International Association of Computer Science and Information Technology(IACSIT)

Displaying 1-40 of 337 results

  • White Papers // Jan 2015

    The Influence of Trust and Commitment on Customer Relationship Management Performance in Mobile Phone Services

    Customer Relationship Management performance (CRM) is to establish the relationship between customer and service providers. The tangible and intangible results of customer relationship management performance are repeat purchase, word of mouth, retention, brand loyalty and customer satisfaction. The increasing numbers of mobile phone users all over the world has influence...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jan 2015

    Performance Investigations of Routing Protocols in VANET under IPv4 and IPv6

    Recent advances in wireless technologies have given rise to the emergence of Vehicular Ad hoc NETworks (VANETs). In such networks, the limited coverage of Wi-Fi and the high mobility of the nodes generate frequent topology changes and network fragmentations. Vehicular Ad-hoc NETworks (VANETs) are a special type of ad-hoc networks....

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jan 2015

    Multilayer Secured SIP Based VoIP Architecture

    VoIP faces many emerging attacks and threats. Securing SIP based VoIP is a major challenging task, hence confidentiality, integrity, availability, as well as authenticity must be provided. Focusing on three main critical attacks targeting SIP based VoIP infrastructure, which are Denial of Service (DoS), man-in-the middle attack, and authenticity based...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jan 2015

    ID-Based Non-Interactive Universal Designated Verifier Signature for Privacy-Preserving Applications

    A Universal Designated Verifier Signature (UDVS) scheme is an ideal mechanism for preventing any signature holder from arbitrarily disseminating the signature, so as to protect the privacy of original signer. Such schemes are suitable for applications like the certificate of medical records and income summary, etc. In this scheme, a...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jan 2015

    Performance Evaluation of Multimedia over IP/MPLS Networks

    In this paper, the authors describe performance evaluation of multimedia data streaming over IP and MPLS networks using OPNET simulation tools. The experimental study is carried out by employing VOIP and video streaming applications in both networks with same parameters; but with different routing mechanisms. Therefore, same network model scenario...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jan 2015

    Joint Lifetime and Data Rate Optimization in Wireless Networks via Decomposition Techniques

    Jointly maximizing network lifetime and data rate emerges as a hard task on optimization in wireless networks. For this problem under network coding, the authors introduce a cross-layer formulation with nonlinear programming model to accommodate routing, scheduling, and stream control from different layers in the network-coded wireless networks. In particular,...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jan 2015

    An Overview of Bayesian Network Applications in Uncertain Domains

    Uncertainty is a major barrier in knowledge discovery from complex problem domains. Knowledge discovery in such domains requires qualitative rather than quantitative analysis. Therefore, the quantitative measures can be used to represent uncertainty with the integration of various models. The Bayesian Network (BN) is a widely applied technique for characterization...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jan 2015

    Software Development Life Cycle AGILE vs Traditional Approaches

    Software Development Life Cycle (SDLC) is a process of building or maintaining software systems. Software development life cycle is the most important element in software development. It depicts the necessary phases in software development. This paper reviews the modern SDLC which are traditional methods and agile methods and explains the...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Dec 2014

    Predicting Time Series Using Integration of Moving Average and Support Vector Regression

    Time series prediction is one of the major tasks in the field of data mining. The approaches of time series prediction can be divided into statistical techniques and computational intelligence techniques. Most researchers use one specific approach and compare the performance with other approaches. This paper proposes a novel hybrid...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Oct 2014

    Cluster Based Hierarchical Routing Protocol for WSN with Energy Efficiency

    Recent advances in the field of electronics and communication leads to development of tiny battery enabled sensor nodes. These sensor nodes are randomly deployed as a wireless sensor network for sensing environment. Over the years, the most important problem in wireless sensor network is to develop a routing protocol that...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Oct 2014

    A Categorized Item Recommender System Coping with User Interest Changes

    One significant characteristic of data in specific domain like movie challenges research in recommender systems that user preferences naturally changes over time. Traditional Collaborative Filtering (CF) method does not take in consideration sequences of customer's rating, which reflects changes of customer's preference over a period of time. This paper proposes...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Aug 2014

    A LDA-Based Approach for Semi-Supervised Document Clustering

    In this paper, the authors develop an approach for semi-supervised document clustering based on Latent Dirichlet Allocation (LDA), namely LLDA. A small amount of labeled documents are used to indicate user's document grouping preference. A generative model is investigated to jointly model documents and the small amount of document labels....

