International Journal of Computer Science and Telecommunications

Displaying 1-40 of 222 results

  • White Papers // Feb 2015

    Detection and Avoidance Deadlock for Resource Allocation in Heterogeneous Distributed Platforms

    In a heterogeneous distributed platforms large problem is distribute among the processors (such as among the computers of distributed computing system or among the computers of parallel computing system etc.) to make it cost effective and less time consuming instead of a computer system with single processor. There are more...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Feb 2015

    Information Technology Models for Project Management of Education Development

    In this paper, the authors are dedicated to the problem of the information technology models development for the innovative projects management of the educational sector modernization and development. The problems, which arise at each stages of the project lifecycle, were considered. The stages of the modernization and IT development and...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Feb 2015

    Proposed C.E.M (Cost Estimation Metrics): Estimation of Cost of Quality in Software Testing

    Reliability in software is produced by controlling its quality within budget. Over the time, researchers and practitioners have expressed their inability to accurately estimate costs associated with software development and it has become even more problematic as costs associated with development continue to increase. As a result, a lot of...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Feb 2015

    New Methods for TVWS Database Protocol

    In this paper, the authors study the authentication in the IEEE protocols (802.11-802.X1-802.11i- 802.16e - 802.22) and show the weakness and the problems that will arise when they use them and what efforts are done to overcome these problems. And also they analyze the database authentication. They find that IEEE...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Jan 2015

    Performance Analysis of Traffic Patterns over MANET Routing Protocols in Zigbee Personal Area Network

    Mobile ad hoc network is a network technique which connects two or more mobile computers with each other without existence of a central point of contact and without any network server, which is the role of each point, passes packets to other branches of the network. The proposed paper is...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Dec 2014

    Performance Evaluation of Various TCP Protocol over Broadband Hybrid Satellite Constellation Communication System

    In this paper, the authors present the evaluation performance of a hybrid satellite constellation network which provides internet access based on various Transport Control Protocol (TCP). Given known constraints on the hybrid satellite constellation resulting from network performance evaluation criteria. The evaluated satellite network uses the COMMStellation constellation topology operating...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Dec 2014

    Developing a Tracking and Mobile Mapping System

    In the past, positioning, tracking, mapping and navigation depend largely on astronomical observations that consist of measuring position of the sun or particular stars. Thus, orientation of any line or position - latitude, and longitude - of point can be determined. On the other hand, field observations of the relative...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Dec 2014

    A Propitious Iris Pattern Recognition Using Neural Network Based FFDTD and HD Approach

    A biometric system provides automatic identification of an individual based on a unique feature or characteristic possessed by the individual. An iris recognition system is a highly secure and confidence biometric identification system. In this paper, the iris recognition system is considered by using a neural network based feed forward...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Nov 2014

    A Framework to Enhance Classification Accuracy for Web Learning System

    In this paper, a framework for cognitive based adaptive Web learning system is presented. It focuses on users' cognitive learning process and activities, as well as the technology support needed. This paper applies data mining algorithms and neural network-based classification algorithms. To develop an effective Web learning system, learner's cognition...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Nov 2014

    EAGRP: Energy Aware Geographic Routing Protocol for Wireless Sensor Networks

    In this paper, the authors propose an energy efficient data forwarding protocol called Energy Aware Geographic Routing Protocol (EAGRP) for wireless sensor networks to extend the life time of the network. In EAGRP, both position information and energy are available at nodes used to route packets from sources to destination....

