International Journal of Computer Science and Information Technologies

Displaying 1-40 of 708 results

  • White Papers // Feb 2015

    An Efficient Centralized Clustering Approach for Wireless Sensor Networks

    Wireless sensor networks consists of no. of micro sensor nodes to monitor a remote environment by using aggregated data from individual nodes and transfer this data to the base station for further purpose. Here the energy of operated nodes is susceptible store of the wireless sensor network, which is useless...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jan 2015

    Context Aware Service Information Extraction from Bigdata

    Big data is a term used for defining the exponential growth and availability of both structured and unstructured and semi structured data is most difficult for processing with traditional database systems. Big data is inward from multiple sources at an alarming velocity, variety and volume. Although big data does not...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Dec 2014

    An Improved Framework for Tamper Detection in Databases

    The corporate world, government sector and many organizations has a requirement of secure database system. So due to huge amount of data most of the organizations prefers outsourcing of databases to trusted third parties. In many of the scenarios database tampering is happen due to inside employee of the organizations,...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Dec 2014

    Prominence of Spatial Database in Geographical Information Systems

    Spatial database is a collection of spatially referenced data that acts as a model of reality. Geographical information system includes spatial data which is either in raster or vector form and data derived from remote sensors are increasingly utilized as source for GIS. Spatial data is the core part of...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Dec 2014

    Analysis of CMOs Dynamic Comparators for Low Power and High Speed ADCs

    The need for extreme low power, efficient area and high speed ADC converters make use of the dynamic comparators for maximizing the speed and efficiency of power. Generally comparators play a vital role in the ADCs circuits for comparing the input voltage with respect to the reference voltage. The comparison...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Nov 2014

    Classifier Model for Intrusion Detection Using Bio-Inspired Metaheuristic Approach

    "In machine learning and statistics, feature selection is the technique of selecting a subset of relevant features for building robust learning models. In this paper, the authors propose a bio-inspired BAT algorithm as feature selection method to find the optimal features from the KDDCup'99 intrusion detection dataset obtained from UCI...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Nov 2014

    Use of Genetic Algorithm with Fuzzy Class Association Rule Mining for Intrusion Detection

    "In today's life intrusion detection system gain the attention, because of ability to detect the intrusion access efficiently and effectively as security is the major issue in networks. This system identifies attacks and reacts by generating alerts or blocking the unwanted data/traffic. Intrusion detection system mainly classified as anomaly based...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2014

    Educational Data mining for Prediction of Student Performance Using Clustering Algorithms

    In recent years, the biggest challenges that educational institutions are facing the explosive growth of educational data and to use this data to improve the quality of managerial decisions. Educational institutions are playing an important role in the society and playing a vital role for growth and development of nation....

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2014

    Anonymization: Enhancing Privacy and Security of Sensitive Data of Online Social Networks

    Privacy is one of the major concerns when publishing or sharing social network data for social science research and business analysis. This paper is motivated by the recognition of the need for a finer grain and personalized privacy in data publication of social networks. Recently, researchers have proposed a privacy...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2014

    Investigating Suspicious Transactions through High Value Networks in Financial Intelligence Services

    Financial crimes can be explained as those crimes that are committed by people of high status for the purpose of their occupation, some of the most obvious types of white collar crimes include bank frauds, bribery, measure and weight crimes, extortion, black mail, counterfeit, computer frauds and insider trading, Bank...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2014

    Implementation of Optimization of Latency in Wireless Mesh Network

    Research interest towards wireless mesh network has improved drastically. WMN is emerging as promising technology for many useful applications. Many efforts have been conducted to maximize network throughput in multi-channel multi-radio wireless mesh network. Most current approaches are based on either purely static or purely dynamic. Channel allocation plays major...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2014

    A Study of Power and Energy Aware Routing Technologies in Wireless Sensor Network

    Wireless Sensor Network (WSN) is advanced technology of mobile ad-hoc network deployed to perform a number of useful tasks. Sensors are low battery powered node used to sense some specific kinds of data or information. Data can be of any type such as humidity, temperature, pressure, air pollutions, vibration etc....

