International Journal of Computer Science and Telecommunications

Displaying 1-40 of 192 results

  • White Papers // Feb 2014

    Security Issues and Contradict Measures in Wireless Mesh Networks

    As wireless networks have evolved into next generations, Wireless Mesh Networks (WMNs) have proved to be a massive infrastructure for better communication between enormous entity nodes. WMNs are extremely dependable, as every node is associated with all others likewise sketched in mesh layout. WMN network nodes consist of clients and...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Feb 2014

    An Overview of Intrusion Detection System (IDS) along with its Commonly Used Techniques and Classifications

    The area of intrusion detection is the central concept in overall network and computer security architecture. It is an important technology in business sector as well as in research area. By monitoring the computer and network resources, Intrusion Detection System (IDS) detects any of the misuse or unauthorized access which...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Jan 2014

    Restructuring Network Infrastructure with Software Defined Networking

    Home network is very challenging to manage because of the complexity of underlying infrastructure. Network's underlying complexity is either hidden or exposed by the existing network interfaces, but the visible information is not necessarily helpful for the user to complete the desired tasks. However, underlying network and protocols can be...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Dec 2013

    Fair Cloud Management System

    Cloud computing offers multiple advantages comparing to \"Traditional\" computing infrastructures. However, all customer data are stored on a Virtual Machine (VM) or on a cloud of a Service Provider (SP). Therefore, service quality and data safety are highly dependent on the SP. It also means that these issues are dependent...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Dec 2013

    OTPK PAKE Protocol with TRNG Based Key Generation

    In earlier, two smart card based password authentication key exchange protocols were proposed by lee et al. and Hwang et al. respectively. But neither of them achieves two factor authentication fully since they would become complete insecure once one factor is broken. To overcome these two factor authentication problem in...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Nov 2013

    Approach to Improving Localization Systems in Networks of Wireless Sensors

    In recent years, wireless sensor networks are central to the research activities of the scientific community, particularly given the vast potential applications such as medical care, smart homes, and or environmental monitoring. In the context of wireless sensor networks, the localization technique \"Range-free\" is more efficient with respect to the...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Nov 2013

    Algorithm for Weighted Association Rules for Sequential Data

    All the available algorithms working on arranging sequence in the database either in ascending or descending order. It is sometimes does not give result as per need. In the online admission process and in train/flight reservation, choices have significant role and if by using available algorithms for analysis purpose, the...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Nov 2013

    Performance Improvement of Information Exchange between the Virtual Machines on the Same Physical Host

    Virtualization environment provides VMs which are isolated from each other. This isolation helps co-resident VMs use original transport protocols like UDP and TCP for information exchange. Using original protocols does not take advantage of being on the same host of VMs because of unnecessarily overheads. Running VMs are processes on...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Oct 2013

    Performance Analysis and Deployment of VoLTE Mechanisms Over 3GPP LTE-Based Networks

    Long term evolution based networks lack native support for Circuit Switched (CS) services. The Evolved Packet System (EPS) which includes the Evolved UMTS Terrestrial Radio Access Network (E-UTRAN) and Evolved Packet Core (EPC) is a purely all-IP packet system. This introduces the problem of how to provide voice call support...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Oct 2013

    A Proposed Secure Network Model for Implementing Smart Grid Applications in Ghana with WiMAX Technology

    Advocates of smart grid networks implementation believes that smart grids will deliver a more secure, sustainable and affordable energy for future generations of consumers. It is also believed that smart grids would underlie much of the infrastructure which makes everyday life possible. In order to realize this dream, an Ultra...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Oct 2013

    Hierarchical Energy Efficient Routing Protocol (HEERP) for Wireless Sensor Networks (WSN)

    Wireless sensor network consists of an enormous number of small disposable sensors which have limited energy. These sensors cannot be replaced once they are deployed, as the users usually have no access to these nodes. In many situations like battle field monitoring, rescue operations, the battery operated nodes usually have...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Oct 2013

