International Journal of Computer Science and Communication Networks (IJCSCN)

Displaying 1-40 of 134 results

  • White Papers // Jul 2014

    Implementation of Personalized Search Model Using Ontology

    The relevant information retrieval from search engines is a difficult task, as there is huge amount of information present on the web. Every user has a distinct background and a specific goal when searching for information on the Web. The goal of Web search personalization is to search results for...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Jul 2014

    An Efficient Approach towards K-Means Clustering Algorithm

    K-means clustering algorithms are used in various practical applications countless times. Original K-means algorithm select initial centroids randomly it generates unstable cluster as the value of object in cluster depend on the selection of initial cluster means which is done by random selection of objects. The number of times different...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Jul 2014

    Intrusion Detection and Self-Recovery System

    Wireless Sensor Networks (WSNs) are the collection of self - organizing sensor nodes deployed in various physical environments statically or dynamically depend upon the application. In wireless environment these sensor nodes are defenseless or vulnerable against attacks. Wireless Sensor Networks (WSNs) have become one of the most promising and interesting...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Jun 2014

    Improving Security for Smart Grid with Multilayer Consensus ECC based PAKE Protocol (SGMCEP)

    In this paper, the authors aim in providing a securely communicating of data between the devices which are nothing but appliance of Home Area Network (HAN) by a set of controller outside the HAN. The packets generated by the controller should be delivered fast without any interruption. The role of...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Jun 2014

    A Review on Clustering with Genetic Algorithms

    In this paper, the authors present a review on genetic algorithms based clustering techniques. Clustering is one of the most important tasks of data mining for exploring data sets. It can be used to extract useful and hidden information from the datasets. Clustering techniques have a large area of applications...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Jun 2014

    Performance Evaluation of Variants of TCP Based on Buffer Management over WiMAX

    Currently, Worldwide interoperability for Microwave Access (WiMAX) is one of the hottest technologies in wireless based on the IEEE 802.16 wireless technology which offers high throughput broadband connections over long distance that supports Point to Multi-Point (PMP) broadband wireless access. In this paper, the authors focuses on TCP sender side...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Jun 2014

    Design, Implementation and Experimental Results of a Wireless Sensor Network for Underground Metro Station

    Wireless sensor networks provide a prominent approach for environmental monitoring system in many different scenarios. Typically, sensors communicate through a mesh network architecture, in which each device functions also as a relay for other devices. The usage of multi-hop wireless paths raises the challenge of achieving robust communication and low...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Jun 2014

    Agent Based Intrusion Detection Technique for Wireless Network

    An Intrusion Detection System (IDS) generally detects unwanted manipulations of computer systems, mainly through the Internet. IDS as a new defensive-security layer to the WSNs' security infrastructure; which it can detects unsafe activities and unauthorized access; also, when attacks occurred, even new attacks such as anomalies, it can notify by...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Jun 2014

    Study of Component Based Software Engineering

    Component based software engineering is an approach of software development that emphasizes the design and construction of computer based systems using reusable software components. A set of pre-built, standardized software components are made available to fit a specific architectural style for some application domain. Component based software engineering encompasses two...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // May 2014

    Survey on Applications and Challenges of Wireless Sensor Network in Industries

    Recent advancement in wireless communications and electronics has enabled the development of Wireless Sensor Network (WSN). These networks promise to revolutionize sensing in a wide range of application domains. One of them is industrial automation, which is necessary for competing globally. Industrial automation from component assemblies to data integrated manufacturing...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // May 2014

    Effective Relative Position Detection for Multicasting of Alert Messages

    Global Positioning System (GPS) is a space-based satellite navigation system that provides location and time information in all weather conditions, anywhere on or near the Earth. This information can be shared with other nodes in the network and is central requirement for VANET application like navigation, intelligent transportation, collision avoidance...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Feb 2014

