Computer Science Journals

Displaying 1-40 of 104 results

  • White Papers // Mar 2015

    Storage Virtualization: Towards an Efficient and Scalable Framework

    Enterprises in the corporate world demand high speed data protection for all kinds of data. Issues such as complex server environments with high administrative costs and low data protection have to be resolved. In addition to data protection, enterprises demand the ability to recover/restore critical information in various situations. Traditional...

    Provided By Computer Science Journals

  • White Papers // Mar 2015

    Location Based Services in M-Commerce: Customer Trust and Transaction Security Issues

    It is understood by studies that wireless data services is crucial for users to access location based services. As in location-dependent services, the data value for a data item depends on geographical locations. In general, the location based services includes the services to identify the location of a person or...

    Provided By Computer Science Journals

  • White Papers // Mar 2015

    Big Data Analytics on Customer Behaviors with Kinect Sensor Network

    In modern enterprises, customer data is valuable for identifying their behavioral patterns and developing marketing strategies that can align with the preferences of different customers. This paper is to develop a framework that promotes the use of Kinect sensors for big data analytics on customer behavior analysis. Kinect enables 3D...

    Provided By Computer Science Journals

  • White Papers // Dec 2014

    An Optimal Approach for Knowledge Protection in Structured Frequent Patterns

    Data mining is valuable technology to facilitate the extraction of useful patterns and trends from large volume of data. When these patterns are to be shared in a collaborative environment, they must be protectively shared among the parties concerned in order to preserve the confidentiality of the sensitive data. Sharing...

    Provided By Computer Science Journals

  • White Papers // Nov 2014

    Multi Robot User Interface Design Based on HCI Principles

    Robot User Interface (RUI) refers to a specialized User Interface (UI) that intrinsically supplements the virtual access phenomenon of human operators with robots working in complex and challenging scenarios such as rescue missions. The very nature of complexity and attributed information overload can potentially cause significant threat to survivor's life...

    Provided By Computer Science Journals

  • White Papers // Oct 2014

    Improved Slicing Algorithm for Greater Utility in Privacy Preserving Data Publishing

    Several algorithms and techniques have been proposed in recent years for the publication of sensitive micro-data. However, there is a trade-off to be considered between the level of privacy offered and the usefulness of the published data. Recently, slicing was proposed as a novel technique for increasing the utility of...

    Provided By Computer Science Journals

  • White Papers // Sep 2014

    Farthest Neighbor Approach for Finding Initial Centroids in K-Means

    Text document clustering is gaining popularity in the knowledge discovery field for effectively navigating, browsing and organizing large amounts of textual information into a small number of meaningful clusters. Text mining is a semi-automated process of extracting knowledge from voluminous unstructured data. A widely studied data mining problem in the...

    Provided By Computer Science Journals

  • White Papers // Sep 2014

    A Review of Agent-Oriented Development Methodologies and Programming Languages/Frameworks

    Agents are software systems and can be associated with an entity, framework, architecture and even languages. They are piece of program codes that are able to autonomously complete tasks. Before developing an agent, methodology to be used in development should be clarified and based on the methodology, suitable programming language...

    Provided By Computer Science Journals

  • White Papers // Sep 2014

    Banking and Modern Payments System Security Analysis

    Cyber-criminals have benefited from Online Banking (OB), regardless of the extensive research on financial cyber-security. To better be prepared for what the future might bring, the authors try to predict how hacking tools might evolve. They briefly survey the state-of-the-art tools developed by blackhat hackers and conclude that they could...

    Provided By Computer Science Journals

  • White Papers // Aug 2014

    Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology

    In recent years, global Online Social Network (OSN) usage has increased sharply as these networks become interwoven into people's everyday lives as places to meet and communicate with others. Social networks can offer many services to the users for sharing activities events and their ideas. Many attacks can happen to...

    Provided By Computer Science Journals

  • White Papers // Aug 2014

    Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit Detection

    Since its introduction in 1994 the Secure Socket Layer (SSL) protocol (later renamed to Transport Layer Security (TLS)) evolved to the de facto standard for securing the transport layer. SSL/TLS can be used for ensuring data confidentiality, integrity and authenticity during transport. A main feature of the protocol is its...

    Provided By Computer Science Journals

  • White Papers // Aug 2014

    PI-Tool To Improve Performance of Application In Multi-core Architecture

    Multi-core CPUs become increasingly popular on server-grade hardware as well as end-user desktop PCs or laptops. Necessary efforts are taken in the community towards developing applications optimized for multi-core architecture; still every user is expecting to run applications or programs with more speed than normal execution. In order to achieve...

