International Journal of Computer Science Issues

Displaying 1-40 of 834 results

  • White Papers // Jul 2014

    Performance Analysis of the Proxy Mobile IPv6 (PMIPv6) and Multiprotocol Label Switching (MPLS) Integration

    In this paper, the authors analyze and develops the integration of the PMIPv6 (Proxy Mobile IPv6) and MPLS (Multi-Protocol Label Switching) protocols in order to determine the impact at the time of handover in an IP micro mobility environment. The proposed integration suggests the establishment of abidirectional Label Switched Path...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    Design of an Ultra-Wideband Antenna Using Split Ring Resonator

    In this paper, the authors present a novel patch antenna using circular split ring resonator for ultra-wideband applications. The radiating element of the proposed antenna is a Split-Ring Resonator (SRR). The geometrical parameters are optimized to reach the best electromagnetic properties, with a small size (30 mm

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    Performance of COFDM Technology for the Fourth Generation (4G) of Mobile System With Convolutional Coding and Viterbi Decoding

    The Fourth Generation (4G) of mobile cellular system network is growing very fast and new services come-up, so intelligent way of visualization and managing the 4G network and service states are required. In this paper, Coded Orthogonal Frequency Division Multiplexing (COFDM) scheme using convolutional coding with different code rates and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    Performance Evaluation of HEVC Over Broadband Networks

    High efficiency video coding is the current trend setting standard for coding and transmission of video content. This standard has brought in many improvements over its predecessor H264 standard. In this paper, performance evaluation of transmitting HEVC content over the simulated network environment for disaster and calamity stricken area has...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    A Survey of VPN Security Issues

    Recently secure access to the private sources is considered as of the essential needs. Thus, one of the most efficient and cost-effective ways for granting secure access needs from far path in the organizations is the use of VPN. Data security plays a crucial role in modern times; most business...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    Performance Analysis of LTE Physical Layer Based on 3GPP-Release-8

    Long Term Evolution (LTE) is the last step towards the 4th generation of cellular networks. This revolution is necessitated by the unceasing increase in demand for high speed connection on LTE networks. This paper mainly focuses on performance evaluation of LTE physical layer to study and analysis the effect of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    Performance Evaluation of Some Routing Protocols Using TCP Traffic Types in Mobile Ad Hoc Networks

    Routing is a critical issue in a Mobile Ad-hoc NETwork (MANET). The most famous MANET routing protocols are AODV, DSDV, DSR and AOMDV. Although the performance evaluation of these routing protocols have been extensively simulated, most of the researchers are focusing on the User Datagram Protocol (UDP) traffic type supposing...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    Optical Encryption Techniques: An Overview

    Over the years extensive studies have been carried out to apply coherent optical methods in real time communications and multimedia transmission. This is especially true when a large amount of information needs to be processed. The transmitted data can be intercepted by non-authorized people; this explains why considerable effort is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    Software Architectures: A Comparative Study for Web Based Applications

    Correct architecture is the backbone of the successful software. To address the complexity of the growing software there are different architectural models that are designed to handle this problem. The most important thing is to differentiate software architecture from software design. As the web based applications are developed under tight...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    Streaming Algorithm For Multi-path Secure Routing in Mobile Networks

    Mobile Ad hoc NETworks (MANETs) have a self-organizing network architecture, where a set of mobile nodes with wireless network interfaces may form a temporary network without any infrastructure. The characteristic features of ad hoc networks are dynamic topology, lack of infrastructure, the compounds of variable capacity, etc., which are the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    Mobile Based System for Palestine Exchange Management

    In this paper, the authors aim to provide better stock market watching through user friendly, efficient, and convenient mobile based system. It allows investors to monitor financial market using Short Message Service (SMS). On one hand, their system sends the trading prices of stocks to customers as these prices change....

