International Journal of Computer Science and Network Security

Displaying 1-40 of 313 results

  • White Papers // Jul 2014

    The Proposed Design of the Monitoring System for Security Breaches of Buildings Based on Behavioral Tracking

    In this paper, the authors present a video security system that uses multiple static cameras to track several people in indoor and outdoor environments. This system has a set of cameras that coordinate the tracking tasks among the cameras. Since each object in the scene can be tracked by a...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jul 2014

    A Real-Time Rendering Method Based on Precomputed Hierarchical Levels of Detail in Huge Dataset

    Traditional preprocessing methods, such as discrete Levels Of Detail (LOD) or continuous LOD, are inapplicable to large dataset consists of huge amount of models. Division granularity of discrete LOD is coarse while continuous LOD is time-consuming. Real-time rendering is a challenging and open problem to solve. A real-time rendering method...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jul 2014

    A Collaborative Monitoring System Based on JXTA

    In order to reduce the burden of network management equipment, the network management function is distributed to each distributed object by integrating Peer-To-Peer (P2P) networking technology with network management technology. A collaborative monitoring system based on JXTA was designed here. The architecture and specific implementation were proposed. It emphasizes on...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jul 2014

    Packet Scheduling Mechanism for Multimedia Services to Guarantee QoS in 3GPP LTE System

    The packet scheduling mechanism is an important technical issue in the Long Term Evolution (LTE) system. Several packet scheduling mechanisms have been proposed to improve the Quality of Service (QoS) in the LTE wireless communication system. However, most of these mechanisms cannot satisfy various QoS requirements simultaneously. In this paper,...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jul 2014

    DDOS Attack Detection Based on an Ensemble of Neural Classifier

    In this paper, the authors review the detection of Distributed Denial of Service (DDoS) attack. This DDoS attacks could be detected using the existing machine learning techniques such as neural classifiers. These classifiers lack generalization capabilities which result in less performance leading to high false positives. This paper evaluates the...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jul 2014

    Comparison Study of Multiple Traveling Salesmen Problem Using Genetic Algorithm

    Multiple Traveling Salesman Problems (MTSPs) are a typical computationally complex combinatorial optimization problem, which is an extension of the famous Traveling Salesman Problem (TSP). The MTSP can be generalized to a wide variety of routing and scheduling problems. The paper makes the attempt to show how Genetic Algorithm (GA) can...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jul 2014

    Face Based Automatic Human Emotion Recognition

    In the field of image processing it is very interesting to recognize the human gesture for general life applications. For example, observing the gesture of a driver when person is driving and alerting the person when in sleepy mood will be quite useful. Human gestures can be identified by observing...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jul 2014

    Sparse Representation for Face Recognition

    In this paper, the authors provide a problem of automatically recognizing human faces from frontal views with various facial expressions, occlusion, illumination and pose. There are two underlying motivations for them to write this paper: the first is to provide an occlusion and various expressions of the existing face recognition...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jul 2014

    A New Efficient and Energy-Aware Clustering Algorithm for the OLSR Protocol

    Integrating Quality of Service (QoS) in a Mobile Ad-hoc NETwork (MANET) is a difficult challenge and a very tedious task. It requires finding a compromise between several QoS parameters. The energy criterion is one of the most important of these parameters that will provide a long lifetime for a given...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jun 2014

    Wireless Device Positioning and Finding Intruder Using RSS

    Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. The risks to users of wireless technology have increased as the service has become more popular. Wi-Fi can be less secure than wired connections (such as Ethernet) because an intruder does not need a physical...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jun 2014

    Network Synchronization Coding for Wireless Sensor Network Device

    Wireless sensor networks are emerging at faster rate in practical industrial applications. During the communication process the packets are transferred via wireless media. The precision of data transferred is dependent on the synchronization approach followed. However in case on wireless sensor network where the devices are located at different range,...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jun 2014

    Content-Based Image Retrieval System using Feed-Forward Backpropagation Neural Network

