International Journal of Computer Science Issues

Displaying 1-40 of 795 results

  • White Papers // Mar 2014

    Real-Time Scheduling Algorithm Based on Dynamic Priority for Multi-Data Transmission

    In response to the demands of heterogeneous data acquisition, data transmission effectiveness and reliability in emergencies as well as environmental wireless monitoring etc., this paper presents a data transmission queue optimization algorithm based on dynamic priority. The algorithm dynamically assign priorities to different data according to their importance, historical transmission...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    A Dynamic Materialized View Selection in a Cloud-Based Data Warehouse

    A data warehouse is system which that support decision-making in production environment. Classical data warehouse management system is often optimized by improving query performance. Such improvement is casually achieved by using caches, indexes and materialized views and required selecting the best set of data structures (materialized views, indexes, etc...). In...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    Defending the Sensitive Data Using Lattice Structure in Privacy Preserving Association Rule Mining

    Innovation of association rules from enormous databases ensures benefits for the enterprises since such rules can be very operative in enlightening the knowledge that leads to tactical decisions. Association rule mining has acknowledged a proportion of attention in the collaborative business community and several algorithms were proposed to improve the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    Multi-Level Service Composition in Supervised Cloud Computing

    The role of AN agent system in an exceedingly cloud network is to spot the simplest obtainable resources and share them through a service created accessible over the net. Hence they act as inter-mediator for providing cloud services to varied users. The cloud service customers determine numerous service compositions through...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    Combining Clustering Solutions With Varying Number of Clusters

    Cluster ensemble algorithms have been used in different field like data mining, bioinformatics and pattern recognition. Many of them use label correspondence as a step which can be performed with some accuracy if all the input partitions are generated with same k. Thus these algorithms produce good results if this...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    Scalable and Efficient Self-Join Processing Technique in RDF Data

    Efficient management of RDF data plays an important role in successfully understanding and fast querying data. Although the current approaches of indexing in RDF Triples such as property tables and vertically partitioned solved many issues; however, they still suffer from the performance in the complex self-join queries and insert data...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    University Communication at Intelligent Ad Hoc Network using SIP services

    The frantic nature of technological advances in the area of multimedia communications, compounded with the convergence of telecommunication and computer networks has led to the emergence of new class of applications sometime called ubiquitous computing or ambient intelligence. In this paper the authors present a project which converges with this...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Iris Detection and Normalization in Image Domain Based on Morphological Features

    The interface of computer technologies and biology is having a huge impact on society. Human recognition research projects promises new life to many security-consulting. Iris recognition is considered to be the most reliable biometric authentication system. Very few iris recognition algorithms were commercialized. The authors implemented a system that process...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    An Enhanced AODV Routing Protocol for MANETs

    In the last few years, many studies have been performed in MANETs, especially in unicast routing protocols. In this paper, a new routing protocol for Mobile Ad-hoc NETworks (MANETs) is presented; the proposed Power-Hop based Ad-hoc On-demand Distance Vector (AODV) is named PH-AODV, it uses the node power and the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    An Efficient Pipelined Technique for Signcryption Algorithms

    Signcryption algorithms are based on public key cryptography. The main advantage of signcryption algorithms is to provide both confidentiality and authenticity in one step. Hence, signcryption algorithms lower both communication and computation overheads. This reduction, in communication and computation overheads, makes signcryption algorithms more suitable for realtime applications than other...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Analysis the Impacts of Transmission Range of AODV & DSDV Ad-Hoc Network Protocols Performance over Mobile WiMAX Networks

    The IEEE 802.16 technology (WiMAX) is facing great challenges due to owning high mobility of mobile nodes, limited radio coverage of wireless devices, time varying nature of wireless medium. The transmission range of Base Station (BS) has a vital influence and must achieve the most economic case of energy in...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Hierarchical Cluster-Based Routing Protocols for Wireless Sensor Networks - A Survey

    Hierarchical cluster-based routing protocols are considered as one of the most efficient routing protocols in Wireless Sensor Networks (WSN) due to its higher energy efficiency, network scalability, and lower data retransmission. In cluster-based routing protocols the network is divided into clusters each with a Cluster Head (CH) that is used...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Developing Web-Based Semantic Expert Systems

