International Journal of Computer Applications

Displaying 1-40 of 6992 results

  • White Papers // Apr 2015

    A Hybrid Approach to Association Rule Hiding

    Data mining is a technique for summarizing and identifying similar patterns in data. Data mining can take different approaches and build different models depending upon the type of data involved and the objectives. In this paper, the authors follow the association rules approach for finding the correlation relationships among large...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Design of Multinode Reconfigurable Network based Multiprocessor Systems on Chip

    Multi-Processor System-on-Chip (MPSoC) platforms are becoming increasingly more heterogeneous and are shifting towards a more communication-centric methodology. Network-on-Chip (NoC) have emerged as the design paradigm for scalable on-chip communication architectures. As the system complexity grows, the problem emerges as how to design and instantiate such a NoC-based MPSoC platform in...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Design of Reconfigurable Multiprocessor Architecture for Embedded System

    Multiprocessing, as generally defined, is the use of two or more Central Processing Units (CPUs) within a single computer system. The term also refers to the ability of a system to support more than one processor and/or the ability to allocate tasks between them. Embedded systems are the brains of...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Database Security through Risk Assessment

    Database security is the foundation of the new electronic business, e-commerce and other business system including intranet and extranet users. The Internet and e-commerce uses have ballooned and India has become an emerging power in the IT enabled services field. As Internet accessing costs are falling user's increases and India...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Predicting Examination Results Using Association Rule Mining

    Higher education has changed a lot in the last decade. The use of various innovative techniques and technologies, especially ICT in teaching learning process is increasing day-by-day. Number of information systems has been developed and successfully implemented to support educational processes. These systems typically capture almost every data regarding a...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    FPGA Implementation of a Modified Turbo Encoder

    Turbo Convolutional Codes (TCC) are excellent error correcting codes, however TCC decoding based on A-Posteriori Probability (APP) algorithm is computationally complex and the complexity is not significantly reduced even if puncturing mechanism is used. To overcome the above disadvantage, turbo codes need to be concatenated with other coding techniques such...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    A Domain and Language Construct Based Mapping to Convert Natural Language Query to SQL

    DataBase Management Systems (DBMSs) have been widely used for storing and retrieving data. However, databases are often hard to use since their interface is quite rigid in co-operating with users. End user is required to issue SQL query to retrieve information from the database. Thus, a user cannot interact directly...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Improving Current Hadoop MapReduce Workflow and Performance

    In this paper, the authors propose an improvement and implementation of enhanced Hadoop MapReduce workflow that develop the performance of the current Hadoop MapReduce. This architecture speeds up the process of manipulating big data by enhancing different parameters in the processing jobs. Big data needs to be divided into many...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    A Low Power VLSI Implementation of STTRAM Based TCAM for High Speed Switching Circuits

    Ternary Content-Addressable Memory (TCAM) is often used in high speed search intensive applications such as ATM switch, IP filters. Hence, currently ZTCAM, is introduced which emulates the TCAM functionality with SRAM. It has some drawbacks such as low scalability, low storage density, slow access time and high cost. But, this...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    VLSI Implementation of Low Power Area Efficient Fast Carry Select Adder

    Carry SeLect Adder (CSLA) is one of the speedy adders utilized as a part of numerous computational frameworks to perform quick number crunching operations. The carry select adder utilizes an effective plan by imparting the Common Boolean Logic (CLB) term. The modified CSLA architecture building design has created utilizing Binary...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Design of NoC Router Architecture Using VHDL

    Network-on-Chip (NoC) is an advance design method of communication network into System-on-Chip (SoC). It provides solution to the problems of traditional bus-based SoC. It is widely considered that NoC will take the place of traditional bus-based design and will meet the communication requirements of next SoC design. A router is...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Interactive Technologies Utilization Model for University Relationship Marketing Strategies

    In this paper, the authors develop a usage model for interactive technologies for university marketing strategies, using a combination of the Task Technology Fit (TTF) model and the Information Systems Acceptance (ISA) model. Interactive technologies enables the universities to inexpensively engage their customers in one-to-one. Over the years, relationship marketing...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    A Survey on Energy Performance Improvement with Data Aggregation Techniques for WSN

    In the recent advance in science and technology, the communication system has been marching towards quick development. Wireless sensor network is one of the important blocks for communication. The major limiting factors in wireless sensor network are power consumption requirements, life time of network, data integrity and data confidentiality. Data...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Software Bug Detection Using Data Mining

