International Journal of Computer Science and Network Security

Displaying 1-40 of 356 results

  • White Papers // Jan 2015

    Resource Allocation Avoiding SLA Violations in Cloud Framework for SaaS

    "Cloud computing has been proved as a boon to distributed computing over a network, having ability to run a program on many connected computing at a same time. It is network based service provided by real server hardware, in fact served by virtual network. It is essential for using any...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jan 2015

    Dynamic Resource Allocation Using Skewness Algorithm in Cloud Computing

    "Cloud computing is the latest technology used by many organizations in this competitive world. As many organizations are using cloud computing technology, the major issue is resource allocation as pay-per-use on demand basis. In cloud environments, efficient resource provisioning and management is a challenging issue because of the dynamic nature...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jan 2015

    Role of Threshold Cryptography in Securing MANETs

    "Distributed environments are becoming more popular as these technologies such as mobile and ad hoc networks, aim to enable large scale cooperation for resource sharing framework. Secure authentication is the challenging issue for such environments. The authors studied the role of threshold cryptography in securing the MANETs, revealing the authorization...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jan 2015

    Modified Self-Selection Routing Algorithm for Wireless Sensor Networks

    "Wireless sensor networks have been the source of increasing interest for researchers because they gather information from multiple sources at the same time. This technology allows small sensors to be distributed across a geographical region to collect data, which is sent to a main server via a routing algorithm to...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Dec 2014

    Metaheuristic Approaches for Gateway Placement Optimization in Wireless Mesh Networks: A Survey

    Recently, Wireless Mesh Networks (WMNs) have gained significant roles in communication technologies and have been used in many applications with high sensitivity to packet loss, delay and transmission time. Therefore, many researchers paid their attention for solving WMNs related issues. The WMN consists of Mesh Routers (MRs) and Mesh Clients...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Dec 2014

    Intrusion Feature Selection Algorithm Based on Particle Swarm Optimization

    "High-dimensional intrusion detection data concentration information redundancy results in lower processing velocity of intrusion detection algorithm. Accordingly, the current study proposes an intrusion feature selection algorithm based on Particle Swarm Optimization (PSO). Analyzing the features of the relevance between network intrusion data allows the PSO algorithm to optimally search in...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Nov 2014

    A Study of Electronic Ticket Verification Methods

    Information and Communication Technologies (ICT) and Electronic Commerce (EC) are flourishing dramatically. Furthermore, using electronic ticket is possible to reduce the costs of ticket management for companies and users. The business organizations have been restlessly evaluating the revenue potential of the electronic tickets market and exploit the profit potential of...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Nov 2014

    Securing the Payment Card Data on Cloud Environment: Issues & Perspectives

    Cloud computing is a new IT model that, just like electricity and water, which were firstly generated at home and evolved to be supplied from utility providers, aims to transform computing resources sharing into an utility. This enables startups and other companies to start computing services without having to invest...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Nov 2014

    Video Quality Challenges in Wireless Networks

    Wireless support is now available in most devices. Streaming video over networks is a big challenge that faced by most companies working in technology development. Giving the best quality and high throughput performance is an ongoing issue. The quality depends on many factors likes bound rates and stringency of the...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Nov 2014

    Intrusion Detection and Prevention Systems (IDPS) and Security Issues

    With computer systems increasingly under attack, information security is more serious in user views. Security protects computer and everything associated with it including networks, terminals, printers, cabling, and disks and most important, it protects the available information in this environment. Technical solutions, introduced by policies and implantations are essential requirements...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Nov 2014

    A Novel Aggregations Approach for Preparing Datasets

    Data mining plays an important role in real-time applications for extracting business intelligence from business data and make expert decisions. Datasets are used in order to mine data for the purpose of discovering knowledge from data. However, preparing datasets manually is a tedious task. The reason behind it is that...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Oct 2014

