International Journal of Computer Science Issues

Displaying 1-40 of 870 results

  • White Papers // Sep 2014

    A New Viewpoint to Database and Data Using Physics Concepts

    A modern tool has been introduced in this paper to researchers by definition of new concepts and approaches in order to optimize performance of databases. Although this is not going to argue that optimization of concepts like a better accessibility is impossible by the available tools, the main purpose is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Study on Secure Cloud Computing with Elliptic Curve Cryptography

    Cloud computing plays a major role by providing different resources in the form of web services like tax calculation web service, stock information web service, e-banking web service etc. But the authors can rely on cloud computing only when these web services are really secure enough to use. In this...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Spectrum Sensing for Cognitive Radio Users using Constant Threshold Range in Energy Detector

    Spectrum Sensing has an important role in Cognitive Radio Network (CRN). Different methodologies have been proposed in the literature for spectrum sensing. Energy detector method is more practical and less in complexity. This paper presents analysis of energy detection algorithm in different scenarios with different parameters to detect presence or...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Web Service Security Overview, Analysis and Challenges

    The Web Services (WS) technology became the reference architecture during the last few years for the integration of heterogeneous systems. As it is now-a-days critical for business to make applications communicate over the internet. WS has take essential position for building and integrating e-business applications and to allow information system...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Eye with Intelligence Connecting CCTV to Big Data, Hadoop and R

    Security, an abstraction which creates a virtual boundary and gives the sense of separation between the asset and the threat. It provides a layer of protection to the asset by encapsulating it and just making visible the necessary details to the outside world. In this paper, the authors are trying...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Influence of Mobile Device Categories on the Usability of Mobile Website Categories

    In this paper, the authors investigate the influence of mobile device categories on the usability of mobile website categories. The mobile website categories investigated were, news, search, service, portal, and media sharing website categories. And the mobile device categories used were, Touch Screen Mobile Phones (TSMP), Non-Touch Screen Mobile Phones...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    A Knowledge Management Framework Using Business Intelligence Solutions

    The business environment, as a whole, was changed. It became more dynamic and more complex. Most organizations across the world have realized that in this rapidly changed environment, there is a strong need to become globally competitive and more interactive with the customers. The survival guide to competitiveness is to...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Securing Data from Collusion Black Hole Attack Using Optimized Link Source Routing Protocol for MANET

    In this paper, a new algorithm for the selection of MultiPoint Relays (MPR) in Optimized Link State Routing protocol (OLSR) is proposed. OLSR is a routing protocol which could reduce the overhead of control messages by selecting MPRs. So, the number of MPRs is a key for the performance of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Implementation of End-to-End QoS Mapping Scheme on SCIS WiFi Network

    For developing countries, wireless networks seem to be the available alternative for providing affordable telecommunications services. In Iraq, the main governmental wireless Internet service provider is SCIS Company. It adopts WiMAX and WiFi wireless networks. Considering Quality of Service (QoS) as an indicator of network performance, it is a challenge...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Validating Predictive Performance of Classifier Models for Multiclass Problem in Educational Data Mining

    Classification is one of the most frequently studied problems in data mining and machine learning research areas. It consists of predicting the value of a class attribute based on the values of other attributes. There are different classifications models were proposed in Educational Data Mining (EDM) and it is used...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    QoS Safety Protocol Analysis in FHAMIPv6/MPLS/Diffserv Integration and Load Balancing Algorithm

    One of the most important aspects to consider in order to provide quality services in an ad hoc network is the security. In the integration FHAMIPv6/MPLS/DiffServ and congestion algorithms, the authors analyses QoS but do not consider the QoS safety. The security issue is essential for not degrade QoS. This...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Testing Security Policies for Distributed Systems: Vehicular Networks as a Case Study

    Due to the increasing complexity of distributed systems, security testing is becoming increasingly critical in insuring reliability of such systems in relation to their security requirements. To challenge this issue, the authors rely in this paper on model based active testing. In this paper, they propose a framework to specify...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    The Use of Big Data in Education

    In this paper, the authors will see the use of big data and open data in education. Also how big amount of data can be used and extracted to something useful, helping the industry to raise their profits. This paper is a study on the use of big data in...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    GINS: Dynamic Emissive Location-Based for Underwater Sensor Networks

    Due to collect and monitor exploration of natural location resources which was difficult to acquire the location without Global Position System (GPS) in the underwater. However, there are something research was used Inertial Navigation System (INS) to location, but the INS accuracy degrades over time that the issue will be...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Oscillation Characteristics of the Multi-stage Learning for the Layered Neural Networks and Its Analysis