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    A Literature Review and Comparative Analyses on SQL Injection: Vulnerabilities, Attacks and Their Prevention and Detection Techniques

    SQL injection is a technique that exploits a security vulnerability occurring in the database layer of an application. The attack takes advantage of poor input validation in code and website administration. It allows attackers to obtain unauthorized access to the back- and database to change the intended application generated SQL...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    An Efficient Protective Layer Against SQL Injection Attacks

    In this paper, the authors present a detailed discussion on different SQL injection attacks and their prevention technique. In addition, they proposed a new scheme for prevention of SQL injection attack, which consist of three blocks or three tier architecture: the clients, the application server and the database server. Their...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2014

    RPAR: Pharaonis Approach Based Reserve Path Adaptive Routing Topology for Handling QoS Constraints in Mobile Ad Hoc Networks

    Specially structured and independent nodes are the special of ad hoc. To exchange data, Nodes always use a medium which is wireless due to that, message or data can be transferred only when both are in broadcast range. The difficult behavior which needs no efforts is the result of biologically...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2014

    Implementation of Android Based Mobile Learning Application as a Flexible Learning Media

    Computer technology has been experiencing a quite rapid development in which it, in turn, has also caused a change in human life style. One of technologies bringing an impact on such life style is in the use of computer technology embedded in mobile communication devices. Now-a-days, a new trend in...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2014

    Critical Review of Authentication Mechanisms in Cloud Computing

    Cloud computing is a technology, which provides low cost, scalable computation capacity and a stack of services to enterprises on demand for expansion. The complications caused by data security and privacy are the main hindrances in its acceptance. Threats in cloud computing can be faced by adopting various security measures....

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2014

    Mob-AIDS: An Intrusion Detection System for the Android Mobile Enterprise

    Researches in the development of efficient security models, policies and standards for the Android platform has increased significantly in recent times. Android suffers from the widespread security threats and malware due to the lack of efficient security tools for protection. However, recent studies on android mobile platform security stressed that...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2014

    A Formal Composition of a Distributed System with its Security Policy

    Now-a-days, information systems are becoming a vital and strategic component of any organization. However, in most cases, these systems are designed and implemented without taking into consideration security aspects. To ensure a certain level of security, the behavior of a system must be controlled by a \"Security policy\". This paper...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2014

    Organizing Software Architecture Based Measurement Analysis (OSAMA) Model

    Today's software engineering organizations seek to develop and improve the models that follow and are trying in various ways to reach the highest levels of quality in order to achieve user satisfaction. Organizing Software Architecture based Measurement Analysis (OSAMA) model provides a way that allows a great control on management,...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2014

    A Review Study of Hierarchical Clustering Algorithms for Wireless Sensor Networks

    The hierarchical clustering is an efficient way to reduce the overall energy consumption within the cluster by performing aggregation and fusion of data. Hence, the amount of transmitting information to the base station is decreased. Clusters create hierarchical Wireless Sensor Networks (WSNs) which facilitate efficient utilization of limited resources of...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2014

    Impacts of Linear Mobility on MANETs Routing Performance Under Different Network Loads

    Routing is the biggest challenge and significant area of research within ad hoc networks due to nodes mobility, dynamic topology, frequent link breakage, limitation of nodes (memory, battery, bandwidth, and processing power), and lack of central point like base stations or servers. Analyzing and comparing different MANET routing protocols give...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2014

    SwarmDroid: Swarm Optimized Intrusion Detection System for the Android Mobile Enterprise

    The inadequacies inherent in the current defense mechanism of the mobile enterprise led to the development of new breed of security systems known as mobile intrusion detection system. The major worry of mobile/ubiquitous device users is the issue of data security since no mobile security application is 100% efficient. Existing...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    Scalable and Efficient Self-Join Processing Technique in RDF Data

    Efficient management of RDF data plays an important role in successfully understanding and fast querying data. Although the current approaches of indexing in RDF Triples such as property tables and vertically partitioned solved many issues; however, they still suffer from the performance in the complex self-join queries and insert data...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    Combining Clustering Solutions With Varying Number of Clusters