    Coupling Two Chaotic Systems in Order to Increasing the Security of a Communication System - Study and Real Time FPGA Implementation

    A Pseudo Random Numbers Generator (PRNG) based on chaotic systems is developed in this paper. The main goal of this paper is to increase the security of a chaotic crypto system especially against known plaintext and chosen plaintext attacks by coupling two chaotic systems, the h

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Oct 2013

    A Novel Approach for Script Based Password Generation by Using Image Partitioning

    With increasing demand of security, ample of security measures and techniques have been proposed in the literature. Text or password based authentication can be easily compromised with few finger strokes or attacks. Image-Based-Authentication (I.B.A.) is a good alternative since images are easier to recall than alphanumeric passwords. Therefore, in this...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Oct 2013

    Speed Performance of Intelligent Ant Sense Routing Protocol for Mobile Ad-Hoc Personal Area Network

    Now-a-days the Mobile Ad-hoc NETworks (MANETs) become an important field in the wireless area for user applications. Due to its dynamic nature of this networks the main problem is how to design an effective routing algorithm that can adapt its behavior to frequent and rapid changes in the network due...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Sep 2013

    Acknowledge Enabled Secure Algorithm for Dynamically Updating Programs Installed in Wireless Sensor Nodes

    Wireless sensor networks comprised of several battery powered sensor nodes deployed in hostile environment. There are several programs installed in wireless sensor nodes, time to time these programs need to update in secure manner, such that any unauthorized person could not update the programs. Sensor nodes have several constraints so...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Sep 2013

    A Review Study on the Privacy Preserving Data Mining Techniques and Approaches

    With the extensive amount of data stored in databases and other repositories it is very important to develop a powerful and effective mean for analysis and interpretation of such data for extracting the interesting and useful knowledge that could help in decision making. Data mining is such a technique which...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Sep 2013

    An Efficient Reactive Routing Security Scheme Based on RSA Algorithm for Preventing False Data Injection Attack in WSN

    Wireless sensor networks are vulnerable to various attacks. Injecting false data attack is one of the serious threats to wireless sensor network. In this paper, adversary reports bogus information to the sink which causes error decision at upper level and energy waste in en-route nodes. Several authentication techniques using en-route...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Sep 2013

    Comparative Study of AODV and OLSR Protocols in MANET Network Under the Impact of Black Hole Attack

    Wireless networks are raising fast today, as users wants to have wireless network anywhere they are located. Mobile Ad-hoc NETworks also named as MANETs became one of the most well-liked wireless networks because it is easy to be deployed and due to its dynamic nature. Existence of MANETs created a...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Sep 2013

    Hybrid Evolutionary Game Theory in QoS Routing of Wireless Mesh Networks

    Wireless mesh networks are a powerful and reliable solution to create and access wireless broadband services for internet service providers, network construction, military applications and other end users are considered. These networks have features such as high reliability, low installation cost, wide coverage area and connect to the network automatically....

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Sep 2013

    Performance Analysis of WiMax Physical Layer Under Scrambling Security Threat Using MATLAB Simulation

    In this paper the authors present on PHYsical laYer (PHY) of the WiMAX. Scrambling and jamming are two security threats which can occur at physical layer of the WiMAX network. In WiMAX environment jamming and scrambling threats can be destroyed the communication. Scrambling is a type of jamming and it...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Aug 2013

    Implementation of MAC Layer Security Protocol in WiMAX Using OMNET++ Simulator

    WiMAX IEEE 802.16 is stated as worldwide interoperability for microwave access intended to facilitate the interoperation and adaptation of wireless MAN. WiMAX is capable of providing high data output and low delays in different modes of operation. For these reasons WiMAX is useful in organizational and end-client structures. Before the...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Jul 2013

    Efficient Grid-Based MANET Routing Protocol

    The authors propose a new reliable MANET routing protocol which uses a logical two dimensional grid. The proposed protocol is called Efficient Grid-based Routing Protocol (E-GRP). E-GRP is based on the GRID routing protocol. The main new features of E-GRP compared to GRID is the ability to work with different...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Jul 2013

