International Journal of Computer Science Issues

Displaying 1-40 of 926 results

  • White Papers // Mar 2015

    Generating Test Cases for E-Commerce Systems

    Software testing is the process of executing a program or system for finding any error or defect. Software testing strategy helps to convert test case designs into well-planned execution steps that will result in the construction of successful software. Software testing is any activity aimed at evaluating a capability of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2015

    Interoperable Distributed Data Warehouse Components

    Extraction, Transformation and Loading (ETL) are the major functionalities in Data Warehouse (DW) solutions. Lack of component distribution and interoperability is a gap that leads to many problems in the ETL domain, because these ETL components are tightly-coupled in the current ETL framework. Furthermore, complexity of components extensibility is another...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2015

    Inter Organizational System Management for Integrated Service Delivery: An Enterprise Architecture Perspective

    Service sharing is a prominent operating model to support business. Many large inter-organizational networks have implemented some form of value added integrated services in order to reach efficiency and to reduce costs sustainably. Coupling service orientation with enterprise architecture paradigm is very important at improving organizational performance through business process...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2015

    Keyword Reduction for Text Categorization Using Neighborhood Rough Sets

    Keyword reduction is a technique that removes some less important keywords from the original dataset. Its aim is to decrease the training time of a learning machine and improve the performance of text categorization. Some researchers applied rough sets, which is a popular computational intelligent tool, to reduce keywords. However,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Dec 2014

    A Multi-Agent Systems Engineering for Semantic Search of Reuse Software Components

    In Component-Based Software Development (CBSD) approach, the searching and retrieving of accurate reusable software components that are stored in large, distributed and heterogeneous-structured repositories is a tedious and time consuming process. This paper presents the design and implementation of ontology-based multi-agent software component retrieval system using semantic and structural formalism....

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2014

    An Analytical Comparison between Applying FFT and DWT in WiMAX Systems

    Discrete Wavelet Transform (DWT) has advantages over Fast Fourier Transform (FFT) in analyzing signals containing sharp spikes. DWT processes data at different scales. If the people look at the signal with a large window, they would notice big features. Similarly, if they look at the signal with a small window,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2014

    A Delay Aware Routing Protocol for Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) consist of sensor nodes which can be deployed for various operations such as agriculture and environmental sensing, wild life monitoring, health care, military surveillance, industrial control, home automation, security etc. Quality of Service (QoS) is an important issue in Wireless Sensor Networks (WSNs) and providing QoS...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2014

    Securing VoIP Systems: A QoS-Oriented Approach

    Voice over IP (VoIP) is a communication technology allowing voice traffic transmission as data packets over a private or a public IP network. VoIP allows significant benefits for customers and service providers including cost savings, services integration, and systems extensibility. Nevertheless, the VoIP technology suffers from many hurdles such as...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2014

    The Impact of Capability Level on Maturity of Business Intelligence Initiatives

    In this paper, the authors propose enterprise business intelligence maturity model that involves thirteen capacity factors, which are (strategic management, performance measurement, balanced scorecard, information quality, data warehouse, master data management, metadata management, analytical, infrastructure, knowledge management, people, organization culture and change management). This paper is to investigate how does...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2014

    Predicting Sales In E-commerce Using Bayesian Network Model

    An area of substantial research is that of predicting product sales, such as books, video games and movie tickets. There are a number of prediction models that have been used to predict future sales however these models attempt to solve the problem by making assumptions. These models assume that independent...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2014

    Revisiting Security Ontologies

    Significant innovations in virtualization and distributed computing as well as improved access to high-speed Internet have induced interest in cloud computing. Contemporary exploration of all stages of service models clearly proves the immense significance of \"Security in cloud computing\", which being as obtuse as it is pertinent, demands attention. An...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2014

    Development of a Mobile Service on a WiFi Network for the Evaluation of Mathematical Skills

    In this paper, the authors describe the design and development of a mobile service to make practical assessments of different topics of mathematics in order to improve the skills of students in high school education. This tool has the ability to create user accounts for participants, as well as storing...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2014

    Constructing Sierpinski Gasket Using GPUs Arrays

    A fractal is a mathematical set that typically displays self-similar patterns, which means it is "The same from near as from far". Fractals may be exactly the same at every scale; they may be nearly the same at different scales. The concept of fractal extends beyond trivial self-similarity and includes...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2014