    The common software problems appear in a wide variety of applications and environments. Some software related problems arises in software project development i.e. software related problems are known as software defect in which software bug is a major problem arises in the coding implementation. There are no satisfied results found...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Performance Analysis of Magnitude Comparator Using Different Design Techniques

    Comparators are a basic design module and element in modern digital VLSI design, digital signal processors and data processing application-specific integrated circuits. This paper comprises of design of three different comparators for 2, 4 and 8-bit magnitude comparison. The above said designs are prepared using two different design approaches: weighted...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Intelligent Task Allocation in Multi Core Environment

    The architectural advancements in desktop computing have made embedded devices in real-time applications to adopt multi-core architectures. Constrained power availability but ever increasing performance requirements are the main reason for this migration. Failure to allocate tasks to specific cores would result in some tasks running while other tasks in other...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    A Proposed Approach for Efficient Energy Utilization in Cloud Data Center

    Cloud computing has transmuted the IT industry on the whole and made easy to access the resources from anywhere and at any time. These resources can be accessed as a service rather than as a product. Clients pay for the service used as per their requirement. The huge demand of...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Spam Detection in Social Media Networks: A Data Mining Approach

    The ubiquitous use of social media has generated unparalleled amounts of social data. Data maybe texts, numbers or facts that is computable by a computer. A particular data is absolutely useless until and unless converted into some useful information. It is necessary to analyze this massive amount of data and...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Unsupervised Technique for Web Data Extraction: Trinity

    Search engine is a program which searches specific information from huge amount of data. So, for getting results in an effective manner and within less time this technique is used. This paper is having a technique which depends on two or more web documents which are generated from same server-side...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    High Performance Computing and Big Data Analytics - Paradigms and Challenges

    The advent of technology has led to rise in data being captured, stored and analyzed. The requirement of improving the computational models along with managing the voluminous data is a primary concern. The transition of the high performance computing from catering to traditional problems to the newer domains like finance,...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Algorithm to Monitor Suspicious Activity on Social Networking Sites Using Data Mining Techniques

    In today's world, social networks have become a platform to express opinions or feelings related to current events or any other topics. But, sometimes provocative posts related to renowned people, religion, sexuality, countries or any other sensitive topics create havoc in the society. Such posts must be administered and removed...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    A Regression Modeling Technique on Data Mining

    A regression algorithm estimates the value of the target (response) as a function of the predictors for each case in the build data. These relationships between predictors and target are summarized in a model, which can then be applied to a different data set in which the target values are...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Improving the Performance of Read Operations in Distributed File System Using Global Cache Mechanism and Anticipated Parallel Processing

    Distributed File System (DFS) is the main storage component of a Distributed System (DS). DFS provides scalable storage to the DS and it is also the main component of any cloud storage system. Improving the performance of read operations in a DFS is very important as many web-based applications deployed...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Recommender System Based on Learner Knowledge and Opining Using Data Mining Techniques in Synchronous E-Learning Environment

    Learners are often getting uncertainty by the flow of information and have trouble in selecting the material to learn that satisfies their requirements and interests. It is the fact that the learners, learning interest and behavior changes over the time and subject to subject. It is very important, thus, to...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Accessing the Data Efficiently Using Prediction of Dynamic Data Algorithm

    The Internet carries an extensive range of information resources and services throughout the world. Without Internet finding a particular thing, or get details of those things is not possible. In this paper, the system focuses on accessing the data efficiently through offline or online. In addition of this paper, the...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Task Migration Mechanism in a Homogeneous X86 64bit Multikernel Environment

    Today, the machines are multi-cores and these cores are increasing rapidly. Multi-kernel treats multi-core machine as a network of independent cores. The multi-kernel can handle the challenges of multi-core by running independently kernel instances and finally these kernel instances are cooperating to form a single operating system. The multi-kernel concept...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Stegtorrent Using De-Clustering of Data

    Now-a-days, for uploading and downloading of data using torrent people widely use internet. Existing system was less secure and time consuming. To avoid this problem, steg-torrent using de-clustering of data is implemented. For file transfer service, steg-torrent is a new network steganographic method. To achieve availability and scalability of storage...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Validation of Deduplication in Data Using Similarity Measure

    De-duplication is the process of determining all categories of information within a dataset that signify the same real-life/world entity. The data gathered from various resources may have data high quality issues in it. The concept to identify duplicates by using windowing and blocking strategy. The objective is to achieve better...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Design Space Exploration of DSP Techniques for Hardware Software Co-Design: An OFDM Transmitter Case Study