    Improving The Performance of Adhoc Network Using Hybrid Method

    Infrastructured network consists of fixed base stations while communications take place using technique handoff. It connects with new base station and start communication when mobile goes out of range of one base station. Advantages over ad-hoc networks are efficiently utilized network resources and single-hop routes, results in: lower delay and...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Oct 2014

    IPv6 : Threats Posed by Multicast Packets, Extension Headers and Their Counter Measures

    Security issues concerning the spreading Internet Protocol version 6 (IPv6) is one of the major issues in the world of networking today. Since it is not the default network protocol deployed now-a-days (but systems are migrating slowly from ipv4 to ipv6) there are no best practices from the point of...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Oct 2014

    Secured Routing through Multi Stage Authentication in MANETs

    Mobile Ad hoc NETworks (MANETs) are characterized by the absence of fixed infrastructure, rapid topology change and high node mobility. These characteristics determine that wireless ad hoc network is more vulnerable to malicious attacks than the traditional Internet. Among many malicious attacks, a novel method is proposed to eliminate black...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Sep 2014

    Margin Adaptive Power Allocation Using Channel State Information in OFDMA Systems

    In this paper, the authors present the margin adaptive resource allocation using full CSIT (Channel State InformaTion) and statistical CSIT in OFDMA systems. In the past, Monte-Carlo snap-shots in the MA problem is far too complex, an analytical expression of the outage capacity as a function of the Signal-to-Noise Ratio...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Sep 2014

    New Trends in Intrusion Awareness System Based on SVM Classification

    Network intrusion awareness is important factor for risk analysis of network security. In the current decade various method and framework are available for intrusion detection and security awareness. Some method based on knowledge discovery process and some framework based on neural network. These entire model take rule based decision for...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Sep 2014

    A Survey of Clustering Uncertain Data Based Probability Distribution Similarity

    Clustering is one of the major tasks in the field of data mining. The main aim of the clustering is grouping the data or similar objects into one group based on their data find the similarity between the objects. Clustering of uncertain data have been becoming the major issues in...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Sep 2014

    Password Authentication with Secured Login Interface at Application Layer

    In this paper, the authors present an innovative solution to the old problem of password security at application layer or input level. In their solution, each of the various lower case & upper case characters, special characters, digits from which a password could be comprised is encoded with a random...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Sep 2014

    Data Integrity Mechanism Using Hashing Verification

    In this paper, the authors propose a new one-way hash algorithm, which is also obtains better efficiency and security, compared with a particular conventional hash algorithm, hash algorithm can be used to determine if two values are equal, a hash function maps keys to small values. DILH algorithm using linear...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Sep 2014

    Mobility Prediction Algorithm to Improve the Routing Performance in MANET

    One of the major challenges in Mobile Ad hoc NETworks (MANETs) is link failure due to mobility. If the degree of mobility of any node in any route increases, the route lifetime decreases. That causes frequent link failures, and results more packet loss and low throughput. Packet loss requires packet...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Sep 2014

    Prevention of Selective Jamming Attacks by Using Packet Hiding Methods

    The open nature of the wireless medium leaves it too weak to intentional interference attacks, typically defined as jamming. This intentional interference with wireless transmissions can be used as a launch pad for mounting denial-of-service attacks on wireless networks. Typically, jamming has been introduced under an external threat model. However,...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Sep 2014

    Algorithms for Data-Compression in Wireless Computing Systems

    Data Compression can be defined as encoding the information using the small number of bits rather than original representation. There are two types of data compression, lossless and lossy compression. Compression is a technique used for reducing data size by manipulating data redundancy; so that the packet transmission time and...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2014

    Graphical Secure Password Method Against Online Password Hackers(Guessing Attacks)

    Passwords are a common form of authentication and are often the only barrier between a user and their personal information. There are several programs attackers can use to help guess or \"Crack\" passwords, but by choosing good passwords and keeping them confidential, the user can make it more difficult for...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2014

