International Journal of Computer Applications

Displaying 1-40 of 6504 results

  • White Papers // Apr 2015

    Design of Multinode Reconfigurable Network based Multiprocessor Systems on Chip

    Multi-Processor System-on-Chip (MPSoC) platforms are becoming increasingly more heterogeneous and are shifting towards a more communication-centric methodology. Network-on-Chip (NoC) have emerged as the design paradigm for scalable on-chip communication architectures. As the system complexity grows, the problem emerges as how to design and instantiate such a NoC-based MPSoC platform in...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Mobile Agent based System for Listing Fundamental Wi-Fi Peer-to-Peer Network Details

    On everyday operations there is need to engage agents to perform some duties on their behalf, hence they are gaining acceptance as a technology and are being used. Most of the networked offices, networked homes, cyber cafes, learning institutions and other arenas where computers are interconnected on a Wi-Fi network,...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    A Survey on Efficient Clustering Methods with Effective Pruning Techniques for Probabilistic Graphs

    In this paper, the authors provide a survey on K-NN queries, DCR query, agglomerative complete linkage clustering and extension of edit-distance-based definition graph algorithm and solving decision problems under uncertainty. This existing system give an beginning to graph agglomeration aims to divide information into clusters per their similarities, and variety...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Design and Verification of Reversible Logic Gates using Quantum Dot Cellular Automata

    In this paper, the authors portray the designing of reversible logic gates through the use of Quantum dot Cellular Automata (QCA) which is a nanotechnology concept and also a striking substitute for transistor based technologies. This technology helps them to rise above the confines of CMOS technology. It also gives...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Integrating Knowledge Management and Business Intelligence Processes for Empowering Government Business Organizations

    Emergence of information technologies has transformed the way business marketing is done and how business enterprises are managing the resources and information. Trend of globalization has induced the fierce competitiveness among business enterprises within domestic and international markets. The major quest for the technologies is not limited to strategic value...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    An RTOS based Industrial Wireless Sensor Network using Multiprocessor Support

    RTOS (Real Time Operating System) is a process which is done between hardware and application in order to provide time constraints. Each industry has their own priority among the various tasks according to their process. RTOS is used here to assign the priorities. The values obtained in plant have to...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    A Bee Colony based Multi-Objective Load Balancing Technique for Cloud Computing Environment

    With the recent development of open cloud systems a surge in outsourcing assignments from an internal server to a cloud supplier has been seen. The cloud can facilitate its clients enormous resources hence even during heavy load conditions. Since the cloud needed to be handle multiple clients workload at same...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Query based Recommendation and Gaussian Firefly based Clustering Algorithm for Inferring User Feedback Sessions with Search Goals

    In web search based applications, queries are suggested by users to search and investigate web search engines information requirements regarding user. However the queries submitted by user sometimes might not easily understood by search engines, since queries submitted by user might be short representation and should not precisely characterize users'...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Design and Implementation of a GUI based Offline GIFT Tool to Exchange Data between different Systems

    Multiple Choice Questions or MCQs are very important for e-learning. Many MCQ tools allow the users to generate MCQs very easily. However, in most of the cases they are not portable. That means MCQs generated for one system cannot be used for other unless a common format is used. So,...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Secure SOA Framework for Multi-Cloud Storage and Computing

    Distributed computing is a swearing up and down to technology to encourage advancement of extensive scale, on-interest, adaptable figuring foundations. Anyhow without security implanted into imaginative engineering that backings distributed computing, organizations are setting themselves up for a fall. The pattern of every now and again receiving this engineering by...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Automatic Obligation Generation and Monitor System for Privacy Policy to DBMS

    Data stored in the database includes personnel and sensitive data. Privacy policies in the database management system can control collection, access and disclosure of data. Policies are used to specify obligation. Obligation is certain actions or condition which has to be satisfied for accessing data. This paper is to enable...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Real Time Motion Detection using Dynamic Camera

    Video surveillance systems are a very important in the modern times. Now-a-days, security of valuable and secret assets is very important for large organization companies. Need of an efficient and reliable security system is cause due to limitation of human resources and man power. High level surveillance system for security...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    A Multi-Threaded Test Automation Framework for Testing Data-Centric Applications using Data Processing Algorithms

    Testing data-centric applications is always a challenging and a time consuming task. The goal of this paper is to present a test automation framework for testing data warehouse and business intelligence applications using an open source test automation tool. An Implementation methodology for multithreaded test execution is being explained that...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Cloud Commerce: A Drift from E-Commerce to Cloud