    In this paper, the authors describe the exploration of design parameters for widely used Digital Signal Processing (DSP) algorithms and techniques. In this paper, some of the DSP algorithms and techniques are considered and executed them on soft-core processors like general purpose processors, digital signal processing processers and also on...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Process Mining by Using Event Logs

    Process mining techniques have usual notable attention within the literature for their ability to help within the re-design of complex processes by mechanically discovering models that specify the events registered in some log traces provided as input. Process mining refers to the extraction of process models from event logs. Now...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Framework for Social Network Data Mining

    Social networks have become a vital component in personal life. People are addicted to social network features, updating their profile page and collaborating virtually with other members have become daily routines. Social networks contain massive collection of data. Web data mining is a new trend in the current research body....

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Efficient Data Dissemination Techniques in VANETs: A Review

    Vehicular Ad hoc NETworks (VANETs) being a sub class of MANET is a challenging field of wireless communication. It is a sensible way of using infrastructure fewer networks augmented with Intelligent Transportation System (ITS). It is an emerging trend now-a-days for vehicles to be equipped with an embedded on-board computing...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Review on Fault Tolerance Techniques in Cloud Computing

    With the immense growth of internet and its users, cloud computing, with its incredible possibilities in ease, quality of service and on-interest administrations has turned into a guaranteeing figuring stage for both business and non-business computation customers. It is an adoptable technology as it provides integration of software and resources...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Bisecting K-Means for Clustering Web Log data

    Web usage mining is the area of web mining which deals with extraction of useful knowledge from web log information produced by web servers. One of the most important tasks of Web Usage Mining (WUM) is web user clustering which forms groups of users exhibiting similar interests or similar browsing...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Synchronous CR-OLAP Tool for Efficient Parallel Computing

    Real Time OLAP (OnLine Analytical Processing), or RTOLAP, is the capability to quickly retrieve, aggregate, analyze and present multidimensional data for cubes whenever there are changes to the data in the relational data sources, without having to run heavy processing on the cube. A big advantage of real time OLAP...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Fuzzy Goal Programming Approach to Solve Linear Multilevel Programming Problems using Genetic Algorithm

    In this paper, the authors introduce a priority based Fuzzy Goal Programming (FGP) method for modelling and solving MultiLevel Programming Problem (MLPP) through Genetic Algorithm (GA). In model formulation, the individual best solution of objectives of each of the Decision Makers (DMs) is determined by using the GA method for...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Efficient Classifier Generation over Stream Sliding Window using Associative Classification Approach

    Prominence of data streams has dragged the interest of many researchers in the recent past. Mining associative rules generated on data streams for prediction has raised greater research interest in recent years. Associative classification mining has shown better performance over many former classification techniques in data mining and data stream...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Bio Inspired Algorithms: An Efficient Approach for Resource Scheduling in Cloud Computing

    Nature plays a vital role in solving complicated problems in computer science. It helps user in finding the optimal desired way to solve extremely dynamic, difficult and robust problems. Bio inspired algorithm help them to cope with the technological need of a new era. Many researchers did enormous work in...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    An Optimizing Technique based on Genetic Algorithm for Power Management in Heterogeneous Multi-Tier Web Clusters

    The most serious drawback now-a-days is the power management because the web applications are becoming more sophisticated and their processing power is gradually increasing. Current cluster are designed to handle peak loads, where all servers are equally utilized. In practice, peak load conditions barely happen and clusters are most of...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Survey of Security Algorithms in Cloud

    Cloud computing refers to the delivery of computing resources over the web. Computing resources are shared rather than having personal devices to handle applications. Information is accessed simply at anywhere, anyhow by connecting users' device with web. Cloud computing is predicated on web services used for storing, transferring and lots...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Intrusion Detection Systems - Analysis and Containment of False Positives Alerts

    The dependence on information technology became critical and IT infrastructure, critical data, intangible intellectual property are vulnerable to threats and attacks. Organizations install Intrusion Detection Systems (IDS) to alert suspicious traffic or activity. IDS generate a large number of alerts and most of them are false positive as the behavior...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Robot Teleoperation System Based on GPRS for Militan Confidential

    This paper presents a strategy for using the cellular network, and specifically the general Packet Radio Service, to teleoperate a mobile robot. This allows the system user a wider mobility range and coverage. The system application is developed using Java Programming Language, implementing two teleoperation methods: predefined sequences and instant...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    An Efficient WS-QoS Broker Based Architecture for Web Services Selection

