International Journal of Computer Science and Management Studies

Displaying 1-27 of 27 results

  • White Papers // May 2013

    An Approach for Predicting User's Web Access Pattern

    The number of user's surfing or navigating through the web is increasing day by day and the information in the web is also increasing enormously. While surfing the user's will visit a number of websites to obtain their relevant information. To engage the user's within a particular website the website...

    Provided By International Journal of Computer Science and Management Studies

  • White Papers // Jan 2012

    Security Processing for High End Embedded System With Cryptographic Algorithms

    This paper is intended to introduce embedded system designers and design tool developers to the challenges involved in designing secure embedded systems. The challenges unique to embedded systems require new approaches to security covering all aspects of embedded system design from architecture to implementation. Security processing, which refers to the...

    Provided By International Journal of Computer Science and Management Studies

  • White Papers // Jan 2012

    Wireless Ad-Hoc Networks Broadcasting Protocol and Routing Characteristics

    The Mobile Ad hoc NETwork (MANET) has recently been recognized as an attractive network architecture for wireless communication. Reliable broadcast is an important operation in MANET (e.g., giving orders, searching routes, and notifying important signals). However, using a naive flooding to achieve reliable broadcasting may be very costly, causing a...

    Provided By International Journal of Computer Science and Management Studies

  • White Papers // Jan 2012

    A Recovery Method for Greedy Routing Protocols in Web Communications

    Greedy Perimeter Stateless Routing (GPSR) protocol is an appropriate and the most well-known routing protocol for high mobile vehicular ad-hoc networks. The protocol includes two routing modes, the greedy mode and the recovery mode, and utilizes a neighbor list to make a route decision. However, not only does the neighbor...

    Provided By International Journal of Computer Science and Management Studies

  • White Papers // Jan 2012

    Security Issues Pertaining to Ad-Hoc Networks - A Survey

    A Mobile Ad-hoc NETwork (MANET) is a self-configuring network of mobile routers (and associated hosts) connected by wireless links - the union of which form an arbitrary topology. The routers are free to move randomly and organize themselves arbitrarily; thus, the network's wireless topology may change rapidly and unpredictably. MANETs...

    Provided By International Journal of Computer Science and Management Studies

  • White Papers // Oct 2011

    A Literary Review of MANET Security Protocols

    Ad hoc networks offer various applications which are very much essential in wireless networks. But the vital problem concerning their security aspects is the major issue which must be solved. A mobile ad hoc network is a collection of nodes that are connected through a wireless medium forming rapidly changing...

    Provided By International Journal of Computer Science and Management Studies

  • White Papers // Oct 2011

    CAC Schemes for Capacity Enhancement in WCDMA Systems

    To support multiple Service class of different data transmission rate for multimedia application in wireless systems. WCDMA involves Orthogonal Variable Spreading Factor (OVSF) code technique. Call Admission Control (CAC) scheme of the system decides regarding admission of the call. In this paper, a new SIR- based CAC scheme for WCDMA...

    Provided By International Journal of Computer Science and Management Studies

  • White Papers // Oct 2011

    Comparison of Symmetric and Asymmetric Cryptography With Existing Vulnerabilities and Countermeasures

    Internet and networks application are growing very fast, so the need to protect such application are increased by using cryptographic methods. The two widely accepted and used cryptographic methods are symmetric and asymmetric. The DES ideally belongs to the category of symmetric key cryptography and RSA belongs to the category...

    Provided By International Journal of Computer Science and Management Studies

  • White Papers // Aug 2011

    Bluetooth Security-Secure Data Transfer over Bluetooth

    This paper describes the mechanism of Bluetooth authentication. In Bluetooth when two units want to communicate they need to be paired to each other. In the pairing process units are exchanging keys and authenticate each other. In this paper, the authors used RSA algorithm by which two units are paired...

    Provided By International Journal of Computer Science and Management Studies

  • White Papers // Aug 2011

    SAC-OCDMA With Zero Vector Combinatorial Code (ZVCC)

    In this paper the performance of the incoherent SAC-OCDMA system using Zero Vector Combinatorial Code (ZVCC) has been observed by varying the code length and data rate. ZVCC is better than the other proposed code as it has small code length, accommodates more number of users and the design algorithm...

    Provided By International Journal of Computer Science and Management Studies

  • White Papers // Aug 2011

    Better Management of Defects for Improving Software Processes

    Every software after development needs to get tested. No software can be built "Defect Free". After, testing defects are reported by the use of a tool called "Defect Tracking System". Also, Defects reported can be managed for enhancing the quality of software. This paper present the view of how defects...

