International Journal of Computer Science and Network Security

Displaying 1-40 of 436 results

  • White Papers // Feb 2015

    Highly Efficient Kerberos Style Authentication and Authorization for Cloud Computing

    Cloud computing is an emerging, on-demand and internet based technology used by global customers to improve their business performance. Cloud is highly scalable, flexible and platform in dependable which has security loopholes like attacks, data loss, other authentication and security issues. This paper presents Kerberos system which achieves security goals...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Feb 2015

    An Efficient Location and Detection (ELD) based Mobile ad-hoc Networks Implementation with Embedded Systems

    A Mobile Ad-hoc NETwork (MANET) is a temporary wireless network composed of mobile nodes, in which an infrastructure is absent. If two mobile nodes are within each other's transmission range, they can communicate with each other directly; otherwise, the nodes in between have to forward the packets for them. Several...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jan 2015

    Fixed Wings UAV Direction Control "Hardware Design"

    The goal is to design of Unmanned Aerial Vehicle "UAV" system through the control of a stable fixed-wing aircraft to accomplish inexpensive, simple, and still efficient aircrafts by adding an inertial circuitry to the airplane that consists of a GPS (Global Positioning System) unit, a microcontroller unit and other devices....

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jan 2015

    Resource Allocation Avoiding SLA Violations in Cloud Framework for SaaS

    "Cloud computing has been proved as a boon to distributed computing over a network, having ability to run a program on many connected computing at a same time. It is network based service provided by real server hardware, in fact served by virtual network. It is essential for using any...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jan 2015

    Dynamic Resource Allocation Using Skewness Algorithm in Cloud Computing

    "Cloud computing is the latest technology used by many organizations in this competitive world. As many organizations are using cloud computing technology, the major issue is resource allocation as pay-per-use on demand basis. In cloud environments, efficient resource provisioning and management is a challenging issue because of the dynamic nature...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jan 2015

    Role of Threshold Cryptography in Securing MANETs

    "Distributed environments are becoming more popular as these technologies such as mobile and ad hoc networks, aim to enable large scale cooperation for resource sharing framework. Secure authentication is the challenging issue for such environments. The authors studied the role of threshold cryptography in securing the MANETs, revealing the authorization...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jan 2015

    Modified Self-Selection Routing Algorithm for Wireless Sensor Networks

    "Wireless sensor networks have been the source of increasing interest for researchers because they gather information from multiple sources at the same time. This technology allows small sensors to be distributed across a geographical region to collect data, which is sent to a main server via a routing algorithm to...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Dec 2014

    Metaheuristic Approaches for Gateway Placement Optimization in Wireless Mesh Networks: A Survey

    Recently, Wireless Mesh Networks (WMNs) have gained significant roles in communication technologies and have been used in many applications with high sensitivity to packet loss, delay and transmission time. Therefore, many researchers paid their attention for solving WMNs related issues. The WMN consists of Mesh Routers (MRs) and Mesh Clients...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Dec 2014

    Intrusion Feature Selection Algorithm Based on Particle Swarm Optimization

    "High-dimensional intrusion detection data concentration information redundancy results in lower processing velocity of intrusion detection algorithm. Accordingly, the current study proposes an intrusion feature selection algorithm based on Particle Swarm Optimization (PSO). Analyzing the features of the relevance between network intrusion data allows the PSO algorithm to optimally search in...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Nov 2014

    Functional Validation of Inter Processor Communication through Dynamic Analysis

    The major role of Inter Processor Communication (IPC) driver is to transfer data between an application processor and a communication processor. In order to sustain a stabilized performance of the upper framework of radio interface layer and telephony application, the driver should be thoroughly examined. In traditional method, however, the...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Nov 2014

    Video Quality Challenges in Wireless Networks

    Wireless support is now available in most devices. Streaming video over networks is a big challenge that faced by most companies working in technology development. Giving the best quality and high throughput performance is an ongoing issue. The quality depends on many factors likes bound rates and stringency of the...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Nov 2014

