International Journal of Computer Science and Telecommunications

Displaying 1-40 of 222 results

  • White Papers // Feb 2015

    Detection and Avoidance Deadlock for Resource Allocation in Heterogeneous Distributed Platforms

    In a heterogeneous distributed platforms large problem is distribute among the processors (such as among the computers of distributed computing system or among the computers of parallel computing system etc.) to make it cost effective and less time consuming instead of a computer system with single processor. There are more...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Feb 2015

    Information Technology Models for Project Management of Education Development

    In this paper, the authors are dedicated to the problem of the information technology models development for the innovative projects management of the educational sector modernization and development. The problems, which arise at each stages of the project lifecycle, were considered. The stages of the modernization and IT development and...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Feb 2015

    Proposed C.E.M (Cost Estimation Metrics): Estimation of Cost of Quality in Software Testing

    Reliability in software is produced by controlling its quality within budget. Over the time, researchers and practitioners have expressed their inability to accurately estimate costs associated with software development and it has become even more problematic as costs associated with development continue to increase. As a result, a lot of...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Feb 2015

    New Methods for TVWS Database Protocol

    In this paper, the authors study the authentication in the IEEE protocols (802.11-802.X1-802.11i- 802.16e - 802.22) and show the weakness and the problems that will arise when they use them and what efforts are done to overcome these problems. And also they analyze the database authentication. They find that IEEE...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Jan 2015

    Performance Analysis of Traffic Patterns over MANET Routing Protocols in Zigbee Personal Area Network

    Mobile ad hoc network is a network technique which connects two or more mobile computers with each other without existence of a central point of contact and without any network server, which is the role of each point, passes packets to other branches of the network. The proposed paper is...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Dec 2014

    Performance Evaluation of Various TCP Protocol over Broadband Hybrid Satellite Constellation Communication System

    In this paper, the authors present the evaluation performance of a hybrid satellite constellation network which provides internet access based on various Transport Control Protocol (TCP). Given known constraints on the hybrid satellite constellation resulting from network performance evaluation criteria. The evaluated satellite network uses the COMMStellation constellation topology operating...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Dec 2014

    Developing a Tracking and Mobile Mapping System

    In the past, positioning, tracking, mapping and navigation depend largely on astronomical observations that consist of measuring position of the sun or particular stars. Thus, orientation of any line or position - latitude, and longitude - of point can be determined. On the other hand, field observations of the relative...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Dec 2014

    A Propitious Iris Pattern Recognition Using Neural Network Based FFDTD and HD Approach

    A biometric system provides automatic identification of an individual based on a unique feature or characteristic possessed by the individual. An iris recognition system is a highly secure and confidence biometric identification system. In this paper, the iris recognition system is considered by using a neural network based feed forward...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Nov 2014

    A Framework to Enhance Classification Accuracy for Web Learning System

    In this paper, a framework for cognitive based adaptive Web learning system is presented. It focuses on users' cognitive learning process and activities, as well as the technology support needed. This paper applies data mining algorithms and neural network-based classification algorithms. To develop an effective Web learning system, learner's cognition...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Nov 2014

    EAGRP: Energy Aware Geographic Routing Protocol for Wireless Sensor Networks

    In this paper, the authors propose an energy efficient data forwarding protocol called Energy Aware Geographic Routing Protocol (EAGRP) for wireless sensor networks to extend the life time of the network. In EAGRP, both position information and energy are available at nodes used to route packets from sources to destination....

