International Journal of Computer Science and Information Technologies

Displaying 1-40 of 727 results

  • White Papers // Apr 2015

    Development of Android Mobile Application for Cloud Video Streaming Using Mobile Cloud Computing

    The use of multimedia mobile phones is increased rapidly and also the size of worldwide mobile video market is increased but some mobile devices have low hardware resources such as RAM, processor, etc. such mobile devices can't fulfil high resource requirements of multimedia applications. Mobile cloud computing can help to...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Apr 2015

    Parallel and Improved PageRank Algorithm for GPU-CPU Collaborative Environment

    The authors use the Internet to search for information on a daily basis. They use search engines to find out the useful information from the vast Internet. This is possible because the search engines are using a heuristic called page-rank. It is nothing but a value to a web page...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Apr 2015

    Wearable Devices: Google Glass & Smart Watch

    The terms "Wearable technology", "Wearable devices" and "Wearables" all refer to electronic technologies or computers that are incorporated into items of clothing and accessories which can comfortably be worn on the body. In this paper, various things about the wearable devices have been discussed. It mainly focusses on two wearable...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Apr 2015

    A Context-Aware Search System for Smart Phones Based on Context-Aware Infrastructure

    A context-aware architecture can be designed to collect the mobile user's context information, derive mobile user's current context, distribute user context among context-aware applications and support the applications like context-aware search. The context acquisition is centralized at the context server to ensure the reusability of context information among mobile devices,...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2015

    Counter Measures Against Malicious Program in Universal Serial Bus

    USB that are used to transfer the data through computers. It will available in a smaller size to do certain amount of data files. The USB are used as in many format like mass storage devices, etc. where the information security in the universal serial bus due to insecure design...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2015

    Cryptographic Techniques, Threats and Privacy Challenges in Cloud Computing

    Cryptography is essential for the security and integrity of the data that is stored in the cloud. Several cryptographic techniques are used to protect the integrity of data for various applications. A particular security method makes use of different cryptographic techniques to encrypt data and make it into an un-readable...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2015

    Energy Efficient Dynamic Threshold based Load Balancing Technique in Cloud Computing Environment

    Cloud computing is the new emerging technology in the field of research and IT industries. So the demand for the computational power required by the business, web and scientific application are rapidly increased in recent past year. To fulfill this demand large scale data center are created which consume enormous...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2015

    Providing Security and Privacy to Cloud Data Storage

    Cloud computing is a model for enabling convenient on demand network access to a shared pool of configurable computing resources like networks, servers, storage, applications. Cloud computing is the next generation of information technology. Using cloud computing users can access remote data, they can purchase storage space, they can develop...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2015

    An Efficient Centralized Clustering Approach for Wireless Sensor Networks

    Wireless sensor networks consists of no. of micro sensor nodes to monitor a remote environment by using aggregated data from individual nodes and transfer this data to the base station for further purpose. Here the energy of operated nodes is susceptible store of the wireless sensor network, which is useless...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jan 2015

    Synthesis of Speech & Speaker Recognition Using Data Driven Approach

    As the authors can discuss about the users personal computer then it would provide a comfortable and natural form of communication. This will reduce the typing amount and it would be effortless and allow the user to move away from the terminal or screen. The users will not have to...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jan 2015

    Context Aware Service Information Extraction from Bigdata

    Big data is a term used for defining the exponential growth and availability of both structured and unstructured and semi structured data is most difficult for processing with traditional database systems. Big data is inward from multiple sources at an alarming velocity, variety and volume. Although big data does not...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Dec 2014

    Integration of Wireless Sensor Networks and Mobile Cloud- A Survey

    In this paper, the authors present a comprehensive survey on the sensory data processing framework to integrate wireless sensor networks with mobile cloud. It also describes about the communication and data management issues in mobile sensor networks. This paper describes the concept of wireless sensor networks and mobile cloud computing....

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Dec 2014

    Software Development Life Cycle Models- Comparison, Consequences

    Software Development Life Cycle (SDLC) is a well-defined and systematic approach, practiced for the development of a reliable high quality software system. There are tons of SDLC models available. This paper deals with five of those SDLC models, namely; waterfall model, iterative model, v-shaped model, spiral model and agile model....

