International Journal of Computer Science and Network Security

Displaying 1-40 of 273 results

  • White Papers // Jan 2014

    Web Usage Mining Through Efficient Genetic Fuzzy C-Means

    In process of knowledge discovery from any web-log dataset, most widely and extensively used clustering algorithm for this purpose is Fuzzy C-Means (FCM) algorithm because the data of web-log is unsupervised dataset. Due to sensitivity of FCM, it can be easily trapped in a local optimum, and it is also...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jan 2014

    Outlier Analysis of Categorical Data Using NAVF

    Outlier mining is an important task to discover the data records which have an exceptional behavior comparing with other records in the remaining dataset. Outliers do not follow with other data objects in the dataset. There are many effective approaches to detect outliers in numerical data. But for categorical dataset...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jan 2014

    Fuzzy Logic Approach to Improving Stable Election Protocol for Clustered Heterogeneous Wireless Sensor Networks

    The wireless sensor network is composed of a set of nodes which energy is limited in terms of computing, storage and communication power. In this network, a few nodes become cluster head which causes the energetic heterogeneity of the network, therefore the behavior of the sensor network becomes very unstable...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jan 2014

    Cryptography Based On Hash Function BLAKE 32 in VLSI

    An important commodity in the world of electronic communication is information. The protection of authenticity and integrity of information is necessary to achieve a secure communication between communicating parties. Electronic security is becoming increasingly important as the Internet and other forms of electronic communication become more prevalent. BLAKE is a...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jan 2014

    Optimized Intrusion Detection by CACC Discretization Via Na

    Network Intrusion Detection System (IDS), as the main security defending technique, is second guard for a network after firewall. Data mining technology is applied to the network intrusion detection, and Precision of the detection will be improved by the superiority of data mining. For IDS many machine learning approaches are...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jan 2014

    IRIS Recognition Using Conventional Approach

    The proper functioning of many of the users' social, financial, and political structures now-a-days relies on the correct identification of people. Reliable and unique identification of people is a difficult problem; people typically use identification cards, usernames, or passwords to prove their identities, however passwords can be forgotten, and identification...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Dec 2013

    GPS Test Performance: Elastic Execution Applications Between Mobile Device and Cloud to Reduce Power Consumption

    Mobile systems, such as smart phones, have become the primary computing platform for many users. Smartphone's stimulate growth of Global Position Systems (GPS). However, Smartphone mobile computing faces challenges because of the limited battery capacity. Therefore, it is necessary to offload the computation-intensive part by careful partitioning of application functions...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Dec 2013

    Proposed Architecture for Automatic Conversion of Unstructured Text Data into Structured Text Data on the Web

    Data mining, and in particular text mining, has attracted much attention in recent years due to the vast amounts of data available, and the rate of growth. Data mining tools can be used to uncover patterns or hidden relations in the available data, and can potentially contribute greatly to business...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Dec 2013

    Context Awareness through Cross-Layer Network Architecture

    Layered architectures are not sufficiently flexible to cope with the dynamics of wireless-dominated next generation communications. Cross-layer approaches may provide a better solution: allowing interactions between two or more nonadjacent layers in the protocol stack. Cross-layer architectures based on purely local information will not be able to support system-wide cross-layer...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Dec 2013

    An Empirical Study on Similarity Between Documents in Nptel Application Using Clustering Techniques

    In this paper, the authors present a tutorial overview of the main clustering methods used in data mining. The goal is to provide a self-contained review of the concepts and the similarity underlying clustering techniques. The paper begins by providing measures and criteria that are used for determining whether two...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Dec 2013

    Smile Mask to Capsulation MOLAZ Method

    Concealment of information is the most important things of interest to scientists and users alike. The work of many researchers to find new ways and methods for building specialized systems to protect the information from hackers. The method of those techniques AES and an adopted by the U.S. department of...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Dec 2013

