International Journal of Computer Science Issues

Displaying 1-40 of 926 results

  • White Papers // Mar 2015

    Generating Test Cases for E-Commerce Systems

    Software testing is the process of executing a program or system for finding any error or defect. Software testing strategy helps to convert test case designs into well-planned execution steps that will result in the construction of successful software. Software testing is any activity aimed at evaluating a capability of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2015

    Interoperable Distributed Data Warehouse Components

    Extraction, Transformation and Loading (ETL) are the major functionalities in Data Warehouse (DW) solutions. Lack of component distribution and interoperability is a gap that leads to many problems in the ETL domain, because these ETL components are tightly-coupled in the current ETL framework. Furthermore, complexity of components extensibility is another...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2015

    Inter Organizational System Management for Integrated Service Delivery: An Enterprise Architecture Perspective

    Service sharing is a prominent operating model to support business. Many large inter-organizational networks have implemented some form of value added integrated services in order to reach efficiency and to reduce costs sustainably. Coupling service orientation with enterprise architecture paradigm is very important at improving organizational performance through business process...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2015

    Keyword Reduction for Text Categorization Using Neighborhood Rough Sets

    Keyword reduction is a technique that removes some less important keywords from the original dataset. Its aim is to decrease the training time of a learning machine and improve the performance of text categorization. Some researchers applied rough sets, which is a popular computational intelligent tool, to reduce keywords. However,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Dec 2014

    A Multi-Agent Systems Engineering for Semantic Search of Reuse Software Components

    In Component-Based Software Development (CBSD) approach, the searching and retrieving of accurate reusable software components that are stored in large, distributed and heterogeneous-structured repositories is a tedious and time consuming process. This paper presents the design and implementation of ontology-based multi-agent software component retrieval system using semantic and structural formalism....

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2014

    An Analytical Comparison between Applying FFT and DWT in WiMAX Systems

    Discrete Wavelet Transform (DWT) has advantages over Fast Fourier Transform (FFT) in analyzing signals containing sharp spikes. DWT processes data at different scales. If the people look at the signal with a large window, they would notice big features. Similarly, if they look at the signal with a small window,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2014

    A Delay Aware Routing Protocol for Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) consist of sensor nodes which can be deployed for various operations such as agriculture and environmental sensing, wild life monitoring, health care, military surveillance, industrial control, home automation, security etc. Quality of Service (QoS) is an important issue in Wireless Sensor Networks (WSNs) and providing QoS...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2014

    Securing VoIP Systems: A QoS-Oriented Approach

    Voice over IP (VoIP) is a communication technology allowing voice traffic transmission as data packets over a private or a public IP network. VoIP allows significant benefits for customers and service providers including cost savings, services integration, and systems extensibility. Nevertheless, the VoIP technology suffers from many hurdles such as...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2014

    The Impact of Capability Level on Maturity of Business Intelligence Initiatives

    In this paper, the authors propose enterprise business intelligence maturity model that involves thirteen capacity factors, which are (strategic management, performance measurement, balanced scorecard, information quality, data warehouse, master data management, metadata management, analytical, infrastructure, knowledge management, people, organization culture and change management). This paper is to investigate how does...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2014

    Predicting Sales In E-commerce Using Bayesian Network Model

    An area of substantial research is that of predicting product sales, such as books, video games and movie tickets. There are a number of prediction models that have been used to predict future sales however these models attempt to solve the problem by making assumptions. These models assume that independent...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2014

    Revisiting Security Ontologies

    Significant innovations in virtualization and distributed computing as well as improved access to high-speed Internet have induced interest in cloud computing. Contemporary exploration of all stages of service models clearly proves the immense significance of \"Security in cloud computing\", which being as obtuse as it is pertinent, demands attention. An...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2014

    Development of a Mobile Service on a WiFi Network for the Evaluation of Mathematical Skills

    In this paper, the authors describe the design and development of a mobile service to make practical assessments of different topics of mathematics in order to improve the skills of students in high school education. This tool has the ability to create user accounts for participants, as well as storing...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2014

    Constructing Sierpinski Gasket Using GPUs Arrays

    A fractal is a mathematical set that typically displays self-similar patterns, which means it is "The same from near as from far". Fractals may be exactly the same at every scale; they may be nearly the same at different scales. The concept of fractal extends beyond trivial self-similarity and includes...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2014

