Computer Science Journals

Displaying 1-40 of 43 results

  • White Papers // Sep 2014

    Farthest Neighbor Approach for Finding Initial Centroids in K-Means

    Text document clustering is gaining popularity in the knowledge discovery field for effectively navigating, browsing and organizing large amounts of textual information into a small number of meaningful clusters. Text mining is a semi-automated process of extracting knowledge from voluminous unstructured data. A widely studied data mining problem in the...

    Provided By Computer Science Journals

  • White Papers // Sep 2014

    Banking and Modern Payments System Security Analysis

    Cyber-criminals have benefited from Online Banking (OB), regardless of the extensive research on financial cyber-security. To better be prepared for what the future might bring, the authors try to predict how hacking tools might evolve. They briefly survey the state-of-the-art tools developed by blackhat hackers and conclude that they could...

    Provided By Computer Science Journals

  • White Papers // Aug 2014

    Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology

    In recent years, global Online Social Network (OSN) usage has increased sharply as these networks become interwoven into people's everyday lives as places to meet and communicate with others. Social networks can offer many services to the users for sharing activities events and their ideas. Many attacks can happen to...

    Provided By Computer Science Journals

  • White Papers // Aug 2014

    Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit Detection

    Since its introduction in 1994 the Secure Socket Layer (SSL) protocol (later renamed to Transport Layer Security (TLS)) evolved to the de facto standard for securing the transport layer. SSL/TLS can be used for ensuring data confidentiality, integrity and authenticity during transport. A main feature of the protocol is its...

    Provided By Computer Science Journals

  • White Papers // Aug 2014

    PI-Tool To Improve Performance of Application In Multi-core Architecture

    Multi-core CPUs become increasingly popular on server-grade hardware as well as end-user desktop PCs or laptops. Necessary efforts are taken in the community towards developing applications optimized for multi-core architecture; still every user is expecting to run applications or programs with more speed than normal execution. In order to achieve...

    Provided By Computer Science Journals

  • White Papers // Jun 2014

    Using GIS in Designing and Deploying Wireless Network in City Plans

    Site surveys play a very important role in the successful and efficient deployment of wireless networks. The first step is to understand the basic goal of a wireless network, which is mainly to provide an appropriate coverage and throughput to all end users with high efficiency, full coverage and reasonable...

    Provided By Computer Science Journals

  • White Papers // Jun 2014

    Secure Linear Transformation Based Cryptosystem Using Dynamic Byte Substitution

    The information must be secure while transmission. Cryptography is one of the methods to attain security. Many classical cryptosystems are developed based on simple substitution. Hybrid cryptosystem using byte substitution and variable length sub key groups is a simple nonlinear algorithm but the cryptanalyst can find the length of each...

    Provided By Computer Science Journals

  • White Papers // Jun 2014

    Designing An Effective Mobile-learning Model By Integrating Student Culture

    Mobile learning is a good technology because it allows communication, collaboration, and sharing information or resources among all of learning members. Mobile learning can be used as perfect solutions to support the learning process. Thither are many concepts and factors influencing effective learning results through creativity, collaboration, and communication. However,...

    Provided By Computer Science Journals

  • White Papers // Jun 2014

    Design And Evaluation of Time Slot Assignment Algorithm For IEEE 802.16j Relay Networks

    In IEEE 802.16j relay networks, wireless communications are carried out based on TDMA where the wireless network resources are divided into multiple time slots and they are assigned to wireless links between relay nodes as transmission opportunities. The network performance is improved by decreasing the total number of different time...

    Provided By Computer Science Journals

  • White Papers // May 2014

    A Review of RUP (Rational Unified Process)

    RUP (Rational Unified Process) is an iterative process for software development; originally proposed in 1988 as the rational objectory process. The researcher then proposed the unified process. The rational unified process can also be regarded as a software engineering process, delivered through a web-enabled, searchable knowledge base. This paper represents...