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Nov 2014

    Review of Gateway Selection Schemes for MANET to Internet Connectivity

    Now-a-days, MANETs becomes a most types of the networks used in many applications, which support a communications between several sources and destinations without using infrastructure mode. Since these networks are infrastructure free, so it required a mechanism to route the information from the sources to destinations and the routing protocols...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Nov 2014

    A Survey for Cognitive Radio Networks

    The rapid growth in wireless communications has contributed to a huge demand on the deployment of new wireless services in both the licensed and unlicensed frequency spectrum. Cognitive Radio (CR) is the enabling technology for supporting dynamic spectrum access: the policy that addresses the spectrum scarcity problem that is encountered...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Oct 2014

    Real Time and Wireless Smart Faults Detection Device for Wind Turbines

    In new energy development, wind power has boomed. It is due to the proliferation of wind parks and their operation in supplying the national electric grid with low cost and clean resources. Hence, there is an increased need to establish a proactive maintenance for wind turbine machines based on remote...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Oct 2014

    Robust Transmit Beamforming Based on Probability Specification in Cellular Cognitive Radio Networks

    In this paper, the authors design a downlink beamforming vector for a multiuser MISO cellular cognitive radio network with imperfect Channel State Information (CSI) at the secondary base station. The idea is to minimize the secondary BS transmit power subject to outage probability constraints to the QOS of the Secondary...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Oct 2014

    Measurement and Experimental Characterization of RSSI for Indoor WSN

    Recent advances in wireless communications and electronics have enabled the development of micro-sensors that can manage wireless communication. The characteristics of RSSI shows that the received signal strength will decrease with increased distance but sometimes due to multipath effects there are variations and fluctuations in the received signal strengths. In...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Sep 2014

    Mobility Support Using Bloom Filter in Content Oriented Networks

    Content oriented networks have been proposed as a new network architecture that does not rely on IP addresses, and these networks, content queries are routed based on the content name itself instead of a destination address. However, one problem that occurs with content oriented networks is the increased memory usage....

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Aug 2014

    Comparative Analysis of TDMA Scheduling Algorithms in Wireless Sensor Networks

    Energy conservation is a major issue in Wireless Sensor Network (WSN). In order to obtain energy conservation, Time Division Multiple Access (TDMA) has been discussed as one of the potential solution. Many researchers proposed TDMA as a Media Access Control (MAC) in order to conserve energy. The main advantage to...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Aug 2014

    Efficient Load Balancing Using VM Migration by QEMU-KVM

    Load balancing is a computer networking method which is used to distribute the load across computer clusters or multiple computers, central processing units to achieve optimal resource utilization, maximize throughput, minimize response time and prevent overload. There are various methods to balance the load. This paper discusses the design and...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Aug 2014

    Traffic Engineering Based Load Balancing in LTE-A Heterogeneous Network

    LTE-A is the latest cellular network technology. LTE-A is the use of Heterogeneous Networks (HetNets) which contains combinations of different cells such as of a macro cells and Low Power Nodes (LPNs). heterogeneous network is used to increase capacity of the system and as well as to increase the demand...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Jul 2014

    A New Hybrid Model for Predicting Change Prone Class in Object Oriented Software

    In the field of software engineering, during the development and maintenance of software, the information on the classes which are more prone to be changed is very useful. Developers can make more flexible software by modifying the part of classes which are more sensitive to changes. The incessant changes effected...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Jul 2014

    Comparative Study on 4G/LTE Cryptographic Algorithms Based on Different Factors

    Recently, (LTE) Long Term Evolution appeared as a robust technology to meet (4G) Fourth Generation cellular networks requirements. Apparently, there are three sets of cryptographic algorithms that work on LTE technology and each set based on core algorithm. Therefore, in this paper, the authors are focusing on reviewing the three...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Jun 2014

    Implementation of Traffic Engineering and Addressing QoS in MPLS VPN Based IP Backbone

    With increasing popularity and ever emerging business needs there was an immense focus to improve the Internet world and to provide guarantee for service delivery. Simplest example for this case is VoIP where two subscribers make a voice call through MPLS based backbone. The end subscribers should have similar quality...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // May 2014

    New Approach for UML Based Modeling of Relational Databases

    Now-a-days, object oriented approach is considered to be more reliable and efficient approach for developing real world applications. Mostly these applications based upon huge amount of data and data manipulations. In this paper, the authors propose new approach for UML based modeling of relational databases. Furthermore, they use UML class...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Apr 2014