    Web Service selection is a key component in service-oriented computing. Service-Oriented Architectures follow the find-bind execute paradigm in which service providers register their services in public or private registries, which clients use to locate web services. The QoS based web service selection mechanisms plays an essential role in service-oriented architectures,...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2010

    Semantic Cloud for Mobile Technology

    The paper highlights and outlines the architecture of SCM (Semantic Cloud for Mobile), a blend of two emerging web technologies, semantic web and cloud computing, for revolutionizing data access and processing capabilities over mobile platform. The emphasis lies on decoupling of data processing and management from mobile hardware, alongwith the...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Compression of Various Routing Protocol in Wireless Sensor Network

    Wireless Sensor Networks have emerged as an important new area in wireless technology. Wireless Sensor Networks (WSN) consists of numerous tiny sensors deployed at high density in regions requiring surveillance and monitoring. There are many existing protocol, techniques and concepts from traditional wireless network, such as cellular network, mobile ad-hoc...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2010

    Regular User Priority Scheme for Performance Improvement in 4G Network

    Wireless network are growing rapidly, leading to overloaded systems, unacceptable delays and increasing computational costs due to inefficient channel allocation strategy. Handoff call is more important over new call so it must provide some priority; this is the prime objective of all channel allocation strategy. This paper proposes regular users...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2010

    Broadband Frequency Domain-Based Air Interfaces for 4G Cellular Wireless Systems

    Future-generation cellular wireless systems, transporting high bit rates in non-ideal radio propagation environments, must be robust to severe frequency selective multipath. Further requirements include moderate terminal and base station hardware costs, high spectral efficiency, and scalability of the cost of terminals with respect to their maximum bit rate capabilities. Reconfigurable...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Performance Analysis of Proactive and Reactive Routing Protocols for Ad Hoc Networks

    Mobile Ad hoc networks are the collection of wireless nodes that can exchange information dynamically among them without pre-existing fixed infrastructure. Because of highly dynamic nature, performance of routing protocols is an important issue. In addition to this routing protocols face many challenges like limited battery backup, limited processing capability...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2010

    Analyzing Core Migration Protocol Wireless Ad Hoc Networks by Adopting Multiple Nodes Diverse Test-bed

    A number of application level multicast protocols have been proposed for core selection and core migration in Mobile Ad Hoc Networks. Core migration is necessary to minimize any disruptions on the transmission of data due to the changes in tree structure and to achieve improvement in the delivery of media...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2010

    Classification of Current Routing Protocols for Ad Hoc Networks - A Review

    An ad hoc wireless network is a collection of two or more devices or nodes or terminals with wireless communications and networking capability that communicate with each other without the aid of any centralized administrator also the wireless nodes that can dynamically form a network to exchange information without using...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks

    Appropriate routing protocol in data transfer is a challenging problem of network in terms of lower end-to-end delay in delivery of data packets with improving packet delivery ratio and lower overhead as well. This paper explains an Effective and Scalable AODV (called as AODV-ES) for Wireless Ad hoc Sensor Networks...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2010

    Load-Balancing Approach for AOMDV in Ad-Hoc Networks

    Routing protocol is a challenging issue in ad hoc networks. It has been studied thoroughly these years. However, most routing protocols in ad hoc network do not consider the problem of load balance. This paper presents an effective scheme to balance the load in ad hoc network. Ad-hoc On demand...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Black Hole Attack Prevention in Multicast Routing Protocols for Mobile Ad Hoc Networks Using Certificate Chaining

    Security in wireless ad-hoc networks is a complex issue. The wireless and dynamic nature of ad-hoc networks makes them more vulnerable to security attacks when compared with fixed networks. The existing routing protocols are optimized to perform the routing process without considering the security problem. Black hole attack is one...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Secure Group Communication Using Multicast Key Distribution Scheme in Ad Hoc Network (SGCMKDS)

    In Recent years, secure communications have become a important subject of research. The new service for wireless and wired networks is to provide confidentiality, authentication, authorization and data integrity. Security has always been a sensitive issue. In fact, this service becomes necessary to protect basic applications, especially E-commerce and bank...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Performance Characteristics of Cluster - Based Multicast Key Distribution Scheme for Mobile ADHOC Networks

    Many emerging commercial and military applications require secure multicast communication in adhoc environments. Secure multicast communication in mobile adhoc networks is challenging due to its inherent characteristics of infrastructure-less architecture with lack of central authority, high packet loss rates and limited resources such as bandwidth, time and power. Hence key...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2010

