This article presents an extensive literature review of the empirical studies carried out in past for evaluation and selection of components during the design phase of Component Based Software Systems (CBSS). In CBSS approach the software systems can be developed by selecting appropriate components which then are assembled to form a complete software system. These Components can be eithe...
Paper Information
Authors Vikram Bali, Sushila Madan
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 8

Supporting multimedia application over wireless networks poses multiple challenges. Currently the use of cross layer architectures and Scalable Video Coding ( ) techniques are considered to support multimedia applications. The current architectures fail to address the tradeoff that exists between the end to end delay and the Quality of Service ( ) provisioning of the video data to be del...
Paper Information
Authors Vijayalakshmi M, Linganagouda Kulkarni
Read Journal Click Here
Read Paper Click Here
Page No. 21 to 31

Network Security has a major role in the development of data communication system, where more randomization in the secret keys increases the security as well as the complexity of the cryptography algorithms. In the recent years network security has become an important issue. Cryptography has come up as a solution which plays a vital role in the information security system against various...
Paper Information
Authors Shraddha More, Mr.Rajesh Bansode
Read Journal Click Here
Read Paper Click Here
Page No. 11 to 20

Fractal Image Compression (FIC) is a state of the art technique used for high compression ratio. But it lacks behind in its encoding time requirements. In this method an image is divided into non-overlapping range blocks and overlapping domain blocks. The total number of domain blocks is larger than the range blocks. Similarly the sizes of the domain blocks are twice larger than the rang...
Paper Information
Authors Swalpa Kumar Roy, Samir Kumar Bandyopadhay, Debnath Bhattacharyya, Tai-Hoon Kim
Read Journal Click Here
Read Paper Click Here
Page No. 9 to 20

Mobile ad hoc networks is the future wireless communication systems have recently emerged as an important trend. Mobile adhoc network is self-configurable and adaptive. Due to the mobility of nodes, the network congestion occurs and it is difficult to predict load on the network which leads to congestion. Mobile adhoc network suffers from a severe congestion controlling problem due to th...
Paper Information
Authors Govardhan Reddy Kamatam, Podili V S Srinivas , Chandra Sekharaiah K
Read Journal Click Here
Read Paper Click Here
Page No. 17 to 23

The need for adequate attention to security of lives and properties cannot be over-emphasised. Existing approaches to security management by various agencies and sectors have focused on the use of possession (card, token) and knowledge (password, username)-based strategies which are susceptible to forgetfulness, damage, loss, theft, forgery and other activities of fraudsters. The surest ...
Paper Information
Authors Iwasokun G. B. , Udoh S. S., Akinyokun O. K.
Read Journal Click Here
Read Paper Click Here
Page No. 15 to 28

This paper presents a review of data mining techniques for the fraud detection. Development of information systems such as data due to it has become a source of important organizations. Method and techniques are required for efficient access to data, sharing the data, extracting information from data and using this information. In recent years, data mining technology is an important meth...
Paper Information
Authors Sevda Soltaniziba, Mohammad Ali Balafar
Read Journal Click Here
Read Paper Click Here
Page No. 37 to 45

Wireless ad hoc network nodes together establish a network infrastructure without using any access points or base stations for communicates using multi hop schemes. It has significant characteristics like dynamic topologies, constrained in bandwidth and limited resource a high challenge in implementing security with optimized energy resource utilization which is the key aspects while des...
Paper Information
Authors D V Srihari Babu, Dr. P Chandrashekhar Reddy
Read Journal Click Here
Read Paper Click Here
Page No. 9 to 15

Software testing starts with verification and validation and fulfills the requirement of the customer. Testing can be done by automation tool like Win runner, QTP or manually. If we talk about manual testing it takes lot of time and manpower also so nowadays we are using automation software. When we talk about automation testing so the cost of such kind of testing is very high so each co...
Paper Information
Authors Dr. Manjeet Kumar, Dr. Rabins Porwal
Read Journal Click Here
Read Paper Click Here
Page No. 9 to 13

Manet is a collection of self-organizing mobile nodes participating in the network to forward packets for each other. However, some nodes in the network do not forward packets in order to save their energy. But these nodes make use of other nodes to forward their packets. Such unfair use of the network leads to degradation of its performance. So it is very important to detect such misbeh...
Paper Information
Authors Shaheen Bohra, Naveen Choudhary
Read Journal Click Here
Read Paper Click Here
Page No. 17 to 23