International Journal of Computer Applications

Displaying 1-40 of 4116 results

  • White Papers // Jun 2014

    Enhancement of the Private Cloud Data Transaction by using an Orthogonal Handshaking Authentication Protocol (OHSAP)

    Now-a-day, \"Cloud computing\" is an inevitable trend in the field of information technology due to the reason for information sharing as well as the resource utilization. In most of the organizations either it may be a profitable or non profitable category must focus on the resource sharing due to minimization...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    A Service Broker Model for Cloud based Render Farm Selection

    Cloud computing is gaining popularity in the 3D animation industry for rendering the 3D images. Rendering is an inevitable task in creating the 3D animated scenes. It is a process where the scene files to be animated is read and converted into 3D photorealistic images automatically. Since it is a...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Deadline Scheduling Algorithms in Cloud Computing: A Review

    Cloud computing is the nascent technology which is based on pay-per-use model. It is computing paradigm where applications, data, bandwidth and IT services are provided via Internet. Objective of the cloud service providers to use resource proficiently and achieve the maximum profit. This leads to task scheduling as a core...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Text Clustering Algorithms: A Review

    With the growth of Internet, large amount of text data is increasing, which are created by different media like social networking sites, web, and other informatics sources, etc. This data is in unstructured format which makes it tedious to analyze it, so the authors need methods and algorithms which can...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Analysis of 64- bit RC5 Encryption Algorithm for Pipelined Architecture

    In modern days data transmission through a channel requires more security. Security based more important transmission is comparatively better & believable than simple transmission. This paper is to use RC5 algorithm for encryption and decryption of data for secure data transmission from one place to another place for proper communication...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    A Survey on Problems and Solutions of Frequent Pattern Mining with the use of Pre-Processing Techniques

    Frequent pattern mining is a researched area which is used for extracting interesting associations and correlations among item sets in transactional and relational database. Many algorithms of frequent pattern mining is been devised ranging from efficient and scalable algorithms in transactional database to numerous research frontiers and their wide applications....

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    A Review of Leveraging Private Cloud Computing in Financial Service Institutions: Value Propositions and Current Performances

    In this paper the authors identifies main value propositions of leveraging private cloud computing and reviews current performance of implementing cloud computing technology in financial industry. The following aspects have been reviewed by this paper, namely discerning cloud computing-enabled innovations, identifying three value propositions of using cloud computing, reviewing current...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Database Generation for the Development of Village Information System (VIS)

    Data is considered as raw material from which meaningful results and analysis can be carried out. Database is a group of organized records and files which are stored systematically and shared by different users. To generate an information system it requires lot of data and database integrated with GIS. Comprehensive...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Provide a New Mapping for Deadlock Detection and Resolution Modeling of Distributed Database to Colored Petri Net

    One of the most important applications of distributed systems is enabling resource sharing between systems. In such environments, if a sequence of procedures to control resource allocation is not possible to create a deadlock exists. Deadlock problem for a distributed database system that uses locking as a concurrency control algorithm,...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Productivity Improvement in the Pride's Spare Parts Manufacturing using Computer Simulation and Data Envelopment Analysis

    Generally, improving production rate is a typical crucial problem in any manufacturing system. To cope with the problem, different kinds of scientific method stems from trial and error may be applied which imposes high costs. Rottenly testing any proposed scenarios may have significant effect on both operational management and manufacturing...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Big Data: The Next-Gen Google

    It is rightly said that invention is the mother of necessity. Big data - A new word in the information world. This paper describes the concept of big data and its research areas have been explored. This paper presents what all changes big data can bring to day-to-day lives. There...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Data Mining in Web Search Engine Optimization and User Assisted Rank Results

    In the fast moving world, the use of web is been increasing day-by-day so that the requirement of users relative to web search are also increasing. The content search over the web is one of the important research area comes under the web content mining. According to a traditional search...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    A Comparative Study on LEACH Routing Protocol and its Variants in Wireless Sensor Networks: A Survey

    Wireless sensor network consists of sensor nodes which are powered by battery; to communicate with each other for environment monitoring. Energy efficiency is the main issue in wireless sensor networks. Therefore, to maximize network lifetime and achieve maximum reliability and scalability, routing techniques have been developed. Leach is the conventional...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Supporting Ranking Queries for Search-As-You-Type in Databases using WIP