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2014

    Optimal Resource Allocation in Wireless Mesh Network

    Flow control in a wireless mesh network is an optimization problem. The task is to maximize the aggregate utility of elastic traffic sources. The work has been a basis for analyzing various transport-level (including TCP-based) congestion control algorithms. The task takes is to analyze the self-interference of flows and assigns...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2014

    A Review on Cloud Data Storage in Virtual Perspective

    Cloud can be expanded as common location independent on-line utility that is available on demand. This review starts with study on cloud computing in virtual perspective. The cloud has many \"On-demand\" service models, of which, cloud storage is a model which is amorphous today and with neither a clearly defined...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2014

    An Study on Performance Analysis of Ring Based Index Data Management in WSN

    In Wireless Sensor Network (WSN) management is the process of managing, monitoring, and controlling the behavior of each sensor network. The limitation of wireless sensor networks is limited storage space, limited battery power and limited data processing. Communication takes more source of energy consumption in WSN; various schemes have been...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2014

    Electronic Parking Lot Payment using Passive RFID and Cloud Computing

    Radio Frequency IDentification (RFID) is a technology that uses radio waves to transfer data from an electronic tag which is also called as RFID tag or label attached to an object through a reader for the purpose of identifying and tracking the object. This paper focuses on an electronic payment...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2014

    Design Criteria and Challenges of Industrial Wireless Sensor Network

    Wireless Sensor Network (WSN) for industrial automation and applications are becoming more prevalent. Mature industries such as oil and gas refineries, waste water treatment and delivery, electrical generation, natural gas distribution have migrated from wired to wireless sensor networks over the past decades. This is because of the advantage of...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2014

    Data Mining Classification Algorithm for ETesting and Analysis Processing

    In this paper, the authors focus on developing to bring up various features for the distance learning system. There are various modules in this system, to provide extensive evaluation for distance learners. Questions are randomly chosen from the given set of questions in a random manner. The questions are taken...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2014

    Data Mining Vs Statistical Techniques for Classification of NSL-KDD Intrusion Data

    Intrusion is a kind of malicious attack and is very harmful for individual or for any organization. Due to rapid growing of internet users it has become an important research area Information and network security is becoming an important issue for any organization or individual to protect data and information...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2014

    On Effective Protection of Security and Privacy in XML Information Brokering

    In contrast with the situations when the information seeker knows where the needed data is located, XML Information Brokering System (IBS) needs to help each information seeking query \"Locate\" the corresponding data source(s). Unlike early information sharing approaches that only involve a small number of databases, new information sharing applications...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2014

    Big Data and the Opportunities and Challenges for Government Agencies

    The data stored with Government agencies is an asset both for the nation and the government. This data which is a potential source of opportunity brings with itself many challenges and the government agencies like many other corporations should be able to seize the opportunity that this big data presents...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2014

    Performance Comparison of Variants of Ant Colony Optimization Technique for Online Tuning of a Pi Controller for a Three Phase Induction Motor Drive

    In this paper, the authors address the design and tuning schemes for a feedback controller of an induction motor drive by employing three different algorithms inspired by the behavior of the ants. A mechanical equivalent model of the drive is considered along with the parameter variations which are prominent in...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2014

    Triple Security of Data in Cloud Computing

    Cloud computing is the biggest buzz in computer world now a days. It is providing excellent facilities by flexible infrastructure. Cloud computing is based on client-server architecture. Cloud computing is a hub of various server and many database to store data. Cloud computing provide many services to user which is...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2014

    An Enhanced Method for Spam Filtering Based on Basiyan Classifier

    Phishing is an emerging type of social engineering crime on to the web. Most phishes initiate attacks sending by emails to potential victims. The rapid development and evolution of phishing techniques pose a big challenge in web identity security for researchers over all phishing attacks spoof users from the visual...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2014

    Linux Kernel Memory Protection (ARM)

    Memory protection is a way to control memory access rights on an embedded system. The main purpose of memory protection is to prevent a task from accessing memory without proper access permissions. Without memory protection memory segment like code and data segment are vulnerable to memory related bugs and code...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2014

    Monitoring Physical Activities Using WBAN

    Recent technological advances in wireless communications, mobile computation, and sensor technologies have enabled the development of low-cost, miniature, lightweight, intelligent wireless sensor devices or \"Motes\". A collection of these devices can be placed strategically on the key positions of the human body and connected by means of a wireless network...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2014

    A Survey on Implementing Public Key Cryptography on RFID Tags

    Radio Frequency IDentification (RFID) is an emerging technology, which brings enormous productivity benefits in applications, where objects have to be identified automatically. This paper presents issues concerning security and privacy of RFID systems. RFID tags are a new generation of barcodes with added functionality. The risk related to using the...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2014