    In this paper, the authors propose an efficient learning method for the layered neural networks based on the selection of training data and input characteristics of an output layer unit. The multi-stage learning method proposes by the authors for the function approximation problems of classifying learning data in a phased...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Towards Gas Density Measurement: Design and Implementation of the Application-Oriented WSN

    Wireless Sensor Network (WSN) provides an effective real-time monitoring approach. A design and implementation of WSN is introduced in this paper, which is applied to concentration measurement of hazardous gas. A hardware platform solution with compatibility and scalability is proposed in the paper. The customized communication protocol and applications oriented...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Facebook Page Spam Detection using Support Vector Machines based on n-gram Model

    With social networks like Facebook, twitter reaching to the common masses, these have become the best target for spammers. The newest way to mislead and fraud viewers is page spam. Viewers are deceived to click on links to spam their connections, redirect to a fraudulent business or spread wrong information...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    A Review of the Problems and Impacts Related to Network Voids in Wireless Sensor Networks

    In this paper, an exploratory study has been conducted to understand the various aspects of the network void problem. This paper provides insights into multiple research questions, which include how and why each void problem occurs. The authors have covered ten void problems (i.e., coverage voids or holes, routing voids...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    Performance Analysis of the Proxy Mobile IPv6 (PMIPv6) and Multiprotocol Label Switching (MPLS) Integration

    In this paper, the authors analyze and develops the integration of the PMIPv6 (Proxy Mobile IPv6) and MPLS (Multi-Protocol Label Switching) protocols in order to determine the impact at the time of handover in an IP micro mobility environment. The proposed integration suggests the establishment of abidirectional Label Switched Path...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    Design of an Ultra-Wideband Antenna Using Split Ring Resonator

    In this paper, the authors present a novel patch antenna using circular split ring resonator for ultra-wideband applications. The radiating element of the proposed antenna is a Split-Ring Resonator (SRR). The geometrical parameters are optimized to reach the best electromagnetic properties, with a small size (30 mm

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    Performance of COFDM Technology for the Fourth Generation (4G) of Mobile System With Convolutional Coding and Viterbi Decoding

    The Fourth Generation (4G) of mobile cellular system network is growing very fast and new services come-up, so intelligent way of visualization and managing the 4G network and service states are required. In this paper, Coded Orthogonal Frequency Division Multiplexing (COFDM) scheme using convolutional coding with different code rates and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    Performance Evaluation of HEVC Over Broadband Networks

    High efficiency video coding is the current trend setting standard for coding and transmission of video content. This standard has brought in many improvements over its predecessor H264 standard. In this paper, performance evaluation of transmitting HEVC content over the simulated network environment for disaster and calamity stricken area has...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    A Survey of VPN Security Issues

    Recently secure access to the private sources is considered as of the essential needs. Thus, one of the most efficient and cost-effective ways for granting secure access needs from far path in the organizations is the use of VPN. Data security plays a crucial role in modern times; most business...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    Performance Analysis of LTE Physical Layer Based on 3GPP-Release-8

    Long Term Evolution (LTE) is the last step towards the 4th generation of cellular networks. This revolution is necessitated by the unceasing increase in demand for high speed connection on LTE networks. This paper mainly focuses on performance evaluation of LTE physical layer to study and analysis the effect of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    Performance Evaluation of Some Routing Protocols Using TCP Traffic Types in Mobile Ad Hoc Networks

    Routing is a critical issue in a Mobile Ad-hoc NETwork (MANET). The most famous MANET routing protocols are AODV, DSDV, DSR and AOMDV. Although the performance evaluation of these routing protocols have been extensively simulated, most of the researchers are focusing on the User Datagram Protocol (UDP) traffic type supposing...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    Optical Encryption Techniques: An Overview

    Over the years extensive studies have been carried out to apply coherent optical methods in real time communications and multimedia transmission. This is especially true when a large amount of information needs to be processed. The transmitted data can be intercepted by non-authorized people; this explains why considerable effort is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    Software Architectures: A Comparative Study for Web Based Applications

    Correct architecture is the backbone of the successful software. To address the complexity of the growing software there are different architectural models that are designed to handle this problem. The most important thing is to differentiate software architecture from software design. As the web based applications are developed under tight...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    Streaming Algorithm For Multi-path Secure Routing in Mobile Networks

    Mobile Ad hoc NETworks (MANETs) have a self-organizing network architecture, where a set of mobile nodes with wireless network interfaces may form a temporary network without any infrastructure. The characteristic features of ad hoc networks are dynamic topology, lack of infrastructure, the compounds of variable capacity, etc., which are the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    Mobile Based System for Palestine Exchange Management

    In this paper, the authors aim to provide better stock market watching through user friendly, efficient, and convenient mobile based system. It allows investors to monitor financial market using Short Message Service (SMS). On one hand, their system sends the trading prices of stocks to customers as these prices change....