    Extensive digitization of images, paintings, diagrams and explosion of World Wide Web (www), has made traditional keyword based search for image, an inefficient method for retrieval of required image data. Content-Based Image Retrieval (CBIR) system retrieves the similar images from a large database for a given input query image. Today,...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jun 2014

    Android Malware : Study and Analysis for Privacy Leak in Ad-Hoc Network

    Smartphone's users has been increasing since last few years which provides numerous operations like accessing information through online mode, payment options, using utility applications, playing games. Smartphone's have become so powerful these days that tends to play the role of PC's. The basic operation of any mobile phone calling, storing...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jun 2014

    Ultimate Video Spreading With QOS Over Wireless Network Using Selective Repeat Algorithm

    Now-a-days the broad casting of video place's a major role in wireless network. If the user wants to broadcast a video it takes a time to transmit from source to destination, due to large size of video. In wireless network the packet must be lightweight, due to that it takes...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jun 2014

    Securing Cipher Information Using Edge Based Adaptive Pixel Pair Matching

    Securing the information from other persons is always difficult one when the users are connected in an open network. In order to send some confidential information the user must protect it from the attackers. Cryptography and steganography plays vital role in securing information from others. Cryptography is the art of...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jun 2014

    Automatic Discovery of Association Orders Between Name and Aliases From the Web Using Anchor Texts-Based Co-Occurrences

    Many celebrities and experts from various fields may have been referred by not only their personal names but also by their aliases on web. Aliases are very important in information retrieval to retrieve complete information about a personal name from the web, as some of the web pages of the...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jun 2014

    Performance Enhancement of Cloud Computing using Clustering

    Cloud computing is an emerging infrastructure paradigm that allows efficient maintenance of cloud with efficient uses of servers. Virtualization is a key element in cloud environment as it provides distribution of computing resources. This distribution results in cost and energy reduction, thus making efficient utilization of physical resources. Thus resource...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jun 2014

    Competent Scheduling for Intermittent Aggregation Queries in Multihop Sensor Networks

    Recent advances in low-power computing and communication technologies have given rise to the proliferation of wireless sensor networks having low cost sensor nodes with limited processing capacity and battery power. Wireless sensor networks can be used in a wide range of applications such as industrial process monitoring and control, surveillance...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jun 2014

    Object-Oriented System-on-Network-on-Chip Template and Implementation

    Network-on-chip (NoC) technology enables a new system-on-chip paradigm, the System-on Network-on-Chip (SoNoC) paradigm. One of the challenges in designing application-specific networks is modeling the on-chip system behavior and determining on-chip traffic characteristics. A universal object message level model for SoNoC was defined and an object-oriented methodology was developed to implement...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jun 2014

    Energy Efficient Position Based Opportunistic Routing Protocol for MANETS

    Reliable and on-time data delivery is a crucial parameter of network performance in highly dynamic mobile ad hoc networks. Leveraging on a modified 802.11 MAC tweak, guard nodes relay the packet with prioritized back off time when the intended node fails and becomes a contender nodes themselves. Previously used ad...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jun 2014

    Believer Based Protected and Efficient Routing in Pervasive Network

    A pervasive network is one in which the estimation of the capability of the nodes to arrange themselves autonomously in the network environment and exchange information through these networks. All types of ad-hoc networks come under pervasive network. In this dynamically changing environment, the authors cannot provide security in the...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jun 2014

    Measuring Accuracy in Identifying and Detecting Unauthorized Access Point Using Proactive Intrusion Detection Approach in Wireless Networks

    Currently, one of the major security issues in wireless environment is the intrusion coming from an unknown and unauthorized wireless access points. This access points could expose any sensitive information transmitted over the network. Until now the Intrusion Detection System (IDS) on wireless network environment is still being developed because...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // May 2014

    Software Metric Pattern Discovery for Text Mining

    The mining techniques are proposed for the purpose of developing effective mining algorithms to find particular patterns within reasonable and acceptable time frame. With a large number of patterns generated by using data mining approaches, how to effectively use and/or update these patterns is still an open research issue. In...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // May 2014

