International Association of Computer Science and Information Technology(IACSIT)

Displaying 1-40 of 336 results

  • White Papers // Jan 2015

    The Influence of Trust and Commitment on Customer Relationship Management Performance in Mobile Phone Services

    Customer Relationship Management performance (CRM) is to establish the relationship between customer and service providers. The tangible and intangible results of customer relationship management performance are repeat purchase, word of mouth, retention, brand loyalty and customer satisfaction. The increasing numbers of mobile phone users all over the world has influence...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jan 2015

    Performance Investigations of Routing Protocols in VANET under IPv4 and IPv6

    Recent advances in wireless technologies have given rise to the emergence of Vehicular Ad hoc NETworks (VANETs). In such networks, the limited coverage of Wi-Fi and the high mobility of the nodes generate frequent topology changes and network fragmentations. Vehicular Ad-hoc NETworks (VANETs) are a special type of ad-hoc networks....

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jan 2015

    Multilayer Secured SIP Based VoIP Architecture

    VoIP faces many emerging attacks and threats. Securing SIP based VoIP is a major challenging task, hence confidentiality, integrity, availability, as well as authenticity must be provided. Focusing on three main critical attacks targeting SIP based VoIP infrastructure, which are Denial of Service (DoS), man-in-the middle attack, and authenticity based...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jan 2015

    ID-Based Non-Interactive Universal Designated Verifier Signature for Privacy-Preserving Applications

    A Universal Designated Verifier Signature (UDVS) scheme is an ideal mechanism for preventing any signature holder from arbitrarily disseminating the signature, so as to protect the privacy of original signer. Such schemes are suitable for applications like the certificate of medical records and income summary, etc. In this scheme, a...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jan 2015

    Performance Evaluation of Multimedia over IP/MPLS Networks

    In this paper, the authors describe performance evaluation of multimedia data streaming over IP and MPLS networks using OPNET simulation tools. The experimental study is carried out by employing VOIP and video streaming applications in both networks with same parameters; but with different routing mechanisms. Therefore, same network model scenario...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jan 2015

    Joint Lifetime and Data Rate Optimization in Wireless Networks via Decomposition Techniques

    Jointly maximizing network lifetime and data rate emerges as a hard task on optimization in wireless networks. For this problem under network coding, the authors introduce a cross-layer formulation with nonlinear programming model to accommodate routing, scheduling, and stream control from different layers in the network-coded wireless networks. In particular,...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jan 2015

    An Overview of Bayesian Network Applications in Uncertain Domains

    Uncertainty is a major barrier in knowledge discovery from complex problem domains. Knowledge discovery in such domains requires qualitative rather than quantitative analysis. Therefore, the quantitative measures can be used to represent uncertainty with the integration of various models. The Bayesian Network (BN) is a widely applied technique for characterization...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Dec 2014

    Predicting Time Series Using Integration of Moving Average and Support Vector Regression

    Time series prediction is one of the major tasks in the field of data mining. The approaches of time series prediction can be divided into statistical techniques and computational intelligence techniques. Most researchers use one specific approach and compare the performance with other approaches. This paper proposes a novel hybrid...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Oct 2014

    Cluster Based Hierarchical Routing Protocol for WSN with Energy Efficiency

    Recent advances in the field of electronics and communication leads to development of tiny battery enabled sensor nodes. These sensor nodes are randomly deployed as a wireless sensor network for sensing environment. Over the years, the most important problem in wireless sensor network is to develop a routing protocol that...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Oct 2014

    A Categorized Item Recommender System Coping with User Interest Changes

    One significant characteristic of data in specific domain like movie challenges research in recommender systems that user preferences naturally changes over time. Traditional Collaborative Filtering (CF) method does not take in consideration sequences of customer's rating, which reflects changes of customer's preference over a period of time. This paper proposes...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Aug 2014

    A LDA-Based Approach for Semi-Supervised Document Clustering

    In this paper, the authors develop an approach for semi-supervised document clustering based on Latent Dirichlet Allocation (LDA), namely LLDA. A small amount of labeled documents are used to indicate user's document grouping preference. A generative model is investigated to jointly model documents and the small amount of document labels....