    Survey on Structure and Structure-Content Classification of XML Document

    In recent years, XML has become a popular way of storing many data sets because of its semi-structured nature. It allows modeling of a wide variety of databases as XML documents. XML data thus form a significant part in data mining domain, and it is valuable to develop classification methods...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Feb 2014

    A Survey Paper On Detection Of Gray-Hole Attack in MANET

    MANET is a wireless ad hoc network, decentralized network and autonomous system. Mobile ad hoc network is created by mobile nodes. To forward the packet, each node in MANET acts as router. That is free to moving in and out in the network. There are some constraints like limited resources,...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Feb 2014

    Fault Tolereane Techniques and Algorithms in Cloud Computing

    Cloud computing provide many service to the user. Now a day the user level is highly increased to utilize the services in cloud computing. In cloud computing the major problem area is fault tolerance. Fault tolerance is a major concern to guarantee availability and reliability of critical services as well...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Feb 2014

    Research Issues in TCP based Congestion Control for High Speed Network

    The congestion control methods used by the traditional TCP is not applicable to the current high-speed long delay networks due to rapid increase of link bandwidth and end to end delay specifically on wide area networks. The packet drop rate requirement for full utilization of long bandwidth-delay link is not...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Jan 2014

    Cloud Computing Environment

    Choosing software for the cloud computing environment is important. However, the success of the cloud computing group depends more on having good processes and good people than on the particular software found on their desktops. In this paper, the authors have discussed some of the more formal aspects of cloud...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Jan 2014

    Simplified TCP Based Communication Approach towards Domain Name System for Improving Security

    Using DNS, domain names can be assigned to groups of Internet resources independent of their physical location. Without DNS, the only way to reach other computers on the Internet is to use the numerical network address. The use of IP address for locating and connecting to remote systems is tedious...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Oct 2013

    Based on HDFS Safety Measures Construction Of Secret Storage Cloud

    With the growth of business, an enterprise would like to make its PSC (Private Storage Cloud) approach an infrastructure service in a partner/public cloud. In such PSCs, there are some new security issues, how to isolate the data stored in the PSC from internal and external attackers, how to make...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Oct 2013

    Enterprise Services on the Cloud by a Technique to Maintain Variability

    These variability concerns affect both the service interface and the service provider implementation and hence are crosscutting in nature. In this paper, the authors use principles of aspect-oriented software development to modularize these variability concerns. They also provide an aspect specification scheme to specify these concerns. They propose an approach...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Oct 2013

    Improving the Efficiency of Weighted Page Content Rank Algorithm using Clustering Method

    Web mining is defined as the application of data mining techniques on the World Wide Web (WWW) to find hidden information. Most of the search engines are ranking their search results in response to users' queries to make their search navigation easier. It includes link analysis algorithms i.e., Page rank,...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Oct 2013

    A Comparative Analysis of Various Clustering Techniques used for Very Large Datasets

    Data Mining is the process of extracting hidden knowledge, useful trends and pattern from large databases which is used in organization for decision-making purpose. There are various data mining techniques like clustering, classification, prediction, outlier analysis and association rule mining. Clustering plays an important role in data mining process. This...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Oct 2013

    Outdoor scene segmentation and object classification Using cluster based perceptual Organization

    Humans may be using high-level image understanding and object recognition skills to produce more meaningful segmentation while most computer applications depend on image segmentation and boundary detection to achieve some image understanding or object recognition. The high level and low level image segmentation model may generate multiple segments for the...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Oct 2013

    Entretian Model for Software Maintenance

    Maintenance refers to the act of modifying the software after putting in use in order to maintain its usability. In other words, software maintenance can be defined as; it is the process of providing services to the customers after the delivery of the software. Despite the fact that maintaining software...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Oct 2013

    System Diagnosis and Fault Tolerance for Distributed Computing System: A Review

    An adaptive system diagnosis fault tolerance method for distributed system. The system is comprised of a network including N nodes where N is integer and greater than equal to 3 and each node is able to execute an algorithm to communicate with the network. A computer network, often simply referred...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Oct 2013

