Computer Science Journals

Displaying 1-40 of 164 results

  • White Papers // Jun 2015

    Fast Mobile IPv6 Handover Using Link and Location Information

    There are two causes of latency in mobile handover: the move detection latency and registration latency. This delay is inherent in the round-trip incurred by Mobile IP as the registration request is sent to the home agent and the response sent back to the foreign agent. Throughout the time between...

    Provided By Computer Science Journals

  • White Papers // May 2015

    Fixed Point Realization of Iterative LR-Aided Soft MIMO Decoding Algorithm

    Multiple-Input and Multiple-Output (MIMO) systems have been widely acclaimed in order to provide high data rates. Recently, Lattice Reduction (LR) aided detectors have been proposed to achieve near Maximum Likelihood (ML) performance with low complexity. In this paper, the authors develop the fixed point design of an iterative soft decision...

    Provided By Computer Science Journals

  • White Papers // Apr 2015

    Measuring Information Security: Understanding And Selecting Appropriate Metrics

    Thanks to numerous information in newspapers about data leaks, advocacy for information security is no more that difficult. But on the practical side, it is usually tough time for information security professionals when they have to demonstrate the value of information security to their organizations; they have so much metrics...

    Provided By Computer Science Journals

  • White Papers // Mar 2015

    Storage Virtualization: Towards an Efficient and Scalable Framework

    Enterprises in the corporate world demand high speed data protection for all kinds of data. Issues such as complex server environments with high administrative costs and low data protection have to be resolved. In addition to data protection, enterprises demand the ability to recover/restore critical information in various situations. Traditional...

    Provided By Computer Science Journals

  • White Papers // Mar 2015

    Location Based Services in M-Commerce: Customer Trust and Transaction Security Issues

    It is understood by studies that wireless data services is crucial for users to access location based services. As in location-dependent services, the data value for a data item depends on geographical locations. In general, the location based services includes the services to identify the location of a person or...

    Provided By Computer Science Journals

  • White Papers // Mar 2015

    Big Data Analytics on Customer Behaviors with Kinect Sensor Network

    In modern enterprises, customer data is valuable for identifying their behavioral patterns and developing marketing strategies that can align with the preferences of different customers. This paper is to develop a framework that promotes the use of Kinect sensors for big data analytics on customer behavior analysis. Kinect enables 3D...

    Provided By Computer Science Journals

  • White Papers // Dec 2014

    An Optimal Approach for Knowledge Protection in Structured Frequent Patterns

    Data mining is valuable technology to facilitate the extraction of useful patterns and trends from large volume of data. When these patterns are to be shared in a collaborative environment, they must be protectively shared among the parties concerned in order to preserve the confidentiality of the sensitive data. Sharing...

    Provided By Computer Science Journals

  • White Papers // Nov 2014

    Multi Robot User Interface Design Based on HCI Principles

    Robot User Interface (RUI) refers to a specialized User Interface (UI) that intrinsically supplements the virtual access phenomenon of human operators with robots working in complex and challenging scenarios such as rescue missions. The very nature of complexity and attributed information overload can potentially cause significant threat to survivor's life...

    Provided By Computer Science Journals

  • White Papers // Oct 2014

    Security Key Management Model for Low Rate Wireless Personal Area Networks

    IEEE 802.15.4-based devices networks known by the name of LR-WPAN (Low Rate Wireless Personal Area Network) are characterized by low computation, memory and storage space and they do not possess an infrastructure. This makes them dynamic and easy to deploy, but in the other hand, this makes them very vulnerable...

    Provided By Computer Science Journals

  • White Papers // Oct 2014

    Improved Slicing Algorithm for Greater Utility in Privacy Preserving Data Publishing

    Several algorithms and techniques have been proposed in recent years for the publication of sensitive micro-data. However, there is a trade-off to be considered between the level of privacy offered and the usefulness of the published data. Recently, slicing was proposed as a novel technique for increasing the utility of...