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Aug 2014

    A Novel Method to Protect Content of Microsoft Word Document Using Cryptography and Steganography

    Microsoft Word is the most famous and popular word processor in the world now-a-days and the last versions of it depend on eXtended Markup Language (XML) by using Open Office XML format (OOXML). Usually MS Word document contain sensitive data, this document may be sending over internet, via email or...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jun 2014

    On a Characteristic of Data Transmission In Bus Network

    Bus network is a primary topology in local area network and the network had a problem of data collision on the bus which influenced the efficiency of data transmission. Recently, using switching-hub that establishes a link from a sending station to a receiving station, the number of data collisions extremely...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jun 2014

    Iris Recognition Using Fuzzy Level Set and GEFE

    In this paper, the authors present an efficient algorithm for iris recognition using the spatial fuzzy clustering with level set method, and genetic and evolutionary feature extraction techniques. The novelty of this research effort is that they deploy a Fuzzy C-Means clustering with Level Set (FCMLS) method in an effort...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jun 2014

    Transmission Sequence Adjustment Scheme for Improving Fairness in Wireless LANs

    In a wireless LAN, multimedia traffic is one of important traffic types. However, it is not easy to transmit multimedia traffic in a wireless LAN because it requires strict assurance for delay and loss. Although a multimedia packet is sent to a receiver without an error, it is discarded, if...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jun 2014

    Design of Networked Control System With Discrete-Time State Predictor Over WSN

    In this paper, the authors have designed a Networked Control System (NCS) with discrete-time state predictor where the communication between the controller output and the plant input takes place over a Wireless Sensor Network (WSN). In order to measure time delays between the controller output and the plant input in...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jun 2014

    An Evaluation of MPLS-TE Based PMIPv6 Network

    In this paper, the authors gives some results for a simulation of a Proxy Mobile IPv6 (PMIPv6) network based upon Multi-Protocol Label Switching with Traffic Engineering (MPLS-TE) for handling packet forwarding through the network and handling link or node failure. These results are compared with results from a simulation of...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jun 2014

    Improvement of Thorup Shortest Path Algorithm by Reducing the Depth of a Component Tree

    In this paper, the authors have proposed a variant of the Thorup algorithm which showed a better result than the original Thorup algorithm and the Fibonacci-based Dijkstra algorithm in practice. In this paper, they propose a faster algorithm based on their work. Their new algorithm has a faster speed when...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jun 2014

    Hybrid Compression Algorithm for Wireless Sensor Network

    Wireless Sensor Network (WSN) is composed of multiple battery-operated nodes .These nodes consist of a micro - electro mechanical system, a low-power digital signal processor, a radio frequency circuit, and a battery. Discrete Wavelet Transform (DWT) was developed to improve the performance of data compression. Hybrid fast zonal-Discrete Cosine Transform...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jun 2014

    Learning from Large Distributed Data: A Scaling Down Sampling Scheme for Efficient Data Processing

    Extracting information from a training data set for predictive inference is a fundamental task in data mining and machine learning. With the exponential growth in the amount of data being generated in the past few years, there is an urgent need to develop or adapt existing learning algorithms to efficiently...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // May 2014

    A Unified Architecture for Optimal Resource Utilization in a Heterogeneous Cloud Environment

    Cloud computing is the latest effort in the field of computer technology in delivering computing resources as a service. It is a paradigm shift taken from computing as a product that is to be purchased to computing as a service that is delivered to consumers as 'Pay-per-use' over the internet...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // May 2014