    Expert systems have provided solutions to different problems, from strategic planning of marketing to consulting in process reengineering. In general, the majority of studies published are based on advanced techniques of artificial intelligence, using specific languages or tools that require certain knowledge of reasoning processes to model information. With the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Fingerprint Classification Techniques: A Review

    A biometric is the automatic identification of an individual that is based on physiological or behavioral characteristics. Due to its security-related applications and the current world political climate, biometric is currently the subject of intense research by both private and academic institutions. Fingerprint is emerging as the most common and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    A Decentralized Fault Tolerant model for Grid Computing

    A current trend in high-performance computing is the use of large-scale computing grids. These platforms consist of geographically distributed cluster federations gathering thousands of nodes. At this scale, node and network failures are no more exceptions, but belong to the normal system behavior. Thus, grid applications must tolerate failures and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Secure Routing in Mobile Ad hoc Networks: Laurel verification based Node Selection Strategy

    As the nodes are self resourced in ad hoc networks, the denial of service as relay hop by any node is frequent. This is due to resource levels of that node are lower than the threshold, in another act the node may be irrational and selfish. In such cases the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Imposing Fairness in Electronic Commerce

    In the recent years, electronic commerce has gained much importance. Traditional commerce is slowly being replaced with ecommerce and more people tend to prefer doing their shopping online. One of the main reasons for this attraction is the convenience the e-commerce provides. Customers can choose from a lot of different...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    A Mobile Agent Approach for IDS in Mobile Ad Hoc Network

    Mobile ad hoc networks are a group of wireless computers, forming a communication network that has no predetermined structure. Its highly vulnerable to attacks due to the open medium dynamically changing network topology, co-operative algorithm and lack of centralized. The fact is that security is a critical problem. This paper...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Classification and Recognition of Fingerprints using Self Organizing Maps(SOM)

    Feature extraction and matching are important in Automatic Fingerprint Identification Systems (AFIS) in the field of biometric technology. In this work, a filter-based algorithm uses a bank of Gabor filters to capture local and global features in a fingerprint as a compact fixed length FingerCode. These fingercodes are matched using...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    A Proposed Cryptosystem Algorithm Based on Two Different Chaotic Systems (PCA2CS) for Securing the Colored Images

    In this paper, a proposed cryptosystem algorithm based on two different chaotic systems is presented. Chen's chaotic system and Henon chaotic system is used as different chaotic systems to obtain the authors' proposed encryption algorithm; in order to meet the requirements of secure image transfer. The proposed encryption algorithm will...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Exploring Technical Deployments of IPv6 on University LANs

    The current version of the Internet Protocol version 4 (IPv4) addressing scheme is officially exhausted. Internet Protocol version 6 (IPv6) is the next generation internet protocol proposed by the Internet Engineering Task Force (IETF) to supplant the current IPv4. Every device connected to the internet is expected to support this...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    VoIP versus VoMPLS Performance Evaluation

    Increasing number of Internet users forced them to use popular services, television and telephone, to use the Internet as a medium to reach their customers. Organizations are now applying VoIP and MPLS for providing the convergence of voice and data communications over single network infrastructure. VoIP (Voice over Internet Protocol)...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Information Security Modelling In an ELearning Environment

    The growth of information technology and communication has led the world to a dramatic change. This paper performs a research on the e-learning strategies involved in organizations, especially educational institutions. E-learning industry is poised to become one of the largest sectors in the world economy. A review into the literature...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Revealing a Novel Method for Detecting Positive and Negative Optimal Performance Association Rules in Very Large Databases Using BPSO

    Association rules mining is one of the useful data mining algorithm in presenting meaningful information through database. One of the important challenges for association rules mining is that; it might be extracted millions of rules which mostly are idol; furthermore current methods only seek positive rules which finding out the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Efficient Web Data Extraction Using Clusteringapproach in Web Usage Mining

    Web mining which is a type of data mining is used to extract web data from web pages. Web usage mining is used to record user behavior. These records are further used to extract data which helps in search engine optimization. In this research paper the authors propose an approach...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Secure Remote Access to Devices in a Smart Grid

    Seamless and efficient access to remote devices is imperative in the network operations of a smart grid. Traditional management mechanisms will have to be modified in order to sustain networks such as the ones utilized in the smart grid and the types of devices lying on them. Current multi-domain collaborative...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Change detection in Migrating Parallel Web Crawler: A Neural Network Based Approach