    A Simulation-Based Performance Evaluation of AODV and DSR in Mobile Ad-Hoc Networks (MANETs)

    In this paper the authors evaluate and compare the performance of two reactive routing protocols for mobile ad-hoc networks: Ad hoc On-demand Distance Vector (AODV) and Dynamic Source Routing (DSR). The paper focuses on the design and evaluation of routing protocols in mobile ad-hoc networks. Study and implementation of these...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Jul 2013

    A Survey on Multicast Routing: Comparison, Analysis and Evaluation

    Multicasting plays a particular part in various applications of Mobile Ad-hoc NETwork (MANET). It extensively advances the effectiveness of this network, a capability of the channels and the consumption of energy in battery. The pervasive exercise of non static and little instruments that can be carried and becoming extremely famous...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Jun 2013

    A Proposed Campus Building Process in Cloud Computing

    A good understanding of the cloud computing technology, its components and their interrelationships is crucial for decision makers who intend to adopt this novel technology. Towards the end-goal of establishing a simple cloud computing platform which satisfies some of the scientific needs of the academic and research community within the...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Jun 2013

    Secure Analysis for Secure Routing Protocols over MANET

    Security is one of the important aspects in Mobile Ad-hoc NETwork (MANET). Also routing algorithm in MANET is dissimilar than traditional routing. This paper provides limits of traditional routing protocols if used to MANET. This paper also describes routing protocols at this time used in MANET and place focus on...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // May 2013

    A Comparative Study of Handoff Schemes in Vehicle to Infrastructure Using Mobile WiMAX

    With the increase in user mobility, there is need for seamless handover when mobile applications and services are being used especially in the context of vehicular Ad-Hoc NETworks (VANET), in order to enhance the user experience thus affecting the quality of service. This paper looks at VANET with WiMAX with...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // May 2013

    Towards a Perspective of Web Application Vulnerabilities and Security Threats

    The rapid and tremendous growth of Information and Communication Technology (ICT) has increased access to web applications. This increased access has paved the way for disadvantageous security and vulnerable threats in the form of attacks in web applications. Various detection and prevention techniques have been proposed by researchers in the...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // May 2013

    Performance Evaluation of ATM Networks With Round Robin and Weighted Round Robin Algorithm

    The Asynchronous Transfer Mode (ATM) Network is believed to be capable of supporting various services with drastically different traffic characteristics and Quality of Service (QoS) requirements. The deployment of integrated services with a broad range of burstiness characteristics and their integration through statistical multiplexing has focused a great deal of...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // May 2013

    A Survey on Caching, Replication and Crowdsourcing in Mobile Environment

    In this new era of technology, the mobile devices are available with various features. The main functionality of the mobile devices became effective information sharing i.e. information access on every finger touch, which makes the whole world small. The information sharing is done through various platforms like social networking, cloud...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Apr 2013

    Performance Degradation of Heterogeneous Wireless Sensor Network in the Presence of Non Cooperative Nodes

    Recently Wireless Sensor Networks (WSN) has gained research interest for remote area monitoring and tracking in unattended environments. WSN may be heterogeneous to provide resources and aggregation of resources will be helpful for efficient distributed computing. Sensor nodes in WSN are used to collect application specific data, perform some pre...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Apr 2013

    Design and Development of a Framework to Mitigate DoS/DDoS Attacks Using IPtables Firewall

    A DoS (Denial of Service) attack is characterized by an explicit attempt to prevent the legitimate use of a service. These attacks overwhelm the processing or link capacity of the target sites by saturating them with bogus packets. Such attacks can seriously disrupt legitimate communications. These attacks can disrupt the...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Apr 2013

    Performance Analysis of Cluster Based Secure Multicast Key Management in MANET

    Mobile Ad-hoc NETwork (MANET) is a group of wireless nodes join together to form a network without a defined architecture. It is formed dynamically as the nodes are mobile in nature. This characteristic of MANET could lead to insecure information exchange. Applications in Mobile Ad-hoc NETworks (MANET) such as military...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Apr 2013