    Energy Economical Resolution for Heavy Computation Using Cloud

    In spite of the dramatic growth inside the variability of excellent phones in recent years, the challenge of restricted energy capability of these devices has not been resolved satisfactorily. However, inside the age of cloud computing, the limitation on energy capability is mitigated off in a cheap manner by offloading...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2014

    Comparative Analysis of Encrypted Video Streaming in Cloud Network

    Digital data is readily available in the form of pictures, videos, and over the internet. Therefore, the significance of increasing digital contents demands new challenges to ensure the distribution of the digital content. This dissertation addresses various encryption techniques for videos while streaming them in cloud environment. In these encryption...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2014

    Virtual Machine Placement Based on Disk I/O Load in Cloud

    In cloud virtualization allows to consolidate the services onto a lesser number of physical servers than originally required. The virtual machine is one of the most commonly used resource carriers in which business services are encapsulated. Virtual machine placement optimization, i.e., finding optimal placement schemes for virtual machines, and reconfigurations...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2014

    Secure Cloud - A Survey

    Cloud computing is an emerging technology where the data is outsourced to the cloud. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel control, cloud moves the application software and databases to the large data centers, where the management of the data and...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2014

    A Study of the Issues and Security of Cloud Computing

    In this paper, the authors identify the issues and the solution to overcome these problems. Cloud computing is a subscription based service where they can obtain networked storage space and computer resources. This technology has the capacity to admittance a common collection of resources on request. It is the application...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2014

    Missing Value Imputation in Multi Attribute Data Set

    Data mining has made a great progress in recent year but the problem of missing data or value has remained great challenge for data mining. Missing data or value in a datasets can affect the performance of classifier which leads to difficulty of extracting useful information from datasets dataset taken...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2014

    Privacy Preservation of Published Data through Record Elimination by Anonymizied Approach

    Data mining is the process of analyzing data. Data privacy is collection of data and dissemination of data. Privacy issues arise in different area such as health care, intellectual property, biological data, financial transaction etc. It is very difficult to protect the data when there is transfer of data. Sensitive...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2014

    A Survey on Data Sharing Using Encryption Technique in Cloud Computing

    A model by which information technology services being delivered is resources are retrieved from the internet through web-based tools and applications, instead of direct connection to a server. The data and software packages are stored in servers. However, cloud computing structure allows access to information as long as an electronic...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2014

    Propagate Cooperative Caching on MANETS

    Mobile Ad-hoc NETworks (MANET) are formed by mobile devices, such as data enabled phones, electronic book readers. Generally users can share common interests in electronic interests in electronic content. As MANET become more and more crucial to everyday functioning of the people. This paper discusses cooperative caching technique for minimizing...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2014

    Survey on Data Mining with Privacy Preservation

    Data mining is the process to look for hidden patterns and trends in data that is not immediately apparent from summarizing the data. Due to the rapid development in technology, it needs updated techniques to provide privacy for data mining. There are various methods and techniques which have been created...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2014

    An Efficient Software Prediction on Cloud infrastructure With Self- Adaptive Classification Model

    Business information is stored in the cloud environment and offers proficient software services to the clients using internet. Cloud infrastructure delivers traditional software services among different cloud users. Decentralized self-adaptation mechanism has been implemented to maintain decentralization applicable to QoS exhibited cloud system. However, designing decentralized self-adaptation mechanism is not...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2014

    Studies on Clustering and Fuzzy Clustering

    In recent years, data mining is widely preferred area by researcher for discovering new knowledge and it has various concepts in that. The clustering is most popular concept in data mining and getting new knowledge from hidden data structure. Databases having lot of meaningful information and stored in unordered as...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2014

    Storing, Querying and Validating Fuzzy XML Data in Relational Database

    Information ambiguity and uncertainty are the major issues in real real-world scenario and for resolving these issues fuzzy data management has been incorporated in different database management systems in different ways. Even though there is much literature on XML-to-relational storage, few of these have given satisfactory solutions to the given...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Nov 2010

    Performance Analysis of 802.11 and 802.11p in Cluster Based Simple Highway Model

    Vehicular Adhoc NETwork (VANET) is a special type of Intelligent Transport System (ITS), where the mobile nodes are cars, two wheelers, trucks, buses etc., that move on well organized and predefined roads in both direction at very high speed. Following traffic rules, the vehicles provide communication with each other directly...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Nov 2010