    Provided By Computer Science Journals

  • White Papers // Jun 2014

    Using GIS in Designing and Deploying Wireless Network in City Plans

    Site surveys play a very important role in the successful and efficient deployment of wireless networks. The first step is to understand the basic goal of a wireless network, which is mainly to provide an appropriate coverage and throughput to all end users with high efficiency, full coverage and reasonable...

    Provided By Computer Science Journals

  • White Papers // Jun 2014

    Secure Linear Transformation Based Cryptosystem Using Dynamic Byte Substitution

    The information must be secure while transmission. Cryptography is one of the methods to attain security. Many classical cryptosystems are developed based on simple substitution. Hybrid cryptosystem using byte substitution and variable length sub key groups is a simple nonlinear algorithm but the cryptanalyst can find the length of each...

    Provided By Computer Science Journals

  • White Papers // Jun 2014

    Designing An Effective Mobile-learning Model By Integrating Student Culture

    Mobile learning is a good technology because it allows communication, collaboration, and sharing information or resources among all of learning members. Mobile learning can be used as perfect solutions to support the learning process. Thither are many concepts and factors influencing effective learning results through creativity, collaboration, and communication. However,...

    Provided By Computer Science Journals

  • White Papers // Jun 2014

    Design And Evaluation of Time Slot Assignment Algorithm For IEEE 802.16j Relay Networks

    In IEEE 802.16j relay networks, wireless communications are carried out based on TDMA where the wireless network resources are divided into multiple time slots and they are assigned to wireless links between relay nodes as transmission opportunities. The network performance is improved by decreasing the total number of different time...

    Provided By Computer Science Journals

  • White Papers // May 2014

    A Review of RUP (Rational Unified Process)

    RUP (Rational Unified Process) is an iterative process for software development; originally proposed in 1988 as the rational objectory process. The researcher then proposed the unified process. The rational unified process can also be regarded as a software engineering process, delivered through a web-enabled, searchable knowledge base. This paper represents...

    Provided By Computer Science Journals

  • White Papers // May 2014

    DNS Advanced Attacks and Analysis

    Now-a-days DNS is used to load balance, failover, and geographically redirect connections. DNS has become so pervasive it is hard to identify a modern TCP/IP connection that does not use DNS in some way. Unfortunately, due to the reliability built into the fundamental RFC-based design of DNS, most IT professionals...

    Provided By Computer Science Journals

  • White Papers // May 2014

    Image Processing Application on Graphics processors

    In this paper, the authors introduce real time image processing techniques using modern programmable Graphic Processing Units (GPUs). GPU are SIMD (Single Instruction, Multiple Data) device that is inherently data-parallel. By utilizing NVIDIA new GPU programming framework, "Compute Unified Device Architecture" (CUDA) as a computational resource, they realize significant acceleration...

    Provided By Computer Science Journals

  • White Papers // May 2014

    A Comparative Study: Gammachirp Wavelets and Auditory Filter Using Prosodic Features of Speech Recognition In Noisy Environment

    Modern Automatic Speech Recognition (ASR) systems typically use a bank of linear filters as the first step in performing frequency analysis of speech. On the other hand, the cochlea, which is responsible for frequency analysis in the human auditory system, is known to have a compressive non-linear frequency response which...

    Provided By Computer Science Journals

  • White Papers // May 2014

    Shared Spectrum Throughput for Secondary Users

    The throughput performance of secondary users sharing radio spectrum with a licensed primary user is analyzed in this paper. An asynchronous transmission, sensing and backoff protocol is proposed for the secondary user and modeled as a six state Markov process. The model parameters are derived as a function of the...

    Provided By Computer Science Journals

  • White Papers // Mar 2014

    SIP-Based Mobility Management for LTE-WiMAX-WLAN Interworking Using IMS Architecture

    In this paper, the authors propose an architecture framework for interworking of Long Term Evolution (LTE), Worldwide Interoperability for Microwave Access (WiMAX) and Wireless Local Area Network (WLAN) technologies. The aim is to offer users of various networks seamless high quality IP-based multimedia services access anywhere at any time. IP...

    Provided By Computer Science Journals

  • White Papers // Mar 2014

    Password Security

    In this paper, the authors investigate users' behavior in password utilization. Good password practices are critical to the security of any information system. End users often use weak passwords that are short, simple, and based on personal and meaningful information that can be easily guessed. A survey was conducted among...

