International Journal of Computer Science and Network Security

Displaying 1-40 of 330 results

  • White Papers // Sep 2014

    Mobility Prediction Algorithm to Improve the Routing Performance in MANET

    One of the major challenges in Mobile Ad hoc NETworks (MANETs) is link failure due to mobility. If the degree of mobility of any node in any route increases, the route lifetime decreases. That causes frequent link failures, and results more packet loss and low throughput. Packet loss requires packet...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Sep 2014

    Prevention of Selective Jamming Attacks by Using Packet Hiding Methods

    The open nature of the wireless medium leaves it too weak to intentional interference attacks, typically defined as jamming. This intentional interference with wireless transmissions can be used as a launch pad for mounting denial-of-service attacks on wireless networks. Typically, jamming has been introduced under an external threat model. However,...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Sep 2014

    Data Integrity Mechanism Using Hashing Verification

    In this paper, the authors propose a new one-way hash algorithm, which is also obtains better efficiency and security, compared with a particular conventional hash algorithm, hash algorithm can be used to determine if two values are equal, a hash function maps keys to small values. DILH algorithm using linear...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Sep 2014

    Password Authentication with Secured Login Interface at Application Layer

    In this paper, the authors present an innovative solution to the old problem of password security at application layer or input level. In their solution, each of the various lower case & upper case characters, special characters, digits from which a password could be comprised is encoded with a random...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Sep 2014

    A Survey of Clustering Uncertain Data Based Probability Distribution Similarity

    Clustering is one of the major tasks in the field of data mining. The main aim of the clustering is grouping the data or similar objects into one group based on their data find the similarity between the objects. Clustering of uncertain data have been becoming the major issues in...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Sep 2014

    New Trends in Intrusion Awareness System Based on SVM Classification

    Network intrusion awareness is important factor for risk analysis of network security. In the current decade various method and framework are available for intrusion detection and security awareness. Some method based on knowledge discovery process and some framework based on neural network. These entire model take rule based decision for...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Sep 2014

    Margin Adaptive Power Allocation Using Channel State Information in OFDMA Systems

    In this paper, the authors present the margin adaptive resource allocation using full CSIT (Channel State InformaTion) and statistical CSIT in OFDMA systems. In the past, Monte-Carlo snap-shots in the MA problem is far too complex, an analytical expression of the outage capacity as a function of the Signal-to-Noise Ratio...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2014

    Using Unitary Matrices in High-Speed Video Encryption

    Encryption computational complexity and encryption speed are two important aspects of video encryption algorithms. Due to its increasingly large size, video images present a great challenge to currently available cryptographic algorithms; the processes of encryption and decryption of video images are so computationally intensive that they introduce delays beyond acceptable...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2014

    Energy Efficient Power Aware Multipath Dynamic Source Routing

    The versatile uses of Mobile Ad hoc NETworks (MANETs) have elicited everyone's attention and offer a lot of challenges to the researchers. Due to absence of central coordinators in ad hoc networks all the necessary actions are played by the individual node. Nodes major responsibility is routing and many routing...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2014

    Multi-Parameter Summarization for Software Architecture Recovery

    Software architecture is identified as an important element in the successful development and evolution of software systems. In spite of the significant role of architecture representation and modeling, many existing software systems like legacy or eroded ones do not have a consistent architecture representation. There have been several algorithms on...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2014

    Video Quality Adaptation to Improve The Quality of Experience in DASH Environments

    Recently, DASH (Dynamic Adaptive Streaming over HTTP) is gaining attention because it is possible to use an existing web server, and not be restricted by the firewall or NAT (Network Address Translator). However, the existing video quality adaptation methods for DASH do not consider the frequent change of video quality,...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2014

    Peer Trust Based Trust and Reputation Model for Wireless Sensor Networks to Protect Border

    Border security has become a high-priority issue in many countries around the world. The conventional border surveillance or petrol systems consist of check points and border troops but it does not provide the complete security. In addition to that smart fencing is a solution to extend the eyes and ears...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2014

    Security Analysis in Open Source Linux Network

    Simple way Linux is an operating system. It is the usage of software on a computer that enables applications and the computer operator to access the devices on the computer to perform desired function. Linux operating system is very similar to other operating systems such as windows and OS X....