    Towards Self-Configuration Techniques for Cognitive Radio Networks

    Cognitive Radio Networks (CRN) is networks that can sense their operating environment and adapt their implementation to achieve the best performance. Therefore, a cognitive radio must dynamically configure and reconfigure itself under changing environments. Self-configuration is the ability to adjust operation parameters and transmissions on the fly without modification on...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // May 2014

    Identification of Spam Over Internet Telephony Through Acoustic Fingerprint Technique

    Spam has posed a serious problem for users of email since its infancy. Today, automated strategies are required to deal with the massive amount of spam traffic. In an email setting, the authors have a significant chance to quarantine incoming emails to check if they are spam or a virus....

    Provided By International Journal of Computer Science and Network Security

  • White Papers // May 2014

    Comparing Face Recognition Technologies

    An automated system for human face recognition in a real time background world for a large homemade dataset of persons face. There is overview and different steps of face recognition. Because the face system is totally non-intrusive, thus without bothering the user in any way it can therefore make an...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // May 2014

    Content Based Retrieval System With Bloom in an Unstructured P2p Overlay Networks

    Peer-To-Peer (P2P) network is the best and popular network sharing of contents by the user through internet. Bloom cast is an efficient technique used for full-text retrieval scheme in unstructured P2P networks. By using the fullest of a hybrid P2P protocol, Bloom cast makes copies of the contents in the...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // May 2014

    Ensuring Data Privacy and Access Anonymity Using Cryptographic Techniques in Cloud Computing

    The main idea behind cloud computing is to store data and other resources remotely in the cloud and accessed it anytime from anywhere through devices such as mobile devices, laptops and personal computers and any other thin client devices. This offers many advantages, like data ubiquity, flexibility of access, better...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // May 2014

    Secure Authentication Watermarking in Ad-Hoc Destination-Sequenced Distance-Vector Routing Protocol

    Security is important in the routing protocol of Mobile Ad-Hoc NETworks (MANETs), it is necessary to protect against malicious attacks as well as in data transmission. The goal of mobile ad-hoc security is to safeguard the nodes' operation and ensure the availability of communication in spite of adversary nodes. The...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // May 2014

    Research of the Improved Adaboost Algorithm Based on Unbalanced Data

    A large of non-equilibrium data exist in the real world, because of the traditional classification methods based on assumptions of class balance and different categories misclassification the same costs as well as the evaluation criteria based on the accuracy of the overall sample classification, resulting in the classification of non-equilibrium...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // May 2014

    Uncover Trending Topics on Data Stream by Linear Prediction Modeling

    The use of streaming data to analyze and discern patterns to make better decisions is becoming the basis for creating significant value for companies. Torrents of data flooding continuously force organizations to understand what information truly count, and analyze what they can do with that information. The aim of this...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // May 2014

    SWAP: Software Wireless Adapter Program for Multiple Connections

    The normal way to use one wireless card is connecting to one wireless network. It is reduces the flexibility and the efficiency. There are no wires; wireless cards could connect to more than one wireless network. It is possible only by using multiple wireless network cards in the device. This...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // May 2014

    Replication of Enormous Data Process in Cloud Computing

    Cloud computing is a computing platform with the back bone of internet to store, access the data and application which is in the cloud, not in the computer. The continuous increase of computational power has produced an overwhelming flow of data. The recent trends in web technology have made it...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // May 2014

    A Grid Based Dynamic Energy Efficient Routing Approach for High Density Mobile Ad Hoc Networks

    A research work without considering the power constraint cannot be conceded a fine contribution towards Mobile Ad Hoc NETworks (MANET). As MANET comes into action for some special purpose, but its fugacity sometimes result degrades in network performance. Although the many prominent features of MANET like mobility, dynamic change in...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Mar 2014

    Application of the Relational Concept Analysis (RCA) for Remodularization of a Software Architecture and Comparison With Others Techniques Based on FCA and Oriented Graph