    Trustiness Certification of Information Technology Equipment

    In this paper, the authors propose a system, which assigns trustiness certification to information technology equipment through a series of tests and evaluations. This system is based in a methodology that should be applied in a laboratory, which issues a technical report containing the results of all the methodology steps,...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Dec 2013

    Intrusion Detection System Based on Conditional Random Fields

    An intrusion detection system is used to monitor network traffic, check for suspicious activities and notifies the network administrator or the system to operate in high speed networks, present network intrusion detection systems are either signature based or anomaly based system. These systems are inefficient and suffer from a large...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Dec 2013

    Face Recognition Using Singular Value Decomposition Along with Seven State HMM

    In this paper, the authors present a new approach using Hidden Marko Model as classifier and Singular Values Decomposition (SVD) coefficients as features for face recognition. As face is a complex multi-dimensional structure and needs good computing techniques for recognition and it is an integral part of biometrics. Features extracted...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Dec 2013

    Wifi Infrastructure Security System from Vulnerable Attacks

    Wi-Fi is a very popular wireless technology which is powerful core for the global digital infrastructure. A device connected using Wi-Fi can access the network resource such as the Internet via a wireless network access point. Recent discoveries and initiatives highlight a simple fact that the core is just as...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Dec 2013

    Face Detection and Recognition Using Ada Boost-ICA Algorithm

    Face recognition mainly involves recognizing personal identity, based on statistical as well as geometrical features which are derived from face images .This paper presents an automated system for human face recognition in a real time background world for a large homemade dataset of persons face. The task is very difficult...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Dec 2013

    Fault Tolerance in SIP Push-To-Talk Service

    Push-to-Talk (PTT) is a well known service in the law enforcement and public safety communities, where coordination and spectral efficiency are key for efficient communication. Push-to-Talk (PTT) is a useful capability for rapidly deployable wireless mesh networks used by first responders. PTT allows several users to speak with each other...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Oct 2013

    General IPS: Carapace for Campus Wide Network in Intranet

    The proposed software architecture is implemented by using the agile software development process. The proposed software for the defence against attacks deals with the attack generation, attack detection in the intranet and then prevention of attacks. The attack prevention module is flexible as the authors can add the rule in...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Oct 2013

    Enhancing Malware Detection Using Innate Immunization

    Malware (malicious software) is a software designed to access secretly a computer system without the owner's consent which includes viruses, worms. Trojan horse and other types of malicious software. It represents the main threat facing the computer systems, networks and data. Creators of malware have different reasons to spread their...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Oct 2013

    A Study on Detection of Hacking and Malware Codes in Bare Metal Hypervisor for Virtualized Internal Environment of Cloud Service

    With rapid rise of virtualization technology from diverse types of cloud computing service, security problems such as data safety and reliability are the issues at stake. Since damage in virtualization layer of cloud service can cause damage on all host (user) tasks, Hypervisor that provides an environment for multiple virtual...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Oct 2013

    Black Hole Attack-Hazard to AODV Routing Protocol in Manet

    Mobile Ad Hoc NETwork (MANET) consists of a collection of wireless mobile hosts without the required intervention of any existing infrastructure or centralized access point such as base station. The dynamic topology of MANET allows nodes to join and leave the network at any point of time. Wireless MANET is...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Oct 2013

    Dynamic Training Intrusion Detection Scheme for Blackhole Attack in MANETs

    Mobile ad hoc NETwork (MANET) is a self-configuring network which is composed of several movable mobile nodes. These mobile nodes communicate with each other without any infrastructure. As wireless ad hoc networks lack an infrastructure, they are exposed to a lot of attacks. This paper analyzes the black-hole attack which...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Oct 2013

    Jamming Attacks in Wireless Networks

    The commodity of the medium in wireless networks makes it easy for an adversary to launch a Wireless Denial of Service (WDoS) attack. A jammer can continually transmit a radio signal in order to block any access to the medium by legitimate wireless nodes. Jamming techniques can vary, from simple...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Sep 2013