    Data Security of Heterogeneous Devices in Ubiquitous Environment

    Today, the growing interest for mobile devices is a call for advanced researches in the emergence of 'Ubiquitous computing'. A ubiquitous computing is \"A paradigm shift where a technology becomes apparently invisible in the user life\". Intuitively it can be defined as making computer systems persistent in enhancing user interaction...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Apr 2014

    Software-Defined Radio Architecture for Broadband OFDM Transceivers

    In this paper, the authors present a Software-Defined Radio (SDR) system with reconfigurable architecture for OFDM transceivers. DSP-based architecture provides interoperability and adaptability among operational modes of the OFDM system. But limitations due to memory, bus speed and data type compatibility in DSP motivates SDR architecture over USRP boards. This...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Mar 2014

    MEEP: Multihop Energy Efficient Protocol for Heterogeneous Wireless Sensor Network

    Energy conservation of sensor nodes for increasing the network life is the most crucial design goal while developing efficient routing protocol for wireless sensor networks. Recent technological advances help in the development of wide variety of sensor nodes. Heterogeneity takes the advantage of different types of sensor nodes and improves...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Mar 2014

    Web Acceleration for Wireless Networks

    With the widespread use of tablets and Smartphone the demand for data services is increasing exponentially. WiMAX and LTE networks provide high speed data services to the end users but it is no match to the end user requirements. The users browse multimedia content websites or social media services and...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Feb 2014

    An Overview of Intrusion Detection System (IDS) along with its Commonly Used Techniques and Classifications

    The area of intrusion detection is the central concept in overall network and computer security architecture. It is an important technology in business sector as well as in research area. By monitoring the computer and network resources, Intrusion Detection System (IDS) detects any of the misuse or unauthorized access which...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Feb 2014

    A Comprehensive Study of Open-Loop Spatial Multiplexing and Transmit Diversity for Downlink LTE

    Long Term Evolution (LTE), which standardized by the 3GPP group, is designed to have wider channels up to 20MHz, with low latency and packet optimized radio access technology. The peak data rate envisaged for LTE is 100 Mbps in downlink and 50 Mbps in the uplink. The 3GPP has chosen...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Feb 2014

    Security Issues and Contradict Measures in Wireless Mesh Networks

    As wireless networks have evolved into next generations, Wireless Mesh Networks (WMNs) have proved to be a massive infrastructure for better communication between enormous entity nodes. WMNs are extremely dependable, as every node is associated with all others likewise sketched in mesh layout. WMN network nodes consist of clients and...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Jan 2014

    Restructuring Network Infrastructure with Software Defined Networking

    Home network is very challenging to manage because of the complexity of underlying infrastructure. Network's underlying complexity is either hidden or exposed by the existing network interfaces, but the visible information is not necessarily helpful for the user to complete the desired tasks. However, underlying network and protocols can be...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Jan 2014

    Performance Evaluation of MIMO and HARQ Techniques for LTE Uplink System

    In this paper, the authors carry out a performance evaluation of Multiple-Input Multiple-Output (MIMO) and Hybrid Automatic repeat ReQuest (HARQ) techniques for Single-Carrier Frequency Division Multiple Access (SCFDMA) of the LTE uplink system. Different MIMO schemes such as single-antenna port (SISO or SIMO), Transmit Diversity (TD) and Spatial Multiplexing (SM)...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Dec 2013

    Fair Cloud Management System

    Cloud computing offers multiple advantages comparing to \"Traditional\" computing infrastructures. However, all customer data are stored on a Virtual Machine (VM) or on a cloud of a Service Provider (SP). Therefore, service quality and data safety are highly dependent on the SP. It also means that these issues are dependent...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Dec 2013

    OTPK PAKE Protocol with TRNG Based Key Generation

    In earlier, two smart card based password authentication key exchange protocols were proposed by lee et al. and Hwang et al. respectively. But neither of them achieves two factor authentication fully since they would become complete insecure once one factor is broken. To overcome these two factor authentication problem in...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Dec 2013