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Nov 2014

    Review of Gateway Selection Schemes for MANET to Internet Connectivity

    Now-a-days, MANETs becomes a most types of the networks used in many applications, which support a communications between several sources and destinations without using infrastructure mode. Since these networks are infrastructure free, so it required a mechanism to route the information from the sources to destinations and the routing protocols...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Nov 2014

    A Survey for Cognitive Radio Networks

    The rapid growth in wireless communications has contributed to a huge demand on the deployment of new wireless services in both the licensed and unlicensed frequency spectrum. Cognitive Radio (CR) is the enabling technology for supporting dynamic spectrum access: the policy that addresses the spectrum scarcity problem that is encountered...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Oct 2014

    Real Time and Wireless Smart Faults Detection Device for Wind Turbines

    In new energy development, wind power has boomed. It is due to the proliferation of wind parks and their operation in supplying the national electric grid with low cost and clean resources. Hence, there is an increased need to establish a proactive maintenance for wind turbine machines based on remote...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Oct 2014

    Robust Transmit Beamforming Based on Probability Specification in Cellular Cognitive Radio Networks

    In this paper, the authors design a downlink beamforming vector for a multiuser MISO cellular cognitive radio network with imperfect Channel State Information (CSI) at the secondary base station. The idea is to minimize the secondary BS transmit power subject to outage probability constraints to the QOS of the Secondary...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Oct 2014

    Measurement and Experimental Characterization of RSSI for Indoor WSN

    Recent advances in wireless communications and electronics have enabled the development of micro-sensors that can manage wireless communication. The characteristics of RSSI shows that the received signal strength will decrease with increased distance but sometimes due to multipath effects there are variations and fluctuations in the received signal strengths. In...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Sep 2014

    Mobility Support Using Bloom Filter in Content Oriented Networks

    Content oriented networks have been proposed as a new network architecture that does not rely on IP addresses, and these networks, content queries are routed based on the content name itself instead of a destination address. However, one problem that occurs with content oriented networks is the increased memory usage....

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Aug 2014

    Comparative Analysis of TDMA Scheduling Algorithms in Wireless Sensor Networks

    Energy conservation is a major issue in Wireless Sensor Network (WSN). In order to obtain energy conservation, Time Division Multiple Access (TDMA) has been discussed as one of the potential solution. Many researchers proposed TDMA as a Media Access Control (MAC) in order to conserve energy. The main advantage to...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Aug 2014

    Efficient Load Balancing Using VM Migration by QEMU-KVM

    Load balancing is a computer networking method which is used to distribute the load across computer clusters or multiple computers, central processing units to achieve optimal resource utilization, maximize throughput, minimize response time and prevent overload. There are various methods to balance the load. This paper discusses the design and...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Aug 2014

    Traffic Engineering Based Load Balancing in LTE-A Heterogeneous Network

    LTE-A is the latest cellular network technology. LTE-A is the use of Heterogeneous Networks (HetNets) which contains combinations of different cells such as of a macro cells and Low Power Nodes (LPNs). heterogeneous network is used to increase capacity of the system and as well as to increase the demand...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Jul 2014

    A New Hybrid Model for Predicting Change Prone Class in Object Oriented Software

    In the field of software engineering, during the development and maintenance of software, the information on the classes which are more prone to be changed is very useful. Developers can make more flexible software by modifying the part of classes which are more sensitive to changes. The incessant changes effected...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Jul 2014

    Comparative Study on 4G/LTE Cryptographic Algorithms Based on Different Factors

    Recently, (LTE) Long Term Evolution appeared as a robust technology to meet (4G) Fourth Generation cellular networks requirements. Apparently, there are three sets of cryptographic algorithms that work on LTE technology and each set based on core algorithm. Therefore, in this paper, the authors are focusing on reviewing the three...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Jun 2014

    Implementation of Traffic Engineering and Addressing QoS in MPLS VPN Based IP Backbone

    With increasing popularity and ever emerging business needs there was an immense focus to improve the Internet world and to provide guarantee for service delivery. Simplest example for this case is VoIP where two subscribers make a voice call through MPLS based backbone. The end subscribers should have similar quality...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // May 2014

    New Approach for UML Based Modeling of Relational Databases

    Now-a-days, object oriented approach is considered to be more reliable and efficient approach for developing real world applications. Mostly these applications based upon huge amount of data and data manipulations. In this paper, the authors propose new approach for UML based modeling of relational databases. Furthermore, they use UML class...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Apr 2014