    Most of the search engines in Internet have simplified keyword-based search concept. The relational database management systems do not allow keyword-based search while they offers powerful query languages. Existing search systems that are based on keyword in relational database require users to submit a complete query to compute answers. Often...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Reliable Data Aggregation using Ant Colony Optimization with State Transition Ant Rule in Sensor Network

    Data aggregation plays a vital role as the Wireless Sensor Network (WSN) is highly susceptible to attacks. In WSN, data aggregation correlates the sensing data and aggregates at the intermediate nodes by reducing the time taken for message transfer. Works conducted on Concealed Data Aggregation scheme for Multiple Applications (CDAMA)...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Energy Efficient Hierarchy-based Clustering Routing Protocol for Wireless Sensor Networks

    Wireless Sensor Network (WSN) consisting of a large number of sensor nodes is effective for gathering data in a variety of environments. Since the sensors operate on battery of limited power, it is a challenging task to design an efficient routing scheme which can minimize the delay while offering high...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Multilevel Security and its Application to Enhance Data Protection

    A vast amount of information available on the internet along with the increased use of internet as a communication medium served a great deal in making the information available vulnerable. The number as well as the technique of attacks has become more and more sophisticated with time. This paper focuses...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Performance Analysis of Multiple Keys used for Data Security

    Data security is an essential component of an organization in order to keep the information safe from various competitors. It helps to ensure the privacy of a user from others. Secured and timely transmission of data is always an important aspect for an organization. The use of strong encryption algorithms...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Application of Factor Analysis to k-means Clustering Algorithm on Transportation Data

    Factor analysis is a very useful linear algebra technique used for dimensionality reduction. It is also used for data compression and visualization of high dimensional datasets. This technique tries to identify from among a large set of variables, a reduced set of components which summarizes the original data. This is...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Built in Self-Test for 4

    Built In Self-Test (BIST) is a technique or a method which allow the circuit to test itself. BIST increases the controllability and observability of integrated circuit therefore it is easier to apply inputs and then detect faults from it. BIST also decreases the time of testing integrated circuits & gives...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    High Imperceptible Data Hiding using Remainder Method

    In this paper the authors will propose a high quality image steganography technique which can hide secret data within an image in such a way so that it is imperceptible to human eye. This method solves the overlapping problem of remainder and use modulo operator efficiently for hiding purpose. First,...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Using Kerberos with Digital Signature and AES Encryption to Provide Data Security in Cloud Computing

    The cloud computing is the next generation platform that provides dynamic resources pools, virtualization, and high availableness. Today, with the assistance of those computing, the authors are able to utilize ascendable, distributed computing environments among the boundary of the web, It provides several edges in terms of low value and...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Prototyped LEACH Routing Algorithm for the Enhancement of Energy Efficiency in Wireless Sensor Network

    The topic of discussion and research is wireless sensor network and it just because it is an always application based. The research on wireless sensor networks has recently received much attention by offering an advantage of monitoring different kinds of environments by sensing their physical phenomenon. There are some important...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Back-End Forwarding Scheme in Server Load Balancing using Client Virtualization

    Load balancing can be done at two levels, the HTTP level and the network level. It refers to the distribution of the HTTP request made by the user across the web server in a server cluster and is achieved by various algorithms such as random selection, round robin, weighted round...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    A State-of-Art Load Balancing Algorithms in Cloud Computing

    Cloud computing is the ultimate technology in internet. It is a means of acquiring computing possessions, making do and delivering software and services. Cloud computing allows the customers to apply the application without set up and access their own files on any device with internet. Cloud services can be acquired...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    A Comparison of Clustering and Modification based Graph Anonymization Methods with Constraints

    In this paper a comparison is performed on two of the key methods for graph anonymization and their behavior is evaluated when constraints are incorporated into the anonymization process. The two methods tested are node clustering and node modification and are applied to Online Social Network (OSN) graph datasets. The...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Recent Trends in Energy-Efficient Clustering in WSNs

    Tremendous growth has been observed in the use of Wireless Sensor Networks (WSNs) in the last decade. WSNs behave like an interface between the virtual and physical worlds. Sensor nodes sense the changes in external environment and send the data to other nodes in the network or the sink, also...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Hybrid TB-LEACH Energy Based Multihop Protocol

    Wireless sensor network is defined as the network composed of tiny and energy restricted sensor nodes. Sensor nodes collect the useful information from surrounding environment and deliver it to the base station. Sensor nodes have limited energy. Routing protocols must consume minimum energy in order to prolong the network lifetime....

