International Journal of Computer Science Issues

Displaying 1-40 of 795 results

  • White Papers // Mar 2014

    Real-Time Scheduling Algorithm Based on Dynamic Priority for Multi-Data Transmission

    In response to the demands of heterogeneous data acquisition, data transmission effectiveness and reliability in emergencies as well as environmental wireless monitoring etc., this paper presents a data transmission queue optimization algorithm based on dynamic priority. The algorithm dynamically assign priorities to different data according to their importance, historical transmission...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    A Dynamic Materialized View Selection in a Cloud-Based Data Warehouse

    A data warehouse is system which that support decision-making in production environment. Classical data warehouse management system is often optimized by improving query performance. Such improvement is casually achieved by using caches, indexes and materialized views and required selecting the best set of data structures (materialized views, indexes, etc...). In...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    Defending the Sensitive Data Using Lattice Structure in Privacy Preserving Association Rule Mining

    Innovation of association rules from enormous databases ensures benefits for the enterprises since such rules can be very operative in enlightening the knowledge that leads to tactical decisions. Association rule mining has acknowledged a proportion of attention in the collaborative business community and several algorithms were proposed to improve the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    Multi-Level Service Composition in Supervised Cloud Computing

    The role of AN agent system in an exceedingly cloud network is to spot the simplest obtainable resources and share them through a service created accessible over the net. Hence they act as inter-mediator for providing cloud services to varied users. The cloud service customers determine numerous service compositions through...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    Combining Clustering Solutions With Varying Number of Clusters

    Cluster ensemble algorithms have been used in different field like data mining, bioinformatics and pattern recognition. Many of them use label correspondence as a step which can be performed with some accuracy if all the input partitions are generated with same k. Thus these algorithms produce good results if this...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    Scalable and Efficient Self-Join Processing Technique in RDF Data

    Efficient management of RDF data plays an important role in successfully understanding and fast querying data. Although the current approaches of indexing in RDF Triples such as property tables and vertically partitioned solved many issues; however, they still suffer from the performance in the complex self-join queries and insert data...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    University Communication at Intelligent Ad Hoc Network using SIP services

    The frantic nature of technological advances in the area of multimedia communications, compounded with the convergence of telecommunication and computer networks has led to the emergence of new class of applications sometime called ubiquitous computing or ambient intelligence. In this paper the authors present a project which converges with this...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Iris Detection and Normalization in Image Domain Based on Morphological Features

    The interface of computer technologies and biology is having a huge impact on society. Human recognition research projects promises new life to many security-consulting. Iris recognition is considered to be the most reliable biometric authentication system. Very few iris recognition algorithms were commercialized. The authors implemented a system that process...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    An Enhanced AODV Routing Protocol for MANETs

    In the last few years, many studies have been performed in MANETs, especially in unicast routing protocols. In this paper, a new routing protocol for Mobile Ad-hoc NETworks (MANETs) is presented; the proposed Power-Hop based Ad-hoc On-demand Distance Vector (AODV) is named PH-AODV, it uses the node power and the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    An Efficient Pipelined Technique for Signcryption Algorithms

    Signcryption algorithms are based on public key cryptography. The main advantage of signcryption algorithms is to provide both confidentiality and authenticity in one step. Hence, signcryption algorithms lower both communication and computation overheads. This reduction, in communication and computation overheads, makes signcryption algorithms more suitable for realtime applications than other...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Analysis the Impacts of Transmission Range of AODV & DSDV Ad-Hoc Network Protocols Performance over Mobile WiMAX Networks

    The IEEE 802.16 technology (WiMAX) is facing great challenges due to owning high mobility of mobile nodes, limited radio coverage of wireless devices, time varying nature of wireless medium. The transmission range of Base Station (BS) has a vital influence and must achieve the most economic case of energy in...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Hierarchical Cluster-Based Routing Protocols for Wireless Sensor Networks - A Survey

    Hierarchical cluster-based routing protocols are considered as one of the most efficient routing protocols in Wireless Sensor Networks (WSN) due to its higher energy efficiency, network scalability, and lower data retransmission. In cluster-based routing protocols the network is divided into clusters each with a Cluster Head (CH) that is used...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Developing Web-Based Semantic Expert Systems

    Expert systems have provided solutions to different problems, from strategic planning of marketing to consulting in process reengineering. In general, the majority of studies published are based on advanced techniques of artificial intelligence, using specific languages or tools that require certain knowledge of reasoning processes to model information. With the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Fingerprint Classification Techniques: A Review

