International Journal of Computer Science and Information Technologies

Displaying 1-40 of 724 results

  • White Papers // Apr 2015

    Development of Android Mobile Application for Cloud Video Streaming Using Mobile Cloud Computing

    The use of multimedia mobile phones is increased rapidly and also the size of worldwide mobile video market is increased but some mobile devices have low hardware resources such as RAM, processor, etc. such mobile devices can't fulfil high resource requirements of multimedia applications. Mobile cloud computing can help to...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Apr 2015

    Parallel and Improved PageRank Algorithm for GPU-CPU Collaborative Environment

    The authors use the Internet to search for information on a daily basis. They use search engines to find out the useful information from the vast Internet. This is possible because the search engines are using a heuristic called page-rank. It is nothing but a value to a web page...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Apr 2015

    Wearable Devices: Google Glass & Smart Watch

    The terms "Wearable technology", "Wearable devices" and "Wearables" all refer to electronic technologies or computers that are incorporated into items of clothing and accessories which can comfortably be worn on the body. In this paper, various things about the wearable devices have been discussed. It mainly focusses on two wearable...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Apr 2015

    A Context-Aware Search System for Smart Phones Based on Context-Aware Infrastructure

    A context-aware architecture can be designed to collect the mobile user's context information, derive mobile user's current context, distribute user context among context-aware applications and support the applications like context-aware search. The context acquisition is centralized at the context server to ensure the reusability of context information among mobile devices,...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2015

    Counter Measures Against Malicious Program in Universal Serial Bus

    USB that are used to transfer the data through computers. It will available in a smaller size to do certain amount of data files. The USB are used as in many format like mass storage devices, etc. where the information security in the universal serial bus due to insecure design...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2015

    Cryptographic Techniques, Threats and Privacy Challenges in Cloud Computing

    Cryptography is essential for the security and integrity of the data that is stored in the cloud. Several cryptographic techniques are used to protect the integrity of data for various applications. A particular security method makes use of different cryptographic techniques to encrypt data and make it into an un-readable...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2015

    Energy Efficient Dynamic Threshold based Load Balancing Technique in Cloud Computing Environment

    Cloud computing is the new emerging technology in the field of research and IT industries. So the demand for the computational power required by the business, web and scientific application are rapidly increased in recent past year. To fulfill this demand large scale data center are created which consume enormous...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2015

    Providing Security and Privacy to Cloud Data Storage

    Cloud computing is a model for enabling convenient on demand network access to a shared pool of configurable computing resources like networks, servers, storage, applications. Cloud computing is the next generation of information technology. Using cloud computing users can access remote data, they can purchase storage space, they can develop...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2015

    An Efficient Centralized Clustering Approach for Wireless Sensor Networks

    Wireless sensor networks consists of no. of micro sensor nodes to monitor a remote environment by using aggregated data from individual nodes and transfer this data to the base station for further purpose. Here the energy of operated nodes is susceptible store of the wireless sensor network, which is useless...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jan 2015

    Context Aware Service Information Extraction from Bigdata

    Big data is a term used for defining the exponential growth and availability of both structured and unstructured and semi structured data is most difficult for processing with traditional database systems. Big data is inward from multiple sources at an alarming velocity, variety and volume. Although big data does not...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Dec 2014

    An Improved Framework for Tamper Detection in Databases

    The corporate world, government sector and many organizations has a requirement of secure database system. So due to huge amount of data most of the organizations prefers outsourcing of databases to trusted third parties. In many of the scenarios database tampering is happen due to inside employee of the organizations,...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Dec 2014

    Prominence of Spatial Database in Geographical Information Systems

    Spatial database is a collection of spatially referenced data that acts as a model of reality. Geographical information system includes spatial data which is either in raster or vector form and data derived from remote sensors are increasingly utilized as source for GIS. Spatial data is the core part of...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Dec 2014

    Analysis of CMOs Dynamic Comparators for Low Power and High Speed ADCs

    The need for extreme low power, efficient area and high speed ADC converters make use of the dynamic comparators for maximizing the speed and efficiency of power. Generally comparators play a vital role in the ADCs circuits for comparing the input voltage with respect to the reference voltage. The comparison...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Nov 2014

    Classifier Model for Intrusion Detection Using Bio-Inspired Metaheuristic Approach