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Aug 2014

    A Novel Method to Protect Content of Microsoft Word Document Using Cryptography and Steganography

    Microsoft Word is the most famous and popular word processor in the world now-a-days and the last versions of it depend on eXtended Markup Language (XML) by using Open Office XML format (OOXML). Usually MS Word document contain sensitive data, this document may be sending over internet, via email or...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jun 2014

    Iris Recognition Using Fuzzy Level Set and GEFE

    In this paper, the authors present an efficient algorithm for iris recognition using the spatial fuzzy clustering with level set method, and genetic and evolutionary feature extraction techniques. The novelty of this research effort is that they deploy a Fuzzy C-Means clustering with Level Set (FCMLS) method in an effort...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jun 2014

    Learning from Large Distributed Data: A Scaling Down Sampling Scheme for Efficient Data Processing

    Extracting information from a training data set for predictive inference is a fundamental task in data mining and machine learning. With the exponential growth in the amount of data being generated in the past few years, there is an urgent need to develop or adapt existing learning algorithms to efficiently...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jun 2014

    Transmission Sequence Adjustment Scheme for Improving Fairness in Wireless LANs

    In a wireless LAN, multimedia traffic is one of important traffic types. However, it is not easy to transmit multimedia traffic in a wireless LAN because it requires strict assurance for delay and loss. Although a multimedia packet is sent to a receiver without an error, it is discarded, if...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jun 2014

    Design of Networked Control System With Discrete-Time State Predictor Over WSN

    In this paper, the authors have designed a Networked Control System (NCS) with discrete-time state predictor where the communication between the controller output and the plant input takes place over a Wireless Sensor Network (WSN). In order to measure time delays between the controller output and the plant input in...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jun 2014

    An Evaluation of MPLS-TE Based PMIPv6 Network

    In this paper, the authors gives some results for a simulation of a Proxy Mobile IPv6 (PMIPv6) network based upon Multi-Protocol Label Switching with Traffic Engineering (MPLS-TE) for handling packet forwarding through the network and handling link or node failure. These results are compared with results from a simulation of...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jun 2014

    Improvement of Thorup Shortest Path Algorithm by Reducing the Depth of a Component Tree

    In this paper, the authors have proposed a variant of the Thorup algorithm which showed a better result than the original Thorup algorithm and the Fibonacci-based Dijkstra algorithm in practice. In this paper, they propose a faster algorithm based on their work. Their new algorithm has a faster speed when...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jun 2014

    Hybrid Compression Algorithm for Wireless Sensor Network

    Wireless Sensor Network (WSN) is composed of multiple battery-operated nodes .These nodes consist of a micro - electro mechanical system, a low-power digital signal processor, a radio frequency circuit, and a battery. Discrete Wavelet Transform (DWT) was developed to improve the performance of data compression. Hybrid fast zonal-Discrete Cosine Transform...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jun 2014

    On a Characteristic of Data Transmission In Bus Network

    Bus network is a primary topology in local area network and the network had a problem of data collision on the bus which influenced the efficiency of data transmission. Recently, using switching-hub that establishes a link from a sending station to a receiving station, the number of data collisions extremely...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // May 2014

    A Unified Architecture for Optimal Resource Utilization in a Heterogeneous Cloud Environment

    Cloud computing is the latest effort in the field of computer technology in delivering computing resources as a service. It is a paradigm shift taken from computing as a product that is to be purchased to computing as a service that is delivered to consumers as 'Pay-per-use' over the internet...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // May 2014

    The Impact of Cloud Computing on ITIL Service Strategy Processes

    Cloud computing has become an increasingly popular means of delivering precious IT enabled business services. Customers and end users access the IT services catalog through self-service portals, using and paying for only those services they need, when and where they need them. When an organization adopts cloud computing it quickly...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Apr 2014