    Provided By International Journal of Computer Science and Management Studies

  • White Papers // Aug 2011

    SMS Based Remote Control System

    A modern world contains varieties of electronic equipment and systems like: TV, security system, Hi-fi equipment, central heating systems, fire alarm systems, security alarm systems, lighting systems, SET Top Box, AC (Air Conditioner) etc., the authors need to handle, ON/OFF or monitor these electrical devices remotely or to communicate with...

    Provided By International Journal of Computer Science and Management Studies

  • White Papers // Aug 2011

    Data Warehousing and Phases Used in Internet Mining

    In this paper, the authors describe the data warehousing and data mining. Data Warehousing is the process of storing the data on large scale and Data mining is the process of analyzing data from different perspectives and summarizing it into useful information - information that can be used to increase...

    Provided By International Journal of Computer Science and Management Studies

  • White Papers // Aug 2011

    Fundamental Research of Distributed Database

    The purpose of this paper is to present an introduction to Distributed Databases which are becoming very popular now a days. Today's business environment has an increasing need for distributed database and Client/server applications as the desire for reliable, scalable and accessible information is Steadily rising. Distributed database systems provide...

    Provided By International Journal of Computer Science and Management Studies

  • White Papers // Aug 2011

    Generations of Wireless Technology

    Wireless communication is the transfer of information over a distance without the use of enhanced electrical conductors or "Wires". The distances involved may be short (a few meters as in television remote control) or long (thousands or millions of kilometres for radio communications). When the context is clear, the term...

    Provided By International Journal of Computer Science and Management Studies

  • White Papers // Aug 2011

    Genetic Algorithm for Multiprocessor Task Scheduling

    MultiProcessor Task Scheduling (MPTS) is an important and computationally difficult problem. Multiprocessors have emerged as a powerful computing means for running real-time applications especially due to limitation of uni-processor system for not having sufficient enough capability to execute all the tasks. This paper describes multiprocessor task scheduling in the form...

    Provided By International Journal of Computer Science and Management Studies

  • White Papers // Aug 2011

    Performance Analysis of Random Peer-to-Peer Communication for a Multiple-Robot System

    In this paper, the authors present a physical implementation of Random Peer-To-Peer (RP2P) communication for use in a multiple-robot system and analyze its performance. Traditionally, multiple-robot systems have either broadcast all of their inter-robot communication or have avoided explicit communication altogether. RP2P communication, on the other hand, allows efficient system-level...

    Provided By International Journal of Computer Science and Management Studies

  • White Papers // Aug 2011

    The Comparison of Virtual Machine Migration Performance Between XEN-HVM, XEN-PV, Open-VZ, KVM-FV, KVMPV

    Based on the authors' previous experience they want to compare the performance between five hypervisors: XEN-PV, XENHVM, Open-VZ,KVM-FV,KVM-PV. They have simulated the migration of a virtual machine by using a warning failure approach. Based on some experiments they have compared CPU Consumption, Memory Utilization, Total Migration Time and Downtime. They...

    Provided By International Journal of Computer Science and Management Studies

  • White Papers // Aug 2011

    A Survey on Security Issues in Mobile Ad-Hoc Networks

    Current technologies and security advances have made networks systems and applications very popular and widely used. The pervasive and practical aspects of wireless Mobile Ad Hoc NETworks (MANET) made them very popular as well. This created the need for securing MANET's to provide users with authentic communications, secure, and robust...

    Provided By International Journal of Computer Science and Management Studies

  • White Papers // May 2011

    Reanalysis of BER for Wavelet Based MC-CDMA Communication

    As demand for higher data rates is continuously rising, there is always a need to develop more efficient wireless communication systems. In this paper, described the author efforts in this direction. The authors developed and evaluated a wavelet packet based multicarrier CDMA wireless communication system. In this system design a...

    Provided By International Journal of Computer Science and Management Studies

  • White Papers // May 2011

    A Comparative Study of System Network Architecture Vs Digital Network Architecture

    The efficient managing system of sources is mandatory for the successful running of any network. Here this paper describes the most popular network architectures one of developed by IBM, System Network Architecture (SNA) and other is Digital Network Architecture (DNA). As the authors know that the network standards and protocols...