    Multi-Criteria Approach to Select Service Providers in Collaborative/Competitive Multi-provider Environments

    This paper implements and evaluates a multi-criteria approach to select appropriate service providers in a large scale multi-provider environment. This approach uses the Analytic Hierarchy Process (AHP) method in a Peer-To-Peer Service Overlay Network (P2P SON) composed of several service providers in order to select the most suitable one to...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Sep 2013

    Securing Distributed Control of Software Defined Networks

    Software Defined Networking (SDN) is an emerging topic that tracts attention due to its paradigm, that splits the control plane form data forwarding plane. According to which, the control plane is realized as the network operating system, which is responsible for controlling maintaining the state of the whole network. And...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Sep 2013

    Optimization and Security of Continuous Anonymizing Data Stream

    The characteristic of data stream is that it has a huge size and its data change continually, which needs to be responded quickly, since the times of query is limited. The continuous query and data stream approximate query model are introduced in this paper. Then, the query optimization of data...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Sep 2013

    Online Intrusion Alert Aggregation with Generative Data Stream Modeling

    Alert aggregation is an important subtask of intrusion detection. The goal is to identify and to cluster different alerts - produced by low-level intrusion detection systems, firewalls, etc. - belonging to a specific attack instance which has been initiated by an attacker at a certain point in time. Thus, meta-alerts...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Sep 2013

    Hardware and Software Design for Automotive Security

    Now-a-days security is a major area of concern. Embedded systems are used in every automotive systems. So, attack from outside network, inside networks, bugs, hacking these are common and major concerns for an automotive security. This paper aims at providing hardware and software solution for security in automotive applications. In...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Sep 2013

    Comparative Analysis between Centralized and P2P System Traffic in Terms of Providing VoD Service to Cable Television Network Subscribers

    The choice between a P2P and a conventional centralized realization of VoD service on cable television network can be made after a comparison of the traffic in different sections of the network. Until recently, the centralized architecture has been the most popular architecture for providing VoD service to subscribers of...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2013

    Providing Security using Hash Algorithm for Chanel Aware Routing in MANET'S

    A Mobile Ad-hoc NETwork (MANET) is a collection of autonomous nodes or terminals which communicate with each other by forming a multi-hop radio network and maintaining connectivity in a decentralized manner. Nodes in ad-hoc networks play both the roles of routers and terminals. Moreover, the routing path in ad-hoc networks...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2013

    Effect of Selfish Attack and Prevention Scheme on TCP and UDP in MANET

    Mobile ad-hoc networks are a collection of mobile hosts that communicate with each other without any infrastructure and centralized administration. Due to security vulnerabilities of the routing protocols, Mobile ad hoc networks may be unprotected against attacks by the malicious nodes. One of these attacks is the selfish attack against...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2013

    Efficient Data Transmission with Priority in Heterogeneous Networks

    In wireless networking domain, diverse wireless technologies are utilized for sharing data and providing data services. The protocols used in VANETs are DYMO and AODV+. Both of them can provide internet by communicating with Road Side Units (RSUs) which are static. This application has performed well, still leaving some challenges...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2013

    Secured Key Escort Services in Cloud Computing

    Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet and this brings forth many new challenges for data security and access control when users outsource sensitive data for sharing on cloud servers, which are not within the same...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2013

    Detection and Prevention of SQL Injection Attacks on Web Applications

    In this era where Internet has captured the world, level of security that this Internet provides has not grown as fast as the Internet application. Internet has eased the life of human in numerous ways, but defects such as intrusions that are attached with Internet applications keep on the growth...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2013

    Enhanced Beta Trust Model for Identifying Insider Attacks in Wireless Sensor Networks

    Wireless Sensor Networks (WSN) are more prone to insider and outsider attacks as the sensor nodes are deployed in open environment for collecting data. The traditional cryptography based security mechanisms such as authentication and authorization are able to sort out issues of outside attacker, but they are not effective against...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2013