    Intrusion Detection and Prevention Systems (IDPS) and Security Issues

    With computer systems increasingly under attack, information security is more serious in user views. Security protects computer and everything associated with it including networks, terminals, printers, cabling, and disks and most important, it protects the available information in this environment. Technical solutions, introduced by policies and implantations are essential requirements...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Nov 2014

    A Study of Electronic Ticket Verification Methods

    Information and Communication Technologies (ICT) and Electronic Commerce (EC) are flourishing dramatically. Furthermore, using electronic ticket is possible to reduce the costs of ticket management for companies and users. The business organizations have been restlessly evaluating the revenue potential of the electronic tickets market and exploit the profit potential of...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Nov 2014

    Securing the Payment Card Data on Cloud Environment: Issues & Perspectives

    Cloud computing is a new IT model that, just like electricity and water, which were firstly generated at home and evolved to be supplied from utility providers, aims to transform computing resources sharing into an utility. This enables startups and other companies to start computing services without having to invest...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Nov 2014

    A Novel Aggregations Approach for Preparing Datasets

    Data mining plays an important role in real-time applications for extracting business intelligence from business data and make expert decisions. Datasets are used in order to mine data for the purpose of discovering knowledge from data. However, preparing datasets manually is a tedious task. The reason behind it is that...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Oct 2014

    Improving The Performance of Adhoc Network Using Hybrid Method

    Infrastructured network consists of fixed base stations while communications take place using technique handoff. It connects with new base station and start communication when mobile goes out of range of one base station. Advantages over ad-hoc networks are efficiently utilized network resources and single-hop routes, results in: lower delay and...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Oct 2014

    IPv6 : Threats Posed by Multicast Packets, Extension Headers and Their Counter Measures

    Security issues concerning the spreading Internet Protocol version 6 (IPv6) is one of the major issues in the world of networking today. Since it is not the default network protocol deployed now-a-days (but systems are migrating slowly from ipv4 to ipv6) there are no best practices from the point of...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Oct 2014

    Secured Routing through Multi Stage Authentication in MANETs

    Mobile Ad hoc NETworks (MANETs) are characterized by the absence of fixed infrastructure, rapid topology change and high node mobility. These characteristics determine that wireless ad hoc network is more vulnerable to malicious attacks than the traditional Internet. Among many malicious attacks, a novel method is proposed to eliminate black...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Sep 2014

    An On-Chip Delay Measurement Technique for Small-Delay Defect Detection Using Signature Registers

    In this paper, the authors present a delay measurement technique using signature analysis and a scan design for the proposed delay measurement technique to detect small-delay defects. The proposed measurement technique measures the delay of the explicitly sensitized paths with the resolution of the on-chip variable clock generator. The proposed...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Sep 2014

    Margin Adaptive Power Allocation Using Channel State Information in OFDMA Systems

    In this paper, the authors present the margin adaptive resource allocation using full CSIT (Channel State InformaTion) and statistical CSIT in OFDMA systems. In the past, Monte-Carlo snap-shots in the MA problem is far too complex, an analytical expression of the outage capacity as a function of the Signal-to-Noise Ratio...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Sep 2014

    New Trends in Intrusion Awareness System Based on SVM Classification

    Network intrusion awareness is important factor for risk analysis of network security. In the current decade various method and framework are available for intrusion detection and security awareness. Some method based on knowledge discovery process and some framework based on neural network. These entire model take rule based decision for...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Sep 2014

    A Survey of Clustering Uncertain Data Based Probability Distribution Similarity

    Clustering is one of the major tasks in the field of data mining. The main aim of the clustering is grouping the data or similar objects into one group based on their data find the similarity between the objects. Clustering of uncertain data have been becoming the major issues in...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Sep 2014