    A Context-Based Approach for Troubleshooting Database Problems

    In the area of database administration, when a hot critical problem suddenly occurs, an organization may lose large amounts of money for each hour of downtime. In such situations, the life of a DataBase Administrator (DBA) can become stressful because of the excessive pressure to solve problems quickly. Most of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    The Potential and Challenges of Big Data - Recommendation Systems Next Level Application

    The continuous increase of data generated provides enormous possibilities of both public and private companies. The management of this mass of data or big data will play a crucial role in the society of the future, as it finds applications in different fields. There are so much potential and extremely...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Oscillation Characteristics of the Multi-stage Learning for the Layered Neural Networks and Its Analysis

    In this paper, the authors propose an efficient learning method for the layered neural networks based on the selection of training data and input characteristics of an output layer unit. The multi-stage learning method proposes by the authors for the function approximation problems of classifying learning data in a phased...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    GINS: Dynamic Emissive Location-Based for Underwater Sensor Networks

    Due to collect and monitor exploration of natural location resources which was difficult to acquire the location without Global Position System (GPS) in the underwater. However, there are something research was used Inertial Navigation System (INS) to location, but the INS accuracy degrades over time that the issue will be...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    The Use of Big Data in Education

    In this paper, the authors will see the use of big data and open data in education. Also how big amount of data can be used and extracted to something useful, helping the industry to raise their profits. This paper is a study on the use of big data in...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Testing Security Policies for Distributed Systems: Vehicular Networks as a Case Study

    Due to the increasing complexity of distributed systems, security testing is becoming increasingly critical in insuring reliability of such systems in relation to their security requirements. To challenge this issue, the authors rely in this paper on model based active testing. In this paper, they propose a framework to specify...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    QoS Safety Protocol Analysis in FHAMIPv6/MPLS/Diffserv Integration and Load Balancing Algorithm

    One of the most important aspects to consider in order to provide quality services in an ad hoc network is the security. In the integration FHAMIPv6/MPLS/DiffServ and congestion algorithms, the authors analyses QoS but do not consider the QoS safety. The security issue is essential for not degrade QoS. This...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Validating Predictive Performance of Classifier Models for Multiclass Problem in Educational Data Mining

    Classification is one of the most frequently studied problems in data mining and machine learning research areas. It consists of predicting the value of a class attribute based on the values of other attributes. There are different classifications models were proposed in Educational Data Mining (EDM) and it is used...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Implementation of End-to-End QoS Mapping Scheme on SCIS WiFi Network

    For developing countries, wireless networks seem to be the available alternative for providing affordable telecommunications services. In Iraq, the main governmental wireless Internet service provider is SCIS Company. It adopts WiMAX and WiFi wireless networks. Considering Quality of Service (QoS) as an indicator of network performance, it is a challenge...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Securing Data from Collusion Black Hole Attack Using Optimized Link Source Routing Protocol for MANET

    In this paper, a new algorithm for the selection of MultiPoint Relays (MPR) in Optimized Link State Routing protocol (OLSR) is proposed. OLSR is a routing protocol which could reduce the overhead of control messages by selecting MPRs. So, the number of MPRs is a key for the performance of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    A Knowledge Management Framework Using Business Intelligence Solutions

    The business environment, as a whole, was changed. It became more dynamic and more complex. Most organizations across the world have realized that in this rapidly changed environment, there is a strong need to become globally competitive and more interactive with the customers. The survival guide to competitiveness is to...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Influence of Mobile Device Categories on the Usability of Mobile Website Categories

    In this paper, the authors investigate the influence of mobile device categories on the usability of mobile website categories. The mobile website categories investigated were, news, search, service, portal, and media sharing website categories. And the mobile device categories used were, Touch Screen Mobile Phones (TSMP), Non-Touch Screen Mobile Phones...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Eye with Intelligence Connecting CCTV to Big Data, Hadoop and R

    Security, an abstraction which creates a virtual boundary and gives the sense of separation between the asset and the threat. It provides a layer of protection to the asset by encapsulating it and just making visible the necessary details to the outside world. In this paper, the authors are trying...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Web Service Security Overview, Analysis and Challenges

    The Web Services (WS) technology became the reference architecture during the last few years for the integration of heterogeneous systems. As it is now-a-days critical for business to make applications communicate over the internet. WS has take essential position for building and integrating e-business applications and to allow information system...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Spectrum Sensing for Cognitive Radio Users using Constant Threshold Range in Energy Detector

    Spectrum Sensing has an important role in Cognitive Radio Network (CRN). Different methodologies have been proposed in the literature for spectrum sensing. Energy detector method is more practical and less in complexity. This paper presents analysis of energy detection algorithm in different scenarios with different parameters to detect presence or...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Study on Secure Cloud Computing with Elliptic Curve Cryptography