    Provided By Computer Science Journals

  • White Papers // Oct 2014

    Improving Firewall Performance by Eliminating Redundancies In Access Control Lists

    A firewall is a network security device that works to protect an organization's internal network from both unauthorized and malicious users. It functions by examining all packets that enter any one of its incoming interfaces and comparing the structure of the packet against a set of predefined rules. Each rule...

    Provided By Computer Science Journals

  • White Papers // Sep 2014

    Farthest Neighbor Approach for Finding Initial Centroids in K-Means

    Text document clustering is gaining popularity in the knowledge discovery field for effectively navigating, browsing and organizing large amounts of textual information into a small number of meaningful clusters. Text mining is a semi-automated process of extracting knowledge from voluminous unstructured data. A widely studied data mining problem in the...

    Provided By Computer Science Journals

  • White Papers // Sep 2014

    A Review of Agent-Oriented Development Methodologies and Programming Languages/Frameworks

    Agents are software systems and can be associated with an entity, framework, architecture and even languages. They are piece of program codes that are able to autonomously complete tasks. Before developing an agent, methodology to be used in development should be clarified and based on the methodology, suitable programming language...

    Provided By Computer Science Journals

  • White Papers // Sep 2014

    Collaborative Re-Localization Method in Mobile Wireless Sensor Network Based on Markov Decision Process

    Localization in mobile Wireless Sensor Networks (WSNs), particularly in areas like surveillance applications, necessitates triggering re-localization in different time periods in order to maintain accurate positioning. Further, the re-localization process should be designed for time and energy efficiency in these resource constrained networks. In this paper, an energy and time...

    Provided By Computer Science Journals

  • White Papers // Sep 2014

    Banking and Modern Payments System Security Analysis

    Cyber-criminals have benefited from Online Banking (OB), regardless of the extensive research on financial cyber-security. To better be prepared for what the future might bring, the authors try to predict how hacking tools might evolve. They briefly survey the state-of-the-art tools developed by blackhat hackers and conclude that they could...

    Provided By Computer Science Journals

  • White Papers // Aug 2014

    Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology

    In recent years, global Online Social Network (OSN) usage has increased sharply as these networks become interwoven into people's everyday lives as places to meet and communicate with others. Social networks can offer many services to the users for sharing activities events and their ideas. Many attacks can happen to...

    Provided By Computer Science Journals

  • White Papers // Aug 2014

    Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit Detection

    Since its introduction in 1994 the Secure Socket Layer (SSL) protocol (later renamed to Transport Layer Security (TLS)) evolved to the de facto standard for securing the transport layer. SSL/TLS can be used for ensuring data confidentiality, integrity and authenticity during transport. A main feature of the protocol is its...

    Provided By Computer Science Journals

  • White Papers // Aug 2014

    PI-Tool To Improve Performance of Application In Multi-core Architecture

    Multi-core CPUs become increasingly popular on server-grade hardware as well as end-user desktop PCs or laptops. Necessary efforts are taken in the community towards developing applications optimized for multi-core architecture; still every user is expecting to run applications or programs with more speed than normal execution. In order to achieve...

    Provided By Computer Science Journals

  • White Papers // Aug 2014

    Development of Personal Assistant System with Human Computer Interaction

    In recent years, some personal assistant systems have appeared in the people's daily life. They provided some services such as account management, curriculum management, diary management, financing management and so on. This paper presents a design and implementation of a personal assistant system platform especially for students and employee to...

    Provided By Computer Science Journals

  • White Papers // Jun 2014

    Using GIS in Designing and Deploying Wireless Network in City Plans

    Site surveys play a very important role in the successful and efficient deployment of wireless networks. The first step is to understand the basic goal of a wireless network, which is mainly to provide an appropriate coverage and throughput to all end users with high efficiency, full coverage and reasonable...