    Cluster ensemble algorithms have been used in different field like data mining, bioinformatics and pattern recognition. Many of them use label correspondence as a step which can be performed with some accuracy if all the input partitions are generated with same k. Thus these algorithms produce good results if this...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    Real-Time Scheduling Algorithm Based on Dynamic Priority for Multi-Data Transmission

    In response to the demands of heterogeneous data acquisition, data transmission effectiveness and reliability in emergencies as well as environmental wireless monitoring etc., this paper presents a data transmission queue optimization algorithm based on dynamic priority. The algorithm dynamically assign priorities to different data according to their importance, historical transmission...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    A Dynamic Materialized View Selection in a Cloud-Based Data Warehouse

    A data warehouse is system which that support decision-making in production environment. Classical data warehouse management system is often optimized by improving query performance. Such improvement is casually achieved by using caches, indexes and materialized views and required selecting the best set of data structures (materialized views, indexes, etc...). In...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    Multi-Level Service Composition in Supervised Cloud Computing

    The role of AN agent system in an exceedingly cloud network is to spot the simplest obtainable resources and share them through a service created accessible over the net. Hence they act as inter-mediator for providing cloud services to varied users. The cloud service customers determine numerous service compositions through...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    Defending the Sensitive Data Using Lattice Structure in Privacy Preserving Association Rule Mining

    Innovation of association rules from enormous databases ensures benefits for the enterprises since such rules can be very operative in enlightening the knowledge that leads to tactical decisions. Association rule mining has acknowledged a proportion of attention in the collaborative business community and several algorithms were proposed to improve the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    Mobile Agent Systems, Recent Security Threats and Counter Measures

    Mobile agent technology offers a dramatically evolving computing paradigm in which a program, in the form of a software agent, can suspend its execution on a host computer, transfers itself to another agent-enabled host on the network, and resumes execution on the new host. It is 1960's since mobile code...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    Design & Modeling of Hidden Nodes WLAN and MAC Layer Protocol Simulated By NS-2

    In wireless network, the authors are facing a problem to transmitting simultaneously to same receiving node. So that performance of network not same as normal network (may be central control or ad-hoc network). Normally, such type problem solves MAC layer protocol using Ready-To-Send/Clear-To-Send (RTS/CTS), but not only RTS/CTS, also need...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    Importance of Software Testing in Software Development Life Cycle

    Software development life cycle is a structure imposed on the development of a software product. Software development life cycle is closely linked to what has come to known as structured analysis and design. Testing is an important part of software development. Testing should be started as early as possible to...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    A Practical Approach to Infuse Security Patterns into Undergraduate Software Engineering Course Projects

    In this paper, the authors introduce the use of security patterns as a teaching aid to help software engineering students better understand and solve security problems. With the wide spread use of various applications in different domains and industries security is a growing problem that requires swift address. The lack...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    A Survey of Bandwidth Optimization Techniques and Patterns in VoIP Services and Applications

    As internet telephony unveils a communication system that allows for the conduction and reception of voice signals and data over the internet network, the volume of voice traffic and (or) packets on IP networks have grown substantially. However, a crucial problem imminent is that of inefficient bandwidth utilization which is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    Knowledge-Based Software System for Space Exploration

    It has been observed that transformation in space exploration is done by various innovations in robotic spacecraft. Space exploration using spacecraft are becoming software-intensive supporting remote-control, increased productive science gathering and analysis, good troubleshooting during flight accelerated understanding of universe. Furthermore, software engineering approach will also incorporate in this system,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    High Capacity Information Hiding System for Encrypted Text Message Using Pixel Intensity Based LSB Substitution Technique

    In this paper, the authors present the spatial domain image steganography based embedding system using different pixel intensities. Here, the efforts have been done to combine cryptography with the steganography for imparting better security to the proposed system. Various performance measures like peak signal to noise ratio, mean square error...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    Artificial Bee Colony Based Multifeature Recognition

    In this paper, the authors present a new approach to improve the recognition performance of existing authentication systems based on palmprint. The technique presented extracts multiple features namely, minutiae, texture and ridge from the palmprint image using novel algorithms. The images are then classified using artificial bee colony classifier. The...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    DP-UREA: An Algorithm for Autonomous Reorganization of Mobile Sensor Nodes to Improve Coverage

    Stochastic deployments of mobile Wireless Sensor Networks (WSNs) are practical in harsh fields, disaster areas, toxic urban regions or hostile environments where human reachability or intervention is impossible, and WSN deployment cannot be performed manually. These deployments may not always lead to effective coverage or; result in a connected network....