    Provided By Computer Science Journals

  • White Papers // May 2014

    DNS Advanced Attacks and Analysis

    Now-a-days DNS is used to load balance, failover, and geographically redirect connections. DNS has become so pervasive it is hard to identify a modern TCP/IP connection that does not use DNS in some way. Unfortunately, due to the reliability built into the fundamental RFC-based design of DNS, most IT professionals...

    Provided By Computer Science Journals

  • White Papers // May 2014

    A Comparative Study: Gammachirp Wavelets and Auditory Filter Using Prosodic Features of Speech Recognition In Noisy Environment

    Modern Automatic Speech Recognition (ASR) systems typically use a bank of linear filters as the first step in performing frequency analysis of speech. On the other hand, the cochlea, which is responsible for frequency analysis in the human auditory system, is known to have a compressive non-linear frequency response which...

    Provided By Computer Science Journals

  • White Papers // May 2014

    Shared Spectrum Throughput for Secondary Users

    The throughput performance of secondary users sharing radio spectrum with a licensed primary user is analyzed in this paper. An asynchronous transmission, sensing and backoff protocol is proposed for the secondary user and modeled as a six state Markov process. The model parameters are derived as a function of the...

    Provided By Computer Science Journals

  • White Papers // Mar 2014

    SIP-Based Mobility Management for LTE-WiMAX-WLAN Interworking Using IMS Architecture

    In this paper, the authors propose an architecture framework for interworking of Long Term Evolution (LTE), Worldwide Interoperability for Microwave Access (WiMAX) and Wireless Local Area Network (WLAN) technologies. The aim is to offer users of various networks seamless high quality IP-based multimedia services access anywhere at any time. IP...

    Provided By Computer Science Journals

  • White Papers // Mar 2014

    Password Security

    In this paper, the authors investigate users' behavior in password utilization. Good password practices are critical to the security of any information system. End users often use weak passwords that are short, simple, and based on personal and meaningful information that can be easily guessed. A survey was conducted among...

    Provided By Computer Science Journals

  • White Papers // Feb 2014

    Efficient Coercion Resistant Public Key Encryption

    The notion of deniable encryption has been known in the literature since its introduction in as coercion resistant encryption schemes that allow the user (sender and/or receiver) to escape a coercion attempted by a coercive adversary. The schemes allow the user to open fake message(s) to the coercer that when...

    Provided By Computer Science Journals

  • White Papers // Feb 2014

    E-payment Security Analysis In Depth

    Technology is the basis of the peoples' lives. The growth of the Internet has made it an ease for consumers to find items for purchase, but no longer is cash a viable way for payment. This increase in e-commerce has driven the need to create an online payment system. Unfortunately...

    Provided By Computer Science Journals

  • White Papers // Jan 2014

    Software Process Control on Ungrouped Data: Log-Power Model

    Statistical Process Control (SPC) is the best choice to monitor software reliability process. It assists the software development team to identify and actions to be taken during software failure process and hence, assures better software reliability. In this paper, the authors propose a control mechanism based on the cumulative observations...

    Provided By Computer Science Journals

  • White Papers // Oct 2013

    Review on Sorting Algorithms A Comparative Study

    There are many popular problems in different practical fields of computer sciences, database applications, networks and artificial intelligence. One of these basic operations and problems is sorting algorithm; the sorting problem has attracted a great deal of research. A lot of sorting algorithms has been developed to enhance the performance...

    Provided By Computer Science Journals

  • White Papers // Oct 2013

    Face Images Database Indexing for Person Identification Problem

    Face biometric data are with high dimensional features and hence, traditional searching techniques are not applicable to retrieve them. As a consequence, it is an issue to identify a person with face data from a large pool of face database in real-time. This paper addresses this issue and proposes an...