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Develepment of Real Time Application Platform for Linux Kernel with Preempt-RT

    The On Board Computer (OBC) of an aerospace vehicle carries out control, guidance and navigation operations during the flight. It consists of a processor and IO board to execute the real time embedded software and to read input data from other subsystems & send commands to control system. In the...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    FPGA Implementation of Area Efficient and Delay Optimized 32-Bit SQRT CSLA with First Addition Logic

    Binary addition is a fundamental operation in most digital circuits. There are a variety of adders, each has certain performance. Parallel adders are used for fast binary addition which plays a crucial impersonation in majority of digital circuit designs including Digital Signal Processors (DSP) and microprocessor data path unit. In...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    An Efficient Text Clustering Approach using Biased Affinity Propagation

    Based on an effective clustering algorithm seeds affinity propagation-in this paper an efficient clustering approach is presented which uses one dimension for the group of the words representing the similar area of interest with that the authors have also considered the uneven weighting of each dimension depending upon the categorical...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Design and Implementation of an Improved Routing Algorithm using Frequent Item Set Mining

    In this paper the authors present how routers can manage large amount of data packets as routers exchange information with each other to find the best possible route to a destination thus graphs represent a more general class of structures than sets, sequences, lattices and trees. Since on web heavy...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Enhanced Secured Multi cloud using Technical Environment and Regulatory Framework

    Cloud computing is the rising generation key platform for sharing the resources like software as a service, infrastructure as a service, and platform as a service. In future all IT enterprises migrate into cloud platform. Cloud server exchanges the messages for remote location users with the help of multi cloud...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Performance Tuning in Database Management System based on Analysis of Combination of Time and Cost Parameter through Neural Network Learning

    Performance tuning in database management system means enhancing the performance of database, i.e. minimizing the response time at a very optimum cost. Query optimization is one of the important aspects of performance tuning. Lots of research work has been done in this field but it is still ongoing process. To...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Analytical Approach in Terms of Lead and Lag Parameter to Tune Database Performance

    Performance tuning in database management system means escalating the performance of database by reducing time. For enhancing performance, analysis is important and analysis can be performed by neural network learning to save time spent in doing repeated work because neural network has ability to adapt dynamically varying environment. In this...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Solution to Security and Secrecy in Cloud Environment using PAKE Protocol - A Bibliographic Survey

    Cloud computing is an emerging technology that provide people a way to share large amount of hardware and software resources that belong to different organizations. Maintaining privacy and security in cloud environment is more complicated. Mitigating threats in a distributed computing environment is a difficult task as it requires constant...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Improved Task Scheduling Algorithm in Cloud Environment

    Cloud computing is one of the hottest word in IT world and it having huge demand in these days. Some big IT companies like Google, IBM, Microsoft, Amazon, Yahoo and others develop cloud computing systems and products related to it for customers. But still customers are having difficulties for adopting...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Performance Analysis of Various Architectural Approaches in Cloud Computing Environment for Energy and Bandwidth Minimization

    Cloud computing is one of the mainly admired subject in the computational world. It is support to processing the data that was emerged by profitable infrastructure. Cloud computing consist of large number of servers comprising of both virtual and physical servers in order to provide the resources in an optimal...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    An Energy Efficient Cooperative MISO Transmission Scheme for Cluster-based Wireless Sensor Network

    Wireless sensor network becomes an attractive choice for different applications because of their multitasking nature such as sensing the data, computing the data, and transmitting that data to the main location. But wireless sensor network have a number of tiny sensor nodes which are operate on small batteries. So it...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    SSM-DENCLUE: Enhanced Approach for Clustering of Sequential Data: Experiments and Test Cases

    Clustering web usage data is useful to discover interesting patterns related to user traversals, behavior and their characteristics, which helps for the improvement of better search engines and Web personalization. Clustering web sessions is to group them based on similarity and consists of minimizing the intra-cluster similarity and maximizing the...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A 64 Bits Dynamically Key Controlled Symmetric Cipher (KAMFEE-X64)

