International Journal of Computer Applications

Displaying 1-40 of 5728 results

  • White Papers // Dec 2014

    Review of Compact and Broadband High Gain Micro Strip Patch Antennas

    Generally Microstrip Patch Antenna (MPA) is used in modern communication devices and day-to-day communication is done through it. Study of literature of past few year shows that, the leading work on MPA is design compact size broadband microstrip antenna, but inherently MPA have narrow bandwidth so various techniques are engaged...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    A Survey of Misbehavior Detection Scheme in DTN

    In this paper, the authors try to review the various problems and their solution in Delay Tolerant Network (DTN) while routing the packets. In this paper, going to discuss and see the overview of various methods used in the DTN. They are simbet and bubble rap which are the DTN...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Understanding Change Prone Classes in Object Oriented Software

    Classes in object oriented systems are continuously subjected to changes and defect prone. Predicting such classes is a key research area in the field of software engineering. It is important to identify such change prone classes and defect prone classes. Identifying change prone classes can help developers to build quality...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    A New Framework for the Evaluation of QoS in Cloud Federation

    In cloud computing it is assumed that a single cloud with increased service demands because of the limitations of the hardware and software resources, can encounter overload. Cloud federation is an ideal solution to overcome these problems. There are different types of single and hybrid clouds in cloud federation. Also,...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Reliability of Fingerprint Verification in Ghana

    Biometric recognition refers to the automatic recognition of individuals based on their physiological and/or behavioral characteristics. It is used to confirm an individual's identity rather than using an identification card. Unique identifiers of humans include fingerprints, hand geometry, earlobe geometry and retina. Fingerprint verification is one of the most reliable...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Energy Proficient and Security Protocol for WSN: AODV

    Wireless sensor network is extensively used technology now-a-day in real time application. It consists of a number of autonomous sensor nodes which are organized in various areas of interest to accumulate data and jointly convey that data back to a base station. But the sensor node has limited battery energy...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Improving Performance of Cloud Based Transactional Applications Using In-Memory Data Grid

    Browser based applications are used currently to handle data related requirements of educational institutes. Such applications are not scalable due to limited scalability of database servers. The performance of such applications can be improved with the use of cloud computing and In-Memory Data Grid (IMDG). IMDG uses the concept of...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    The Power of Emotional Intelligence

    Artificial Intelligence (AI) has been one of the most widely discussed topics in computer science or electronics since its introduction back in 1956. In this paper, various aspects of emotional intelligence would be reviewed. Present systems would be discussed along with their better implementation using Brain Emotional Learning. The authors...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Implementation of an Object Oriented Model to Analyze Relative Progression of Source Code Versions with Respect to Software Quality

    Many object oriented metrics have been explored and successfully applied by researchers to measure distinct aspects of software quality. Metrics are believed to be early indicators of qualitative parameters to give an idea as to how far a software engineering process has been well-implemented. However, using these metrics in isolation...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Software Testing Process Model from Requirement Analysis to Maintenance

    It is infeasible to develop quality software without software testing. Software testing typically consumes 40-50% of development efforts, even more efforts for systems that require higher levels of reliability. It is a significant part of the software development process. If a software defect is found in latter stages of development...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    MIMO-OFDM with Enhanced Channel Estimation Based on DFT Interpolation

    In practical wireless communication systems, the transmitter sends the information out through a multipath fading channel. At the receiver side, the received information distorted by the channel characteristic (due to multipath fading). So, in order to recover the transmitted information accurately, the channel effect must be known at the receiver....

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Software Refactoring Technique for Code Clone Detection of Static and Dynamic Website

    Now-a-days, cloning of codes or programs of the developer or authorized person leads a positive approach. But the code cloning is done by unauthorized person leads a negative approach. In the recent years, many clone detection tools have been proposed. It produces an over whelming volume of simple clones of...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    A Stream Cipher Based Bit-Level Symmetric Key Cryptographic Technique Using Chen Prime Number

    In this paper, a stream cipher based symmetric key cryptographic technique based on Chen prime number has been proposed. The proposed technique is suitable for encryption and decryption of a large number of files of almost any type. A symmetric key is formed by the sender directly from the plain...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    General Access Structure Secret Sharing in Matrix Projection