    SMS Classification Based on Naive Bayes Classifier and Apriori Algorithm Frequent Itemset

    As the mobile phone market is rapidly expanding and the modern life is heavily dependent on cell phones, Short Message Service (SMS) has become one of the important media of communications. In this paper, the authors propose a hybrid system of SMS classification to detect spam or ham, using Naive...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Apr 2014

    Anomaly Detection in Application Performance Monitoring Data

    Performance issues and outages in IT systems have significant impact on business. Traditional methods for identifying these issues based on rules and simple statistics have become ineffective due to the complexity of the underlying systems, the volume and variety of performance metrics collected and the desire to correlate unusual application...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Apr 2014

    Identifying Defining Aspects of Chronic Fatigue Syndrome Via Unsupervised Machine Learning and Feature Selection

    In this paper, the authors propose an unsupervised machine learning method of predicting Chronic Fatigue Syndrome (CFS) based on the k-means algorithm using self-reported questionnaire responses. They first suggest a method of determining the presence of a symptom based on its frequency and severity using an unsupervised dynamic thresholding approach....

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Apr 2014

    Predicting Utilization of Server Resources from Log Data

    In this paper, the authors propose a model to predict resource utilization matrix for a given workload by mining the information residing in application as well as system logs for resource utilization. Unlike regression based or queuing network based approaches, their mechanism neither requires estimating per-function resource utilization nor does...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Mar 2014

    Research of Networked Control System Based on Fuzzy Adaptive PID Controller

    Networked control system has recently been a hotspot in the research fields of control theory and control engineering application, which has the advantages of resource sharing, fewer cables, easy to extend and maintain, etc. As the controlled object includes complicated control network and physical object, the controller of networked control...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Mar 2014

    A Front-End Processing Using Subspace-Based Speech Enhancement Over Mobile Devices

    The paradigm multi-stream has been shown to result in features combined that can help to increase the robustness of Distributed Speech Recognition (DSR) in the mobile communications. In this paper, the author's employs a combination of post proceeded Mel-Frequency Cepstral Coefficients (MFCCs) and Line Spectral Frequencies (LSFs) features projected in...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Mar 2014

    A Hacking Case Study: Detection, Communication, and Code

    In this paper, the authors discuss the techniques used in an actual hacking case which was took place in an academic organization. The paper describes the methodology used by the hacker to infiltrate several faculty members' desktop machines and embed malware to gain access to private information and manipulate student...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Mar 2014

    A Low Multiplicative Complexity of Proposed FFT/IFFTs Design Applied for OFDM-Based Wireless Communication Systems

    Low arithmetic complexity and High speed of Fast Fourier transforms (FFT)/Inverse FFT (IFFT) processor is required in many applications in Orthogonal Frequency Division Multiplexing (OFDM)-based wireless broadband communication systems. For this reason, it's essential to develop an optimum complexity design FFT/IFFT processor to meet the low power and real time...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Mar 2014

    Prediction of Investment Patterns Using Data Mining Techniques

    Risk taking capability of a person in the financial market is based on many factors including demographic factors like age, education, marital status etc. In this paper in order to analyze the various investment instruments used by the people of different profiles; the authors have applied fuzzy data mining technique...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Feb 2014

    Protein Function Prediction Using Semantic Driven K-Medoids Clustering Algorithm

    The proposed protein function prediction methods are mostly based on sequence or structure protein similarity and do not take into account the semantic similarity extracted from protein knowledge databases such as Gene Ontology. Many studies have shown that identification of protein complexes or functional modules can be effectively done by...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jan 2014

    Text Mining-Based Semantic Web Architecture (TMSWA) for e-Learning Systems

    In this paper, the authors highlight semantic web techniques and propose architecture for e-Learning-based systems for the academic portal. Text mining is used with the proposed model for better processing of unstructured data available in XML and RDF formats. An algorithm will be used to support building a web retrieval...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jan 2014

    A Parallel Task scheduling Algorithm Based on Fuzzy Clustering in Cloud Computing Environment