    Electronic commerce is internet based commerce, which is rapidly developing throughout the globe. The adaption of cloud computing services in electronic commerce had improved tremendously the ease and use of the E-commerce. The vendors of E-commerce are already adopting the cloud services such as Supply chain management, Platform-as-a-Service (PaaS) to...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Modeling Implementation of TBDSA-Token based Data Security Algorithm in Cloud Computing

    Security during data transmission in cloud computing using TBDSA (Token Based Data Security Algorithm) along with its implementation is presented in this paper. The auto-generated token based certificate activation approach with SSL (Secure Socket Layer) provides the appropriate collaboration between the cloud client and the cloud service provider, so that...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    A Survey on MAC Protocols for Data Collection in Wireless Sensor Networks

    Data collection is the most basic task in wireless sensor networks. A wireless sensor network consists of large numbers of nodes which collects data and then forwards collected data to sink. An important area of research in WSN is energy conservation. Medium Access Control (MAC) protocols plays vital role in...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Relative Performance Analysis of Different CMOS Full Adder Circuits

    Different adder circuits are elementary blocks in many contemporary integrated circuits, which are not only employed to perform addition operations, but also other arithmetic operations such as subtraction, multiplication and division. Full adder is the basic building block of any adder circuit. Area, speed and power are the three main...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Applications of Data Mining in Correlating Stock Data and Building Recommender Systems

    Data mining is the process of discovering hidden patterns, trends and knowledge from large data stores which can't generally be found by simple analysis of databases. Data mining uncovers unknown patterns, and new rules from large databases between objects that are potentially useful in making crucial business decisions. It applies...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Learning based Clustering for the Automatic Annotations from Web Databases

    Rapid increase of use of internet provides knowledge extraction from the web databases and HTML pages associated with it. Although there are various techniques implemented for the access of the annotations of the search results from the web databases. Here in this paper, by identifying the problems with the existing...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    A Proposed Data Mining Framework for Higher Education System

    Educational data mining is concerned with the development methods for exploring the unique types of data that come from the educational context. Furthermore, educational data mining is an emerging discipline that concerned with the developing methods for exploring the unique types of data that come from the educational context. This...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Windows and Linux Random Number Generation Process: A Comparative Analysis

    Random number generation plays a critical role in cryptography and cryptanalysis. It is essential for many cryptographic tasks such as keys generation, initialization vectors, and cryptographic nonce. In this paper, the authors explore and analyze the structure and functions of Random Number Generator (RNG) in Windows and Linux operating systems....

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Review of Error Rate and Computation Time of Clustering Algorithms on Social Networking Sites

    Data mining is a method of finding useful patters from large volumes of data. It is an extension of traditional data analysis and statistical approaches. Data clustering is a task of grouping a set of items or objects into subsets (called clusters). It is an algorithm to discover the similarity...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Enhancing Proxy Server Cache Management using Log Analysis and Recommendations

    Now-a-days, web based applications are growing rapidly due to this the network performance is affected significantly. Thus a performance improvement technique is required by which the application speed is maintained and delivers the high performance web pages. Thus pre-fetching techniques are applied. There are various kinds of pre-fetching techniques are...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    NASLA: Novel Auto Scaling Approach based on Learning Automata for Web Application in Cloud Computing Environment

    Considering the growing interest in using cloud services, the accessibility and the effective management of the required resources, irrespective of the time and place, seems to be of great importance both to the service providers and users. One of the best ways for increasing utilization and improving the performance of...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Automated Check-Post on Cloud using BigData Analysis with Web Service Security

    In this real world each and every check post perform the same operation. But the operation must be done manually. This operation includes various parameters. The manual operation of the check post requires the man power in order to perform the operations such as opening the gate, closing the gate,...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Techniques for Low Power and Area Optimized VLSI Testing using Novel Scan Flip-Flop

    Power consumption of any circuit is high during test mode than its normal mode of functioning. Different techniques are proposed to reduce the test power. This paper presents the consolidated research work carried to reduce the test power. Usually the power dissipation is due to the sequential and combinational elements...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Conflict Identification and Resolution in Heterogeneous Datasets: A Comprehensive Survey

    Data integration has become the vital necessities of today's interconnected world. Information is scattered everywhere and to retain the strategic advantage, it becomes mandatory for organizations to obtain as much information as possible. Hence combining the scattered data sources to obtain information becomes the only solution. Data integration is posed...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Design and Implementation of an Algorithm to Enhance Cloud Security