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2014

    Graphical Secure Password Method Against Online Password Hackers(Guessing Attacks)

    Passwords are a common form of authentication and are often the only barrier between a user and their personal information. There are several programs attackers can use to help guess or \"Crack\" passwords, but by choosing good passwords and keeping them confidential, the user can make it more difficult for...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2014

    Comparative Analysis of Performance of 3G Networks Over TCP Protocols

    Third Generation (3G) systems develop faster communications services, including voice, fax and Internet, anytime and anywhere with seamless global roaming global standard for 3G has opened the way to enabling innovative applications and services multimedia entertainment, infotainment and location-based services, among other. 3G networks are getting day-by-day popular and they...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2014

    Performance Analysis of Classifiers for Intrusive Data and Rough Sets Reducts

    The fast change in the day-to-day activity need to analyze the intrusive data very accurately without losing performance. Intrusive behavior is critical for analyzing the data and performance is crucial in the computational environment, when the user requires accuracy in the results. Finding intrusive behavior in the network with accuracy...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2014

    Energy Efficient Mobile Replica Detection in Wireless Sensor Network Based on Modified Sequential Probability Ratio Test

    In wireless sensor network, an attacker can capture sensor nodes and can compromise sensor nodes. Then would create duplicate nodes and built up various attacks using duplicate nodes, inserts into the network. This is happened because of unattended nature of wireless sensor network. These attacks helps attacker to control few...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2014

    Application of Compound Chaotic Mapping in Voice Encryption Algorithm

    Using the devaney chaos theory, designed a compound chaotic mapping as the encryption function, and had proven that the track was non-periodic for the initial value of a finite decimal. The authors have designed an encryption algorithm successively according to this, and realized the encryption for sound documents. Afterward the...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2014

    Extracting Summary from Documents using K-mean Clustering Algorithm

    Extracting summary from the documents is a difficult task for human beings. Therefore to generate summary automatically has to facilitate several challenges; as the system automates it can only extract the required information from the original document. This reduces the work to compress the original document and extract only essential...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2014

    Haptic Science and Technology

    Haptic technology, or haptics, is a tactile feedback technology which takes advantage of a user's sense of touch by applying forces, vibrations, and/or motions upon the user. This mechanical stimulation may be used to assist in the creation of virtual objects (objects existing only in a computer simulation), for control...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2014

    A Clustering Compression Method for 3D Human Motion Capture Data

    Human motion capturing has become an important tool in fields such as sports sciences, biometrics, and particularly in computer animation, where large collections of motion material are accumulated in the production process. Efficient storage, retrieval and transmission methods are needed to fully exploit motion databases for reuse and for the...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2014

    A Novel Approach in Classification by Evolutionary Neural Networks

    Artificial neural network is an interconnected group of natural or artificial neurons that uses a mathematical or computational model for information processing based on a connectionist approach to computation. Neural network optimization based on three basic parameters topology, weights and the learning rate. The overfitting is a problem in NN...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jul 2014

    The Proposed Design of the Monitoring System for Security Breaches of Buildings Based on Behavioral Tracking

    In this paper, the authors present a video security system that uses multiple static cameras to track several people in indoor and outdoor environments. This system has a set of cameras that coordinate the tracking tasks among the cameras. Since each object in the scene can be tracked by a...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jul 2014

    A Real-Time Rendering Method Based on Precomputed Hierarchical Levels of Detail in Huge Dataset