    Parallel task scheduling is one of the core problems in the field of cloud computing research area, which mainly researches parallel scheduling problems in cloud computing environment by referring to the high performance computing required by massive oil seismic exploration data processing. Because of the natural reparability of Seismic data,...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jan 2014

    Comparisons between Rough Set Based and Computational Applications in Data Mining

    Rough set theory is a set theory for the study of information systems which are characterized by insufficient and incomplete information. Rough set theory and wavelet theory are totally different areas of research in mathematics. The authors briefly describe each theory and apply them respectively to the same problem as...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jan 2014

    Enhanced Dynamic Whole File De-Duplication (DWFD) for Space Optimization in Private Cloud Storage Backup

    Cloud storage provides users with abundant storage space and make user friendly for immediate data access. But there is a lack of analysis on optimizing cloud storage for effective data access. With the development of storage and technology, digital data has occupied more and more space. According to statistics, 60%...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jan 2014

    Metamorphosis of High Capacity Steganography Schemes

    Scope of steganography has landed over a new venture with the ever developing digital technology to carry out effective masking of any file inside other for covert communication with high volumes. The scheme suggested for stego file provides an efficacious camouflage with volumes taken to new heights with no comparison...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jan 2014

    Video Coding and Weight Based Scheduling to Enhance QoS in WLAN

    Video transmission over wireless network suffers a lot of discrepancies in quality of experience at the end user. Wireless LAN is adopted widely everywhere even at home because of its simpler installation, cheaper, flexible and reliability. A novel approach Dynamic Transmission opportunity over Weight Based Scheduling (DTWBS) is proposed to...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jan 2014

    An Efficient Key Distribution Scheme for Wireless Sensor Networks using polynomial based schemes

    Sensor networks are highly vulnerable to attacks because, it consists of various resource-constrained devices and they communicate via wireless links. Establishment of pairwise keys between sensor nodes is used to realize many of the security services for sensor networks. Hence securely distributing keys among sensor nodes is a fundamental challenge...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jan 2014

    A New Tier Based Approach for Clustered Content Centric Networks Implementing Cloud Computing

    Since last four decades, internet exploration and innovation has touched new horizons but all that advancement in realm of internet was based on peer to peer interaction or mostly client server topology. There were many loop holes in such configuration as all the communication was machine identified and all the...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jun 2014

    On a Characteristic of Data Transmission In Bus Network

    Bus network is a primary topology in local area network and the network had a problem of data collision on the bus which influenced the efficiency of data transmission. Recently, using switching-hub that establishes a link from a sending station to a receiving station, the number of data collisions extremely...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jan 2014

    Measuring Information Quality for Privacy Preserving Data Mining

    In the strive for knowledge discovery in a world of ever-growing data collection, it is important that even if a dataset is altered to preserve people's privacy, the information in the dataset retains as much quality as possible. In this context, \"Quality\" refers to the accuracy or usefulness of the...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jan 2014

    An Architecture for Measuring Network Performance in Multi-Core Multi-Cluster Architecture (MCMCA)

    In this paper the authors design a new architecture for large-scale clusters to improve the communication within the interconnection network to gain higher performance. The new architecture will be based on clusters built using workstations containing multi-cored processors in a multi-cluster architecture in the presence of uniform traffic. Multi-core technology...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Apr 2014

    Predicting Utilization of Server Resources from Log Data

    In this paper, the authors propose a model to predict resource utilization matrix for a given workload by mining the information residing in application as well as system logs for resource utilization. Unlike regression based or queuing network based approaches, their mechanism neither requires estimating per-function resource utilization nor does...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jan 2014

    Preserving Privacy in Outsourced Database

    The data rapidly increases with time. To deal massive data, or called big data, the idea of database as a service has been proposed. Outsourced database provider offers a lot of computing power and storage area. For organizations, they do not need to build their own infrastructure. It can reduce...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // May 2014

    The Impact of Cloud Computing on ITIL Service Strategy Processes

    Cloud computing has become an increasingly popular means of delivering precious IT enabled business services. Customers and end users access the IT services catalog through self-service portals, using and paying for only those services they need, when and where they need them. When an organization adopts cloud computing it quickly...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jan 2014

