International Journal of Computer Science Issues
Displaying 1-40 of 619 results
-
A New Robust Cryptography Algorithm Based on Symmetric Key to Prevent Unauthorized Access to Contents of Encrypted Files
Cryptography has specific role to protect secret file from unauthorized access. Cryptography algorithms are classified in to two types. Symmetric-key producing and Public-key producing algorithms. In ...
Provided By International Journal of Computer Science Issues
-
Graphical Password Authentication Schemes: Current Status and Key Issues
Authentication is one the most important security primitive. Password authentication is most widely used authentication mechanism. Users generally use characters as passwords but text-based passwords ...
Provided By International Journal of Computer Science Issues
-
General Approach for the Conservation Energy in Wireless Sensor Networks
The Wireless Sensor Networks (WSN) typically consists of a large number of intelligent sensor nodes randomly deployed in an area of interest to supervise or monitor various phenomena (temperature, pre...
Provided By International Journal of Computer Science Issues
-
Improved Mobile WiMax Image Privacy Using Novel Encryption Techniques
Mobile WiMAX security standards from IEEE specify some powerful standards-based security controls, including PKMv2 EAP-based authentication and over-the-air AES-based encryption. But encryption techni...
Provided By International Journal of Computer Science Issues
-
Wimax Capacity Estimation through Different Channel Characteristic
In this paper, the authors study the factors influencing system bandwidth capacity in IEEE 802.16e networks. Additionally, they investigate and evaluate the system capacity of 802.16j in order to unde...
Provided By International Journal of Computer Science Issues
-
UML Modeling for General Educational Services in KSA integrated with GIS
In this paper, the authors has approached the distribution and planning of the educational services in Kingdom of Saudi Arabia (KSA) Governorate. This study is of importance since it dealt with one of...
Provided By International Journal of Computer Science Issues
-
Proposal to Enhance AntNet Routing Algorithm by Exploiting Association Rules as Analysis Tool
In this paper, the authors introduce a proposal to enhance routing in internetworking depending on Ant Colony Optimization (ACO). The proposal concentrate on truth said: ACO itself is a metaheuristic,...
Provided By International Journal of Computer Science Issues
-
Failure Detection and Recovery in Hierarchical Network Using FTN Approach
In current scenario several commercial and social organizations are using computer networks for their business and management purposes. In order to meet the business requirements networks are also gro...
Provided By International Journal of Computer Science Issues
-
Multi-Objective Particle Swarm Optimization for Facility Location Problem in Wireless Mesh Networks
Wireless Mesh Networks have seen a real progress due of their implementation at a low cost. They present one of Next Generation Networks technologies and can serve as home, companies and universities ...
Provided By International Journal of Computer Science Issues
-
Performance Analysis of ST, SF and STF in MIMO-OFDM Technique
In this paper, with the advent of next generation (4G) broadband wireless communications, the combination of Multiple-Input Multiple-Output (MIMO) wireless technology with Orthogonal Frequency Divisio...
Provided By International Journal of Computer Science Issues
-
Analysis of Modified Cooperative Transmission Routing Protocol in MANET
The major problems faced by wireless communication in real time environment are that of interference and un-reliable communication links. A lot of research work has been done to overcome this using va...
Provided By International Journal of Computer Science Issues
-
A Symbol-Based Estimation Technique for Inter-vehicular Communication Performance Optimization
The aim of this paper is to enhance the quality of Orthogonal Frequency Division Multiplexing (OFDM) estimation in dedicated vehicular communication transmission V2X networks. Wireless Access in Vehic...
Provided By International Journal of Computer Science Issues
-
Performance Analysis of Variable Energy Levels of Clustering Protocols for Wireless Sensor Network
Wireless Sensor Network (WSN) is a large network which is consist of huge number of sensor nodes and these nodes are directly interacting with their environment by sensing the physical parameters such...