    Provided By Computer Science Journals

  • White Papers // Feb 2014

    Efficient Coercion Resistant Public Key Encryption

    The notion of deniable encryption has been known in the literature since its introduction in as coercion resistant encryption schemes that allow the user (sender and/or receiver) to escape a coercion attempted by a coercive adversary. The schemes allow the user to open fake message(s) to the coercer that when...

    Provided By Computer Science Journals

  • White Papers // Feb 2014

    E-payment Security Analysis In Depth

    Technology is the basis of the peoples' lives. The growth of the Internet has made it an ease for consumers to find items for purchase, but no longer is cash a viable way for payment. This increase in e-commerce has driven the need to create an online payment system. Unfortunately...

    Provided By Computer Science Journals

  • White Papers // Jan 2014

    Software Process Control on Ungrouped Data: Log-Power Model

    Statistical Process Control (SPC) is the best choice to monitor software reliability process. It assists the software development team to identify and actions to be taken during software failure process and hence, assures better software reliability. In this paper, the authors propose a control mechanism based on the cumulative observations...

    Provided By Computer Science Journals

  • White Papers // Dec 2013

    Aspect Oriented Programming Through C#.NET

    .NET architecture was introduced by Microsoft as a new software development environment based on components. This architecture permits for effortless integration of classical distributed programming paradigms with Web computing. .NET describes a type structure and introduces ideas such as component, objects and interface which form the vital foundation for distributed...

    Provided By Computer Science Journals

  • White Papers // Nov 2013

    Apply Web-Based Analytic Tool and Eye Tracking to Study the Consumer Preferences of DSLR Cameras

    Consumer's preferences and purchase motivation of products often lie in the purchasing behaviors generated by the synthetic evaluation of form features, color, function and price of products. If an enterprise can bring these criteria under control, they can grasp the opportunities in the market place. In this paper, the product...

    Provided By Computer Science Journals

  • White Papers // Oct 2013

    Determining the Barriers Faced by Novice Programmers

    Most of the novice programmers find glitches at various phases while trying to complete a program in their Computer science programming course. These phases can be while constructing the code, finding errors in the code at the time of compilation of the program, debugging these errors while executing the program....

    Provided By Computer Science Journals

  • White Papers // Oct 2013

    Use of Cell Block As An Indent Space In Python

    Unlike most object oriented programming languages, Python does not use braces such as \"{\" and \"}\". Therefore, mixed tabs and spaces are used for indentation. However, they are causing problems in Python. Several approaches are applied to eliminate the problem that is not only for machine-readable form but also for...

    Provided By Computer Science Journals

  • White Papers // Oct 2013

    Review on Sorting Algorithms A Comparative Study

    There are many popular problems in different practical fields of computer sciences, database applications, networks and artificial intelligence. One of these basic operations and problems is sorting algorithm; the sorting problem has attracted a great deal of research. A lot of sorting algorithms has been developed to enhance the performance...

    Provided By Computer Science Journals

  • White Papers // Oct 2013

    Face Images Database Indexing for Person Identification Problem

    Face biometric data are with high dimensional features and hence, traditional searching techniques are not applicable to retrieve them. As a consequence, it is an issue to identify a person with face data from a large pool of face database in real-time. This paper addresses this issue and proposes an...

    Provided By Computer Science Journals

  • White Papers // Sep 2013

    Quality Attributes and Software Architectures Emerging Through Agile Development: Pursuit or Overlooking?

    Software architectures play an important role as an intermediate stage through which system requirements are translated into full scale working system. The idea of what a system does, what it does not, and different concerns and requirements can be negotiated and expressed clearly through the software architecture. Software architectures exist...

    Provided By Computer Science Journals

  • White Papers // Jun 2013

    Malicious Node Detection Mechanism for Wireless Ad Hoc Network

    With the popularity of intelligent electronics which rely on wireless communication in the post-PC era, computing devices have become cheaper, smaller, more mobile and more pervasive in daily lives. Construction of wireless ad hoc network becomes more and more convenient. However, the deployment of sensor nodes in an unattended environment...

    Provided By Computer Science Journals

  • White Papers // Jun 2013

    Multimodal Biometrics at Feature Level Fusion Using Texture Features

    In recent years, fusion of multiple biometric modalities for personal authentication has received considerable attention. This paper presents a feature level fusion algorithm based on texture features. The system combines fingerprint, face and off-line signature. Texture features are extracted from curvelet transform. The curvelet feature dimension is selected based on...