    Search engines are the tools for web site navigation and search. Search engines maintain indices for web documents and provide search facilities by continuously downloading web pages for processing. This process of downloading web pages is known as web crawling. In this paper the authors propose A neural network based...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Validation of Architecture of Migrating Parallel Web Crawler using Finite State Machine

    The process of downloading web pages is known as web crawling. In this paper the authors validate the architecture of migrating parallel web crawler using finite state machine. The method for migrating parallel web crawling approach will detect changes in the content and structure. Also domain specific crawling will yield...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    A Comprehensive Review for Disk Scheduling Algorithms

    This paper aims to discuss the structure of a disk and the hardware activities involved in the retrieval of data on a direct access storage device. Tackles and compute the different Disk Scheduling algorithms such as First Come First Serve (FCFS), Shortest Seek Time First (SSTF), Scan, Look, Circular Scan...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Presenting a Novel Method for Mining Association Rules Using Binary Genetic Algorithm

    Today, mining association rule is one of the important data mining algorithms which enable managers to make correct decisions based on the knowledge obtained from the detected patterns by databases. Traditional algorithms of discovering association rules such as Apriori and FP-growth may extract millions of rules from databases, many of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    A Pattern Based Methodology for Evolution Management in Business Process Reuse

    Today, there are Process-Aware Information Systems (PAIS) with a set of business process models which vary over time to meet the new requirements. In a competitive environment, the key challenge of enterprises is to reduce the cost and time of process design and application development. For this purpose, research on...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    An Exploration Scrutiny of Systems Performance Monitoring Tools: An Applications and Agentless Server Approach

    Performance monitoring tools play a critical role in the overall productivity of business organizations by providing the necessary means of measuring the performance of the system or server attributes of the organization. They measure system or server throughput and processor usage through programmed software or technological platforms. Their monitoring is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Enhanced Authentication Protocol EAP-TTLS Using Encrypted ECDSA

    The growing trend of wireless networks and risks associated with them has led to the development of authentication and application of stronger cryptographic methods to maintain a more robust security. This paper examined and compared two types of developed authentication protocols to provide an alternative method using strong cryptographic methods....

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Data Hiding over Mobile Phones Using Socket Network Communication

    The mobile phone is considered as wireless means of communication produced by sophisticated modern technology. After expanding use of mobile phones, establishing hidden communication is an important subject of security that has gained increasing importance. Therefore need to adopt the technology more sophisticated and more secret and preserve the information,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Effect of WiMAX Networks on IPTV Technology

    The IEEE 802.16 technology (WiMAX) is a better alternative to 3G or wireless LAN networks for providing last mile connectivity by radio link due to its high data rates, low cost of deployment and large coverage area and ease of Use. With the IEEE 802.16 2005 mobility amendment, WiMAX promises...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Searching Encrypted Data on Cloud

    Encryption is an optimistic way to preserve the secrecy of the outsource data. On other hand, performing search operation on encrypted data is a complicated job. A lot of encryption techniques have been suggested by researchers to avoid improper usage of unstructured data on the cloud. But still by using...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Development of an Innovative Internet of Things Security System

    Recently, the concept of Internet of Things (IoT) has become the most popular term through the widespread of its applications such as greenhouse and telemedicine monitoring. Actually, building IoT systems requires an accurate infrastructure planning. Furthermore, management and security of these systems are considered as the most important challenges facing...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Performance and Proficiency Analysis for Cloud Storage

    Those who need to store larger amounts of data either for burst periods or for convenient synchronization. Between devices is currently looking at new ways of how to integrate cloud storage services into the data processing applications. The benefits (on-demand access and pricing, elasticity) and the drawbacks (reduced control, increased...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    A Study of Risk Management in Cloud Computing Bank

    Cloud computing apparently helps in reducing costs and providing the scheduling optimal level. In practice however it may confront the problem of unavailability of resources. Taking into consideration the cloud computing bank with its somehow commercial nature, the resources unavailability, such as liquidity risk, remains. In this paper, an attempt...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Dynamic Workload Performance Optimization Model for Multiple-Tenancy in Cloud Systems

    Cloud entails the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer. With this concept it's easy to reduce complexity for the clients as they don't have to handle installations and other...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Homemade Antennas Implementation: A Comparative Analysis of the Quality of Service