    Cloud computing concept has been envisioned as architecture of the next generation for Information Technology (IT) enterprise. The cloud computing idea offers with dynamic scalable resources provisioned as examine on the Internet. It allows access to remote computing services and users only have to pay for what they want to...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Fast Edge Detection Architecture using Different Levels of Parallelism on a FPGA

    Implementing edge detection techniques on a FPGA has recently become more popular since it benefits high speed which is desired for real-time applications. This paper presents a fast FPGA-based architecture for first order derivative edge detection methods. Fast pipeline-based architectures are presented which are able to perform edge detection using...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    A Survey on Fraud Detection Techniques in Ecommerce

    E-commerce becomes popular for online shopping, banking, financial institution and government. Fraudulent activity exits in many areas of businesses and the people daily life. Such activities are most prevalent in telecommunication, credit card fraud detection, network intrusion, finance and insurance and scientific applications, billions of dollars are loss every day...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Community Kernels Detection in OSN using SVM Clustering and Classification

    Security is an important issue in online social networking web sites. Here in OSN users can post their messages publicly on wall. In OSN a person may be attached to a community and can post any message on their friend's wall, hence it is necessary to check the validity of...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    VHDL Realization of Hybrid Control Strategy for a Nonlinear System

    The process industries are automated to keeping in tune with the changing requirements. It creates the need of a well-defined philosophy to cater to the extent of sophistication. The scheme projects a mechanism to adapt to the evolving scenario and orient a strategy to accomplish the desired objective. A conical...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Frequent Patterns Analysis using Apriory: A Survey

    In applications such as location-based services, natural habitat monitoring, web data integration, and biometric applications, the values of the underlying data are inherently noisy or imprecise. Consider a location-based application that provides querying facilities on geographical objects (e.g., airports, vehicles, and people) extracted from satellite images. Due to the errors...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Efficient Storage Management over Cloud using Data Compression without Losing Searching Capacity

    Now-a-days, due to social media, people may communicate with each other, share their thoughts and moments of life in form of texts, images or videos. The authors are uploading their private data in terms of photos, videos, and documents on internet websites like Facebook, WhatsApp, Google+ and YouTube etc. In...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    A Novel Design of SET-CMOS Half Subtractor and Full Subtractor

    Single electron transistor have high integration density, ultra-low power dissipation, ultra-small size, unique coulomb blockade oscillation characteristics which makes an attractive technology for future low power VLSI/ULSI systems. The single electron transistor have extremely poor driving capabilities so that direct application to practical circuits is a yet almost impossible, to...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    A Study of SQL of Injections Techniques and their Prevention Methods

    Rapid evolution of technology and increasing necessity of storing data and securing it as well gave rise to various techniques to secure it along with the new innovative malicious techniques to have a hazardous impact on the organization by wrecking the database and manipulating data. In this paper, the authors...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    An Energy-Saving Routing Algorithm for Wireless Body Sensor Network using Data Compression Technique

    A Wireless Sensor Network (WSN) is used to monitor the environmental condition. There consist of N number of sensor nodes which are connected to each other and they are clustered in to different groups. There have a Cluster Head (CH) which is used to manage the Cluster Members (CMs). when...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Improving the Life of the Wireless Sensor Network using Energy Harvesting Clustering

    In the modern era, Wireless Sensor Network (WSN) has seen new horizons among the research community. It has largest range of applications in most of the fields. Its beauty lies in its application area and it can be deployed anywhere. WSN has low cost, low power sensor nodes, can be...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    A Secure Private Cloud Server Implementation for Data Storage

    Cloud computing has recently reached popularity in computer networking world which provide centralized data storage service, remote accessibility and many more cloud is very new, safe, and advanced technology it provides remote access service and centralized data storage service to the cloud consumers and its domain client in cloud. This...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    A Concern Towards Data Security in Cloud Computing

    Cloud computing is one of the emerging innovative trend of IT technology today. This trend has got remarkable advancement in computing world. Although cloud is boon to computing world but its adoption in IT sector is lack behind due to many issues. In this paper, the authors focus on most...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2011

    Mobility Based Real Time Communication in Wireless Sensor Networks

    Wireless sensor networks face unavoidable challenges in the areas of connectivity, network lifetime and energy efficiency in its implementation. At the same time, urgent data captured by the sensor nodes need to be processed at real time with low message latency and maximum utilization of the bandwidth. This paper presents...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2011