    Provided By Computer Science Journals

  • White Papers // May 2013

    Conceptual Model of Real Time Infrastructure Within Cloud Computing Environment

    Cloud computing is a new and most demandable technology in communication environment. Where computing resources such as hardware or/and software are processed as service over networks. SCADA implementation within cloud environment is relatively new and demandable over real time infrastructure (industrial infrastructure).The shifting (moving) of SCADA system (applications and resources)...

    Provided By Computer Science Journals

  • White Papers // May 2013

    Java Implementation based Heterogeneous Video Sequence Automated Surveillance Monitoring

    Automated video based surveillance monitoring is an essential and computationally challenging task to resolve issues in the secure access localities. This paper deals with some of the issues which are encountered in the integration surveillance monitoring in the real-life circumstances. The authors have employed video frames which are extorted from...

    Provided By Computer Science Journals

  • White Papers // May 2013

    A Method to Provide Accessibility for Visual Components to Vision Impaired

    Non-textual graphical information (line graphs, bar charts, pie charts, etc.) are increasingly pervasive in digital scientific literatures and business reports which enabling readers to easily acquire the nature of the underlying information. These graphical components are commonly used to present data in an easy-to interpret way. Graphs are frequently used...

    Provided By Computer Science Journals

  • White Papers // Apr 2013

    Cryptography and Authentication Placement to Provide Secure Channel for SCADA Communication

    Distributed Control Systems (DCSs) and Supervisory Control And Data Acquisition (SCADA) systems are widely used in real time industry infrastructures such as water pumping stations, gas, and oil and other real time deployments. SCADA implementation within a cloud computing environment is new and beneficial for real time infrastructures. Using cloud...

    Provided By Computer Science Journals

  • White Papers // Mar 2013

    Semantic Based Model for Text Document Clustering with Idioms

    In this paper, the authors address the task of developing an effective and efficient clustering methodology to take care of semantic structure of the text documents. A method has been developed that performs the following sequence of operations: tagging the documents for parsing, replacement of idioms with their original meaning,...

    Provided By Computer Science Journals

  • White Papers // Feb 2010

    Hybrid Compression Encryption Technique for Securing SMS

    Mobile communication devices have become popular tools for gathering and disseminating information and data. When sensitive information is exchanged using SMS, it is crucial to protect the content from eavesdroppers as well as ensuring that the message is sent by a legitimate sender. Using an encryption technique to secure SMS...

    Provided By Computer Science Journals

  • White Papers // Jan 2010

    Integrated DWDM and MIMO-OFDM System for 4G High Capacity Mobile Communication

    Dense Wavelength-Division Multiplexing (DWDM) technique is a very promising data transmission technology for utilizing the capacity of the fiber. By DWDM, multiple signals (video, audio, data etc) staggered in wavelength domain can be multiplexed and transmitted down the same fiber. The Multiple-Input Multiple-Output (MIMO) wireless technology in combination with Orthogonal...

    Provided By Computer Science Journals

  • White Papers // Sep 2010

    Implementation of Artificial Intelligence Techniques for Steady State Security Assessment in Pool Market

    Various techniques have been implemented to include steady state security assessment in the analysis of trading in deregulated power system, however most of these techniques lack requirements of fast computational time with acceptable accuracy. The problem is compounded further by the requirements to consider bus voltages and thermal line limits....

    Provided By Computer Science Journals

  • White Papers // Jan 2010

    A Wavelet - Based Object Watermarking System for MPEG4 Video

    Efficient storage, transmission and use of video information are key requirements in many multimedia applications currently being addressed by MPEG-4. To fulfill these requirements, a new approach for representing video information which relies on an object-based representation, has been adopted. Therefore, object based watermarking schemes are needed for copyright protection....

    Provided By Computer Science Journals

  • White Papers // Jul 2010

    A Robust Approach to Detect and Prevent Network Layer Attacks in MANETS

    A dynamic wireless network that is formed without any pre-existing infrastructure, in which every node can act as a router is called a Mobile Ad hoc NETwork (MANET). Since MANETS has not got clear cut security provisions, it is accessible to any of the authorized network users and malicious attackers....