    A biometric is the automatic identification of an individual that is based on physiological or behavioral characteristics. Due to its security-related applications and the current world political climate, biometric is currently the subject of intense research by both private and academic institutions. Fingerprint is emerging as the most common and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    A Decentralized Fault Tolerant model for Grid Computing

    A current trend in high-performance computing is the use of large-scale computing grids. These platforms consist of geographically distributed cluster federations gathering thousands of nodes. At this scale, node and network failures are no more exceptions, but belong to the normal system behavior. Thus, grid applications must tolerate failures and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Secure Routing in Mobile Ad hoc Networks: Laurel verification based Node Selection Strategy

    As the nodes are self resourced in ad hoc networks, the denial of service as relay hop by any node is frequent. This is due to resource levels of that node are lower than the threshold, in another act the node may be irrational and selfish. In such cases the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Imposing Fairness in Electronic Commerce

    In the recent years, electronic commerce has gained much importance. Traditional commerce is slowly being replaced with ecommerce and more people tend to prefer doing their shopping online. One of the main reasons for this attraction is the convenience the e-commerce provides. Customers can choose from a lot of different...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    A Mobile Agent Approach for IDS in Mobile Ad Hoc Network

    Mobile ad hoc networks are a group of wireless computers, forming a communication network that has no predetermined structure. Its highly vulnerable to attacks due to the open medium dynamically changing network topology, co-operative algorithm and lack of centralized. The fact is that security is a critical problem. This paper...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Classification and Recognition of Fingerprints using Self Organizing Maps(SOM)

    Feature extraction and matching are important in Automatic Fingerprint Identification Systems (AFIS) in the field of biometric technology. In this work, a filter-based algorithm uses a bank of Gabor filters to capture local and global features in a fingerprint as a compact fixed length FingerCode. These fingercodes are matched using...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    A Proposed Cryptosystem Algorithm Based on Two Different Chaotic Systems (PCA2CS) for Securing the Colored Images

    In this paper, a proposed cryptosystem algorithm based on two different chaotic systems is presented. Chen's chaotic system and Henon chaotic system is used as different chaotic systems to obtain the authors' proposed encryption algorithm; in order to meet the requirements of secure image transfer. The proposed encryption algorithm will...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Exploring Technical Deployments of IPv6 on University LANs

    The current version of the Internet Protocol version 4 (IPv4) addressing scheme is officially exhausted. Internet Protocol version 6 (IPv6) is the next generation internet protocol proposed by the Internet Engineering Task Force (IETF) to supplant the current IPv4. Every device connected to the internet is expected to support this...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    VoIP versus VoMPLS Performance Evaluation

    Increasing number of Internet users forced them to use popular services, television and telephone, to use the Internet as a medium to reach their customers. Organizations are now applying VoIP and MPLS for providing the convergence of voice and data communications over single network infrastructure. VoIP (Voice over Internet Protocol)...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Information Security Modelling In an ELearning Environment

    The growth of information technology and communication has led the world to a dramatic change. This paper performs a research on the e-learning strategies involved in organizations, especially educational institutions. E-learning industry is poised to become one of the largest sectors in the world economy. A review into the literature...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Revealing a Novel Method for Detecting Positive and Negative Optimal Performance Association Rules in Very Large Databases Using BPSO

    Association rules mining is one of the useful data mining algorithm in presenting meaningful information through database. One of the important challenges for association rules mining is that; it might be extracted millions of rules which mostly are idol; furthermore current methods only seek positive rules which finding out the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Efficient Web Data Extraction Using Clusteringapproach in Web Usage Mining

    Web mining which is a type of data mining is used to extract web data from web pages. Web usage mining is used to record user behavior. These records are further used to extract data which helps in search engine optimization. In this research paper the authors propose an approach...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Secure Remote Access to Devices in a Smart Grid

    Seamless and efficient access to remote devices is imperative in the network operations of a smart grid. Traditional management mechanisms will have to be modified in order to sustain networks such as the ones utilized in the smart grid and the types of devices lying on them. Current multi-domain collaborative...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Change detection in Migrating Parallel Web Crawler: A Neural Network Based Approach

    Search engines are the tools for web site navigation and search. Search engines maintain indices for web documents and provide search facilities by continuously downloading web pages for processing. This process of downloading web pages is known as web crawling. In this paper the authors propose A neural network based...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Validation of Architecture of Migrating Parallel Web Crawler using Finite State Machine