    Cloud computing plays a major role by providing different resources in the form of web services like tax calculation web service, stock information web service, e-banking web service etc. But the authors can rely on cloud computing only when these web services are really secure enough to use. In this...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    A New Viewpoint to Database and Data Using Physics Concepts

    A modern tool has been introduced in this paper to researchers by definition of new concepts and approaches in order to optimize performance of databases. Although this is not going to argue that optimization of concepts like a better accessibility is impossible by the available tools, the main purpose is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Towards Gas Density Measurement: Design and Implementation of the Application-Oriented WSN

    Wireless Sensor Network (WSN) provides an effective real-time monitoring approach. A design and implementation of WSN is introduced in this paper, which is applied to concentration measurement of hazardous gas. A hardware platform solution with compatibility and scalability is proposed in the paper. The customized communication protocol and applications oriented...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Facebook Page Spam Detection using Support Vector Machines based on n-gram Model

    With social networks like Facebook, twitter reaching to the common masses, these have become the best target for spammers. The newest way to mislead and fraud viewers is page spam. Viewers are deceived to click on links to spam their connections, redirect to a fraudulent business or spread wrong information...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    A Review of the Problems and Impacts Related to Network Voids in Wireless Sensor Networks

    In this paper, an exploratory study has been conducted to understand the various aspects of the network void problem. This paper provides insights into multiple research questions, which include how and why each void problem occurs. The authors have covered ten void problems (i.e., coverage voids or holes, routing voids...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Applying GIS Concepts to a Pervasive Game: Spatiotemporal Modeling and Analysis Using the Triad Representational Framework

    Given pervasive games that maintain a virtual spatiotemporal model of the physical world, game designers must contend with space and time in the virtual and physical. Previous papers on pervasive games have partially contended with these representations, but an integrated conceptual model is lacking. Because they both make use of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Development of a Business Logic Using Simple Application of Rough Set Theory

    In today's scenario, business establishment usually fails due to improper planning and lack of business knowledge. In this paper, the authors develop a concept which is precise and reduces the number of data attributes to start any business. For the development of the concept, they have used the concept of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    Design of an Ultra-Wideband Antenna Using Split Ring Resonator

    In this paper, the authors present a novel patch antenna using circular split ring resonator for ultra-wideband applications. The radiating element of the proposed antenna is a Split-Ring Resonator (SRR). The geometrical parameters are optimized to reach the best electromagnetic properties, with a small size (30 mm

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    Performance of COFDM Technology for the Fourth Generation (4G) of Mobile System With Convolutional Coding and Viterbi Decoding

    The Fourth Generation (4G) of mobile cellular system network is growing very fast and new services come-up, so intelligent way of visualization and managing the 4G network and service states are required. In this paper, Coded Orthogonal Frequency Division Multiplexing (COFDM) scheme using convolutional coding with different code rates and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    Performance Analysis of the Proxy Mobile IPv6 (PMIPv6) and Multiprotocol Label Switching (MPLS) Integration

    In this paper, the authors analyze and develops the integration of the PMIPv6 (Proxy Mobile IPv6) and MPLS (Multi-Protocol Label Switching) protocols in order to determine the impact at the time of handover in an IP micro mobility environment. The proposed integration suggests the establishment of abidirectional Label Switched Path...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    A Literature Review and Comparative Analyses on SQL Injection: Vulnerabilities, Attacks and Their Prevention and Detection Techniques

    SQL injection is a technique that exploits a security vulnerability occurring in the database layer of an application. The attack takes advantage of poor input validation in code and website administration. It allows attackers to obtain unauthorized access to the back- and database to change the intended application generated SQL...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    An Efficient Protective Layer Against SQL Injection Attacks

    In this paper, the authors present a detailed discussion on different SQL injection attacks and their prevention technique. In addition, they proposed a new scheme for prevention of SQL injection attack, which consist of three blocks or three tier architecture: the clients, the application server and the database server. Their...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    Scalable and Efficient Self-Join Processing Technique in RDF Data

    Efficient management of RDF data plays an important role in successfully understanding and fast querying data. Although the current approaches of indexing in RDF Triples such as property tables and vertically partitioned solved many issues; however, they still suffer from the performance in the complex self-join queries and insert data...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    Distributed Data Mining by Associated Rules: Improvement of the Count Distribution Algorithm

