International Journal of Computer Applications

Displaying 1-40 of 6088 results

  • White Papers // Feb 2015

    Text Encryption Algorithms Based on Pseudo Random Number Generator

    In this paper, the authors present algorithms for encryption and decryption developed using Pseudo Random Number Generator (PRNG) and non-Linear functions. PRNG used in the work are matlab Random Number Generator (RNG) and Linear Congruential Generator (LCG). The developed algorithms are named according to PRNG used in it. State of...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Trends and Technologies Used for Mitigating Energy Efficiency Issues in Wireless Sensor Network

    The area of wireless sensor network is one the constant attention of the research community owing to its potential advantages and the persistent issues associated with it. In the recent times, various applications are conceptualized where Wireless Sensor Network (WSN) is used either as a sub-network or as a complete...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Handover Modeling of Multiple States of Mobile Node in a Five Node Network Model

    In today's world, user demands keep changing at a faster rate. To keep up the pace with the fast changing needs, technology also needs to change accordingly. In this paper, handover probability, unnecessary handover probability, missing handover probability and wrong decision probability are computed for a five node network model....

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    A Survey: Load Balancing for Distributed File System

    Distributed systems are useful for computation and storage of large scale data at dispersed location. Distributed File System (DFS) is a subsystem of distributed system. DFS is a means of sharing of storage space and data. Servers, storage devices and clients are on dispersed location in DFS. Fault tolerance and...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Price Prediction of Stock Market Using Hybrid Model of Artificial Intelligence

    Today, investment by purchasing stock-share constitutes the greater part of economic exchange of countries and a considerable amount of capital is exchanged through the stock markets in the whole world. But one of the most important problems is finding efficient ways to summarize and visualize the stock market data to...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    An Overview of Vertical Handoff Decision Algorithm

    In wireless communications of fourth generation the expectation to assimilate a hypothetically numerous heterogeneous wireless technologies are happened under consideration of a novel step toward worldwide smooth access. As the popularity of mobile wireless networks increases as well the challenges of merging a various number of wireless networks increases. Everyone...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Congestion Control Techniques in a Computer Network: A Survey

    With the advance in technology the focus has shifted from desktops and laptops to handheld devices like tablets, phablets, mobile phones, PDA etc. giving rise in the number of users connected to internet. About 900 million computers are connected to internet. In an hour 383 thousand TB of data transmission...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    An Enhanced ATM Security System Using Second-Level Authentication

    The increase of Automated Teller Machine (ATM) frauds has actuated the development of new authentication mechanisms that can overcome the security problems associated with the Personal Identification Numbers (PIN). The traditional PIN entry system has stood the test of time mainly because of its speed and memorability which are part...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Area Coverage Redundancy and Node Positioning in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) create the platform of an extensive range of applications linked to national security, surveillance, military, health care, and environmental monitoring. One of the most imperative and elementary problems in Wireless Sensor Networks (WSNs) is the coverage problem. Network coverage of wireless sensor network means how well...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Design and Analysis of Meander Microstrip Antenna at Wireless Band

    Meander Line Antenna (MLA) is an electrically small antenna which poses several performance related issues such as narrow bandwidth, high VSWR, low gain and high cross polarization levels. This paper describe the design, simulation and development of meander line micro-strip antenna at wireless band, the antenna was modeled using micro-strip...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Fraud Detection in Current Scenario, Sophistications and Directions: A Comprehensive Survey

    Fraud Detection is one of the oldest areas of research. The requirement of an effective system that detects frauds effectively with zero loss exists until now. This is due to the increase in the technology, that influences both the ends; the user and the fraudster. Hence it becomes mandatory that...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Design and Comparison of Three Rectangular-Slots-Loaded and No Slot-Loaded Square Shaped Micro-Strip Patch Antenna

    In this paper, the authors present a proposed design for square shaped micro-strip patch antenna by cutting three rectangular slots on the surface of the square patch. Using proposed antenna design and probe feeding at proper position they will compare the resultant return loss and VSWR and bandwidth with the...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Design Issues and Challenges in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are composed self-organized wireless ad hoc networks which comprise of a large number of resource constrained sensor nodes. The major areas of research in WSN is going on hardware, and operating system of WSN, deployment, architecture, localization, synchronization, programming models, data aggregation and dissemination, database querying,...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    A Simple and Efficient Roadmap to Process Fingerprint Images in Frequency Domain