    Provided By Computer Science Journals

  • White Papers // Jun 2014

    Usage of Shape From Focus Method For 3D Shape Recovery And Identification of 3D Object Position

    Shape from focus is a method of 3D shape and depth estimation of an object from a sequence of pictures with changing focus settings. In this paper, the authors propose a novel method of shape recovery, which was originally created for shape and position identification of glass pipette in medical...

    Provided By Computer Science Journals

  • White Papers // Jun 2014

    Secure Linear Transformation Based Cryptosystem Using Dynamic Byte Substitution

    The information must be secure while transmission. Cryptography is one of the methods to attain security. Many classical cryptosystems are developed based on simple substitution. Hybrid cryptosystem using byte substitution and variable length sub key groups is a simple nonlinear algorithm but the cryptanalyst can find the length of each...

    Provided By Computer Science Journals

  • White Papers // Jun 2014

    Path Loss Prediction Model For UHF Radiowaves Propagation In Akure Metropolis

    Propagation path loss models play an important role in the design of cellular systems to specify key system parameters such as transmission power, frequency, antenna heights and so on. Several models have been proposed for cellular systems operating in different environments (indoor, outdoor, urban, suburban, and rural). This paper sets...

    Provided By Computer Science Journals

  • White Papers // Jun 2014

    Designing An Effective Mobile-learning Model By Integrating Student Culture

    Mobile learning is a good technology because it allows communication, collaboration, and sharing information or resources among all of learning members. Mobile learning can be used as perfect solutions to support the learning process. Thither are many concepts and factors influencing effective learning results through creativity, collaboration, and communication. However,...

    Provided By Computer Science Journals

  • White Papers // Jun 2014

    Design And Evaluation of Time Slot Assignment Algorithm For IEEE 802.16j Relay Networks

    In IEEE 802.16j relay networks, wireless communications are carried out based on TDMA where the wireless network resources are divided into multiple time slots and they are assigned to wireless links between relay nodes as transmission opportunities. The network performance is improved by decreasing the total number of different time...

    Provided By Computer Science Journals

  • White Papers // May 2014

    Reeb Graph for Automatic 3D Cephalometry

    In this paper, the authors present a method of Three-Dimensional Computed Tomographic (3D-CT) cephalo-metrics and its use to study cranio/maxilla-facial malformations. They propose a system for automatic localization of cephalometric landmarks using reeb graphs. Volumetric images of a patient were reconstructed into 3D mesh. The proposed paper is carried out...

    Provided By Computer Science Journals

  • White Papers // May 2014

    A Review of RUP (Rational Unified Process)

    RUP (Rational Unified Process) is an iterative process for software development; originally proposed in 1988 as the rational objectory process. The researcher then proposed the unified process. The rational unified process can also be regarded as a software engineering process, delivered through a web-enabled, searchable knowledge base. This paper represents...

    Provided By Computer Science Journals

  • White Papers // May 2014

    Image Processing Application on Graphics processors

    In this paper, the authors introduce real time image processing techniques using modern programmable Graphic Processing Units (GPUs). GPU are SIMD (Single Instruction, Multiple Data) device that is inherently data-parallel. By utilizing NVIDIA new GPU programming framework, "Compute Unified Device Architecture" (CUDA) as a computational resource, they realize significant acceleration...

    Provided By Computer Science Journals

  • White Papers // May 2014

    DNS Advanced Attacks and Analysis

    Now-a-days DNS is used to load balance, failover, and geographically redirect connections. DNS has become so pervasive it is hard to identify a modern TCP/IP connection that does not use DNS in some way. Unfortunately, due to the reliability built into the fundamental RFC-based design of DNS, most IT professionals...

    Provided By Computer Science Journals

  • White Papers // May 2014

    Multimodal Approach for Face Recognition using 3D-2D Face Feature Fusion

    3D face recognition has been an area of interest among researchers for the past few decades especially in pattern recognition. The main advantage of 3D face recognition is the availability of geometrical information of the face structure which is more or less unique for a subject. This paper focuses on...