    Password Authentication with Secured Login Interface at Application Layer

    In this paper, the authors present an innovative solution to the old problem of password security at application layer or input level. In their solution, each of the various lower case & upper case characters, special characters, digits from which a password could be comprised is encoded with a random...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Sep 2014

    Data Integrity Mechanism Using Hashing Verification

    In this paper, the authors propose a new one-way hash algorithm, which is also obtains better efficiency and security, compared with a particular conventional hash algorithm, hash algorithm can be used to determine if two values are equal, a hash function maps keys to small values. DILH algorithm using linear...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Sep 2014

    Mobility Prediction Algorithm to Improve the Routing Performance in MANET

    One of the major challenges in Mobile Ad hoc NETworks (MANETs) is link failure due to mobility. If the degree of mobility of any node in any route increases, the route lifetime decreases. That causes frequent link failures, and results more packet loss and low throughput. Packet loss requires packet...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Sep 2014

    Prevention of Selective Jamming Attacks by Using Packet Hiding Methods

    The open nature of the wireless medium leaves it too weak to intentional interference attacks, typically defined as jamming. This intentional interference with wireless transmissions can be used as a launch pad for mounting denial-of-service attacks on wireless networks. Typically, jamming has been introduced under an external threat model. However,...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Sep 2014

    Algorithms for Data-Compression in Wireless Computing Systems

    Data Compression can be defined as encoding the information using the small number of bits rather than original representation. There are two types of data compression, lossless and lossy compression. Compression is a technique used for reducing data size by manipulating data redundancy; so that the packet transmission time and...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2014

    A Novel Approach in Classification by Evolutionary Neural Networks

    Artificial neural network is an interconnected group of natural or artificial neurons that uses a mathematical or computational model for information processing based on a connectionist approach to computation. Neural network optimization based on three basic parameters topology, weights and the learning rate. The overfitting is a problem in NN...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2014

    Haptic Science and Technology

    Haptic technology, or haptics, is a tactile feedback technology which takes advantage of a user's sense of touch by applying forces, vibrations, and/or motions upon the user. This mechanical stimulation may be used to assist in the creation of virtual objects (objects existing only in a computer simulation), for control...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2014

    A Clustering Compression Method for 3D Human Motion Capture Data

    Human motion capturing has become an important tool in fields such as sports sciences, biometrics, and particularly in computer animation, where large collections of motion material are accumulated in the production process. Efficient storage, retrieval and transmission methods are needed to fully exploit motion databases for reuse and for the...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2014

    Extracting Summary from Documents using K-mean Clustering Algorithm

    Extracting summary from the documents is a difficult task for human beings. Therefore to generate summary automatically has to facilitate several challenges; as the system automates it can only extract the required information from the original document. This reduces the work to compress the original document and extract only essential...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2014

    Security Analysis in Open Source Linux Network

    Simple way Linux is an operating system. It is the usage of software on a computer that enables applications and the computer operator to access the devices on the computer to perform desired function. Linux operating system is very similar to other operating systems such as windows and OS X....

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2014

    Graphical Secure Password Method Against Online Password Hackers(Guessing Attacks)

    Passwords are a common form of authentication and are often the only barrier between a user and their personal information. There are several programs attackers can use to help guess or \"Crack\" passwords, but by choosing good passwords and keeping them confidential, the user can make it more difficult for...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2014

    Comparative Analysis of Performance of 3G Networks Over TCP Protocols

    Third Generation (3G) systems develop faster communications services, including voice, fax and Internet, anytime and anywhere with seamless global roaming global standard for 3G has opened the way to enabling innovative applications and services multimedia entertainment, infotainment and location-based services, among other. 3G networks are getting day-by-day popular and they...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2014

    Performance Analysis of Classifiers for Intrusive Data and Rough Sets Reducts

    The fast change in the day-to-day activity need to analyze the intrusive data very accurately without losing performance. Intrusive behavior is critical for analyzing the data and performance is crucial in the computational environment, when the user requires accuracy in the results. Finding intrusive behavior in the network with accuracy...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2014