    A Survey on Software Security Testing Techniques

    This paper briefs a survey on software security techniques. Software security testing is not the identical as testing the correctness and competence of security functions implemented by software, which are most frequently verified through requirements-based testing. These tests are important; they expose only a small piece of the depiction needed...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Apr 2013

    Face and Gait Fusion Methods: A Survey

    Biometric authentication of a person is highly challenging and complex problem. Face and gait identifications in video have received significant attention. Consequently, their identification problems have challenges due to their large varying appearances and high complex pattern distributions. However, the complementary properties of these two biometrics suggest fusion of them....

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Apr 2013

    An Assessment on Active Queue Management in Mobile Ad-Hoc Network

    The RED queue management algorithm achieves high throughput and low average delay by detecting and avoiding the incipient congestion. The detection of incipient congestion is based on calculation of average queue length and RED parameter settings. To avoid the congestion in the network, operators should have a priori estimations of...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Apr 2013

    New Algorithm for SIP Flooding Attack Detection

    Voice over Internet Protocol (VoIP) services are based on standardized and open technologies (i.e., SIP, H.323) using servers reachable through the Internet, implemented in software and provided often over general purpose computing hardware. Therefore, such services can suffer from various security threats as denial of service attacks. In this paper,...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Apr 2013

    The Switch Hierarchical Network Design Model (SHiNDiM): A Mechanism for Identifying and Determining the Correct Switch for the Appropriate Position in the Network Layer

    Designing and developing a reliable and stable network required installing the right switches in the correct positions of the hierarchical network layers. The identification, acquisition and determination of the right switches required the expertise of highly skilled and qualified network Engineers. However, employing and maintaining such expertise in some of...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Apr 2013

    Design, Verification and Implementation of Enhanced PKM WiMAX Authentication Protocol

    Worldwide Interoperability for Microwave Access (WiMax/IEEE 802.16), is new technology based on wireless metropolitan area network. Privacy Key Management (PKM) protocol is responsible for providing the secure distributions of keying data from Base Station (BS) to Subscriber Station (SS). PKMv1, PKMv2, and enhanced PKMv1 described with formal analysis and verified...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Mar 2013

    Data Classification for Recognizing the Web Application

    In this paper, the authors present a solution to distinguish the different applications running on port 80 with HTTP protocol; from that helping firewall to detect the attack and to try to prevent it. This paper is relatively a typical problem; by there are many different applications such as game,...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // May 2012

    Exploring Configurable Congestion Control Feature of UDT Protocol

    TCP becomes inefficient when the Bandwidth of the network and delay increases, because slow loss-recovery, a RTT bias inherent in its AIMD congestion-control algorithm, and the bursting data flow caused by its window control. To overcome this problem an application-level is built on top of UDP, called UDP based data...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // May 2012

    A Survey About Unicast and Multicasting Routing Protocols for MANETs

    An extremely significant and compulsory concern for mobile ad hoc networks is to find the cause among source and destinations, which is a most important technological dispute due to dynamic topology of the network. Routing protocols for MANETS may possibly be different depending on applications and network architecture. The effectiveness...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // May 2012

    Iris Recognition Using a Scalar Based Template in Eigen-Space

    This paper proposes a novel technique for iris recognition in the context of biometric identification of a person. The iris is a portion of the inner eye of an individual and contains an abstract and randomly generated texture pattern arising from orientation of complex tissues within this region. This random...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // May 2012

    An Innovative Clustering Method for MANET Based on Cluster Convergence

    Mobile ad hoc networks have special properties and one of the most significant of those properties is nodes mobility which in part plays a considerable role in network's different parameters. Many efforts were made to make an infrastructure for these networks. In these infrastructures or clusters, a main node called...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // May 2012

    Review on Routing Algorithms in Wireless Mesh Networks

    Wireless Mesh Networks (WMNs) have emerged as a key technology for next-generation wireless networking. This paper focuses on a variety of routing protocols that are used in wireless mesh networks and identify the performance of these routing protocols. The performance is done with regards to load balancing, packet delivery ratio,...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // May 2012