    In the field of computer vision, image enhancement is one of the most important and critical stage, which eventually or indirectly decides the final results in the Boolean form, as far as image recognition or comparison is concern, fingerprint recognition system is also the part of computer vision and considered...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Time Execution Constraints Using Intricate Encryption and Decryption Process for Secure Data Transmission

    The encryption and decryption process is widely investigated and developed for a robust data security which is challenging to crack. Many researchers proposed different types of encryption and decryption algorithms such as DES, AES, RSA, etc., the proposed algorithms are encountered such as deficiency of stoutness and significant amount of...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    A Survey on Hierarchical Attribute Set Based Encryption (HASBE) Access Control Model for Cloud Computing

    Cloud computing refers to the application and service that run on a distributed system using virtualized resources and access by common internet protocol and networking standard. Cloud computing virtualizes system by pooling and sharing resources. System and resources can be monitored from central infrastructure as needed. It requires high security...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Efficient Wireless Channel Estimation Using Alamouti STBC With MIMO and 16-PSK Modulation

    The wireless communication system is better for the new generation of data communication technology, because it facilitates the user to communicate of share information through mobile devices in mobile situation without any leased or dedicated line. This paper field is continuously exploring by the researchers to innovate new techniques to...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Providing Data Security in Cloud Computing Using Novel and Mixed Agent Based Approach

    Determining the user's trust is a growing concern for ensuring privacy and security in a cloud computing environment. In a cloud, user's data is stored in one or more remote server(s) which poses more security challenges for the system. Most important concern is to protect user's sensitive information from other...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Encrypted Information Hiding Using Audio Steganography and Audio Cryptography

    With the growing importance of the internet, secure transmission of information is crucial. Steganography and cryptography helps in providing this much needed data confidentiality. Steganography hides secret information into a cover medium and cryptography converts data into an unrecognizable form. In this paper, the authors proposed a novel approach for...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Formal Conceptual Framework for Structure of Context of Component-Based System for Designing Robust Software Systems and Metrics

    For defining a set of unambiguous and language-independent metrics and other relevant concepts, the need for definition of a formal conceptual framework of the context/environment, particularly for safety-critical environments, has earlier been recognized and emphasized. In this paper, a formal conceptual framework is proposed for defining metrics and other relevant...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    An Intrusion Detection System for MANETs

    Mobile Ad-hoc NETwork (MANET) is a temporary infrastructure less network. This network is formed by combining some set of wireless mobile hosts. The host is called as a node which dynamically establishes their own network. In MANET all the nodes operates in cooperative fashion. Due to their certain inherently vulnerable...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Grid Based Fuzzy Optimized Routing Protocol for Underwater Sensor Networks

    In Underwater Wireless Sensor Networks (UWSNs) there are several problems with limited bandwidth, long propagation delay, low battery power, location problems because of having adverse environment. In Grid Based Fuzzy Optimized (GBFO) routing protocol the whole network is divided by different virtual grids. Then energy estimation of an active node...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Enhancing Cloud Security Through Access Control Models: A Survey

    Cloud computing is a new computing paradigm in which an application can run on connected cloud server instead of local server. Cloud computing provides efficient data storage, resource sharing and services in a distributed manner with great ease. However, cloud computing is having issues like security and privacy of data...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Case Study: Outlier Detection on Sequential Data

    Time series data streams are common in wireless sensor networks in nowadays. This type of data is having uncertainty due to the limitation of the measuring equipments or other sources of corrupting noise, leading to uncertain data. As uncertain streaming data is continuously generated, mining algorithms should be able to...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Annihiliation of Redudant Data in Amalgamation of WSN's Using Data Cleansing

    Now-a-days manufacturing environments are very charismatic and inclement. Traditional Management Information Systems (MISs) have mostly been implemented upon hierarchical architectures, which are inflexible to adapt changes and uncertainties promptly. Next-generation MISs must be agile and adaptable to accommodate changes without significant time delays. It is essential for an MIS to...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Characteristics of a Fuzzy Project Network Using Statistical Data

    In this paper, characteristics of fuzzy project network using statistical data are discussed in detail in order to calculate the fuzzy critical path, fuzzy earliest times, fuzzy latest times and fuzzy total float. Fuzzy number as fuzzy activity time is constructed using interval estimate by calculating mean, variance and standard...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Developing Web-Based Semantic and Fuzzy Expert Systems Using Proposed Tool