    A Multiobjective Genetic Algorithm for Feature Selection in Data Mining

    The rapid advance of computer based high-throughput technique have provided unparalleled opportunities for humans to expand capabilities in production, services, communications, and research. Meanwhile, immense quantities of high-dimensional data are accumulated challenging state-of-the-art data mining techniques. The intelligent analysis of Databases may be affected by the presence of unimportant features,...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Nov 2010

    Text Database Cleaning by Filling the Missing Values Using Object Oriented Intelligent Multi-Agent System Data Cleaning Architecture

    Agents are software programs that perform tasks on behalf of others and they are used to clean the text database with their characteristics. Agents are task oriented with the ability to learn by themselves and they react to the situation. Learning characteristics of an agent is done by verifying its...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Nov 2010

    A Comparison Between Public Key Authority and Certification Authority for Distribution of Public Key

    The key management of public key defines two aspects first one is the distribution of public key and the second one is the use of public key to distribute secret keys for encryption. In this paper, the authors are presenting the public key authentication framework. The distribution of public key...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2012

    Reliable Routing Method Weight Based in MANET (Mobile Adhoc Network)

    Mobile Ad hoc NETworks (MANET) consist of a set of mobile hosts that can communicate with each other without the assistance of base stations. MANETs are heterogeneous mix of different wireless and mobile devices, ranging from little hand-held devices to laptops. In MANETs, the high mobility of mobile nodes is...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2012

    Security Analysis in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are used in many applications in military, ecological, and health-related areas. These applications often include the monitoring of sensitive information such as enemy movement on the battlefield or the location of personnel in a building. Security is therefore important in WSNs. However, WSNs suffer from many...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Apr 2012

    Intrusion Detection System Using Data Mining Approach

    Intrusions are the activities that violate the security policy of the system, and intrusion detection is the process used to identify intrusions. This paper gives an overview of the existing intrusion detection techniques, including anomaly detection and misuse detection models, and identifies techniques related to intrusion detection in distributed systems....

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Apr 2012

    Server Virtualization: Increase IT Efficiency Through Virtual Data Center Automation

    This paper explores the concept of Server virtualization technology that offers enormous possibilities for autonomic management of datacenter which runs a heterogonous mix of workloads through the availability of new automation mechanisms that can be exploited to control and monitor tasks running within virtual machines. The stress given on the...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Apr 2012

    Survey on Routing Techniques in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) consist of small nodes with sensing, computation, and wireless communications capabilities. Many routing, power management, and data dissemination protocols have been specifically designed for WSNs where energy awareness is an essential design issue. The focus, however, has been given to the routing protocols which might differ...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2010

    A Journey on WiMAX and Its Security Issues

    Security has become a primary concern in order to provide protected communication in Wireless environment. The authors know the basic concept of communication is sent the information from source node to destination node but in their view the communication is not sent the information, but the amount of secure information...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2010

    Securing Mobile Agent Using Dummy and Monitoring Mobile Agents

    Mobile agent is a very important concept for distributed computing & utilizing the resources available on the connected network because of their capability of operation on different environments that is why the approach is used for many network based applications like data crawling, information exchange, distributed system integrity, etc., but...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2010

    Automatic Image Retargeting Using Saliency Based Mesh Parameterization

    Automatic image retargeting is used for large image. That are to be fit in small size display devices. Without any loss of information, the authors' proposed methods one is saliency based mesh parameterization method is used to retarget the image. Stretch-Based Mesh Parameterization is generating on saliency image. Graph-Based visual...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2010

    Improvement of the Performance of Advanced Local Area Optical Communication Networks by Reduction the Effects of the Propagation Problems

    Fiber optic transmission and communication are technologies that are constantly growing and becoming more modernized and increasingly being used in the modern day industries. Dispersion occurs when the light traveling down a fiber optic cable "Spreads out," becomes longer in wavelength and eventually dissipates. Attenuation, a reduction in the transmitted...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2012

    Comparative Study of Automated Testing Tools: Quick Test Pro and Load Runner

    Testing automation tools enables developers and testers to easily automate the entire process of testing in software development. The objective of the paper is to conduct a comparative study of automated tools such as the Mercury Quick Test Professional and the Mercury Load Runner based on criteria such as the...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2012

    Achieving Fast Recovery in IP Networks by Multiple Routing Configuration

    The internet has taken a central role in the communication infrastructure. The demand for internet has increased a lot but the problem is slow convergence of routing protocol after a failure has occurred. To assure a fast recovery from the link and node failures, the authors present new recovery scheme...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2012