    Experimental Evaluation of Mobile IPv6 for Linux

    With the continuous development of mobile communications and internet technology, one of the major challenges is to achieve efficient mobility management in wireless networks. Internet protocols do not support mobility and wireless networking does not provide reliable connections to mobile users for real-time multimedia communications. For this reason, the Internet...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Nov 2013

    Performance Improvement of Information Exchange between the Virtual Machines on the Same Physical Host

    Virtualization environment provides VMs which are isolated from each other. This isolation helps co-resident VMs use original transport protocols like UDP and TCP for information exchange. Using original protocols does not take advantage of being on the same host of VMs because of unnecessarily overheads. Running VMs are processes on...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Nov 2013

    Approach to Improving Localization Systems in Networks of Wireless Sensors

    In recent years, wireless sensor networks are central to the research activities of the scientific community, particularly given the vast potential applications such as medical care, smart homes, and or environmental monitoring. In the context of wireless sensor networks, the localization technique \"Range-free\" is more efficient with respect to the...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Nov 2013

    Algorithm for Weighted Association Rules for Sequential Data

    All the available algorithms working on arranging sequence in the database either in ascending or descending order. It is sometimes does not give result as per need. In the online admission process and in train/flight reservation, choices have significant role and if by using available algorithms for analysis purpose, the...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Oct 2013

    Coupling Two Chaotic Systems in Order to Increasing the Security of a Communication System - Study and Real Time FPGA Implementation

    A Pseudo Random Numbers Generator (PRNG) based on chaotic systems is developed in this paper. The main goal of this paper is to increase the security of a chaotic crypto system especially against known plaintext and chosen plaintext attacks by coupling two chaotic systems, the h

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Oct 2013

    Performance Analysis and Deployment of VoLTE Mechanisms Over 3GPP LTE-Based Networks

    Long term evolution based networks lack native support for Circuit Switched (CS) services. The Evolved Packet System (EPS) which includes the Evolved UMTS Terrestrial Radio Access Network (E-UTRAN) and Evolved Packet Core (EPC) is a purely all-IP packet system. This introduces the problem of how to provide voice call support...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Dec 2014

    Performance Evaluation of Various TCP Protocol over Broadband Hybrid Satellite Constellation Communication System

    In this paper, the authors present the evaluation performance of a hybrid satellite constellation network which provides internet access based on various Transport Control Protocol (TCP). Given known constraints on the hybrid satellite constellation resulting from network performance evaluation criteria. The evaluated satellite network uses the COMMStellation constellation topology operating...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Dec 2014

    Developing a Tracking and Mobile Mapping System

    In the past, positioning, tracking, mapping and navigation depend largely on astronomical observations that consist of measuring position of the sun or particular stars. Thus, orientation of any line or position - latitude, and longitude - of point can be determined. On the other hand, field observations of the relative...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Dec 2014

    A Propitious Iris Pattern Recognition Using Neural Network Based FFDTD and HD Approach

    A biometric system provides automatic identification of an individual based on a unique feature or characteristic possessed by the individual. An iris recognition system is a highly secure and confidence biometric identification system. In this paper, the iris recognition system is considered by using a neural network based feed forward...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Nov 2014

    A Framework to Enhance Classification Accuracy for Web Learning System

    In this paper, a framework for cognitive based adaptive Web learning system is presented. It focuses on users' cognitive learning process and activities, as well as the technology support needed. This paper applies data mining algorithms and neural network-based classification algorithms. To develop an effective Web learning system, learner's cognition...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Feb 2015

    Detection and Avoidance Deadlock for Resource Allocation in Heterogeneous Distributed Platforms

    In a heterogeneous distributed platforms large problem is distribute among the processors (such as among the computers of distributed computing system or among the computers of parallel computing system etc.) to make it cost effective and less time consuming instead of a computer system with single processor. There are more...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Feb 2015

