it highly suitable for...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Video Steganography for Face Recognition with Signcryption for Trusted and Secured Authentication by Using PCASA

    Face recognition systems are very useful in many applications such as surveillance, biometrics and security. Principal Component Analysis (PCA) has also been used in some important applications, especially in pattern detection such as face detection and recognition. In real-time applications, response time must be as fast as possible. For this...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    UML Modeling of Generic Agent Database Approach Under Distributed Computing Environment

    Due to presence of high speed bandwidth network called as National Knowledge Network (NKN) environment, the communication between the two computer systems by message passing and data transmission techniques have improved significantly. The existence of heterogeneous network environment has different configuration supporting network. In such type of networks, the process...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    CBIR Using Textural Feature

    CBIR system focuses on retrieving images from the database; the system depends on the way the indexing is being implemented. The way or method in which an image is stored will affect how it will be retrieved later and which can save more storage space and improve the retrieval process....

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Verification of Durational Action Timed Automata Using UPPAAL

    The increasing complexity of software is incessant, this phenomenon is even more accentuated when temporal aspects are introduced, hence the need for rigorous verification methods. The main purpose of this paper is to propose a quantitative verification approach based on model checking. Their properties are expressed in TCTL (Timed Computation...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Evolution of Advanced Clustering Methods in WSN: A Review

    The use of wireless sensor networks has grown tremendously in the last decade, wireless sensor networks are used in wide variety of applications. Nodes in WSN have limited battery lifetime that affects the performance of the network. Scalability is also a major concern. The use of clustering in WSN provides...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Energy-Efficient Scheduling Scheme for Virtual Machines in Cloud Computing

    A Cloud Computing is subscription-based service where the authors obtain networked storage space and computer resources. Technologies such as cluster, grid, and now cloud computing are decide allowing access large amounts computing power in fully, para-virtulized manner by amassed resources i.e. virtual machines to consumer. Cloud computing denotes energy efficiency...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Efficient Resources Allocation for Different Jobs in Cloud

    Cloud Computing is an emerging technique in recent years that provides computing as a services. In order to maximize resources utilization, many scheduling algorithms were analyzed and implemented. Job scheduling using Berger model is one of the algorithm for scheduling jobs. The combination of Berger model and Neural Network would...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    A Generic Approach for Team Selection in Multi - Player Games Using Genetic Algorithm

    The best team selection is always the requirement of management in different domains and in different organizations including government, project, industry, business and sports. The traditional team selection process is really lengthy, awkward and unclear due to manual process and personal judgments; which may lead to a disaster. These conflicting...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Semantic Data Extraction from Infobox Wikipedia Template

    Wikis are established means for collaborative authoring, versioning and publishing of textual articles. The Wikipedia for example, succeeded in creating the by far largest encyclopedia just on the basis of a wiki. Wikis are created by wiki software and are often used to create collaborative works. One of the key...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    A Hybrid PSO with Dynamic Inertia Weight and GA Approach for Discovering Classification Rule in Data Mining

    Data Mining is the efficient knowledge discovery form database. It is also form of knowledge discovery essential for solving problem in specific domain like health care, business and other field. The proposed system is based on population based on heuristic search technique, which can used to solve combinatorial optimization problem....

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Object Recognition Technique Based on Level Set Method and Neural Network

    The Object recognition is the task of finding and labeling parts of a Two-Dimensional (2D) image of a scene that correspond to objects in the scene. In this paper, the authors have proposed an efficient approach using level set method for extracting object shape contour and convex hull as a...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Text Extraction and Recognition From Image Using Neural Network

    Extraction and recognition of text from image is an important step in building efficient indexing and retrieval systems for multimedia databases. The authors' primary objective is to make an unconstrained image indexing and retrieval system using neural network. They adopt HSV based approaches for color reduction. This approach show impressive...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Increased Throughput for Load Based Channel Aware Routing in MANETs with Reusable Paths

    The widespread applications of Mobile Ad-hoc NETworks (MANETs) have lead to the development of many protocols in this field. Routing protocols for ad hoc networks have generally ignored channel fading. This paper proposes a routing protocol which calculates the channels non-fading duration for routing which attempts to minimize packet loss...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Review on Grid Task Scheduling in Distributed Heterogeneous Environment

    Computational grid is a potential technology mainly used for distributed environment. The major issues related with Grid are resource discovery, heterogeneity, fault tolerance and task scheduling. Grid task scheduling is an integrated component of computing which effectively utilizes the idle time of resources. Efficient scheduling algorithm is needed to utilize...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Context Based Web Indexing for Storage of Relevant Web Pages