    Data Security of Heterogeneous Devices in Ubiquitous Environment

    Today, the growing interest for mobile devices is a call for advanced researches in the emergence of 'Ubiquitous computing'. A ubiquitous computing is \"A paradigm shift where a technology becomes apparently invisible in the user life\". Intuitively it can be defined as making computer systems persistent in enhancing user interaction...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Apr 2014

    Software-Defined Radio Architecture for Broadband OFDM Transceivers

    In this paper, the authors present a Software-Defined Radio (SDR) system with reconfigurable architecture for OFDM transceivers. DSP-based architecture provides interoperability and adaptability among operational modes of the OFDM system. But limitations due to memory, bus speed and data type compatibility in DSP motivates SDR architecture over USRP boards. This...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Mar 2014

    MEEP: Multihop Energy Efficient Protocol for Heterogeneous Wireless Sensor Network

    Energy conservation of sensor nodes for increasing the network life is the most crucial design goal while developing efficient routing protocol for wireless sensor networks. Recent technological advances help in the development of wide variety of sensor nodes. Heterogeneity takes the advantage of different types of sensor nodes and improves...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Mar 2014

    Web Acceleration for Wireless Networks

    With the widespread use of tablets and Smartphone the demand for data services is increasing exponentially. WiMAX and LTE networks provide high speed data services to the end users but it is no match to the end user requirements. The users browse multimedia content websites or social media services and...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Feb 2014

    A Comprehensive Study of Open-Loop Spatial Multiplexing and Transmit Diversity for Downlink LTE

    Long Term Evolution (LTE), which standardized by the 3GPP group, is designed to have wider channels up to 20MHz, with low latency and packet optimized radio access technology. The peak data rate envisaged for LTE is 100 Mbps in downlink and 50 Mbps in the uplink. The 3GPP has chosen...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Feb 2014

    Security Issues and Contradict Measures in Wireless Mesh Networks

    As wireless networks have evolved into next generations, Wireless Mesh Networks (WMNs) have proved to be a massive infrastructure for better communication between enormous entity nodes. WMNs are extremely dependable, as every node is associated with all others likewise sketched in mesh layout. WMN network nodes consist of clients and...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Feb 2014

    An Overview of Intrusion Detection System (IDS) along with its Commonly Used Techniques and Classifications

    The area of intrusion detection is the central concept in overall network and computer security architecture. It is an important technology in business sector as well as in research area. By monitoring the computer and network resources, Intrusion Detection System (IDS) detects any of the misuse or unauthorized access which...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Jan 2014

    Performance Evaluation of MIMO and HARQ Techniques for LTE Uplink System

    In this paper, the authors carry out a performance evaluation of Multiple-Input Multiple-Output (MIMO) and Hybrid Automatic repeat ReQuest (HARQ) techniques for Single-Carrier Frequency Division Multiple Access (SCFDMA) of the LTE uplink system. Different MIMO schemes such as single-antenna port (SISO or SIMO), Transmit Diversity (TD) and Spatial Multiplexing (SM)...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Jan 2014

    Restructuring Network Infrastructure with Software Defined Networking

    Home network is very challenging to manage because of the complexity of underlying infrastructure. Network's underlying complexity is either hidden or exposed by the existing network interfaces, but the visible information is not necessarily helpful for the user to complete the desired tasks. However, underlying network and protocols can be...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Dec 2013

    Experimental Evaluation of Mobile IPv6 for Linux

    With the continuous development of mobile communications and internet technology, one of the major challenges is to achieve efficient mobility management in wireless networks. Internet protocols do not support mobility and wireless networking does not provide reliable connections to mobile users for real-time multimedia communications. For this reason, the Internet...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Dec 2013

    Fair Cloud Management System

    Cloud computing offers multiple advantages comparing to \"Traditional\" computing infrastructures. However, all customer data are stored on a Virtual Machine (VM) or on a cloud of a Service Provider (SP). Therefore, service quality and data safety are highly dependent on the SP. It also means that these issues are dependent...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Dec 2013