    Image secret sharing is a technique which provides security to confidential images by dispersed storages. General access structure image secret sharing provides flexibility for deciding qualified subsets of participants which can reconstruct the original secret image. Non qualified subsets of participants cannot get any information about original secret image. This...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Evaluating and Emerging Payment Card Fraud Challenges and Resolution

    Payment card fraud losses for the card payment industry are generating billions of dollars. In addition to direct damage, the brand name due to fraud can be affected by a lack of customer faith. This cause the deficit is rising, financial institutions and card issuers are constantly new technologies and...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Survey and Challenges of Mining Customer Data Sets to Enhance Customer Relationship Management

    Data mining is a useful and powerful tool for any organization especially for marketing people. Data mining is used in managing relationships with customers. New trends in Customer Relationship Management - CRM- have growth. One of them is social Customer Relationship Management - CRM. The major problem here is data...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Addressing Data Security and Performance Issues on the Cloud

    Cloud computing has, with its advent, brought what IT always dreamt of adding capabilities on the fly without any new investments, thereby also reducing the cost. Be it an individual or a big organization, everyone is using cloud computing either knowingly or unknowingly. If the authors talk about the services...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    A Review on Filter Undesired Text From Social Networks

    Online Social Network (OSN) is a social networking service which is a platform to build relations among people who share comfort, actions, backgrounds or real-life connections. Hundreds of thousands of people are using these social networking services for personal use, marketing. Entertainment and business purpose. User security is the main...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    WSN Performance Issues and Various Clustering Methods

    There are several application have been developed with need of self organization for network. To fulfill this requirement need of wireless sensor network in such applications. To manage network efficiently clustering is used. Lots of works have been done in field of Wireless Sensor Networks (WSNs) in last few years....

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    XML Based Keyword Search

    The success of information retrieval style keyword search on the web leads to the emergence of XML based keyword search. The text database and XML database differences leads to three new challenges: the users search intention is to be identified, i.e., the XML node types that user wants to search...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    A Comparative Study of Call Admission Control in Mobile Multimedia Networks Using Soft Computing

    Call Admission Control (CAC) is one of challenging issues for Quality of Service (QoS) provisioning in mobile multimedia network communication systems. CAC can be defined as the system that restricts the network access based on resource availability. A new call is admitted if enough idle resources are available in order...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Secure Profile Matching for Portable Public Networks

    In portable public networks creation of the new connection is important service. Where an existing client can discover related users bounded by objects nearness of the users. In portable public networks, the authors can provide connection to the best profile matching users only. In general all the peoples frequently fill...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Functional Encryption for Secured Big Data Analytics

    Big data has gained a lot of interest now-a-days due to the enormous scope it introduces for a better understanding of the business and decision making process for an organization. There has been a wide range of researches going on around the globe on this to make the most out...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    A Comparative Analysis of RE Approaches for MAS

    Poor requirements are one of the principal reasons for collapse of software projects. Detecting the requirements errors at the final stage intensifies the efforts of developers that may delay system delivery and overrun cost. Therefore to reduce the development time and cost, it necessitates a systematic and structured Requirement Engineering...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Cuckoo Search Based Optimization for Multimodal Biometrics (Signature, Speech and Palmprint)

    Biometric system based on unimodel biometrics are not able to meet the desired performance requirements for security purpose due to problems such as intra-class variations, noisy data, unacceptable error rates and low performance. Multimodal biometrics refers to the use of two or more biometrics modalities in a single identification system....

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Performance Evaluation of Diverse MANET Routing Protocols - A Review

    MANET is infrastructure less, decentralized multi-hop network where the mobile nodes are free to move randomly, these mean the network topology dynamic, the performance evaluation is major challenges in ad hoc network. Performance evaluation refers to evaluate the performance of MANET routing protocols, there are various performance metrics are used...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    A Review: Study of Test Case Generation Techniques

    Software testing is very labor intensive task for developing software and improving its quality. According to some researchers and software professionals, 50% of the time, cost and effort are spent on software testing. To test software, generating test cases is the most important task. Testing can be done either manually...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Car Accident Notification System Based on Internet of Things