    Provided By International Journal of Computer Science and Management Studies

  • White Papers // May 2011

    Enhanced Performance of Database by Automated Self-Tuned Systems

    Performance tuning of DataBase Management Systems (DBMS) is complex as well as challenging task since it involves identification and alteration of several key performance tuning parameters. The quality of tuning and the extent of performance enhancement achieved greatly depend on the skill and experience of the DataBase Administrator (DBA). The...

    Provided By International Journal of Computer Science and Management Studies

  • White Papers // May 2011

    Single Carrier Equalization in Fading Domain Using SCFDMA & LTI Channel Domain

    In Wireless system transmission of Signal is done through mobile & broadband system. Multipath carrier transmission shows the projection to struggle doubly selective factor but for that the authors will use concept of single carrier transmission & design a receiver for that purpose. They try to propose a structure of...

    Provided By International Journal of Computer Science and Management Studies

  • White Papers // May 2011

    Security Issues in Mobile Agent Paradigm

    A mobile Agent is a Software program that migrates from node to node of a heterogeneous network. They are goal-oriented i.e. work autonomously towards a goal, capable of suspending their execution on one platform and moving to other where they can resume execution using resources of these nodes and they...

    Provided By International Journal of Computer Science and Management Studies

  • White Papers // May 2011

    Security Threats in Wireless Sensor Networks

    Wireless Sensor Network (WSN) is an emerging technology that shows great promise for various futuristic applications both for mass public and military. The sensing technology combined with processing power and wireless communication makes it lucrative for being exploited in abundance in future. Wireless sensor networks are characterized by severely constrained...

    Provided By International Journal of Computer Science and Management Studies

  • White Papers // May 2011

    Review of Wireless Sensor Networks- Architecture and Applications

    Wireless Sensor Networks (WSN) is currently receiving significant attention due to their unlimited potential. A wireless sensor network is a collection of nodes organized into a cooperative network. Each node consists of processing capability. In this paper, the author concentrates on architecture and the applications of Wireless Sensor Networks. The...

    Provided By International Journal of Computer Science and Management Studies

  • White Papers // Jan 2011

    Awareness of Open Source Software (OSS): Promises, Reality and Future

    Open source is a development method for software that harnesses the power of distributed peer review and transparency of process. The Open Source Initiative Approved License trademark and program creates a nexus of trust around which developers, users, corporations and governments can organize open source cooperation. The promise of open...

    Provided By International Journal of Computer Science and Management Studies

  • White Papers // Jan 2012

    Security Processing for High End Embedded System With Cryptographic Algorithms

    This paper is intended to introduce embedded system designers and design tool developers to the challenges involved in designing secure embedded systems. The challenges unique to embedded systems require new approaches to security covering all aspects of embedded system design from architecture to implementation. Security processing, which refers to the...

    Provided By International Journal of Computer Science and Management Studies

  • White Papers // Jan 2012

    Wireless Ad-Hoc Networks Broadcasting Protocol and Routing Characteristics

    The Mobile Ad hoc NETwork (MANET) has recently been recognized as an attractive network architecture for wireless communication. Reliable broadcast is an important operation in MANET (e.g., giving orders, searching routes, and notifying important signals). However, using a naive flooding to achieve reliable broadcasting may be very costly, causing a...

    Provided By International Journal of Computer Science and Management Studies

  • White Papers // May 2011

    Reanalysis of BER for Wavelet Based MC-CDMA Communication

    As demand for higher data rates is continuously rising, there is always a need to develop more efficient wireless communication systems. In this paper, described the author efforts in this direction. The authors developed and evaluated a wavelet packet based multicarrier CDMA wireless communication system. In this system design a...

    Provided By International Journal of Computer Science and Management Studies

  • White Papers // Aug 2011

    Bluetooth Security-Secure Data Transfer over Bluetooth

    This paper describes the mechanism of Bluetooth authentication. In Bluetooth when two units want to communicate they need to be paired to each other. In the pairing process units are exchanging keys and authenticate each other. In this paper, the authors used RSA algorithm by which two units are paired...

    Provided By International Journal of Computer Science and Management Studies

  • White Papers // Aug 2011

    SAC-OCDMA With Zero Vector Combinatorial Code (ZVCC)

    In this paper the performance of the incoherent SAC-OCDMA system using Zero Vector Combinatorial Code (ZVCC) has been observed by varying the code length and data rate. ZVCC is better than the other proposed code as it has small code length, accommodates more number of users and the design algorithm...