    OTPK PAKE Protocol with TRNG Based Key Generation

    In earlier, two smart card based password authentication key exchange protocols were proposed by lee et al. and Hwang et al. respectively. But neither of them achieves two factor authentication fully since they would become complete insecure once one factor is broken. To overcome these two factor authentication problem in...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Nov 2013

    Approach to Improving Localization Systems in Networks of Wireless Sensors

    In recent years, wireless sensor networks are central to the research activities of the scientific community, particularly given the vast potential applications such as medical care, smart homes, and or environmental monitoring. In the context of wireless sensor networks, the localization technique \"Range-free\" is more efficient with respect to the...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Nov 2013

    Algorithm for Weighted Association Rules for Sequential Data

    All the available algorithms working on arranging sequence in the database either in ascending or descending order. It is sometimes does not give result as per need. In the online admission process and in train/flight reservation, choices have significant role and if by using available algorithms for analysis purpose, the...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Nov 2013

    Performance Improvement of Information Exchange between the Virtual Machines on the Same Physical Host

    Virtualization environment provides VMs which are isolated from each other. This isolation helps co-resident VMs use original transport protocols like UDP and TCP for information exchange. Using original protocols does not take advantage of being on the same host of VMs because of unnecessarily overheads. Running VMs are processes on...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Oct 2013

    A Novel Approach for Script Based Password Generation by Using Image Partitioning

    With increasing demand of security, ample of security measures and techniques have been proposed in the literature. Text or password based authentication can be easily compromised with few finger strokes or attacks. Image-Based-Authentication (I.B.A.) is a good alternative since images are easier to recall than alphanumeric passwords. Therefore, in this...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Oct 2013

    Speed Performance of Intelligent Ant Sense Routing Protocol for Mobile Ad-Hoc Personal Area Network

    Now-a-days the Mobile Ad-hoc NETworks (MANETs) become an important field in the wireless area for user applications. Due to its dynamic nature of this networks the main problem is how to design an effective routing algorithm that can adapt its behavior to frequent and rapid changes in the network due...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Jun 2011

    Web Application - A Study on Comparing Software Testing Tools

    Web application script crashes and malformed dynamically generated web pages are common errors and they seriously impact the usability of Web applications. Static analysis tools for web page validation cannot handle the dynamically generated pages that are ubiquitous on today's Internet. The authors present a dynamic test generation technique for...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Jun 2011

    Efficient Raman Amplifiers Within Propagation and Multiplexing Techniques for High Capacity and Ultra Long Haul Transmission Systems

    Optical amplifiers are key elements of any fiber-optic communication system. Even though modern optical fibers have losses below 0.2 dB/km, a repeated amplification of the transmitted signal to its original strength becomes necessary at long enough distances. One solution for signal regeneration is the conversion of the optical signal into...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Jul 2011

    Agile Technology - A Novel Software Process Framework Analysis

    Agile methodologies have become the mainstream of software development due to their enriched practices. Some commonly used practices include collaborative development, meeting evolving requirements with working software, simple design, etc. These methods do not hold big upfront for early estimation of size, cost and duration due to uncertainty in requirements....

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Jul 2011

    Unsupervised Learning Algorithms to Identify the Dense Cluster in Large Datasets

    High-dimensional database is having large datasets while solving the cluster identification problem and for identifying dense clusters in a noisy data. The authors' analysis works to identifies clusters through the identification of densely intra connected sub graphs, they have employed a pattern recognition algorithms representation of the graph and solve...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Jul 2011

    Partition Algorithms - A Study and Emergence of Mining Projected Clusters in High-Dimensional Dataset

    High-dimensional data has a major challenge due to the inherent sparsity of the points. Existing clustering algorithms is inefficient to the required similarity measure is computed between data points in the full-dimensional space. In this paper, a number of projected clustering algorithms have been analyzed. However, most of them encounter...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Jul 2011

    Conceptual Cohesion of Classes in Object Oriented Systems

    Cohesion measures in Object-oriented software reflect particular interpretations, High cohesion positively impacts understanding, reuse and maintenance. This paper proposes a new measure based on analysis of the unstructured information embedded in the source code, such as comments and identifiers, the authors have the existing applications based on using the only...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Jul 2011