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Dec 2014

    An Improved Framework for Tamper Detection in Databases

    The corporate world, government sector and many organizations has a requirement of secure database system. So due to huge amount of data most of the organizations prefers outsourcing of databases to trusted third parties. In many of the scenarios database tampering is happen due to inside employee of the organizations,...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Dec 2014

    Prominence of Spatial Database in Geographical Information Systems

    Spatial database is a collection of spatially referenced data that acts as a model of reality. Geographical information system includes spatial data which is either in raster or vector form and data derived from remote sensors are increasingly utilized as source for GIS. Spatial data is the core part of...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Dec 2014

    Analysis of CMOs Dynamic Comparators for Low Power and High Speed ADCs

    The need for extreme low power, efficient area and high speed ADC converters make use of the dynamic comparators for maximizing the speed and efficiency of power. Generally comparators play a vital role in the ADCs circuits for comparing the input voltage with respect to the reference voltage. The comparison...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Nov 2014

    Classifier Model for Intrusion Detection Using Bio-Inspired Metaheuristic Approach

    "In machine learning and statistics, feature selection is the technique of selecting a subset of relevant features for building robust learning models. In this paper, the authors propose a bio-inspired BAT algorithm as feature selection method to find the optimal features from the KDDCup'99 intrusion detection dataset obtained from UCI...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Nov 2014

    Use of Genetic Algorithm with Fuzzy Class Association Rule Mining for Intrusion Detection

    "In today's life intrusion detection system gain the attention, because of ability to detect the intrusion access efficiently and effectively as security is the major issue in networks. This system identifies attacks and reacts by generating alerts or blocking the unwanted data/traffic. Intrusion detection system mainly classified as anomaly based...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Oct 2014

    Finding Best Time Quantum for Round Robin Scheduling Algorithm to Avoid Frequent Context Switch

    In round robin scheduling, the time quantum is fastened then processes area unit scheduled specified no process get CPU time quite only once quantum in one go. If time quantum is simply too massive, the time interval of the processes is too much which cannot be tolerated in interactive atmosphere....

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Sep 2014

    Improving the Performance of Processing for Small Files in Hadoop: A Case Study of Weather Data Analytics

    Hadoop is an open source apache project that supports master slave architecture, which involves one master node and thousands of slave nodes. Master node acts as the name node, which stores all the metadata of files and slave nodes acts as the data nodes, which stores all the application data....

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2014

    Educational Data mining for Prediction of Student Performance Using Clustering Algorithms

    In recent years, the biggest challenges that educational institutions are facing the explosive growth of educational data and to use this data to improve the quality of managerial decisions. Educational institutions are playing an important role in the society and playing a vital role for growth and development of nation....

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2014

    Anonymization: Enhancing Privacy and Security of Sensitive Data of Online Social Networks

    Privacy is one of the major concerns when publishing or sharing social network data for social science research and business analysis. This paper is motivated by the recognition of the need for a finer grain and personalized privacy in data publication of social networks. Recently, researchers have proposed a privacy...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2014

    Investigating Suspicious Transactions through High Value Networks in Financial Intelligence Services

    Financial crimes can be explained as those crimes that are committed by people of high status for the purpose of their occupation, some of the most obvious types of white collar crimes include bank frauds, bribery, measure and weight crimes, extortion, black mail, counterfeit, computer frauds and insider trading, Bank...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2014

    A Study of Power and Energy Aware Routing Technologies in Wireless Sensor Network

    Wireless Sensor Network (WSN) is advanced technology of mobile ad-hoc network deployed to perform a number of useful tasks. Sensors are low battery powered node used to sense some specific kinds of data or information. Data can be of any type such as humidity, temperature, pressure, air pollutions, vibration etc....

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2014

    Optimal Resource Allocation in Wireless Mesh Network

    Flow control in a wireless mesh network is an optimization problem. The task is to maximize the aggregate utility of elastic traffic sources. The work has been a basis for analyzing various transport-level (including TCP-based) congestion control algorithms. The task takes is to analyze the self-interference of flows and assigns...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2014

    A Review on Cloud Data Storage in Virtual Perspective

    Cloud can be expanded as common location independent on-line utility that is available on demand. This review starts with study on cloud computing in virtual perspective. The cloud has many \"On-demand\" service models, of which, cloud storage is a model which is amorphous today and with neither a clearly defined...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2014

    Implementation of Optimization of Latency in Wireless Mesh Network

    Research interest towards wireless mesh network has improved drastically. WMN is emerging as promising technology for many useful applications. Many efforts have been conducted to maximize network throughput in multi-channel multi-radio wireless mesh network. Most current approaches are based on either purely static or purely dynamic. Channel allocation plays major...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2014