    In a previous paper, the authors proceeded to the remodularization architecture based on classes and packages using the Formal Concept Analysis (FCA), they then got two possible remodularized architectures and they explored the issue of redistributing classes of a package to other packages, they used an approach based on oriented...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Mar 2014

    Credit Scoring Model Based on Back Propagation Neural Network Using Various Activation and Error Function

    The back propagation algorithm of neural networks is a widely used learning technique for training a multi layered perceptron network. The algorithm applies error propagation from outputs to inputs and gradually fine tunes the network weights to minimize the sum of error using the gradient descent technique. Activation functions are...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Mar 2014

    A Survey on Medium Access Control Protocols Based on Synchronous Duty Cycle Approach in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are new generation of wireless networks which have many potential applications and unique challenges. Some of their most important problems are their limited resources, independent and autonomous operation and dynamic topology. Also, maximum of energy consumption into these networks is occurred when data transmission. In recent...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Mar 2014

    Throughput and Error State Perfomance of AMC Scheme in 3G Wireless Systems

    In this paper, the authors have proposed a adaptive modulation and coding technique for OFDM is proposed. In this technique it is possible to switch the modulation order and coding rate in order to better match the channel conditions. The use of adaptive modulation allows higher throughputs and covering long...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Mar 2014

    Video Steganography Through LSB Based Hybrid Approach

    In this paper, the authors have proposed an advance approach for dynamic data protection using Least Significant Bit Hiding (LSB) and hybrid approach. Steganography is the art of communicating a message by embedding it into multimedia data. The proposed method for replacing one or two or three LSB of each...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Mar 2014

    A Result Analysis of Modified Hybrid Port Knocking (MHPK) With Strong Authentication

    It is sometimes desirable to allow access to open ports on a firewall only to authorized external users and present closed ports to all others. The authors examine ways to construct an authentication service to achieve this goal, and then examine one such method, Modified Hybrid Port Knocking (MHPK). Implementations...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jul 2012

    A Design of Cloud Privacy Manager Algorithm

    Cloud Computing is a evolving Technology and new paradigm. The objective of this paper is to introduce the privacy concerns, related to cloud computing that will likely be the focus of discussion. In this paper, the authors discuss the privacy in cloud computing, its enhancement technologies to provide control of...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jul 2012

    A Novel Digital Watermark Based on Wavelet Coefficients Comparison

    Watermark technology is one of the most promising and effective ways for copyright protection of digital media and safe transmission of digital information. In the proposed method, the watermark is embedded in the components of medium frequency on the horizontal and vertical direction based on the wavelet coefficients comparison, and...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jul 2012

    CBH-MAC Protocol for Multihop QoS in Wireless Sensor Networks

    This paper proposes an efficient hybrid MAC for multi-hop QoS protocol in Wireless Sensor Networks for delay sensitive data traffic. The authors present Contention Based Hybrid MAC (CBH-MAC) protocol for both chain and cross topology, which reduces end-to-end delay, energy efficiency and maximizes the packet delivery ratio by minimizing the...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jul 2012

    An Approach to Image Compression With Partial Encryption Without Sharing the Secret Key

    Existing methods when employ compression there is no consideration of security, similarly when it describe encryption there is no consideration of size i.e. compression. In this paper a simultaneous image compression and encryption scheme is discussed. The order of the two processes viz. compression and encryption is EC, i.e., image...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jun 2012

    A Requirements Elicitation and Analysis Aided by Text Mining

    In Requirements Engineering the initial activities of elicitation and analysis are essential for software development. Achieving these requirements (and describing then in natural language), together with simple and rapid modeling (with enough degree of formality) are basic needs that influence the remaining stages of software development. In this paper, the...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jun 2012

    Intelligent Crawling on Open Web for Business Prospects

    Dynamic nature of web based systems requires continuous system updating. Information retrieval depends upon crawlers that crawl the web exhaustively, but business corporate expect from their crawlers to retrieve the specific information as per their applications. Crawlers help to download the required information using hyperlinks that occur in Web pages...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Apr 2011