    Security and Flexibility Contribution for Wireless Sensor Networks

    Wireless sensor networks are wireless mesh networks, consisting of multiple sensors. These sensors operate using batteries. They are limited in memory and computing capacity. Finally, they communicate by radio. Routing is a central problem in these networks. The authors consider here that the routing converges: i.e. there is a particular...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2013

    A Proposed Architecture of Cloud Computing based e-Learning System

    The wide use of ICT based e-technologies represents a great opportunity for underserved segments of the population, especially with the aim of reintegrating excluded individuals back into society through education. This is particularly true for people who may have difficulties while attending traditional on-site learning or traditional learning programs in...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2013

    User Authentication Mechanism for Sharing E-resource in Educational Clouds

    Cloud computing is a computing environment centre on clients and to access the programs or documents stored correspondingly in servers. In this paper, the authors have discussed mainly on cloud computing environment in educational system. The educational learning, utilizing e-resources can be done between two or more educational institutions with...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jul 2013

    Authentication System for Websites with Paid Content: An Overview of Security and Usability Issues

    Every company that delivers paid content online is faced with one essential challenge of protecting its content from illegal access and theft. As the number of users increases detecting and stopping intruders who illegally access a website becomes more and more difficult. While many research focus on security issues of...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jul 2013

    QoS Based Handover Technique for Network Based Network Mobility (N-NEMO)

    In Network based NEtwork MObility (N-NEMO), the automatic network selection during the mobility and handover scenarios are very challenging process. Most of the existing works concentrate only on selection of target network during handover execution. Also the user's Quality of Service (QoS) requirements are not taken into consideration. Approach: In...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2010

    Searching the Most Authoritative & Obscure Sources From the Web

    This paper discusses the ways to rank the website using authoritative and obscurity parameters. Website ranking algorithm is leveraging parameters with primary focus on Authoritativeness and relevancy. Additionally, obscurity parameters like Subscriber Counts from Google Reader, Authority Count from Technorati are analyzed to rank a source which is less visible...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2010

    Analysis of Different Steganographic Algorithms for Secured Data Hiding

    The goal of steganography is to avoid drawing suspicion to the transmission of a hidden message. If suspicion is raised, steganography may fail. The success of steganography depends on the secrecy of the action. If steganography is detected, the system will fail but data security depends on the robustness of...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2010

    Mining Software Repositories - A Comparative Analysis

    Despite of many Mining Software Repositories (MSR) tools in use, it is a relatively new research domain, which forms the basis of classifying various tools and comparing them. In this paper, the authors present a comparative analysis of different tools for MSR, based on some existing and new criteria proposed...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2010

    Topology Based Performance Analysis of IEEE 802.15.4 for Wireless Sensor Networks

    Wireless Local Area Networking standard (Wi-Fi) and the WPAN standard (Bluetooth and Zigbee) products utilize the same unlicensed 2.4 GHz ISM band. Co-existence between such wireless technologies within the same frequency spectrum is crucial to ensure that each wireless technology maintains and provides its desired performance requirements. Wireless Personal Area...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2010

    A Novel Method to Compress Still Images Using Golomb Code (GC) in JPEG2000

    JPEG2000 is a widely used standard image compression method. It makes use of EBCOT to compress the co-efficients of the Discrete Wavelet co-efficients. The JPEG2000's algorithm is based on Discrete Wavelet Transform (DWT) and the Embedded Block Coding with Optimal Truncation (EBCOT). Golomb codes, a code in which no codeword...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2010

    Design of Optimized Fuzzy Logic Controller for Area Minimisation and Its FPGA Implementation

    Area optimization is one of the important problems in reconfigurable systems. A Field-Programmable Gate Array (FPGA) based optimised Fuzzy Logic Controller (FLC) has been developed for speed control of DC Motor by exploiting the basic features of Fuzzy logic. The aim of the proposed scheme is to reduce the area,...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2010