    Comparative Analysis of Performance of 3G Networks Over TCP Protocols

    Third Generation (3G) systems develop faster communications services, including voice, fax and Internet, anytime and anywhere with seamless global roaming global standard for 3G has opened the way to enabling innovative applications and services multimedia entertainment, infotainment and location-based services, among other. 3G networks are getting day-by-day popular and they...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2014

    Performance Analysis of Classifiers for Intrusive Data and Rough Sets Reducts

    The fast change in the day-to-day activity need to analyze the intrusive data very accurately without losing performance. Intrusive behavior is critical for analyzing the data and performance is crucial in the computational environment, when the user requires accuracy in the results. Finding intrusive behavior in the network with accuracy...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2014

    Energy Efficient Mobile Replica Detection in Wireless Sensor Network Based on Modified Sequential Probability Ratio Test

    In wireless sensor network, an attacker can capture sensor nodes and can compromise sensor nodes. Then would create duplicate nodes and built up various attacks using duplicate nodes, inserts into the network. This is happened because of unattended nature of wireless sensor network. These attacks helps attacker to control few...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2014

    Application of Compound Chaotic Mapping in Voice Encryption Algorithm

    Using the devaney chaos theory, designed a compound chaotic mapping as the encryption function, and had proven that the track was non-periodic for the initial value of a finite decimal. The authors have designed an encryption algorithm successively according to this, and realized the encryption for sound documents. Afterward the...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2014

    Using Unitary Matrices in High-Speed Video Encryption

    Encryption computational complexity and encryption speed are two important aspects of video encryption algorithms. Due to its increasingly large size, video images present a great challenge to currently available cryptographic algorithms; the processes of encryption and decryption of video images are so computationally intensive that they introduce delays beyond acceptable...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2014

    Energy Efficient Power Aware Multipath Dynamic Source Routing

    The versatile uses of Mobile Ad hoc NETworks (MANETs) have elicited everyone's attention and offer a lot of challenges to the researchers. Due to absence of central coordinators in ad hoc networks all the necessary actions are played by the individual node. Nodes major responsibility is routing and many routing...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2014

    Multi-Parameter Summarization for Software Architecture Recovery

    Software architecture is identified as an important element in the successful development and evolution of software systems. In spite of the significant role of architecture representation and modeling, many existing software systems like legacy or eroded ones do not have a consistent architecture representation. There have been several algorithms on...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2014

    Video Quality Adaptation to Improve The Quality of Experience in DASH Environments

    Recently, DASH (Dynamic Adaptive Streaming over HTTP) is gaining attention because it is possible to use an existing web server, and not be restricted by the firewall or NAT (Network Address Translator). However, the existing video quality adaptation methods for DASH do not consider the frequent change of video quality,...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2014

    Peer Trust Based Trust and Reputation Model for Wireless Sensor Networks to Protect Border

    Border security has become a high-priority issue in many countries around the world. The conventional border surveillance or petrol systems consist of check points and border troops but it does not provide the complete security. In addition to that smart fencing is a solution to extend the eyes and ears...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2014

    Security Analysis in Open Source Linux Network

    Simple way Linux is an operating system. It is the usage of software on a computer that enables applications and the computer operator to access the devices on the computer to perform desired function. Linux operating system is very similar to other operating systems such as windows and OS X....

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2014

    A Novel Approach in Classification by Evolutionary Neural Networks

    Artificial neural network is an interconnected group of natural or artificial neurons that uses a mathematical or computational model for information processing based on a connectionist approach to computation. Neural network optimization based on three basic parameters topology, weights and the learning rate. The overfitting is a problem in NN...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2014

    Haptic Science and Technology

    Haptic technology, or haptics, is a tactile feedback technology which takes advantage of a user's sense of touch by applying forces, vibrations, and/or motions upon the user. This mechanical stimulation may be used to assist in the creation of virtual objects (objects existing only in a computer simulation), for control...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2014

    A Clustering Compression Method for 3D Human Motion Capture Data

    Human motion capturing has become an important tool in fields such as sports sciences, biometrics, and particularly in computer animation, where large collections of motion material are accumulated in the production process. Efficient storage, retrieval and transmission methods are needed to fully exploit motion databases for reuse and for the...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2014