Provided By International Journal of Computer Science Issues
-
Cognitive Sensor Techniques to Face Security Challenges in CWSN
Cognitive radio has emerged as the key technology to address efficient spectrum utilization challenge according to the increasing demand for wireless communication. Cognitive Wireless Sensor Networks ...
Provided By International Journal of Computer Science Issues
-
Managing Vulnerabilities in a Networked System
Intrusion Detection Systems are not easily constructed or maintained due to the almost daily evolution of network traffic and known exploits. The research in this paper evaluates it through analysis o...
Provided By International Journal of Computer Science Issues
-
An End-to-End Secure Mail System Based on Certificateless Cryptography in the Standard Security Model
Most of the existing mailing systems provide limited authentication mechanisms, including web trust model, password authentication or identity based cryptography. Few existing mailing systems found in...
Provided By International Journal of Computer Science Issues
-
Building a Cloud Storage Encryption (CSE) Architecture for Enhancing Cloud Security
Cloud computing is one of the most important way that allow users to share distributed resources now a days. Also it is more complex in nature and results in many security-related issues. Overall data...
Provided By International Journal of Computer Science Issues
-
Effect of the MMF Curvature in the System Capacity of an Optical MIMO Channel Using MGDM Technique
Due to its enormous bandwidth, Multi-Mode Fiber (MMF) seems the only medium able to offer a broadband multiservice system using Mode Group Diversity Multiplexing (MGDM) technique. As an Optical Multip...
Provided By International Journal of Computer Science Issues
-
Dynamic Matrices from Hardware Fingerprint and Its Application in Software Copyright Protection
Software copyright piracy can be a worldwide sticky question. This encourages vendors to develop various methods against it. In general, the concept of software includes all kinds of electronic docume...
Provided By International Journal of Computer Science Issues
-
A New Secure Geographical Routing Protocol Based on Location Pairwise Keys in Wireless Sensor Networks
Geographical and Energy Aware Routing (GEAR) is an efficient routing protocol in Wireless Sensor Networks (WSN). It behaves well in the face of routing attacks, but it is incapable of defending bogus ...
Provided By International Journal of Computer Science Issues
-
Performance Comparison of MIMO Systems over AWGN and Rician Channels using OSTBC3 with Zero Forcing Receivers
Multiple-Input Multiple-Output (MIMO) wireless antenna systems are being recognized as a key technology for future wireless communications. In the present wireless systems, high data rates can be achi...
Provided By International Journal of Computer Science Issues
-
A New Scheme Based Biometric to Protect Location Privacy in Wireless Body Area Networks
The Wireless Body Area Network (WBAN) has emerged as a new technology for e-healthcare that allows real time monitoring of patients using small wearable and/or implantable sensors. The latest collect ...
Provided By International Journal of Computer Science Issues
-
Model Based Testing of Datawarehouse
Testing forms a major part of development lifecycle of a software system. Testing is responsible for ensuring software product meets intended quality of software systems. Large percentage of failure o...
Provided By International Journal of Computer Science Issues
-
An Improved AES Masking Method Smartcard Implementation for Resisting DPA Attacks
Currently, side-channel analysis has become a hotspot of cryptographic analyses. Different from conventional cryptographic security analyses, side-channel analyses monitors the changes in the electron...
Provided By International Journal of Computer Science Issues
-
An Efficient Trojan Horse Classification (ETC)
For the past few years, malware or also known as malicious code is seen as one of the biggest threats of the cyber attacks. It has caused lot of damages, loss of money and productivity to many organiz...
Provided By International Journal of Computer Science Issues
-
New DTN Routing Algorithm
Routing in Delay Tolerant Networks is currently considered as one of the most attracting research areas. While several efforts have led to the introduction of different routing protocols for Delay Tol...
Provided By International Journal of Computer Science Issues
-
A SMS Based Security Providing for an Email ID by Creating an Email Server
Email is a method of exchanging digital messages from an author to one or more recipients. Email communication is responsible for spreading the majority of virtual infections and poses one of the grea...