    Online Loss Differentiation Algorithm With One-Way Delay for TCP Performance Enhancement

    In this paper for the performance enhancement of TCP protocol in the mixed wired/wireless network, packet loss differentiation algorithm is proposed which distinguishes the nature of losses and decides congestion control action accordingly. TCP protocol takes packet loss as an indication of network congestion so that it reduces its congestion...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2012

    Network Based Security Model Using Symmetric Key Cryptography (AES 256 - Rijndael Algorithm) With Public Key Exchange Protocol (Diffie-Hellman Key Exchange Protocol)

    The main aim of this paper is to strengthen secured communication over the network by enhancing the strength of the AES algorithm with Diffie-Hellman key exchange Protocol. The Rijndael is a block cipher with variable block and key size is believed to provide much more security. The Rijndael with 128...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2012

    Camouflage in Malware: From Encryption to Metamorphism

    Camouflage of malware is a serious challenge for antivirus experts and code analysts. Malware use various techniques to camouflage them to not be easily visible and make their lifetime as longer as possible. Although, camouflage approaches cannot fully stop the analyzing and fighting against the malware, but it make the...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2012

    Secured Public Key Authentication and Energy Efficient MAC Implementation in Wireless Sensor Networks

    As Wireless Sensor Networks (WSNs) are susceptible to attacks and sensor nodes have limited resources, designing a secure and efficient user authentication protocol for WSNs is a difficult task. Considering that most future large-scale WSNs follow a two-tiered architecture, the authors propose an efficient and Denial-of-Service resistant user authentication scheme...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2012

    Generalization of Quantum Key Distribution Protocol

    Quantum Key Distribution (QKD) is a secure key sharing technology with unconditional security. Certain well-known protocols for QKD have been presented, which claim their security by means of higher eavesdropping error-rates. A generalized quantum key distribution protocol that can be optimized for arbitrary number of bases and dimensions of photon...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2012

    Comprehensive Network Security Approach: Security Breaches at Retail Company-A Case Study

    The development of the Web technologies and services increases the level of threats to data security in companies and enterprises day by day. As criminals are turn into professional network intruders, new laws and legislations are introduced to cover information security. Even though on-line businesses provide the productivity and efficiency...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2012

    Check Points Against Privacy Breaches in Android Applications

    The risk of privacy breaches by malicious programs has been increasing, and these programs have used more elaborate techniques to circumvent detection. Attacks using a collaboration of applications are especially difficult to find since distinct applications obtain privacy-sensitive data and send the data to the outside. Current mobile platforms have...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2012

    Implementation of the Remote Control and Management System in the Windows O.S

    In this paper, the authors implemented the remote management system on the Windows Operating System. Remote management system in the Windows operating system was designed for the client and server function. A client function has the ability to allow the system to access from the server. This feature is responsible...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2012

    Towards Standardization and Interoperability of Database Backups

    The current business model of modern companies is increasingly dependent on information technology. Thus, it is necessary to keep security copies of the data (backup) which may be used to restore them after a data loss event. On the other hand, this dependence encourages strong competition among suppliers and this...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2012

    A Novel PSO-Based Algorithm for the Optimal Location of Controllers in Wireless Networks

    The optimal location of controllers in wireless networks is an important problem in the process of designing cellular mobile networks. In this paper, the authors present a novel algorithm based on Particle Swarm Optimization (PSO) for solving it. Their objective function is determined by the total distance based on finding...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2012

    A Study on Effective Proactive Service in Pervasive Computing Environment

    Pervasive systems are becoming increasingly popular, with the appearance and penetration of mobile devices such as Smart phones. Proactive service is one of the most important fields of research in pervasive computing. The authors propose a method for an effective proactive service in pervasive computing environment. Most of previous researches...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2012

    A Frame Packing Mechanism Using PDO Communication Service Within CANopen

    The utilization of the CAN open-based network needs to be minimized in order to improve the communication performance such as worst-case response time of CAN open messages. To achieve this end, the messages should be packed together as many as possible so that the message frame overhead will be decreased....