    Content Based Medical Image Retrieval System Using Multiple Classifier Framework

    Content Based Image Retrieval (CBIR) is the set of techniques for searching of similar images from an image database using automatically extracted image features such as color, shape and texture. Feature extraction is the fundamental step in the CBIR systems. In the proposed multiple classifier method best discriminating features are...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2010

    Heterogeneous Density Based Spatial Clustering of Application With Noise

    The DBSCAN algorithm is a popular algorithm in Data Mining field as it has the ability to mine the noiseless arbitrary shape Clusters in an elegant way. As the original DBSCAN algorithm expand the Cluster based on the core object condition, it doesn't have the intelligence to mine the clusters...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Apr 2012

    Comparative Analysis of Bee-Ant Colony Optimized Routing (BACOR) With Existing Routing Protocols for Scalable Mobile Ad Hoc Networks (MANETs) Based on Pause Time

    In this paper based on swarm intelligence a new approach for an on demand ad-hoc routing algorithm is proposed. The foraging behavior of Ant colony optimization and Bee colony optimization, which are the subset of swarm intelligence and considering the ability of simple ants to solve complex problems by cooperation....

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Feb 2012

    Analytical Scenario of Software Testing Using Simplistic Cost Model

    Software can be tested either manually or automatically. The two approaches are complementary: automated testing can perform a huge number of tests in short time or period, whereas manual testing uses the knowledge of the testing engineer to target testing to the parts of the system that are assumed to...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Feb 2012

    Performance Evaluation of Dynamic Particle Swarm Optimization

    In this paper the concept of dynamic particle swarm optimization is introduced. The dynamic PSO is different from the existing PSO's and some local version of PSO in terms of swarm size and topology. Experiment conducted for benchmark functions of single objective optimization problem, which shows the better performance rather...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Feb 2012

    High Performance Efficiency of Distributed Optical Fiber Raman Amplifiers for Different Pumping Configurations in Different Fiber Cable Schemes

    Fiber Raman Amplifiers (FRAs) are attractive for Ultra Wide Dense Wavelength Division Multiplexing (UW-DWDM) transmission systems due to their advantages of broad amplification bandwidth and flexible central wavelength. With recent developments of optical pump sources with high power near 1.4 ?m wavelength and highly nonlinear fiber having a peak effective...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Feb 2012

    Modified Small Business Network Security

    This paper covers some likely threats and effective steps for a secure small business. It also involves a flowchart to comprehend the overall small business network security easily and the authors identify a set of security issues and apply appropriate techniques to satisfy the corresponding security requirements. In respect of...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Apr 2012

    High-Speed Multiplier Design Using Multi-Operand Multipliers

    Multiplication is one of the major bottlenecks in most digital computing and signal processing systems, which depends on the word size to be executed. This paper presents three deferent designs for three-operand 4-bit multiplier for positive integer multiplication, and compares them in regard to timing, dynamic power, and area with...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Apr 2012

    A Novel Authenticity of an Image Using Visual Cryptography

    A digital signature is an important public-key primitive that performs the function of conventional handwritten signatures for entity authentication, data integrity, and non-repudiation, especially within the electronic commerce environment. Currently, most conventional digital signature schemes are based on mathematical hard problems. These mathematical algorithms require computers to perform the heavy...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jun 2012

    3-Layer Security Using Face Recognition Layer Recognition in Cloud

    In cloud computing databases are the centralized large data centers, where the management of the data and services may not be fully trust worthy which is provided by large amount of computing and storage to customers provisioned as a service over the internet. Due lack of proper security and weakness...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jun 2012

    GPS Integrategps Integrated Navigation System

    The project is an application to facilitate the car drivers with some artificial intelligence and other helping features/guidance. This will be used or implemented in the near future by various car companies. So, the authors' project is mainly a navigation system for car drivers along with a map of the...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jun 2012

    RFID Based Bill Generation and Payment Through Mobile

    Emerging electronic commerce becomes popular together with the considerable increase of mobile device. Since mobile payments will become one of the most important mobile services. Here the authors are generating a bill in Super market and billing it through mobile. The most important consideration is the security of the mobile...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jun 2012