    Developing the Expert System (ES) using conventional programming languages is very tedious task. Therefore, it is not surprising that tools have been developed that can support the knowledge engineer. Separate tools now exist to support the knowledge acquisition and to support the implementation. Fuzzy set theory is used to capture...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Designing Smart University Using RFID and WSN

    Attendance is one of the important factors that determine the students rendering. There is a necessity to build a smart system that decrease load in managing the attendance and improves the performance of colleges, universities and any educational institute. The most common actions in educational organizations involve identification of student,...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    SLA-Based Virtual Machine Management for Mixed Workloads of Interactive Jobs in a Cloud Datacenter

    Efficient provisioning of resources is a challenging problem in cloud computing environments due to its dynamic nature and the need for supporting heterogeneous applications. Even though VM (Virtual Machine) technology allows several workloads to run concurrently and to use a shared infrastructure, still it does not guarantee application performance. Thus,...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    An Enhanced Proxy Blind Signature with Two Intractable Problems

    A proxy blind signature scheme is combination of two signature schemes particularly proxy signature and blind signature. In this signature scheme the original signer delegate the users' signing authority to some other entity named proxy signer. The proxy signer signs the documents or messages, but the signer cannot be able...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Risk Aware Intrusion Detection and Response Mechanism for MANET

    Mobile Ad-hoc NETworks (MANETs) are dynamic in nature. It is well known fact that dynamic nature of network infrastructure (of MANETs) results in the highly vulnerable to attacks. Among these attacks, routing attack has considerable attention, since it could cause most destructive damage to MANET. A lot of work is...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    A Weighted Fair Queue Based SBPN (WFQ-SBPN) Algorithm to Improve QoS for Multimedia Application in Mobile Ad Hoc Networks

    In this paper, the authors investigate a new technique based on SBPN for congestion avoidance. In this technique, they proposed a new algorithm based on WFQ for improving the QoS for multimedia traffic in MANET. In traditional algorithm used SBPN-FIFO in which data transmitted in which order it's received. In...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Enhancing Virtual Machine Performance in Cloud Using Cache as a Service

    Caching is one of the important concept used for optimizing the performance gap across data hierarchies; in particular, disk storage systems. Cloud applications are generally resource hungry and may consist of high frequency of occasional resource consumption, which are common in the cloud; do benefit the most from caching. There...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Cyber Warfare and Terrorism Based on Data Transmission Through Classical Cryptographic and Steganographic Algorithms

    The introduction of Internet has made it easier for everyone to access almost all information from different locations globally. This has made sensitive information prone to attack by malicious attackers. It therefore becomes important to come with measures that can be used to protect data on transmission from falling into...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Experimental Evaluation of Scalability and Reliability of a Multicast Protocol for MANETs

    In this era of social media, real time video multicast over Mobile Ad-hoc NETworks (MANETs) is subject of active research and new products are in use as a result of these research advancements. The authors have earlier proposed a simple and novel approach for multicasting in MANETs that is particularly...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    An Implementation of Secure Wireless Network for Avoiding Black hole Attack

    Mobile Ad-hoc NETwork (MANET) is a temporary infrastructure less network, Due to absence of infrastructure, MANET is vulnerable to attacks such as black hole attack, gray hole attack, wormhole attack, Sybil attack, and route table modification attack. This research is concerned with "Includes a way to produce and implement a...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    A Survey: Privacy Preserving Data Mining

    Privacy preserving data mining techniques are introduced with the aim of extract the relevant knowledge from the large amount of data while protecting the sensible information at the same time. The success of data mining relies on the availability of high quality data. To ensure quality of data mining, effective...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Efficient Bandwidth Management and Implementation of Cross-Layer Queuing Model in a Wireless Campus Area Network

    In this paper, the authors investigate the use of an efficient bandwidth management scheme by implementing cross-layer M/M/1 queuing model. Strict Open System Interconnection (OSI) layer to layer communication problem is solved by introducing a common database that automatically synchronizes the status of each OSI layer to all the other...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    A Trusted Misbehaviors Detection Scheme in Delay Tolerant Network

    Misbehavior of node represent a serious threat against routing in delay tolerant network. In this paper mainly focus to improve the packet loss during the transmission of packet one to another node and also deal with selfish and malicious node. In this paper introducing a periodically available trusted authority. TA...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    A Comparative Analysis of Lane Detection Techniques