    A Context-Based Approach for Troubleshooting Database Problems

    In the area of database administration, when a hot critical problem suddenly occurs, an organization may lose large amounts of money for each hour of downtime. In such situations, the life of a DataBase Administrator (DBA) can become stressful because of the excessive pressure to solve problems quickly. Most of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Oscillation Characteristics of the Multi-stage Learning for the Layered Neural Networks and Its Analysis

    In this paper, the authors propose an efficient learning method for the layered neural networks based on the selection of training data and input characteristics of an output layer unit. The multi-stage learning method proposes by the authors for the function approximation problems of classifying learning data in a phased...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    GINS: Dynamic Emissive Location-Based for Underwater Sensor Networks

    Due to collect and monitor exploration of natural location resources which was difficult to acquire the location without Global Position System (GPS) in the underwater. However, there are something research was used Inertial Navigation System (INS) to location, but the INS accuracy degrades over time that the issue will be...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    The Use of Big Data in Education

    In this paper, the authors will see the use of big data and open data in education. Also how big amount of data can be used and extracted to something useful, helping the industry to raise their profits. This paper is a study on the use of big data in...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Testing Security Policies for Distributed Systems: Vehicular Networks as a Case Study

    Due to the increasing complexity of distributed systems, security testing is becoming increasingly critical in insuring reliability of such systems in relation to their security requirements. To challenge this issue, the authors rely in this paper on model based active testing. In this paper, they propose a framework to specify...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    QoS Safety Protocol Analysis in FHAMIPv6/MPLS/Diffserv Integration and Load Balancing Algorithm

    One of the most important aspects to consider in order to provide quality services in an ad hoc network is the security. In the integration FHAMIPv6/MPLS/DiffServ and congestion algorithms, the authors analyses QoS but do not consider the QoS safety. The security issue is essential for not degrade QoS. This...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Validating Predictive Performance of Classifier Models for Multiclass Problem in Educational Data Mining

    Classification is one of the most frequently studied problems in data mining and machine learning research areas. It consists of predicting the value of a class attribute based on the values of other attributes. There are different classifications models were proposed in Educational Data Mining (EDM) and it is used...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Implementation of End-to-End QoS Mapping Scheme on SCIS WiFi Network

    For developing countries, wireless networks seem to be the available alternative for providing affordable telecommunications services. In Iraq, the main governmental wireless Internet service provider is SCIS Company. It adopts WiMAX and WiFi wireless networks. Considering Quality of Service (QoS) as an indicator of network performance, it is a challenge...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Securing Data from Collusion Black Hole Attack Using Optimized Link Source Routing Protocol for MANET

    In this paper, a new algorithm for the selection of MultiPoint Relays (MPR) in Optimized Link State Routing protocol (OLSR) is proposed. OLSR is a routing protocol which could reduce the overhead of control messages by selecting MPRs. So, the number of MPRs is a key for the performance of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    A Knowledge Management Framework Using Business Intelligence Solutions

    The business environment, as a whole, was changed. It became more dynamic and more complex. Most organizations across the world have realized that in this rapidly changed environment, there is a strong need to become globally competitive and more interactive with the customers. The survival guide to competitiveness is to...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Influence of Mobile Device Categories on the Usability of Mobile Website Categories

    In this paper, the authors investigate the influence of mobile device categories on the usability of mobile website categories. The mobile website categories investigated were, news, search, service, portal, and media sharing website categories. And the mobile device categories used were, Touch Screen Mobile Phones (TSMP), Non-Touch Screen Mobile Phones...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Eye with Intelligence Connecting CCTV to Big Data, Hadoop and R

    Security, an abstraction which creates a virtual boundary and gives the sense of separation between the asset and the threat. It provides a layer of protection to the asset by encapsulating it and just making visible the necessary details to the outside world. In this paper, the authors are trying...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Web Service Security Overview, Analysis and Challenges

    The Web Services (WS) technology became the reference architecture during the last few years for the integration of heterogeneous systems. As it is now-a-days critical for business to make applications communicate over the internet. WS has take essential position for building and integrating e-business applications and to allow information system...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Spectrum Sensing for Cognitive Radio Users using Constant Threshold Range in Energy Detector

    Spectrum Sensing has an important role in Cognitive Radio Network (CRN). Different methodologies have been proposed in the literature for spectrum sensing. Energy detector method is more practical and less in complexity. This paper presents analysis of energy detection algorithm in different scenarios with different parameters to detect presence or...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Study on Secure Cloud Computing with Elliptic Curve Cryptography