    Provided By Computer Science Journals

  • White Papers // May 2014

    A Comparative Study: Gammachirp Wavelets and Auditory Filter Using Prosodic Features of Speech Recognition In Noisy Environment

    Modern Automatic Speech Recognition (ASR) systems typically use a bank of linear filters as the first step in performing frequency analysis of speech. On the other hand, the cochlea, which is responsible for frequency analysis in the human auditory system, is known to have a compressive non-linear frequency response which...

    Provided By Computer Science Journals

  • White Papers // May 2014

    Shared Spectrum Throughput for Secondary Users

    The throughput performance of secondary users sharing radio spectrum with a licensed primary user is analyzed in this paper. An asynchronous transmission, sensing and backoff protocol is proposed for the secondary user and modeled as a six state Markov process. The model parameters are derived as a function of the...

    Provided By Computer Science Journals

  • White Papers // Mar 2014

    SIP-Based Mobility Management for LTE-WiMAX-WLAN Interworking Using IMS Architecture

    In this paper, the authors propose an architecture framework for interworking of Long Term Evolution (LTE), Worldwide Interoperability for Microwave Access (WiMAX) and Wireless Local Area Network (WLAN) technologies. The aim is to offer users of various networks seamless high quality IP-based multimedia services access anywhere at any time. IP...

    Provided By Computer Science Journals

  • White Papers // Mar 2014

    Password Security

    In this paper, the authors investigate users' behavior in password utilization. Good password practices are critical to the security of any information system. End users often use weak passwords that are short, simple, and based on personal and meaningful information that can be easily guessed. A survey was conducted among...

    Provided By Computer Science Journals

  • White Papers // Feb 2014

    Efficient Coercion Resistant Public Key Encryption

    The notion of deniable encryption has been known in the literature since its introduction in as coercion resistant encryption schemes that allow the user (sender and/or receiver) to escape a coercion attempted by a coercive adversary. The schemes allow the user to open fake message(s) to the coercer that when...

    Provided By Computer Science Journals

  • White Papers // Feb 2014

    E-payment Security Analysis In Depth

    Technology is the basis of the peoples' lives. The growth of the Internet has made it an ease for consumers to find items for purchase, but no longer is cash a viable way for payment. This increase in e-commerce has driven the need to create an online payment system. Unfortunately...

    Provided By Computer Science Journals

  • White Papers // Jan 2014

    Software Process Control on Ungrouped Data: Log-Power Model

    Statistical Process Control (SPC) is the best choice to monitor software reliability process. It assists the software development team to identify and actions to be taken during software failure process and hence, assures better software reliability. In this paper, the authors propose a control mechanism based on the cumulative observations...

    Provided By Computer Science Journals

  • White Papers // Dec 2013

    Aspect Oriented Programming Through C#.NET

    .NET architecture was introduced by Microsoft as a new software development environment based on components. This architecture permits for effortless integration of classical distributed programming paradigms with Web computing. .NET describes a type structure and introduces ideas such as component, objects and interface which form the vital foundation for distributed...

    Provided By Computer Science Journals

  • White Papers // Nov 2013

    Apply Web-Based Analytic Tool and Eye Tracking to Study the Consumer Preferences of DSLR Cameras

    Consumer's preferences and purchase motivation of products often lie in the purchasing behaviors generated by the synthetic evaluation of form features, color, function and price of products. If an enterprise can bring these criteria under control, they can grasp the opportunities in the market place. In this paper, the product...

    Provided By Computer Science Journals

  • White Papers // Oct 2013

    Determining the Barriers Faced by Novice Programmers

    Most of the novice programmers find glitches at various phases while trying to complete a program in their Computer science programming course. These phases can be while constructing the code, finding errors in the code at the time of compilation of the program, debugging these errors while executing the program....