    Provided By Computer Science Journals

  • White Papers // Jun 2013

    Malicious Node Detection Mechanism for Wireless Ad Hoc Network

    With the popularity of intelligent electronics which rely on wireless communication in the post-PC era, computing devices have become cheaper, smaller, more mobile and more pervasive in daily lives. Construction of wireless ad hoc network becomes more and more convenient. However, the deployment of sensor nodes in an unattended environment...

    Provided By Computer Science Journals

  • White Papers // Jun 2013

    Multimodal Biometrics at Feature Level Fusion Using Texture Features

    In recent years, fusion of multiple biometric modalities for personal authentication has received considerable attention. This paper presents a feature level fusion algorithm based on texture features. The system combines fingerprint, face and off-line signature. Texture features are extracted from curvelet transform. The curvelet feature dimension is selected based on...

    Provided By Computer Science Journals

  • White Papers // May 2013

    Conceptual Model of Real Time Infrastructure Within Cloud Computing Environment

    Cloud computing is a new and most demandable technology in communication environment. Where computing resources such as hardware or/and software are processed as service over networks. SCADA implementation within cloud environment is relatively new and demandable over real time infrastructure (industrial infrastructure).The shifting (moving) of SCADA system (applications and resources)...

    Provided By Computer Science Journals

  • White Papers // May 2013

    Java Implementation based Heterogeneous Video Sequence Automated Surveillance Monitoring

    Automated video based surveillance monitoring is an essential and computationally challenging task to resolve issues in the secure access localities. This paper deals with some of the issues which are encountered in the integration surveillance monitoring in the real-life circumstances. The authors have employed video frames which are extorted from...

    Provided By Computer Science Journals

  • White Papers // Apr 2013

    Cryptography and Authentication Placement to Provide Secure Channel for SCADA Communication

    Distributed Control Systems (DCSs) and Supervisory Control And Data Acquisition (SCADA) systems are widely used in real time industry infrastructures such as water pumping stations, gas, and oil and other real time deployments. SCADA implementation within a cloud computing environment is new and beneficial for real time infrastructures. Using cloud...

    Provided By Computer Science Journals

  • White Papers // Mar 2013

    Semantic Based Model for Text Document Clustering with Idioms

    In this paper, the authors address the task of developing an effective and efficient clustering methodology to take care of semantic structure of the text documents. A method has been developed that performs the following sequence of operations: tagging the documents for parsing, replacement of idioms with their original meaning,...

    Provided By Computer Science Journals

  • White Papers // Aug 2012

    New Framework to Detect and Prevent Denial of Service Attack in Cloud Computing Environment

    As a result of integration of many techniques such as grading, clustering, utilization computing and resource's sharing, cloud computing has been appeared as multi element's composition technology, it offers several computing services such as IaaS (Infrastructure as Service), PaaS (Platform as Service) and SaaS (Software as a Service) based on...

    Provided By Computer Science Journals

  • White Papers // Apr 2012

    Rethinking Embedded System Design

    Embedded engineering is designed using objects of nature and it also interacts with nature. Therefore, it is forced to obey the laws of nature. Nature does not make any assumptions. But all their mathematical and scientific theories do. Therefore, these theories cannot be valid for embedded engineering applications. In this...

    Provided By Computer Science Journals

  • White Papers // Apr 2012

    High Availability Based Migration Analysis to Cloud Computing for High Growth Businesses

    High availability requirement of the network is becoming essential for high growth disruptive technology companies. For businesses which require migration to networks supporting scalability and high availability, it is important to analyze the various factors and the cost effectiveness for choosing the optimal solution for them. The current paper considers...

    Provided By Computer Science Journals

  • White Papers // Mar 2012

    Data Dissemination in Wireless Sensor Networks: A State-of-the Art Survey

    A wireless sensor network is a network of tiny nodes with wireless sensing capacity for data collection processing and further communicating with the Base Station this paper discusses the overall mechanism of data dissemination right from data collection at the sensor nodes, clustering of sensor nodes, data aggregation at the...