    "In machine learning and statistics, feature selection is the technique of selecting a subset of relevant features for building robust learning models. In this paper, the authors propose a bio-inspired BAT algorithm as feature selection method to find the optimal features from the KDDCup'99 intrusion detection dataset obtained from UCI...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Nov 2014

    Use of Genetic Algorithm with Fuzzy Class Association Rule Mining for Intrusion Detection

    "In today's life intrusion detection system gain the attention, because of ability to detect the intrusion access efficiently and effectively as security is the major issue in networks. This system identifies attacks and reacts by generating alerts or blocking the unwanted data/traffic. Intrusion detection system mainly classified as anomaly based...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Oct 2014

    Finding Best Time Quantum for Round Robin Scheduling Algorithm to Avoid Frequent Context Switch

    In round robin scheduling, the time quantum is fastened then processes area unit scheduled specified no process get CPU time quite only once quantum in one go. If time quantum is simply too massive, the time interval of the processes is too much which cannot be tolerated in interactive atmosphere....

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Sep 2014

    Improving the Performance of Processing for Small Files in Hadoop: A Case Study of Weather Data Analytics

    Hadoop is an open source apache project that supports master slave architecture, which involves one master node and thousands of slave nodes. Master node acts as the name node, which stores all the metadata of files and slave nodes acts as the data nodes, which stores all the application data....

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2014

    Educational Data mining for Prediction of Student Performance Using Clustering Algorithms

    In recent years, the biggest challenges that educational institutions are facing the explosive growth of educational data and to use this data to improve the quality of managerial decisions. Educational institutions are playing an important role in the society and playing a vital role for growth and development of nation....

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2014

    Anonymization: Enhancing Privacy and Security of Sensitive Data of Online Social Networks

    Privacy is one of the major concerns when publishing or sharing social network data for social science research and business analysis. This paper is motivated by the recognition of the need for a finer grain and personalized privacy in data publication of social networks. Recently, researchers have proposed a privacy...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2014

    Investigating Suspicious Transactions through High Value Networks in Financial Intelligence Services

    Financial crimes can be explained as those crimes that are committed by people of high status for the purpose of their occupation, some of the most obvious types of white collar crimes include bank frauds, bribery, measure and weight crimes, extortion, black mail, counterfeit, computer frauds and insider trading, Bank...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2014

    A Study of Power and Energy Aware Routing Technologies in Wireless Sensor Network

    Wireless Sensor Network (WSN) is advanced technology of mobile ad-hoc network deployed to perform a number of useful tasks. Sensors are low battery powered node used to sense some specific kinds of data or information. Data can be of any type such as humidity, temperature, pressure, air pollutions, vibration etc....

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2014

    Optimal Resource Allocation in Wireless Mesh Network

    Flow control in a wireless mesh network is an optimization problem. The task is to maximize the aggregate utility of elastic traffic sources. The work has been a basis for analyzing various transport-level (including TCP-based) congestion control algorithms. The task takes is to analyze the self-interference of flows and assigns...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2014

    A Review on Cloud Data Storage in Virtual Perspective

    Cloud can be expanded as common location independent on-line utility that is available on demand. This review starts with study on cloud computing in virtual perspective. The cloud has many \"On-demand\" service models, of which, cloud storage is a model which is amorphous today and with neither a clearly defined...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2014

    Implementation of Optimization of Latency in Wireless Mesh Network

    Research interest towards wireless mesh network has improved drastically. WMN is emerging as promising technology for many useful applications. Many efforts have been conducted to maximize network throughput in multi-channel multi-radio wireless mesh network. Most current approaches are based on either purely static or purely dynamic. Channel allocation plays major...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2014

    An Study on Performance Analysis of Ring Based Index Data Management in WSN

    In Wireless Sensor Network (WSN) management is the process of managing, monitoring, and controlling the behavior of each sensor network. The limitation of wireless sensor networks is limited storage space, limited battery power and limited data processing. Communication takes more source of energy consumption in WSN; various schemes have been...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2014

    Electronic Parking Lot Payment using Passive RFID and Cloud Computing

    Radio Frequency IDentification (RFID) is a technology that uses radio waves to transfer data from an electronic tag which is also called as RFID tag or label attached to an object through a reader for the purpose of identifying and tracking the object. This paper focuses on an electronic payment...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2014

    Design Criteria and Challenges of Industrial Wireless Sensor Network

    Wireless Sensor Network (WSN) for industrial automation and applications are becoming more prevalent. Mature industries such as oil and gas refineries, waste water treatment and delivery, electrical generation, natural gas distribution have migrated from wired to wireless sensor networks over the past decades. This is because of the advantage of...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2014