    Extracting Summary from Documents using K-mean Clustering Algorithm

    Extracting summary from the documents is a difficult task for human beings. Therefore to generate summary automatically has to facilitate several challenges; as the system automates it can only extract the required information from the original document. This reduces the work to compress the original document and extract only essential...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jul 2014

    A New Efficient and Energy-Aware Clustering Algorithm for the OLSR Protocol

    Integrating Quality of Service (QoS) in a Mobile Ad-hoc NETwork (MANET) is a difficult challenge and a very tedious task. It requires finding a compromise between several QoS parameters. The energy criterion is one of the most important of these parameters that will provide a long lifetime for a given...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jul 2014

    Face Based Automatic Human Emotion Recognition

    In the field of image processing it is very interesting to recognize the human gesture for general life applications. For example, observing the gesture of a driver when person is driving and alerting the person when in sleepy mood will be quite useful. Human gestures can be identified by observing...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jul 2014

    Sparse Representation for Face Recognition

    In this paper, the authors provide a problem of automatically recognizing human faces from frontal views with various facial expressions, occlusion, illumination and pose. There are two underlying motivations for them to write this paper: the first is to provide an occlusion and various expressions of the existing face recognition...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Sep 2009

    A Novel FPGA Implementation of AES-128 Using Reduced Residue of Prime Numbers Based S-Box

    In this paper, the authors present a novel Field Programmable Gate Array (FPGA) implementation of Advanced Encryption Standard (AES- 128) algorithm based on the design of high performance S-Box built using reduced residue of prime numbers. The objective is to present an efficient hardware realization of AES-128 using Very High...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Feb 2011

    FPGA Based Fixed Width 4×4, 6×6, 8×8 and 12×12-Bit Multipliers Using Spartan-3AN

    In this paper, the authors investigate the Field Programmable Gate Array (FPGA) implementation of fixed width 4×4, 6×6, 8×8, and 12×12 standard and truncated multipliers using very high speed integrated circuit hardware description language. Multiplier is a core operation for Digital Signal Processing (DSP) applications such as Finite Impulse Response...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jul 2011

    Delay Study of Virtex-2, Virtex-4 and Spartan-3E Based Truncated Multipliers

    The accomplishment of efficient realization of multiplication using Field Programmable Gate Arrays (FPGAs) can ascribe Digital Signal Processing (DSP) blocks including small embedded multipliers to specific application in terms of speed, power dissipation and area. A full width digital nxn multiplier computes the 2n output as a weighted sum of...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2011

    Virtex-5 FPGA Based Braun's Multipliers

    Fast Fourier Transform (FFT) and Finite Impulse Response (FIR) are examples of Digital Signal Processing (DSP) applications, which require high execution speed. Parallel array multipliers implementation on Field Programmable Gate Arrays (FPGAs) can fulfill high execution speed. The Virtex-5 FPGA resource utilization is obtained for 4×4, 6×6, 8×8 and 12×12...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jun 2014

    Ultimate Video Spreading With QOS Over Wireless Network Using Selective Repeat Algorithm

    Now-a-days the broad casting of video place's a major role in wireless network. If the user wants to broadcast a video it takes a time to transmit from source to destination, due to large size of video. In wireless network the packet must be lightweight, due to that it takes...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jun 2014

    Securing Cipher Information Using Edge Based Adaptive Pixel Pair Matching

    Securing the information from other persons is always difficult one when the users are connected in an open network. In order to send some confidential information the user must protect it from the attackers. Cryptography and steganography plays vital role in securing information from others. Cryptography is the art of...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jun 2014

    Wireless Device Positioning and Finding Intruder Using RSS

    Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. The risks to users of wireless technology have increased as the service has become more popular. Wi-Fi can be less secure than wired connections (such as Ethernet) because an intruder does not need a physical...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jun 2014