    Modern Power Semiconductor Devices (A Review)

    This paper discusses the different types of power semiconductor devices. It also describes the operation, characteristics and applications of different devices. The principle of operation and the key features of different devices is discussed. The other thyristor group devices, such as Triac having capability to conduct in both positive and...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2012

    Public Key Cryptography by Centralized Offline Server in Mission-Critical Networks

    Mission-Critical networks show great potential in assisted living system, automotive networks, emergency rescue and disaster recovery system, military applications, critical infrastructure monitoring system. To build a secure communication system in that network, usually the first attempt is to employ cryptographic keys. Cryptographic key management is challenging due to the things...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2012

    Explore 10 Different Types of Software Development Process Models

    The development lifecycle of software Comprises of four major stages namely Requirement Elicitation, Designing, Coding and Testing. A software process model is the basic framework which gives a workflow from one stage to the next. This workflow is a guideline for successful planning, organization and final execution of the software...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2012

    Extended Ad hoc On demand Distance Vector Multipath Routing (EAODVMR) Protocol for Mobile Ad Hoc NETwork(MANET)

    Mobile Ad hoc NETworks (MANETs) consist of a collection of wireless mobile nodes which dynamically exchange data among them without the need of fixed infrastructure. Due to limited transmission range of wireless network nodes, multiple hops are usually needed for a node to exchange information with any other node in...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2012

    Experimental Analysis and Demonstration of the NS2 Implementation of Dynamic Buffer Sizing Strategies for 802.11 Based Wireless Networks

    All Internet routers contain buffers to hold packets during the time of congestion. Buffers are used to reduce the packet loss and to ensure high link efficiency. The widely used general rule-of-thumb is to have buffers size as the Bandwidth-Delay Product (BDP) of the network. The use of the fixed...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2012

    Ensuring Security in Resource Centers of Cloud Environment by Using Trusted Pools

    Now a day's cloud computing is one of the emerging Technologies. This created a new era in the IT Industry With its Service Oriented Architecture. As the services of Organization Increases manganese of these services also becoming one of the problems. Management of resources will create some of security issues...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2012

    A Novel Approach Based Wireless Intrusion Detection System

    Intrusion detection in Wireless Sensor Network (WSN) is of practical interest in many applications such as detecting an intruder in a battlefield. The intrusion detection is a mechanism for a WSN to detect the existence of inappropriate, incorrect, or anomalous moving attackers. In this paper, the authors consider this issue...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2012

    Software Simulation of Unequal Error Protection Based Demodulator (Burst Mode) for Onboard Application

    This paper describes the algorithm and implementation details of a new DSP based 64 Kbps Demodulator developed for onboard application. This demodulator has the capability of Unequal Error P(UEP) based on Multiple Block Coded Modulation (MBCM). The software is run on ADSP-21020 simulator and MATLAB. The demodulator is tested by...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2012

    Bandwidth Optimization, Recycling In IEEE 802.16 Networks by Using Call Admission Control & Scheduler

    The IEEE 802.16 Working Group and was designed to support the bandwidth demanding applications with Quality of Service (QoS). Bandwidth is reserved for each application to ensure the QoS. For Variable Bit Rate (VBR) applications, however, it is difficult for the Subscriber Station (SS) to predict the amount of incoming...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2012

    Fault Prediction OO Systems Using the Conceptual Cohesion of Classes

    High cohesion is desirable property in software systems to achieve reusability and maintainability. In this paper, the authors are measures for cohesion in Object-Oriented (OO) software reflect particular interpretations of cohesion and capture different aspects of it. In existing approaches the cohesion is calculate from the structural information for example...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2012

    Fractal Based Management of Heterogeneous Data Streams

    Efficient handling of huge amount of data stream is become mandatory in various domains such as business, finance, sensor networks, etc. Come through these data streams poses challenges those are distinct from those addressed by orthodox database management systems. The enormous increase of Sensor Networks, GPS enabled devices and RFIDs...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2012

    Effective Performance Analysis of Bin -Periodic Algorithm for Wireless Sensor -Actor Network

    In wireless sensor-actor network, to transmit the data efficiently for long distance sensor-actor network is used. It will improves the performance in terms of energy consumed and end to end delay between sensor nodes compare to wireless sensor network. In this paper, the authors proposed the protocol for wireless sensor-actor...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2012