    Data Mining Classification Algorithm for ETesting and Analysis Processing

    In this paper, the authors focus on developing to bring up various features for the distance learning system. There are various modules in this system, to provide extensive evaluation for distance learners. Questions are randomly chosen from the given set of questions in a random manner. The questions are taken...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2014

    Data Mining Vs Statistical Techniques for Classification of NSL-KDD Intrusion Data

    Intrusion is a kind of malicious attack and is very harmful for individual or for any organization. Due to rapid growing of internet users it has become an important research area Information and network security is becoming an important issue for any organization or individual to protect data and information...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2014

    An Enhanced Method for Spam Filtering Based on Basiyan Classifier

    Phishing is an emerging type of social engineering crime on to the web. Most phishes initiate attacks sending by emails to potential victims. The rapid development and evolution of phishing techniques pose a big challenge in web identity security for researchers over all phishing attacks spoof users from the visual...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2014

    Linux Kernel Memory Protection (ARM)

    Memory protection is a way to control memory access rights on an embedded system. The main purpose of memory protection is to prevent a task from accessing memory without proper access permissions. Without memory protection memory segment like code and data segment are vulnerable to memory related bugs and code...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2014

    Monitoring Physical Activities Using WBAN

    Recent technological advances in wireless communications, mobile computation, and sensor technologies have enabled the development of low-cost, miniature, lightweight, intelligent wireless sensor devices or \"Motes\". A collection of these devices can be placed strategically on the key positions of the human body and connected by means of a wireless network...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2014

    A Survey on Implementing Public Key Cryptography on RFID Tags

    Radio Frequency IDentification (RFID) is an emerging technology, which brings enormous productivity benefits in applications, where objects have to be identified automatically. This paper presents issues concerning security and privacy of RFID systems. RFID tags are a new generation of barcodes with added functionality. The risk related to using the...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2014

    On Effective Protection of Security and Privacy in XML Information Brokering

    In contrast with the situations when the information seeker knows where the needed data is located, XML Information Brokering System (IBS) needs to help each information seeking query \"Locate\" the corresponding data source(s). Unlike early information sharing approaches that only involve a small number of databases, new information sharing applications...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2014

    Big Data and the Opportunities and Challenges for Government Agencies

    The data stored with Government agencies is an asset both for the nation and the government. This data which is a potential source of opportunity brings with itself many challenges and the government agencies like many other corporations should be able to seize the opportunity that this big data presents...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2014

    Performance Comparison of Variants of Ant Colony Optimization Technique for Online Tuning of a Pi Controller for a Three Phase Induction Motor Drive

    In this paper, the authors address the design and tuning schemes for a feedback controller of an induction motor drive by employing three different algorithms inspired by the behavior of the ants. A mechanical equivalent model of the drive is considered along with the parameter variations which are prominent in...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2014

    Triple Security of Data in Cloud Computing

    Cloud computing is the biggest buzz in computer world now a days. It is providing excellent facilities by flexible infrastructure. Cloud computing is based on client-server architecture. Cloud computing is a hub of various server and many database to store data. Cloud computing provide many services to user which is...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2014

    Comparative Analysis of Encrypted Video Streaming in Cloud Network

    Digital data is readily available in the form of pictures, videos, and over the internet. Therefore, the significance of increasing digital contents demands new challenges to ensure the distribution of the digital content. This dissertation addresses various encryption techniques for videos while streaming them in cloud environment. In these encryption...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2014

    Virtual Machine Placement Based on Disk I/O Load in Cloud

    In cloud virtualization allows to consolidate the services onto a lesser number of physical servers than originally required. The virtual machine is one of the most commonly used resource carriers in which business services are encapsulated. Virtual machine placement optimization, i.e., finding optimal placement schemes for virtual machines, and reconfigurations...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2014

    Secure Cloud - A Survey

    Cloud computing is an emerging technology where the data is outsourced to the cloud. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel control, cloud moves the application software and databases to the large data centers, where the management of the data and...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2010

    Network Storage And Its Future

    Computing is based on information. Information is the underlying resource on which all computing processes are based. Information is stored on storage media and is accessed by applications executing on a server. Often the information is a unique company asset. Information is created and acquired every second of every day....