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    Cognitive Radio Handover in Cellular Networks

    In cellular networks the continuity of communication has high significance in real-time services, therefore, the HandOver (HO), transferring communication from one base station to another one, always has been the main concept of all mobile's generations. In cellular networks for avoidance of frequency interference, different channel allocation scheme are proposed;...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    Probabilistic Multicast Trees in Different Network Topology Environments

    Node loss and congestion changes the performance characteristics of the multicast trees. Probabilistic Multicast Trees (PMT) makes use of performance feedback, generates a probability of usage for each multicast tree based on that feedback and then makes intelligent choices about which multicast tree to use for a given packet in...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    Investigating Software Maintainability Development: A Case for ISO 9126

    Software maintainability has been considered as a main characteristic in many software product quality models. However, these models have different definitions for maintainability and sub characteristics. ISO 9126 is one of the main and most frequently used models in software product quality. This model has been revised and replaced by...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Cloud Computing and Its Applications in the World of Networking

    The paper discusses the most discussed topic nowadays 'Cloud computing'. Cloud computing is becoming a buzzword. The paper explains the concept, Services provided by cloud computing and different service providers. Also it works out how this technology can be harnessed to bring benefits to the challenges of the business, in...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Email Mining: A Review

    E-mail is one of the most widely used ways of written communication over the internet, and its traffic has increased exponentially with the advent of World Wide Web. The increase in email traffic comes also with an increase in the use of emails for illegitimate purpose. Phishing, Spamming, email bombing,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    A Generalized Framework of Privacy Preservation in Distributed Data Mining for Unstructured Data Environment

    The management of unstructured data is recognized as one of the major unsolved problems in the information industry and data mining paradigm. Unstructured data in computerized information that either does not have a data model and there are not easily usable by data mining. This paper proposes a solution to...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Data Optimization From a Multiple Species Network Using Modified SFLA(Shuffled Frog Leaping Algorithm)

    In this paper, the authors present a novel approach that uses inter-species sequences homology to connect the networks of multi species and possible more species and possible more species together with gene ontology dependencies in order to improve protein classification for research work. Proteins are involved in many for all...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Presentation an Approach for Scientific Workflow Distribution on Cloud Computing Data Center's Servers to Optimization Usage of Computational Resource

    In a distributed system Timing and mapping the priority of tasks among processors is one of the issues attracted most of attention to itself. This issue consists of mapping a DAG with a set of tasks on a number of parallel processors and its purpose is allocating tasks to the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    A Novel Chaotic Encryption Scheme Based on Pseudorandom Bit Padding

    Cryptography is always very important in data origin authentications, entity authentication, data integrity and confidentiality. In recent years, a variety of chaotic cryptographic schemes have been proposed. These schemes have typical structure which performed the permutation and the diffusion stages, alternatively. The random number generators are intransitive in cryptographic schemes...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Implementing an Expert Diagnostic Assistance System for Car Failure and Malfunction

    Applications in fault diagnosis are continuously being implemented to serve different sectors. Car failure detection is a sequence of diagnostic processes that necessitates the deployment of expertise. The Expert System (ES) is one of the leading Artificial Intelligence (AI) techniques that have been adopted to handle such task. This paper...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Performance Analysis of Various Routing Protocols for Motorway Surveillance System Cameras' Network

    The Motorway Surveillance System (MSS) is one of the most important technologies used to collect information about road conditions and then provide that collected information to motorway users. The routing in networks used by these systems is a critical task due to the highly dynamic environments. This paper presents performance...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    An Analysis of Internet Banking Security of Foreign Subsidiary Banks in Australia: A Customer Perspective