    A focused crawler downloads web pages that are relevant to a user specified topic. The downloaded documents are indexed with a view to optimize speed and performance in finding relevant documents for a search query at the search engine side. However, the information will be more relevant if the context...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Evaluating Robustness of Resource Allocation in Uniprocessor Real Time System

    Real Time Systems (RTS) operate in an unpredictable changing environment that causing certain system performance features to degrade. Such systems need robustness to guarantee limited degradation despite variations in environmental parameters. EDF (Earliest Deadline First) scheduling has been used to evaluate the robustness of uniprocessor system with makespan as performance...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Information Retrieval on the Web and Its Evaluation

    Internet is one of the main sources of information for millions of people. One can find information related to practically all matters on internet. Moreover if user wants to retrieve information about some particular topic users may find thousands of Web Pages related to that topic. But, the authors' main...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Performance Evaluation of Software Effort Estimation Using Fuzzy Analogy Based on Complexity

    Rapid industrialization in the past few decades has necessitated the ever increasing demand for newer technologies leading to the dramatic development of sophisticated software for cost estimation and is expected to grow manifold in the forthcoming years. The improper understanding of software requirements has often resulted in inaccurate cost estimation....

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Page Rank Based Design and Implementation of Search Engine Optimization

    Search Engine Optimization (SEO) is an Internet marketing strategy and a process, widely used now-a-days for improving the volume or quality of traffic to a website through search engines. The results generated by search engines can be natural (organic or algorithmic) and/or paid search. In the present paper, different techniques...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    An Innovative Approach for Finding Frequent Item Sets Using Maximal Apriori and Fusion Process and Its Evaluation

    Frequent pattern mining is a vital branch of Data Mining that supports frequent itemsets, frequent sequence and frequent structure mining. The authors' approach is regarding frequent itemsets mining. Frequent item sets mining plays an important role in association rules mining. Many algorithms have been developed for finding frequent item sets...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Image Retrieval Techniques for Color based Images from Large Set of Database

    In content-based image retrieval, interactive systems have attracted a lot of research interest in recent years. Comparatively early systems, which focused on fully automatic strategies, recent approaches have supporting many are concentrated. Assuming that a user is looking for a set of images with similar feature using the query concept...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Communicating Mobile Robots a Novel Learning Approach

    The authors introduce and demonstrate here a learning and decision-making problem associated with a complex task that integrates human and robotic learning dynamics with feedback. This paper aims to provide a contribution to the theme of a colony of robots in the subject area of inter-agent communication and learning. The...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Spectrum Efficiency of WiMAX Networks in the Presence of Interference with Diversity Combining

    WiMAX (Worldwide interoperability for Microwave Access) is a promising technology which can offer high speed voice, video and data services up to the requirements at the customer's end. The objectives of this paper is to evaluate the Performance evaluation of a WiMAX system under various diversity schemes (Selection combining, Maximal...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Centralized Parallel Form of Pattern Matching Algorithm in Packet Inspection by Efficient Utilization of Secondary Memory in Network Processor

    The network equipment has capable of inspecting packets in order to discover the worms and virus over the network. Many network users are hacked by attackers through malicious functions are mapped on network applications. Such unauthorized activities are required to delete by deep packet inspection in application layer. The high...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    An Improved Security Enabled Distribution of Protected Cloud Storage Services by ZeroKnowledge Proof Based on RSA Assumption

    Cloud computing dynamically provides high quality cloud-based secure services and applications over the internet. The Efficient sharing of Secure Cloud storage services (ESC) scheme which allows the upper-level user to share the secure cloud storage services with multiple lower-level users. In hierarchical identity-based architecture, the sender needs to encrypt a...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    Performance Analysis of IEEE 802.15.4

    Wireless Sensor Network (WSN) consists of a large population of sensor nodes capable of computation, communication and sensing. Limited storage, processing, and transmission power are inherent limitations of WSN. IEEE 802.15.4 is a new standard, uniquely designed for Low Rate Wireless Personal Area Network (LR-WPAN), developed for applications that demand...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2012

    A Novel Technique of Steganalysis in Uncompressed Image Through Zipf's Law

    In this paper, the authors present a Novel method to detect the existence of hidden message in LSB steganography. The key element of the proposed method is the power Law: Zipf's law. The detection theory is based on statistical analysis of pixel patterns using a Zipfness measure between successive bit...

    Provided By International Journal of Computer Applications