    Traditional preprocessing methods, such as discrete Levels Of Detail (LOD) or continuous LOD, are inapplicable to large dataset consists of huge amount of models. Division granularity of discrete LOD is coarse while continuous LOD is time-consuming. Real-time rendering is a challenging and open problem to solve. A real-time rendering method...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jul 2014

    A Collaborative Monitoring System Based on JXTA

    In order to reduce the burden of network management equipment, the network management function is distributed to each distributed object by integrating Peer-To-Peer (P2P) networking technology with network management technology. A collaborative monitoring system based on JXTA was designed here. The architecture and specific implementation were proposed. It emphasizes on...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jul 2014

    Packet Scheduling Mechanism for Multimedia Services to Guarantee QoS in 3GPP LTE System

    The packet scheduling mechanism is an important technical issue in the Long Term Evolution (LTE) system. Several packet scheduling mechanisms have been proposed to improve the Quality of Service (QoS) in the LTE wireless communication system. However, most of these mechanisms cannot satisfy various QoS requirements simultaneously. In this paper,...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jul 2014

    DDOS Attack Detection Based on an Ensemble of Neural Classifier

    In this paper, the authors review the detection of Distributed Denial of Service (DDoS) attack. This DDoS attacks could be detected using the existing machine learning techniques such as neural classifiers. These classifiers lack generalization capabilities which result in less performance leading to high false positives. This paper evaluates the...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jul 2014

    Comparison Study of Multiple Traveling Salesmen Problem Using Genetic Algorithm

    Multiple Traveling Salesman Problems (MTSPs) are a typical computationally complex combinatorial optimization problem, which is an extension of the famous Traveling Salesman Problem (TSP). The MTSP can be generalized to a wide variety of routing and scheduling problems. The paper makes the attempt to show how Genetic Algorithm (GA) can...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jul 2014

    Face Based Automatic Human Emotion Recognition

    In the field of image processing it is very interesting to recognize the human gesture for general life applications. For example, observing the gesture of a driver when person is driving and alerting the person when in sleepy mood will be quite useful. Human gestures can be identified by observing...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jul 2014

    Sparse Representation for Face Recognition

    In this paper, the authors provide a problem of automatically recognizing human faces from frontal views with various facial expressions, occlusion, illumination and pose. There are two underlying motivations for them to write this paper: the first is to provide an occlusion and various expressions of the existing face recognition...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jul 2014

    A New Efficient and Energy-Aware Clustering Algorithm for the OLSR Protocol

    Integrating Quality of Service (QoS) in a Mobile Ad-hoc NETwork (MANET) is a difficult challenge and a very tedious task. It requires finding a compromise between several QoS parameters. The energy criterion is one of the most important of these parameters that will provide a long lifetime for a given...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jun 2014

    Wireless Device Positioning and Finding Intruder Using RSS

    Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. The risks to users of wireless technology have increased as the service has become more popular. Wi-Fi can be less secure than wired connections (such as Ethernet) because an intruder does not need a physical...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jun 2014

    Network Synchronization Coding for Wireless Sensor Network Device

    Wireless sensor networks are emerging at faster rate in practical industrial applications. During the communication process the packets are transferred via wireless media. The precision of data transferred is dependent on the synchronization approach followed. However in case on wireless sensor network where the devices are located at different range,...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jun 2014

    Content-Based Image Retrieval System using Feed-Forward Backpropagation Neural Network

    Extensive digitization of images, paintings, diagrams and explosion of World Wide Web (www), has made traditional keyword based search for image, an inefficient method for retrieval of required image data. Content-Based Image Retrieval (CBIR) system retrieves the similar images from a large database for a given input query image. Today,...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jun 2014

    Android Malware : Study and Analysis for Privacy Leak in Ad-Hoc Network

    Smartphone's users has been increasing since last few years which provides numerous operations like accessing information through online mode, payment options, using utility applications, playing games. Smartphone's have become so powerful these days that tends to play the role of PC's. The basic operation of any mobile phone calling, storing...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jun 2014