    Effect of the Feedback Function on the QoS in a Time Space Priority With Active Queue Management

    The basic idea behind an Active Queue Management (AQM) is to sense the congestion level within the network and inform the packet sources about, so that they reduce their sending rate. In literature a lot off mechanisms of AQM are studied. But there are not used in the context of...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Aug 2011

    Evaluation of Kalman Filtering Based Channel Estimation for LTE-Advanced

    For high data rate multimedia services and growing demand of wireless internet, in 2007 ITU invited proposals for 4th Next Generation Communication systems, for which 3GPP proposed LTE-A, based on Rel-10, fulfilling the requirements of IMT-A. In this paper, extension of two linear frequency-domain channel estimation techniques, LSE and LMMSE...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Aug 2011

    Mitigating App-DDoS Attacks on Web Servers

    In this paper, a lightweight mechanism is proposed to mitigate session flooding and request flooding app-DDoS attacks on web servers. App-DDoS attack is Application layer Distributed Denial of Service attack. This attack prevents legitimate users from accessing services. Numbers of mechanisms are available and can be installed on routers and...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Aug 2011

    High Speed Performance of Electrooptic Polymer Modulator Devices in Advanced Optical Communication Systems

    Electro-optic polymer modulator devices have been extensively studied and explored during the last few years. They have intrinsic advantages over conventional materials such as high-speed operation, compatibility with other materials and substrates, and the ability to make complex configurations and arrays. On the other hand, there have been problems with...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Aug 2011

    Discovering Services During Design Phase Using UML

    Service discovery has been recognized as an important aspect in the development of service centric systems, i.e., software systems which deploy web services. To develop such systems, it is necessary to identify services that can be combined in order to fulfill the functionality and achieve quality criteria of the system...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Aug 2011

    Buffer Efficient Fast Broadcasting Scheme

    A popular video can be broadcasted by partitioning the video into segments, which are broadcast on several channels simultaneously and periodically. This approach permits multiple users to share channels that lead to higher bandwidth employment. Previous schemes generally focus on reducing clients' waiting time. This paper studies another important issue,...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Apr 2011

    Ultra Wide Arrayed Waveguide Grating (AWG) Devices for Dense Wavelength Division Multiplexing Optical Communication Systems

    To meet the exploding demand for Internet and broad-band services, dense wavelength-division-multiplexing systems have been extended from long-haul transmission systems to metropolitan and access area networks. In such systems, compact and conventional arrayed-waveguide grating multi/de-multiplexers are required to reduce the cost of the systems. The evolution of broadband services will...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Nov 2010

    Issues of Implementation of Voice Over IP With Quality of Service: An Overview

    This paper explores various aspects regarding to the implementation of voice over Internet Protocol (IP) with Quality of Service and gives a detailed insight into this. Internet telephony utilizes the Internet medium to transfer audio between two or more clients in real-time, thus allowing the clients to make conversations simultaneously...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Nov 2010

    An Analytical Approach in Education for Teacher Development Using Information and Communication Technologies

    In this paper, an effort has been made to determine what kind of role Information Communication Technology is played in teacher Education and development. The fully skilled and equipped teacher are the necessarily of the present time. Ignoring this novel area of teacher development may endanger the future of Pakistan....

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Nov 2010

    A Frame Work for Virtual USB Devices Under Linux Environment

    In industry firmware development for USB devices is very demanding. This paper is to develop a framework for writing and testing the firmware for USB devices even before the devices are manufactured. Faulty hardware is often a bottleneck in firmware development and time is often lost due to this dilemma....