    Reliability Oriented Transporreliability Transport Protocol in WSN

    Wireless sensor network is a special form of wireless networks dedicated to surveillance and monitoring applications Reliability in wireless sensor network is application specific. The specific form of reliability might change from application to application. The authors' idea is to generate reliability based transport protocol that is customizable to meet...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jun 2012

    Detecting Sinking Behavior at MAC and Network Layer Using SVM in Wireless Ad hoc Networks

    Wireless Ad hoc networks present more security problems than the conventional wired and wireless networks because of the nature of dynamically changing and a fully decentralized topology. As the Ad hoc network lacks infrastructure the nodes have to cooperate for services like routing and data forwarding. This paper proposes a...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jul 2012

    A Design of Cloud Privacy Manager Algorithm

    Cloud Computing is a evolving Technology and new paradigm. The objective of this paper is to introduce the privacy concerns, related to cloud computing that will likely be the focus of discussion. In this paper, the authors discuss the privacy in cloud computing, its enhancement technologies to provide control of...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jul 2012

    A Novel Digital Watermark Based on Wavelet Coefficients Comparison

    Watermark technology is one of the most promising and effective ways for copyright protection of digital media and safe transmission of digital information. In the proposed method, the watermark is embedded in the components of medium frequency on the horizontal and vertical direction based on the wavelet coefficients comparison, and...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jul 2012

    CBH-MAC Protocol for Multihop QoS in Wireless Sensor Networks

    This paper proposes an efficient hybrid MAC for multi-hop QoS protocol in Wireless Sensor Networks for delay sensitive data traffic. The authors present Contention Based Hybrid MAC (CBH-MAC) protocol for both chain and cross topology, which reduces end-to-end delay, energy efficiency and maximizes the packet delivery ratio by minimizing the...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jul 2012

    An Approach to Image Compression With Partial Encryption Without Sharing the Secret Key

    Existing methods when employ compression there is no consideration of security, similarly when it describe encryption there is no consideration of size i.e. compression. In this paper a simultaneous image compression and encryption scheme is discussed. The order of the two processes viz. compression and encryption is EC, i.e., image...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jun 2012

    A Requirements Elicitation and Analysis Aided by Text Mining

    In Requirements Engineering the initial activities of elicitation and analysis are essential for software development. Achieving these requirements (and describing then in natural language), together with simple and rapid modeling (with enough degree of formality) are basic needs that influence the remaining stages of software development. In this paper, the...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jun 2012

    Intelligent Crawling on Open Web for Business Prospects

    Dynamic nature of web based systems requires continuous system updating. Information retrieval depends upon crawlers that crawl the web exhaustively, but business corporate expect from their crawlers to retrieve the specific information as per their applications. Crawlers help to download the required information using hyperlinks that occur in Web pages...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Apr 2011

    Online Loss Differentiation Algorithm With One-Way Delay for TCP Performance Enhancement

    In this paper for the performance enhancement of TCP protocol in the mixed wired/wireless network, packet loss differentiation algorithm is proposed which distinguishes the nature of losses and decides congestion control action accordingly. TCP protocol takes packet loss as an indication of network congestion so that it reduces its congestion...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2012

    Network Based Security Model Using Symmetric Key Cryptography (AES 256 - Rijndael Algorithm) With Public Key Exchange Protocol (Diffie-Hellman Key Exchange Protocol)

    The main aim of this paper is to strengthen secured communication over the network by enhancing the strength of the AES algorithm with Diffie-Hellman key exchange Protocol. The Rijndael is a block cipher with variable block and key size is believed to provide much more security. The Rijndael with 128...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2012

    Camouflage in Malware: From Encryption to Metamorphism

    Camouflage of malware is a serious challenge for antivirus experts and code analysts. Malware use various techniques to camouflage them to not be easily visible and make their lifetime as longer as possible. Although, camouflage approaches cannot fully stop the analyzing and fighting against the malware, but it make the...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2012