    Cloud computing plays a major role by providing different resources in the form of web services like tax calculation web service, stock information web service, e-banking web service etc. But the authors can rely on cloud computing only when these web services are really secure enough to use. In this...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    A New Viewpoint to Database and Data Using Physics Concepts

    A modern tool has been introduced in this paper to researchers by definition of new concepts and approaches in order to optimize performance of databases. Although this is not going to argue that optimization of concepts like a better accessibility is impossible by the available tools, the main purpose is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Towards Gas Density Measurement: Design and Implementation of the Application-Oriented WSN

    Wireless Sensor Network (WSN) provides an effective real-time monitoring approach. A design and implementation of WSN is introduced in this paper, which is applied to concentration measurement of hazardous gas. A hardware platform solution with compatibility and scalability is proposed in the paper. The customized communication protocol and applications oriented...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Facebook Page Spam Detection using Support Vector Machines based on n-gram Model

    With social networks like Facebook, twitter reaching to the common masses, these have become the best target for spammers. The newest way to mislead and fraud viewers is page spam. Viewers are deceived to click on links to spam their connections, redirect to a fraudulent business or spread wrong information...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    A Review of the Problems and Impacts Related to Network Voids in Wireless Sensor Networks

    In this paper, an exploratory study has been conducted to understand the various aspects of the network void problem. This paper provides insights into multiple research questions, which include how and why each void problem occurs. The authors have covered ten void problems (i.e., coverage voids or holes, routing voids...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Applying GIS Concepts to a Pervasive Game: Spatiotemporal Modeling and Analysis Using the Triad Representational Framework

    Given pervasive games that maintain a virtual spatiotemporal model of the physical world, game designers must contend with space and time in the virtual and physical. Previous papers on pervasive games have partially contended with these representations, but an integrated conceptual model is lacking. Because they both make use of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    The Potential and Challenges of Big Data - Recommendation Systems Next Level Application

    The continuous increase of data generated provides enormous possibilities of both public and private companies. The management of this mass of data or big data will play a crucial role in the society of the future, as it finds applications in different fields. There are so much potential and extremely...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Development of a Business Logic Using Simple Application of Rough Set Theory

    In today's scenario, business establishment usually fails due to improper planning and lack of business knowledge. In this paper, the authors develop a concept which is precise and reduces the number of data attributes to start any business. For the development of the concept, they have used the concept of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    Design of an Ultra-Wideband Antenna Using Split Ring Resonator

    In this paper, the authors present a novel patch antenna using circular split ring resonator for ultra-wideband applications. The radiating element of the proposed antenna is a Split-Ring Resonator (SRR). The geometrical parameters are optimized to reach the best electromagnetic properties, with a small size (30 mm

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    Performance of COFDM Technology for the Fourth Generation (4G) of Mobile System With Convolutional Coding and Viterbi Decoding

    The Fourth Generation (4G) of mobile cellular system network is growing very fast and new services come-up, so intelligent way of visualization and managing the 4G network and service states are required. In this paper, Coded Orthogonal Frequency Division Multiplexing (COFDM) scheme using convolutional coding with different code rates and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    Performance Analysis of the Proxy Mobile IPv6 (PMIPv6) and Multiprotocol Label Switching (MPLS) Integration

    In this paper, the authors analyze and develops the integration of the PMIPv6 (Proxy Mobile IPv6) and MPLS (Multi-Protocol Label Switching) protocols in order to determine the impact at the time of handover in an IP micro mobility environment. The proposed integration suggests the establishment of abidirectional Label Switched Path...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    A Literature Review and Comparative Analyses on SQL Injection: Vulnerabilities, Attacks and Their Prevention and Detection Techniques

    SQL injection is a technique that exploits a security vulnerability occurring in the database layer of an application. The attack takes advantage of poor input validation in code and website administration. It allows attackers to obtain unauthorized access to the back- and database to change the intended application generated SQL...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    An Efficient Protective Layer Against SQL Injection Attacks

    In this paper, the authors present a detailed discussion on different SQL injection attacks and their prevention technique. In addition, they proposed a new scheme for prevention of SQL injection attack, which consist of three blocks or three tier architecture: the clients, the application server and the database server. Their...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    Scalable and Efficient Self-Join Processing Technique in RDF Data

    Efficient management of RDF data plays an important role in successfully understanding and fast querying data. Although the current approaches of indexing in RDF Triples such as property tables and vertically partitioned solved many issues; however, they still suffer from the performance in the complex self-join queries and insert data...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    Distributed Data Mining by Associated Rules: Improvement of the Count Distribution Algorithm

    Today, most large systems are overwhelmed by a flood of data that is stored daily in databases distributed. It is in this context that the distributed data mining is used by offering many parallel and distributed algorithms to extract crucial information. Among the most popular techniques, the authors are interested...