    The Internet of Things (IoT) is a global revolution. Introduced with the vision of uniting the physical world with the internet, it has taken the world by a storm. In this paper, the authors propose a distress call notification system using the Internet of Things (IoT) and cloud. It discusses...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Optimization of Tasks in Mobile Cloud Computing

    Mobile cloud computing is a new platform for the execution of mobile applications where cloud performs the stimulating computing-intensive tasks and storing data in place of the mobile devices and provides them an illusion of infinite computing resources. This research paper considers a cloud based mobile computing system consisting of...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Survey on Privacy Permission Management Approaches for Android OS Applications

    Smartphone's have been becoming popular and mobile users are increasingly relying on them to store and handle personal information. The intake of smart phone devices for email writing, online bank transactions growing with growth of the Smartphone market and accessing other forms of sensitive content has lead to the emergence...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    A Protective Mechanism to Avoid Warm Hole and Sink-Hole Attack in Wireless Ad Hoc Network: Survey

    Wireless ad-hoc network is autonomous and infrastructure less network. Wireless ad hoc network is particularly vulnerable due to its primary characteristics, like open medium, dynamic topology, distributed cooperation, and capability constraint. Routing plays an important role in the security of the entire network. Secure transmission of information in wireless ad-hoc...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    State of Art Approaches to Build Cross Platform Mobile Application

    Mobile application market has grown exponentially. The market is becoming increasingly fragmented with at least five important mobile platforms making native development of mobile applications a challenging and costly endeavor. Cross-platform development might alleviate this situation. Cross platform tools support to develop the applications for multiple platforms in less time...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Performance Study of Star Topology in Small Internetworks

    In this paper, the authors study the performance of star topology in a Small Internetworks. In this network model, general LANs models are used and a simulated environment is formed where many applications are in used at a time and their mutual effects thereof. They were performed simulations using OPNET...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Proposed Method for Detecting Objects

    Most of object detection and classification algorithms are only locating regions in the image, whether it is within a template-sliding mask or interested region blobs. However, such regions may be ambiguous, especially when the object of interest is very small, unclear, or anything else. This paper presents proposed algorithm for...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    A Novel Approach of Cluster Based Routing in Mobile Ad Hoc Networks

    The research on the various issues in Mobile Ad hoc NETworks (MANETs) are getting popularity because of its challenging nature and all time connectivity to communicate. MANET is a random deployable network where devices mobile with dynamic topology. In the network topology, each device is termed as a node and...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Intelligent Vehicle Theft Control Using Embedded System

    In today's world almost every common man owns a vehicle. Theft is a common issue which everyone faces in parking and sometimes driving near insecure places. Vehicle security and accident prevention is more challenging. So in order to bring a solution for this problem the proposed system can be implemented....

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    A Survey on Sensors Lifetime Enhancement Techniques in Wireless Sensor Networks

    In the past years, Wireless Sensor Networks (WSNs) have gained increasing attention from both the users and researchers. It is used in various fields which include environmental, healthcare, military and other commercial applications. Sensor nodes are battery powered so energy constraints on nodes are very strict. When battery gets discharged,...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Bandwidth and Radiation Management of GSM System Using Neural Networks

    Bandwidth and the radiation pattern of an antenna play a crucial role in long as well as short distance communication. Now-a-days, the increasing population and the unequal use of communication channels are making it difficult to manage the bandwidth of a communication system. Also, the radiation of the antenna is...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Bandwidth and Radiation Management of GSM System Using Fuzzy Logic

    Bandwidth and the radiation pattern of an antenna play a crucial role in long as well as short distance communication. Now-a-days, the increasing population and the unequal use of communication channels are making it difficult to manage the bandwidth of a communication system. Also, the radiation of the antenna is...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Identification System Using Mobile Device Enabled NFC

    Smartphone are becoming more deployed, and such as a way for identification and authentication. The personal identification on mobile devices has attracted a lot of attention in the few years. In this paper, the authors propose an identification system based on Smartphone enabled NFC. The idea is to combing the...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A 64 Bits Dynamically Key Controlled Symmetric Cipher (KAMFEE-X64)

    This paper presents an improved version of KAMFEE cipher. The proposed cipher (KAMFEE-X64) is designed to be compatible with the new 64 bits microprocessors unlike the old cipher (KAMFEE) which is designed for systems based on x86 microprocessors. KAMFEE-X64 has a key dependent block length and key dependent rounds, enhanced...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A Review of Automatic Test Cases Generation