    Provided By Computer Science Journals

  • White Papers // Feb 2010

    Hybrid Compression Encryption Technique for Securing SMS

    Mobile communication devices have become popular tools for gathering and disseminating information and data. When sensitive information is exchanged using SMS, it is crucial to protect the content from eavesdroppers as well as ensuring that the message is sent by a legitimate sender. Using an encryption technique to secure SMS...

    Provided By Computer Science Journals

  • White Papers // Jan 2010

    Integrated DWDM and MIMO-OFDM System for 4G High Capacity Mobile Communication

    Dense Wavelength-Division Multiplexing (DWDM) technique is a very promising data transmission technology for utilizing the capacity of the fiber. By DWDM, multiple signals (video, audio, data etc) staggered in wavelength domain can be multiplexed and transmitted down the same fiber. The Multiple-Input Multiple-Output (MIMO) wireless technology in combination with Orthogonal...

    Provided By Computer Science Journals

  • White Papers // Sep 2010

    Implementation of Artificial Intelligence Techniques for Steady State Security Assessment in Pool Market

    Various techniques have been implemented to include steady state security assessment in the analysis of trading in deregulated power system, however most of these techniques lack requirements of fast computational time with acceptable accuracy. The problem is compounded further by the requirements to consider bus voltages and thermal line limits....

    Provided By Computer Science Journals

  • White Papers // Jan 2010

    A Wavelet - Based Object Watermarking System for MPEG4 Video

    Efficient storage, transmission and use of video information are key requirements in many multimedia applications currently being addressed by MPEG-4. To fulfill these requirements, a new approach for representing video information which relies on an object-based representation, has been adopted. Therefore, object based watermarking schemes are needed for copyright protection....

    Provided By Computer Science Journals

  • White Papers // Jul 2010

    A Robust Approach to Detect and Prevent Network Layer Attacks in MANETS

    A dynamic wireless network that is formed without any pre-existing infrastructure, in which every node can act as a router is called a Mobile Ad hoc NETwork (MANET). Since MANETS has not got clear cut security provisions, it is accessible to any of the authorized network users and malicious attackers....

    Provided By Computer Science Journals

  • White Papers // Oct 2010

    Deploying e-Mail as an Official Communication Tool: Technical Prospect

    Applications are spreading widely through their lives entering every field controlling some of it and enhancing other; electronic mail, or e-mail, is the best known and most popular application of the Internet. More and more people see e-mail as a way to communicate quickly and affordably. Electronic mail can also...

    Provided By Computer Science Journals

  • White Papers // Aug 2010

    New Trust Based Security Method for Mobile Ad-Hoc Networks

    Secure routing is the milestone in mobile ad hoc networks .Ad hoc networks are widely used in military and other scientific areas with nodes which can move arbitrarily and connect to any nodes at will, it is impossible for Ad hoc network to own a fixed infrastructure. It also has...

    Provided By Computer Science Journals

  • White Papers // Jan 2011

    Implementation of New Routing Protocol for Node Security in a Mobile Ad Hoc Network

    A routing protocol plays important role to handle entire network for communication and determines the paths of packets. A node is a part of the defined network for transferring information in form of packets. If all packets are transferred from source to destination successfully, it is assumed that the routing...

    Provided By Computer Science Journals

  • White Papers // Nov 2012

    Interactive Projector Screen with Hand Detection using LED Lights

    There are many different ways to manipulate OS, users can use a keyboard, mouse or touch screen. While doing a presentation, it is inconvenient to control the OS and explain the presentation at the same time. The author's system, interactive wall, allows users to use hand to control OS on...

    Provided By Computer Science Journals

  • White Papers // Aug 2007

    An Evaluation of Maintainability of Aspect-Oriented Systems: a Practical Approach

    Maintenance of software systems is becoming major concern for software developers and users. In software projects/products, where software changes/updates are frequently required to improve software quality, maintainability is an important characteristic of ISO 9126 quality standard to evaluate. Analyzability, changeability, stability and testability are sub attributes/characteristics of maintainability in ISO...