    Performance Analysis of AODV & DSR Routing Protocol in Mobile Ad Hoc Networks

    Mobile Ad hoc NETwork (MANET) is an autonomous system of mobile nodes connected by wireless links. Each node operates not only as an end system, but also as a router to forward packets. The nodes are free to move about and organize themselves into a network. These nodes change position...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2010

    A QoS-Based Resources Reservation Mechanism for Ad Hoc Networks

    For the last several years, there has been a significant increase of interest in supporting Quality of Service (QoS) constraints in Mobile Ad Hoc Networks (AHNs). AHNs include mobile nodes with limited capacities and communication resources. This specificity makes existing solutions for wired networks little suitable and a broad range...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Traffic Pattern Based Performance Comparison of Reactive and Proactive Protocols of Mobile Ad-Hoc Networks

    The primary objective of this paper is to study and investigate the performance measures of Reactive protocols (AODV, TORA) and Proactive protocols (DSDV) routing protocols of MANET using TCP & CBR based traffic models. This paper will simulates the environment used for analyzing, evaluating and implementing AODV, DSDV and TORA...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2010

    PROFIDES - Profile based Intrusion Detection Approach Using Traffic Behavior over Mobile Ad Hoc Network

    Intrusion Detection in MANET is one of the major concern in peer to-peer networking scenario where mobile / wireless nodes communicate with each other without any pre-defined infra-structural setup. This paper presents an overview of various intrusion detection models, identifying its issues, discusses on design and proposes an intrusion detection...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2010

    A Study on the Behavior of MANET Routing Protocols with Varying Densities and Dynamic Mobility Patterns

    Mobility and node density are the two major factors which has much influence on the performance of any routing protocol of mobile ad hoc network. Several previous works highlighted this fact. This paper will evaluates some of the widely used MANET routing protocols with different mobility and network density. The...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2011

    Design and Development of a Secured Routing Scheme for Mobile Adhoc Network

    The development of mobile ad hoc network advocates self-organized wireless interconnection of communication devices that would either extend or operate in concern with the wired networking infrastructure or, possibly, evolve to autonomous networks. Unlike traditional wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2010

    Optimized Routing in Mobile Ad Hoc Networks Using Evolutionary Location Intelligence

    Evolutionary Location Intelligence on implementing a position based routing, that make forwarding decision based on the geographical position of a packet's destination is concentrated in this paper. One distinct advantage of this model is not necessary to maintain explicit routes. Position based routing does scale well even if the network...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2010

    A Literature Review of Security Attack in Mobile Ad-Hoc Networks

    Security is a major concern for protected communication between mobile nodes in a hostile environment. In hostile environments adversaries can bunch active and passive attacks against intercept able routing in embed in routing message and data packets. In this paper, the authors focus on fundamental security attacks in Mobile adhoc...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2010

    Fuzzy-Controlled Power-Aware Routing Protocol (FPRP) for Mobile Ad Hoc Networks

    In multi-hop wireless ad-hoc networks, designing energy-efficient routing protocols is critical since nodes are power-constrained. However, it is also an inherently hard problem due to two important factors: First, the nodes may be mobile, demanding the energy-efficient routing protocol to be fully distributed and adaptive to the current states of...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Performance Analysis of Congestion Control in Mobile ADHOC Grid Layer

    Mobile Ad Hoc Grid deals with the challenges in resource discovery and job scheduling due to its mobility and power consumption. In this paper a new grid computing technique is implemented to manage the congestion control with job scheduling. The proposed addition of the mobile ad hoc network with in...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Detection and Removal of Cooperative Black/Gray Hole Attack in Mobile ADHOC Networks

    Mobile Ad hoc NETworks (MANET) are widely used in places where there is little or no infrastructure. A number of people with mobile devices may connect together to form a large group. Later on they may split into smaller groups. This dynamically changing network topology of MANETs makes it vulnerable...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2010

    Highly Ensured QOS Routing in Mobile Ad Hoc Networks Based on Multiple Constraints

    Routing protocols for mobile ad hoc networks have been explored extensively in the past years. Most of the work is aimed at finding a shortest path between the source and the destination, without considering the network performance influencing factors like present network traffic, movements and application requirements etc. In the...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2010

    Node Categorization Scheme (NCS) for Throughput Efficiency in Multi-Rate Mobile Ad Hoc Networks