    Energy Efficient Mobile Replica Detection in Wireless Sensor Network Based on Modified Sequential Probability Ratio Test

    In wireless sensor network, an attacker can capture sensor nodes and can compromise sensor nodes. Then would create duplicate nodes and built up various attacks using duplicate nodes, inserts into the network. This is happened because of unattended nature of wireless sensor network. These attacks helps attacker to control few...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2014

    Application of Compound Chaotic Mapping in Voice Encryption Algorithm

    Using the devaney chaos theory, designed a compound chaotic mapping as the encryption function, and had proven that the track was non-periodic for the initial value of a finite decimal. The authors have designed an encryption algorithm successively according to this, and realized the encryption for sound documents. Afterward the...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2014

    Using Unitary Matrices in High-Speed Video Encryption

    Encryption computational complexity and encryption speed are two important aspects of video encryption algorithms. Due to its increasingly large size, video images present a great challenge to currently available cryptographic algorithms; the processes of encryption and decryption of video images are so computationally intensive that they introduce delays beyond acceptable...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2014

    Energy Efficient Power Aware Multipath Dynamic Source Routing

    The versatile uses of Mobile Ad hoc NETworks (MANETs) have elicited everyone's attention and offer a lot of challenges to the researchers. Due to absence of central coordinators in ad hoc networks all the necessary actions are played by the individual node. Nodes major responsibility is routing and many routing...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2014

    Multi-Parameter Summarization for Software Architecture Recovery

    Software architecture is identified as an important element in the successful development and evolution of software systems. In spite of the significant role of architecture representation and modeling, many existing software systems like legacy or eroded ones do not have a consistent architecture representation. There have been several algorithms on...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Sep 2009

    MANET Security Issues

    When a routing protocol for manet Networks (mobile and ad hoc networks) does a route discovery, it does not discover the shortest route but the route through which the route request flood traveled faster. In addition, since nodes are moving, a route that was the shortest one at discovery time...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Sep 2009

    The Architectural Review of Web Security in Static and Dynamic Analysis

    Its objective in web security is to move black box to white box in enterprise practices. This paper explains how approaches achieve the goal in terms of static and dynamic analysis. To better explain the framework and roadmap of analysis work, it describes approaches by using macro and micro views...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Sep 2009

    Modeling Autonomous Mobile System With an Agent Oriented Approach

    This paper focuses on the design of control architecture, via Internet, of a mobile system. The remote control extends the sensorimotor capacities and the possibilities of actions of a human being in a distant place. The Internet network (network without Quality of Service) limits the quantity of information that can...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Nov 2009

    Pattern Recognition Techniques Applied to Evaluation Engineering Problem

    The purpose of this paper is to present a Pattern Recognition methodology composed by Multivariate Statistical Analysis techniques, in order to build a Multiple Linear Regression statistical model to evaluate real estates according to their characteristics (variables, attributes). First, a Clustering Analysis was applied to the data of each urban...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jan 2010

    Framework to Represent the Software Design Elements in Markup Text - Design Markup Language (DGML)

    The software design document bridges the requirement phase activity with the implementation phase activity. Design elements are having pictorial information about the possible solution for requirements. Software modules are written from these documents. If the paper can represent these design elements in well-defined text format, many experiments are possible on...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Feb 2010

    Automation of Data Warehouse, Extraction, Transformation and Loading Update Cycle

    Businesses today are largely dependent on access to right information at the right time. With vast amounts of data being processed on a minute to minute basis, it is of vital importance that managers and decision makers have access to the latest updates in their information database at all point...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Feb 2010

    An Object Oriented Modeling and Implementation of Web Based ETL Process

    The data warehousing environment includes components that are inherently technical in nature. These cleansing components function to extract, clean, model, transform, transfer and load data from multiple operational systems into a single coherent data model hosted within the data warehouse. The analytical environment is the domain of the business users...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // May 2010