    Ultimate Video Spreading With QOS Over Wireless Network Using Selective Repeat Algorithm

    Now-a-days the broad casting of video place's a major role in wireless network. If the user wants to broadcast a video it takes a time to transmit from source to destination, due to large size of video. In wireless network the packet must be lightweight, due to that it takes...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jun 2014

    Securing Cipher Information Using Edge Based Adaptive Pixel Pair Matching

    Securing the information from other persons is always difficult one when the users are connected in an open network. In order to send some confidential information the user must protect it from the attackers. Cryptography and steganography plays vital role in securing information from others. Cryptography is the art of...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jun 2014

    Automatic Discovery of Association Orders Between Name and Aliases From the Web Using Anchor Texts-Based Co-Occurrences

    Many celebrities and experts from various fields may have been referred by not only their personal names but also by their aliases on web. Aliases are very important in information retrieval to retrieve complete information about a personal name from the web, as some of the web pages of the...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jun 2014

    Performance Enhancement of Cloud Computing using Clustering

    Cloud computing is an emerging infrastructure paradigm that allows efficient maintenance of cloud with efficient uses of servers. Virtualization is a key element in cloud environment as it provides distribution of computing resources. This distribution results in cost and energy reduction, thus making efficient utilization of physical resources. Thus resource...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jun 2014

    Competent Scheduling for Intermittent Aggregation Queries in Multihop Sensor Networks

    Recent advances in low-power computing and communication technologies have given rise to the proliferation of wireless sensor networks having low cost sensor nodes with limited processing capacity and battery power. Wireless sensor networks can be used in a wide range of applications such as industrial process monitoring and control, surveillance...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jul 2012

    A Design of Cloud Privacy Manager Algorithm

    Cloud Computing is a evolving Technology and new paradigm. The objective of this paper is to introduce the privacy concerns, related to cloud computing that will likely be the focus of discussion. In this paper, the authors discuss the privacy in cloud computing, its enhancement technologies to provide control of...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jul 2012

    A Novel Digital Watermark Based on Wavelet Coefficients Comparison

    Watermark technology is one of the most promising and effective ways for copyright protection of digital media and safe transmission of digital information. In the proposed method, the watermark is embedded in the components of medium frequency on the horizontal and vertical direction based on the wavelet coefficients comparison, and...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jul 2012

    CBH-MAC Protocol for Multihop QoS in Wireless Sensor Networks

    This paper proposes an efficient hybrid MAC for multi-hop QoS protocol in Wireless Sensor Networks for delay sensitive data traffic. The authors present Contention Based Hybrid MAC (CBH-MAC) protocol for both chain and cross topology, which reduces end-to-end delay, energy efficiency and maximizes the packet delivery ratio by minimizing the...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jul 2012

    An Approach to Image Compression With Partial Encryption Without Sharing the Secret Key

    Existing methods when employ compression there is no consideration of security, similarly when it describe encryption there is no consideration of size i.e. compression. In this paper a simultaneous image compression and encryption scheme is discussed. The order of the two processes viz. compression and encryption is EC, i.e., image...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jun 2012

    A Requirements Elicitation and Analysis Aided by Text Mining

    In Requirements Engineering the initial activities of elicitation and analysis are essential for software development. Achieving these requirements (and describing then in natural language), together with simple and rapid modeling (with enough degree of formality) are basic needs that influence the remaining stages of software development. In this paper, the...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jun 2012

    Intelligent Crawling on Open Web for Business Prospects

    Dynamic nature of web based systems requires continuous system updating. Information retrieval depends upon crawlers that crawl the web exhaustively, but business corporate expect from their crawlers to retrieve the specific information as per their applications. Crawlers help to download the required information using hyperlinks that occur in Web pages...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Apr 2011

    Online Loss Differentiation Algorithm With One-Way Delay for TCP Performance Enhancement