    To Enhance the Network Capacity in MANET using COCO Topology Control Protocol

    In Mobile Ad-hoc NETwork (MANET) is a self-configuring network of mobile routers (and associated hosts) connected by wireless links. This MANET forms a random topology and routers move randomly free. Topology changes rapidly and unpredictably. Now-a-days the authors are using so many protocols for maximizing the network bandwidth but, they...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Sep 2013

    A Review of Dynamic Packet Reservation Multiple Access Protocol on Speech Transmission Wireless Ad-Hoc Networks

    This cellular mobile radio telephony is a new and attractive area of current interest. This paper provides a general idea of the cellular system with particular emphasis on the PRMA protocol for digital speech transmission. This paper shows that PRMA is a suitable protocol for the transmission of speech, as...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Aug 2013

    Multimodal Biometric Personal Identification System Based On IRIS & Fingerprint

    Biometric systems can recognize individuals according to their physiological or behavioral characteristics. Many times due to some problems like noisy data, non-university, spoof attacks, and unacceptable error rates, a single biometric system cannot meet the desired requirements for many user applications. Algorithm based on facts and existing data show that...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Aug 2013

    Self Sustainable Data Centre Virtualization

    Virtualization technology has revolutionized the data centre network concept. It has reduced the space, cost and energy requirements for a data centre. It has also helped in improving security and reliability of data centers. However, IT Infrastructure management of data centre network remains a challenge during disaster recovery. Manual recovery...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Jul 2013

    Event Correlation in Network Security to Reduce False Positive

    As the network based computer system plays an important role in modern society they have become target of the authors' enemies and criminals. Therefore, they need to find the best possible ways to protect their IT System. Different methods and algorithms are developed and proposed in recent years to improve...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Jun 2013

    Waiting Algorithm for Concurrency Control in Distributed Databases

    Database is the well-organized collection of data in a meaningful way and stored in such a way that it can be accessible to each and every user so that user can perform the transaction. Main purpose of database system is to retrieve information; perform some operation on the information and...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Jun 2013

    Advanced Web Usage Mining Algorithm using Neural Network and Principal Component Analysis

    Web usage mining becomes a vital aspect in network traffic analysis. Previous study on web usage mining using a synchronized clustering, neural based approach has shown that the usage trend analysis very much depends on the performance of the clustering of the number of requests. Self organizing networks are useful...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Jun 2013

    MIMO-OFDM based Cognitive Radio Networks Capacity analysis with Water Filling Techniques

    In this paper, the authors propose water filling algorithm is discussed which has been used for allocating the power to the MIMO channels in cognitive radio network so as to enhance the capacity of the network. Here the authors present a theoretical framework for allocating the power considering a 4x4...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Jun 2013

    An Novel Approach for Distributive Adaptive Opportunistic Routing in Wireless Ad Hoc Networks

    A distributed adaptive opportunistic routing scheme for multi hop wireless ad hoc networks is proposed. The proposed scheme utilizes a reinforcement learning framework to opportunistically route the packets even in the absence of reliable knowledge about channel statistics and network model. This scheme is shown to be optimal with respect...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // May 2013

    Software Risk Analysis and Measurement With Qualitative Assessment Based on Priority and Severity of Risks

    Risk analysis is a process which is use to identify the danger factor that may create the problem to achieving the goal. Software project has high rates of failure so Software Risk analysis and measurement is an essential process to handle the various types of risk in projects. This paper...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Apr 2013

    A Survey-Link Algorithm for Web Mining

    Web mining is the most active area where the research is going on rapidly. Web mining is the integration of information gathered by traditional data mining methodologies and techniques with information gathered over the World Wide Web (WWW). Based on the information gathered over the WWW web mining is categorized...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Apr 2013