    The process of downloading web pages is known as web crawling. In this paper the authors validate the architecture of migrating parallel web crawler using finite state machine. The method for migrating parallel web crawling approach will detect changes in the content and structure. Also domain specific crawling will yield...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    A Comprehensive Review for Disk Scheduling Algorithms

    This paper aims to discuss the structure of a disk and the hardware activities involved in the retrieval of data on a direct access storage device. Tackles and compute the different Disk Scheduling algorithms such as First Come First Serve (FCFS), Shortest Seek Time First (SSTF), Scan, Look, Circular Scan...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Presenting a Novel Method for Mining Association Rules Using Binary Genetic Algorithm

    Today, mining association rule is one of the important data mining algorithms which enable managers to make correct decisions based on the knowledge obtained from the detected patterns by databases. Traditional algorithms of discovering association rules such as Apriori and FP-growth may extract millions of rules from databases, many of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    A Pattern Based Methodology for Evolution Management in Business Process Reuse

    Today, there are Process-Aware Information Systems (PAIS) with a set of business process models which vary over time to meet the new requirements. In a competitive environment, the key challenge of enterprises is to reduce the cost and time of process design and application development. For this purpose, research on...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    An Exploration Scrutiny of Systems Performance Monitoring Tools: An Applications and Agentless Server Approach

    Performance monitoring tools play a critical role in the overall productivity of business organizations by providing the necessary means of measuring the performance of the system or server attributes of the organization. They measure system or server throughput and processor usage through programmed software or technological platforms. Their monitoring is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Enhanced Authentication Protocol EAP-TTLS Using Encrypted ECDSA

    The growing trend of wireless networks and risks associated with them has led to the development of authentication and application of stronger cryptographic methods to maintain a more robust security. This paper examined and compared two types of developed authentication protocols to provide an alternative method using strong cryptographic methods....

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Data Hiding over Mobile Phones Using Socket Network Communication

    The mobile phone is considered as wireless means of communication produced by sophisticated modern technology. After expanding use of mobile phones, establishing hidden communication is an important subject of security that has gained increasing importance. Therefore need to adopt the technology more sophisticated and more secret and preserve the information,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Effect of WiMAX Networks on IPTV Technology

    The IEEE 802.16 technology (WiMAX) is a better alternative to 3G or wireless LAN networks for providing last mile connectivity by radio link due to its high data rates, low cost of deployment and large coverage area and ease of Use. With the IEEE 802.16 2005 mobility amendment, WiMAX promises...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    A New Trust Reputation System for E-Commerce Applications

    Robust Trust Reputation Systems (TRS) provide a most trustful reputation score for a specific product or service so as to support relying parties taking the right decision while interacting with an e-commerce application. Thus, TRS must rely on an appropriate architecture and suitable algorithms that are able to improve the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    A Survey on Using Data Mining Techniques for Online Social Network Analysis

    In this paper the authors take into consideration the concepts of using algorithmic and data mining perspective of Online Social Networks (OSNs), with special emphasis on latest hot topics of research area. There are several factors which has made the study of OSNs gain enormous importance by researchers. Few such...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Extending CertificateLess Authentication for Wireless Sensor Networks: A Novel Insight

    Security is quite challenging in Wireless Sensor Networks (WSN) because of their constrained nature in terms of resources such as limited memory, low processing power, limited bandwidth etc. Authentication in low power devices is still considered to be an expensive process. Certificateless signature is one of the approaches to facilitate...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Conceptual Framework for Internet of Things' Virtualization via OpenFlow in Context-aware Networks

    A novel conceptual framework is presented in this paper with an aim to standardize and virtualize Internet of Things' (IoT) infrastructure through the deploying OpenFlow technology. The framework can receive e-services based on context information leaving the current infrastructure un-changed. This framework allows the active collaboration of heterogeneous devices and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Review of Software Reuse Processes

    Clients expect that enterprise software systems, which are continually growing in complexity, are of high quality, with reasonable price and have a short time to market. To find ways to meet with the increasing demands of business, software engineers are forced to find ways to streamline development process. Software reuse...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Cloud Computing and Its Applications in the World of Networking

    The paper discusses the most discussed topic nowadays 'Cloud computing'. Cloud computing is becoming a buzzword. The paper explains the concept, Services provided by cloud computing and different service providers. Also it works out how this technology can be harnessed to bring benefits to the challenges of the business, in...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Email Mining: A Review