    In this paper for the performance enhancement of TCP protocol in the mixed wired/wireless network, packet loss differentiation algorithm is proposed which distinguishes the nature of losses and decides congestion control action accordingly. TCP protocol takes packet loss as an indication of network congestion so that it reduces its congestion...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2012

    Network Based Security Model Using Symmetric Key Cryptography (AES 256 - Rijndael Algorithm) With Public Key Exchange Protocol (Diffie-Hellman Key Exchange Protocol)

    The main aim of this paper is to strengthen secured communication over the network by enhancing the strength of the AES algorithm with Diffie-Hellman key exchange Protocol. The Rijndael is a block cipher with variable block and key size is believed to provide much more security. The Rijndael with 128...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2012

    Camouflage in Malware: From Encryption to Metamorphism

    Camouflage of malware is a serious challenge for antivirus experts and code analysts. Malware use various techniques to camouflage them to not be easily visible and make their lifetime as longer as possible. Although, camouflage approaches cannot fully stop the analyzing and fighting against the malware, but it make the...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2012

    Secured Public Key Authentication and Energy Efficient MAC Implementation in Wireless Sensor Networks

    As Wireless Sensor Networks (WSNs) are susceptible to attacks and sensor nodes have limited resources, designing a secure and efficient user authentication protocol for WSNs is a difficult task. Considering that most future large-scale WSNs follow a two-tiered architecture, the authors propose an efficient and Denial-of-Service resistant user authentication scheme...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2012

    Generalization of Quantum Key Distribution Protocol

    Quantum Key Distribution (QKD) is a secure key sharing technology with unconditional security. Certain well-known protocols for QKD have been presented, which claim their security by means of higher eavesdropping error-rates. A generalized quantum key distribution protocol that can be optimized for arbitrary number of bases and dimensions of photon...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2012

    Comprehensive Network Security Approach: Security Breaches at Retail Company-A Case Study

    The development of the Web technologies and services increases the level of threats to data security in companies and enterprises day by day. As criminals are turn into professional network intruders, new laws and legislations are introduced to cover information security. Even though on-line businesses provide the productivity and efficiency...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2012

    Check Points Against Privacy Breaches in Android Applications

    The risk of privacy breaches by malicious programs has been increasing, and these programs have used more elaborate techniques to circumvent detection. Attacks using a collaboration of applications are especially difficult to find since distinct applications obtain privacy-sensitive data and send the data to the outside. Current mobile platforms have...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2012

    Implementation of the Remote Control and Management System in the Windows O.S

    In this paper, the authors implemented the remote management system on the Windows Operating System. Remote management system in the Windows operating system was designed for the client and server function. A client function has the ability to allow the system to access from the server. This feature is responsible...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2012

    Towards Standardization and Interoperability of Database Backups

    The current business model of modern companies is increasingly dependent on information technology. Thus, it is necessary to keep security copies of the data (backup) which may be used to restore them after a data loss event. On the other hand, this dependence encourages strong competition among suppliers and this...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2012

    A Novel PSO-Based Algorithm for the Optimal Location of Controllers in Wireless Networks

    The optimal location of controllers in wireless networks is an important problem in the process of designing cellular mobile networks. In this paper, the authors present a novel algorithm based on Particle Swarm Optimization (PSO) for solving it. Their objective function is determined by the total distance based on finding...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2012

    A Study on Effective Proactive Service in Pervasive Computing Environment

    Pervasive systems are becoming increasingly popular, with the appearance and penetration of mobile devices such as Smart phones. Proactive service is one of the most important fields of research in pervasive computing. The authors propose a method for an effective proactive service in pervasive computing environment. Most of previous researches...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2012

    A Frame Packing Mechanism Using PDO Communication Service Within CANopen

    The utilization of the CAN open-based network needs to be minimized in order to improve the communication performance such as worst-case response time of CAN open messages. To achieve this end, the messages should be packed together as many as possible so that the message frame overhead will be decreased....