    Policy Based Decentralized Group Key Security for Mobile Ad-Hoc Networks

    The unique characteristics and constraints of MANET have made the traditional approach to security inadequate. With this view in mind decentralized group key management is taken into consideration. A novel structure of the node is proposed and each entity holds a secret share SSi of each node in cluster is...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jan 2010

    Evolving a New Model (SDLC Model-2010) for Software Development Life Cycle (SDLC)

    Structured project management techniques (such as an SDLC) enhance management's control over projects by dividing complex tasks into manageable sections. A Software Development Life Cycle model (SDLC) is either a descriptive or prescriptive characterization of how software is or should be developed. But, none of the SDLC models discuss the...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jun 2011

    Modelling and Non Linear Control of a Photovoltaic System With Storage Batteries: A Bond Graph Approach

    This paper presents a bond graph modelling of a PhotoVoltaic source (PV). The insolation variation during the day poses the problem of energy storage. For that, the authors used electrochemical batteries which present the best solution by their good adaptation to photovoltaic source. A Maximum Power Point Tracking (MPPT) device...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Dec 2011

    Routers Packet Classification Using Configuration Machine

    The packet classification is the vital part mechanism that leads to create many networking services in the internet such as firewall packet filtering and traffic accounting. So, the packet classification is in need which enables many networking services in the network. There are two types support such as hardware and...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Dec 2011

    New Family of Algebraically Designed Zero Cross-Correlation Codes for Use in CDMA Fibre-Optic Networks

    In this paper, the authors present a new technique for constructing Zero Cross-correlation Codes (ZCC). The proposed technique can be adapted to any weight and any number of users with minimum code length. Many techniques have been proposed for constructing Zero Cross-correlation Codes (ZCC), among the popular ones are detailed...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Dec 2011

    A Novel Generic Session Based Bit Level Cryptographic Technique to Enhance Information Security

    A session based symmetric key cryptographic system has been proposed in this paper and it is termed as Bit Orientation Technique (BOT). This technique is more fast, suitable and secure for encryption of large files. BOT consider the plain text (i.e., the input file) as binary string with finite no....

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Dec 2011

    A New Reconfigurable Hardware Architecture for Cryptography Applications Using AES by Different Substitution Box (S-Box) and Random Round Selection

    This paper proposes a high performance AES architecture with MUX based Substitution Box (S-Box) and random round selection. The byte substitution is an important part of the Advanced Encryption Standard (AES) and it is implemented using Field Programmable Gate Array (FPGA). The objective of this paper is to present an...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Dec 2011

    A Framework for Multimedia Data Hiding (Security)

    With the proliferation of multimedia data such as images, audio, and video, robust digital watermarking and data hiding techniques are needed for copyright protection, copy control, annotation, and authentication. While many techniques have been proposed for digital color and grayscale images, not all of them can be directly applied to...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Dec 2011

    A New Class of Traceability Schemes for Protecting Digital Content Against Illegal Re-Distribution

    Traceability schemes are used to protect the rights of intellectual-property owners against illegal re-distribution. In order to trace a pirate copy back to a user who has been involved in making and re-distributing the pirate copy, a traceability scheme requires a code which contains a sufficient number of codewords and...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Apr 2012

    Comparative Analysis of Bee-Ant Colony Optimized Routing (BACOR) With Existing Routing Protocols for Scalable Mobile Ad Hoc Networks (MANETs) Based on Pause Time

    In this paper based on swarm intelligence a new approach for an on demand ad-hoc routing algorithm is proposed. The foraging behavior of Ant colony optimization and Bee colony optimization, which are the subset of swarm intelligence and considering the ability of simple ants to solve complex problems by cooperation....