    Information Technology Models for Project Management of Education Development

    In this paper, the authors are dedicated to the problem of the information technology models development for the innovative projects management of the educational sector modernization and development. The problems, which arise at each stages of the project lifecycle, were considered. The stages of the modernization and IT development and...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Feb 2015

    Proposed C.E.M (Cost Estimation Metrics): Estimation of Cost of Quality in Software Testing

    Reliability in software is produced by controlling its quality within budget. Over the time, researchers and practitioners have expressed their inability to accurately estimate costs associated with software development and it has become even more problematic as costs associated with development continue to increase. As a result, a lot of...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Feb 2015

    New Methods for TVWS Database Protocol

    In this paper, the authors study the authentication in the IEEE protocols (802.11-802.X1-802.11i- 802.16e - 802.22) and show the weakness and the problems that will arise when they use them and what efforts are done to overcome these problems. And also they analyze the database authentication. They find that IEEE...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Feb 2014

    An Overview of Intrusion Detection System (IDS) along with its Commonly Used Techniques and Classifications

    The area of intrusion detection is the central concept in overall network and computer security architecture. It is an important technology in business sector as well as in research area. By monitoring the computer and network resources, Intrusion Detection System (IDS) detects any of the misuse or unauthorized access which...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Nov 2013

    Performance Improvement of Information Exchange between the Virtual Machines on the Same Physical Host

    Virtualization environment provides VMs which are isolated from each other. This isolation helps co-resident VMs use original transport protocols like UDP and TCP for information exchange. Using original protocols does not take advantage of being on the same host of VMs because of unnecessarily overheads. Running VMs are processes on...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Oct 2014

    Real Time and Wireless Smart Faults Detection Device for Wind Turbines

    In new energy development, wind power has boomed. It is due to the proliferation of wind parks and their operation in supplying the national electric grid with low cost and clean resources. Hence, there is an increased need to establish a proactive maintenance for wind turbine machines based on remote...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Oct 2014

    Robust Transmit Beamforming Based on Probability Specification in Cellular Cognitive Radio Networks

    In this paper, the authors design a downlink beamforming vector for a multiuser MISO cellular cognitive radio network with imperfect Channel State Information (CSI) at the secondary base station. The idea is to minimize the secondary BS transmit power subject to outage probability constraints to the QOS of the Secondary...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Oct 2014

    Measurement and Experimental Characterization of RSSI for Indoor WSN

    Recent advances in wireless communications and electronics have enabled the development of micro-sensors that can manage wireless communication. The characteristics of RSSI shows that the received signal strength will decrease with increased distance but sometimes due to multipath effects there are variations and fluctuations in the received signal strengths. In...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Sep 2014

    Mobility Support Using Bloom Filter in Content Oriented Networks

    Content oriented networks have been proposed as a new network architecture that does not rely on IP addresses, and these networks, content queries are routed based on the content name itself instead of a destination address. However, one problem that occurs with content oriented networks is the increased memory usage....

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Aug 2014

    Comparative Analysis of TDMA Scheduling Algorithms in Wireless Sensor Networks

    Energy conservation is a major issue in Wireless Sensor Network (WSN). In order to obtain energy conservation, Time Division Multiple Access (TDMA) has been discussed as one of the potential solution. Many researchers proposed TDMA as a Media Access Control (MAC) in order to conserve energy. The main advantage to...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Aug 2014

    Efficient Load Balancing Using VM Migration by QEMU-KVM

    Load balancing is a computer networking method which is used to distribute the load across computer clusters or multiple computers, central processing units to achieve optimal resource utilization, maximize throughput, minimize response time and prevent overload. There are various methods to balance the load. This paper discusses the design and...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Aug 2014

    Traffic Engineering Based Load Balancing in LTE-A Heterogeneous Network

    LTE-A is the latest cellular network technology. LTE-A is the use of Heterogeneous Networks (HetNets) which contains combinations of different cells such as of a macro cells and Low Power Nodes (LPNs). heterogeneous network is used to increase capacity of the system and as well as to increase the demand...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Jul 2014