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2012

    Developing a Web-Based GNH Survey Application and a Web Service for Identifying Missing Data Mechanism in Incomplete Survey Data

    This paper proposes a web-based GNH survey application, capable of identifying missing data mechanism which is crucial in effectively handling missing data in survey questionnaire. First, the authors have stated the rationale behind GNH survey briefly highlighting the concept and the birth of GNH. Second, they have described the present...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2012

    Viewpoints Diagram: Towards an Innovative Diagram in the UML Language

    This paper is to put forward a modeling of multi-view classes by making use of the Petri networks formalism. The object approach aims at modeling complex systems and allows to take into account the views of the different users of the system and their access rights. Thus, in the paper,...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2012

    Proposing a New Approach to Applying Pervasive Computing in Agriculture Environments

    The resource management in agriculture environments is very important. Using smart controls will be one of the most eminent ways of managing. These resources such as water and plant nutrition. In this paper researcher are going to present a special program in which provide necessary resources for growing plant by...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2012

    A Novel Approach for Keyboard Dynamics Authentication Based on Fusion of Stochastic Classifiers

    Computer security is one of most important issues around the world. Most computer systems are using passwords for their own authentication or verification mechanisms. A robust and efficacious approach for classification of 24 persons who their typing patterns were collected introduced. A Linear Discriminate Classifier (LDC), Quadratic Discriminant Classifier (QDC)...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2011

    A Hybrid LAR-1DNDP Route Discovery Algorithm for Mobile Adhoc Networks

    A Mobile Ad hoc NETwork (MANET) is defined as a collection of low-power wireless mobile nodes forming a temporary network without the aid of any established infrastructure or centralized administration. A data packet in a MANET is forwarded to other mobile nodes within the network through a reliable and an...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Sep 2010

    An Efficient Materialized View Selection Approach for Query Processing in Database Management

    Quick response time and accuracy are important factors in the success of any database. In large databases particularly in distributed database, query response time plays an important role as timely access to information and it is the basic requirement of successful business application. A data warehouse uses multiple materialized views...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Nov 2012

    Design and Implementation of Fuzzy Temperature Control System for WSN Applications

    With its low power embedded sensingactuation, computing, wireless RF communications and multi-hop mesh networking capabilities, Wireless Sensor Network (WSN) has emerged as one of the popular multidisciplinary technologies of the 21st century. Present day research trends focus on application specific deployment of network hardware with information processing, integrating it into...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Nov 2012

    Analysis of Various Clustering and Classification Algorithms in Datamining

    The term "Classification" is frequently used as an algorithm for all data mining tasks. Instead, it is best to use the term to refer to the category of supervised learning algorithms used to search interesting data patterns. While classification algorithms have become very popular and ubiquitous in DM research, it...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Nov 2012

    Performance Versus Cost of a Parallel Conjugate Gradient Method in Cloud and Commodity Clusters

    Cloud computing is an emerging technology to run HPC applications using computing resources on a pay per use basis. The CG method is a linear solver which is used in many engineering and scientific applications, and is computationally demanding. The authors implement different approaches of a parallel CG method and...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Nov 2012

    Virtualization in Intrusion Detection Systems: A Study on Different Approaches for Cloud Computing Environments

    This paper presents an overview of some of the major works that focus on the use of virtualization in intrusion detection systems to protect against threats in cloud computing environments. The elasticity and abundant availability of computational resources are attractive to attackers in order to exploit vulnerabilities of the cloud,...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Nov 2012

    A Low Rate DDoS: A Security Threat in Mobile Adhoc Networks

    Network security is soft spot in wired or wireless networks, MANETS pose number of non-trivial challenges to the security design, such as shared wireless medium, dynamically changing topology, etc. DoS and DDoS are two of the most harmful threats to the network. MANETS are more vulnerable to these attacks. In...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Dec 2012