    Manual testing is hard and time consuming and it may be impossible for large systems or tester mistake in the test. The software testing is the rising cost of activities in development software and the test case generation is important activity in software testing. Hence researches performed to automate testing...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Multi Lingual Speaker Identification on Foreign Languages Using Artificial Neural Network

    Based on the Back Propagation Algorithm, this paper portrait a method for speaker identification in multiple foreign languages. In order to identify speaker, the complete process goes through recording of the speech utterances of different speakers in multiple foreign languages, features extraction, data clustering and system training. In order to...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A New Approach for Information Security Using Asymmetric Encryption and Watermarking Technique

    Rapid growth of internet and networked information systems has contributed a lot in the increase of multimedia contents. As digital contents are increasing day by day on internet it has raised requirement for the effective protection of multimedia assets (images, audios, videos). This paper proposes a new approach to protect...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A Design of Authentication and Access Control Model for Remote Access Using GSM Technologies

    The GSM technologies plays vital role in pervasive computing environments. The open and dynamic nature of the pervasive computing environment allows entities to join and leave frequently. This causes a large number of autonomous entities to interact in an ad-hoc manner, raising concerns as to the trustworthiness of the service...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Removal of Network Ambiguities Through Knowledge Based System

    Documents on the Internet are composed of several kinds of multimedia information when accessed for personal, entertainment, business, and scientific purposes. There are many specific content domains of interest to different communities of users. Extracting semantic relationships between entities from text documents is challenging task in information extraction. By semantics...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Lifetime Maximization of Wireless Sensor Networks Using Improved Genetic Algorithm Based Approach

    In Wireless Sensor Networks the nodes have limited energy and are seriously constrained by the battery life. To increase the lifetime of the network is a critical and challenging issue and thus it is the routing in WSNs, which is the primary focus of design for researchers. In this paper...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Innovative Performance Evaluation of Unnecessary Handoffs and Handoff Failures During Access Network Selection Between WLAN and Cellular Networks

    Received Signal Strength based (RSS) horizontal handoff algorithms have been most commonly used by nearly all second generation and third generation wireless networks in a homogeneous environment. Vertical handoffs or network selection algorithms are the terms coined due to integration and interoperability of existing wired and wireless access networks under...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Survey on Securing Data in Cloud

    Cloud computing is an innovative information system architecture which reduces the overall client side resource requirements. Even though the data outsourcing reduce the burden of client storage the clients no longer have physical possession of data which will leads to so many security issues. Hence the user need to make...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Multimodal Biometric System Using Iris, Palmprint and Finger-Knuckle

    Most real-life biometric systems are still unimodal. Unimodal biometric systems perform person recognition based on a single source of biometric information. Such systems are often affected by some problems such as noisy sensor data, nonuniversality and spoof attacks. Multibiometrics overcomes these problems. Multibiometric systems represent the fusion of two or...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    An Efficient Bee-Inspired Auto-Configuration Algorithm for Mobile Ad Hoc Networks

    The infrastructure-less and dynamic nature of Mobile Ad-hoc NETworks (MANETs) requires the implementation of a new set of networking technologies in order to provide efficient end-to-end communication according to the principles of the standard TCP/IP suite. Routing and IP address auto-configuration are among the most challenging tasks in the ad...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Broadband Microstrip S-Shaped Patch Antenna for Wireless Communication

    This paper presents a single-patch broadband microstrip S-shaped patch antenna. Microstrip S-shaped patch antenna, fed by a coaxial feeding. The antenna is designed by inserting two slots into rotated square patch then it look like english letter S. Because of the slots and thick substrate, bandwidth of antenna is increased....