    Provided By Computer Science Journals

  • White Papers // Oct 2010

    Deploying e-Mail as an Official Communication Tool: Technical Prospect

    Applications are spreading widely through their lives entering every field controlling some of it and enhancing other; electronic mail, or e-mail, is the best known and most popular application of the Internet. More and more people see e-mail as a way to communicate quickly and affordably. Electronic mail can also...

    Provided By Computer Science Journals

  • White Papers // Aug 2010

    New Trust Based Security Method for Mobile Ad-Hoc Networks

    Secure routing is the milestone in mobile ad hoc networks .Ad hoc networks are widely used in military and other scientific areas with nodes which can move arbitrarily and connect to any nodes at will, it is impossible for Ad hoc network to own a fixed infrastructure. It also has...

    Provided By Computer Science Journals

  • White Papers // Jan 2011

    Implementation of New Routing Protocol for Node Security in a Mobile Ad Hoc Network

    A routing protocol plays important role to handle entire network for communication and determines the paths of packets. A node is a part of the defined network for transferring information in form of packets. If all packets are transferred from source to destination successfully, it is assumed that the routing...

    Provided By Computer Science Journals

  • White Papers // May 2013

    Conceptual Model of Real Time Infrastructure Within Cloud Computing Environment

    Cloud computing is a new and most demandable technology in communication environment. Where computing resources such as hardware or/and software are processed as service over networks. SCADA implementation within cloud environment is relatively new and demandable over real time infrastructure (industrial infrastructure).The shifting (moving) of SCADA system (applications and resources)...

    Provided By Computer Science Journals

  • White Papers // Apr 2012

    Rethinking Embedded System Design

    Embedded engineering is designed using objects of nature and it also interacts with nature. Therefore, it is forced to obey the laws of nature. Nature does not make any assumptions. But all their mathematical and scientific theories do. Therefore, these theories cannot be valid for embedded engineering applications. In this...

    Provided By Computer Science Journals

  • White Papers // Aug 2014

    PI-Tool To Improve Performance of Application In Multi-core Architecture

    Multi-core CPUs become increasingly popular on server-grade hardware as well as end-user desktop PCs or laptops. Necessary efforts are taken in the community towards developing applications optimized for multi-core architecture; still every user is expecting to run applications or programs with more speed than normal execution. In order to achieve...

    Provided By Computer Science Journals

  • White Papers // Aug 2014

    Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology

    In recent years, global Online Social Network (OSN) usage has increased sharply as these networks become interwoven into people's everyday lives as places to meet and communicate with others. Social networks can offer many services to the users for sharing activities events and their ideas. Many attacks can happen to...

    Provided By Computer Science Journals

  • White Papers // Aug 2014

    Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit Detection

    Since its introduction in 1994 the Secure Socket Layer (SSL) protocol (later renamed to Transport Layer Security (TLS)) evolved to the de facto standard for securing the transport layer. SSL/TLS can be used for ensuring data confidentiality, integrity and authenticity during transport. A main feature of the protocol is its...

    Provided By Computer Science Journals

  • White Papers // Jun 2014

    Designing An Effective Mobile-learning Model By Integrating Student Culture

    Mobile learning is a good technology because it allows communication, collaboration, and sharing information or resources among all of learning members. Mobile learning can be used as perfect solutions to support the learning process. Thither are many concepts and factors influencing effective learning results through creativity, collaboration, and communication. However,...

    Provided By Computer Science Journals

  • White Papers // May 2014

    A Comparative Study: Gammachirp Wavelets and Auditory Filter Using Prosodic Features of Speech Recognition In Noisy Environment

    Modern Automatic Speech Recognition (ASR) systems typically use a bank of linear filters as the first step in performing frequency analysis of speech. On the other hand, the cochlea, which is responsible for frequency analysis in the human auditory system, is known to have a compressive non-linear frequency response which...

    Provided By Computer Science Journals

  • White Papers // Sep 2014

    Banking and Modern Payments System Security Analysis

    Cyber-criminals have benefited from Online Banking (OB), regardless of the extensive research on financial cyber-security. To better be prepared for what the future might bring, the authors try to predict how hacking tools might evolve. They briefly survey the state-of-the-art tools developed by blackhat hackers and conclude that they could...

    Provided By Computer Science Journals

  • White Papers // May 2014

    DNS Advanced Attacks and Analysis

    Now-a-days DNS is used to load balance, failover, and geographically redirect connections. DNS has become so pervasive it is hard to identify a modern TCP/IP connection that does not use DNS in some way. Unfortunately, due to the reliability built into the fundamental RFC-based design of DNS, most IT professionals...