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    A Literature Review and Comparative Analyses on SQL Injection: Vulnerabilities, Attacks and Their Prevention and Detection Techniques

    SQL injection is a technique that exploits a security vulnerability occurring in the database layer of an application. The attack takes advantage of poor input validation in code and website administration. It allows attackers to obtain unauthorized access to the back- and database to change the intended application generated SQL...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    An Efficient Protective Layer Against SQL Injection Attacks

    In this paper, the authors present a detailed discussion on different SQL injection attacks and their prevention technique. In addition, they proposed a new scheme for prevention of SQL injection attack, which consist of three blocks or three tier architecture: the clients, the application server and the database server. Their...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    FHAMIPv6/AHRA vs FHAMIPV6/AODV

    In order to support the FHMIPv6 protocol in an ad-hoc network, the authors introduced a series of changes in the source code, they modified the ability to recognize and process messages of the intermediate nodes during the registration process, so that messages were successfully transmitted from source to destination. The...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    Digital Educational Resource to Support the Computer Networks Course

    In this paper, the authors present an educational game developed in three dimensions using software for modeling and animation (blender). The thematic that this development encompasses aims at providing students of computer networks with a tool that helps them to have a more meaningful learning in the process that involves...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    Performance Evaluation of Three Node Tandem Communication Network Model With Feedback for First Two Nodes Having Homogeneous Poisson Arrivals

    In this paper, the authors introduced the three node communication model with feedback for the first and second nodes assuming where every arrival makes homogeneous Poisson process one of the possible decisions by forwarding to the next node or to return back to nodes without taking service. Assuming such a...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    Comparison of PBRR Scheduling Algorithm with Round Robin and Heuristic Priority Scheduling Algorithm in Virtual Cloud Environment

    While considering the virtual cloud environment and various terms associated with it resource provisioning and load balancing are the main areas where research work has been going on at vast pace. Here the authors will discuss the various things related to the cloud environment. Their paper is to compare the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    Algorithmic Solution to Reduce Storage Overhead On Cloud Based System

    Cloud computing is a technology that provide on-demand services namely storage-as-a-service, platform-as-a-service etc. over the internet via cloud vendors from the market to the user. Cloud computing allows utilization of the services regardless of the installation and maintenance problems to the users. Storage of data on single local machine or...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    Email Filtering and Analysis Using Classification Algorithms

    With the various developments that are taking place in the field of technology especially in the communication domain, there are a plethora of malpractices that are being practiced to hinder the users` chores. Most of these practices can be observed in the email account of a user. Any internet user...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2014

    RPAR: Pharaonis Approach Based Reserve Path Adaptive Routing Topology for Handling QoS Constraints in Mobile Ad Hoc Networks

    Specially structured and independent nodes are the special of ad hoc. To exchange data, Nodes always use a medium which is wireless due to that, message or data can be transferred only when both are in broadcast range. The difficult behavior which needs no efforts is the result of biologically...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2014

    Implementation of Android Based Mobile Learning Application as a Flexible Learning Media

    Computer technology has been experiencing a quite rapid development in which it, in turn, has also caused a change in human life style. One of technologies bringing an impact on such life style is in the use of computer technology embedded in mobile communication devices. Now-a-days, a new trend in...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2014

    Critical Review of Authentication Mechanisms in Cloud Computing

    Cloud computing is a technology, which provides low cost, scalable computation capacity and a stack of services to enterprises on demand for expansion. The complications caused by data security and privacy are the main hindrances in its acceptance. Threats in cloud computing can be faced by adopting various security measures....