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A Fuzzy Approach for Privacy Preserving in Data Mining

    Advances in hardware technology have increased storage and recording capabilities regarding individual's personal data. Privacy preserving of data has to ensure that individual data publishing will refrain from disclosing sensitive data. Data is anonymized to address the data misuse concerns. Recent techniques have highlighted data mining in ways to ensure...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Bank Locker Security System Based on RFID and GSM Technology

    The main goal of this paper is to design and implement a bank locker security system based on RFID and GSM technology which can be organized in bank, secured offices and homes. In this system only authentic person can be recovered money from bank locker. The authors have implemented a...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Survey of Integrating Testing for Componentbased System

    Today's software larger in size, design complex and time consuming to implement them, for this the authors need a prominent solution to overcome these problems. Component-Based Software Development (CBSD) has emerged as an Object Oriented (OO) Software Engineering approach that forced rapid software development. Using CBSE approach they can eliminate...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A Novel Approach of Speedy-Highly Secured Data Transmission Using Cascading of PDLZW and Arithmetic Coding with Cryptography

    The spread of computing has led to an outburst in the volume of data in the communication world. The paper proposes the cascading of two algorithms PDLZW and Arithmetic Coding with cryptography. With the hierarchical parallel dictionary set, the search time can be reduced significantly and all these dictionaries are...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Stock Market Prediction Model by Combining Numeric and News Textual Mining

    This paper proposes a novel method for the prediction of stock market closing price. Many researchers have contributed in this area of chaotic forecast in their ways. Data mining techniques can be used more in financial markets to make qualitative decisions for investors. Fundamental and technical analyses are the traditional...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Review of Fractal Transform Based Image and Video Compression

    Fractal Compression is a new technique in the field of color and video compression. This technique has grabbed much attention in recent years because of very high compression ratio that can be achieved. It also provides interesting interpolation features to zoom the images. Hybrid schemes incorporating fractal compression and speedup...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Enhancement in Feedback Polynomials of LFSR Used in A5/1 Stream Cipher

    There is encryption algorithms used in GSM. This is for to encrypt the information when transmit from mobile station to base station during communication. As stated that A5/1 is strong algorithm but it cryptanalysis by cryptanalysts. This paper modified concept to improve A5/1 encryption algorithm by consideration of feedback combining...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    WEB Based Service Platform of Population

    The Indian Census is the most credible source of information on Demography (Population Characteristics), Economic Activities, Literacy and Education etc. As the Census data plays a vital role for the future of the country it is very important to maintain it properly and accurately. As of now census data is...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Combining Advanced Encryption Standard (AES) and One Time Pad (OTP) Encryption for Data Security

    The development of telecommunications technology and data storage using the computer has become a necessity because there are many jobs that can be completed quickly, accurately, and efficiently. In addition it allows data transmission distance is relatively fast and cheap, but on the other hand long-distance data transmission is possible...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Concept of Designing an Optimized Pull Model View Controller Type Content Management Framework

    Based on the concept of "Easy to learn and develop for anyone", the authors present an integrated framework concept for developing content management system using an optimized pull Model View Controller (MVC) type in web programming. The framework consist of four easy steps to follow: first step is determining web...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Cyber Security Approach in Web Application Using SVM

    Internet is open source for web access like for the purpose of railway reservation, online banking, online fees submission etc. Security concern is the most threatening topic for users about their confidential information's storage. various security designing and algorithms has been designed to impose secure environment for user but still...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A Research on Decentralized Clustering Algorithms for Dense Wireless Sensor Networks

    A wireless sensor network with large number of sensor nodes can be used as an effective tool for collecting data in various situations. Recent advancement in wireless communications and electronics has enabled the development of low-cost sensor network. Wireless sensor networks are web of sensor nodes with a set of...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    CO2 Monitoring System from Remote Location Using GSM, GPS and Concept of MODBUS

    The system developed here is useful for measurement of waste gas (like Co2) remotely. This will helpful particularly for the environment department because many chimneys releases polluted gases now-a-days, which is a serious issue for Global warming. If any factory emits gas beyond some predefined specified limit, this system will...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Hybrid Model for Location Privacy in Wireless Ad-Hoc Networks for Mobile Applications

    A wireless ad-hoc network is a decentralized type of wireless network. The network is ad-hoc because it does not rely on a preexisting infrastructure, such as routers in wired networks or access points in managed (infrastructure) wireless networks. Now-a-day in fast growing world, use of internet is increasing popularly and...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Multipath Global Rerouting for Fault Tolerant Overlay Network (FTON) in Labeled Optical Burst-Switching