    In multi-rate networks IEEE DCF 802.11 ensures long term equal channel access probability this in turn penalizes the faster stations in this networks. The maximum achievable throughput by any station gets bounded by the slowest transmitting peer. This leads towards the under utilization of the bandwidth. Another reason for bandwidth...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    ZRP Versus AODV and DSR: A Comprehensive Study on ZRP Performance

    Ad hoc networks are characterized by dynamic topology caused by node mobility, multihop wireless connectivity and channel non deterministic behaviour (Interference, multipath, hidden and exposed node problem makes the wireless channel very difficult to predict)This behaviour of Ad hoc networks must be analyzed in detail as a result of pairing...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2010

    On Demand Temporary Parallel Route Recovery for Frequent Link Failure in Adhoc Networks

    Adhoc network is collection of wireless mobile nodes dynamically forming a temporary network without the use of existing network infrastructure of centralized administration. Each node acts as a router by itself and forwards all the packets which it receives. This concept is basically useful when there is a very high...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2010

    Implementation of Mobile Intrusion Detection Controller [MIDC] for Affording Secure Service in MANET Environment

    In this new millennium most of the transactions depend on wireless network. In this context highly secured transaction of information is the need of the hour. During the transaction there must not be any loss of information or there should be no intrusion to assure the secured data transmission. There...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2010

    MAC Enhancements to Support Quality of Services (QoS) in Ad Hoc Wireless Networks: EMACA (Enhancement of Multiple Accesses with Collision Avoidance)

    Ad hoc Wireless Network (AWN) is a collection of mobile hosts forming a temporary network on the fly, without using any fixed infrastructure. QoS (Quality of Service) is the idea that transmission rates, error rates, and other characteristics can be measured, improved, and to some extent guaranteed in advance in...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2010

    Performance Evaluation of Routing Protocol and Congestion Control Protocol in Wireless Multi-hop Networks

    Computer networks have long suffered from congestion. Congestion occurs when an increase in the offered load results in a decrease in the effective throughput of the network. The basic cause is that the short term packet arrival rate at some gateway exceeds its service rate. Existing congestion control schemes treat...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2010

    An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs

    Mobility management is a major challenge in Mobile Ad hoc NETworks (MANETs) due in part to the dynamically changing network topologies. For mobile sensor networks that are deployed for surveillance applications, it is important to use a mobility management scheme that can empower nodes to make better decisions regarding their...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Routing Misbehavior in Ad Hoc Network

    Rushing attack may cause more vulnerability in MANET as it can be used as a pre-requisite for launching some other types of Denial of-Service attacks. Significant research efforts have been made towards increasing the survivability of MANET either by developing secure routing algorithms or by improving the robustness of MAC...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2010

    Mobile Agent as an Approach to Improve QoS in Vehicular Ad Hoc Network

    Vehicular traffic is a foremost problem in modern cities. Huge amount of time and resources are wasted while traveling due to traffic congestion. With the introduction of sophisticated traffic management systems, such as those incorporating dynamic traffic assignments, more stringent demands are being placed upon the available real time traffic...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2011

    Analytical Study the Performance Evaluation of Mobile Ad Hoc Networks Using AODV Protocol

    The Mobile Ad hoc NETworks (MANETs) have been communicating over wireless mesh channels and support multihop networks. Every node in the MANET is free to move independently in any direction. MANET is a kind of wireless mesh network which operates in Link Layer (LL) of Ad hoc networks. The current...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2010

    A Load Aware Routing Mechanism for Improving Energy Efficiency in Mobile Ad Hoc Networks

    Integration of Load Balancing mechanisms into routing protocols has elicited significant interest to alleviate congestion and improve the performance of on-demand routing protocols. For the sustained network functionality, load balancing mechanisms need to compute energy efficient paths with lesser traffic. Further severe degradation of network performance is observed due to...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2010

    Analysis of K-Connected MANETs for QoS Multicasting Using EDMSTs Based on Connectivity Index

    The survivability of the network is closely related to the connectivity of the network. For many network applications such as a sensor network/ad hoc network for battlefield monitoring or wild fire tracking etc., survivability is one of most important requirements, and therefore a number of related problems are proposed. In...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Scenario Based Performance Analysis of Variants of TCP Using NS2 - Simulator

    The increasing demands and requirements for wireless communication systems especially in settings where access to wired infrastructure is not possible like natural disasters, conferences and military settings have led to the need for a better understanding of fundamental issues in TCP optimization in MANETS. TCP primarily designed for wired networks,...

    Provided By International Journal of Computer Applications