    E-mail is one of the most widely used ways of written communication over the internet, and its traffic has increased exponentially with the advent of World Wide Web. The increase in email traffic comes also with an increase in the use of emails for illegitimate purpose. Phishing, Spamming, email bombing,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    A Generalized Framework of Privacy Preservation in Distributed Data Mining for Unstructured Data Environment

    The management of unstructured data is recognized as one of the major unsolved problems in the information industry and data mining paradigm. Unstructured data in computerized information that either does not have a data model and there are not easily usable by data mining. This paper proposes a solution to...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Data Optimization From a Multiple Species Network Using Modified SFLA(Shuffled Frog Leaping Algorithm)

    In this paper, the authors present a novel approach that uses inter-species sequences homology to connect the networks of multi species and possible more species and possible more species together with gene ontology dependencies in order to improve protein classification for research work. Proteins are involved in many for all...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Presentation an Approach for Scientific Workflow Distribution on Cloud Computing Data Center's Servers to Optimization Usage of Computational Resource

    In a distributed system Timing and mapping the priority of tasks among processors is one of the issues attracted most of attention to itself. This issue consists of mapping a DAG with a set of tasks on a number of parallel processors and its purpose is allocating tasks to the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    A Novel Chaotic Encryption Scheme Based on Pseudorandom Bit Padding

    Cryptography is always very important in data origin authentications, entity authentication, data integrity and confidentiality. In recent years, a variety of chaotic cryptographic schemes have been proposed. These schemes have typical structure which performed the permutation and the diffusion stages, alternatively. The random number generators are intransitive in cryptographic schemes...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Implementing an Expert Diagnostic Assistance System for Car Failure and Malfunction

    Applications in fault diagnosis are continuously being implemented to serve different sectors. Car failure detection is a sequence of diagnostic processes that necessitates the deployment of expertise. The Expert System (ES) is one of the leading Artificial Intelligence (AI) techniques that have been adopted to handle such task. This paper...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Performance Analysis of Various Routing Protocols for Motorway Surveillance System Cameras' Network

    The Motorway Surveillance System (MSS) is one of the most important technologies used to collect information about road conditions and then provide that collected information to motorway users. The routing in networks used by these systems is a critical task due to the highly dynamic environments. This paper presents performance...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    An Analysis of Internet Banking Security of Foreign Subsidiary Banks in Australia: A Customer Perspective

    Internet banking has been deployed more frequently over the past few decades to support and improve the operational and managerial performance within the banking industry. However, the security issues of confidentiality, integrity and privacy have become increasingly more serious concerns in Internet banking systems because of the potential negative impact...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Improving Accuracy of Authentication Process Via Short Free Text Using Bayesian Network

    The internet security problems are a crucial threat to all users in the cyber world. One of the important problems about internet security concerned with user classification and authentication. However, there are multiple components to classify and authenticate users. The first one is using username/password and the second method is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Survey of NoC and Programming Models Proposals for MPSoC

    The aim of this paper is to give briefing of the concept of network-on-chip and programming model topics on multiprocessors System-on-Chip world, an attractive and relatively new field for academia. Numerous proposals from academia and industry are selected to highlight the evolution of the implementation approaches both on NoC proposals...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Energy Efficient Security Preserving VM Live Migration in Data Centers for Cloud Computing

    Virtualization is an innovation that has widely been utilized in modern data centers for cloud computing to realize energy-efficient operations of servers. Virtual Machine (VM) migration brings multiple benefits such as resource distribution and energy aware consolidation. Server consolidation achieves energy efficiency by enabling multiple instances of operating systems to...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Semantic Service Composition With QoS End -To- End Constraints Via AND/OR Graphs

    In this paper, the authors present AND/OR graphs as a unifying framework for semantic service composition that considers users QoS constraints. The main virtues of this representation among others are its ability to express semantic inference and to deal with QoS constraints from different perspectives. In addition, it correctly handles...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Graphical Model Based for Robust Fault Diagnosis

    In this paper, robust Fault Detection and Isolation (FDI) design in nonlinear uncertain dynamic system, with chemical and thermodynamic phenomenon, is addressed. The methodology using a Bond Graph (BG) representation in Linear Fractional Transformation (LFT) form is shown to be a valuable tool for developing dynamic threshold generators and achieving...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Modify AODV Routing Protocol to Improve Motorway Surveillance System Performance