    Provided By Computer Science Journals

  • White Papers // Feb 2012

    Defining Business Network

    The purpose of the present scientific contribution is to investigate from the business economics standpoing the emerging phenomenon of company networks. In particular, through the analysis of the theory of networks will be proposed the principal categories of business networks, and even before this the concept of the network will...

    Provided By Computer Science Journals

  • White Papers // Oct 2011

    A proposed Solution: Data Availability and Error Correction in Cloud Computing

    Cloud Computing is the hottest technology in the market these days, used to make storage of huge amounts of data and information easier for organizations. Maintaining servers to store all the information is quite expensive for individual and organizations. Cloud computing allows to store and maintain data on remote servers...

    Provided By Computer Science Journals

  • White Papers // Jan 2011

    Implementation of New Routing Protocol for Node Security in a Mobile Ad Hoc Network

    A routing protocol plays important role to handle entire network for communication and determines the paths of packets. A node is a part of the defined network for transferring information in form of packets. If all packets are transferred from source to destination successfully, it is assumed that the routing...

    Provided By Computer Science Journals

  • White Papers // Oct 2010

    Deploying e-Mail as an Official Communication Tool: Technical Prospect

    Applications are spreading widely through their lives entering every field controlling some of it and enhancing other; electronic mail, or e-mail, is the best known and most popular application of the Internet. More and more people see e-mail as a way to communicate quickly and affordably. Electronic mail can also...

    Provided By Computer Science Journals

  • White Papers // Sep 2010

    Implementation of Artificial Intelligence Techniques for Steady State Security Assessment in Pool Market

    Various techniques have been implemented to include steady state security assessment in the analysis of trading in deregulated power system, however most of these techniques lack requirements of fast computational time with acceptable accuracy. The problem is compounded further by the requirements to consider bus voltages and thermal line limits....

    Provided By Computer Science Journals

  • White Papers // Aug 2010

    New Trust Based Security Method for Mobile Ad-Hoc Networks

    Secure routing is the milestone in mobile ad hoc networks .Ad hoc networks are widely used in military and other scientific areas with nodes which can move arbitrarily and connect to any nodes at will, it is impossible for Ad hoc network to own a fixed infrastructure. It also has...

    Provided By Computer Science Journals

  • White Papers // Jul 2010

    A Robust Approach to Detect and Prevent Network Layer Attacks in MANETS

    A dynamic wireless network that is formed without any pre-existing infrastructure, in which every node can act as a router is called a Mobile Ad hoc NETwork (MANET). Since MANETS has not got clear cut security provisions, it is accessible to any of the authorized network users and malicious attackers....

    Provided By Computer Science Journals

  • White Papers // Mar 2010

    Run-Time Adaptive Processor Allocation of Self-Configurable Intel IXP2400 Network Processor

    An ideal Network Processor (NP), that is, a programmable multi-processor device must be capable of offering both the flexibility and speed required for packet processing. But current Network Processor systems generally fall short of the above benchmarks due to traffic fluctuations inherent in packet networks, and the resulting workload variation...

    Provided By Computer Science Journals

  • White Papers // Feb 2010

    Hybrid Compression Encryption Technique for Securing SMS

    Mobile communication devices have become popular tools for gathering and disseminating information and data. When sensitive information is exchanged using SMS, it is crucial to protect the content from eavesdroppers as well as ensuring that the message is sent by a legitimate sender. Using an encryption technique to secure SMS...

    Provided By Computer Science Journals

  • White Papers // Jan 2010

    Integrated DWDM and MIMO-OFDM System for 4G High Capacity Mobile Communication

    Dense Wavelength-Division Multiplexing (DWDM) technique is a very promising data transmission technology for utilizing the capacity of the fiber. By DWDM, multiple signals (video, audio, data etc) staggered in wavelength domain can be multiplexed and transmitted down the same fiber. The Multiple-Input Multiple-Output (MIMO) wireless technology in combination with Orthogonal...