    A Survey on Taxonomies of Attacks and Vulnerabilities in Computer Systems

    Security evaluation of a system is a complicated problem. The majority of the recent efforts in Security evaluation involve for discovering well-known Vulnerabilities. Discovering unidentified Vulnerabilities yet mostly remains a subjective procedure. The procedure knows how to be improved by considering the Characteristics and behavior of well-known Vulnerabilities. The information...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // May 2012

    Measurement of Object Oriented Software Usability Using Fuzzy AHP

    Software usability became an important quality factor in recent years due to the increasing demand of interactive software systems. Now mostly systems are developing using object-oriented methodology. The object-oriented methodology reduces design complexity, so enhances usability. Also object-oriented approach improves the usability of software system when software engineering process combined...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // May 2012

    Analysing Grid Security Issues and Some Preliminary Approaches for Secure Environment in Grid

    Grid computing is a wide area parallel distributed computing environment where idle processor cycles and underutilized storages of geographically dispersed resources are utilized optimum way which act as a supercomputer. In this paper, the authors identify and explain the problematic key security issues and propose briefly some novel approaches for...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // May 2012

    Virtual Network Computing Based Remote Desktop Access

    Cloud computing means using multiple server computers via a digital network as though they were one computer. Often, the services available is considered part of cloud computing. Cloud computing broadens the range of applications offered to mobile end-users with demanding applications in terms of graphical hardware, such as 3D virtual...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // May 2012

    Supple Database Design for Enterprise Resource Planning (ERP) Application

    Enterprise Resource Planning (ERP) software presents a frame for organizations to better utilize their process and business. Early generation of ERP systems utterly focused on infrastructure renewal and creating efficiencies in back office operations around key functional areas such as finance and production management. These systems, while useful, did not...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Nov 2011

    Performance Analysis of Congestion Control Scheme for Mobile Communication Network

    The paper formulated a dynamic channel allocation model with one-level buffering in controlling congestion in Global System for Mobile Communication (GSM) network with a view to prevent call loss or degradation in quality of service of calls. The system model was implemented using object-oriented programming. An algorithm was developed for...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Nov 2011

    XML Keyword Search: Coarseness Evaluation Under Ambiguity Concerns for Effective Results

    An XML search engine XSearch that addresses an open drawback in XML keyword search: given relevant matches to keywords, the way to compose question results properly in order that they will be effectively ranked and simply digested by users. The approaches adopted within the literature generate either overwhelmingly giant results...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Nov 2011

    Cryptography - Analysis of Enhanced Approach for Secure Online Exam Process Plan

    To conduct the exam for thousand people offline process have several problems, to avoid those problems with gone for the process online exam is a field that is very popular and made many security assurances. Even though it fails to control cheating, online exams have not been widely adopted well,...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Nov 2011

    Visual Cryptography Authentication for Data Matrix Codes

    An Identity Card is any document which may be used to verify aspects of an identity. If issued in the form of a small, mostly standard-sized card, it is usually called an Identity Card (IC). It plays in the society, threats of fraud, tampering, and identity theft arises. Thus, security...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Nov 2011

    How to Measure Coupling in AOP From UML Diagram

    The Aspect-Oriented Programming (AOP) is a new paradigm for improving the system's features such as modularity, readability and maintainability. Aspect-Oriented Software Development (AOSD) is a new technique to support separation of concerns in software development. In Aspect-Oriented (AO) systems, the basic components are aspects or classes, which consist of attributes...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Nov 2011

    Face Recognition Using PCA and Feed Forward Neural Networks

    Face recognition is one of biometric methods, to identify given face image using main features of face. In this paper, a neural based algorithm is presented, to detect frontal views of faces. The dimensionality of face image is reduced by the Principal Component Analysis (PCA) and the recognition is done...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Nov 2011