    Provided By International Journal of Computer Science Issues

  • White Papers // Aug 2010

    Analysis of Server Log by Web Usage Mining for Website Improvement

    Web server logs stores click stream data which can be useful for mining purposes. The data is stored as a result of user's access to a website. Web usage mining an application of data mining can be used to discover user access patterns from weblog data. The obtained results are...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    Multi-Level Service Composition in Supervised Cloud Computing

    The role of AN agent system in an exceedingly cloud network is to spot the simplest obtainable resources and share them through a service created accessible over the net. Hence they act as inter-mediator for providing cloud services to varied users. The cloud service customers determine numerous service compositions through...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    Combining Clustering Solutions With Varying Number of Clusters

    Cluster ensemble algorithms have been used in different field like data mining, bioinformatics and pattern recognition. Many of them use label correspondence as a step which can be performed with some accuracy if all the input partitions are generated with same k. Thus these algorithms produce good results if this...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Application of Inventory Management Principles for Efficient Data Placement in Storage Networks

    The principles and strategies found in material management are comparable and analogue with the data management. This paper concentrates on the conversion of product inventory management principles into data inventory management principles. Efforts were made to enumerate various impacting parameters that would be appropriate to consider if any data inventory...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    A Comprehensive Review for Disk Scheduling Algorithms

    This paper aims to discuss the structure of a disk and the hardware activities involved in the retrieval of data on a direct access storage device. Tackles and compute the different Disk Scheduling algorithms such as First Come First Serve (FCFS), Shortest Seek Time First (SSTF), Scan, Look, Circular Scan...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Presenting a Novel Method for Mining Association Rules Using Binary Genetic Algorithm

    Today, mining association rule is one of the important data mining algorithms which enable managers to make correct decisions based on the knowledge obtained from the detected patterns by databases. Traditional algorithms of discovering association rules such as Apriori and FP-growth may extract millions of rules from databases, many of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    A Pattern Based Methodology for Evolution Management in Business Process Reuse

    Today, there are Process-Aware Information Systems (PAIS) with a set of business process models which vary over time to meet the new requirements. In a competitive environment, the key challenge of enterprises is to reduce the cost and time of process design and application development. For this purpose, research on...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    An Exploration Scrutiny of Systems Performance Monitoring Tools: An Applications and Agentless Server Approach

    Performance monitoring tools play a critical role in the overall productivity of business organizations by providing the necessary means of measuring the performance of the system or server attributes of the organization. They measure system or server throughput and processor usage through programmed software or technological platforms. Their monitoring is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    Real-Time Scheduling Algorithm Based on Dynamic Priority for Multi-Data Transmission

    In response to the demands of heterogeneous data acquisition, data transmission effectiveness and reliability in emergencies as well as environmental wireless monitoring etc., this paper presents a data transmission queue optimization algorithm based on dynamic priority. The algorithm dynamically assign priorities to different data according to their importance, historical transmission...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    A Dynamic Materialized View Selection in a Cloud-Based Data Warehouse

    A data warehouse is system which that support decision-making in production environment. Classical data warehouse management system is often optimized by improving query performance. Such improvement is casually achieved by using caches, indexes and materialized views and required selecting the best set of data structures (materialized views, indexes, etc...). In...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    Defending the Sensitive Data Using Lattice Structure in Privacy Preserving Association Rule Mining

    Innovation of association rules from enormous databases ensures benefits for the enterprises since such rules can be very operative in enlightening the knowledge that leads to tactical decisions. Association rule mining has acknowledged a proportion of attention in the collaborative business community and several algorithms were proposed to improve the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2011

    Improving Performance on WWW Using Intelligent Predictive Caching for Web Proxy Servers