    An Study on Performance Analysis of Ring Based Index Data Management in WSN

    In Wireless Sensor Network (WSN) management is the process of managing, monitoring, and controlling the behavior of each sensor network. The limitation of wireless sensor networks is limited storage space, limited battery power and limited data processing. Communication takes more source of energy consumption in WSN; various schemes have been...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2014

    Electronic Parking Lot Payment using Passive RFID and Cloud Computing

    Radio Frequency IDentification (RFID) is a technology that uses radio waves to transfer data from an electronic tag which is also called as RFID tag or label attached to an object through a reader for the purpose of identifying and tracking the object. This paper focuses on an electronic payment...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2014

    Design Criteria and Challenges of Industrial Wireless Sensor Network

    Wireless Sensor Network (WSN) for industrial automation and applications are becoming more prevalent. Mature industries such as oil and gas refineries, waste water treatment and delivery, electrical generation, natural gas distribution have migrated from wired to wireless sensor networks over the past decades. This is because of the advantage of...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2014

    Data Mining Classification Algorithm for ETesting and Analysis Processing

    In this paper, the authors focus on developing to bring up various features for the distance learning system. There are various modules in this system, to provide extensive evaluation for distance learners. Questions are randomly chosen from the given set of questions in a random manner. The questions are taken...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2014

    Data Mining Vs Statistical Techniques for Classification of NSL-KDD Intrusion Data

    Intrusion is a kind of malicious attack and is very harmful for individual or for any organization. Due to rapid growing of internet users it has become an important research area Information and network security is becoming an important issue for any organization or individual to protect data and information...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2014

    An Enhanced Method for Spam Filtering Based on Basiyan Classifier

    Phishing is an emerging type of social engineering crime on to the web. Most phishes initiate attacks sending by emails to potential victims. The rapid development and evolution of phishing techniques pose a big challenge in web identity security for researchers over all phishing attacks spoof users from the visual...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2014

    Linux Kernel Memory Protection (ARM)

    Memory protection is a way to control memory access rights on an embedded system. The main purpose of memory protection is to prevent a task from accessing memory without proper access permissions. Without memory protection memory segment like code and data segment are vulnerable to memory related bugs and code...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2014

    Monitoring Physical Activities Using WBAN

    Recent technological advances in wireless communications, mobile computation, and sensor technologies have enabled the development of low-cost, miniature, lightweight, intelligent wireless sensor devices or \"Motes\". A collection of these devices can be placed strategically on the key positions of the human body and connected by means of a wireless network...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2014

    A Survey on Implementing Public Key Cryptography on RFID Tags

    Radio Frequency IDentification (RFID) is an emerging technology, which brings enormous productivity benefits in applications, where objects have to be identified automatically. This paper presents issues concerning security and privacy of RFID systems. RFID tags are a new generation of barcodes with added functionality. The risk related to using the...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2014

    On Effective Protection of Security and Privacy in XML Information Brokering

    In contrast with the situations when the information seeker knows where the needed data is located, XML Information Brokering System (IBS) needs to help each information seeking query \"Locate\" the corresponding data source(s). Unlike early information sharing approaches that only involve a small number of databases, new information sharing applications...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2014

    Big Data and the Opportunities and Challenges for Government Agencies

    The data stored with Government agencies is an asset both for the nation and the government. This data which is a potential source of opportunity brings with itself many challenges and the government agencies like many other corporations should be able to seize the opportunity that this big data presents...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2014

    Performance Comparison of Variants of Ant Colony Optimization Technique for Online Tuning of a Pi Controller for a Three Phase Induction Motor Drive

    In this paper, the authors address the design and tuning schemes for a feedback controller of an induction motor drive by employing three different algorithms inspired by the behavior of the ants. A mechanical equivalent model of the drive is considered along with the parameter variations which are prominent in...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2014

    Triple Security of Data in Cloud Computing

    Cloud computing is the biggest buzz in computer world now a days. It is providing excellent facilities by flexible infrastructure. Cloud computing is based on client-server architecture. Cloud computing is a hub of various server and many database to store data. Cloud computing provide many services to user which is...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2010

    Network Storage And Its Future

    Computing is based on information. Information is the underlying resource on which all computing processes are based. Information is stored on storage media and is accessed by applications executing on a server. Often the information is a unique company asset. Information is created and acquired every second of every day....