    A Novel Chain Based Wireless Data Sensor Network (ECBSN) Technique

    Wireless Sensor Networks (WSNs) have received tremendous attention in recent years because of the development of sensor devices, as well as wireless communication technologies. WSNs make it easier to monitor and control physical environments from remote locations and present many significant advantages over-wired sensor networks for a variety of civilian...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Nov 2011

    Analysis & Study of Application Layer Distributed Denial of Service Attacks for Popular Websites

    Application Layer is the most important for development life-cycle, Application layer Distributed Denial of Service (DDoS) attack is a continuous threat to the World Wide Web. Derived from the lower layers, new application-layer-based DDoS attacks utilizing legitimate HTTP requests over to victim resources are more unavailable. This issue may be...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Nov 2011

    Analysis of Crash Recovery Failure Detection With Quality of Services

    The authors develop a probabilistic model of the behavior of a crash-recovery target, i.e., one which has the ability to recover from the crash state. They show that the fail-free and the crash-stop are special cases of the crash-recovery run with Mean Time To Failure (MTTF) approaching to infinity and...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Nov 2011

    Implementation of SaaS in a Cloud Computing Environment

    Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. Cloud computing resources can be accessed from any...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Oct 2011

    A Review of Routing Mechanisms in Wireless Sensor Networks

    Research on Sensors is one of the major topics in computer and electronic fields. They used to monitor and control the physical environment such as buildings, forests and battlefields. According to these, applications, sensors are expected to be functional for a long period of time. Since the sensor networks include...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Oct 2011

    Effect of Training Algorithms on the Accuracy in Iris Patterns Recognition Using Neural Networks

    A biometric system provides automatic identification of an individual based on a unique feature or characteristic possessed by the individual. Iris recognition is regarded as the most reliable and accurate biometric identification system available. An approach for accurate Biometric Recognition and identification of Human Iris Patterns using Neural Network has...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Oct 2011

    Priority Based Pre-Emptive Task Scheduling for Android Operating System

    Android mobile operating system, which is based on Linux Kernel 2.6, has open source license and adaptability to user driven applications. As all other operating systems it has all the basic features like process scheduling, memory management, process management, etc., associated with it. Any mobile platform works smoothly when the...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Oct 2011

    Detection Wormhole in Wireless Ad-Hoc Networks

    One of the severe attacks on routing protocols is called wormhole attack in which two or more malicious nodes receive packets at one point of the network and transmit them to another location by a wired or wireless tunnel. The wormhole is so powerful and detection of it is difficult....

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Oct 2011

    Web-Based System - Authentication to Single Log-On to Several Applications

    Web Application systems are widely used in various fields for security reliability purpose the users are required to use user id and password to logging. The authors use a global identifier user name and password in several systems is difficult. So many approaches are proposed to implement the problem; among...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Oct 2011

    A Resolved IP Traceback Through Probabilistic Packet Marking Algorithm

    The major problem of network security in present years is DoS (Denial of Service) attacks, in order to protect the network from these attacks a research is implemented in the key streams of network security. Packet marking is always required to track few details of packet like its source and...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Oct 2011

    An Intelligent Distributed Reputation Based Mobile Intrusion Detection System

    The communication channel in Mobile Ad-hoc Networks is shared among the nodes in the network and the MAC layer plays an important role. Many attackers try to affect the features of Physical, Network or MAC layers. Also, the dynamic nature of the Mobile Ad-hoc Networks and the lack of centralized...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Oct 2011

    Trends and Prospectives of the Dynamic Resource Management Using Adaptive Techniques in Distributed System

    Dynamic resource management has been a hot-spot in recent years. As the applications like distributed real-time and embedded system can be benefited from dynamic management of computing resources and networking resources by optimizing, reconfiguring system resources and distributing critical applications over real time communication network at runtime in response to...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Sep 2011

    Comparison of AODV, DSR and TCRP Protocols for Routing Algorithms in WSNs for IEEE 802.15.4 Standard Based Devices