    In many proposed systems, the lane detection consists of the localization of particular primitives such as markings of the plane of the painted roads. Various challenges like parked and moving vehicle, bad feature lines, shade of trees, buildings and other vehicles, road curvature, uneven lane shapes, integrated lanes, writings and...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A 64 Bits Dynamically Key Controlled Symmetric Cipher (KAMFEE-X64)

    This paper presents an improved version of KAMFEE cipher. The proposed cipher (KAMFEE-X64) is designed to be compatible with the new 64 bits microprocessors unlike the old cipher (KAMFEE) which is designed for systems based on x86 microprocessors. KAMFEE-X64 has a key dependent block length and key dependent rounds, enhanced...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A Review of Automatic Test Cases Generation

    Manual testing is hard and time consuming and it may be impossible for large systems or tester mistake in the test. The software testing is the rising cost of activities in development software and the test case generation is important activity in software testing. Hence researches performed to automate testing...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Multi Lingual Speaker Identification on Foreign Languages Using Artificial Neural Network

    Based on the Back Propagation Algorithm, this paper portrait a method for speaker identification in multiple foreign languages. In order to identify speaker, the complete process goes through recording of the speech utterances of different speakers in multiple foreign languages, features extraction, data clustering and system training. In order to...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A New Approach for Information Security Using Asymmetric Encryption and Watermarking Technique

    Rapid growth of internet and networked information systems has contributed a lot in the increase of multimedia contents. As digital contents are increasing day by day on internet it has raised requirement for the effective protection of multimedia assets (images, audios, videos). This paper proposes a new approach to protect...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A Design of Authentication and Access Control Model for Remote Access Using GSM Technologies

    The GSM technologies plays vital role in pervasive computing environments. The open and dynamic nature of the pervasive computing environment allows entities to join and leave frequently. This causes a large number of autonomous entities to interact in an ad-hoc manner, raising concerns as to the trustworthiness of the service...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Removal of Network Ambiguities Through Knowledge Based System

    Documents on the Internet are composed of several kinds of multimedia information when accessed for personal, entertainment, business, and scientific purposes. There are many specific content domains of interest to different communities of users. Extracting semantic relationships between entities from text documents is challenging task in information extraction. By semantics...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Lifetime Maximization of Wireless Sensor Networks Using Improved Genetic Algorithm Based Approach

    In Wireless Sensor Networks the nodes have limited energy and are seriously constrained by the battery life. To increase the lifetime of the network is a critical and challenging issue and thus it is the routing in WSNs, which is the primary focus of design for researchers. In this paper...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Innovative Performance Evaluation of Unnecessary Handoffs and Handoff Failures During Access Network Selection Between WLAN and Cellular Networks

    Received Signal Strength based (RSS) horizontal handoff algorithms have been most commonly used by nearly all second generation and third generation wireless networks in a homogeneous environment. Vertical handoffs or network selection algorithms are the terms coined due to integration and interoperability of existing wired and wireless access networks under...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Survey on Securing Data in Cloud

    Cloud computing is an innovative information system architecture which reduces the overall client side resource requirements. Even though the data outsourcing reduce the burden of client storage the clients no longer have physical possession of data which will leads to so many security issues. Hence the user need to make...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Multimodal Biometric System Using Iris, Palmprint and Finger-Knuckle

    Most real-life biometric systems are still unimodal. Unimodal biometric systems perform person recognition based on a single source of biometric information. Such systems are often affected by some problems such as noisy sensor data, nonuniversality and spoof attacks. Multibiometrics overcomes these problems. Multibiometric systems represent the fusion of two or...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    An Efficient Bee-Inspired Auto-Configuration Algorithm for Mobile Ad Hoc Networks

    The infrastructure-less and dynamic nature of Mobile Ad-hoc NETworks (MANETs) requires the implementation of a new set of networking technologies in order to provide efficient end-to-end communication according to the principles of the standard TCP/IP suite. Routing and IP address auto-configuration are among the most challenging tasks in the ad...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Broadband Microstrip S-Shaped Patch Antenna for Wireless Communication

    This paper presents a single-patch broadband microstrip S-shaped patch antenna. Microstrip S-shaped patch antenna, fed by a coaxial feeding. The antenna is designed by inserting two slots into rotated square patch then it look like english letter S. Because of the slots and thick substrate, bandwidth of antenna is increased....