    Provided By Computer Science Journals

  • White Papers // Sep 2010

    Managing Component-based Systems with Reusable Components

    Component-Based Systems (CBSs) have now become more generalized approach for application development. The main advantages of CBS are reduced development time, cost and efforts along with several others. These advantages are mainly contributed by the reuse of already built-in software components. In order to realize the reuse of components effectively...

    Provided By Computer Science Journals

  • White Papers // Mar 2015

    Storage Virtualization: Towards an Efficient and Scalable Framework

    Enterprises in the corporate world demand high speed data protection for all kinds of data. Issues such as complex server environments with high administrative costs and low data protection have to be resolved. In addition to data protection, enterprises demand the ability to recover/restore critical information in various situations. Traditional...

    Provided By Computer Science Journals

  • White Papers // Mar 2015

    Location Based Services in M-Commerce: Customer Trust and Transaction Security Issues

    It is understood by studies that wireless data services is crucial for users to access location based services. As in location-dependent services, the data value for a data item depends on geographical locations. In general, the location based services includes the services to identify the location of a person or...

    Provided By Computer Science Journals

  • White Papers // Nov 2013

    Apply Web-Based Analytic Tool and Eye Tracking to Study the Consumer Preferences of DSLR Cameras

    Consumer's preferences and purchase motivation of products often lie in the purchasing behaviors generated by the synthetic evaluation of form features, color, function and price of products. If an enterprise can bring these criteria under control, they can grasp the opportunities in the market place. In this paper, the product...

    Provided By Computer Science Journals

  • White Papers // Apr 2012

    Hand Segmentation Techniques to Hand Gesture Recognition for Natural Human Computer Interaction

    In this paper, the authors are the part of vision based hand gesture recognition system for natural human computer interface. Hand tracking and segmentation are the primary steps for any hand gesture recognition system. This paper is to develop robust and efficient hand segmentation algorithm where three algorithms for hand...

    Provided By Computer Science Journals

  • White Papers // Dec 2011

    Development of Sign Signal Translation System Based on Altera's FPGA DE2 Board

    In this paper, the authors build a system that is capable of detecting and recognizing the hand gesture in an image captured by using a camera. The system is built based on Altera's FPGA DE2 board, which contains a Nios II soft core processor. Image processing techniques and a simple...

    Provided By Computer Science Journals

  • White Papers // Sep 2011

    A PNML Extension for the HCI Design

    In this paper, the authors propose a global approach for specification, design and verification of context awareness Human Computer Interface (HCI). This is a Model Based Design approach (MBD). This paper describes the ubiquitous environment by ontologies. OWL is the standard used for this purpose. The specification and modeling of...

    Provided By Computer Science Journals

  • White Papers // Nov 2010

    Collaborative Learning of Organisational Knowledge

    In this paper, the authors present recent research into methods used in Australian indigenous knowledge sharing and looks at how these can support the creation of suitable collaborative environments for timely organizational learning. The protocols and practices as used today and in the past by indigenous communities are presented and...

    Provided By Computer Science Journals

  • White Papers // Nov 2014

    Multi Robot User Interface Design Based on HCI Principles

    Robot User Interface (RUI) refers to a specialized User Interface (UI) that intrinsically supplements the virtual access phenomenon of human operators with robots working in complex and challenging scenarios such as rescue missions. The very nature of complexity and attributed information overload can potentially cause significant threat to survivor's life...

    Provided By Computer Science Journals

  • White Papers // Mar 2015

    Big Data Analytics on Customer Behaviors with Kinect Sensor Network

    In modern enterprises, customer data is valuable for identifying their behavioral patterns and developing marketing strategies that can align with the preferences of different customers. This paper is to develop a framework that promotes the use of Kinect sensors for big data analytics on customer behavior analysis. Kinect enables 3D...