    A New Hybrid Model for Predicting Change Prone Class in Object Oriented Software

    In the field of software engineering, during the development and maintenance of software, the information on the classes which are more prone to be changed is very useful. Developers can make more flexible software by modifying the part of classes which are more sensitive to changes. The incessant changes effected...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Jul 2014

    Comparative Study on 4G/LTE Cryptographic Algorithms Based on Different Factors

    Recently, (LTE) Long Term Evolution appeared as a robust technology to meet (4G) Fourth Generation cellular networks requirements. Apparently, there are three sets of cryptographic algorithms that work on LTE technology and each set based on core algorithm. Therefore, in this paper, the authors are focusing on reviewing the three...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Jun 2014

    Implementation of Traffic Engineering and Addressing QoS in MPLS VPN Based IP Backbone

    With increasing popularity and ever emerging business needs there was an immense focus to improve the Internet world and to provide guarantee for service delivery. Simplest example for this case is VoIP where two subscribers make a voice call through MPLS based backbone. The end subscribers should have similar quality...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Oct 2013

    Coupling Two Chaotic Systems in Order to Increasing the Security of a Communication System - Study and Real Time FPGA Implementation

    A Pseudo Random Numbers Generator (PRNG) based on chaotic systems is developed in this paper. The main goal of this paper is to increase the security of a chaotic crypto system especially against known plaintext and chosen plaintext attacks by coupling two chaotic systems, the h

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Jun 2013

    A Proposed Campus Building Process in Cloud Computing

    A good understanding of the cloud computing technology, its components and their interrelationships is crucial for decision makers who intend to adopt this novel technology. Towards the end-goal of establishing a simple cloud computing platform which satisfies some of the scientific needs of the academic and research community within the...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Feb 2013

    A Protected and Preserve Database for Development of Business

    Database security is important to preserve the confidentiality of data contained by an organization. The development of a protected database consists of many to achieve the most wanted security level within a database. It is very important in business or in industry to preserve and protect the user's data. The...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Jun 2013

    Secure Analysis for Secure Routing Protocols over MANET

    Security is one of the important aspects in Mobile Ad-hoc NETwork (MANET). Also routing algorithm in MANET is dissimilar than traditional routing. This paper provides limits of traditional routing protocols if used to MANET. This paper also describes routing protocols at this time used in MANET and place focus on...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Sep 2013

    Acknowledge Enabled Secure Algorithm for Dynamically Updating Programs Installed in Wireless Sensor Nodes

    Wireless sensor networks comprised of several battery powered sensor nodes deployed in hostile environment. There are several programs installed in wireless sensor nodes, time to time these programs need to update in secure manner, such that any unauthorized person could not update the programs. Sensor nodes have several constraints so...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Dec 2013

    Fair Cloud Management System

    Cloud computing offers multiple advantages comparing to \"Traditional\" computing infrastructures. However, all customer data are stored on a Virtual Machine (VM) or on a cloud of a Service Provider (SP). Therefore, service quality and data safety are highly dependent on the SP. It also means that these issues are dependent...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Sep 2013

    A Review Study on the Privacy Preserving Data Mining Techniques and Approaches

    With the extensive amount of data stored in databases and other repositories it is very important to develop a powerful and effective mean for analysis and interpretation of such data for extracting the interesting and useful knowledge that could help in decision making. Data mining is such a technique which...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Dec 2013

    OTPK PAKE Protocol with TRNG Based Key Generation

    In earlier, two smart card based password authentication key exchange protocols were proposed by lee et al. and Hwang et al. respectively. But neither of them achieves two factor authentication fully since they would become complete insecure once one factor is broken. To overcome these two factor authentication problem in...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Aug 2013

    Implementation of MAC Layer Security Protocol in WiMAX Using OMNET++ Simulator

    WiMAX IEEE 802.16 is stated as worldwide interoperability for microwave access intended to facilitate the interoperation and adaptation of wireless MAN. WiMAX is capable of providing high data output and low delays in different modes of operation. For these reasons WiMAX is useful in organizational and end-client structures. Before the...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Sep 2013