Provided By International Journal of Computer Science Issues
-
Infrastructure Independent Mobility Support for Multiple Mobile Routers Multihomed NEMO Networks
The performances of the handover through the heterogeneous networks play a crucial role for OoS-sensitive applications and real-time services. Although, NEMO BS protocol has the merit to allow today t...
Provided By International Journal of Computer Science Issues
-
A Tool for DataWarehouse Multidimensional Schema Design using Ontology
The data warehouse has become a necessary component for an effective analysis of large businesses. It is widely accepted that the data warehouse must be structured according to the multidimensional mo...
Provided By International Journal of Computer Science Issues
-
Communication and Control in Home Gateway
In this paper, the authors introduce the design of home gateway communication control part, including the network interface circuit, network interface driver, Client/Server (C/S) mode of communication...
Provided By International Journal of Computer Science Issues
-
A Proposed SOAP Model Against Wrapping Attacks and Insecure Conversation
The web services in SOA are under the heterogeneous ownership domains, there should be a uniform means to offer, discover and interact with each other. Ensuring interoperatability among the web servic...
Provided By International Journal of Computer Science Issues
-
Larg Band Ridged Waveguide Polarizer as Feed for Telecommunications Satellites Antennas
For the transmission in high power in the systems of telecommunications Satellite; the systems in technology guides wave are best placed. The current progress recorded in the field of telecommunicatio...
Provided By International Journal of Computer Science Issues
-
The Development of Android Software and Kernel Files by Using Example of Wi-Fi Adaptor
The embedded systems such as smart phone, tablet, pocket or pad personal computers and driving navigator, etc. are very popular now. The Operating System (OS) of embedded system should be reduced size...
Provided By International Journal of Computer Science Issues
-
FEA-OLSR: An Adaptive Energy Aware Routing Protocol for MANETs Using Zero-Order Sugeno Fuzzy System
Optimized Link State Routing (OLSR) is a standard proactive routing protocol for Mobile Ad-hoc NETworks (MANETs). In this paper, the authors use a zero-order Sugeno Fuzzy Logic System (FLS) for adjust...
Provided By International Journal of Computer Science Issues
-
Modified TCP Protocol for Wireless Sensor Networks
The transport layer's protocols have been used in the Wireless Sensor Networks (WSNs) in order to achieve data reliability. However, the limitations of the WSNs did not usually considered when impleme...
Provided By International Journal of Computer Science Issues
-
QR Code Application for Water Meter Recorder Based on Windows Mobile Platform
Now-a-days, the advancement of Smartphone technology is rapidly moving forward. Several applications in Smartphone were invented which aim to simplify and accelerate the process compared to the manual...
Provided By International Journal of Computer Science Issues
-
Energy Aware Adaptive Image Transmission Scheme with Data Authentication in Wireless Sensor Networks
Wireless Multimedia Sensor Networks (WMSNs) are gaining research interest due to the availability of low-cost cameras and CMOS image sensors, also due to their broad application opportunities. The ene...
Provided By International Journal of Computer Science Issues
-
Secure and Effective P2P Reputation System using Trust Management and Self Certified Cryptographic Exchanges
The main reason behind the success of Peer-To-Peer (P2P) networks is the anonymity and the utility offered by them to the users. The Client-server security policies implemented in centralized distribu...
Provided By International Journal of Computer Science Issues
-
An Autonomic Intrusion Detection Model With Multi-Attribute Auction Mechanism
In this paper, the authors present an innovative intrusion detection model based on autonomic computing to extend the passive detection mechanism in a traditional Intrusion Detection System (IDS). Cen...
Provided By International Journal of Computer Science Issues
-
Framework Design of Secure Cloud Transmission Protocol
Cloud computing technologies are in high demand because of several benefits. Many business organizations are looking into cloud computing services to reduce the cost and complexity of their business i...