    Provided By Computer Science Journals

  • White Papers // Sep 2009

    Comparative Analysis of Serial Decision Tree Classification Algorithms

    Classification of data objects based on a predefined knowledge of the objects is a data mining and knowledge management technique used in grouping similar data objects together. It can be defined as supervised learning algorithms as it assigns class labels to data objects based on the relationship between the data...

    Provided By Computer Science Journals

  • White Papers // Apr 2012

    Query Processing with K-Anonymity

    Anonymization techniques are used to ensure the privacy preservation of the data owners, especially for personal and sensitive data. While in most cases, data reside inside the database management system; most of the proposed anonymization techniques operate on and anonymize isolated datasets stored outside the DBMS. Hence, most of the...

    Provided By Computer Science Journals

  • White Papers // May 2012

    Clustering Using Shared Reference Points Algorithm Based on a Sound Data Mode

    A novel clustering algorithm CSHARP is presented for the purpose of finding clusters of arbitrary shapes and arbitrary densities in high dimensional feature spaces. It can be considered as a variation of the Shared Nearest Neighbor (SNN) algorithm, in which each sample data point votes for the points in its...

    Provided By Computer Science Journals

  • White Papers // Jun 2011

    A Performance Based Transposition Algorithm for Frequent Itemsets Generation

    Association Rule Mining (ARM) technique is used to discover the interesting association or correlation among a large set of data items. It plays an important role in generating frequent item sets from large databases. Many industries are interested in developing the association rules from their databases due to continuous retrieval...

    Provided By Computer Science Journals

  • White Papers // May 2011

    An Organizational Memory and Knowledge System (OMKS): Building Modern Decision Support Systems

    Many organizations employ data warehouses and knowledge management systems for decision support activities and management of organizational knowledge. The integration of decision support systems and knowledge management systems has been found to provide benefits. In this paper, the authors present an approach for building modern decision support systems that integrates...

    Provided By Computer Science Journals

  • White Papers // Aug 2011

    An Efficient Algorithm for Mining Frequent Itemsets within Large Windows Over Data Streams

    Sliding window is an interesting model for frequent pattern mining over data stream due to handling concept change by considering recent data. In this paper, a novel approximate algorithm for frequent item set mining is proposed which operates in both transactional and time sensitive sliding window model. This algorithm divides...

    Provided By Computer Science Journals

  • White Papers // Aug 2011

    A Novel Preprocessing Algorithm for Frequent Pattern Mining in Multidatasets

    In many database applications, information stored in a database has a built-in hierarchy consisting of multiple levels of concepts. In such a database, users may want to find out association rules among items only at the same levels. This task is called multiple-level association rule mining. However, mining frequent patterns...

    Provided By Computer Science Journals

  • White Papers // Feb 2011

    Performance Assessment of Faculties of Management Discipline From Student Perspective Using Statistical and Mining Methodologies

    In this paper, the authors deal with faculty performance assessment from student perspective using statistical analysis and mining techniques. Performance of a faculty depends on a number of parameters (77 parameters as identified) and the performance assessment of a faculty/faculties are broadly carried out by the management body, the student...

    Provided By Computer Science Journals

  • White Papers // Dec 2012

    Linking Design, Marketing, and Innovation: Managing the Connection for Competitive Advantage

    Marketing should closely coordinate with product innovation. Not only will an effective connection of the marketing activity and design trigger product innovation in enterprises, it is a key factor to the product success in the market place. In practice, how to process product design so as to reach the goal...

    Provided By Computer Science Journals

  • White Papers // Oct 2014

    Improved Slicing Algorithm for Greater Utility in Privacy Preserving Data Publishing

    Several algorithms and techniques have been proposed in recent years for the publication of sensitive micro-data. However, there is a trade-off to be considered between the level of privacy offered and the usefulness of the published data. Recently, slicing was proposed as a novel technique for increasing the utility of...