    Web proxy caching is used to improve the performance of the web infrastructure. It aims to reduce network traffic, server load, and user perceived retrieval delays. The heart of a caching system is its page replacement policy, which needs to make good replacement decisions when its cache is full and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Knowledge Management System as Enabler for Knowledge Management Practices in Virtual Communities

    Knowledge Management System (KMS) was recognized as one of the key enablers in a knowledge management initiative. This is because KMS have been proving bringing value for Knowledge Management (KM) initiatives such as eliminate distance and time barriers. Furthermore KMS also made KM more effective for the organization. As general...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Converting Relational Database Into XML Document

    XML (eXtensible Markup Language) is emerging and gradually accepted as the standard for data interchange in the Internet world. Interoperation of relational database and XML database involves schema and data translations. Through EER (Extended Entity Relationship) model can convert the schema of relational database into XML. The semantics of the...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2014

    Network Mapping of SME's in Borobudur Cluster Using Social Network Analysis for Strengthening Local Economic Development Platform

    The Small and Medium Enterprise (SMEs) has a strategic role that could have a significant contribution in improving the prosperity of the society. The government has tried to empower SMEs through forming a forum in which those SMEs stakeholders could communicate to grow their businesses for economic community development. Whether...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2014

    Comparing Priority and Round Robin Scheduling Algorithms

    Computer usage has come increasing with time. Now-a-days everybody needs to work with lots of programs at the same time and unfortunately this leads to slowing down the work. So software developers have to find a way how deal with workflows. At first, when the author chose this theme, the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    Tree Reconfiguration without Lightpath Interruption in Wavelength Division Multiplexing Optical Networks with Limited Resources

    Today, operators use reconfiguration to improve the performance of connection oriented networks. In the authors' paper, they studied tree reconfiguration without data flow interruption in wavelength division multiplexing optical networks. In their previous approach, the available resources of the network (wavelengths) are not considered as limited. In this paper, they...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    Assessing the Feasibility of Approximating Higher-Order Problem Signatures in Artificial Neural Networks With Hybrid Transfer Functions

    Problem signatures are patterns that reveal a glimpse of the computational strategy most likely to be suitable for a given problem. Such a pattern could be the preferred choice of the activation and output functions for a given problem in neural networks that implement transfer functions optimization. The authors refer...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    Performance Evaluation of Three Node Tandem Communication Network Model With Feedback for First Two Nodes Having Homogeneous Poisson Arrivals

    In this paper, the authors introduced the three node communication model with feedback for the first and second nodes assuming where every arrival makes homogeneous Poisson process one of the possible decisions by forwarding to the next node or to return back to nodes without taking service. Assuming such a...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    Comparison of PBRR Scheduling Algorithm with Round Robin and Heuristic Priority Scheduling Algorithm in Virtual Cloud Environment

    While considering the virtual cloud environment and various terms associated with it resource provisioning and load balancing are the main areas where research work has been going on at vast pace. Here the authors will discuss the various things related to the cloud environment. Their paper is to compare the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    Algorithmic Solution to Reduce Storage Overhead On Cloud Based System

    Cloud computing is a technology that provide on-demand services namely storage-as-a-service, platform-as-a-service etc. over the internet via cloud vendors from the market to the user. Cloud computing allows utilization of the services regardless of the installation and maintenance problems to the users. Storage of data on single local machine or...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    Email Filtering and Analysis Using Classification Algorithms

    With the various developments that are taking place in the field of technology especially in the communication domain, there are a plethora of malpractices that are being practiced to hinder the users` chores. Most of these practices can be observed in the email account of a user. Any internet user...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    FHAMIPv6/AHRA vs FHAMIPV6/AODV

    In order to support the FHMIPv6 protocol in an ad-hoc network, the authors introduced a series of changes in the source code, they modified the ability to recognize and process messages of the intermediate nodes during the registration process, so that messages were successfully transmitted from source to destination. The...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2014

    Overall PAPR Reduction for MIMO OFDM Systems

    Multiple Input Multiple Output (MIMO) Orthogonal Frequency Division Multiplexing (OFDM) systems have been receiving a great attention as one of the solutions for achieving high speed, efficient, and high quality of service wireless communications. However, the main drawback of MIMO OFDM systems is high Peak to Average Power Ratio (PAPR)...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2014

    Enhancing E-mail Filtering Based on GRF

    Feature selection is a problem of global combinatorial optimization in machine learning in which subsets of relevant features are selected to realize robust learning models. The implying of irrelevant and redundant features in the dataset can result in poor predictions and misclassification process. Thus, selecting relevant feature subsets can help...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2014