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2011

    Traffic Pattern Based Performance Comparison of AODV, DSDV & OLSR MANET Routing Protocols Using Freeway Mobility Model

    Mobile ad-hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any standalone infrastructure or centralized administration. Mobile Ad-hoc networks are self-organizing and self-configuring multihop wireless networks where, the structure of the network changes dynamically. This is mainly due to the mobility of...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2011

    A Three Level Tree Structure Database Architecture for Global Roaming in Mobile Networks

    The basic necessary service in mobile networks is global roaming, where personal mobility, terminal mobility and portability in service provider should be supported for making global roaming seamless in future generation. In the current application if a user moves from one country to other or to other continent user needs...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2011

    A Data Cache Invalidation Strategy for Internet Vehicular Ad Hoc Network on Highway

    Internet Vehicular Ad hoc NETwork (IVANET) is a combination of wired Internet and Vehicular Ad hoc NETwork (VANET) through roadside infrastructure for universal communication among vehicles. A key optimization technique in IVANET is to cache frequently accessed data items in local storage of vehicles. A critical design issue is how...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2011

    Flow Control Packet Marking Scheme: To Identify the Sources of Distributed Denial of Service Attacks

    Flow Control Packet Marking Scheme is a tracing technique, to identify the sources of Distributed Denial of Service (DDOS) attacks. DDOS attacks reduce the quality of the system. While a number of other tracing techniques exist, Flow Control Packet Marking Scheme can obtain better tracing capability than the others. FCPM...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2011

    Sensing Malicious Packet Losses

    In this paper, the authors consider the problem of detecting whether a compromised router is maliciously manipulating its stream of packets. In particular, they are concerned with a simple yet effective attack in which a router selectively drops packets destined for some victim. Unfortunately, it is quite challenging to attribute...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2011

    A New Scheme to Check ARP Spoofing: Prevention of MAN-IN-THE-MIDDLE Attack

    The Address Resolution Protocol (ARP) is a computer networking protocol for determining a network host's Link Layer address when only its Internet Layer (IP) or Network Layer address is known. Address Resolution Protocol (ARP) spoofing is a technique used to attack an Ethernet wired or wireless network. It is also...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jan 2011

    The Foot Step of Mobile Network - Wireless Network Architecture

    In this paper the authors discuss a modal of embedded Linux system support wireless network and its management. Wireless networks spread over a large physical area. Physical access of each node in other words signal sending place and accepting place is very difficult. To operate this type of networks there...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jan 2011

    Ultra Wideband Channel Model for IEEE 802.15.4a and Performance Comparison of DBPSK/OQPSK Systems

    Ultra WideBand (UWB) is a radio technology that can be used at very low energy levels for short-range high-bandwidth communications by using a large portion of the radio spectrum. Ultra WideBand (UWB) systems transmit signals across a much wider frequency than conventional systems and are usually very difficult to detect....

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2011

    Proficient Distribution in Mobile Ad Hoc Network

    A proficient distribution in mobile ad hoc network is a collection of nodes, which have the possibility to connect on a wireless medium and form an arbitrary and dynamic network with wireless links. That means the links between the nodes can change during time, new nodes can join the network,...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2011

    A PDRR Based Detection Technique for Blackhole Attack in MANET

    An Ad hoc network is the network with no fixed infrastructure. There is no central administrator so any node can come and move in and outside of the network in a dynamic manner. This makes it more dynamic and complex which makes it more prone to attacks. They can attack...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2011

    ETX Based Routing Metrics

    Wireless Multi-hop Networks (WMhNs) are supposed to be the forerunner among the currently existing communication technologies. They provide users with flexible structures, feasible cost, convenience, ever growing bandwidths and innovative solutions. The increasing demands of the users provide a challenge to improve the quality of WMhNs. The performance of WMhNs...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2011

    A Robust Method of License Plate Recognition Using ANN

    The purpose of this paper is to design a system that can recognize vehicle license plate under poor environmental conditions by using neural network. Adverse environmental condition may refer to the image has been blurred by poor lighting, rain, poor image resolution and haze which make the image not clear....