    In this paper, mainly concentrate on reduce the burst loss and Non-availability of wavelength in network; proposed an overlay model known as Fault Tolerant Overlay Network (FTON) which improves the performance of a regular IP electronic network. An FTON is created over the existing network; an FTON node collects the...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Application of Fuzzy Analytic Hierarchy Method in Software Engineering Scenario

    In software engineering scenario, software effort estimation is very uncertain and depends on various external factors .For developing a particular type of software, selection of an optimal and experienced group of developer is essential for software development organization for organizational benefits and is necessary because success and failure of software...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A Framework for Android and J2ME Bluetooth Communication

    Mobile applications development is attracting more and more developers recently due to the emergence of new mobile platforms such as Android; which is making application development easier as well as its' marketing. All new Smartphone's now support Bluetooth, a popular communication medium for mobile phones. However, cross-platform Bluetooth communication between...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Mobile Client's Access Mechanism for Location Based Service Using Cell-ID

    Today's location-sensitive service relies on user's mobile device to determine its location and send the location to the application. A location-based service is a service that determines the location of a mobile device and uses this to provide functionalities and information specific to that location. With the growth of the...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Performance Analysis of Backoff Exponent Behaviour at MAC Layer In ZigBee Sensor Networks

    Topology is one of the major new paradigms and is the premier research topic in ZigBee based Wireless Sensor Network and has opened up new challenges for researchers throughout the World due to its wide range of applications ranging from medical research to military. IEEE 802.15.4/ZigBee is a worldwide open...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Performance Analysis for Visual Data Mining Classification Techniques of Decision Tree, Ensemble and SOM

    This paper is a comprehensive report on experimental setup, data collection methods, implementation and result analyses of market segmentation and forecasting using neural network based artificial intelligence tools. The main focus of the paper is on visual data mining applications for enhancing business decisions. The software based system is implemented...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A Survey on Preventing Jamming Attacks in Wireless Communication

    Communication in wireless network is possible with an air medium. Due to the high security threats in this system, the network may face various difficulties. One of the major threats is jamming attack which comes under Denial Of Service (DOS) attack. Jamming attack is common among many exploits that compromises...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Test Case Generation Based on Activity Diagram for Mobile Application

    Testing impacts the popularity of any software and hardware products. If proper testing of any product is done it will increase the cost and sale of the product. Mobiles are widely used electronic device there are several mobile companies established which provide variety of applications and features. It is obvious...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Network Security Using Firewall and Cryptographic Authentication

    The network Security is the hottest topic in the current research scenario. The information security is really threatened by obnoxious users. With increasing vulnerabilities, caused by port scan attacks, replay attacks and predominantly IP Spoofing, targeting services, the network behavior is getting malevolent. But there is a lack of any...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Box-Office Opening Prediction of Movies Based on Hype Analysis Through Data Mining

    Box-office performance of a movie is mainly determined by the amount the movie collects in the opening weekend and Pre-Release hype is an important factor as far as estimating the openings of the movie are concerned. This can be estimated through user opinions expressed online on sites such as Twitter...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Graph Neural Network for Minimum Dominating Set

    The dominating set concept in graphs has been used in many applications. In large graphs finding the minimum dominating set is difficult. The minimum dominating set problem in graphs seek a set D of minimum number of vertices such that each vertex of the graph is either in D or...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    A Stream Cipher Algorithm Based on Nonlinear Combination Generator with Enhanced Security for Image Encryption

    This paper describes a novel approach for image encryption using stream cipher algorithm based on non linear combination generator. This work aims to enhance the security of encrypted image. The work is based on the use of several linear feedback shifts registers whose feedback polynomials are primitive and of degrees...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Artificial Neural Network Modelling of Traffic Noise in Agra-Firozabad Highway

    The noise is a major environmental hazard at present. It causes hearing problem, tinnitus, high blood pressure, mental depression, heart palpitation etc. Noise is a usual problem everywhere and involves high health risk, but in today's fast life the authors ignore its harmful consequences and it results in high health...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Network Connectivity Based Topology Control for Mobile Ad Hoc Networks

    Energy consumption and network connectivity are two of the important research issues that are yet to be resolved in Mobile Ad-hoc NETworks (MANETs). However, only a few topology control methods (e.g.) take into account the low interference as a goal of the methods. Some researchers tried to indirectly reduce the...

    Provided By International Journal of Computer Applications