    Today, most large systems are overwhelmed by a flood of data that is stored daily in databases distributed. It is in this context that the distributed data mining is used by offering many parallel and distributed algorithms to extract crucial information. Among the most popular techniques, the authors are interested...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2011

    Optimization of Power Consumption in VLSI Circuit

    Space, power consumption and speed are major design issues in VLSI circuit. The design component has conflicting affect on overall performance of circuits. An optimization of power dissipation can be achieved by compromising various components. Power consumption in VLSI circuit (like in multipliers) is also data dependent. In this paper,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Design, Simulation and Hardware Implementation of Low Density Parity Check Decoders Using Min-Sum Algorithm

    A Variable Node Processing Unit (VNPU) and a Check Node Processing Unit (CNPU) are designed in order to be used in Low Density Parity Check (LDPC) decoding by the Min-Sum Algorithm (MSA). The designed blocks are fully parallel and flexible to be used for different block length when a regular...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    A Fault-Tolerant 32 nm CMOS Double Sideband Amplitude Suppressed Carrier Modulator-Demodulator Circuit Implementation

    In this paper, the authors present a low-voltage, low-power and fault-tolerant implementation of Double SideBand Suppressed Carrier (DSB-SC) amplitude modulator-demodulator circuit for portable communication systems. Through the approximation proposed in this work, a CMOS four quadrant multiplier is used as a (de)modulator circuit to generate DSB-SC (de)modulated signals. Furthermore, the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2010

    Static Noise Margin Analysis of SRAM Cell for High Speed Application

    In this paper, the authors present the different types of analysis such as noise, voltage, read margin and write margin of Static Random Access Memory (SRAM) cell for high-speed application. The design is based upon the 0.18 μm CMOS process technology. Static Noise Margin (SNM) is the most important parameter...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2011

    A Technique to Reduce Transition Energy for Data-Bus in DSM Technology

    As CMOS VLSI integration continues with shrinking feature size, the energy dissipation on the on-chip data buses and long interconnects becoming a bottle neck for high performance integrated circuits. This energy dissipation is due to increase in inter-wire capacitance. This capacitance on on-chip data buses and long interconnects plays an...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Efficient Circuit Configuration for Enhancing Resolution of 8-Bit Flash Analog to Digital Converter

    The need constantly exists for converters with higher resolution, faster conversion speeds and lower power dissipation. High speed Analog to Digital Converters (ADC's) has been based on flash architecture, because all comparators sample the analog input voltage simultaneously, this ADC is thus inherently fast. Unfortunately flash ADC requires 2N -...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    The Study on the Application of Business Intelligence in Manufacturing: A Review

    A manufacturing based organization operates in an environment where a fast and effective decision is needed. This is to ensure that the output is met with customer compliance. There exists manufacturing systems that collect the operational data and the data turns out to be in a high volume due to...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    A Maturity Model for Business Intelligence System Project in Small and Medium-Sized Enterprises: An Empirical Investigation

    In the recent years many studies on maturity model have been carried out. Some refer specifically to maturity models for Business Intelligence (BI). Starting from an analysis of the existing literature, the aim of this paper is to develop a maturity model for the business intelligence system project in Small...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Design Approaches to Enhance Usability for E-Commerce Sites

    Human computer interaction has a great collaboration with World Wide Web (WWW). The fastest growing web technology and interaction issues are compelling web designers to think for quality and user friendly designs in the web. Websites are expected to be designed in a way which will allure the visitors who...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2014

    Modeling and Simulation of Multiprocessor Systems MPSoC by SystemC/TLM2

    The current manufacturing technology allows the integration of a complex multiprocessor system on one piece of silicon (MPSoC for Multiprocessor System-on-Chip). One way to manage the growing complexity of these systems is to increase the level of abstraction and to address the system-level design. In this paper, the authors focus...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    Asynchronous Hybrid Kogge-Stone Structure Carry Select Adder Based IEEE-754 Double-Precision Floating-Point Adder

    In this paper, the design and implementation of a generic fast asynchronous Hybrid Kogge-Stone Structure Carry Select based Adder (HKSS-CSA) is described in detail and its application in the design of asynchronous Double Precision Floating-Point Adder (DPFPA) is presented and the improved latency performance it provides is discussed. A detailed...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    A Novel Low Complexity Combinational RNS Multiplier Using Parallel Prefix Adder

    Modular multiplication plays an important role in encryption. One of the encryption methods which need fast modular multiplication is RSA where large numbers are needed to empower large modules. In such methods, in order to show numbers, RNS is usually used with multiplication as the core. Modulo 2n+1 multipliers are...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    Design of an Energy-Efficient CNFET Full Adder Cell