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2012

    Developing a Web-Based GNH Survey Application and a Web Service for Identifying Missing Data Mechanism in Incomplete Survey Data

    This paper proposes a web-based GNH survey application, capable of identifying missing data mechanism which is crucial in effectively handling missing data in survey questionnaire. First, the authors have stated the rationale behind GNH survey briefly highlighting the concept and the birth of GNH. Second, they have described the present...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2012

    Viewpoints Diagram: Towards an Innovative Diagram in the UML Language

    This paper is to put forward a modeling of multi-view classes by making use of the Petri networks formalism. The object approach aims at modeling complex systems and allows to take into account the views of the different users of the system and their access rights. Thus, in the paper,...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2012

    Proposing a New Approach to Applying Pervasive Computing in Agriculture Environments

    The resource management in agriculture environments is very important. Using smart controls will be one of the most eminent ways of managing. These resources such as water and plant nutrition. In this paper researcher are going to present a special program in which provide necessary resources for growing plant by...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2012

    A Novel Approach for Keyboard Dynamics Authentication Based on Fusion of Stochastic Classifiers

    Computer security is one of most important issues around the world. Most computer systems are using passwords for their own authentication or verification mechanisms. A robust and efficacious approach for classification of 24 persons who their typing patterns were collected introduced. A Linear Discriminate Classifier (LDC), Quadratic Discriminant Classifier (QDC)...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2011

    A Hybrid LAR-1DNDP Route Discovery Algorithm for Mobile Adhoc Networks

    A Mobile Ad hoc NETwork (MANET) is defined as a collection of low-power wireless mobile nodes forming a temporary network without the aid of any established infrastructure or centralized administration. A data packet in a MANET is forwarded to other mobile nodes within the network through a reliable and an...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Sep 2010

    An Efficient Materialized View Selection Approach for Query Processing in Database Management

    Quick response time and accuracy are important factors in the success of any database. In large databases particularly in distributed database, query response time plays an important role as timely access to information and it is the basic requirement of successful business application. A data warehouse uses multiple materialized views...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Nov 2012

    Design and Implementation of Fuzzy Temperature Control System for WSN Applications

    With its low power embedded sensingactuation, computing, wireless RF communications and multi-hop mesh networking capabilities, Wireless Sensor Network (WSN) has emerged as one of the popular multidisciplinary technologies of the 21st century. Present day research trends focus on application specific deployment of network hardware with information processing, integrating it into...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Nov 2012

    Analysis of Various Clustering and Classification Algorithms in Datamining

    The term "Classification" is frequently used as an algorithm for all data mining tasks. Instead, it is best to use the term to refer to the category of supervised learning algorithms used to search interesting data patterns. While classification algorithms have become very popular and ubiquitous in DM research, it...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Nov 2012

    Performance Versus Cost of a Parallel Conjugate Gradient Method in Cloud and Commodity Clusters

    Cloud computing is an emerging technology to run HPC applications using computing resources on a pay per use basis. The CG method is a linear solver which is used in many engineering and scientific applications, and is computationally demanding. The authors implement different approaches of a parallel CG method and...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Nov 2012

    Virtualization in Intrusion Detection Systems: A Study on Different Approaches for Cloud Computing Environments

    This paper presents an overview of some of the major works that focus on the use of virtualization in intrusion detection systems to protect against threats in cloud computing environments. The elasticity and abundant availability of computational resources are attractive to attackers in order to exploit vulnerabilities of the cloud,...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Nov 2012

    A Low Rate DDoS: A Security Threat in Mobile Adhoc Networks

    Network security is soft spot in wired or wireless networks, MANETS pose number of non-trivial challenges to the security design, such as shared wireless medium, dynamically changing topology, etc. DoS and DDoS are two of the most harmful threats to the network. MANETS are more vulnerable to these attacks. In...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Dec 2012