    The Impact of Cloud Computing on ITIL Service Strategy Processes

    Cloud computing has become an increasingly popular means of delivering precious IT enabled business services. Customers and end users access the IT services catalog through self-service portals, using and paying for only those services they need, when and where they need them. When an organization adopts cloud computing it quickly...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Apr 2014

    Predicting Utilization of Server Resources from Log Data

    In this paper, the authors propose a model to predict resource utilization matrix for a given workload by mining the information residing in application as well as system logs for resource utilization. Unlike regression based or queuing network based approaches, their mechanism neither requires estimating per-function resource utilization nor does...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Apr 2014

    SMS Classification Based on Naive Bayes Classifier and Apriori Algorithm Frequent Itemset

    As the mobile phone market is rapidly expanding and the modern life is heavily dependent on cell phones, Short Message Service (SMS) has become one of the important media of communications. In this paper, the authors propose a hybrid system of SMS classification to detect spam or ham, using Naive...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Apr 2014

    Anomaly Detection in Application Performance Monitoring Data

    Performance issues and outages in IT systems have significant impact on business. Traditional methods for identifying these issues based on rules and simple statistics have become ineffective due to the complexity of the underlying systems, the volume and variety of performance metrics collected and the desire to correlate unusual application...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Apr 2014

    Identifying Defining Aspects of Chronic Fatigue Syndrome Via Unsupervised Machine Learning and Feature Selection

    In this paper, the authors propose an unsupervised machine learning method of predicting Chronic Fatigue Syndrome (CFS) based on the k-means algorithm using self-reported questionnaire responses. They first suggest a method of determining the presence of a symptom based on its frequency and severity using an unsupervised dynamic thresholding approach....

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Mar 2014

    Prediction of Investment Patterns Using Data Mining Techniques

    Risk taking capability of a person in the financial market is based on many factors including demographic factors like age, education, marital status etc. In this paper in order to analyze the various investment instruments used by the people of different profiles; the authors have applied fuzzy data mining technique...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Mar 2014

    A Hacking Case Study: Detection, Communication, and Code

    In this paper, the authors discuss the techniques used in an actual hacking case which was took place in an academic organization. The paper describes the methodology used by the hacker to infiltrate several faculty members' desktop machines and embed malware to gain access to private information and manipulate student...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Mar 2014

    A Low Multiplicative Complexity of Proposed FFT/IFFTs Design Applied for OFDM-Based Wireless Communication Systems

    Low arithmetic complexity and High speed of Fast Fourier transforms (FFT)/Inverse FFT (IFFT) processor is required in many applications in Orthogonal Frequency Division Multiplexing (OFDM)-based wireless broadband communication systems. For this reason, it's essential to develop an optimum complexity design FFT/IFFT processor to meet the low power and real time...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Mar 2014

    Research of Networked Control System Based on Fuzzy Adaptive PID Controller

    Networked control system has recently been a hotspot in the research fields of control theory and control engineering application, which has the advantages of resource sharing, fewer cables, easy to extend and maintain, etc. As the controlled object includes complicated control network and physical object, the controller of networked control...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Mar 2014

    A Front-End Processing Using Subspace-Based Speech Enhancement Over Mobile Devices

    The paradigm multi-stream has been shown to result in features combined that can help to increase the robustness of Distributed Speech Recognition (DSR) in the mobile communications. In this paper, the author's employs a combination of post proceeded Mel-Frequency Cepstral Coefficients (MFCCs) and Line Spectral Frequencies (LSFs) features projected in...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Feb 2014

    Protein Function Prediction Using Semantic Driven K-Medoids Clustering Algorithm

    The proposed protein function prediction methods are mostly based on sequence or structure protein similarity and do not take into account the semantic similarity extracted from protein knowledge databases such as Gene Ontology. Many studies have shown that identification of protein complexes or functional modules can be effectively done by...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jan 2014

    Analysis of the Effect of Clustering the Training Data in Naive Bayes Classifier for Anomaly Network Intrusion Detection