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A Fuzzy Approach for Privacy Preserving in Data Mining

    Advances in hardware technology have increased storage and recording capabilities regarding individual's personal data. Privacy preserving of data has to ensure that individual data publishing will refrain from disclosing sensitive data. Data is anonymized to address the data misuse concerns. Recent techniques have highlighted data mining in ways to ensure...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Bank Locker Security System Based on RFID and GSM Technology

    The main goal of this paper is to design and implement a bank locker security system based on RFID and GSM technology which can be organized in bank, secured offices and homes. In this system only authentic person can be recovered money from bank locker. The authors have implemented a...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Survey of Integrating Testing for Componentbased System

    Today's software larger in size, design complex and time consuming to implement them, for this the authors need a prominent solution to overcome these problems. Component-Based Software Development (CBSD) has emerged as an Object Oriented (OO) Software Engineering approach that forced rapid software development. Using CBSE approach they can eliminate...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A Novel Approach of Speedy-Highly Secured Data Transmission Using Cascading of PDLZW and Arithmetic Coding with Cryptography

    The spread of computing has led to an outburst in the volume of data in the communication world. The paper proposes the cascading of two algorithms PDLZW and Arithmetic Coding with cryptography. With the hierarchical parallel dictionary set, the search time can be reduced significantly and all these dictionaries are...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Stock Market Prediction Model by Combining Numeric and News Textual Mining

    This paper proposes a novel method for the prediction of stock market closing price. Many researchers have contributed in this area of chaotic forecast in their ways. Data mining techniques can be used more in financial markets to make qualitative decisions for investors. Fundamental and technical analyses are the traditional...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Review of Fractal Transform Based Image and Video Compression

    Fractal Compression is a new technique in the field of color and video compression. This technique has grabbed much attention in recent years because of very high compression ratio that can be achieved. It also provides interesting interpolation features to zoom the images. Hybrid schemes incorporating fractal compression and speedup...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Enhancement in Feedback Polynomials of LFSR Used in A5/1 Stream Cipher

    There is encryption algorithms used in GSM. This is for to encrypt the information when transmit from mobile station to base station during communication. As stated that A5/1 is strong algorithm but it cryptanalysis by cryptanalysts. This paper modified concept to improve A5/1 encryption algorithm by consideration of feedback combining...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    WEB Based Service Platform of Population

    The Indian Census is the most credible source of information on Demography (Population Characteristics), Economic Activities, Literacy and Education etc. As the Census data plays a vital role for the future of the country it is very important to maintain it properly and accurately. As of now census data is...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Combining Advanced Encryption Standard (AES) and One Time Pad (OTP) Encryption for Data Security

    The development of telecommunications technology and data storage using the computer has become a necessity because there are many jobs that can be completed quickly, accurately, and efficiently. In addition it allows data transmission distance is relatively fast and cheap, but on the other hand long-distance data transmission is possible...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Concept of Designing an Optimized Pull Model View Controller Type Content Management Framework

    Based on the concept of "Easy to learn and develop for anyone", the authors present an integrated framework concept for developing content management system using an optimized pull Model View Controller (MVC) type in web programming. The framework consist of four easy steps to follow: first step is determining web...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Cyber Security Approach in Web Application Using SVM

    Internet is open source for web access like for the purpose of railway reservation, online banking, online fees submission etc. Security concern is the most threatening topic for users about their confidential information's storage. various security designing and algorithms has been designed to impose secure environment for user but still...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A Research on Decentralized Clustering Algorithms for Dense Wireless Sensor Networks

    A wireless sensor network with large number of sensor nodes can be used as an effective tool for collecting data in various situations. Recent advancement in wireless communications and electronics has enabled the development of low-cost sensor network. Wireless sensor networks are web of sensor nodes with a set of...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    CO2 Monitoring System from Remote Location Using GSM, GPS and Concept of MODBUS

    The system developed here is useful for measurement of waste gas (like Co2) remotely. This will helpful particularly for the environment department because many chimneys releases polluted gases now-a-days, which is a serious issue for Global warming. If any factory emits gas beyond some predefined specified limit, this system will...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Hybrid Model for Location Privacy in Wireless Ad-Hoc Networks for Mobile Applications

    A wireless ad-hoc network is a decentralized type of wireless network. The network is ad-hoc because it does not rely on a preexisting infrastructure, such as routers in wired networks or access points in managed (infrastructure) wireless networks. Now-a-day in fast growing world, use of internet is increasing popularly and...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Multipath Global Rerouting for Fault Tolerant Overlay Network (FTON) in Labeled Optical Burst-Switching