    This paper presents an algorithm to modify the Ad hoc On-demand Distance Vector (AODV) routing protocol in order to improve the routing performance in motorway surveillance systems. The proposed protocol has all the characteristics of the original AODV routing protocol since it follows all the steps of the route discovery...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Comparison Between Poissonian and Markovian Primary Traffics in Cognitive Radio Networks

    Cognitive Radio generates a big interest as a key cost-effective solution for the underutilization of frequency spectrum in legacy communication networks. The objective of this paper lies in conducting a performance evaluation of the end-to-end message delivery under both Markovian and Poissonian primary traffics in lossy Cognitive Radio networks. The...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Identification of Nominated Classes for Software Refactoring Using Object-Oriented Cohesion Metrics

    The production of well-developed software reduces the cost of the software maintainability. Therefore, many software metrics have been developed to measure the quality of the software design. Measuring class cohesion is considered as one of the most important software quality measurements. Unfortunately, most of approaches that have been proposed on...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Improving Performance of Distributed Data Mining (DDM) With Multi-Agent System

    Autonomous agents and multi-agent systems (or agents) and knowledge discovery (or data mining) are two of the most active areas in information technology. Ongoing research has revealed a number of intrinsic challenges and problems facing each area, which can't be addressed solely within the confines of the respective discipline. A...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    MVSDAP: A New Extensible, Modifiable and Secure Data Access Pattern for Layered Information Systems

    Nowadays, in software architecture especially in agile methodologies dynamicity, extendibility and modifiability are important challenges. In three layered architecture, plenty of patterns are provided for data access layer. In this paper, additional to secure access to data and dynamic validation controls, emphasis is on extendibility and modifiability of data access...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    A Novel Approach of Query Optimization for Genetic Population

    In relational database large information is maintained and organized so that user can get the desired information in predictable and reliable fashion through the query processing. Retrieving these results in timely manner is Query Optimization. Optimization is a process of choosing most efficient way to execute a SQL query. This...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    An Improved Authentication Scheme for Passport Verification Using Watermarking Technique

    The prominent problem in passport authentication is to authenticate the passport document for its owner. The critical factor of this authentication procedure is to establish a correspondence between Passport's photo and its owner. A passport document contains holder details in supplement to the holder's signature. The authors propose an authentication...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Design and Performance Evaluation of a New Irregular Fault-Tolerant Multistage Interconnection Network

    Inter-connecting processors and linking them efficiently to the memory modules in a parallel computer is not an easy task. Hence, an interconnection network that provides the desired connectivity and performance at minimum cost is required. The design of a suitable interconnection network for inter-processor communication is one of the key...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Mean Square Error Performance of OFDM Systems Against Signal to Noise Ratio Under Different Fading Channels

    The well known problem in an Orthogonal Frequency Division Multiplexing (OFDM) system is its sensitivity to frequency offset. Most of the coherent OFDM systems transmit pilot symbols on some of the subcarriers to estimate channel attenuation and also add a Cyclic Prefix (CP) to avoid inter carrier interference and inter...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Cryptography Based E-Commerce Security: A Review

    E-commerce is a powerful tool for business transformation that allows companies to enhance their supply-chain operation, reach new markets, and improve services for customers as well as for providers. Implementing the E-commerce applications that provide these benefits may be impossible without a coherent, consistent approach to E-commerce security. E-commerce has...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    A Learning Automata Based Algorithm for Solving Capacitated Vehicle Routing Problem

    This paper presents an approximate algorithm based on distributed learning automata for solving capacitated vehicle routing problem. The Vehicle Routing Problem (VRP) is an NP-hard problem and Capacitated Vehicle Routing Problem variant (CVRP) is considered here. This problem is one of the NP-hard problems and for this reason many approximate...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    OFDM Transmission Performance Evaluation in V2X Communication

    The Vehicle to Vehicle and Vehicle to Infrastructure V2X communication systems are one of the main topics in research domain. Its performance evaluation is an important step before their on board's integration into vehicles and its probable real deployment. Being the first of a series of three publications, this paper...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Software Metrics to Estimate Software Quality Using Software Component Reusability

    Today, most of the applications developed using some existing libraries, codes, open sources, etc. As a code is accessed in a program, it is represented as the software component. Such as in java beans and in .net ActiveX controls are the software components. These components are ready to use programming...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Development of Personal Learning Network System to Build e-Literacy