    Provided By Computer Science Journals

  • White Papers // Sep 2010

    Implementation of Artificial Intelligence Techniques for Steady State Security Assessment in Pool Market

    Various techniques have been implemented to include steady state security assessment in the analysis of trading in deregulated power system, however most of these techniques lack requirements of fast computational time with acceptable accuracy. The problem is compounded further by the requirements to consider bus voltages and thermal line limits....

    Provided By Computer Science Journals

  • White Papers // Aug 2010

    New Trust Based Security Method for Mobile Ad-Hoc Networks

    Secure routing is the milestone in mobile ad hoc networks .Ad hoc networks are widely used in military and other scientific areas with nodes which can move arbitrarily and connect to any nodes at will, it is impossible for Ad hoc network to own a fixed infrastructure. It also has...

    Provided By Computer Science Journals

  • White Papers // Jan 2011

    Implementation of New Routing Protocol for Node Security in a Mobile Ad Hoc Network

    A routing protocol plays important role to handle entire network for communication and determines the paths of packets. A node is a part of the defined network for transferring information in form of packets. If all packets are transferred from source to destination successfully, it is assumed that the routing...

    Provided By Computer Science Journals

  • White Papers // Oct 2010

    Deploying e-Mail as an Official Communication Tool: Technical Prospect

    Applications are spreading widely through their lives entering every field controlling some of it and enhancing other; electronic mail, or e-mail, is the best known and most popular application of the Internet. More and more people see e-mail as a way to communicate quickly and affordably. Electronic mail can also...

    Provided By Computer Science Journals

  • White Papers // Jul 2010

    A Robust Approach to Detect and Prevent Network Layer Attacks in MANETS

    A dynamic wireless network that is formed without any pre-existing infrastructure, in which every node can act as a router is called a Mobile Ad hoc NETwork (MANET). Since MANETS has not got clear cut security provisions, it is accessible to any of the authorized network users and malicious attackers....

    Provided By Computer Science Journals

  • White Papers // Jan 2010

    A Wavelet - Based Object Watermarking System for MPEG4 Video

    Efficient storage, transmission and use of video information are key requirements in many multimedia applications currently being addressed by MPEG-4. To fulfill these requirements, a new approach for representing video information which relies on an object-based representation, has been adopted. Therefore, object based watermarking schemes are needed for copyright protection....

    Provided By Computer Science Journals

  • White Papers // Mar 2012

    Data Dissemination in Wireless Sensor Networks: A State-of-the Art Survey

    A wireless sensor network is a network of tiny nodes with wireless sensing capacity for data collection processing and further communicating with the Base Station this paper discusses the overall mechanism of data dissemination right from data collection at the sensor nodes, clustering of sensor nodes, data aggregation at the...

    Provided By Computer Science Journals

  • White Papers // Jan 2010

    Integrated DWDM and MIMO-OFDM System for 4G High Capacity Mobile Communication

    Dense Wavelength-Division Multiplexing (DWDM) technique is a very promising data transmission technology for utilizing the capacity of the fiber. By DWDM, multiple signals (video, audio, data etc) staggered in wavelength domain can be multiplexed and transmitted down the same fiber. The Multiple-Input Multiple-Output (MIMO) wireless technology in combination with Orthogonal...

    Provided By Computer Science Journals

  • White Papers // Feb 2010

    Hybrid Compression Encryption Technique for Securing SMS

    Mobile communication devices have become popular tools for gathering and disseminating information and data. When sensitive information is exchanged using SMS, it is crucial to protect the content from eavesdroppers as well as ensuring that the message is sent by a legitimate sender. Using an encryption technique to secure SMS...

    Provided By Computer Science Journals

  • White Papers // Apr 2012

    Rethinking Embedded System Design

    Embedded engineering is designed using objects of nature and it also interacts with nature. Therefore, it is forced to obey the laws of nature. Nature does not make any assumptions. But all their mathematical and scientific theories do. Therefore, these theories cannot be valid for embedded engineering applications. In this...