    Performance Analysis of MN Equalizer Based Minimum Mean Square Error (MMSE) Receiver for MIMO Wireless Channel

    The effect of fading and interference effects can be combated with equalizer. This paper analyses the performance of MMSE equalizer based receiver for MIMO wireless channel. The BER characteristics for the various transmitting and receiving antenna is simulated in mat lab tool box and many advantages and disadvantages the system...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2011

    Comparative Study of Radio Propagation and Mobility Models in Vehicular Adhoc Network

    VANET (Vehicular Adhoc NETwork) has gained interest all over the world, many projects and research communities are working for the deployment of VANET. The main objective of these projects and researches are to develop protocols and tools to provide adequate wireless communication between vehicles. As one all know that these...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2011

    Communication in Network Using Wavelet Transform

    Huge amounts of digital visual data are stored on different media and exchanged over various sorts of networks nowadays. The authors propose new measures and techniques for encryption of image. They show that both statistical and pattern classification techniques using the proposed measures provide reasonable discrimination schemes for detecting embedding...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2011

    A Novel RSRM Algorithm for Mining Services for Better Enhancement in Small HandHeld Devices

    This paper presents a case study on data mining services able to support decision makers in strategic planning for the enhancement of small handheld devices. The application provides e-Knowledge services for the analysis of territorial dynamics by processing and modeling huge amount of data, in order to discover rules and...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2011

    Experimental Evaluation of TCP BIC and Vegas in MANETs

    The tremendous growth of wireless networks demands the need to meet different congestion control algorithms for wireless network. Usual transmission control protocol reduces its performance by misinterpreting mobility losses due to node motion as congestion losses in wireless mobility network. So the congestion control algorithms have important role in the...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2011

    Virtual Cylindrical View of a Color Image for Its Permutation for an Encryption Purpose

    This paper presents a novel algorithm for row and column permutation of pixels for the purpose of image encryption. The algorithm introduces a virtual cylinder surrounding an image and a virtual viewer looking at it, but displaced from an original position. The key idea is based on the assumption that...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2011

    Study of Routing Protocols in Mobile Ad Hoc Networks

    To support group oriented service which is said to be the primary application that are addressed by Mobile Ad hoc NETworks (MANETs) in recent years, multicast routing is used. Hence there is a need to design stable and reliable multicast routing protocols for MANETs. In recent years several multicast routing...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2011

    Power-Aware Hybrid Intrusion Detection in Wireless Adhoc Networks Using Mobile Agents

    Power-aware Hybrid Intrusion Detection in wireless ad hoc networks using mobile agents (PHIDS) describes design and implementation of an energy conscious anomaly based co operative intrusion detection system for wireless ad hoc networks based on mobile agent technology. This paper addresses the above stated issue by applying mobile agent technology...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2011

    Hybrid Approach: Detection of Intrusion in Manet

    As the progression of networks is continues, Mobile Ad hoc NETwork (MANET) has become as a new frontier of technology to give anywhere, anytime communication. Because of the features like unreliability of wireless links between nodes, dynamic topology, limited battery power, lack of centralized control and others, the mobile ad...

    Provided By International Journal of Computer Applications

  • White Papers // May 2011

    A Study of Information Systems in Human Resource Management (HRM)

    In today's organizations human resource is considered as one of the key resources of business organizations. The transaction processing layer of MIS in human resource function deals with routine activities like attendance recording and payroll calculations. The operational level activities also include maintaining the employee records which is used as...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    The Impact of Information System Success Factors, Human Resource Staff Satisfaction, and E-Human Resource Use on Organizational Benefit

    Organizations have limited resources for investment making it imperative that resources utilized provide some benefit for the organization. Electronic Human Resource Management (E-HRM) systems have been shown to have notable benefits for the organization including cost saving capabilities. However, when implemented in practice E-HRM systems consistently fail to produce desired...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2010

    Customer Retention Using Data Mining Techniques

    Customer retention represents a modern approach for quality in enterprises and organizations and serves the development of a truly customer-focused management and culture. Customer retention measures offer a meaningful and objective feedback about client's preferences and expectations. This paper presents an original methodological approach of customer satisfaction and retention evaluation,...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2011

    A Review on Data Mining From Past to the Future

    Data and information or knowledge has a significant role on human activities. Data mining is the knowledge discovery process by analyzing the large volumes of data from various perspectives and summarizing it into useful information. Due to the importance of extracting knowledge/information from the large data repositories, data mining has...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2010