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jul 2012

    A Secure Routing Cryptography Algorithm in Mobile Ad Hoc Network

    Mobile Ad hoc NETworks (MANET) infrastructure less network and no existence between connection nodes. Nodes forward data on behalf of each other in mobile ad hoc networks. In mobile ad hoc networks eavesdropper can easy to capture and analyze and data communication. To attention at very protocol design about secure...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jul 2012

    Agile Process: An Enhancement to the Process of Software Development

    In last decade, various agile methods have been introduced and used by software industry. It has been observed that many practitioners are using hybrid of agile methods and traditional methods. Agile was created in large part in reaction to the predominant waterfall model, and to a lesser extent to all...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jul 2012

    Signaling Cost Analysis of Mobility Management Entities for SIGMA

    To facilitate mobile computing, mobility protocols have been proposed and mobility management involves signaling costs. Widespread use of IP-enabled mobile devices have resulted in increase in number of mobile users in the network and the signaling cost on underlying mobility entities have increased significantly, which will result in performance degradation...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jul 2012

    Cloud QoS, High Availability & Service Security Issues With Solutions

    Cloud Computing is a most recent and hottest buzzword nowadays, emerges as a key service of the Utility or on demand computing which builds on decade of research in the ground of computer networking, World Wide Web and software services. It put forwards a service oriented architecture, reduced information technology...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jul 2012

    Comparative Study on Main and Sub-Code Reusabilities

    Most of the coding and reused coding of south Indian IT companies is based on Object Oriented Programming environment (OOP). In OOPs, it is possible to use certain code again for different modules through inheritance. While calling class member function in objects of a particular class, interface and dependency related...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jul 2012

    Surfacing Deep Web Behind Scripting Languages

    This paper discusses the crawler can't crawl everything from open web as few of content which is hidden in websites in different forms like file formats (PDF, Flash, Office files, streaming media) or Dynamically generated pages (cgi, JavaScript, asp, or most pages with "?" in URL). And this is very...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jul 2012

    A Design of Cloud Privacy Manager Algorithm

    Cloud Computing is a evolving Technology and new paradigm. The objective of this paper is to introduce the privacy concerns, related to cloud computing that will likely be the focus of discussion. In this paper, the authors discuss the privacy in cloud computing, its enhancement technologies to provide control of...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jul 2012

    A Novel Digital Watermark Based on Wavelet Coefficients Comparison

    Watermark technology is one of the most promising and effective ways for copyright protection of digital media and safe transmission of digital information. In the proposed method, the watermark is embedded in the components of medium frequency on the horizontal and vertical direction based on the wavelet coefficients comparison, and...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jul 2012

    CBH-MAC Protocol for Multihop QoS in Wireless Sensor Networks

    This paper proposes an efficient hybrid MAC for multi-hop QoS protocol in Wireless Sensor Networks for delay sensitive data traffic. The authors present Contention Based Hybrid MAC (CBH-MAC) protocol for both chain and cross topology, which reduces end-to-end delay, energy efficiency and maximizes the packet delivery ratio by minimizing the...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jul 2012

    An Approach to Image Compression With Partial Encryption Without Sharing the Secret Key

    Existing methods when employ compression there is no consideration of security, similarly when it describe encryption there is no consideration of size i.e. compression. In this paper a simultaneous image compression and encryption scheme is discussed. The order of the two processes viz. compression and encryption is EC, i.e., image...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jun 2012

    A Requirements Elicitation and Analysis Aided by Text Mining

    In Requirements Engineering the initial activities of elicitation and analysis are essential for software development. Achieving these requirements (and describing then in natural language), together with simple and rapid modeling (with enough degree of formality) are basic needs that influence the remaining stages of software development. In this paper, the...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jun 2012

    Intelligent Crawling on Open Web for Business Prospects

    Dynamic nature of web based systems requires continuous system updating. Information retrieval depends upon crawlers that crawl the web exhaustively, but business corporate expect from their crawlers to retrieve the specific information as per their applications. Crawlers help to download the required information using hyperlinks that occur in Web pages...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2012