    The wireless antennas have become essential to the peoples life as can be seen at their homes, workplaces, schools, and some other common places. This paper describes the construction of three homemade wireless antennas operating in the frequency band of 2.4 GHz and replicating the signal to increase the covering...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Design of an interactive game-based application for improving the resolution of common Computer Network issues

    The need to find new ways to help students in the learning process makes the people more involved with technology which evolves every day. This background leads the authors' to find new methods and forms of teaching that help students accelerate their learning skills in a different way from the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Network traffic prediction based on ARFIMA model

    ARFIMA is a time series forecasting model, which is an improve d ARMA model, the ARFIMA model proposed in this paper is demonstrated and deduced in detail. combined with network traffic of CERNET backbone and the ARFIMA model, the result shows that, compare to the ARMA model, the prediction efficiency...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    A Novel Problem-solving Metric for Future Internet Routing Based on Virtualization and Cloud-computing

    The Internet has evolved from an academic network to a broad commercial platform and become an integral and indispensable part of the people daily life, economic operation, and society over forty years. However, many technical and non-technical challenges have emerged during this process. In order to address these challenges, the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    MuMoCo : a Framework for Improving Data Quality with Multi-modality Cooperation in Wireless Sensor Networks

    High quality sensor data stream is crucial to wireless sensor networks applications. However raw data streams in wireless sensor networks tend to be not reliable. Therefore, improving sensor data quality is an important issue for all kinds of wireless sensor networks applications. In this paper, the authors proposed an integrated...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Delay-aware Load Balanced Routing Protocol for IEEE 802.16 Wireless Mesh Networks

    In IEEE 802.16 Wireless Mesh Networks (WMN) routing, delay aware load balancing can be achieved by selecting the shortest path with low latency and network load. But network load and latency together are not considered in most of the existing routing metrics. Here, the authors propose a delay aware load...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    An Autonomic Intrusion Detection Model With Multi-Attribute Auction Mechanism

    In this paper, the authors present an innovative intrusion detection model based on autonomic computing to extend the passive detection mechanism in a traditional Intrusion Detection System (IDS). Centered on an autonomic manager, this model introduces a multi-attribute auction mechanism in the agent coordination layer to perceive environmental changes, manage...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Framework Design of Secure Cloud Transmission Protocol

    Cloud computing technologies are in high demand because of several benefits. Many business organizations are looking into cloud computing services to reduce the cost and complexity of their business infrastructure and its preservation. However, there are certain security issues in cloud computing technologies. To overcome those security issues, the authors...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Energy-Aware Scheme Used in Multi-level Heterogeneous Wireless Sensor Networks

    The Wireless Sensor Networks (WSNs) is a power constrained system, since nodes run on limited power batteries which shorten its lifespan. The main challenge facing in the design and conception of Wireless Sensor Networks (WSNs) is to find the best way to extend their life span. The clustering algorithm is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    A Study on Existing Gait Biometrics Approaches and Challenges

    Applications of biometrics system are increasingly day by day as these methods provide more reliable and accurate way of identification and verification. Psychological studies indicate that people have a small but statistically significant ability to recognize the gait of individuals that they know. Gait biometrics is one of the recent...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    A Review on: Issues Related to Security on Tree Structure Data

    The problem of tree structured data is that it requires different Integrity and confidentiality for different portion of same content. Integrity assurance technique not only applies integrity to received data by user, but also any compromise to data that must be precisely determined. In tree structures each node contains some...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Review of Security Approaches in Routing Protocol in Mobile Adhoc Network

    In this paper, the objective is to present a review of routing protocols in Mobile Ad hoc NETwork (MANET) exclusively from security viewpoint. In MANET, the mobile nodes often move randomly for which reason the cumulative network experiences rapid and much unpredictable topology alterations. Due to presence of dynamic topology...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Review of Load Balancing in Cloud Computing

    With the exponential rise in the demands of the clients worldwide, a large scale distributed systems have been introduced as a computing environment. Cloud computing has paved a revolutionary path in this direction of distributed environment for accomplishing optimized performance, shortest response time, network resource utilization, and adaptability of service...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    A Trust-Based Routing Protocol in VANET

    One of the greatest challenges in Vehicular Ad-hoc NETworks (VANET) is to establish stable routing. Due to the dynamic network this is a difficult problem. In this paper, the authors use trust-based routing. The node is chosen to be next-hop node until it reaches to trust threshold. To evaluate the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Network Security Using Job Oriented Architecture (SUJOA)