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Cloud Computing and Its Applications in the World of Networking

    The paper discusses the most discussed topic nowadays 'Cloud computing'. Cloud computing is becoming a buzzword. The paper explains the concept, Services provided by cloud computing and different service providers. Also it works out how this technology can be harnessed to bring benefits to the challenges of the business, in...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Email Mining: A Review

    E-mail is one of the most widely used ways of written communication over the internet, and its traffic has increased exponentially with the advent of World Wide Web. The increase in email traffic comes also with an increase in the use of emails for illegitimate purpose. Phishing, Spamming, email bombing,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    A Generalized Framework of Privacy Preservation in Distributed Data Mining for Unstructured Data Environment

    The management of unstructured data is recognized as one of the major unsolved problems in the information industry and data mining paradigm. Unstructured data in computerized information that either does not have a data model and there are not easily usable by data mining. This paper proposes a solution to...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Data Optimization From a Multiple Species Network Using Modified SFLA(Shuffled Frog Leaping Algorithm)

    In this paper, the authors present a novel approach that uses inter-species sequences homology to connect the networks of multi species and possible more species and possible more species together with gene ontology dependencies in order to improve protein classification for research work. Proteins are involved in many for all...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Presentation an Approach for Scientific Workflow Distribution on Cloud Computing Data Center's Servers to Optimization Usage of Computational Resource

    In a distributed system Timing and mapping the priority of tasks among processors is one of the issues attracted most of attention to itself. This issue consists of mapping a DAG with a set of tasks on a number of parallel processors and its purpose is allocating tasks to the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    A Novel Chaotic Encryption Scheme Based on Pseudorandom Bit Padding

    Cryptography is always very important in data origin authentications, entity authentication, data integrity and confidentiality. In recent years, a variety of chaotic cryptographic schemes have been proposed. These schemes have typical structure which performed the permutation and the diffusion stages, alternatively. The random number generators are intransitive in cryptographic schemes...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Implementing an Expert Diagnostic Assistance System for Car Failure and Malfunction

    Applications in fault diagnosis are continuously being implemented to serve different sectors. Car failure detection is a sequence of diagnostic processes that necessitates the deployment of expertise. The Expert System (ES) is one of the leading Artificial Intelligence (AI) techniques that have been adopted to handle such task. This paper...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Performance Analysis of Various Routing Protocols for Motorway Surveillance System Cameras' Network

    The Motorway Surveillance System (MSS) is one of the most important technologies used to collect information about road conditions and then provide that collected information to motorway users. The routing in networks used by these systems is a critical task due to the highly dynamic environments. This paper presents performance...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    An Analysis of Internet Banking Security of Foreign Subsidiary Banks in Australia: A Customer Perspective

    Internet banking has been deployed more frequently over the past few decades to support and improve the operational and managerial performance within the banking industry. However, the security issues of confidentiality, integrity and privacy have become increasingly more serious concerns in Internet banking systems because of the potential negative impact...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Improving Accuracy of Authentication Process Via Short Free Text Using Bayesian Network

    The internet security problems are a crucial threat to all users in the cyber world. One of the important problems about internet security concerned with user classification and authentication. However, there are multiple components to classify and authenticate users. The first one is using username/password and the second method is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Survey of NoC and Programming Models Proposals for MPSoC

    The aim of this paper is to give briefing of the concept of network-on-chip and programming model topics on multiprocessors System-on-Chip world, an attractive and relatively new field for academia. Numerous proposals from academia and industry are selected to highlight the evolution of the implementation approaches both on NoC proposals...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Energy Efficient Security Preserving VM Live Migration in Data Centers for Cloud Computing

    Virtualization is an innovation that has widely been utilized in modern data centers for cloud computing to realize energy-efficient operations of servers. Virtual Machine (VM) migration brings multiple benefits such as resource distribution and energy aware consolidation. Server consolidation achieves energy efficiency by enabling multiple instances of operating systems to...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Semantic Service Composition With QoS End -To- End Constraints Via AND/OR Graphs

    In this paper, the authors present AND/OR graphs as a unifying framework for semantic service composition that considers users QoS constraints. The main virtues of this representation among others are its ability to express semantic inference and to deal with QoS constraints from different perspectives. In addition, it correctly handles...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Graphical Model Based for Robust Fault Diagnosis

    In this paper, robust Fault Detection and Isolation (FDI) design in nonlinear uncertain dynamic system, with chemical and thermodynamic phenomenon, is addressed. The methodology using a Bond Graph (BG) representation in Linear Fractional Transformation (LFT) form is shown to be a valuable tool for developing dynamic threshold generators and achieving...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Modify AODV Routing Protocol to Improve Motorway Surveillance System Performance