    Network Synchronization Coding for Wireless Sensor Network Device

    Wireless sensor networks are emerging at faster rate in practical industrial applications. During the communication process the packets are transferred via wireless media. The precision of data transferred is dependent on the synchronization approach followed. However in case on wireless sensor network where the devices are located at different range,...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jun 2014

    Performance Enhancement of Cloud Computing using Clustering

    Cloud computing is an emerging infrastructure paradigm that allows efficient maintenance of cloud with efficient uses of servers. Virtualization is a key element in cloud environment as it provides distribution of computing resources. This distribution results in cost and energy reduction, thus making efficient utilization of physical resources. Thus resource...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jun 2014

    Competent Scheduling for Intermittent Aggregation Queries in Multihop Sensor Networks

    Recent advances in low-power computing and communication technologies have given rise to the proliferation of wireless sensor networks having low cost sensor nodes with limited processing capacity and battery power. Wireless sensor networks can be used in a wide range of applications such as industrial process monitoring and control, surveillance...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jun 2014

    Automatic Discovery of Association Orders Between Name and Aliases From the Web Using Anchor Texts-Based Co-Occurrences

    Many celebrities and experts from various fields may have been referred by not only their personal names but also by their aliases on web. Aliases are very important in information retrieval to retrieve complete information about a personal name from the web, as some of the web pages of the...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jul 2014

    A New Efficient and Energy-Aware Clustering Algorithm for the OLSR Protocol

    Integrating Quality of Service (QoS) in a Mobile Ad-hoc NETwork (MANET) is a difficult challenge and a very tedious task. It requires finding a compromise between several QoS parameters. The energy criterion is one of the most important of these parameters that will provide a long lifetime for a given...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jul 2014

    Face Based Automatic Human Emotion Recognition

    In the field of image processing it is very interesting to recognize the human gesture for general life applications. For example, observing the gesture of a driver when person is driving and alerting the person when in sleepy mood will be quite useful. Human gestures can be identified by observing...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jul 2014

    Sparse Representation for Face Recognition

    In this paper, the authors provide a problem of automatically recognizing human faces from frontal views with various facial expressions, occlusion, illumination and pose. There are two underlying motivations for them to write this paper: the first is to provide an occlusion and various expressions of the existing face recognition...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jul 2014

    Comparison Study of Multiple Traveling Salesmen Problem Using Genetic Algorithm

    Multiple Traveling Salesman Problems (MTSPs) are a typical computationally complex combinatorial optimization problem, which is an extension of the famous Traveling Salesman Problem (TSP). The MTSP can be generalized to a wide variety of routing and scheduling problems. The paper makes the attempt to show how Genetic Algorithm (GA) can...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jul 2014

    DDOS Attack Detection Based on an Ensemble of Neural Classifier

    In this paper, the authors review the detection of Distributed Denial of Service (DDoS) attack. This DDoS attacks could be detected using the existing machine learning techniques such as neural classifiers. These classifiers lack generalization capabilities which result in less performance leading to high false positives. This paper evaluates the...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jul 2014

    Packet Scheduling Mechanism for Multimedia Services to Guarantee QoS in 3GPP LTE System

    The packet scheduling mechanism is an important technical issue in the Long Term Evolution (LTE) system. Several packet scheduling mechanisms have been proposed to improve the Quality of Service (QoS) in the LTE wireless communication system. However, most of these mechanisms cannot satisfy various QoS requirements simultaneously. In this paper,...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jul 2014

    A Collaborative Monitoring System Based on JXTA

    In order to reduce the burden of network management equipment, the network management function is distributed to each distributed object by integrating Peer-To-Peer (P2P) networking technology with network management technology. A collaborative monitoring system based on JXTA was designed here. The architecture and specific implementation were proposed. It emphasizes on...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jul 2014

    A Real-Time Rendering Method Based on Precomputed Hierarchical Levels of Detail in Huge Dataset