    Internet banking has been deployed more frequently over the past few decades to support and improve the operational and managerial performance within the banking industry. However, the security issues of confidentiality, integrity and privacy have become increasingly more serious concerns in Internet banking systems because of the potential negative impact...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Improving Accuracy of Authentication Process Via Short Free Text Using Bayesian Network

    The internet security problems are a crucial threat to all users in the cyber world. One of the important problems about internet security concerned with user classification and authentication. However, there are multiple components to classify and authenticate users. The first one is using username/password and the second method is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Survey of NoC and Programming Models Proposals for MPSoC

    The aim of this paper is to give briefing of the concept of network-on-chip and programming model topics on multiprocessors System-on-Chip world, an attractive and relatively new field for academia. Numerous proposals from academia and industry are selected to highlight the evolution of the implementation approaches both on NoC proposals...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Energy Efficient Security Preserving VM Live Migration in Data Centers for Cloud Computing

    Virtualization is an innovation that has widely been utilized in modern data centers for cloud computing to realize energy-efficient operations of servers. Virtual Machine (VM) migration brings multiple benefits such as resource distribution and energy aware consolidation. Server consolidation achieves energy efficiency by enabling multiple instances of operating systems to...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Semantic Service Composition With QoS End -To- End Constraints Via AND/OR Graphs

    In this paper, the authors present AND/OR graphs as a unifying framework for semantic service composition that considers users QoS constraints. The main virtues of this representation among others are its ability to express semantic inference and to deal with QoS constraints from different perspectives. In addition, it correctly handles...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Graphical Model Based for Robust Fault Diagnosis

    In this paper, robust Fault Detection and Isolation (FDI) design in nonlinear uncertain dynamic system, with chemical and thermodynamic phenomenon, is addressed. The methodology using a Bond Graph (BG) representation in Linear Fractional Transformation (LFT) form is shown to be a valuable tool for developing dynamic threshold generators and achieving...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Modify AODV Routing Protocol to Improve Motorway Surveillance System Performance

    This paper presents an algorithm to modify the Ad hoc On-demand Distance Vector (AODV) routing protocol in order to improve the routing performance in motorway surveillance systems. The proposed protocol has all the characteristics of the original AODV routing protocol since it follows all the steps of the route discovery...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Comparison Between Poissonian and Markovian Primary Traffics in Cognitive Radio Networks

    Cognitive Radio generates a big interest as a key cost-effective solution for the underutilization of frequency spectrum in legacy communication networks. The objective of this paper lies in conducting a performance evaluation of the end-to-end message delivery under both Markovian and Poissonian primary traffics in lossy Cognitive Radio networks. The...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Identification of Nominated Classes for Software Refactoring Using Object-Oriented Cohesion Metrics

    The production of well-developed software reduces the cost of the software maintainability. Therefore, many software metrics have been developed to measure the quality of the software design. Measuring class cohesion is considered as one of the most important software quality measurements. Unfortunately, most of approaches that have been proposed on...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Improving Performance of Distributed Data Mining (DDM) With Multi-Agent System

    Autonomous agents and multi-agent systems (or agents) and knowledge discovery (or data mining) are two of the most active areas in information technology. Ongoing research has revealed a number of intrinsic challenges and problems facing each area, which can't be addressed solely within the confines of the respective discipline. A...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    MVSDAP: A New Extensible, Modifiable and Secure Data Access Pattern for Layered Information Systems

    Nowadays, in software architecture especially in agile methodologies dynamicity, extendibility and modifiability are important challenges. In three layered architecture, plenty of patterns are provided for data access layer. In this paper, additional to secure access to data and dynamic validation controls, emphasis is on extendibility and modifiability of data access...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    A Novel Approach of Query Optimization for Genetic Population

    In relational database large information is maintained and organized so that user can get the desired information in predictable and reliable fashion through the query processing. Retrieving these results in timely manner is Query Optimization. Optimization is a process of choosing most efficient way to execute a SQL query. This...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    An Improved Authentication Scheme for Passport Verification Using Watermarking Technique