    Private Vs Public Cloud

    The private cloud hosting platforms is to optimize IT resources involved in the cycle of corporate provisioning, delivery, monitoring and control of business-critical applications: the elasticity of supply storage, processing and networking, on-demand access to systems, self-provisioning by the user or workgroup, through a centralized management dashboard unified system administrators,...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Apr 2013

    Data Mining Over Large Datasets Using Hadoop in Cloud Environment

    There is a drastic growth of data's in the web applications and social networking and such data's are said be as big data. The hive queries with the integration of Hadoop are used to generate the report analysis for thousands of datasets. It requires huge amount of time consumption to...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Apr 2013

    Disaster Recovery on Double Duty Using Cloud

    In this paper, the author describes how the virtualization and replication technologies will protect the data from the disaster without any loss to the business. From past 2 years the IT department has been reducing the costs and they are meeting their services and the commitments of disaster recovery are...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Apr 2013

    Securing Resource Location with the Help of Phoenix Coordinate System and Host Authentication in Cloud Environment

    Cloud computing may be defined as a set of IT services that are provided to a client over a network with the ability to scale up or down their service requirements. Usually cloud services are delivered by a service provider who owns the infrastructure and provide services on pay and...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Mar 2013

    MAS Based Framework for Network Intrusion Detection System

    The growing use of internet forces the people to work of security aspect also as the security related incident increases. It becomes reason for thinking for organizations to protect their sensitive information with an effective Intrusion Detection System (IDS). MAS (Multi-Agent System) are becoming a growing research field which uses...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Jun 2012

    A Survey on Distributed Explicit Rate Schemes in Multi Input Multi Output Network Systems

    The design of distributed explicit rate flow control schemes for the multi input multi output services has received the considerable focus with the ever increasing wireless and the wired data applications. This paper proposes two novel multi points to multi point flow control schemes. The schemes are based on the...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Jun 2012

    Implementation of P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains

    In this paper, the authors investigate Reputation Systems for P2P networks more ambitious approach to protect the P2P network without using any central component, and thereby harnessing the full benefits of the P2P network. The reputations of the peers are used to determine whether a peer is a malicious peer...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Jun 2012

    Fault Tolerance Approach in Mobile Agents for Information Retrieval Applications Using Check Points

    Mobile agents have emerged as major programming paradigm for distributed applications. Mobile agents are the intelligent programs that act autonomously on behalf of a user and can migrate from one host to another host in a network in order to satisfy the requests made by their clients. A prerequisite for...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Jun 2012

    Fusion of High Spatial and Spectral Resolution Images Based on Spatial Domain and Multiresolution Analysis

    Image fusion is one of the important techniques to enhance image information of remote sensing. In order to adequately make use of all kinds of remote sensing images information such as Panchromatic and three-band multi-spectral images, a novel remote sensing image fusion scheme based on wavelet transform is proposed. The...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Jun 2012

    Node Deployment and the Impact of Relay Nodes in Wireless Sensor Network

    Node deployment is a fundamental issue to be solved in wireless sensor network. A proper node deployment can reduce the complexity of problems in WSN as for e.g., routing, data fusion, communication etc. Different node deployment models have been proposed to reduce the complexity. In this paper, the authors will...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Jun 2012

    An Object Oriented Approach to Mining Web Graphs for Recommendations

    Web mining is the application of data mining techniques to extract knowledge from Web. Web mining has been explored to a vast degree and different techniques have been proposed for a variety of applications that includes music, images, books recommendations, query suggestions, etc. In this paper, the authors highlight the...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Jun 2012

    Analysis of Software Rejuvenation on Adhoc Conferencing and Media Distribution System

    The paper facilitates the concept of Software Rejuvenation and its importance in day to day software applications. Software Rejuvenation prevents ageing in software applications and helps in achieving a non-compromising performance. "Ad-hoc conferencing system" is chosen as a candidate as this has a variety of functionalities that involve conferencing, screen...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Jun 2012