    Study on Productive Process Model Basic Oxygen Furnace Steelmaking Based on RBF Neural Network

    The endpoint temperature and carbon content of Basic Oxygen Furnace (BOF) are the control of the BOF steelmaking process. There exists a complex relationship among them and each control variable. While the multiple linear model is limited to predict the endpoint temperature and carbon content through each control variable, and...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2014

    Efficiency of Gaussian Pyramid Compression Technique for Biometric Images

    Images in their uncompressed form require large amount of storage capacity and uncompressed data needs large transmission bandwidth for the transmission. Image compression technique is used to reduce the storage requirement per image, while maintaining image quality. The proposed method investigates biometric image compression using Gaussian Pyramid Compression (GPC) in...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2014

    An Efficient Genetic Algorithm Based Clonal Selection and Hill Climbing for Solving QoS Multicast Routing Problem

    Quality of Service (QoS) multicast routing is essential for many network applications such as IPTV, Internet radio, multimedia broadcasting, and real-time telecommunication. Multicast routing involves transport of information from one single sender to multiple destinations. There are two requirements of multicast routing in many multimedia real time applications: one is...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2014

    Enhancement of Web Proxy Caching Using Random Forest Machine Learning Technique

    Web proxy caching plays a significant part in improving Web performance by conversing web objects that are likely to be visited again in the proxy server close to the user. The random forest tree is an ensemble learning method for Web data classification. In this paper, the authors attempt to...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2014

    Performance Evaluation of the Effect of Primary Users on the Rendezvous Process for Cognitive Radios

    The rendezvous process is an essential process for establishing a communication link between two nodes in cognitive radio networks. A number of rendezvous protocols have been developed in the last few years. However, many protocols ignore one of the basic constraints of cognitive radio networks which are the impact of...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2014

    Data Integrity Issues in Cloud Servers

    In the past few years cloud has become the buzzword in computing. But this wide acceptance and ease of use exposed the new IT based technology into a number of data integrity (correctness of data) and security issues. Integrity of user data in the cloud servers is one of the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Oscillation Characteristics of the Multi-stage Learning for the Layered Neural Networks and Its Analysis

    In this paper, the authors propose an efficient learning method for the layered neural networks based on the selection of training data and input characteristics of an output layer unit. The multi-stage learning method proposes by the authors for the function approximation problems of classifying learning data in a phased...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    GINS: Dynamic Emissive Location-Based for Underwater Sensor Networks

    Due to collect and monitor exploration of natural location resources which was difficult to acquire the location without Global Position System (GPS) in the underwater. However, there are something research was used Inertial Navigation System (INS) to location, but the INS accuracy degrades over time that the issue will be...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    The Use of Big Data in Education

    In this paper, the authors will see the use of big data and open data in education. Also how big amount of data can be used and extracted to something useful, helping the industry to raise their profits. This paper is a study on the use of big data in...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Testing Security Policies for Distributed Systems: Vehicular Networks as a Case Study

    Due to the increasing complexity of distributed systems, security testing is becoming increasingly critical in insuring reliability of such systems in relation to their security requirements. To challenge this issue, the authors rely in this paper on model based active testing. In this paper, they propose a framework to specify...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    QoS Safety Protocol Analysis in FHAMIPv6/MPLS/Diffserv Integration and Load Balancing Algorithm

    One of the most important aspects to consider in order to provide quality services in an ad hoc network is the security. In the integration FHAMIPv6/MPLS/DiffServ and congestion algorithms, the authors analyses QoS but do not consider the QoS safety. The security issue is essential for not degrade QoS. This...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Validating Predictive Performance of Classifier Models for Multiclass Problem in Educational Data Mining

    Classification is one of the most frequently studied problems in data mining and machine learning research areas. It consists of predicting the value of a class attribute based on the values of other attributes. There are different classifications models were proposed in Educational Data Mining (EDM) and it is used...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Implementation of End-to-End QoS Mapping Scheme on SCIS WiFi Network

    For developing countries, wireless networks seem to be the available alternative for providing affordable telecommunications services. In Iraq, the main governmental wireless Internet service provider is SCIS Company. It adopts WiMAX and WiFi wireless networks. Considering Quality of Service (QoS) as an indicator of network performance, it is a challenge...

    Provided By International Journal of Computer Science Issues