    IEEE 802.15.4 is the standard used for low-data-rate wireless personal area networks. While IEEE 802.15.4 defines Medium Access Control (MAC) layer and PHYsical layer (PHY), ZigBee takes care of higher layers (network and application). ZigBee is used for home, building and industrial control. It conforms to the IEEE 802.15.4 wireless...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Sep 2011

    Electrooptic Polymer Modulators Performance Improvement With Pulse Code Modulation Scheme in Modern Optical Communication Networks

    In the field of photonic modulation and sensing, the primary goal of the device engineer is to achieve the lowest possible switching power (or largest possible sensitivity), with the fastest switching speed, whilst maximizing the optical throughput of the device. To break through the current frequency limitations, adoption of new...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Jul 2012

    Multiple Sequence Alignment on the Grid Computing Using Cache Technique

    Multiple sequence alignment is an important problem and popular in the molecular biology. This is a basic problem that its solution could be used to proof and discover the similarity of the new sequence with other exist sequences; to define the evolution process of the family's sequences; as well as...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Jul 2012

    Securing AODV Routing Protocol From Black Hole Attack

    Ad-hoc networks are emerging technology, due to their spontaneous nature, are frequently established insecure environments, which makes them vulnerable to attacks. These attacks are happened due to the participating malicious nodes against different network services. Routing protocols, which act as the binding force in these networks, are a common target...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Jul 2012

    A Survey About Security of the Wireless Sensor Network

    The considerable advancement of Hardware manufacturing technology and the progress of efficient software algorithms formulate technically and economically feasible a network consist of a range of, small, low-priced sensors by means of wireless communications, that is, a wireless sensor network. Wireless sensor network has fascinated thorough importance from both academic...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Jul 2012

    ComFrame: A Communication Framework for Data Management in Mobile Location Based Services

    Recent research in mobile computing has shown that Location Based Services (LBS) is an emerging area in mobile applications. It refers that services provided to the user based on location. LBS become the most promising services of mobile computing besides voice and data services. It's growing in popularity due to...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Jul 2012

    QR Codes and Security Solutions

    Identification of objects and places in the real world is important, and 2-D printing code is useful to store identifiers of them. Any camera mobile device with capture function can read content from a barcode tag directly. When a barcode contains important data or privacy information, the risk of security...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Jul 2012

    Research Challenges in Web Data Mining

    With the exponential growth of information in online, the World Wide Web (WWW) is a fruitful area of data mining. Mining data over the web using different tools and technologies of data mining is termed as web mining. Web mining could be used to solve the information overload problems directly...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Jul 2012

    Web Learning Systems and Cognitive Learning: A Survey

    Web learning system is an innovative and powerful tool to enrich the teaching and learning processes. Web learning system has tremendous opportunities over the traditional learning environments. With the help of web learning system, different learning styles and approaches are achieved. The web learning system facilities to users experience, and...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Jul 2012

    VREL: A New Perspective of Virtual Reality in E-Learning

    The perspective of learning is changing dramatically with the advent of various electronic media and computing devices. E-learning refers learning through electronic devices, which are two dimensions in nature. The need of another dimension is inevitable in the people changing life style to acquire knowledge through E-learning. Producing 3D interactive...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Jul 2012

    Enterprise Wireless Fidelity Implementations Using Port Based Network Access Control (IEEE 802.1X)

    WI-FI (WIreless FIdelity) devices - well-known for their portability, flexibility and increased productivity are based on IEEE 802.11 standard. IEEE 802.11 WLAN, or Wi-Fi, is the most widely accepted broadband wireless networking technology, providing the highest transmission rate among wireless networking technologies. Enterprise Wireless Fidelity implementations have complicated requirements for...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Jul 2012

    A PCA-AIS Approach for Intrusion Detection

    Intrusion detection is now a significant part in computer and network security. Various intrusion detection approaches are presented to secure the network, but the performance of the system is reduced. Thus, to improve the detection rates and decrease false alarm rates in intrusion detection is important. The crux of an...

    Provided By International Journal of Computer Science and Telecommunications