    Investigating The Effect of The Carrier Frequency Offset(CFO) and Frequency Synchronization on The Performance of The OFDM Wireless Systems

    Orthogonal Frequency Division Multiplexing (OFDM) is a modulation schema that due to the high spectral efficiency and the simplicity of the receiver implementation is the most common system for using in broadband communication systems. Although OFDM has been used in numerous wireless communication systems, but two of the main problems...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Dec 2012

    Design of Stream Cipher for Text Encryption using Soft Computing based Techniques

    In cryptography, encryption is the process of transforming information referred to as plain-text using an algorithm (called a cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is information which is, referred to as cipher-text. Stream...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Dec 2012

    Towards Minimizing Human Factors In End-User Information Security

    Today, many hardware and software solutions are available to enhance information security, however, little is known about the human factor in information security. Other researchers have revealed that the application of information security technologies alone does not always result in improved security. Human factors immensely contribute to the security of...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Dec 2012

    A Virtualised High Trust Zone (VHTZ) to Mitigate the Security and Privacy Issues in Cloud Computing

    The benefits of cloud computing are clearly well known which include rapid deployment, ease of customization, reduce cost and low risks. However, some high profile security breaches confuse organizations as they attempt to deploy cloud services in their businesses. Although, the cloud service providers pitch the security of their services....

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Dec 2012

    Smart Decision Making for Internal Attacks in Wireless Sensor Network

    An information procuring and processing emerging technology Wireless Sensor Network (WSN) consists of low-cost and multifunctional resources constrain autonomous nodes. It communicates short distances through wireless links. It is open media and underpinned by an application driven technology for information gathering and processing. It can be used for many different...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Dec 2012

    Survey of Web Application and Internet Security Threats

    Computer and network security are one of the most challenging topics in the Information Technology research community. Internet security is a significant subject that may affect a wide range of Internet users. People that use Internet to sell, buy and even to communicate needs their communications to be safe and...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Oct 2012

    Energy-Efficient Dynamic Source Routing Protocol for Wireless Sensor Networks

    Routing presents a significant design challenge to meet various applications requirements in Wireless Sensor Networks (WSNs) communications. In this paper, the authors present a minimum delay multipath routing protocol with modification to the standard Dynamic Source Routing (DSR) protocol, which aims to improve energy efficiency and minimize end-to-end delay to...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Oct 2012

    Security Challenges in 3G Systems

    This paper explains the authentication and encryption scheme used in GSM. It explains the different possible attacks on cellular systems, which include SIM cloning, eavesdropping, location tracking, SMS ping, SMS denial of service, authentication denial of service and SMS spam. It classifies these attacks on the basis of target of...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Oct 2012

    An Energy-Efficient Clustering Algorithm for Wireless Sensor Networks

    In Wireless Sensors Networks (WSNs) the efficient use of the sensors' energy is a key point to extend the network lifetime and has been the center of attention by many researchers. Clustering formation is an important technique used to reduce the sensor's energy consumption. However, finding an optimal clustering in...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Oct 2012

    Delay-Sensitive Applications in VANET and Seamless Connectivity: The Limitation of UMTS Network

    Multi-interface handheld devices enabling radio link connections to varieties of wireless networks (i.e 3G cellular, Wi-Fi, WiMAX) can provide seamless connectivity. With seamless connectivity, VANET safety applications are emerged. Currently, seamless connectivity has been promoted in 3G cellular environments offering a large coverage area and high bandwidth. Even though, 3G...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Sep 2012

    A New Mobility Model for Multimedia Networks

    Mobile IP is the current standard proposed by IETF for mobility management in IP networks. Its importance increases if network is supporting multimedia applications. Mobile node communicates with a static Correspondent Node. The main consideration is when Mobile Node and Correspondent Node both are visiting beyond their home networks and...

    Provided By International Journal of Computer Science and Network Security