    This paper presents an algorithm to modify the Ad hoc On-demand Distance Vector (AODV) routing protocol in order to improve the routing performance in motorway surveillance systems. The proposed protocol has all the characteristics of the original AODV routing protocol since it follows all the steps of the route discovery...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Comparison Between Poissonian and Markovian Primary Traffics in Cognitive Radio Networks

    Cognitive Radio generates a big interest as a key cost-effective solution for the underutilization of frequency spectrum in legacy communication networks. The objective of this paper lies in conducting a performance evaluation of the end-to-end message delivery under both Markovian and Poissonian primary traffics in lossy Cognitive Radio networks. The...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Identification of Nominated Classes for Software Refactoring Using Object-Oriented Cohesion Metrics

    The production of well-developed software reduces the cost of the software maintainability. Therefore, many software metrics have been developed to measure the quality of the software design. Measuring class cohesion is considered as one of the most important software quality measurements. Unfortunately, most of approaches that have been proposed on...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Improving Performance of Distributed Data Mining (DDM) With Multi-Agent System

    Autonomous agents and multi-agent systems (or agents) and knowledge discovery (or data mining) are two of the most active areas in information technology. Ongoing research has revealed a number of intrinsic challenges and problems facing each area, which can't be addressed solely within the confines of the respective discipline. A...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    MVSDAP: A New Extensible, Modifiable and Secure Data Access Pattern for Layered Information Systems

    Nowadays, in software architecture especially in agile methodologies dynamicity, extendibility and modifiability are important challenges. In three layered architecture, plenty of patterns are provided for data access layer. In this paper, additional to secure access to data and dynamic validation controls, emphasis is on extendibility and modifiability of data access...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    A Novel Approach of Query Optimization for Genetic Population

    In relational database large information is maintained and organized so that user can get the desired information in predictable and reliable fashion through the query processing. Retrieving these results in timely manner is Query Optimization. Optimization is a process of choosing most efficient way to execute a SQL query. This...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    An Improved Authentication Scheme for Passport Verification Using Watermarking Technique

    The prominent problem in passport authentication is to authenticate the passport document for its owner. The critical factor of this authentication procedure is to establish a correspondence between Passport's photo and its owner. A passport document contains holder details in supplement to the holder's signature. The authors propose an authentication...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Design and Performance Evaluation of a New Irregular Fault-Tolerant Multistage Interconnection Network

    Inter-connecting processors and linking them efficiently to the memory modules in a parallel computer is not an easy task. Hence, an interconnection network that provides the desired connectivity and performance at minimum cost is required. The design of a suitable interconnection network for inter-processor communication is one of the key...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Mean Square Error Performance of OFDM Systems Against Signal to Noise Ratio Under Different Fading Channels

    The well known problem in an Orthogonal Frequency Division Multiplexing (OFDM) system is its sensitivity to frequency offset. Most of the coherent OFDM systems transmit pilot symbols on some of the subcarriers to estimate channel attenuation and also add a Cyclic Prefix (CP) to avoid inter carrier interference and inter...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Cryptography Based E-Commerce Security: A Review

    E-commerce is a powerful tool for business transformation that allows companies to enhance their supply-chain operation, reach new markets, and improve services for customers as well as for providers. Implementing the E-commerce applications that provide these benefits may be impossible without a coherent, consistent approach to E-commerce security. E-commerce has...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    A Learning Automata Based Algorithm for Solving Capacitated Vehicle Routing Problem

    This paper presents an approximate algorithm based on distributed learning automata for solving capacitated vehicle routing problem. The Vehicle Routing Problem (VRP) is an NP-hard problem and Capacitated Vehicle Routing Problem variant (CVRP) is considered here. This problem is one of the NP-hard problems and for this reason many approximate...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    OFDM Transmission Performance Evaluation in V2X Communication

    The Vehicle to Vehicle and Vehicle to Infrastructure V2X communication systems are one of the main topics in research domain. Its performance evaluation is an important step before their on board's integration into vehicles and its probable real deployment. Being the first of a series of three publications, this paper...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Software Metrics to Estimate Software Quality Using Software Component Reusability

    Today, most of the applications developed using some existing libraries, codes, open sources, etc. As a code is accessed in a program, it is represented as the software component. Such as in java beans and in .net ActiveX controls are the software components. These components are ready to use programming...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Development of Personal Learning Network System to Build e-Literacy