    This paper presents an improved version of KAMFEE cipher. The proposed cipher (KAMFEE-X64) is designed to be compatible with the new 64 bits microprocessors unlike the old cipher (KAMFEE) which is designed for systems based on x86 microprocessors. KAMFEE-X64 has a key dependent block length and key dependent rounds, enhanced...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A Review of Automatic Test Cases Generation

    Manual testing is hard and time consuming and it may be impossible for large systems or tester mistake in the test. The software testing is the rising cost of activities in development software and the test case generation is important activity in software testing. Hence researches performed to automate testing...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Multi Lingual Speaker Identification on Foreign Languages Using Artificial Neural Network

    Based on the Back Propagation Algorithm, this paper portrait a method for speaker identification in multiple foreign languages. In order to identify speaker, the complete process goes through recording of the speech utterances of different speakers in multiple foreign languages, features extraction, data clustering and system training. In order to...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A New Approach for Information Security Using Asymmetric Encryption and Watermarking Technique

    Rapid growth of internet and networked information systems has contributed a lot in the increase of multimedia contents. As digital contents are increasing day by day on internet it has raised requirement for the effective protection of multimedia assets (images, audios, videos). This paper proposes a new approach to protect...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A Design of Authentication and Access Control Model for Remote Access Using GSM Technologies

    The GSM technologies plays vital role in pervasive computing environments. The open and dynamic nature of the pervasive computing environment allows entities to join and leave frequently. This causes a large number of autonomous entities to interact in an ad-hoc manner, raising concerns as to the trustworthiness of the service...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Removal of Network Ambiguities Through Knowledge Based System

    Documents on the Internet are composed of several kinds of multimedia information when accessed for personal, entertainment, business, and scientific purposes. There are many specific content domains of interest to different communities of users. Extracting semantic relationships between entities from text documents is challenging task in information extraction. By semantics...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Lifetime Maximization of Wireless Sensor Networks Using Improved Genetic Algorithm Based Approach

    In Wireless Sensor Networks the nodes have limited energy and are seriously constrained by the battery life. To increase the lifetime of the network is a critical and challenging issue and thus it is the routing in WSNs, which is the primary focus of design for researchers. In this paper...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Innovative Performance Evaluation of Unnecessary Handoffs and Handoff Failures During Access Network Selection Between WLAN and Cellular Networks

    Received Signal Strength based (RSS) horizontal handoff algorithms have been most commonly used by nearly all second generation and third generation wireless networks in a homogeneous environment. Vertical handoffs or network selection algorithms are the terms coined due to integration and interoperability of existing wired and wireless access networks under...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Survey on Securing Data in Cloud

    Cloud computing is an innovative information system architecture which reduces the overall client side resource requirements. Even though the data outsourcing reduce the burden of client storage the clients no longer have physical possession of data which will leads to so many security issues. Hence the user need to make...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Multimodal Biometric System Using Iris, Palmprint and Finger-Knuckle

    Most real-life biometric systems are still unimodal. Unimodal biometric systems perform person recognition based on a single source of biometric information. Such systems are often affected by some problems such as noisy sensor data, nonuniversality and spoof attacks. Multibiometrics overcomes these problems. Multibiometric systems represent the fusion of two or...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    An Efficient Bee-Inspired Auto-Configuration Algorithm for Mobile Ad Hoc Networks

    The infrastructure-less and dynamic nature of Mobile Ad-hoc NETworks (MANETs) requires the implementation of a new set of networking technologies in order to provide efficient end-to-end communication according to the principles of the standard TCP/IP suite. Routing and IP address auto-configuration are among the most challenging tasks in the ad...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Broadband Microstrip S-Shaped Patch Antenna for Wireless Communication

    This paper presents a single-patch broadband microstrip S-shaped patch antenna. Microstrip S-shaped patch antenna, fed by a coaxial feeding. The antenna is designed by inserting two slots into rotated square patch then it look like english letter S. Because of the slots and thick substrate, bandwidth of antenna is increased....