    In this paper, the authors present the analysis of the effect of clustering the training data and test data in classification efficiency of Naive Bayes classifier. KDD cup 99 benchmark dataset is used in this research. The training set is clustered using k means clustering algorithm into 5 clusters. Then...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jan 2014

    Improving Reliability Against Security Attacks by Identifying Reliance Node in MANET

    Mobile Ad-hoc NETwork (MANET) has unstructured infrastructure and form arbitrary topologies. All nodes are capable of movement and can be connected dynamically in arbitrary manner. Although the user want wireless connectivity irrespective of their geographic positions. Mobile Ad-hoc NETwork (MANET) is one among them. Due to the mobility connection these...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jan 2014

    Channel Encryption in Wireless Camera Sensor Network

    The network security is an important objective in the design and implementation of Wireless Camera Sensor Network (WCSN), since components designed without security can become a point of attack. Data security is one of the greatest problems in Wireless Camera Sensor Network (WCSN). Many encryption algorithms are used for encryption...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jan 2014

    Design of Application Layer Services for Security Automation via a Web Service Approach

    N-tier application design has become very common in the IT industry. Each individual layer, such as the application and data layer has its own main functionality. This design is very helpful in securing the application from unauthorized access and in protecting it from attacks to the data layer. The data...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jan 2014

    A New Tier Based Approach for Clustered Content Centric Networks Implementing Cloud Computing

    Since last four decades, internet exploration and innovation has touched new horizons but all that advancement in realm of internet was based on peer to peer interaction or mostly client server topology. There were many loop holes in such configuration as all the communication was machine identified and all the...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jan 2014

    Measuring Information Quality for Privacy Preserving Data Mining

    In the strive for knowledge discovery in a world of ever-growing data collection, it is important that even if a dataset is altered to preserve people's privacy, the information in the dataset retains as much quality as possible. In this context, \"Quality\" refers to the accuracy or usefulness of the...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jan 2014

    An Architecture for Measuring Network Performance in Multi-Core Multi-Cluster Architecture (MCMCA)

    In this paper the authors design a new architecture for large-scale clusters to improve the communication within the interconnection network to gain higher performance. The new architecture will be based on clusters built using workstations containing multi-cored processors in a multi-cluster architecture in the presence of uniform traffic. Multi-core technology...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jan 2014

    Preserving Privacy in Outsourced Database

    The data rapidly increases with time. To deal massive data, or called big data, the idea of database as a service has been proposed. Outsourced database provider offers a lot of computing power and storage area. For organizations, they do not need to build their own infrastructure. It can reduce...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Mar 2013

    An Investigation of the Efficacy of the Off-the-Shelf Malware Scanners and Combination Techniques

    The author was intrigued by the Antivirus term, how it works,, whether its designers understand the operating system more than the operating system vendors or not as well as the big question of how safe they are in practice because they are really rely on this term to protect all...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // May 2013

    Measuring Database Objects Relatedness in Peer-to-Peer Databases

    Peer-To-Peer database management systems have become an important topic in the last few years. They rise up P2P technology to exploit the power of available distributed database management system technologies. Identifying relationship between different peer schema objects is one of the main activities so semantically relevant peer database management systems...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // May 2013

    A New Model for Web Content Distributed Data Mining Based on SOAP and Ontology

    The increasing amount of data in many web content systems has resulted in interesting opportunities for data driven knowledge discovery and data mining techniques. The aim of this paper is to propose a web content distributed data mining model) to get the benefits from these opportunities. The proposed model tries...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Mar 2013

    An Approach for Secure Data Storage in Cloud Environment

    Cloud computing provides the facility to access shared resources and common infrastructure, offering services on demand over the network to perform operations that meet changing business needs. The location of physical resources and devices being accessed are typically not known to the end user. It also provides facilities for users...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // May 2013

    Integration of Hierarchical Access Control and Keyword Search Encryption in Cloud Computing Environment