    Provided By Computer Science Journals

  • White Papers // May 2013

    Conceptual Model of Real Time Infrastructure Within Cloud Computing Environment

    Cloud computing is a new and most demandable technology in communication environment. Where computing resources such as hardware or/and software are processed as service over networks. SCADA implementation within cloud environment is relatively new and demandable over real time infrastructure (industrial infrastructure).The shifting (moving) of SCADA system (applications and resources)...

    Provided By Computer Science Journals

  • White Papers // Oct 2013

    Face Images Database Indexing for Person Identification Problem

    Face biometric data are with high dimensional features and hence, traditional searching techniques are not applicable to retrieve them. As a consequence, it is an issue to identify a person with face data from a large pool of face database in real-time. This paper addresses this issue and proposes an...

    Provided By Computer Science Journals

  • White Papers // Apr 2013

    Cryptography and Authentication Placement to Provide Secure Channel for SCADA Communication

    Distributed Control Systems (DCSs) and Supervisory Control And Data Acquisition (SCADA) systems are widely used in real time industry infrastructures such as water pumping stations, gas, and oil and other real time deployments. SCADA implementation within a cloud computing environment is new and beneficial for real time infrastructures. Using cloud...

    Provided By Computer Science Journals

  • White Papers // Jun 2013

    Multimodal Biometrics at Feature Level Fusion Using Texture Features

    In recent years, fusion of multiple biometric modalities for personal authentication has received considerable attention. This paper presents a feature level fusion algorithm based on texture features. The system combines fingerprint, face and off-line signature. Texture features are extracted from curvelet transform. The curvelet feature dimension is selected based on...

    Provided By Computer Science Journals

  • White Papers // Mar 2010

    Run-Time Adaptive Processor Allocation of Self-Configurable Intel IXP2400 Network Processor

    An ideal Network Processor (NP), that is, a programmable multi-processor device must be capable of offering both the flexibility and speed required for packet processing. But current Network Processor systems generally fall short of the above benchmarks due to traffic fluctuations inherent in packet networks, and the resulting workload variation...

    Provided By Computer Science Journals

  • White Papers // Mar 2013

    Semantic Based Model for Text Document Clustering with Idioms

    In this paper, the authors address the task of developing an effective and efficient clustering methodology to take care of semantic structure of the text documents. A method has been developed that performs the following sequence of operations: tagging the documents for parsing, replacement of idioms with their original meaning,...

    Provided By Computer Science Journals

  • White Papers // Jun 2013

    Malicious Node Detection Mechanism for Wireless Ad Hoc Network

    With the popularity of intelligent electronics which rely on wireless communication in the post-PC era, computing devices have become cheaper, smaller, more mobile and more pervasive in daily lives. Construction of wireless ad hoc network becomes more and more convenient. However, the deployment of sensor nodes in an unattended environment...

    Provided By Computer Science Journals

  • White Papers // Sep 2009

    Implementing a Functional ISO 9001 Quality Management System in Small and Medium-Sized Enterprises

    This paper provides guidance for the implementation of a functional ISO 9001 Quality Management System (QMS) in Small and Medium-sized Enterprises (SMEs). To help a SME understand its starting point, four initial states for QMS implementation are defined. Five paths for moving the QMS from the initial state to the...

    Provided By Computer Science Journals

  • White Papers // Feb 2012

    Defining Business Network

    The purpose of the present scientific contribution is to investigate from the business economics standpoing the emerging phenomenon of company networks. In particular, through the analysis of the theory of networks will be proposed the principal categories of business networks, and even before this the concept of the network will...

    Provided By Computer Science Journals

  • White Papers // Apr 2012

    High Availability Based Migration Analysis to Cloud Computing for High Growth Businesses

    High availability requirement of the network is becoming essential for high growth disruptive technology companies. For businesses which require migration to networks supporting scalability and high availability, it is important to analyze the various factors and the cost effectiveness for choosing the optimal solution for them. The current paper considers...