    Investigating The Effect of The Carrier Frequency Offset(CFO) and Frequency Synchronization on The Performance of The OFDM Wireless Systems

    Orthogonal Frequency Division Multiplexing (OFDM) is a modulation schema that due to the high spectral efficiency and the simplicity of the receiver implementation is the most common system for using in broadband communication systems. Although OFDM has been used in numerous wireless communication systems, but two of the main problems...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Dec 2012

    Design of Stream Cipher for Text Encryption using Soft Computing based Techniques

    In cryptography, encryption is the process of transforming information referred to as plain-text using an algorithm (called a cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is information which is, referred to as cipher-text. Stream...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Dec 2012

    Towards Minimizing Human Factors In End-User Information Security

    Today, many hardware and software solutions are available to enhance information security, however, little is known about the human factor in information security. Other researchers have revealed that the application of information security technologies alone does not always result in improved security. Human factors immensely contribute to the security of...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Dec 2012

    A Virtualised High Trust Zone (VHTZ) to Mitigate the Security and Privacy Issues in Cloud Computing

    The benefits of cloud computing are clearly well known which include rapid deployment, ease of customization, reduce cost and low risks. However, some high profile security breaches confuse organizations as they attempt to deploy cloud services in their businesses. Although, the cloud service providers pitch the security of their services....

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Dec 2012

    Smart Decision Making for Internal Attacks in Wireless Sensor Network

    An information procuring and processing emerging technology Wireless Sensor Network (WSN) consists of low-cost and multifunctional resources constrain autonomous nodes. It communicates short distances through wireless links. It is open media and underpinned by an application driven technology for information gathering and processing. It can be used for many different...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Dec 2012

    Survey of Web Application and Internet Security Threats

    Computer and network security are one of the most challenging topics in the Information Technology research community. Internet security is a significant subject that may affect a wide range of Internet users. People that use Internet to sell, buy and even to communicate needs their communications to be safe and...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Oct 2012

    Energy-Efficient Dynamic Source Routing Protocol for Wireless Sensor Networks

    Routing presents a significant design challenge to meet various applications requirements in Wireless Sensor Networks (WSNs) communications. In this paper, the authors present a minimum delay multipath routing protocol with modification to the standard Dynamic Source Routing (DSR) protocol, which aims to improve energy efficiency and minimize end-to-end delay to...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Oct 2012

    Security Challenges in 3G Systems

    This paper explains the authentication and encryption scheme used in GSM. It explains the different possible attacks on cellular systems, which include SIM cloning, eavesdropping, location tracking, SMS ping, SMS denial of service, authentication denial of service and SMS spam. It classifies these attacks on the basis of target of...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Oct 2012

    An Energy-Efficient Clustering Algorithm for Wireless Sensor Networks

    In Wireless Sensors Networks (WSNs) the efficient use of the sensors' energy is a key point to extend the network lifetime and has been the center of attention by many researchers. Clustering formation is an important technique used to reduce the sensor's energy consumption. However, finding an optimal clustering in...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Oct 2012

    Delay-Sensitive Applications in VANET and Seamless Connectivity: The Limitation of UMTS Network

    Multi-interface handheld devices enabling radio link connections to varieties of wireless networks (i.e 3G cellular, Wi-Fi, WiMAX) can provide seamless connectivity. With seamless connectivity, VANET safety applications are emerged. Currently, seamless connectivity has been promoted in 3G cellular environments offering a large coverage area and high bandwidth. Even though, 3G...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Sep 2012

    A New Mobility Model for Multimedia Networks

    Mobile IP is the current standard proposed by IETF for mobility management in IP networks. Its importance increases if network is supporting multimedia applications. Mobile node communicates with a static Correspondent Node. The main consideration is when Mobile Node and Correspondent Node both are visiting beyond their home networks and...

    Provided By International Journal of Computer Science and Network Security