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Jun 2011

    High Transmission Performance of Radio Over Fiber Systems Over Traditional Optical Fiber Communication Systems Using Different Coding Formats for Long Haul

    In the present paper, Radio Over Fiber (ROF) transport systems have the potential to offer large transmission capacity, significant mobility and flexibility, as well as economic advantage due to its broad bandwidth and low attenuation characteristics. The authors have investigated parametrically and numerically the high performance of Radio over fiber...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Nov 2011

    A Novel Chain Based Wireless Data Sensor Network (ECBSN) Technique

    Wireless Sensor Networks (WSNs) have received tremendous attention in recent years because of the development of sensor devices, as well as wireless communication technologies. WSNs make it easier to monitor and control physical environments from remote locations and present many significant advantages over-wired sensor networks for a variety of civilian...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Nov 2011

    Analysis & Study of Application Layer Distributed Denial of Service Attacks for Popular Websites

    Application Layer is the most important for development life-cycle, Application layer Distributed Denial of Service (DDoS) attack is a continuous threat to the World Wide Web. Derived from the lower layers, new application-layer-based DDoS attacks utilizing legitimate HTTP requests over to victim resources are more unavailable. This issue may be...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Nov 2011

    Analysis of Crash Recovery Failure Detection With Quality of Services

    The authors develop a probabilistic model of the behavior of a crash-recovery target, i.e., one which has the ability to recover from the crash state. They show that the fail-free and the crash-stop are special cases of the crash-recovery run with Mean Time To Failure (MTTF) approaching to infinity and...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Nov 2011

    Implementation of SaaS in a Cloud Computing Environment

    Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. Cloud computing resources can be accessed from any...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Oct 2011

    A Review of Routing Mechanisms in Wireless Sensor Networks

    Research on Sensors is one of the major topics in computer and electronic fields. They used to monitor and control the physical environment such as buildings, forests and battlefields. According to these, applications, sensors are expected to be functional for a long period of time. Since the sensor networks include...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Oct 2011

    Effect of Training Algorithms on the Accuracy in Iris Patterns Recognition Using Neural Networks

    A biometric system provides automatic identification of an individual based on a unique feature or characteristic possessed by the individual. Iris recognition is regarded as the most reliable and accurate biometric identification system available. An approach for accurate Biometric Recognition and identification of Human Iris Patterns using Neural Network has...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Jan 2012

    QoS Based on Ant Colony Routing for Wireless Sensor Networks

    The Wireless Sensor Networks (WSNs) are composed of nodes communicating over a wireless media, without the need for physical infrastructure. In this type of topology, all nodes cooperate to ensure the proper management of the network (control, routing, etc.). Fully distributed nature of such networks is the problem of performance...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Jan 2012

    Secured Secret Sharing Over Single Path in VoIP With Consistent Data Transfer

    Voice over Internet Protocol (VoIP) is a new fancy and up growing technology. A major change in telecommunication industry is VoIP. The transmission of Real time voice data is not as easy as ordinary text data. The real time voice transmission faces lot of difficulties. It suffers from packet loss,...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Jan 2012

    Performance Modeling of Distributed Load Balancing Algorithm Using Neural Networks

    This paper presents a new approach that uses neural networks to predict the performance of a number of dynamic decentralized load balancing strategies. A distributed multicomputer system using any distributed load balancing strategy is represented by a unified analytical queuing model. A large simulation data set is used to train...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Jan 2012

    Stochastic Reward Nets Model for Time Based Software Rejuvenation in Virtualized Environment

    Modern business has a 24x7 non-stop running and the availability of the business continuity for everything, from everywhere, at all time is a growing requirement. System outages are more often due to software fault, than hardware fault. Software availability is one of the weakest links in system availability. Several studies...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Dec 2011

    Indoor Multipath Wireless Channel Experimental Characterization Utilizing Time Domain Techniques

    In this paper an experimental characterization of a typical indoor wireless propagation channel is performed. This channel characterization is needed for short range applications (

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Dec 2011

    X-as-a-Service: Cloud Computing With Google App Engine, Amazon Web Services, Microsoft Azure and Force.com

    Internet has become pervasive in the people daily life and Cloud computing is an emerging paradigm where computing resources are offered over the Internet as scalable, on-demand (Web) services. A company deploying an Internet service needs to invest huge amounts of money on infrastructure needs to serve possible users, which...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Dec 2011