    Provided By International Journal of Computer Science and Management Studies

  • White Papers // Aug 2011

    Better Management of Defects for Improving Software Processes

    Every software after development needs to get tested. No software can be built "Defect Free". After, testing defects are reported by the use of a tool called "Defect Tracking System". Also, Defects reported can be managed for enhancing the quality of software. This paper present the view of how defects...

    Provided By International Journal of Computer Science and Management Studies

  • White Papers // May 2011

    A Comparative Study of System Network Architecture Vs Digital Network Architecture

    The efficient managing system of sources is mandatory for the successful running of any network. Here this paper describes the most popular network architectures one of developed by IBM, System Network Architecture (SNA) and other is Digital Network Architecture (DNA). As the authors know that the network standards and protocols...

    Provided By International Journal of Computer Science and Management Studies

  • White Papers // May 2011

    Enhanced Performance of Database by Automated Self-Tuned Systems

    Performance tuning of DataBase Management Systems (DBMS) is complex as well as challenging task since it involves identification and alteration of several key performance tuning parameters. The quality of tuning and the extent of performance enhancement achieved greatly depend on the skill and experience of the DataBase Administrator (DBA). The...

    Provided By International Journal of Computer Science and Management Studies

  • White Papers // May 2011

    Single Carrier Equalization in Fading Domain Using SCFDMA & LTI Channel Domain

    In Wireless system transmission of Signal is done through mobile & broadband system. Multipath carrier transmission shows the projection to struggle doubly selective factor but for that the authors will use concept of single carrier transmission & design a receiver for that purpose. They try to propose a structure of...

    Provided By International Journal of Computer Science and Management Studies

  • White Papers // Aug 2011

    SMS Based Remote Control System

    A modern world contains varieties of electronic equipment and systems like: TV, security system, Hi-fi equipment, central heating systems, fire alarm systems, security alarm systems, lighting systems, SET Top Box, AC (Air Conditioner) etc., the authors need to handle, ON/OFF or monitor these electrical devices remotely or to communicate with...

    Provided By International Journal of Computer Science and Management Studies

  • White Papers // Aug 2011

    Data Warehousing and Phases Used in Internet Mining

    In this paper, the authors describe the data warehousing and data mining. Data Warehousing is the process of storing the data on large scale and Data mining is the process of analyzing data from different perspectives and summarizing it into useful information - information that can be used to increase...

    Provided By International Journal of Computer Science and Management Studies

  • White Papers // Aug 2011

    Fundamental Research of Distributed Database

    The purpose of this paper is to present an introduction to Distributed Databases which are becoming very popular now a days. Today's business environment has an increasing need for distributed database and Client/server applications as the desire for reliable, scalable and accessible information is Steadily rising. Distributed database systems provide...

    Provided By International Journal of Computer Science and Management Studies

  • White Papers // Aug 2011

    Generations of Wireless Technology

    Wireless communication is the transfer of information over a distance without the use of enhanced electrical conductors or "Wires". The distances involved may be short (a few meters as in television remote control) or long (thousands or millions of kilometres for radio communications). When the context is clear, the term...

    Provided By International Journal of Computer Science and Management Studies

  • White Papers // Aug 2011

    Genetic Algorithm for Multiprocessor Task Scheduling

    MultiProcessor Task Scheduling (MPTS) is an important and computationally difficult problem. Multiprocessors have emerged as a powerful computing means for running real-time applications especially due to limitation of uni-processor system for not having sufficient enough capability to execute all the tasks. This paper describes multiprocessor task scheduling in the form...

    Provided By International Journal of Computer Science and Management Studies

  • White Papers // Aug 2011

    Performance Analysis of Random Peer-to-Peer Communication for a Multiple-Robot System

    In this paper, the authors present a physical implementation of Random Peer-To-Peer (RP2P) communication for use in a multiple-robot system and analyze its performance. Traditionally, multiple-robot systems have either broadcast all of their inter-robot communication or have avoided explicit communication altogether. RP2P communication, on the other hand, allows efficient system-level...

    Provided By International Journal of Computer Science and Management Studies

  • White Papers // Aug 2011

    The Comparison of Virtual Machine Migration Performance Between XEN-HVM, XEN-PV, Open-VZ, KVM-FV, KVMPV

    Based on the authors' previous experience they want to compare the performance between five hypervisors: XEN-PV, XENHVM, Open-VZ,KVM-FV,KVM-PV. They have simulated the migration of a virtual machine by using a warning failure approach. Based on some experiments they have compared CPU Consumption, Memory Utilization, Total Migration Time and Downtime. They...