Provided By International Journal of Computer Science Issues
-
3D Media over Future Internet: Current Status and Future Research Directions
Future Media Internet has been designed to overcome current limitations and address emerging trends including: network architecture, content and service delivery across heterogeneous networks, diffusi...
Provided By International Journal of Computer Science Issues
-
A New Approach to the Data Aggregation in Wireless Sensor Network
Several algorithms have been developed for problems of data aggregation in wireless sensor networks, all of which tried to increase networks lifetime. In this paper, the authors deal with this problem...
Provided By International Journal of Computer Science Issues
-
Mobile Agent Based Hierarchical Intrusion Detection System in Wireless Sensor Networks
Security mechanism is a fundamental requirement of wireless networks in general and Wireless Sensor Networks (WSN) in particular. Therefore, it is necessary that this security concern must be articula...
Provided By International Journal of Computer Science Issues
-
An Enhanced Backoff Method used between Mobiles Moving in Industrial 802.11
The purpose of this paper is to discuss the exchanges between mobiles moving in an industrial environment. To reach this study, a simulation approach has been chosen to be used. The selection of relev...
Provided By International Journal of Computer Science Issues
-
Gossip Based Routing Protocol Design for Ad Hoc Networks
A spontaneously mannered decentralized network with no formal infrastructure and limited in temporal and spatial extent where each node communicate with each other over a wireless channel and is willi...
Provided By International Journal of Computer Science Issues
-
An Overview of Applications, Standards and Challenges in Futuristic Wireless Body Area Networks
Recent technical advancements in low-power integrated circuits, ultra low-power RF (Radio Frequency) technology, wireless communications and micro sensors allowed the realization of Wireless Body Area...
Provided By International Journal of Computer Science Issues
-
A Novel Problem-solvingMetric for Future Internet Routing Based on Virtualization and Cloud-computing
The Internet has evolved from an academic network to a broad commercial platform and become an integral and indispensable part of their daily life, economic operation, and society over forty years. Ho...
Provided By International Journal of Computer Science Issues
-
Conceptualizing of Social Networking Sites
People often move to their friends, families and colleagues when they feel urge and having doubts or queries to solve. Participation in social networking site has dramatically increased in recent year...
Provided By International Journal of Computer Science Issues
-
Improve Downlink Burst Allocation to Achieve High Frame Utilization of Mobile WiMAX (802.16e)
The burst allocation algorithm is responsible about calculating the appropriate dimensions and location of each user's data to construct the bursts in the downlink subframe in term of the number of sl...
Provided By International Journal of Computer Science Issues
-
Service Priority based Reliable Routing Path Select Method in Smart Grid Communication Network
The new challenges and schemes for the Smart Grid require high reliable transmission technologies to support various types of electrical services and applications. This paper concentrates the degree o...
Provided By International Journal of Computer Science Issues
-
Novel Fast Encryption Algorithms for Multimedia Transmission over Mobile WiMax Networks
Security support is mandatory for any communication networks. For wireless systems, security support is even more important to protect the users as well as the network. Since wireless medium is availa...
Provided By International Journal of Computer Science Issues
-
A Framework for Optimizing IP over Ethernet Naming System
Due to the rapid expansion of the technology field. Developing the Internet has become more urgent to meet the needs of the expansion. TCP/IP is the most protocol used in the Internet. It consists fro...
Provided By International Journal of Computer Science Issues
-
Enhanced Fractional Frequency Reuse (EFFR) Technique in WiMAX Cellular Network
WiMAX is a broad band high speed wireless communication system which use cellular network topology to deploy services to different subscribers. One of the major problems of deploying WiMAX base statio...
Provided By International Journal of Computer Science Issues
-
Secure Routing in Wireless Sensor Networks
Wireless sensor networks is the new concept in the field of networks consists of small, large number of sensing nodes which is having the sensing, computational and transmission power. Due to lack of ...