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2011

    Pervasive SAS Techniques for Designing a Data Warehouse for an Integrated Enterprise: An Approach Towards Business Process

    In an attempt to find a method to create a stable, fast, easily modified replacement for a Microsoft access database, SAS rapidly became the only choice as a replacement tool. SAS can very quickly be adapted for uses by relative beginners in novel ways to exploit its strengths as a...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Sep 2014

    Improving the Performance of Processing for Small Files in Hadoop: A Case Study of Weather Data Analytics

    Hadoop is an open source apache project that supports master slave architecture, which involves one master node and thousands of slave nodes. Master node acts as the name node, which stores all the metadata of files and slave nodes acts as the data nodes, which stores all the application data....

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Apr 2015

    Wearable Devices: Google Glass & Smart Watch

    The terms "Wearable technology", "Wearable devices" and "Wearables" all refer to electronic technologies or computers that are incorporated into items of clothing and accessories which can comfortably be worn on the body. In this paper, various things about the wearable devices have been discussed. It mainly focusses on two wearable...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Dec 2014

    Integration of Wireless Sensor Networks and Mobile Cloud- A Survey

    In this paper, the authors present a comprehensive survey on the sensory data processing framework to integrate wireless sensor networks with mobile cloud. It also describes about the communication and data management issues in mobile sensor networks. This paper describes the concept of wireless sensor networks and mobile cloud computing....

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jan 2015

    Synthesis of Speech & Speaker Recognition Using Data Driven Approach

    As the authors can discuss about the users personal computer then it would provide a comfortable and natural form of communication. This will reduce the typing amount and it would be effortless and allow the user to move away from the terminal or screen. The users will not have to...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Dec 2014

    Software Development Life Cycle Models- Comparison, Consequences

    Software Development Life Cycle (SDLC) is a well-defined and systematic approach, practiced for the development of a reliable high quality software system. There are tons of SDLC models available. This paper deals with five of those SDLC models, namely; waterfall model, iterative model, v-shaped model, spiral model and agile model....

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jan 2011

    Software Architectures Design Patterns Mining for Security Engineering

    Data Mining for Software Engineering involves Architectural mining intelligence operations, which are knowledge gathering procedures. These intelligence operations go beyond basic data collection (assembling uncorrelated information) to the point of collecting fully assimilated practical knowledge - knowledge that affects important architectural decisions. Gathering knowledge is an essential element of being...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Nov 2010

    Performance Analysis of 802.11 and 802.11p in Cluster Based Simple Highway Model

    Vehicular Adhoc NETwork (VANET) is a special type of Intelligent Transport System (ITS), where the mobile nodes are cars, two wheelers, trucks, buses etc., that move on well organized and predefined roads in both direction at very high speed. Following traffic rules, the vehicles provide communication with each other directly...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Nov 2010

    A Multiobjective Genetic Algorithm for Feature Selection in Data Mining

    The rapid advance of computer based high-throughput technique have provided unparalleled opportunities for humans to expand capabilities in production, services, communications, and research. Meanwhile, immense quantities of high-dimensional data are accumulated challenging state-of-the-art data mining techniques. The intelligent analysis of Databases may be affected by the presence of unimportant features,...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Nov 2010

    Text Database Cleaning by Filling the Missing Values Using Object Oriented Intelligent Multi-Agent System Data Cleaning Architecture

    Agents are software programs that perform tasks on behalf of others and they are used to clean the text database with their characteristics. Agents are task oriented with the ability to learn by themselves and they react to the situation. Learning characteristics of an agent is done by verifying its...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Nov 2010

    A Comparison Between Public Key Authority and Certification Authority for Distribution of Public Key

    The key management of public key defines two aspects first one is the distribution of public key and the second one is the use of public key to distribute secret keys for encryption. In this paper, the authors are presenting the public key authentication framework. The distribution of public key...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2010

    Anti-Phishing Design Using Mutual Authentication Approach

    The act of sending an e-mail to a client fallaciously declares to be a recognized genuine organization in an endeavour to deceive the client into compromise confidential information that will be used for identity theft. The e-mail endorse the client to visit a mimic Web site where they are request...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2010