    Web Service Quality Composition Determination Using Genetic Algorithm in Sematic Web

    Ranking and optimization of web service compositions represent challenging areas of research with significant implications for the realization of the "Web of Services" vision. "Semantic web services" use formal semantic descriptions of web service functionality and interface to enable automated reasoning over web service compositions. To judge the quality of...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2012

    Secure Group Key Transfer Protocol Based on Secret Sharing

    Group key establishment is an important mechanism to construct a common session key for group communications. Key transfer protocols rely on a mutually trusted Key Generation Center (KGC) to select session keys and transport session keys to all communication entities secretly. Most often, KGC encrypts session keys under another secret...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Apr 2012

    False Data Detection in Wireless Network Using Dynamic Security Protocol

    In the Wireless sensor networks often consists of a large number of low-cost sensor nodes that have strictly limited sensing, computation, and communication capabilities. The security of wireless sensor networks is a challenging problem in the process of data aggregation. As data are send though sensor network confidentiality plays and...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // May 2012

    Cloud Security with Encryption Using Hybrid Algorithm and Secured Endpoints

    Cloud providers generally states that they are not responsible for the security that means leakage of the subscribed data or unauthorized modification of the data to make secure key for the purpose of securing cloud for transactions. It would have a private cloud for highly secure transactions and it would...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // May 2012

    A Prototype for Secure Web Access Model Using Multimodal Biometric System Based on Fingerprint and Face Recognition

    Any automatically measurable, robust and distinctive physical characteristics or personal trait that can be used to identify an individual or verify the claimed identity of an individual, referred to as biometrics, has gained significant interest in the wake of heightened concerns about security and rapid advancements in networking, communication and...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Oct 2012

    CEBKST: The Cost Efficient Based on Keying and Secure Data Transmission for Wireless Sensor Network

    In this paper, the author deals with Designing secure network protocols and cost-efficient, for Wireless Sensor Networks (WSNs). It is a problem because sensors are resource-limited wireless devices. Since the communication cost is the most dominant factor in a sensor's energy consumption, Here, they introduce a Cost Efficient Based on...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // May 2012

    AES Security Enhancement by Using Double S-Box

    In the world of cryptography Advanced Encryption Standard (AES) is one of the best algorithms of symmetric encryption technology. In this paper, the authors deal with improving security against attack. The randomness of the S-box is increase the avalanche effect and also increase the immunity power against attack compare to...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // May 2012

    Proposed a Robust Trust Model for Reliable and Secure Transactions in Grid Computing

    Grid computing is a type of advanced computing system whereby resources are shared from different domains. Organizations will only adopt this technology if they are assured of their data privacy, consistency & integrity. In such a scenario, reliability plays a critical role. Reliability in Grids can be enhanced by both...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Oct 2012

    Secure Analysis for Interval-Based Algorithms

    The authors consider several distributed collaborative key agreement and authentication protocols for dynamic peer groups. There are several important characteristics which make this problem different from traditional secure group communication. They are: distributed nature in which there is no centralized key server; collaborative nature in which the group key is...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Sep 2012

    A Secure Data Hiding Technique in Compressed Video Using a Secret Key

    In this paper, the authors deal with data hiding in compressed video. Unlike data hiding in images and raw video which operates on the images themselves in the spatial or transformed domain which are vulnerable to steganalysis, they target the motion vectors used to encode and reconstruct both the forward...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2012

    A Navel Approach to Identify Geo-Encryption with GPS and Different Parameters (Locations and Time)

    The authors are moving towards an era where location information will be necessary for access control. The use of location information can be used for enhancing the security of an application. Geo-encryption is the use of Position naVigation and Time (PVT) information as means to enhance the security of a...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // May 2012

    GSM Based LAN Monitoring System

    In this paper, the authors demonstrate a method which enables users to control their LAN network from remote place using a cell phone-based interface. To manage and monitor the control activities of network, the user should send an authentication SMS along with the required/desired function/action SMS to the user server...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Sep 2011

    Hybrid Broadcast Routing with Dynamic Security Considerations

    An ad hoc network is the supportive engagement of a collection of mobile nodes without the required interference of any centralized access point or existing infrastructure. There is an increasing trend to adopt ad hoc networking for profitable uses; however, their main applications lie down in military, strategic and other...

    Provided By International Journal of Computer Science and Information Technologies