    Incorporating Fault Tolerance in LEACH Protocol for Wireless Sensor Networks

    Routing protocols have been a challenging issue in wireless sensor networks. WSN is one of the focused are of research because of its multi-aspect applications. These networks are self-organized using clustering algorithms to conserve energy. LEACH (Low-Energy Adaptive Clustering Hierarchy) protocol is one of the significant protocols for routing in...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Dec 2011

    Efficient Implementation of Conditional Shortest Path Routing in Delay Tolerant Networks

    Routing in Delay Tolerant Networks (DTN) is a challenging problem because at any given time instance, the probability that there is an end-to-end path from a source to a destination is low. Since the routing algorithms for conventional networks assume that the links between nodes are stable most of the...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Dec 2011

    Fast Processing of Web Usage Mining With Customized Web Log Pre-Processing and Modified Frequent Pattern Tree

    Web Usage Mining discovers interesting patterns in accesses to various Web pages within the Web space associated with a particular server. The Web Usage Mining architecture divides the process into two main parts-the first part includes preprocessing, transaction identification, and data integration components. The second part includes the largely domain...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Jan 2012

    Improving Network Reliability Evaluation of Distance-Vector Routing with Nodes Reliabilities Stochastic in Nature

    One major requirement of computer networks is their ability to function even in the presence of some faults in the network. The reliability of computer network has become increasingly important due to the increasing use of the computer in the vital aspects of almost every one's life. The computer network...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Jan 2012

    Combination of Beam Forming and Kalman Filter Techniques for Speech Enhancement

    In all speech communication settings the quality and intelligibility of speech is of utmost importance for ease and accuracy of information exchange. Kalman filter is an adaptive least square error filter that provides an efficient computational recursive solution for estimating a signal in presence of noises. Beamforming is another possible...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Dec 2011

    Efficient Implementation of Dynamic Routing With Security Considerations

    Now-a-days security is one of the major issues for data communication over wireless and wired networks. The past work on the designs of cryptography algorithms and system infrastructures. Apart from that the authors proposed a dynamic routing algorithm called improved dynamic routing with security consideration, which is based on the...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Jan 2012

    Comparative Study of Performance Factors of Pll Based Frequency Synthesizer in X Band and Ku Band for Wireless Applications

    In particular the wireless personal communication applications require generation and locking of frequencies. For this purpose the authors use a frequency synthesizer. A frequency synthesizer generates a variety of output frequencies as multiples of single reference frequency. Performance factors like phase noise, spur noise and lock time will have large...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Dec 2011

    General Meta-Models to Analysis of Software Architecture Definitions

    An important step for understanding the architecture will be obtained by providing a clear definition from that. More than 150 valid definitions presented for identifying the software architecture. So an analogy among them is needed to give them a better understanding on the existing definitions. In this paper an analysis...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Dec 2011

    An Approach for Reducing Data Traffic and Enhancing Data Availability in Mobile Ad-Hoc Network Using Data Segmentation

    Ad hoc networks are self forming, auto configuring without any kind of pre-existing infrastructure. With the dearth of pre-defined topology there is no router or controlling device. Two mobile nodes can exchange data directly if they are in the defined range of each other. If not, nodes can communicate via...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Dec 2011

    Automatic Extraction of Three Dimensional Prismatic Machining Features From CAD Model

    Machining features recognition provides the necessary platform for the Computer Aided Process Planning (CAPP) and plays a key role in the integration of Computer Aided Design (CAD) and Computer Aided Manufacturing (CAM). This paper presents a new methodology for extracting features from the geometrical data of the CAD Model present...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Dec 2011

    Study of Communication Using IPv6 in VANET

    The communication between the cars in the ad hoc network is important part of the Intelligent Transportation System (ITS). Application of vehicle needs suitable communication to extend in-vehicle capabilities and beware about surrounding event. Thus in this paper, the authors study the basic concept of IPv6 and geographic addressing for...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Dec 2011