Provided By International Journal of Computer Science Issues
-
Improving Internet Quality of Service through Active Queue Management in Routers
The traffic characteristics of real-time and non real-time applications require a certain Quality of Service (QoS) from the Internet in terms of bandwidth, delay, packet loss, fairness and jitter. How...
Provided By International Journal of Computer Science Issues
-
Fault Tolerance-Challenges, Techniques and Implementation in Cloud Computing
Fault tolerance is a major concern to guarantee availability and reliability of critical services as well as application execution. In order to minimize failure impact on the system and application ex...
Provided By International Journal of Computer Science Issues
-
IPTV-Internet Protocol Televisions Key Broadcast Building Blocks
Telcos, in pursuit of the triple play (voice, video, and data), are investing heavily to compete with the cable companies in providing quality video content to the consumer. However, most telco infras...
Provided By International Journal of Computer Science Issues
-
Energy Efficient Routing in Mobile Adhoc Networks based on AODV Protocol
Mobile Ad hoc NETworks (MANETs) suffer from power exhaustion as many nodes use batteries as their source. Energy consumption is one of the most important system design optimization criterion in MANETs...
Provided By International Journal of Computer Science Issues
-
Study and Optimization of Cooperative Spectrum Sensing in OFDM Cognitive Radio Networks
In this paper, a cooperative sensing algorithm for OFDM is proposed in this paper based on the performance analysis of ONPD algorithm, then the system weight vector is optimized and the closed form ex...
Provided By International Journal of Computer Science Issues
-
Towards a Next Generation of Scientific Computing in the Cloud
More than ever, designing new types of highly scalable data intensive computing is needed to qualify the new generation of scientific computing and analytics effectively perform complex tasks on massi...
Provided By International Journal of Computer Science Issues
-
Performance of Network Coding Based Multipath Routing in Wireless Sensor Networks
In recent times, there have been many advances in the field of information theory and Wireless Sensor Network (WSN) technologies. Network coding is a new paradigm in data transport and promises to cha...
Provided By International Journal of Computer Science Issues
-
The Research on an Algorithm of Three-Dimensional Topology Control of Wireless Sensor Network
Nowadays, the research about three-dimensional topology control has focused on ensuring the connectivity of the networks, and has seldom considered the balance between neighbor node degree and energy ...
Provided By International Journal of Computer Science Issues
-
Middleware approaches for Wireless Sensor Networks: An overview
Wireless Sensor Networks (WSN) has become highly attractive to researchers and industries due to its wide range of applications. Middleware is a distributed software that tries to provide a common pla...
Provided By International Journal of Computer Science Issues
-
An Efficient Encryption Algorithm for P2P Networks Robust Against Man-in-the-Middle Adversary
Peer-to-Peer (P2P) networks have become popular as a new paradigm for information exchange and are being used in many applications such as file sharing, distributed computing, video conference, VoIP, ...
Provided By International Journal of Computer Science Issues
-
On Reliability Modeling in Wireless Sensor Networks-A Review
This paper presents a survey on existing reliability models in Wireless Sensor Networks (WSNs). Most of the existing mechanisms employ retransmissions, ignoring redundancy schemes and moreover no atte...
Provided By International Journal of Computer Science Issues
-
Performance and Comparison of Multi-Hop Ad-Hoc Routing Protocols ? Quantitative Study
Wireless Ad-hoc network is emerging network and form temporary networks. Due to its spontaneous nature the topology is frequently changes. Protocols selection and set up routing between any pair of no...
Provided By International Journal of Computer Science Issues
-
A Web Services based Approach for Resource-Constrained Wireless Sensor Networks
The large diffusion of Wireless Sensor Networks (WSNs) in the people contemporary life with their numerous applications has led to a huge heterogeneity. This heterogeneity makes the possibility of dis...