    Parallel Component Agent Architecture to Improve the Efficiency of Signature Based NIDS

    To avoid increasing threats of intrusion or vulnerabilities, networks require flexible and efficient security systems. Intrusion Detection System (IDS) is the basic component of any network defense scheme. Different IDS use several techniques for Intrusion detection. Signature base detection techniques are widely used in networks for fast response to detect...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jan 2014

    Analysis of Wireless Mesh Structures Using Localized Backbone Constructions

    In wireless domain finding the dominating set is one of the solutions for connectivity maintenance. Due to the dynamic topology, i.e. nodes move anywhere at any time: finding the dominating set also is a major task and lots of control messages require updating every change that occurs. To overcome the...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jan 2014

    Securing Cluster Head Elections in Wireless Sensor Networks

    In wireless sensor networks, since a Cluster Head (CH) gathers data from members and delivers the gathered data to the sink, preventing a compromised node from being a CH is very important. Even though unveiling the CH election process enhances the security of network, it cannot prevent compromised nodes from...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jan 2014

    A Privacy-Preserving Location Monitoring System for WSNs With Blocking Misbehaving Users in Anonymity Networks

    Wireless sensor networks monitoring personal locations are identified through internet server. If server is untrusted, it may cause threats pertaining to privacy of individuals being monitored. In this paper, the authors propose a privacy preserving location monitoring system for wireless sensor networks. Here, they design two in-network anonymization algorithms which...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jan 2014

    Reduction the Effect of Mobility in Link Transmitting Using Efficient DSR Route Cache for MANETs

    Communication between mobile users is becoming more popular than ever before due to the recent technological advances in wireless communication devices. Ad hoc networks are generally closed in that, it's a collection of two or more devices equipped with wireless communications and networking capability; they do not connect to the...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jan 2014

    Improve Accuracy of Intrusion Detection System Using the Synthesis Computing Classifier Methodology

    Network security is the most critical part in organizations, social and enterprise systems. There are different levels in security. (The first level being preventions) The Most important level is Intrusion Detection System (IDS). IDS's are responsible for monitoring security issues, network traffic etc., But it's most essential task is detection...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Mar 2013

    An Improvement in HB-Family Lightweight Authentication Protocols for Practical Use of RFID System

    Radio Frequency IDentification (RFID) is a booming technology which identifies objects automatically. As the low-cost passive tag in RFID system lacks computational, storage, power, and communication resources, lightweight authentication protocols are necessary for security and privacy issues. The HB-family has been developed since Hopper and Blum proposed the HB protocol,...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Mar 2013

    Implementation of Reserved CID Based Passport Handover and PKMv2 Protocol in IEEE802.16e Network Entry Process

    Mobility management being a decisive role in wireless communication networks which effectively distribute the services to the relevant users on the move. A wireless network which is richer and fixed in bandwidth is specified as IEEE802.16 and is promoted and launched by an industrial forum Worldwide Interoperability for Microwave Access...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jan 2014

    Text Mining-Based Semantic Web Architecture (TMSWA) for e-Learning Systems

    In this paper, the authors highlight semantic web techniques and propose architecture for e-Learning-based systems for the academic portal. Text mining is used with the proposed model for better processing of unstructured data available in XML and RDF formats. An algorithm will be used to support building a web retrieval...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jan 2014

    A Parallel Task scheduling Algorithm Based on Fuzzy Clustering in Cloud Computing Environment

    Parallel task scheduling is one of the core problems in the field of cloud computing research area, which mainly researches parallel scheduling problems in cloud computing environment by referring to the high performance computing required by massive oil seismic exploration data processing. Because of the natural reparability of Seismic data,...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jan 2014

    Comparisons between Rough Set Based and Computational Applications in Data Mining

    Rough set theory is a set theory for the study of information systems which are characterized by insufficient and incomplete information. Rough set theory and wavelet theory are totally different areas of research in mathematics. The authors briefly describe each theory and apply them respectively to the same problem as...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jan 2014