    Provided By Computer Science Journals

  • White Papers // Aug 2012

    New Framework to Detect and Prevent Denial of Service Attack in Cloud Computing Environment

    As a result of integration of many techniques such as grading, clustering, utilization computing and resource's sharing, cloud computing has been appeared as multi element's composition technology, it offers several computing services such as IaaS (Infrastructure as Service), PaaS (Platform as Service) and SaaS (Software as a Service) based on...

    Provided By Computer Science Journals

  • White Papers // Oct 2011

    A proposed Solution: Data Availability and Error Correction in Cloud Computing

    Cloud Computing is the hottest technology in the market these days, used to make storage of huge amounts of data and information easier for organizations. Maintaining servers to store all the information is quite expensive for individual and organizations. Cloud computing allows to store and maintain data on remote servers...

    Provided By Computer Science Journals

  • White Papers // Feb 2009

    Identity-Based Key Management in MANETs Using Public Key Cryptography

    Wireless Mobile Ad Hoc NETworks (MANETs) are an emerging area of mobile computing. MANETs face serious security problems due to their unique characteristics such as mobility, dynamic topology and lack of central infrastructure support. In conventional networks, deploying a robust and reliable security scheme such as Public Key Infrastructure (PKI)...

    Provided By Computer Science Journals

  • White Papers // May 2014

    A Comparative Study: Gammachirp Wavelets and Auditory Filter Using Prosodic Features of Speech Recognition In Noisy Environment

    Modern Automatic Speech Recognition (ASR) systems typically use a bank of linear filters as the first step in performing frequency analysis of speech. On the other hand, the cochlea, which is responsible for frequency analysis in the human auditory system, is known to have a compressive non-linear frequency response which...

    Provided By Computer Science Journals

  • White Papers // Sep 2014

    Banking and Modern Payments System Security Analysis

    Cyber-criminals have benefited from Online Banking (OB), regardless of the extensive research on financial cyber-security. To better be prepared for what the future might bring, the authors try to predict how hacking tools might evolve. They briefly survey the state-of-the-art tools developed by blackhat hackers and conclude that they could...

    Provided By Computer Science Journals

  • White Papers // May 2014

    DNS Advanced Attacks and Analysis

    Now-a-days DNS is used to load balance, failover, and geographically redirect connections. DNS has become so pervasive it is hard to identify a modern TCP/IP connection that does not use DNS in some way. Unfortunately, due to the reliability built into the fundamental RFC-based design of DNS, most IT professionals...

    Provided By Computer Science Journals

  • White Papers // Feb 2014

    Efficient Coercion Resistant Public Key Encryption

    The notion of deniable encryption has been known in the literature since its introduction in as coercion resistant encryption schemes that allow the user (sender and/or receiver) to escape a coercion attempted by a coercive adversary. The schemes allow the user to open fake message(s) to the coercer that when...

    Provided By Computer Science Journals

  • White Papers // Aug 2014

    PI-Tool To Improve Performance of Application In Multi-core Architecture

    Multi-core CPUs become increasingly popular on server-grade hardware as well as end-user desktop PCs or laptops. Necessary efforts are taken in the community towards developing applications optimized for multi-core architecture; still every user is expecting to run applications or programs with more speed than normal execution. In order to achieve...

    Provided By Computer Science Journals

  • White Papers // Aug 2014

    Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology

    In recent years, global Online Social Network (OSN) usage has increased sharply as these networks become interwoven into people's everyday lives as places to meet and communicate with others. Social networks can offer many services to the users for sharing activities events and their ideas. Many attacks can happen to...

    Provided By Computer Science Journals

  • White Papers // Aug 2014

    Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit Detection

    Since its introduction in 1994 the Secure Socket Layer (SSL) protocol (later renamed to Transport Layer Security (TLS)) evolved to the de facto standard for securing the transport layer. SSL/TLS can be used for ensuring data confidentiality, integrity and authenticity during transport. A main feature of the protocol is its...