Provided By International Journal of Computer Science Issues
-
MuMoCo : a Framework for Improving Data Quality with Multiple Modalities Cooperation in Wireless Sensor Networks
High quality sensor data stream is crucial to wireless sensor networks applications. However raw data streams in wireless sensor networks tend to be not reliable. Therefore, improving sensor data qual...
Provided By International Journal of Computer Science Issues
-
A Review on Node Deployment of Wireless Sensor Network
Wireless Sensor Network (WSN) is nowadays being applied in many different civilian applications like vehicle tracking, habitat monitoring, forest surveillance, earthquake observation, biomedical or he...
Provided By International Journal of Computer Science Issues
-
Prediction based Link Stability Scheme for Mobile Ad Hoc Networks
Mobile Ad Hoc NETworks (MANETs) consist of mobile nodes which are not controlled by any base station. Mobile nodes act as a major role because of performing the data transmission, route discovery, rou...
Provided By International Journal of Computer Science Issues
-
Precedence Based Preemption and Bandwidth Reservation Scheme in MANET
Infrastructures less mobile networks are commonly known as Mobile Ad Hoc NETworks (MANET). Quality of Service (QOS) constraints is highly required for multimedia communications with MANET. Providing Q...
Provided By International Journal of Computer Science Issues
-
Agent Virus of Cooperation (Avicoop): an Intelligent Model of Cooperation and Collaboration Based on the MAS for Data Exchange in Ad hoc Network
The authors propose in this paper a response to the problem of cooperation and collaboration between nodes in a Mobile Ad hoc NETwork (MANET) for intelligent data relays from one source to a destinati...
Provided By International Journal of Computer Science Issues
-
Performance Analysis of VoIP Codecs over WiMAX Networks
Real-time services such as VoIP are becoming popular and are major revenue earners for network service providers. These services no longer confined to the wired domain and extended over wireless netwo...
Provided By International Journal of Computer Science Issues
-
Wifi-based Indoor Navigation with Mobile GIS and Speech Recognition
As the development of mobile communications and wireless networking technology and people's increasing demand for wireless location services, positioning services are more and more important and becom...
Provided By International Journal of Computer Science Issues
-
Performance Analysis of Scheduling Algorithms For VoIP Services in IEEE 802.16 Systems
VoIP applications are being widely used in today's networks challenging their capabilities to provide a good quality of experience level to the users. In particular, there are several scheduling algor...
Provided By International Journal of Computer Science Issues
-
Using Modified Partitioning Around Medoids Clustering Technique in Mobile Network Planning
Optimization mobile radio network planning is a very complex task, as many aspects must be taken into account. Deciding upon the optimum placement for the Base Stations (BS's) to achieve best services...
Provided By International Journal of Computer Science Issues
-
A New Robust Cryptography Algorithm Based on Symmetric Key to Prevent Unauthorized Access to Contents of Encrypted Files
Cryptography has specific role to protect secret file from unauthorized access. Cryptography algorithms are classified in to two types. Symmetric-key producing and Public-key producing algorithms. In ...
Provided By International Journal of Computer Science Issues
-
Graphical Password Authentication Schemes: Current Status and Key Issues
Authentication is one the most important security primitive. Password authentication is most widely used authentication mechanism. Users generally use characters as passwords but text-based passwords ...
Provided By International Journal of Computer Science Issues
-
Multiple Parameters Based Approach to Estimate Band Width in Mobile Ad Hoc Networks
Mobile Ad-hoc NETwork (MANET) is a self-organized network where network is set up on the fly. Some of the issues in MANETs are routing, security, power management, bandwidth management, mobility manag...
Provided By International Journal of Computer Science Issues
-
Performance Analysis of Multicast Routing and Wavelength Assignment (MRWA) Protocol with Dynamic Traffic Grooming in WDM Networks
The need for on-demand provisioning of wavelength routed channels with service differentiated offerings within the transport layer has become more essential due to the recent emergence of high bit rat...
Provided By International Journal of Computer Science Issues