    Enhanced Dynamic Whole File De-Duplication (DWFD) for Space Optimization in Private Cloud Storage Backup

    Cloud storage provides users with abundant storage space and make user friendly for immediate data access. But there is a lack of analysis on optimizing cloud storage for effective data access. With the development of storage and technology, digital data has occupied more and more space. According to statistics, 60%...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // May 2014

    A Unified Architecture for Optimal Resource Utilization in a Heterogeneous Cloud Environment

    Cloud computing is the latest effort in the field of computer technology in delivering computing resources as a service. It is a paradigm shift taken from computing as a product that is to be purchased to computing as a service that is delivered to consumers as 'Pay-per-use' over the internet...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jun 2014

    Learning from Large Distributed Data: A Scaling Down Sampling Scheme for Efficient Data Processing

    Extracting information from a training data set for predictive inference is a fundamental task in data mining and machine learning. With the exponential growth in the amount of data being generated in the past few years, there is an urgent need to develop or adapt existing learning algorithms to efficiently...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Aug 2012

    Realistic Analysis of Data Warehousing and Data Mining Application in Education Domain

    Data-driven decision support systems, such as data warehouses can serve the requirement of extraction of information from more than one subject area. Data warehouses standardize the data across the organization so as to have a single view of information. Data warehouses can provide the information required by the decision makers....

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Sep 2013

    Real-Time Estimation of Speech Quality Through the Internet Using Echo State Networks

    Audio quality in the Internet can be strongly affected by network conditions. As a consequence, many techniques to evaluate it have been developed. In particular, the ITU-T adopted a technique called Perceptual Evaluation of Speech Quality (PESQ) to automatically measuring speech quality. PESQ is a well-known and widely used procedure,...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Sep 2013

    An Improved Minimum-Cost Pathfinding Algorithm for Mobile Robot Navigation

    Mobile robots have been widely applied in the fields of path patrolling, environmental searching, objects tracking, tour guiding or even house cleaning, etc. The critical aspect of these applications is path-planning that validly converts complicated conditions into intelligibility. Unlike manual operation, artificially intelligent settings in path finding can automatically generate...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Sep 2013

    On-Chip Interconnect Network Communication Management for Multi-Core Design

    Modern on-chip multi-core design will continue Moore's law and facilitate platforms for wired and wireless communications. It has been predicted that the future computing platform will have a tightly integrated complex system that can process \"Big data\" with swift speed and high quality. However, it is not clear how the...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Sep 2013

    Active Inductor Based Differential Low Noise Amplifier for Ultra Wide Band Receiver

    In this paper, the authors propose an Active Inductor (AI) based three stage Low Noise Amplifier (LNA) for Ultra Wide Band (UWB) receiver is proposed. A fully differential topology has been adopted for both LNA and AI in order to improve the circuit robustness against unwanted common mode signals. T-coil...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Sep 2013

    Cooperative and Opportunistic Transmission in Wireless and Mobile Ad-Hoc Networks

    4G technology is getting more popular in wireless and mobile network domain. Opportunistic and cooperative transmission techniques are important aspects for communication in wireless and mobile networks. But these techniques are facing routing and forwarding issues as well as co-channel interference and lack of central controller problems. For these problems...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Sep 2013

    Design and Performance Evaluation of a System for Storing and Visualizing Data From a Sensor Network

    In this paper, the authors presents architecture design and performance evaluation of a back end system used to store, index, manage and visualize water quality measurements collected by sensor networks deployed in rivers, lakes and coastal regions. The embedded communications systems in each sensor node enable ad hoc network operation...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Sep 2013

    Comparison of Performance Parameters of Reactive, Proactive and Hybrid Routing Protocols in RWP Mobility Model Through Qualnet

    Wireless sensors are devices that monitor and record their surroundings physical and environmental parameters and transmit them continuously to one of the source sensors. A collection of such wireless sensors form a network called Wireless Sensor Networks (WSNs). This technology is considered to be the best for the study of...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Sep 2013