    An Efficient Reactive Routing Security Scheme Based on RSA Algorithm for Preventing False Data Injection Attack in WSN

    Wireless sensor networks are vulnerable to various attacks. Injecting false data attack is one of the serious threats to wireless sensor network. In this paper, adversary reports bogus information to the sink which causes error decision at upper level and energy waste in en-route nodes. Several authentication techniques using en-route...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Mar 2013

    Data Classification for Recognizing the Web Application

    In this paper, the authors present a solution to distinguish the different applications running on port 80 with HTTP protocol; from that helping firewall to detect the attack and to try to prevent it. This paper is relatively a typical problem; by there are many different applications such as game,...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Jan 2014

    Restructuring Network Infrastructure with Software Defined Networking

    Home network is very challenging to manage because of the complexity of underlying infrastructure. Network's underlying complexity is either hidden or exposed by the existing network interfaces, but the visible information is not necessarily helpful for the user to complete the desired tasks. However, underlying network and protocols can be...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Nov 2013

    Approach to Improving Localization Systems in Networks of Wireless Sensors

    In recent years, wireless sensor networks are central to the research activities of the scientific community, particularly given the vast potential applications such as medical care, smart homes, and or environmental monitoring. In the context of wireless sensor networks, the localization technique \"Range-free\" is more efficient with respect to the...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // May 2012

    Iris Recognition Using a Scalar Based Template in Eigen-Space

    This paper proposes a novel technique for iris recognition in the context of biometric identification of a person. The iris is a portion of the inner eye of an individual and contains an abstract and randomly generated texture pattern arising from orientation of complex tissues within this region. This random...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // May 2012

    An Innovative Clustering Method for MANET Based on Cluster Convergence

    Mobile ad hoc networks have special properties and one of the most significant of those properties is nodes mobility which in part plays a considerable role in network's different parameters. Many efforts were made to make an infrastructure for these networks. In these infrastructures or clusters, a main node called...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // May 2012

    Review on Routing Algorithms in Wireless Mesh Networks

    Wireless Mesh Networks (WMNs) have emerged as a key technology for next-generation wireless networking. This paper focuses on a variety of routing protocols that are used in wireless mesh networks and identify the performance of these routing protocols. The performance is done with regards to load balancing, packet delivery ratio,...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // May 2012

    A Survey on Taxonomies of Attacks and Vulnerabilities in Computer Systems

    Security evaluation of a system is a complicated problem. The majority of the recent efforts in Security evaluation involve for discovering well-known Vulnerabilities. Discovering unidentified Vulnerabilities yet mostly remains a subjective procedure. The procedure knows how to be improved by considering the Characteristics and behavior of well-known Vulnerabilities. The information...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // May 2012

    Measurement of Object Oriented Software Usability Using Fuzzy AHP

    Software usability became an important quality factor in recent years due to the increasing demand of interactive software systems. Now mostly systems are developing using object-oriented methodology. The object-oriented methodology reduces design complexity, so enhances usability. Also object-oriented approach improves the usability of software system when software engineering process combined...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // May 2012

    Analysing Grid Security Issues and Some Preliminary Approaches for Secure Environment in Grid

    Grid computing is a wide area parallel distributed computing environment where idle processor cycles and underutilized storages of geographically dispersed resources are utilized optimum way which act as a supercomputer. In this paper, the authors identify and explain the problematic key security issues and propose briefly some novel approaches for...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // May 2012

    Virtual Network Computing Based Remote Desktop Access

    Cloud computing means using multiple server computers via a digital network as though they were one computer. Often, the services available is considered part of cloud computing. Cloud computing broadens the range of applications offered to mobile end-users with demanding applications in terms of graphical hardware, such as 3D virtual...

    Provided By International Journal of Computer Science and Telecommunications