    In the modern world operating system, various security systems (Collection of various security components) are already installed or can be directly installed in it. They are responsible for checking the complete node for suspicious behavior. There are some intrusions having the ability to hide themselves from being checked called armoring...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Detection of False Alarm in Handling of Selfish Nodes in MANET With Congestion Control

    In a mobile ad hoc network, the mobile nodes will have the characteristics of mobility and constraints in resources. Since, the mobility is high, the nodes may move randomly and fastly, which lead to network partitioning. The resource constraints lead to a big problem as decrease in performance and the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    Larg Band Ridged Waveguide Polarizer as Feed for Telecommunications Satellites Antennas

    For the transmission in high power in the systems of telecommunications Satellite; the systems in technology guides wave are best placed. The current progress recorded in the field of telecommunications requires an increase in the performances of these devices, more especially as average data processing and the recent software, such...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    FEA-OLSR: An Adaptive Energy Aware Routing Protocol for MANETs Using Zero-Order Sugeno Fuzzy System

    Optimized Link State Routing (OLSR) is a standard proactive routing protocol for Mobile Ad-hoc NETworks (MANETs). In this paper, the authors use a zero-order Sugeno Fuzzy Logic System (FLS) for adjusting the willingness parameter in OLSR protocol. Decisions made at each mobile node by the FLS take into account its...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    Modified TCP Protocol for Wireless Sensor Networks

    The transport layer's protocols have been used in the Wireless Sensor Networks (WSNs) in order to achieve data reliability. However, the limitations of the WSNs did not usually considered when implementing these protocols in the stack of the sensor nodes. In this paper, the TCP protocol has been modified in...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    A Semantically Enhanced Searching Framework to Discover the Sensor Web Services for Wireless Sensor Network

    The semantic based sensor service discovery is proposed to enhance the discovery of sensor services. The authors know web is one of the best medium connecting the service providers with their clients. Wireless sensor service generates a large number of heterogeneous raw data, so it's a big challenge now-a-days to...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    Analysis of Cell Planning and Link Budgeting in WiMAX Communication

    This paper is related with the WiMAX (Worldwide Interoperatibility for Microwave Access) technology. Today, different types of cellular networks are actively working on the radio links. For instance, the Global System for Mobile Communication (GSM) is being used in nearly all of the countries of the world and currently it...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    I-PRE: Improved Proxy Re-Encryption Scheme for VANET

    Vehicular Ad hoc NETwork (VANET) is a network of self organized vehicles and road-side infrastructure communicating with each other over wireless, with a view to improve traffic safety and efficiency. Data interchanged over VANETs often play a vital role in traffic safety. Such information must be accurate and truthful, as...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    A Comparison Among Accuracy of KNN, PNN, KNCN, DANN and NFL

    In this paper, it is tried to implement classifying methods on some given data files and compare the results together in different cases with different parameters. First of all, the authors have a pre-processing step, data normalizing and then the chosen methods are K-Nearest Neighbor (KNN), Probabilistic Neural Network (PNN),...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    Routing Strategy for Data Transfer of Varying Packet Sizes in Virtual Private Networks

    The paper evolves a data transfer mechanism, with a view to arrive at the best performance in the minimum bandwidth path of a wired Virtual Private Network (VPN). It orients to establish a service similar to that of a private dedicated network with leased lines for the endpoints of the...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    Iris Image Quality Assessment for Biometric Application

    Image quality assessment plays an important role in the performance of biometric system involving iris images. Data quality assessment is a key issue in order to broaden the applicability of iris biometrics to unconstrained imaging conditions. In this paper, the authors have proposed the quality factors of individual iris images...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Hough Transform and Active Contour for Enhanced Iris Segmentation

    Iris segmentation is considered as the most difficult and fundamental step in an iris recognition system. While iris boundaries are largely approximated by two circles or ellipses, other methods define more accurately the iris resulting in better recognition results. In this paper, the authors propose an iris segmentation method using...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    The Development of Android Software and Kernel Files by Using Example of Wi-Fi Adaptor

    The embedded systems such as smart phone, tablet, pocket or pad personal computers and driving navigator, etc. are very popular now. The Operating System (OS) of embedded system should be reduced size, operate quickly, user-friendly, more functions and energy saving etc. Many manufacturers are studying for embedded systems, for example,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    QR Code Application for Water Meter Recorder Based on Windows Mobile Platform