    Traditional preprocessing methods, such as discrete Levels Of Detail (LOD) or continuous LOD, are inapplicable to large dataset consists of huge amount of models. Division granularity of discrete LOD is coarse while continuous LOD is time-consuming. Real-time rendering is a challenging and open problem to solve. A real-time rendering method...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jul 2014

    The Proposed Design of the Monitoring System for Security Breaches of Buildings Based on Behavioral Tracking

    In this paper, the authors present a video security system that uses multiple static cameras to track several people in indoor and outdoor environments. This system has a set of cameras that coordinate the tracking tasks among the cameras. Since each object in the scene can be tracked by a...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jun 2014

    Believer Based Protected and Efficient Routing in Pervasive Network

    A pervasive network is one in which the estimation of the capability of the nodes to arrange themselves autonomously in the network environment and exchange information through these networks. All types of ad-hoc networks come under pervasive network. In this dynamically changing environment, the authors cannot provide security in the...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jun 2014

    Measuring Accuracy in Identifying and Detecting Unauthorized Access Point Using Proactive Intrusion Detection Approach in Wireless Networks

    Currently, one of the major security issues in wireless environment is the intrusion coming from an unknown and unauthorized wireless access points. This access points could expose any sensitive information transmitted over the network. Until now the Intrusion Detection System (IDS) on wireless network environment is still being developed because...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jun 2014

    Object-Oriented System-on-Network-on-Chip Template and Implementation

    Network-on-chip (NoC) technology enables a new system-on-chip paradigm, the System-on Network-on-Chip (SoNoC) paradigm. One of the challenges in designing application-specific networks is modeling the on-chip system behavior and determining on-chip traffic characteristics. A universal object message level model for SoNoC was defined and an object-oriented methodology was developed to implement...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jun 2014

    Energy Efficient Position Based Opportunistic Routing Protocol for MANETS

    Reliable and on-time data delivery is a crucial parameter of network performance in highly dynamic mobile ad hoc networks. Leveraging on a modified 802.11 MAC tweak, guard nodes relay the packet with prioritized back off time when the intended node fails and becomes a contender nodes themselves. Previously used ad...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Feb 2014

    Comparison of Results Obtained by Application of Techniques Based on Formal Concept Analysis and Oriented Graph for a Remodulaisation Software Architecture Composed of Classes and Packages

    In a previous paper, the authors preceded to the remodularization architecture based classes and packages using the Formal Concept Analysis (FCA), they then got two possible remodularized architectures. They tried the redistribution of classes by using a technique based on Oriented Graph to determine the packages that receive the redistributed...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Dec 2013

    Lightweight DNS for Multipurpose and Multifunctional Devices

    Internet is the combination of various devices. It is a medium of information transfer so it is used everywhere in the world. There are many Domain Name System (DNS) providers which offer DNS services to World Wide Web (WWW). This paper describes problems that occur during the use of DNS....

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Mar 2014

    pNFS for Everyone: An Empirical Study of a Low-Cost, Highly Scalable Networked Storage

    In this paper, the authors present empirical experience on a scalable, high-performance storage with two existing low-cost technologies. One technology is Ethernet-Attached Disks (E-AD) which are iSCSI-like disks but with low cost controllers. Another is Network File System (NFS) which is an open standard supported through open source. In particular,...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Feb 2014

    A Novel Clustering Algorithm for Homogenous and Large-Scale Wireless Sensor Networks: Based on Sensor Nodes Deployment Location Coordinates

    Wireless Sensor Networks (WSNs) are new generation of wireless networks which have many potential applications and unique challenges. Some of their most important problems are their hard organization and management, limited resources, dynamic topology and scalability. One significant technique against to these problems is clustering. Clustering leads to more scalability,...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Feb 2014

    Dynamic Load Balancing Algorithms for Distributed Networks

    In this paper, the authors propose two efficient algorithms referred to as Rate-based Load Balancing via Virtual Routing (RLBVR) and Queue-based Load Balancing via Virtual Routing (QLBVR), which belong to the above Rate Adjustment Policy (RAP) and Queue and Rate Adjustment Policy (QRAP) policies. They classify the dynamic distributed load...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Feb 2014