    Secured Public Key Authentication and Energy Efficient MAC Implementation in Wireless Sensor Networks

    As Wireless Sensor Networks (WSNs) are susceptible to attacks and sensor nodes have limited resources, designing a secure and efficient user authentication protocol for WSNs is a difficult task. Considering that most future large-scale WSNs follow a two-tiered architecture, the authors propose an efficient and Denial-of-Service resistant user authentication scheme...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jun 2012

    Robust Watermarking Technique Based on DCT to Protect the Ownership of DubaiSat-1 Images Against Attacks

    Now-a-days, with the rapid growth of technologies and the prevalence of network communication, new challenges raises to protect the multimedia data transmission on the World Wide Web (internet). Data security is one of the main important needs these days, especially in the field of remote sensing. Emirates Institutions for Advanced...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // May 2012

    A Reliable Data Aggregation Forwarding Protocol for Wireless Sensor Networks

    Extensive research has been done on reliable data forwarding in sensor networks. Existing protocols provide reliability at the cost of high energy consumption. In Wireless Sensor Networks (WSN), data aggregation is essentially used to gather and aggregate data in an energy efficient manner so that network lifetime is enhanced. Power...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // May 2012

    Face Recognition in Compressed Domain by Applying Canonical Correlation Analysis Based Feature Vector Optimization and Neural Network Matching

    This paper presents an efficient approach for performing face recognition in compressed domain by applying Canonical Correlation Analysis based feature vector optimization. CCA is a dominant method for multivariate analysis and therefore a powerful method of feature projection based on CCA is proposed for compressed facial images. A major advantage...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // May 2012

    Way to Improve Design Traffic in Distributed Systems

    The performance of a mobile network is considered in the context of the given parameters QoS (Quality of Service). A method of organizing a distributed control system based on agent-based technology. Based on the principles of technology overlay set of agents together in a distributed system of traffic engineering Modern...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jul 2012

    A Secure Routing Cryptography Algorithm in Mobile Ad Hoc Network

    Mobile Ad hoc NETworks (MANET) infrastructure less network and no existence between connection nodes. Nodes forward data on behalf of each other in mobile ad hoc networks. In mobile ad hoc networks eavesdropper can easy to capture and analyze and data communication. To attention at very protocol design about secure...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jul 2012

    Agile Process: An Enhancement to the Process of Software Development

    In last decade, various agile methods have been introduced and used by software industry. It has been observed that many practitioners are using hybrid of agile methods and traditional methods. Agile was created in large part in reaction to the predominant waterfall model, and to a lesser extent to all...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jul 2012

    Signaling Cost Analysis of Mobility Management Entities for SIGMA

    To facilitate mobile computing, mobility protocols have been proposed and mobility management involves signaling costs. Widespread use of IP-enabled mobile devices have resulted in increase in number of mobile users in the network and the signaling cost on underlying mobility entities have increased significantly, which will result in performance degradation...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jul 2012

    Cloud QoS, High Availability & Service Security Issues With Solutions

    Cloud Computing is a most recent and hottest buzzword nowadays, emerges as a key service of the Utility or on demand computing which builds on decade of research in the ground of computer networking, World Wide Web and software services. It put forwards a service oriented architecture, reduced information technology...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jul 2012

    Comparative Study on Main and Sub-Code Reusabilities

    Most of the coding and reused coding of south Indian IT companies is based on Object Oriented Programming environment (OOP). In OOPs, it is possible to use certain code again for different modules through inheritance. While calling class member function in objects of a particular class, interface and dependency related...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jul 2012

    Surfacing Deep Web Behind Scripting Languages

    This paper discusses the crawler can't crawl everything from open web as few of content which is hidden in websites in different forms like file formats (PDF, Flash, Office files, streaming media) or Dynamically generated pages (cgi, JavaScript, asp, or most pages with "?" in URL). And this is very...

    Provided By International Journal of Computer Science and Network Security