    Provided By Computer Science Journals

  • White Papers // Feb 2014

    Efficient Coercion Resistant Public Key Encryption

    The notion of deniable encryption has been known in the literature since its introduction in as coercion resistant encryption schemes that allow the user (sender and/or receiver) to escape a coercion attempted by a coercive adversary. The schemes allow the user to open fake message(s) to the coercer that when...

    Provided By Computer Science Journals

  • White Papers // Feb 2014

    E-payment Security Analysis In Depth

    Technology is the basis of the peoples' lives. The growth of the Internet has made it an ease for consumers to find items for purchase, but no longer is cash a viable way for payment. This increase in e-commerce has driven the need to create an online payment system. Unfortunately...

    Provided By Computer Science Journals

  • White Papers // Oct 2013

    Review on Sorting Algorithms A Comparative Study

    There are many popular problems in different practical fields of computer sciences, database applications, networks and artificial intelligence. One of these basic operations and problems is sorting algorithm; the sorting problem has attracted a great deal of research. A lot of sorting algorithms has been developed to enhance the performance...

    Provided By Computer Science Journals

  • White Papers // May 2013

    Java Implementation based Heterogeneous Video Sequence Automated Surveillance Monitoring

    Automated video based surveillance monitoring is an essential and computationally challenging task to resolve issues in the secure access localities. This paper deals with some of the issues which are encountered in the integration surveillance monitoring in the real-life circumstances. The authors have employed video frames which are extorted from...

    Provided By Computer Science Journals

  • White Papers // Jun 2014

    Secure Linear Transformation Based Cryptosystem Using Dynamic Byte Substitution

    The information must be secure while transmission. Cryptography is one of the methods to attain security. Many classical cryptosystems are developed based on simple substitution. Hybrid cryptosystem using byte substitution and variable length sub key groups is a simple nonlinear algorithm but the cryptanalyst can find the length of each...

    Provided By Computer Science Journals

  • White Papers // Mar 2014

    Password Security

    In this paper, the authors investigate users' behavior in password utilization. Good password practices are critical to the security of any information system. End users often use weak passwords that are short, simple, and based on personal and meaningful information that can be easily guessed. A survey was conducted among...

    Provided By Computer Science Journals

  • White Papers // Jun 2014

    Using GIS in Designing and Deploying Wireless Network in City Plans

    Site surveys play a very important role in the successful and efficient deployment of wireless networks. The first step is to understand the basic goal of a wireless network, which is mainly to provide an appropriate coverage and throughput to all end users with high efficiency, full coverage and reasonable...

    Provided By Computer Science Journals

  • White Papers // Jun 2014

    Design And Evaluation of Time Slot Assignment Algorithm For IEEE 802.16j Relay Networks

    In IEEE 802.16j relay networks, wireless communications are carried out based on TDMA where the wireless network resources are divided into multiple time slots and they are assigned to wireless links between relay nodes as transmission opportunities. The network performance is improved by decreasing the total number of different time...

    Provided By Computer Science Journals

  • White Papers // May 2014

    Shared Spectrum Throughput for Secondary Users

    The throughput performance of secondary users sharing radio spectrum with a licensed primary user is analyzed in this paper. An asynchronous transmission, sensing and backoff protocol is proposed for the secondary user and modeled as a six state Markov process. The model parameters are derived as a function of the...

    Provided By Computer Science Journals

  • White Papers // Mar 2014

    SIP-Based Mobility Management for LTE-WiMAX-WLAN Interworking Using IMS Architecture

    In this paper, the authors propose an architecture framework for interworking of Long Term Evolution (LTE), Worldwide Interoperability for Microwave Access (WiMAX) and Wireless Local Area Network (WLAN) technologies. The aim is to offer users of various networks seamless high quality IP-based multimedia services access anywhere at any time. IP...

    Provided By Computer Science Journals

  • White Papers // Sep 2014

    Farthest Neighbor Approach for Finding Initial Centroids in K-Means

    Text document clustering is gaining popularity in the knowledge discovery field for effectively navigating, browsing and organizing large amounts of textual information into a small number of meaningful clusters. Text mining is a semi-automated process of extracting knowledge from voluminous unstructured data. A widely studied data mining problem in the...