    Now-a-days, the advancement of Smartphone technology is rapidly moving forward. Several applications in Smartphone were invented which aim to simplify and accelerate the process compared to the manual procedure. Moreover, the QR code usage as one coding technique is a common thing in current days. This is because QR code...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    Energy Aware Adaptive Image Transmission Scheme with Data Authentication in Wireless Sensor Networks

    Wireless Multimedia Sensor Networks (WMSNs) are gaining research interest due to the availability of low-cost cameras and CMOS image sensors, also due to their broad application opportunities. The energy and resource constrained environment of WMSNs calls for low complexity energy aware image authentication and transmission schemes with minimal overheads. The...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Dynamic Tracking Protocol for Maneuvering Targets in Sensor Network

    Target tracking is one of the most important applications in Wireless Sensor Networks (WSNs). Energy efficiency is one of the most important design goals for target tracking. The authors propose and evaluate a distributed, energy-efficient, light-weight framework dynamic clustering algorithm for target localization and tracking in wireless sensor networks. Since...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Achieving Load Balance by Separating IP Address Spaces

    In this paper, the authors propose a load balance approach by separating the host and router IP addresses into two spaces. In addition, in their approach, they propose a scheduling algorithm, named Edge Stream Balance (ESB), which is used by the proposed multipath routing scheme based on the address space...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Intelligent communication of WSN based on a multi-agent system

    The Wireless Sensor Network (WSN) consists of a large number of sensor nodes with limited batteries, which are deployed randomly over an area to collect data. Therefore, it is important to minimize energy consumption of each node, which leads to the extension of the life of the network. As many...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    A Novel Particle Swarm Optimization-based Algorithm for the Optimal Centralized Wireless Access Network

    The wireless access networks design problem is formulated as a constrained optimization problem, where the goal is to find a network topology such that an objective function is optimized, subject to a set of constraints. The objective function may be the total cost, or some performance measure like utilization, call...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Study of Online Bayesian Networks Learning in a Multi-Agent System

    The authors attempt to find how a common task can be performed by a multi-agent self-organizing system. The agents are independent in terms of their model of environment and their actions. Each agent explores the environment and decides its actions by itself. Agents will have no information about the environment...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Fuzzy Logic System for Opportunistic Spectrum Access using Cognitive Radio

    Opportunistic spectrum access approach is enabled by cognitive radios which are able to sense the unused spectrum and adapt their operating characteristics to the real-time environment. However, a naive spectrum access for secondary users can make spectrum utilization inefficient and increase interference to adjacent users. In this paper, the authors...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    A Comparative Approach for Localization Techniques in Wireless Sensor Networks

    A Wireless Sensor Network is a collection of many tiny sensing and wireless communication device called sensor nodes. Each node consists of a processor, a battery and a transceiver for communication. Nodes are connected to each other via transceiver. Localization of sensor nodes in wireless sensor nodes plays an important...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    The Study on the Spam Filtering Technology Based on Bayesian Algorithm

    In this paper, the authors analyzed spam filtering technology, carried out a detailed study of Naive Bayes algorithm, and proposed the improved Naive Bayesian mail filtering technology. Improvement can be seen in text selection as well as feature extraction. The general Bayesian text classification algorithm mostly takes information gain and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Trust Based Infererence Violation Detection Scheme Using Acut Model

    The inference problem is the major problem in securing the sensitive data in the secured database. In the inference problem the user tries to access the sensitive data from the secured database by giving series of queries with the non-sensitive fields. Inference problems affect the securities in the database and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Embedded Wireless Fingerprint Exam Affair Management

    In this paper, the authors study the design method of fingerprint identification module based on embedded system, which can realize the design of wireless fingerprint examination management system. This method reduces the hardware cost by building hardware environment whose platform is ARM9 microprocessor and MBF200 fingerprint sensor-integrated module. And, under...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    The Evidential Reasoning Approach for Multiple Decision Analysis Using Normal Cloud Model

    In this paper, normal cloud model and Evidential Reasoning (E-R) approach is used in Multiple Attribute Decision Analysis (MADA) problems. Different attributes Belief function are represented by cloud model interval. Using cloud model generating algorithm, belief degree interval is obtained without numerical computation. In addition, it is reasonable and it...

    Provided By International Journal of Computer Science Issues