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A Fuzzy Approach for Privacy Preserving in Data Mining

    Advances in hardware technology have increased storage and recording capabilities regarding individual's personal data. Privacy preserving of data has to ensure that individual data publishing will refrain from disclosing sensitive data. Data is anonymized to address the data misuse concerns. Recent techniques have highlighted data mining in ways to ensure...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Bank Locker Security System Based on RFID and GSM Technology

    The main goal of this paper is to design and implement a bank locker security system based on RFID and GSM technology which can be organized in bank, secured offices and homes. In this system only authentic person can be recovered money from bank locker. The authors have implemented a...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Survey of Integrating Testing for Componentbased System

    Today's software larger in size, design complex and time consuming to implement them, for this the authors need a prominent solution to overcome these problems. Component-Based Software Development (CBSD) has emerged as an Object Oriented (OO) Software Engineering approach that forced rapid software development. Using CBSE approach they can eliminate...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A Novel Approach of Speedy-Highly Secured Data Transmission Using Cascading of PDLZW and Arithmetic Coding with Cryptography

    The spread of computing has led to an outburst in the volume of data in the communication world. The paper proposes the cascading of two algorithms PDLZW and Arithmetic Coding with cryptography. With the hierarchical parallel dictionary set, the search time can be reduced significantly and all these dictionaries are...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Stock Market Prediction Model by Combining Numeric and News Textual Mining

    This paper proposes a novel method for the prediction of stock market closing price. Many researchers have contributed in this area of chaotic forecast in their ways. Data mining techniques can be used more in financial markets to make qualitative decisions for investors. Fundamental and technical analyses are the traditional...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Review of Fractal Transform Based Image and Video Compression

    Fractal Compression is a new technique in the field of color and video compression. This technique has grabbed much attention in recent years because of very high compression ratio that can be achieved. It also provides interesting interpolation features to zoom the images. Hybrid schemes incorporating fractal compression and speedup...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Enhancement in Feedback Polynomials of LFSR Used in A5/1 Stream Cipher

    There is encryption algorithms used in GSM. This is for to encrypt the information when transmit from mobile station to base station during communication. As stated that A5/1 is strong algorithm but it cryptanalysis by cryptanalysts. This paper modified concept to improve A5/1 encryption algorithm by consideration of feedback combining...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    WEB Based Service Platform of Population

    The Indian Census is the most credible source of information on Demography (Population Characteristics), Economic Activities, Literacy and Education etc. As the Census data plays a vital role for the future of the country it is very important to maintain it properly and accurately. As of now census data is...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Combining Advanced Encryption Standard (AES) and One Time Pad (OTP) Encryption for Data Security

    The development of telecommunications technology and data storage using the computer has become a necessity because there are many jobs that can be completed quickly, accurately, and efficiently. In addition it allows data transmission distance is relatively fast and cheap, but on the other hand long-distance data transmission is possible...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Concept of Designing an Optimized Pull Model View Controller Type Content Management Framework

    Based on the concept of "Easy to learn and develop for anyone", the authors present an integrated framework concept for developing content management system using an optimized pull Model View Controller (MVC) type in web programming. The framework consist of four easy steps to follow: first step is determining web...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Cyber Security Approach in Web Application Using SVM

    Internet is open source for web access like for the purpose of railway reservation, online banking, online fees submission etc. Security concern is the most threatening topic for users about their confidential information's storage. various security designing and algorithms has been designed to impose secure environment for user but still...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A Research on Decentralized Clustering Algorithms for Dense Wireless Sensor Networks

    A wireless sensor network with large number of sensor nodes can be used as an effective tool for collecting data in various situations. Recent advancement in wireless communications and electronics has enabled the development of low-cost sensor network. Wireless sensor networks are web of sensor nodes with a set of...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    CO2 Monitoring System from Remote Location Using GSM, GPS and Concept of MODBUS

    The system developed here is useful for measurement of waste gas (like Co2) remotely. This will helpful particularly for the environment department because many chimneys releases polluted gases now-a-days, which is a serious issue for Global warming. If any factory emits gas beyond some predefined specified limit, this system will...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Hybrid Model for Location Privacy in Wireless Ad-Hoc Networks for Mobile Applications

    A wireless ad-hoc network is a decentralized type of wireless network. The network is ad-hoc because it does not rely on a preexisting infrastructure, such as routers in wired networks or access points in managed (infrastructure) wireless networks. Now-a-day in fast growing world, use of internet is increasing popularly and...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Multipath Global Rerouting for Fault Tolerant Overlay Network (FTON) in Labeled Optical Burst-Switching