    Implementation of the Remote Control and Management System in the Windows O.S

    In this paper, the authors implemented the remote management system on the Windows Operating System. Remote management system in the Windows operating system was designed for the client and server function. A client function has the ability to allow the system to access from the server. This feature is responsible...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2012

    Towards Standardization and Interoperability of Database Backups

    The current business model of modern companies is increasingly dependent on information technology. Thus, it is necessary to keep security copies of the data (backup) which may be used to restore them after a data loss event. On the other hand, this dependence encourages strong competition among suppliers and this...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2012

    A Novel PSO-Based Algorithm for the Optimal Location of Controllers in Wireless Networks

    The optimal location of controllers in wireless networks is an important problem in the process of designing cellular mobile networks. In this paper, the authors present a novel algorithm based on Particle Swarm Optimization (PSO) for solving it. Their objective function is determined by the total distance based on finding...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2012

    A Study on Effective Proactive Service in Pervasive Computing Environment

    Pervasive systems are becoming increasingly popular, with the appearance and penetration of mobile devices such as Smart phones. Proactive service is one of the most important fields of research in pervasive computing. The authors propose a method for an effective proactive service in pervasive computing environment. Most of previous researches...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2012

    A Frame Packing Mechanism Using PDO Communication Service Within CANopen

    The utilization of the CAN open-based network needs to be minimized in order to improve the communication performance such as worst-case response time of CAN open messages. To achieve this end, the messages should be packed together as many as possible so that the message frame overhead will be decreased....

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2012

    Developing a Web-Based GNH Survey Application and a Web Service for Identifying Missing Data Mechanism in Incomplete Survey Data

    This paper proposes a web-based GNH survey application, capable of identifying missing data mechanism which is crucial in effectively handling missing data in survey questionnaire. First, the authors have stated the rationale behind GNH survey briefly highlighting the concept and the birth of GNH. Second, they have described the present...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2012

    Viewpoints Diagram: Towards an Innovative Diagram in the UML Language

    This paper is to put forward a modeling of multi-view classes by making use of the Petri networks formalism. The object approach aims at modeling complex systems and allows to take into account the views of the different users of the system and their access rights. Thus, in the paper,...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2012

    Proposing a New Approach to Applying Pervasive Computing in Agriculture Environments

    The resource management in agriculture environments is very important. Using smart controls will be one of the most eminent ways of managing. These resources such as water and plant nutrition. In this paper researcher are going to present a special program in which provide necessary resources for growing plant by...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2012

    A Novel Approach for Keyboard Dynamics Authentication Based on Fusion of Stochastic Classifiers

    Computer security is one of most important issues around the world. Most computer systems are using passwords for their own authentication or verification mechanisms. A robust and efficacious approach for classification of 24 persons who their typing patterns were collected introduced. A Linear Discriminate Classifier (LDC), Quadratic Discriminant Classifier (QDC)...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Apr 2011

    Online Loss Differentiation Algorithm With One-Way Delay for TCP Performance Enhancement

    In this paper for the performance enhancement of TCP protocol in the mixed wired/wireless network, packet loss differentiation algorithm is proposed which distinguishes the nature of losses and decides congestion control action accordingly. TCP protocol takes packet loss as an indication of network congestion so that it reduces its congestion...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2012

    Network Based Security Model Using Symmetric Key Cryptography (AES 256 - Rijndael Algorithm) With Public Key Exchange Protocol (Diffie-Hellman Key Exchange Protocol)

    The main aim of this paper is to strengthen secured communication over the network by enhancing the strength of the AES algorithm with Diffie-Hellman key exchange Protocol. The Rijndael is a block cipher with variable block and key size is believed to provide much more security. The Rijndael with 128...

    Provided By International Journal of Computer Science and Network Security