    Distributed Algorithm for Fast Detecting the Failure Nodes Chronicles

    The distributed cut detection algorithm the authors propose here enables every node of a wireless sensor network to detect Disconnected From Source (DOS) events if they occur. Second, it enables a subset of nodes that experience Connected, but a Cut Occurred Somewhere (CCOS) events to detect them and estimate the...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Feb 2014

    Base Station Controlled Adaptive Clustering for Qos in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are a collection of nodes organized into a cooperative network. Harsh and dynamic physical environments and extremely limited resources are major obstacles for satisfying Quality of Service (QoS) metrics. This paper proposes and analyzes an Base station Controlled Adaptive Clustering Protocol (BCACP) for WSN suitable to...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Feb 2014

    The Methodology of Expert Systems

    Now-a-days there are no uniform methods, models and tools for creating expert systems. More accessible software tools are required, which would support a standard design technology application of expert systems, allow detailed analysis at the stage of systems design or even bring a negative result. The purpose of the paper...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Feb 2014

    An Efficient Multi Channel Query Scheduling in Wireless Sensor Networks

    In order to achieve high performance query services in wireless sensor networks, Mobile lightweight medium access control based Dynamic Conflict-free Query Scheduling (MDCQS) a novel TDMA based MAC protocol used for dynamic conflict free scheduling with high query rate. Earlier this technique is used to achieve high data rate. By...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jan 2014

    Wimax Capacity Estimation Through Different Channel Characterstic

    In this paper, the authors study a factors influencing system bandwidth capacity in IEEE 802.16e networks. The system capacity of 802.16j also investigated and evaluated to understanding how the relay architecture can lead to capacity increases in the downlink. An analytical study of the WiMAX propagation channel by using cost-231...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Dec 2013

    A Co-Operative Cluster Based Data Replication Technique for Improving Data Accessibility and Reducing Query Delay in MANET's

    Mobile Ad-hoc NETworks (MANETs) are very popular because of its infrastructure less network. These mobile nodes serve as both hosts and routers so they can forward packets on behalf of each other. It has restricted computing resources and due to mobility of node there is much change in network topology....

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Dec 2013

    Incorporation of QoS in Network Mobility (NEMO) Network

    The contemporary internet that the authors have been using today is based on Best-Effort (BE) service only, where packets are assigned and forwarded with the same priority. The BE service is acceptable only for traditional Internet applications like e-mail, web browsing and file transfer. However, it is not adequate for...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Dec 2013

    Multi-Niche Crowing in a Steady State Evolutionary Algorithms for Dynamic Multicast Routing

    One of the most important problems in computer networks is the path finding of multi-destination mobiles in a dynamic environment by minimizing cost and delay, as well as maximizing bandwidth. In this paper, first a routing table is constructed by a local search and subsequently optimized by a hybrid of...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2014

    Graphical Secure Password Method Against Online Password Hackers(Guessing Attacks)

    Passwords are a common form of authentication and are often the only barrier between a user and their personal information. There are several programs attackers can use to help guess or \"Crack\" passwords, but by choosing good passwords and keeping them confidential, the user can make it more difficult for...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2014

    Comparative Analysis of Performance of 3G Networks Over TCP Protocols

    Third Generation (3G) systems develop faster communications services, including voice, fax and Internet, anytime and anywhere with seamless global roaming global standard for 3G has opened the way to enabling innovative applications and services multimedia entertainment, infotainment and location-based services, among other. 3G networks are getting day-by-day popular and they...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2014

    Performance Analysis of Classifiers for Intrusive Data and Rough Sets Reducts

    The fast change in the day-to-day activity need to analyze the intrusive data very accurately without losing performance. Intrusive behavior is critical for analyzing the data and performance is crucial in the computational environment, when the user requires accuracy in the results. Finding intrusive behavior in the network with accuracy...

    Provided By International Journal of Computer Science and Network Security