    In this paper, mainly concentrate on reduce the burst loss and Non-availability of wavelength in network; proposed an overlay model known as Fault Tolerant Overlay Network (FTON) which improves the performance of a regular IP electronic network. An FTON is created over the existing network; an FTON node collects the...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Application of Fuzzy Analytic Hierarchy Method in Software Engineering Scenario

    In software engineering scenario, software effort estimation is very uncertain and depends on various external factors .For developing a particular type of software, selection of an optimal and experienced group of developer is essential for software development organization for organizational benefits and is necessary because success and failure of software...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A Framework for Android and J2ME Bluetooth Communication

    Mobile applications development is attracting more and more developers recently due to the emergence of new mobile platforms such as Android; which is making application development easier as well as its' marketing. All new Smartphone's now support Bluetooth, a popular communication medium for mobile phones. However, cross-platform Bluetooth communication between...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Mobile Client's Access Mechanism for Location Based Service Using Cell-ID

    Today's location-sensitive service relies on user's mobile device to determine its location and send the location to the application. A location-based service is a service that determines the location of a mobile device and uses this to provide functionalities and information specific to that location. With the growth of the...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Performance Analysis of Backoff Exponent Behaviour at MAC Layer In ZigBee Sensor Networks

    Topology is one of the major new paradigms and is the premier research topic in ZigBee based Wireless Sensor Network and has opened up new challenges for researchers throughout the World due to its wide range of applications ranging from medical research to military. IEEE 802.15.4/ZigBee is a worldwide open...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Performance Analysis for Visual Data Mining Classification Techniques of Decision Tree, Ensemble and SOM

    This paper is a comprehensive report on experimental setup, data collection methods, implementation and result analyses of market segmentation and forecasting using neural network based artificial intelligence tools. The main focus of the paper is on visual data mining applications for enhancing business decisions. The software based system is implemented...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A Survey on Preventing Jamming Attacks in Wireless Communication

    Communication in wireless network is possible with an air medium. Due to the high security threats in this system, the network may face various difficulties. One of the major threats is jamming attack which comes under Denial Of Service (DOS) attack. Jamming attack is common among many exploits that compromises...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Test Case Generation Based on Activity Diagram for Mobile Application

    Testing impacts the popularity of any software and hardware products. If proper testing of any product is done it will increase the cost and sale of the product. Mobiles are widely used electronic device there are several mobile companies established which provide variety of applications and features. It is obvious...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Network Security Using Firewall and Cryptographic Authentication

    The network Security is the hottest topic in the current research scenario. The information security is really threatened by obnoxious users. With increasing vulnerabilities, caused by port scan attacks, replay attacks and predominantly IP Spoofing, targeting services, the network behavior is getting malevolent. But there is a lack of any...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Box-Office Opening Prediction of Movies Based on Hype Analysis Through Data Mining

    Box-office performance of a movie is mainly determined by the amount the movie collects in the opening weekend and Pre-Release hype is an important factor as far as estimating the openings of the movie are concerned. This can be estimated through user opinions expressed online on sites such as Twitter...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Graph Neural Network for Minimum Dominating Set

    The dominating set concept in graphs has been used in many applications. In large graphs finding the minimum dominating set is difficult. The minimum dominating set problem in graphs seek a set D of minimum number of vertices such that each vertex of the graph is either in D or...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    A Stream Cipher Algorithm Based on Nonlinear Combination Generator with Enhanced Security for Image Encryption

    This paper describes a novel approach for image encryption using stream cipher algorithm based on non linear combination generator. This work aims to enhance the security of encrypted image. The work is based on the use of several linear feedback shifts registers whose feedback polynomials are primitive and of degrees...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Artificial Neural Network Modelling of Traffic Noise in Agra-Firozabad Highway

    The noise is a major environmental hazard at present. It causes hearing problem, tinnitus, high blood pressure, mental depression, heart palpitation etc. Noise is a usual problem everywhere and involves high health risk, but in today's fast life the authors ignore its harmful consequences and it results in high health...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Network Connectivity Based Topology Control for Mobile Ad Hoc Networks

    Energy consumption and network connectivity are two of the important research issues that are yet to be resolved in Mobile Ad-hoc NETworks (MANETs). However, only a few topology control methods (e.g.) take into account the low interference as a goal of the methods. Some researchers tried to indirectly reduce the...

    Provided By International Journal of Computer Applications