    Provided By International Journal of Computer Science and Management Studies

  • White Papers // Oct 2011

    A Literary Review of MANET Security Protocols

    Ad hoc networks offer various applications which are very much essential in wireless networks. But the vital problem concerning their security aspects is the major issue which must be solved. A mobile ad hoc network is a collection of nodes that are connected through a wireless medium forming rapidly changing...

    Provided By International Journal of Computer Science and Management Studies

  • White Papers // Jan 2011

    Awareness of Open Source Software (OSS): Promises, Reality and Future

    Open source is a development method for software that harnesses the power of distributed peer review and transparency of process. The Open Source Initiative Approved License trademark and program creates a nexus of trust around which developers, users, corporations and governments can organize open source cooperation. The promise of open...

    Provided By International Journal of Computer Science and Management Studies

  • White Papers // Oct 2011

    CAC Schemes for Capacity Enhancement in WCDMA Systems

    To support multiple Service class of different data transmission rate for multimedia application in wireless systems. WCDMA involves Orthogonal Variable Spreading Factor (OVSF) code technique. Call Admission Control (CAC) scheme of the system decides regarding admission of the call. In this paper, a new SIR- based CAC scheme for WCDMA...

    Provided By International Journal of Computer Science and Management Studies

  • White Papers // Oct 2011

    Comparison of Symmetric and Asymmetric Cryptography With Existing Vulnerabilities and Countermeasures

    Internet and networks application are growing very fast, so the need to protect such application are increased by using cryptographic methods. The two widely accepted and used cryptographic methods are symmetric and asymmetric. The DES ideally belongs to the category of symmetric key cryptography and RSA belongs to the category...

    Provided By International Journal of Computer Science and Management Studies

  • White Papers // Jan 2012

    A Recovery Method for Greedy Routing Protocols in Web Communications

    Greedy Perimeter Stateless Routing (GPSR) protocol is an appropriate and the most well-known routing protocol for high mobile vehicular ad-hoc networks. The protocol includes two routing modes, the greedy mode and the recovery mode, and utilizes a neighbor list to make a route decision. However, not only does the neighbor...

    Provided By International Journal of Computer Science and Management Studies

  • White Papers // Jan 2012

    Security Issues Pertaining to Ad-Hoc Networks - A Survey

    A Mobile Ad-hoc NETwork (MANET) is a self-configuring network of mobile routers (and associated hosts) connected by wireless links - the union of which form an arbitrary topology. The routers are free to move randomly and organize themselves arbitrarily; thus, the network's wireless topology may change rapidly and unpredictably. MANETs...

    Provided By International Journal of Computer Science and Management Studies

  • White Papers // May 2013

    An Approach for Predicting User's Web Access Pattern

    The number of user's surfing or navigating through the web is increasing day by day and the information in the web is also increasing enormously. While surfing the user's will visit a number of websites to obtain their relevant information. To engage the user's within a particular website the website...

    Provided By International Journal of Computer Science and Management Studies

  • White Papers // Aug 2011

    A Survey on Security Issues in Mobile Ad-Hoc Networks

    Current technologies and security advances have made networks systems and applications very popular and widely used. The pervasive and practical aspects of wireless Mobile Ad Hoc NETworks (MANET) made them very popular as well. This created the need for securing MANET's to provide users with authentic communications, secure, and robust...

    Provided By International Journal of Computer Science and Management Studies

  • White Papers // May 2011

    Security Issues in Mobile Agent Paradigm

    A mobile Agent is a Software program that migrates from node to node of a heterogeneous network. They are goal-oriented i.e. work autonomously towards a goal, capable of suspending their execution on one platform and moving to other where they can resume execution using resources of these nodes and they...

    Provided By International Journal of Computer Science and Management Studies

  • White Papers // May 2011

    Security Threats in Wireless Sensor Networks

    Wireless Sensor Network (WSN) is an emerging technology that shows great promise for various futuristic applications both for mass public and military. The sensing technology combined with processing power and wireless communication makes it lucrative for being exploited in abundance in future. Wireless sensor networks are characterized by severely constrained...

    Provided By International Journal of Computer Science and Management Studies

  • White Papers // May 2011

    Review of Wireless Sensor Networks- Architecture and Applications

    Wireless Sensor Networks (WSN) is currently receiving significant attention due to their unlimited potential. A wireless sensor network is a collection of nodes organized into a cooperative network. Each node consists of processing capability. In this paper, the author concentrates on architecture and the applications of Wireless Sensor Networks. The...

    Provided By International Journal of Computer Science and Management Studies