    An increasing number of applications have been proposed and discussed on the cloud computing environment because it can bring many benefits like reducing the cost of maintaining data centers in an enterprise, low data management cost and retrieval of data whenever the user want, etc. As more and more sensitive...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // May 2013

    Medical Diagnosis Expert System as Service in Cloud

    With the technological advancements in information technology, cloud computing provides several opportunities and services to users like storing personal information, accessing various web services for online transactions, online diagnosis systems etc.,. But security in cloud is biggest challenge which poses threat to individual privacy and misuse without knowledge of data...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // May 2013

    Cloud Computing and Its Vision 2015!!

    Cloud computing - "The cloud" is a familiar cliche for the internet, but when combined with "Computing", the meaning gets bigger and fuzzier. Being built on decades of research; Cloud Computing utilizes all recent achievements in virtualization, distributed and utility computing and networking. It implies a service oriented architecture through...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // May 2013

    Cloud Computing Regulation: An Attempt to Protect Personal Data Transmission to Cross-Border Cloud Computing Storage Services

    Cloud computing has become popular for its users who need low-cost and large scale computing. Lately, international and regional organizations as well as governments have begun to understand the legal impact of cross border cloud computing storage service on individuals' personal data. To meet the need of personal data protection...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // May 2012

    Research of the Multi-Dimensional Cloud Classification Algorithm

    Data classification is the basic approach of data mining and Knowledge Discovery in Databases (KDD). In recent years, cloud classifier based on the cloud theory has been proposed. The most difference between cloud classifier and the traditional classifiers was that classified boundary of cloud classifier is fuzzy. Since current research...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jul 2012

    Design and Implementation of Digital Map Products Contributing GIS Perspective Based on Cloud Computing

    In this paper, the authors describe an augmented reality system for defense technologies and present a novel approach to a Collaboration Interaction Model (CIM) combining context-aware and mobile augmented reality devices. This model is aware of a user's context through user-centric integration and inference of contextual information in geocloud space....

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Sep 2012

    Account-Based Cloud Storage Service Virtualization

    Public cloud storage services offer convenient file sharing and backup services. However, many enterprises have been wary to employ these services and some even prohibit their employees from using such services for business data due to concerns over privacy, security, control of their assets, and vendor lock-in issues. To address...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jan 2013

    Replication of Data in Database Systems for Backup and Failover - An Overview

    The production database are transactions intensive transactions can be insert, update on the tables, failover is the replica of the production server, if there is any change, the authors have to implement on the production and it will be automatically implemented on failover or standby database. Now-a-days the data on...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jan 2013

    Study of SQL Injection Attacks and Countermeasures

    SQL injection is an attack technique that exploits a security vulnerability occurring in the database layer of an application and a service. This is most often found within web pages with dynamic content. This paper provides taxonomy on SQL injection prevention and detection approaches. Furthermore, for each type of vulnerability,...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // May 2012

    Automatic Translation of Heterogeneous Data Models

    Schema translation is the process of transforming schemas in heterogeneous data models into a single target data model. Today there exist various data models to save useful data. The need of schema translation rises due to the existence of wide range of prominent, heterogeneous database applications. Due to the increasing...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // May 2012

    Using Machine Translators in Textual Data Classification

    In this paper, the effect of machine translators in the textual data classification is examined by using supervised classification methods. The developed system first analyzes and classifies an input text in one language, and then analyzes and classifies the same text in another language generated by machine translators from the...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jan 2013

    Look Beyond Utility Model - Disruptive Cloud Computing for Future ICT4D Research

    Cloud computing is becoming a buzz word for both academic discussion and industrial practice. Not only for firms but also for general public service is increasingly relying on cloud computing to transform ICT-based innovation. Given the ICT4D specific context, the research is cornered around leveraging cloud computing utility model to...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jul 2013