    Java Based High Performance of Parallel Processing Application With JavaParty

    To achieve better performance in parallel processing, which is implemented based on java application. In this paper, the authors work on high performance of parallel processing in a local network that computer can be connected as a form of the cluster making available Java Virtual Machine (JVM). However, java is...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Dec 2011

    Performance of Video Conferencing in Unicast and Multicast Communication Using Protocol Independent Multicast Routing

    With video conferencing becoming extremely popular in wired and wireless network, efficient utilization of the network bandwidth is important to achieve Quality of Service (QOS). Internet Protocol (IP) multicast is a routing technique that allows IP traffic to be sent from one source or multiple sources and delivered to multiple...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Nov 2011

    Maximizing a Lifetime of Wireless Sensor Network by Scheduling

    The increase in the demand for Wireless Sensor Networks (WSNs) has intensified studies which aim to obtain energy-efficient solutions, since the energy storage limitation is critical in those systems. Traditional methods for sensor scheduling use either sensing coverage or network connectivity, but rarely both Schedule sensor nodes work alternatively by...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Nov 2011

    Residual Energy Aware Adaptive Clustering for Multimedia Data in Wireless Sensor Network

    Wireless Sensor Network consists of large number of Sensor Nodes. The main aim is to increase the lifetime of the network as the sensors are deployed mainly to perform unattended operations like Environmental Monitoring, Seismic activity Detection, Industrial Monitoring and Control, etc. All these activities require Robust Wireless Communication Protocol...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Nov 2011

    Designing Different Models of Robust IP/MPLS Over DWDM Networks

    Both IP/MPLS and DWDM layers can provide various resilient schemes to protect traffic from disruptions due to network failures. At the same time, both technologies provide the ability to realize virtual private networks. The aim of this paper, is to identify an optimal solution which provides a compromise between resilience...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Nov 2011

    Secured-Destination Sequenced Distance Vector (SSDV) Routing Protocol for Mobile Ad-Hoc Networks

    A Mobile Ad hoc NETwork (MANET) is a group of wireless mobile nodes dynamically shaping a provisional network devoid of the use of any existing network infrastructure or centralized management. In MANETs, security is the major challenge due to the dynamic topology, which is because of the mobility of the...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Nov 2011

    An All Approach for Multi-Focus Image Fusion Using Neural Network

    'Image Fusion' is the Information from multiple images which are combined to generate the new image, the generated image is more suitable for humans and machines for further image-processing tasks like image segmentation, edge detection, stereo matching, enhancement, extraction and recognition. Novel feature-level multi-focus image fusion technique is proposed in...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Nov 2011

    Performance Analysis of Congestion Control Scheme for Mobile Communication Network

    The paper formulated a dynamic channel allocation model with one-level buffering in controlling congestion in Global System for Mobile Communication (GSM) network with a view to prevent call loss or degradation in quality of service of calls. The system model was implemented using object-oriented programming. An algorithm was developed for...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Nov 2011

    XML Keyword Search: Coarseness Evaluation Under Ambiguity Concerns for Effective Results

    An XML search engine XSearch that addresses an open drawback in XML keyword search: given relevant matches to keywords, the way to compose question results properly in order that they will be effectively ranked and simply digested by users. The approaches adopted within the literature generate either overwhelmingly giant results...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Nov 2011

    Cryptography - Analysis of Enhanced Approach for Secure Online Exam Process Plan

    To conduct the exam for thousand people offline process have several problems, to avoid those problems with gone for the process online exam is a field that is very popular and made many security assurances. Even though it fails to control cheating, online exams have not been widely adopted well,...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Nov 2011

    Visual Cryptography Authentication for Data Matrix Codes

    An Identity Card is any document which may be used to verify aspects of an identity. If issued in the form of a small, mostly standard-sized card, it is usually called an Identity Card (IC). It plays in the society, threats of fraud, tampering, and identity theft arises. Thus, security...

    Provided By International Journal of Computer Science and Telecommunications