    Efficient Implentation of Fault Prediction in Object-Oriented Systems Based on Conceptual Cohesion of Classes

    While often defined in informal ways, software cohesion reflects important properties of modules in a software system. Cohesion measurement has been used for quality assessment, fault proneness prediction, software modularization, etc. Existing approaches to cohesion measurement in software are largely based on the structural information of the source code, such...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Feb 2012

    Perfection of Recent Attacks Using IP

    The Internet Threat Monitoring (ITM) systems have been deployed to detect widespread attacks on the Internet in recent years. However, the effectiveness of ITM systems critically depends on the confidentiality of the location of their monitors. If adversaries learn the monitor locations of an ITM system, they can bypass the...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Feb 2012

    Integrating WebGIS With WFS and GML

    A Geographic Information System (GIS) integrates hardware, software, and data for capturing, managing, analyzing, and displaying all forms of geographically referenced information. With the advancement of technologies and internet it allows for the emerging of GIS to be considered as a WebGIS. In order to build a WebGIS for connecting...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Feb 2012

    Protocol Independent Multicast Based States Allocation

    In this paper the Protocol Independent Multicast (PIM) protocol is being used. The PIM protocol avoids the packet drop and diverting problem. The PIM protocol is not dependent on any specific unicast routing protocol. It is IP routing independent protocol. The PIM uses the unicast and multicast information to create...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Feb 2012

    A Supporting Efficient and Dynamic Multicasting Over Multiple Regions in Mobile Ad Hoc Networks

    Designing multicast routing protocol is a big challenge due to difficulty in achieving group membership management, packet forwarding and maintenance of multicast structure over the dynamic network topology. In this paper, the authors proposed a novel Efficient Geographic Multicast Protocol (EGMP). A network wide zone-based bi-directional tree is used to...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Feb 2012

    A Survey on Routing Protocols for Underwater Sensor Networks

    Different routing protocol perform different role in the underwater sensor network. All routing perform each and specific task into underwater sensor network which responsible for networking problems issue that is why this is the latest way of research. Routing term derived from "Route" that means a path a way that...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Feb 2012

    F2OAS: Towards a Standard Framework to Organizing Software Architectural Styles

    The selection or development of software architectural style is one of the most important issues in the software architecture. The number and variety of architectural styles are rising. There is not any proper and standard classification to organizing software architectural styles. In this paper, a standard organization (F2OAS) to all...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Feb 2012

    NAT Traversal Capability and Keep-Alive Functionality With IPSec in IKEv2 Implementation

    Since IPv4 Private Networks are behind NAT (Network Address Translation) devices. So, to bypass the Binding Update and Binding Acknowledgment by NAT, the authors need to encapsulate it in UDP (User Datagram Protocol) Packets. Hence, the Dual Stack Mobile IPv6 should support NAT Traversal and Detection. So for proper securing...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Apr 2012

    Application Denial of Service Attacks Detection Using Group Testing Based Approach

    In this paper, the authors explore the mechanisms for detecting the application dos attacks which is a new class of Dos attack. It aims at disrupting the application service rather than depleting the network services. These possess severe threat to Internet Security. Detection and prevention of these attacks are harder...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Apr 2012

    Patient-Centric-Integrated Eha of Physician Practice Portal Through Cloud Computing Technology

    Conventional healthcare delivery system is facing constraints in terms of maintenance of health records, of health care data, interoperability of information communication systems and ubiquitous availability of patient's health record. The limitation of the conventional health system can be overcome by either replacing it of supplementing it by e-Health solution....