    Design Issues, Topology Issues, Quality of Service Support for Wireless Sensor Networks: Survey and Research Challenges

    Wireless Sensor Networks (WSN) are highly distributed self organized systems. WSN have been deployed in various fields. Because of some hardware problems, especially with respect to energy supply and miniaturization, WSN have certain short comings. This paper focuses on various issues such as routing challenges and design issues, topology issues...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2011

    Energy Efficient Control Strategies in Heterogeneous Wireless Sensor Networks: A Survey

    Wireless Sensor Networks (WSNs) have received tremendous attention in recent years because of the development of sensor devices, as well as wireless communication technologies. It is usually randomly deployed in inaccessible terrains, disaster areas, or polluted environments, where battery replacement or recharge is difficult or even impossible to be performed....

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Intrusion Detection Systems - Analysis and Containment of False Positives Alerts

    The dependence on information technology became critical and IT infrastructure, critical data, intangible intellectual property are vulnerable to threats and attacks. Organizations install Intrusion Detection Systems (IDS) to alert suspicious traffic or activity. IDS generate a large number of alerts and most of them are false positive as the behavior...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Transient Analysis of Communication Network Model with Homogeneous Poisson arrivals and Dynamic Bandwidth Allocation

    Queuing models play a dominant role in many communication systems for optimum utilization of the resources. In this paper, the authors develop and analyze a two node tandem communication network model with feedback for the first node, with an assumption that the arrivals follow homogeneous Poisson process. In this model,...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Time Quantum based CPU Scheduling Algorithm

    In this paper, the authors introduce a new CPU scheduling algorithm called time quantum based CPU scheduling algorithm which acts as preemptive based on the arrival time. The algorithm helps to improve the average waiting time of round robin algorithm in real time uni-processor-multi programming operating system. CPU scheduling is...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Implicit Aspect Identification Techniques for Mining Opinions: A Survey

    Gathering information by finding out what other people think is always been a common behavior. It has become necessary to summarize the information obtained due to its growing availability and popularity in the form of online review sites and personal blogs. Aspect extraction is one major step for mining opinions....

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Non-Invertible Online Signature Biometric Template Protection via Shuffling and Trigonometry Transformation

    In this paper, the authors describe a novel approach to a cancelable template protection scheme that secures online handwritten signature samples in the reference database of a biometric verification system. They propose a renewable-noninvertible transformation process named bio-trigono comprising two consecutive steps. First, a shuffling scheme is applied to a...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    A Performance based Transaction Reduction Algorithm for Discovering Frequent Patterns

    Association rules are the main technique to determine the frequent item set in data mining. When a large number of item sets are processed by the database, it needs to be scanned multiple times. Consecutively, multiple scanning of the database increases the number of rules generation, which then consume more...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Implementation of Hybrid Algorithm for Mobility and Routing Issues in MANET

    In this paper, the problem of dynamic multicast routing in mobile ad hoc networks is investigated. Dynamic multicast routing has become a major issue in Manet. Mobile Ad hoc NETworks (MANETs) are collection of wireless mobile nodes, thus connectivity is an issue in this network. Moreover it, the network topology...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Modification of View Field in Wireless Multimedia Sensor Networks

    Numerous micro-devices are interconnected in Wireless Multimedia Sensor Networks (WMSNs), such as surveillance. While due to view field of these multimedia sensors is oriented, blind spots caused by an occlusion is unavoidable, which will impact on surveillance service quality. For reducing this affection and figuring out a real sensing area,...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Proposing of Collisions Free and Secure Network for IEEE 802.11 WLAN

    IEEE 802.11 wireless network contains various problems such as packets delay and drop because of collision due to the heavy traffic. Packets are dropped either by the buffer overflow or by the MAC layer contentions. Such packet losses decrease throughput. Packet delay is also a result of poor utilization of...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Implementing a Standard DVB-T System using MATLAB Simulink

    In this paper, the authors describe the simulink implementation of all functional blocks of a standard Digital Video Broadcasting Terrestrial (DVB-T) transmitter and receiver and present the simulation model for DVB-T system according to ETSI EN 300 744 V1.6.1. The implemented model contains all channel coding and modulation building blocks...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Extensive Survey on MIMO Technology using V-BLAST Detection Technique

    Wireless communication using Multiple Input Multiple Output (MIMO) systems increases efficiency for a given total transmits power. Here investigate a novel approach to perform decoding-order optimization in the Vertical Bell Labs lAyered Space-Time (V-BLAST) planning. Allowing for instantaneous transmission of multiple, independently encoded data streams, the V-BLAST transmit-receive method applies...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    PAPR Reduction in OFDM System using Wavelet SLM and PTS Technique