    Provided By Computer Science Journals

  • White Papers // Dec 2014

    An Optimal Approach for Knowledge Protection in Structured Frequent Patterns

    Data mining is valuable technology to facilitate the extraction of useful patterns and trends from large volume of data. When these patterns are to be shared in a collaborative environment, they must be protectively shared among the parties concerned in order to preserve the confidentiality of the sensitive data. Sharing...

    Provided By Computer Science Journals

  • White Papers // Dec 2010

    Leadership Driven Innovation: The Role of the Engineer in Our Future

    The proliferation of new technologies, particularly those identified as advanced and/or disruptive, rely on the development of two individual but highly interrelated competencies, leadership and innovation. These two are the basis for the successful development of most of the major technologies in production, today. At their best they are also...

    Provided By Computer Science Journals

  • White Papers // Oct 2012

    Smartphone Forensic Investigation Process Model

    Law practitioners are in an uninterrupted battle with criminals in the application of digital/computer technologies, and these days the advancement in the use of Smartphones and social media has exponentially increased this risk. Thus it requires the development of a sound methodology to investigate Smartphones in a well-defined and secured...

    Provided By Computer Science Journals

  • White Papers // Mar 2012

    Data Dissemination in Wireless Sensor Networks: A State-of-the Art Survey

    A wireless sensor network is a network of tiny nodes with wireless sensing capacity for data collection processing and further communicating with the Base Station this paper discusses the overall mechanism of data dissemination right from data collection at the sensor nodes, clustering of sensor nodes, data aggregation at the...

    Provided By Computer Science Journals

  • White Papers // May 2013

    Conceptual Model of Real Time Infrastructure Within Cloud Computing Environment

    Cloud computing is a new and most demandable technology in communication environment. Where computing resources such as hardware or/and software are processed as service over networks. SCADA implementation within cloud environment is relatively new and demandable over real time infrastructure (industrial infrastructure).The shifting (moving) of SCADA system (applications and resources)...

    Provided By Computer Science Journals

  • White Papers // Apr 2012

    Rethinking Embedded System Design

    Embedded engineering is designed using objects of nature and it also interacts with nature. Therefore, it is forced to obey the laws of nature. Nature does not make any assumptions. But all their mathematical and scientific theories do. Therefore, these theories cannot be valid for embedded engineering applications. In this...

    Provided By Computer Science Journals

  • White Papers // Aug 2014

    PI-Tool To Improve Performance of Application In Multi-core Architecture

    Multi-core CPUs become increasingly popular on server-grade hardware as well as end-user desktop PCs or laptops. Necessary efforts are taken in the community towards developing applications optimized for multi-core architecture; still every user is expecting to run applications or programs with more speed than normal execution. In order to achieve...

    Provided By Computer Science Journals

  • White Papers // Aug 2014

    Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology

    In recent years, global Online Social Network (OSN) usage has increased sharply as these networks become interwoven into people's everyday lives as places to meet and communicate with others. Social networks can offer many services to the users for sharing activities events and their ideas. Many attacks can happen to...

    Provided By Computer Science Journals

  • White Papers // Aug 2014

    Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit Detection

    Since its introduction in 1994 the Secure Socket Layer (SSL) protocol (later renamed to Transport Layer Security (TLS)) evolved to the de facto standard for securing the transport layer. SSL/TLS can be used for ensuring data confidentiality, integrity and authenticity during transport. A main feature of the protocol is its...

    Provided By Computer Science Journals

  • White Papers // Jun 2014

    Designing An Effective Mobile-learning Model By Integrating Student Culture

    Mobile learning is a good technology because it allows communication, collaboration, and sharing information or resources among all of learning members. Mobile learning can be used as perfect solutions to support the learning process. Thither are many concepts and factors influencing effective learning results through creativity, collaboration, and communication. However,...

    Provided By Computer Science Journals