    A New Efficient Protocol for Authenticated Key Agreement

    In this paper the authors propose an efficient and secure authenticated key agreement protocol based on DLP (Discrete Logarithm Problem). The main purpose of this paper is to achieve most of goals of key agreement. They show that their protocol meets the security attributes and strong against most of potential...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jul 2012

    Design a Hypercube-Tree Structure for Peer-to-Peer Streaming

    In a peer-to-peer environment, how to effectively use network topology to provide services which prevent interruption is the major challenge. However, both tree-based and mesh-based structures are used to solve this, but they also have some drawbacks. In this paper, the authors propose a Hypercube Tree Structure, referred to as...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jan 2014

    Analysis of the Effect of Clustering the Training Data in Naive Bayes Classifier for Anomaly Network Intrusion Detection

    In this paper, the authors present the analysis of the effect of clustering the training data and test data in classification efficiency of Naive Bayes classifier. KDD cup 99 benchmark dataset is used in this research. The training set is clustered using k means clustering algorithm into 5 clusters. Then...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Dec 2013

    Cloud Server Management Method with Random Remote Backups

    A cloud service provides the use of computing resources (hardware and software) that are delivered as a service over a network. The name comes from the use of a cloud-shaped symbol as an abstraction for the complex infrastructure it contains in system diagrams. Cloud computing entrusts remote services with a...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Dec 2013

    A Rule-Base Approach for WSN Application Development in a Cloud Environment

    The development of applications for wireless sensor networks can be a challenging task, requiring the developer to be knowledgeable of low-level issues from sensor platform, operating system, and programming language together with knowledge of the application domain. One consequence of this scenario is that the WSN programmer receives an overload...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jan 2014

    Improving Reliability Against Security Attacks by Identifying Reliance Node in MANET

    Mobile Ad-hoc NETwork (MANET) has unstructured infrastructure and form arbitrary topologies. All nodes are capable of movement and can be connected dynamically in arbitrary manner. Although the user want wireless connectivity irrespective of their geographic positions. Mobile Ad-hoc NETwork (MANET) is one among them. Due to the mobility connection these...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jan 2014

    Channel Encryption in Wireless Camera Sensor Network

    The network security is an important objective in the design and implementation of Wireless Camera Sensor Network (WCSN), since components designed without security can become a point of attack. Data security is one of the greatest problems in Wireless Camera Sensor Network (WCSN). Many encryption algorithms are used for encryption...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jan 2014

    Design of Application Layer Services for Security Automation via a Web Service Approach

    N-tier application design has become very common in the IT industry. Each individual layer, such as the application and data layer has its own main functionality. This design is very helpful in securing the application from unauthorized access and in protecting it from attacks to the data layer. The data...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jan 2014

    A New Tier Based Approach for Clustered Content Centric Networks Implementing Cloud Computing

    Since last four decades, internet exploration and innovation has touched new horizons but all that advancement in realm of internet was based on peer to peer interaction or mostly client server topology. There were many loop holes in such configuration as all the communication was machine identified and all the...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jun 2014

    On a Characteristic of Data Transmission In Bus Network

    Bus network is a primary topology in local area network and the network had a problem of data collision on the bus which influenced the efficiency of data transmission. Recently, using switching-hub that establishes a link from a sending station to a receiving station, the number of data collisions extremely...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jan 2014

    Measuring Information Quality for Privacy Preserving Data Mining

    In the strive for knowledge discovery in a world of ever-growing data collection, it is important that even if a dataset is altered to preserve people's privacy, the information in the dataset retains as much quality as possible. In this context, \"Quality\" refers to the accuracy or usefulness of the...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jan 2014

    An Architecture for Measuring Network Performance in Multi-Core Multi-Cluster Architecture (MCMCA)

    In this paper the authors design a new architecture for large-scale clusters to improve the communication within the interconnection network to gain higher performance. The new architecture will be based on clusters built using workstations containing multi-cored processors in a multi-cluster architecture in the presence of uniform traffic. Multi-core technology...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Apr 2014