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Jun 2012

    Maintaining Stored Procedures in Database Application

    Stored procedure and triggers have an irreplaceable importance in any database application, as they provide a powerful way to code application logic that can be stored on the server and execute according to the need of application. Writing stored procedures for database application involves set of SQL statements with an...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Oct 2011

    Hardware/Software Co-Design Using Primitive Interface

    Most engineering designs can be viewed as systems, i.e., as collections of several components whose combined operation provides useful services. Components can be heterogeneous in nature and their interaction may be regulated by some simple or complex means. Interface between Hardware & Software plays a very important role in co-design...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Oct 2011

    TDOA Computation Using Multicarrier Modulation for Sensor Networks

    Locating accurate positions of the nodes is normally required in Sensor Networks which are attempting to locate and track an emitter or sources of signals. GPS is normally used as it provides high accuracy position measurement, but it has its own limitations. In this paper, the authors propose a Bandwidth...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Oct 2011

    Developments in Indoor Optical Fiber Wireless Networks

    Optical wireless is an innovative technology combining the mobility of Radio Frequency (RF) wireless communications with the high bandwidth availability of optical communications. Next generation of wireless communication systems (4G) will be based on several technologies including Optical Wireless (OW).This paper presents a detailed review of recent developments in modulation...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Nov 2011

    MIMO Technology for Wireless Sensor Network

    Wireless sensor network, where an Access Point (AP) communicates with many Sensor Nodes (SN), which are simple, cheap, low-complexity and low-power communication nodes. Various schemes that employ multiple antennas at the transmitter and receiver are being considered to improve the range and performance of communication systems. By far the most...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Nov 2011

    Column Oriented DBMS an Approach

    A column oriented DBMS is a database management system that stores its content by column rather than the row. This has advantages for data warehouses and library catalogues where aggregates are computed over large number of similar data items. Column stores are well suited for OLAP like workloads i.e., warehouses...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Nov 2011

    Scenario Based Study of On-Demand Reactive Routing Protocol for IEEE-802.11 and 802.15.4 Standards

    Routing data from source to destination is hard in Mobile Ad-Hoc NETworks (MANET) due to the mobility of the network elements and lack of central administration. The main method for evaluating the performance of MANETs is simulation. In this paper performance of Ad-hoc On-demand Distance Vector (AODV) reactive routing protocol...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Nov 2011

    Performance Study of Bandwidth Request Mechanisms in IEEE 802.16e Networks

    WiMAX (Worldwide Interoperability for Microwave Access) is the IEEE 802.16 standards-based wireless technology that provides fixed and mobile Internet access for Metropolitan Area Networks (MAN). The IEEE 802.16 std. includes Medium Access Control (MAC) and PHYsical (PHY) layer specifications and is consider to be a promising technology. Bandwidth reservation is...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Nov 2011

    Study of Information Hiding Techniques and Their Counterattacks: A Review Article

    With the rapid development of the internet technologies, digital media needs to be transmitted conveniently over the network. Attacks, unauthorized access of the information over the network become greater issues now a day. Information Hiding provides solution to these issues. In this paper, the authors studied the various existing information...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Nov 2011

    Intrusion Detection System Based on 802.11 Specific Attacks

    Intrusion Detection Systems (IDSs) are a major line of defense for protecting network resources from illegal penetrations. A common approach in intrusion detection models, specifically in anomaly detection models, is to use classifiers as detectors. Selecting the best set of features is central to ensuring the performance, speed of learning,...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Nov 2011

    Secure Cloud Storage

    As an emerging technology and business paradigm, Cloud Computing has taken commercial computing by storm. Cloud computing platforms provide easy access to a company's high-performance computing and storage infrastructure through web services. The authors consider the problem of building a secure cloud storage service on top of a public cloud...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)

  • White Papers // Nov 2011

    Various Authentication Techniques for Security Enhancement

    Authentication is the art of confirming the truth of an attribute of an entity. Entity may be a person. If a entity is a person it can authenticate with the help of its traits such as his facial attribute, fingerprinting attribute, retina attribute, palm attribute, signature of a person, password,...

    Provided By International Journal of Computer Science and Communication Networks (IJCSCN)