    In this paper, mainly concentrate on reduce the burst loss and Non-availability of wavelength in network; proposed an overlay model known as Fault Tolerant Overlay Network (FTON) which improves the performance of a regular IP electronic network. An FTON is created over the existing network; an FTON node collects the...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Application of Fuzzy Analytic Hierarchy Method in Software Engineering Scenario

    In software engineering scenario, software effort estimation is very uncertain and depends on various external factors .For developing a particular type of software, selection of an optimal and experienced group of developer is essential for software development organization for organizational benefits and is necessary because success and failure of software...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A Framework for Android and J2ME Bluetooth Communication

    Mobile applications development is attracting more and more developers recently due to the emergence of new mobile platforms such as Android; which is making application development easier as well as its' marketing. All new Smartphone's now support Bluetooth, a popular communication medium for mobile phones. However, cross-platform Bluetooth communication between...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Mobile Client's Access Mechanism for Location Based Service Using Cell-ID

    Today's location-sensitive service relies on user's mobile device to determine its location and send the location to the application. A location-based service is a service that determines the location of a mobile device and uses this to provide functionalities and information specific to that location. With the growth of the...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Performance Analysis of Backoff Exponent Behaviour at MAC Layer In ZigBee Sensor Networks

    Topology is one of the major new paradigms and is the premier research topic in ZigBee based Wireless Sensor Network and has opened up new challenges for researchers throughout the World due to its wide range of applications ranging from medical research to military. IEEE 802.15.4/ZigBee is a worldwide open...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Performance Analysis for Visual Data Mining Classification Techniques of Decision Tree, Ensemble and SOM

    This paper is a comprehensive report on experimental setup, data collection methods, implementation and result analyses of market segmentation and forecasting using neural network based artificial intelligence tools. The main focus of the paper is on visual data mining applications for enhancing business decisions. The software based system is implemented...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A Survey on Preventing Jamming Attacks in Wireless Communication

    Communication in wireless network is possible with an air medium. Due to the high security threats in this system, the network may face various difficulties. One of the major threats is jamming attack which comes under Denial Of Service (DOS) attack. Jamming attack is common among many exploits that compromises...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Test Case Generation Based on Activity Diagram for Mobile Application

    Testing impacts the popularity of any software and hardware products. If proper testing of any product is done it will increase the cost and sale of the product. Mobiles are widely used electronic device there are several mobile companies established which provide variety of applications and features. It is obvious...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Network Security Using Firewall and Cryptographic Authentication

    The network Security is the hottest topic in the current research scenario. The information security is really threatened by obnoxious users. With increasing vulnerabilities, caused by port scan attacks, replay attacks and predominantly IP Spoofing, targeting services, the network behavior is getting malevolent. But there is a lack of any...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Box-Office Opening Prediction of Movies Based on Hype Analysis Through Data Mining

    Box-office performance of a movie is mainly determined by the amount the movie collects in the opening weekend and Pre-Release hype is an important factor as far as estimating the openings of the movie are concerned. This can be estimated through user opinions expressed online on sites such as Twitter...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Graph Neural Network for Minimum Dominating Set

    The dominating set concept in graphs has been used in many applications. In large graphs finding the minimum dominating set is difficult. The minimum dominating set problem in graphs seek a set D of minimum number of vertices such that each vertex of the graph is either in D or...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    A Stream Cipher Algorithm Based on Nonlinear Combination Generator with Enhanced Security for Image Encryption

    This paper describes a novel approach for image encryption using stream cipher algorithm based on non linear combination generator. This work aims to enhance the security of encrypted image. The work is based on the use of several linear feedback shifts registers whose feedback polynomials are primitive and of degrees...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Artificial Neural Network Modelling of Traffic Noise in Agra-Firozabad Highway

    The noise is a major environmental hazard at present. It causes hearing problem, tinnitus, high blood pressure, mental depression, heart palpitation etc. Noise is a usual problem everywhere and involves high health risk, but in today's fast life the authors ignore its harmful consequences and it results in high health...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Network Connectivity Based Topology Control for Mobile Ad Hoc Networks

    Energy consumption and network connectivity are two of the important research issues that are yet to be resolved in Mobile Ad-hoc NETworks (MANETs). However, only a few topology control methods (e.g.) take into account the low interference as a goal of the methods. Some researchers tried to indirectly reduce the...

    Provided By International Journal of Computer Applications