    Security Patterns for Web Services Mining Agile Architectures

    The importance of the software security has been profound, since most attacks to software systems are based on vulnerabilities caused by poorly designed and developed software. Design flaws account for fifty percent of security problems and risk analysis plays essential role in solid security problems. Security Patterns are proposed that...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jan 2011

    Retrieving Business Applications using Open Web API's Web Mining - Executive Dashboard Application Case Study

    Web mining is new area of research in information technology; so many business applications that utilize data mining and text mining techniques to extract useful business information on the web have emerged from web searching to web mining. It is important for students to acquire knowledge and hands on experience...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2010

    A New Horizon in Data Security by Cryptography & Steganography

    Steganography and Cryptography are two popular ways of sending vital information in a secret way. One hides the existence of the message and the other distorts the message itself. There are many cryptographic techniques available and among them AES is one of the most powerful techniques. In Steganography, various techniques...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Sep 2010

    Application of Free and Open Source Software and Its Impact on Society

    Free and open source software is one of the effective tool that can make the world self-dependent. It facilitates the design and use of the own software. This can also lead to economic liberty as the FOSS is available at a very low cost. These software are also more secure...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2010

    An Approach to Secure Larger Size Data With Authenticity and Integrity

    The scenario of present day of information security system includes confidentiality, authenticity, integrity, non-repudiation. This present paper focus is enlightening the technique to secure data or message with authenticity and integrity. The security of communication is a crucial issue on World Wide Web (internet) and within organizations. It is about...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2010

    An Instinctive Approach for Secure Communication - Enhanced Data Encryption Standard (EHDES)

    In this paper, the authors establish a new architecture of information security for secure or more secure communication in network. Data encryption process is the main precious and important for secure transaction of information. The identity of key is a essential part of data encryption and decryption process. The base...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2010

    Security Issues on Banking Systems

    Bank is one of the example of institute that using Information Technology (IT) in its daily task to fulfill the organization's and customers' need. Business transaction, money transfer, ATM, credit card, and loan are some tasks that were done every day. Customers' personal information stored by the bank is also...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2010

    Achieving Energy Conservation in Wireless Sensor Networks by Using WB (Witness-Based) Approach

    In this paper, Wireless sensor networks place sensors into an area to get data and send them back to a base station. Data fusion, in which collected data are fused before they are sent to the base station, is usually implemented over the network. Since, a sensor is typically placed...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Oct 2010

    Fuzzy K-Mean Clustering Via J48 For Intrusion Detection System

    Due to fast growth of the internet technology there is need to establish security mechanism. So for achieving this objective NIDS is used. Datamining is one of the most effective techniques used for intrusion detection. This paper evaluates the performance of unsupervised learning techniques over benchmark intrusion detection datasets. The...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Oct 2010

    Design of DFE Based MIMO Communication System for Mobile Moving With High Velocity

    Reliability, high quality, and efficient data rate communication for high speed mobile is the growing research in recent years. In this paper, time dispersive and frequency dispersive effects on signal is analyzed. Then a decision feedback equalizer is proposed whose weights are periodically updated using LMS algorithm depending upon the...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Nov 2010

    Web Services Security Architectures Using Role- Based Access Control

    The Web Services Access controls are categorized according to access control granularity and have two approaches: The first approach supports a negotiation-based attribute-based access control to Web Services with fine access granularity. The second approach is tailored to access control for conversation-based Web services and composite services; where in a...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2010

    Analysis of Data and Traffic Management During Privacy Preservation in Secure Multiparty Computation

    A protocol is secure if the parties who want to compute their inputs hands it to the trusted parties. Trusted parties in turn compute the inputs using the function f and give the result to the respective parties after computation in such a way that no party can identify other's...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2010

    Towards Novel and Efficient Security Architecture For Role-Based Access Control in Grid Computing

    Recently, there arose a necessity to distribute computing applications frequently across grids. Ever more these applications depend on services like data transfer or data portal services and submission of jobs. Owing to the fact that the distribution of services and resources in wide-area networks are heterogeneous, dynamic, and multi-domain, security...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2010

    Fault-Tolerance and Permutation Analysis of ASEN and Its Variant

    High performance computing systems can be designed using parallel processing. The effectiveness of these parallel systems rests primarily on the communication network linking processors and memory modules. Hence, an interconnection network that provides the desired connectivity and performance at minimum cost is required. The design of a suitable interconnection network...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2010