    In this paper, by using the Carbon Nanotube Field Effect Transistor (CNFET), which is a promising alternative for the MOSFET transistor, two novel energy-efficient Full Adders are proposed. The proposed full adders show full swing logic and strong output drivability. The first design uses eight transistors and nine capacitors and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Six New Full Adder Cells Based on Majority-Not Gate in 45nm CMOS Technology and Analysis in SOI Technology

    In this paper, the authors present six new 1-bit full adder topologies operating 45nm technology and SOI technology. Inverse Majority Gate (IMG) together with NAND/NOR were used as the main computational building blocks. Six new 1-bit full adder cells are simulated 45nm CMOS technology and SOI technology with different supply...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Multimode FPGAwith Flexible Embedded FPUS

    The performance of field-programmable gate arrays used for floating-point applications is poor due to complexity of floating-point arithmetic. Implementing floating-point units on FPGAs consume a large amount of resources. This makes FPGAs less attractive for use in floating-point intensive applications. There is a need for embedded FPUs in FPGAs. The...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2011

    A New Design for Array Multiplier with Trade Off in Power and Area

    In this paper, a low power and low area array multiplier with carry save adder is proposed. The proposed adder eliminates the final addition stage of the multiplier than the conventional parallel array multiplier. The conventional and proposed multiplier both are synthesized with 16-T full adder. Among transmission gate, transmission...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Comment on "Quantum Multiplexer Designing and Optimization Applying Genetic Algorithm"

    The authors have noticed that many fundamental laws and rules of quantum-circuit are violated in a work published in International Journal of Computer Science Issues. The authors of this published paper presented a quantum multiplexing circuit which is composed of half-adders, i.e. quantum multiplexing functionality is claimed to achieve by...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    A Novel Architecture for Quantum-Dot Cellular Automata Multiplexer

    Quantum-dot Cellular Automata (QCA) technology is attractive due to its low power consumption, fast speed and small dimension; therefore it is a promising alternative to CMOS technology. Additionally, multiplexer is a useful part in many important circuits. In this paper, the authors propose a novel design of 2:1 MUX in...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2011

    Using Evolutionary Strategies Algorithm in the Evolutionary Design of Sequential Logic Circuits

    Evolvable HardWare (EHW) is a set of techniques that are based on the idea of combining reconfiguration hardware systems with evolutionary algorithms. In other word, EHW has two sections; the reconfigurable hardware and evolutionary algorithm where the configurations are under the control of an evolutionary algorithm. This paper, suggests a...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Research of Embedded Hardware Optimization Design Algorithm

    Embedded hardware design is important in real world applications, but with the increase of the hardware scale the traditional methods cannot design them well. Cultural algorithms are a class of computational models derived from observing the cultural evolution process in nature. Aiming at the disadvantages of basic cultural algorithms like...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Accurate Dynamic Power Model for FPGA Based Implementations

    In this paper, the authors present an accurate Field Programmable Gate Array (FPGA) of analytical dynamic power models for basic operators at the RTL (Register Transfer Level) level. The models are based on the frequency, the activity rate and the input precision by using the Xpower tool in the presence...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    A Differential Double Pass Transistor Logic Unit

    In this paper, the authors present a new differential logic unit with duplicated functional outputs. The logic functions as well as their inverses are implemented within a single Logic Unit (LU) cell. The hardware overhead for the implementation of the proposed LU is lower than the hardware overhead required for...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    A Proficient Design of Hybrid Synchronous and Asynchronous Digital FIR Filter Using FPGA

    In this paper, a hybrid synchronous and asynchronous digital FIR filter is designed and implemented in FPGA using VHDL. The digital FIR filter of high throughput, low latency operating at above 1.3GHz was designed. An adaptive high capacity pipelined was introduced in the hybrid synchronous asynchronous design of the filter....