    Predicting Utilization of Server Resources from Log Data

    In this paper, the authors propose a model to predict resource utilization matrix for a given workload by mining the information residing in application as well as system logs for resource utilization. Unlike regression based or queuing network based approaches, their mechanism neither requires estimating per-function resource utilization nor does...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jan 2014

    Preserving Privacy in Outsourced Database

    The data rapidly increases with time. To deal massive data, or called big data, the idea of database as a service has been proposed. Outsourced database provider offers a lot of computing power and storage area. For organizations, they do not need to build their own infrastructure. It can reduce...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // May 2014

    The Impact of Cloud Computing on ITIL Service Strategy Processes

    Cloud computing has become an increasingly popular means of delivering precious IT enabled business services. Customers and end users access the IT services catalog through self-service portals, using and paying for only those services they need, when and where they need them. When an organization adopts cloud computing it quickly...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Mar 2014

    Prediction of Investment Patterns Using Data Mining Techniques

    Risk taking capability of a person in the financial market is based on many factors including demographic factors like age, education, marital status etc. In this paper in order to analyze the various investment instruments used by the people of different profiles; the authors have applied fuzzy data mining technique...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Apr 2011

    Approaches to the Management of Economics Efficiency in Business Informatics

    This paper is devoted to issues connected with processes that can be used for management of economic efficiency of business informatics with the support of Business Intelligence. The authors analyze processes and create Reference management model for management of business informatics for management of business informatics and management of the...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jan 2013

    A Genetic Algorithm for Configuration of the Business Process Families

    Business Process Model Families (BPMF) captures all of the possible business processes that can be defined for a target domain of interest. Configuration problem which arises is defined as the problem of both, unique business process model derivation, and services selection optimally implementing the activities of the process model. There...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jan 2013

    The Research on Business Model Evaluation Based on Internet Free Services

    The development of Internet economy promotes the diversified proceeding of new economy's business model and innovational business logic and operation mode. Taking the typical internet corporations of china as samples, this essay analyzes the business logic which is based on strategy and establishes evaluation index system on the basis of...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jan 2013

    A Framework for Change Management in Business Process Modeling

    With the growing competition in the markets, the business processes of an organization must make necessary adjustments according to the new requirements. In other words, Changes in business processes as a key component of any organization, along with the success of the organization and aligned with the business environment and...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jan 2013

    E-Business Alignment and Performance Impact: A Survey of Small and Medium-Sized Enterprises (SMEs)

    Considering inherent resources constraint of many SMEs, the firm becomes more selective to invest on Internet-related technologies (e-business). Consequently, for effective e-business deployment, firm needs to align it to support the most strategic business areas. Therefore, this paper investigates the extent that e-business technology aligns with various SMEs functions. A...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jan 2013

    Realizing the Importance of User Participation and Business Process Reengineering During ERP Implementation

    Business Process Reengineering being an essential part of ERP implementation always need to be addressed for Implementation process to be successful. The objective of this research is to explore the importance given to these factors by the top management during ERP implementation. In this regard, a case study was conducted...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jan 2013

    A New Queuing System with Different Classes of Customers

    Flexibility is an essential concept for businesses to deal within the rapid change in the business environment. Currently, customers have a power to guide the companies and manufactures as they tell the companies their requirements and thus the companies must attract the best customers to join their services. In this...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jan 2013

    Connecting the Dots - Review of Enterprise 2.0 Impact on Organization Structure Development

    Enterprise 2.0, as one of the most popular Information Technology (IT) innovation has attracted tremendous attention from both business managers and academic scholars. Since the invention of this term by McAfee, the long-hold dream of enabling knowledge workers to realize the \"Intangible organizational capital\" suddenly appears promising. From the on-going...

    Provided By International Association of Computer Science and Information Technology(IACSIT)