    Malicious Websites Detection and Search Engine Protection

    With the development of the internet, the amount of information is expanding rapidly. Naturally, search engine becomes the backbone of information management. Nevertheless, the flooding of large number of malicious websites on search engine has posed tremendous threat to the users. Most of exiting systems to detect malicious websites focus...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Sep 2013

    Peak-to-Average Power Ratio Reduction Using Artificial Bee Colony Algorithm in Wavelet Packet Modulation

    Wavelet Packet Modulation (WPM) is used as an alternative to Orthogonal Frequency Division Multiplexing (OFDM) as Multi Carrier Modulation (MCM) technique, recently. High Peak-to-Average Power Ratio (PAPR) values of the MCM signals decreases the systems performance due to using nonlinear amplifier in the system transmitter. Generally, Partial Transmit Sequence (PTS)...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Sep 2013

    An Agent-Based Multi-Model Tool for Simulating Multiple Concurrent Applications in WSNs

    Due to hardware resource constraints in Wireless Sensor Network (WSN) nodes, and lack of support for high-level development environments, application developers tend to avoid concurrent object-oriented models in designing WSN applications. In recent years due to new advances in microelectronics and embedded system design, there have been a number of...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jun 2013

    Convergence of DSRC and WiMAX Technology for Intelligent Transportation System

    The geographical coverage area of communication is increased for the efficiency of the Intelligent Transportation System (ITS) customers. The maximum extent of coverage area provides the beneficiary of satisfying the customers with the desired needs of the customers, as it keeps changing rapidly. The noble technology WiMAX helps to achieve...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Jun 2013

    The Design and Implementation of Encryption and Decryption Methods Based on Dynamic Conversion Table

    With the development of computer network technology, the security network information has been subject to widespread concern, and selecting the encryption of certain information has become a method frequently used. In this paper, there is a kind of encryption and decryption strategy of character replacement based on dynamic conversion table....

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Mar 2013

    An Adaptive Approach to Optimize Tree-Based Overlay for P2P Streaming

    Peer-To-Peer (P2P) technologies have been popularly adopted for large-scale applications of content distribution, including file sharing, video on demand and live television, for its advantages in system scalability and deployment efficiency. To further improve the distribution effectiveness of application-layer multicast overlay constructed by P2P technologies, in current years several types...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Mar 2013

    A Novel Group-Based Location Service Management Scheme in VANETs

    One of the major concerns in Vehicular Ad hoc NETwork (VANET) is to design a scalable and robust routing protocol, which usually depends on the ability of tracking the locations of vehicles in VANETs. The location information service in VANETs helps to find the destination vehicle effectively. However, vehicle mobility...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Mar 2013

    Using Surrogate Servers for Content Delivery Network Infrastructure With Guaranteed QoS

    In this paper, the authors focuses on simulating the concepts of Soarin and analyze if it would be viable to be put to used alike the un-released technology used. Soarin is a content delivery system which is able to increase content network bandwidth dynamically by deploying delivery servers in a...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Mar 2013

    Energy Enhanced Base Station Controlled Dynamic Clustering Protocol for Wireless Sensor Networks

    The energy efficiency is the determinant aspect of the wireless sensor network life time. Various routing protocols are used to reduce the energy consumption and to improve the network lifetime. To support high scalability and better data aggregation, sensor nodes are often grouped into disjoint, non overlapping subsets called clusters....

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Mar 2013

    Performance Evaluation of Scheduling Algorithm for Wimax Networks

    In this paper, the authors propose a new scheduling algorithm for IEEE802.16 broadband wireless Metropolitan Area Networks (MAN) in TDD mode. The proposed algorithm focuses on an efficient mechanism to serve high priority traffic in congested networks. A detailed simulation study is carried out for the proposed scheduling algorithm and...

    Provided By International Association of Computer Science and Information Technology(IACSIT)

  • White Papers // Sep 2013

    Routing Protocol for Mobile Ad Hoc Network

    Routing protocol is the act of moving information across an inter-network from a source to a destination. Routing directs forwarding by passing of packets from their source toward their ultimate destination through intermediary nodes. The routing process usually directs forwarding on the basis of routing tables within the routers, which...

    Provided By International Association of Computer Science and Information Technology(IACSIT)