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    Obstacle Based Range-Free Localization-Error Estimation for WSN

    The projected paper considers a range-free localization protocols for the wireless sensor networks that highlights the localization irrationality problem in presence of obstruction. Here in the authors' proposed research work the mobile anchor node is assumed to have the evidence of their position where an interaction protocol is considered. The...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    RGWSN: Presenting a Genetic-Based Routing Algorithm to Reduce Energy Consumption in Wireless Sensor Network

    In this paper, a genetic-based routing algorithm to reduce energy consumption in sensor networks is presented. This method, by regarding distances hybrid parameters, energy and density, has created a fitness function which has optimal conditions compared to previous parameters. In the proposed algorithm, a new technique to select several probable...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    Performance Modeling and Analysis of Distributed-Based Polling Networks

    In this paper, the performance evaluation of distributed polling networks using the analytical equations and a developed simulation model is considered. The exhaustive service versus K-limited service are also investigated and compared. Other main measurements such as average cycle time, walking time are also compared and calculated. In general, the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    Non DTN Geographic Routing Protocols for Vehicular Ad Hoc Networks

    Vehicular Ad Hoc Networks are highly mobile wireless ad hoc networks. Routing of data in VANETs is a challenging task due to rapidly changing topology and high speed mobility of vehicles. Geographic routing protocols are becoming popular due to advancement and availability of GPS devices. In this paper, the authors...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    A Graphical Password Based System for Small Mobile Devices

    Passwords provide security mechanism for authentication and protection services against unwanted access to resources. A graphical based password is one promising alternatives of textual passwords. According to human psychology, humans are able to remember pictures easily. In this paper, the authors have proposed a new hybrid graphical password based system,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    A Comparative Study of Multi-Hop Wireless Ad-Hoc Network Routing Protocols in MANET

    Mobile Ad-hoc NETwork (MANET) is a collection of wireless mobile hosts forming a temporary network without the aid of any stand-alone infrastructure or centralized administration. Most of the proposed MANET protocols do not address security issues. In MANETs routing algorithm is necessary to find specific routes between source and destination....

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    An Efficient Algorithm for the Nearest Neighbourhood Search for Point Clouds

    This paper presents a high-performance method for the k-nearest neighbourhood search. Starting from a point cloud, first the method carries out the space division by the typical cubic grid partition of the bounding box; then a new data structure is constructed. Based on these two previous steps, an efficient implementation...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    Improved Free-Form Database Query Language for Mobile Phones

    This paper explains that it is possible to develop a database query formulation system for mobile phones which accepts unplanned queries, by allowing imprecise inputs. Since cell phones are poor in terms of resources as compared to other devices, the success of implementing such a method on them would mean...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    Architectural Model of Localization in Multi-Scale Communication for Wireless Sensor Networks

    There are several range-based localization algorithms that identify sensor's positions for different wireless sensor networks. In this paper, the authors propose the approach that highlights a new method of localization scheme to achieve high localization accuracy in the presence of radio irregularity and obstacles effects for wireless sensor networks. They...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    Comparative Study of 3G and 4G in Mobile Technology

    Mobile communication is one of the hottest areas and it is developing extremely fast in present times, thanks to the advances of technology in all the fields of mobile and wireless communications. Nowadays the use of 3G mobile communication systems seem to be the standard, while 4G stands for the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    Energy Efficient Clustering Algorithms in Wireless Sensor Networks: A Survey

    To maximize network lifetime in Wireless Sensor Networks (WSNs) the paths for data transfer are selected in such a way that the total energy consumed along the path is minimized. To support high scalability and better data aggregation, sensor nodes are often grouped into disjoint, non overlapping subsets called clusters....

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    Modelling an Enhanced Routing Protocol for Wireless Sensor Networks Using Implicit Clustering Technique

    The localization of sensor nodes can be a very enabling technology that can help in improving the performance of many algorithms designed for Wireless Sensor Networks (WSNs). This paper is geared towards developing a positioning system that uses received signal strength based on fingerprinting technique. The proposed system models the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    Study of Performance of the Combined MIM0 MMSE VBLAST-OFDM for Wi-Fi (802.11n)

    Wireless technologies such as Wi-Fi and Bluetooth have transformed the world of networks, and this technical revolution is still in its infancy. Wi-Fi (802.11b and g) now offers a limited range. It is also very susceptible to interference originating DECT phones and other wireless units. Finally, the Wi-Fi in its...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    Performance of MIMO VBLAST-OFDM in Ka-Band

    Technological advances have allowed the use of Ka-band for transmission in 30 GHz uplink and 20 GHz at downlink. The use of Ka-band has advantages over lower frequency bands; it allows a wider bandwidth and therefore a greater flow to pass. In addition, multi-beams technology allows a wide reuse frequency,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    Encrypted IT Auditing and Log Management on Cloud Computing

    In this paper, the authors are conducting the investigation studies over the IT auditing for assuring the security for cloud computing. During this investigation, they are implementing working of IT auditing mechanism over the cloud computing framework in order to assure the desired level of security. In the IT auditing...

    Provided By International Journal of Computer Science Issues