    Provided By Computer Science Journals

  • White Papers // Jun 2014

    Designing An Effective Mobile-learning Model By Integrating Student Culture

    Mobile learning is a good technology because it allows communication, collaboration, and sharing information or resources among all of learning members. Mobile learning can be used as perfect solutions to support the learning process. Thither are many concepts and factors influencing effective learning results through creativity, collaboration, and communication. However,...

    Provided By Computer Science Journals

  • White Papers // Jan 2014

    Software Process Control on Ungrouped Data: Log-Power Model

    Statistical Process Control (SPC) is the best choice to monitor software reliability process. It assists the software development team to identify and actions to be taken during software failure process and hence, assures better software reliability. In this paper, the authors propose a control mechanism based on the cumulative observations...

    Provided By Computer Science Journals

  • White Papers // May 2014

    A Review of RUP (Rational Unified Process)

    RUP (Rational Unified Process) is an iterative process for software development; originally proposed in 1988 as the rational objectory process. The researcher then proposed the unified process. The rational unified process can also be regarded as a software engineering process, delivered through a web-enabled, searchable knowledge base. This paper represents...

    Provided By Computer Science Journals

  • White Papers // Sep 2014

    Farthest Neighbor Approach for Finding Initial Centroids in K-Means

    Text document clustering is gaining popularity in the knowledge discovery field for effectively navigating, browsing and organizing large amounts of textual information into a small number of meaningful clusters. Text mining is a semi-automated process of extracting knowledge from voluminous unstructured data. A widely studied data mining problem in the...

    Provided By Computer Science Journals

  • White Papers // Mar 2014

    SIP-Based Mobility Management for LTE-WiMAX-WLAN Interworking Using IMS Architecture

    In this paper, the authors propose an architecture framework for interworking of Long Term Evolution (LTE), Worldwide Interoperability for Microwave Access (WiMAX) and Wireless Local Area Network (WLAN) technologies. The aim is to offer users of various networks seamless high quality IP-based multimedia services access anywhere at any time. IP...

    Provided By Computer Science Journals

  • White Papers // May 2014

    Shared Spectrum Throughput for Secondary Users

    The throughput performance of secondary users sharing radio spectrum with a licensed primary user is analyzed in this paper. An asynchronous transmission, sensing and backoff protocol is proposed for the secondary user and modeled as a six state Markov process. The model parameters are derived as a function of the...

    Provided By Computer Science Journals

  • White Papers // Jun 2014

    Design And Evaluation of Time Slot Assignment Algorithm For IEEE 802.16j Relay Networks

    In IEEE 802.16j relay networks, wireless communications are carried out based on TDMA where the wireless network resources are divided into multiple time slots and they are assigned to wireless links between relay nodes as transmission opportunities. The network performance is improved by decreasing the total number of different time...

    Provided By Computer Science Journals

  • White Papers // Jun 2014

    Using GIS in Designing and Deploying Wireless Network in City Plans

    Site surveys play a very important role in the successful and efficient deployment of wireless networks. The first step is to understand the basic goal of a wireless network, which is mainly to provide an appropriate coverage and throughput to all end users with high efficiency, full coverage and reasonable...

    Provided By Computer Science Journals

  • White Papers // Mar 2014

    Password Security

    In this paper, the authors investigate users' behavior in password utilization. Good password practices are critical to the security of any information system. End users often use weak passwords that are short, simple, and based on personal and meaningful information that can be easily guessed. A survey was conducted among...

    Provided By Computer Science Journals

  • White Papers // Jun 2014

    Secure Linear Transformation Based Cryptosystem Using Dynamic Byte Substitution

    The information must be secure while transmission. Cryptography is one of the methods to attain security. Many classical cryptosystems are developed based on simple substitution. Hybrid cryptosystem using byte substitution and variable length sub key groups is a simple nonlinear algorithm but the cryptanalyst can find the length of each...

    Provided By Computer Science Journals