    Provided By Computer Science Journals

  • White Papers // May 2014

    A Review of RUP (Rational Unified Process)

    RUP (Rational Unified Process) is an iterative process for software development; originally proposed in 1988 as the rational objectory process. The researcher then proposed the unified process. The rational unified process can also be regarded as a software engineering process, delivered through a web-enabled, searchable knowledge base. This paper represents...

    Provided By Computer Science Journals

  • White Papers // Jan 2014

    Software Process Control on Ungrouped Data: Log-Power Model

    Statistical Process Control (SPC) is the best choice to monitor software reliability process. It assists the software development team to identify and actions to be taken during software failure process and hence, assures better software reliability. In this paper, the authors propose a control mechanism based on the cumulative observations...

    Provided By Computer Science Journals

  • White Papers // Dec 2013

    Aspect Oriented Programming Through C#.NET

    .NET architecture was introduced by Microsoft as a new software development environment based on components. This architecture permits for effortless integration of classical distributed programming paradigms with Web computing. .NET describes a type structure and introduces ideas such as component, objects and interface which form the vital foundation for distributed...

    Provided By Computer Science Journals

  • White Papers // Sep 2010

    Particle Swarm Optimization in the fine-tuning of Fuzzy Software Cost Estimation Models

    Software cost estimation deals with the financial and strategic planning of software projects. Controlling the expensive investment of software development effectively is of paramount importance. The limitation of algorithmic effort prediction models is their inability to cope with uncertainties and imprecision surrounding software projects at the early development stage. More...

    Provided By Computer Science Journals

  • White Papers // Apr 2012

    Contributors to Reduce Maintainability Cost at the Software Implementation Phase

    Software maintenance is important and difficult to measure. The cost of maintenance is the most ever during the phases of software development. One of the most critical processes in software development is the reduction of software maintainability cost based on the quality of source code during design step, however, a...

    Provided By Computer Science Journals

  • White Papers // Jan 2012

    Distributed Agile Development: Practices for Building Trust in Team Through Effective Communication

    Agile methods have been now widely popular and have been proved to be delivering high-quality software to the global users in shorter time frames and are effectively handling the continuous change on the requirements from the users. However, due to various reasons such as technical expertise scarcity, functional expertise scarcity,...

    Provided By Computer Science Journals

  • White Papers // Apr 2012

    Using Meta-modeling Graph Grammars and R-Maude to Process and Simulate LRN Models

    Currently, code mobility technology is one of the most attractive research areas. Numerous domains are concerned, many platforms are developed and interest applications are realized. However, the poorness of modeling languages to deal with code mobility at requirement phase has motivated researchers to suggest new formalisms. Among these, the users...

    Provided By Computer Science Journals

  • White Papers // Jun 2012

    Proposed an Integrated Model to Detect the Defect in Software Development Projects

    Currently, software quality assurance does not apply completely on the development of software industry and this leads to some challenges in the industry of software, specially, concerning cost and time consuming. While, the success of software development project depends on the application quality assurance standards, which starts by the pre-project...

    Provided By Computer Science Journals

  • White Papers // Sep 2013

    Quality Attributes and Software Architectures Emerging Through Agile Development: Pursuit or Overlooking?

    Software architectures play an important role as an intermediate stage through which system requirements are translated into full scale working system. The idea of what a system does, what it does not, and different concerns and requirements can be negotiated and expressed clearly through the software architecture. Software architectures exist...

    Provided By Computer Science Journals

  • White Papers // Oct 2013

    Determining the Barriers Faced by Novice Programmers

    Most of the novice programmers find glitches at various phases while trying to complete a program in their Computer science programming course. These phases can be while constructing the code, finding errors in the code at the time of compilation of the program, debugging these errors while executing the program....

    Provided By Computer Science Journals

  • White Papers // Oct 2013

    Use of Cell Block As An Indent Space In Python

    Unlike most object oriented programming languages, Python does not use braces such as \"{\" and \"}\". Therefore, mixed tabs and spaces are used for indentation. However, they are causing problems in Python. Several approaches are applied to eliminate the problem that is not only for machine-readable form but also for...

    Provided By Computer Science Journals

  • White Papers // Sep 2014

    A Review of Agent-Oriented Development Methodologies and Programming Languages/Frameworks

    Agents are software systems and can be associated with an entity, framework, architecture and even languages. They are piece of program codes that are able to autonomously complete tasks. Before developing an agent, methodology to be used in development should be clarified and based on the methodology, suitable programming language...

    Provided By Computer Science Journals