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2011

    Density Based Optimized Broadcasting for Multirate Services in Wireless ADHOC Network

    Due to non-infrastructure requirement AdHoc network has gained higher popularity in recent past. AdHoc networks demands for higher intermediate node supports for long-range communication. For the improvement of long-range communication different routing schemes were suggested. Wireless AdHoc network is an emerging communication approach. In wireless AdHoc network the most commonly...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2011

    Gray Zone Effect in MANETs on Proactive and Reactive Routing Protocols

    There has been much research work done on the improvement of adhoc routing protocols to enhance network performances. But in these networks, performance is very much dependent on wireless physical layer where communication is quite complex. The effect of the combination of different routing strategies (protocols) and physical channel properties...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2011

    Comparison of Queuing Algorithms Against DDoS Attack

    In this paper, the authors are going to present the simulation results of comparison of five queuing algorithms (Drop Tail, Fair Queuing, Stochastic Fair Queuing, Deficit Round Robin and Random Early Detection) using ns-2 as simulation environment. Comparison of the queuing algorithms is based on attack-intensity. They are checking the...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2011

    Automated Advanced Industrial and Home Security Using GSM and FPGA

    Home and industrial security today needs to make use of the latest technological components. In this paper the author is going to present the design and implementation of a remote and sensing, control and home security system based on GSM (Global System for Mobile). This system offers a complete, low...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2011

    Active and Passive Network Measurements : A Survey

    One major question facing operators everywhere is how to be sure that everything goes fine as well as how black holes can be detected in their networks? Passive network monitoring is very suitable for this purpose. It can be used for searching problems of a single network device, a major...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2011

    An Approach to Congestion Control for Wireless Ad-Hoc Networks

    The authors study joint design of end-to-end congestion control and Per-link Medium Access Control (MAC) in ad-hoc networks. In the current scenario wireless communication is emerging the world. Wireless Ad Hoc networks demands for higher intermediate node supports for long-range communication. Wireless Ad Hoc network is an emerging communication approach....

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // May 2011

    Combined Security Model Tool for Adhoc Networks

    There has been a number of access control models. Under the RBAC framework, users are granted membership into roles based on their responsibilities. XML based Security Labels using a guard prototype for data transfer and web services based applications. This model tool is evolving together embedding roles within databases. This...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // May 2011

    Application of Web Mining With XML Data Using XQuery

    In recent years XML has become very popular for representing semi structured data and a standard for data exchange over the web. Mining XML data from the web is becoming increasingly important. Several encouraging attempts at developing methods for mining XML data have been proposed. However, efficiency and simplicity are...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // May 2011

    Fusion of Web Structure Mining and Web Usage Mining

    Web mining a hot research area of data mining can be classified into three main areas: Web Usage Mining, Web content Mining and Web Structure Mining. Web usage mining is a kind of web mining, which exploits data mining techniques to discover valuable information from navigation behavior of World Wide...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // May 2011

    Detection of Attacks in an Intrusion Detection System

    Intrusion detection is the act of detecting unwanted traffic on a network or a device. A Intrusion Detection System (IDS) provides a layer of defense which monitors network traffic for predefined suspicious activity or patterns, and alert system administrators when potential hostile traffic is detected. Intrusion detection faces a number...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Dec 2010

    Optical Wireless Communication Link Design

    Modern Optical Wireless Communication (OWC) was an offshoot of the development of laser technologies in the 1960s. The main aim then was to develop communication between satellites and submarines beneath the surface of the sea. In the communication world, Optical Wireless Communication (OWC) is the only area that remains to...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Dec 2010

    Simulator to Analyze QoS for IEEE 802.11b/a/g Standards

    The author has developed a simulator that simulates the behavior and performance of distinct wireless local area network standards IEEE 802.11b, IEEE 802.11a and IEEE 802.11g in terms of few Quality of Service Parameters. Simulation measures the Quality of Service in terms of media access delay, network throughput, network bandwidth...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Dec 2010

    A Novel Approach of Linear Parallel Interference Cancellation in Uplink OFDMA Systems With Carrier Frequency Offsets

    In uplink Orthogonal Frequency Division Multiple Access (OFDMA) systems, Multi-User Interference (MUI) occur due to different Carrier Frequency Offsets (CFO) of different users at the receiver. Here, the authors present a multistage Linear Parallel Interference Cancellation (LPIC) approach to mitigate the effect of this MUI in uplink OFDMA. The proposed...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Sep 2011

    An Effective Indexing Method for High Dimensional Databases

    A large number of database applications like business data warehouses and scientific data repositories deal with high-dimensional data sets. As the number of dimensions/attributes and the overall size of data sets increase, it becomes prime important to efficiently retrieve specific queried data from the database in order to utilise the...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Sep 2011