    A great nation can be seen one of them from the high culture of literacy communities. Indonesian nation still needs many efforts to create a culture of high literacy of the society. The potential is most likely to be initiated immediately is the education community. In this regard, this paper...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Project Management Phases of a SCADA System for Automation of Electrical Distribution Networks

    The aim of this paper is, firstly, to recall the basic concepts of SCADA (Supervisory Control And Data Acquisition) systems, to present the project management phases of SCADA for real time implementation, and then to show the need of the automation for Electricity Distribution Companies (EDC) on their distribution networks...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Energy Aware Reliable Routing Protocol (EARRP) for Mobile Ad Hoc Networks Using Bee Foraging Behavior and Ant Colony Optimization

    Energy aware reliable routing in mobile ad hoc networks is an astonishing task and in this paper, the authors propose to design, develop such protocol which will be a good solution. For developing such protocol EARRP, two swarm intelligence techniques are involved namely ant colony optimization and bee colony foraging...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Dynamic Replica Control Algorithm for Periodic/Aperiodic Transactions in Distributed Real-Time Databases

    Maintaining consistency between the actual state of the real-time object of the external environment and its images as reflected by all its replicas distributed over multiple nodes is one of the most important issue affecting the design of real-time database. Efficient replica control algorithm can contribute significantly to maintain this...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Performance Evaluation of QoS Parameters in Dynamic Spectrum Sharing for Heterogeneous Wireless Communication Networks

    Cognitive radio nodes have been proposed as means to improve the spectrum utilization. It reuses the spectrum of a primary service provider under the condition that the primary service provider services are not harmfully interrupted. A cognitive radio can sense its operating environment's conditions and it is able to reconfigure...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    A Priority Based Bandwidth Reservation Protocol for Wireless Mesh Networks

    In wireless mesh networks, when compared with traditional applications, multimedia application requires the need of inflexible Quality of Services (QoS) for high speed digital audio and videos. Under such a condition, the need of proper resource allocation is extremely handy. In this paper, the authors propose to develop a Priority...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Analysis of the Similarities and Differences Between MPLS Label Distribution Protocols RSVP and CR-LDP

    MPLS is a new technology that offers to open up the Internet by providing many additional services to applications using IP. MPLS forwards data using labels that are attached to each data packet. These labels must be distributed between the nodes that comprise the network. Many of the new services...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Comparison Based Analysis of Different Cryptographic and Encryption Techniques Using Message Authentication Code (MAC) in Wireless Sensor Networks (WSN)

    Wireless Sensor Networks (WSN) are becoming popular day by day, however one of the main issue in WSN is its limited resources. The authors have to look to the resources to create Message Authentication Code (MAC) keeping in mind the feasibility of technique used for the sensor network at hand....

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Fuzzy-Controlled Load-Balanced Broadcasting (FLB) in Clustered Mobile Ad Hoc Networks

    A mobile ad hoc network is a wireless network that is self-organized with many mobile nodes. No static infrastructure such as a wired backbone is available. All nodes are free to move around and the network topology may change frequently. Due to limited transmission range of wireless network interface, nodes...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Robust Iris Recognition Based on Statistical Properties of Walsh Hadamard Transform Domain

    In this paper, a new approach of iris image feature extraction technique based on the statistical properties of Walsh Hadamard Transform (WHT) domain is proposed. A Canny Edge Detection followed by Hough Transform is used to detect the iris boundaries in the digital image of an eye. The segmented and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Ultra-Wide-Band Microstrip Concentric Annular Ring Antenna for Wireless Communications

    In this paper, a new design technique for bandwidth enhancement of concentric microstrip annular ring slot antennas is presented. Using this technique, an Ultra-Wide-Band antenna is designed with simulated bandwidth of 111.29%. Microstrip patch antennas are widely used because of their several advantages such as light weight, low volume, low...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Peer to Peer Networks Management Survey

    Peer-to-Peer systems are based on the concept of resources localization and mutualisation in dynamic context. In specific environment such as mobile networks, characterized by high variability and dynamicity of network conditions and performances, where nodes can join and leave the network dynamically, resources reliability and availability constitute a critical issue....

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Privacy Preserving RFE-SVM for Distributed Gene Selection

    The Support Vector Machine Recursive Feature Elimination (SVMRFE) is one of the most effective feature selection methods which has been successfully used in selecting informative genes for cancer classification. This paper extends this well-studied algorithm to the privacy preserving distributed data mining issue. For gene selection over multiple patient data...

    Provided By International Journal of Computer Science Issues