    Performance Comparision of Qos Stability Methods in Wimax Networks

    Recently IEEE 802.16 WiMAX has attracted a lot of attention in wireless networking research and applications. An attempt had been made to compare DropTail, RED, Proportional fairness and DRR protocol model of WiMAX Point to Multi-Point mode with the focus on entry process and scheduling. DropTail queue similar to a...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jan 2012

    Secure Optimized Link State Routing Protocol for Ad-Hoc Networks

    The Optimized Link State Routing protocol (OLSR) has valuable features for mobile ad hoc networks such as no route discovery delay and ease of integration into existing systems, which makes it well-suited for time critical and emergency rescue applications. In OLSR, link state information is generated only by nodes elected...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2012

    Smart Card Fraud Prevention Scheme Using Fingerprinting Authentication

    E-commerce payment system have become progressively popular due to wide spread use of the internet-based shopping and banking. Nowadays, smart card payment systems for e-commerce are being used much more extensively than in the past. With the growing use of electronic payment system, risk of fraud in e-payment is also...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jan 2012

    The Fault Management System Using Amazon EC2: Web Application Deployment on Cloud

    Cloud computing is a technology that uses the internet and central remote servers to maintain data and applications. Fault Management System is a key part in Network Management Architecture consists of functions such as detect, isolate, determine the cause and correct the malfunctions in network. The entire application is deployed...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jan 2012

    Undecryptable Encryption Against Network and Forensic Attack

    Cryptography plays a vital role in data security. It is necessary where the integrity and confidentiality of information is needed. But use of cryptography is not sufficient for the protection of the sensitive information. There are number of cases encounter where the attacker breach the security and obtain the secret...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jan 2012

    A Study of Comparison of Network Simulator -3 and Network Simulator -2

    Network simulation is undoubtedly one of the most prevalent evaluation methodologies in the area of computer networks. While simulation is not the only tool used for data networking research, it is extremely useful because it often allows research questions and prototypes to be explored at relatively lesser cost and time...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jan 2012

    Stagnant Memory and Timing Investigation of Embedded Systems Code

    Static program analysis by abstract interpretation is an efficient method to determine properties of embedded software. One example is value analysis, which determines the values stored in the processor registers. Therefore, utmost carefulness and state-of-the-art machinery have to be applied to make sure that an application meets all requirements. To...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jan 2012

    Integrating Logic Analyzer Functionality Into VHDL Designs

    A combined hardware and software system for the debugging of FPGA designs is designed. It provides a powerful logic analyzer implemented as a fully parameterized VHDL description. The system can insert the analyzer into a user design without manual labor required from the user. All processing is done on the...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2012

    Deriving Serial and Parallel Spikes Data in Neural Science Using Data Mining Techniques

    In this paper, the authors introduce the notion of mining for frequent episodes under certain temporal constraints; the structure of these temporal constraints is motivated by the application. They present algorithms for discovering serial and parallel episodes under these temporal constraints. Over the last couple of decades, biology has thrown...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jan 2012

    Counter Measure for Congestion in TCP/IP Using Bandwidth Estimation

    The main reason for network congestion is using TCP/IP protocol for transmission. In this paper, the technique called bandwidth estimation is used to avoid congestion in the network which uses TCP/IP protocol mechanism. It finds out the equilibrium point of the window and then the size of the window is...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jan 2012

    Microstrip Rectangular Patch Antenna : Computer Aided Design Methology

    Antenna is a means for radiating or receiving radio waves. In addition to receiving or transmitting energy, an antenna in an advanced wireless system is usually required to optimize the radiation energy in same direction and suppress it in others. A micro strip patch antenna also referred to as patch...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jan 2012

    Secured Communication Protocol Via Encrypted Key Ensuring Message Integrity

    The Secured communication protocol via encrypted key ensuring message integrity combination of Authentication of Third Party Authentication Quantum Key Distribute Protocol (implicit) and Third Party Authentication Quantum Key Distribute Protocol Mutual Authentication (explicit) quantum cryptography is used to provide authenticated secure communication between sender and Receiver. In quantum cryptography, quantum...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2012

    Analysis and Prevention of Malware in P2P

    Peer-To-Peer (P2P) Networks continue to be popular means of trading content. However, the files exchanged in these networks are not malicious, making them an ideal medium for spreading Malware. Some existing studies have shown that Malware proliferation can pose significant threats to P2P Networks, defending against such an attack are...

    Provided By International Journal of Computer Science and Information Technologies