    Data Mining: A Healthy Tool for Your Information Retrieval and Text Mining

    Data Warehousing and Data Mining are widely used by many industries like banking, insurance, healthcare, security and many others, however very little work has been done for Text-mining. Text mining involves the application of techniques from areas such as information retrieval, natural language processing, information extraction and data mining. In...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Sep 2011

    Rephrasing Essentials of Object Oriented Programming Based on Testing Pre-Requisites

    Even after thorough testing of a program, usually a few bugs still remain. These residual bugs are usually uniformly distributed throughout the code. It is observed that bugs in some parts of a program can cause more frequent and more severe failures compared to those in other parts. It should,...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Sep 2011

    Efficient Way of Data Managing for Range Queries in Unstructured Peer to Peer Networks

    Peer-To-Peer (P2P) networks have become very popular in the last few years. Nowadays, they are the most widespread approach for exchanging data among large communities of users in the file sharing context. Efficient way of managing storage and retrieval of multidimensional data is achieved by proposed framework which ensures robust...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Sep 2011

    Intrusion Detection in Wireless Networks Using Selected Features

    Intrusion detection is a process of identifying and responding to malicious activity targeted at computing and networking resources. A wireless IDS is unique in that it detects attacks against the 802.11 frame at layer two of the wireless network. There are three different types of 802.11 MAC frames; data, control,...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Oct 2011

    A Survey of Link Failure Mechanism and Overhead of Routing Protocols in MANET

    The nodes in Mobile Ad Hoc NETwork (MANET) are mobile resulting in dynamic topology with high rate of link breakage and network partitions leading to interruptions in the ongoing communication. In contrast to wired network, MANET has increased possibility of packet loss and congestion resulting in energy consumption. Routing techniques...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Oct 2011

    Image Edge Detection by Using Rule Based Fuzzy Classifier

    Fuzzy logic is a key concept of artificial intelligence helps to implement the rule based algorithms that helps to find and highlight the properties of an image by checking the relative pixel values. Image processing is any form of information processing for which both the input and output are images...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Oct 2011

    Context-Aware Personalized Mobile Web Search Techniques-A Review

    The advent of the Web has raised different searching and querying problems. Keyword matching based querying techniques used by various search engines, return thousands of Web documents for a single query, and most of these documents are generally are unrelated to the users' required information. Queries submitted to a search...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Oct 2011

    Access Control Policy: A Framework to Enforce Recommendations

    Access control policies are generally modeled using permission, prohibition, and obligation rules. However, this does not cover all possible scenarios as several applications have recommendation rules. In this paper, the authors provide a formal framework to express and to enforce recommendations. More precisely, their framework allows to express recommendation rules...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Sep 2011

    An Approach to Improve the Security of Online System Using Crypto System

    Presently, the chief problem facing Internet banking is the security of online transactions. That's why, 3-tier security is used to make the transaction more secure. Among the 3-Tier Security layers, Application layer security comes first as it is the topmost layer in OSI model. The visitors always assume about the...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Sep 2011

    An Efficient Trusted Computing Base for Routing in MANET's

    The authors propose an approach to secure MANETs by employing low-complexity low-cost Trustworthy MANET Modules (TMM), which perform some trivial hard-wired functions involving simple logical operations and block-cipher operations. They describe the functionality of such TMMs to offer a sound Trusted Computing Base (TCB) for securing MANETs. They compare the...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Sep 2011

    Evolving User Profiles in Dynamic Web Sites

    Most of the companies have the web sites for their business. Most of the customers of the organization register their details as user profiles. These user profiles have the personal details and their interesting habits of the customer. When the customer visits the authors' web sites the log file is...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Sep 2011

    Analysis and Performance of ARCP for Multi Region Mobile Emissary Environments

    This Paper presents Adaptive Reliable Communication Protocol performance and presents different possible phases like registration, locality management and message release .The procedure will uses this categorization for the mechanisms proposed in standards and implemented in mobile emissary systems. Then the protocols also assess the different mechanisms regarding their throughput, fault...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Sep 2011

    A Comparative Study of Routing Protocols

    This paper is focus on the different routing protocols used for routing in computer network. A routing protocol is a protocol that specifies how routers communicate with each other, disseminating information that enables them to select routes between any two nodes on a computer network, the choice of the route...

    Provided By International Journal of Computer Science and Information Technologies