    A great nation can be seen one of them from the high culture of literacy communities. Indonesian nation still needs many efforts to create a culture of high literacy of the society. The potential is most likely to be initiated immediately is the education community. In this regard, this paper...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Project Management Phases of a SCADA System for Automation of Electrical Distribution Networks

    The aim of this paper is, firstly, to recall the basic concepts of SCADA (Supervisory Control And Data Acquisition) systems, to present the project management phases of SCADA for real time implementation, and then to show the need of the automation for Electricity Distribution Companies (EDC) on their distribution networks...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Energy Aware Reliable Routing Protocol (EARRP) for Mobile Ad Hoc Networks Using Bee Foraging Behavior and Ant Colony Optimization

    Energy aware reliable routing in mobile ad hoc networks is an astonishing task and in this paper, the authors propose to design, develop such protocol which will be a good solution. For developing such protocol EARRP, two swarm intelligence techniques are involved namely ant colony optimization and bee colony foraging...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Dynamic Replica Control Algorithm for Periodic/Aperiodic Transactions in Distributed Real-Time Databases

    Maintaining consistency between the actual state of the real-time object of the external environment and its images as reflected by all its replicas distributed over multiple nodes is one of the most important issue affecting the design of real-time database. Efficient replica control algorithm can contribute significantly to maintain this...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Performance Evaluation of QoS Parameters in Dynamic Spectrum Sharing for Heterogeneous Wireless Communication Networks

    Cognitive radio nodes have been proposed as means to improve the spectrum utilization. It reuses the spectrum of a primary service provider under the condition that the primary service provider services are not harmfully interrupted. A cognitive radio can sense its operating environment's conditions and it is able to reconfigure...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    A Priority Based Bandwidth Reservation Protocol for Wireless Mesh Networks

    In wireless mesh networks, when compared with traditional applications, multimedia application requires the need of inflexible Quality of Services (QoS) for high speed digital audio and videos. Under such a condition, the need of proper resource allocation is extremely handy. In this paper, the authors propose to develop a Priority...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Analysis of the Similarities and Differences Between MPLS Label Distribution Protocols RSVP and CR-LDP

    MPLS is a new technology that offers to open up the Internet by providing many additional services to applications using IP. MPLS forwards data using labels that are attached to each data packet. These labels must be distributed between the nodes that comprise the network. Many of the new services...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Comparison Based Analysis of Different Cryptographic and Encryption Techniques Using Message Authentication Code (MAC) in Wireless Sensor Networks (WSN)

    Wireless Sensor Networks (WSN) are becoming popular day by day, however one of the main issue in WSN is its limited resources. The authors have to look to the resources to create Message Authentication Code (MAC) keeping in mind the feasibility of technique used for the sensor network at hand....

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Fuzzy-Controlled Load-Balanced Broadcasting (FLB) in Clustered Mobile Ad Hoc Networks

    A mobile ad hoc network is a wireless network that is self-organized with many mobile nodes. No static infrastructure such as a wired backbone is available. All nodes are free to move around and the network topology may change frequently. Due to limited transmission range of wireless network interface, nodes...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Robust Iris Recognition Based on Statistical Properties of Walsh Hadamard Transform Domain

    In this paper, a new approach of iris image feature extraction technique based on the statistical properties of Walsh Hadamard Transform (WHT) domain is proposed. A Canny Edge Detection followed by Hough Transform is used to detect the iris boundaries in the digital image of an eye. The segmented and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Ultra-Wide-Band Microstrip Concentric Annular Ring Antenna for Wireless Communications

    In this paper, a new design technique for bandwidth enhancement of concentric microstrip annular ring slot antennas is presented. Using this technique, an Ultra-Wide-Band antenna is designed with simulated bandwidth of 111.29%. Microstrip patch antennas are widely used because of their several advantages such as light weight, low volume, low...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Peer to Peer Networks Management Survey

    Peer-to-Peer systems are based on the concept of resources localization and mutualisation in dynamic context. In specific environment such as mobile networks, characterized by high variability and dynamicity of network conditions and performances, where nodes can join and leave the network dynamically, resources reliability and availability constitute a critical issue....

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Privacy Preserving RFE-SVM for Distributed Gene Selection

    The Support Vector Machine Recursive Feature Elimination (SVMRFE) is one of the most effective feature selection methods which has been successfully used in selecting informative genes for cancer classification. This paper extends this well-studied algorithm to the privacy preserving distributed data mining issue. For gene selection over multiple patient data...

    Provided By International Journal of Computer Science Issues