    Recently researchers have developed many techniques to solve high PAPR problem. These techniques have some merits and demerits. The concentration of this research work is especially upon the SeLected Mapping (SLM) and Partial Transmit Sequence (PTS) techniques using wavelet transforms Inverse Discrete Wavelet Transform (IDWT) and DWT instead of conventional...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Energy Efficient Routing with MAX-Min Energy Scheme in Ad-hoc On-Demand Multipath Distance Vector routing for MANET

    During the past few years, there has been increasing interest in the design of energy efficient protocols for wireless ad-hoc networks. Node within an ad hoc network generally relies on batteries (or exhaustive energy sources) for power. Since these energy sources have a limited lifetime, power availability is one of...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    An Energy Efficient Clustering Algorithm based on Boundary Nodes Allocation for WSN

    Instead of various advantages of wireless sensor networks, there is always a constraint related to energy consumption resulting in reduced lifetime of a wireless sensor network. In this paper, an energy efficient algorithm is proposed considering allocation of boundary nodes, removing clashes among clusters while distributing nodes thereby reducing overall...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Discovery of Fuzzy Hierarchical Association Rules

    A number of techniques have been developed to turn data into useful knowledge. Most of the algorithms in data mining find association rules among transactions using binary values and at single concept level. However it will be more exciting to discover hierarchical association rules for decision makers. In this paper...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Comparison of Cache Page Replacement Techniques to Enhance Cache Memory Performance

    Caching is a very important technique for improving the computer system performance, it employed to hide the latency gap between memory and the CPU by exploiting locality in memory accesses. In modern computer architectures a page miss cause the several hundred CPU cycles. In a memory hierarchy, a cache performs...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    A Survey on SVM Classifiers for Intrusion Detection

    Intrusion detection is an emerging area of research in the computer security and networks with the growing usage of internet in everyday life. An intrusion detection is an important in assuring security of network and its different resources. Intrusion detection attempts to detect computer attacks by examining various data records...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Architecture based Comparison of Semantic Web Service Composition Processes

    Semantic web services development become rapidly increased as dynamic changes are occurred. Various approaches are adopted to develop composite service systematically. This paper aims to make development process easier by classifying the literature on web services composition based approaches like selection, discovery, orchestration, choreography, mediation and automatic composition to facilitate...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    The Optimization of Inter cell Handover Dynamics in a GSM Network

    Efficient handover mechanism in a GSM network is one of the parameters critical to GSM network service quality i.e. Quality-of-Service (QoS) and customer satisfaction. Ongoing calls are being transferred through the process of handover from one cell to another as the users move through the coverage areas of the cellular...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    PAPR Reduction in LTE Down Link using a Hybrid Repeated Clipping and SQRT Companding

    The orthogonal frequency division multiplexing is one of the widely used modulation techniques in the broadband wireless technology. One of the main problems of the OFDM is the high peak-to-average power ratio of transmitting signal due to the superposition of many subcarriers. This paper presents a new hybrid peak-to-average power...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Fast Detection Process for Downlink in LTE Networks

    In this paper, the authors introduce a simple detection method that gives a better performance with minimum computational complexity for the Long Term Evolution (LTE) mobile communication system. The LTE communication system has been simulated using MATLAB7 programming language. An approximated linear baseband model for the two modulation techniques used...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Comparative Analysis of Design Methodologies for Parallel FIR Filter

    The importance of DSP systems with low power, low area and high performance appear to be increasing with no visible sign of saturation. Digital filters play a vital role in digital systems where Finite Impulse Response (FIR) filters are one of the most widely used fundamental devices. This review paper...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Generating the Best Fit Key in Cryptography using Genetic Algorithm

    The goal of network security is to provide a secure, effective and private communication between the sender and the receiver. In order to achieve a high level of security, data is sent in the encrypted form to its intended recipient. But, tampering with the text and eavesdropping have assumed colossal...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2014

    Enhancing Data Dynamics and Storage Security for Cloud Computing using Merkle Hash Tree and AES Algorithms

    With increase in the number of cloud users and the amount of sensitive data on cloud, security of cloud has become more important. Massively scalable data centers are provided by the cloud which can be accessed from anywhere and at anytime. Cloud computing allows users to store data and access...

    Provided By International Journal of Computer Applications