    The prominent problem in passport authentication is to authenticate the passport document for its owner. The critical factor of this authentication procedure is to establish a correspondence between Passport's photo and its owner. A passport document contains holder details in supplement to the holder's signature. The authors propose an authentication...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Design and Performance Evaluation of a New Irregular Fault-Tolerant Multistage Interconnection Network

    Inter-connecting processors and linking them efficiently to the memory modules in a parallel computer is not an easy task. Hence, an interconnection network that provides the desired connectivity and performance at minimum cost is required. The design of a suitable interconnection network for inter-processor communication is one of the key...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Mean Square Error Performance of OFDM Systems Against Signal to Noise Ratio Under Different Fading Channels

    The well known problem in an Orthogonal Frequency Division Multiplexing (OFDM) system is its sensitivity to frequency offset. Most of the coherent OFDM systems transmit pilot symbols on some of the subcarriers to estimate channel attenuation and also add a Cyclic Prefix (CP) to avoid inter carrier interference and inter...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Cryptography Based E-Commerce Security: A Review

    E-commerce is a powerful tool for business transformation that allows companies to enhance their supply-chain operation, reach new markets, and improve services for customers as well as for providers. Implementing the E-commerce applications that provide these benefits may be impossible without a coherent, consistent approach to E-commerce security. E-commerce has...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    A Learning Automata Based Algorithm for Solving Capacitated Vehicle Routing Problem

    This paper presents an approximate algorithm based on distributed learning automata for solving capacitated vehicle routing problem. The Vehicle Routing Problem (VRP) is an NP-hard problem and Capacitated Vehicle Routing Problem variant (CVRP) is considered here. This problem is one of the NP-hard problems and for this reason many approximate...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    OFDM Transmission Performance Evaluation in V2X Communication

    The Vehicle to Vehicle and Vehicle to Infrastructure V2X communication systems are one of the main topics in research domain. Its performance evaluation is an important step before their on board's integration into vehicles and its probable real deployment. Being the first of a series of three publications, this paper...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Software Metrics to Estimate Software Quality Using Software Component Reusability

    Today, most of the applications developed using some existing libraries, codes, open sources, etc. As a code is accessed in a program, it is represented as the software component. Such as in java beans and in .net ActiveX controls are the software components. These components are ready to use programming...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Development of Personal Learning Network System to Build e-Literacy

    A great nation can be seen one of them from the high culture of literacy communities. Indonesian nation still needs many efforts to create a culture of high literacy of the society. The potential is most likely to be initiated immediately is the education community. In this regard, this paper...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Project Management Phases of a SCADA System for Automation of Electrical Distribution Networks

    The aim of this paper is, firstly, to recall the basic concepts of SCADA (Supervisory Control And Data Acquisition) systems, to present the project management phases of SCADA for real time implementation, and then to show the need of the automation for Electricity Distribution Companies (EDC) on their distribution networks...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Energy Aware Reliable Routing Protocol (EARRP) for Mobile Ad Hoc Networks Using Bee Foraging Behavior and Ant Colony Optimization

    Energy aware reliable routing in mobile ad hoc networks is an astonishing task and in this paper, the authors propose to design, develop such protocol which will be a good solution. For developing such protocol EARRP, two swarm intelligence techniques are involved namely ant colony optimization and bee colony foraging...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Dynamic Replica Control Algorithm for Periodic/Aperiodic Transactions in Distributed Real-Time Databases

    Maintaining consistency between the actual state of the real-time object of the external environment and its images as reflected by all its replicas distributed over multiple nodes is one of the most important issue affecting the design of real-time database. Efficient replica control algorithm can contribute significantly to maintain this...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Performance Evaluation of QoS Parameters in Dynamic Spectrum Sharing for Heterogeneous Wireless Communication Networks

    Cognitive radio nodes have been proposed as means to improve the spectrum utilization. It reuses the spectrum of a primary service provider under the condition that the primary service provider services are not harmfully interrupted. A cognitive radio can sense its operating environment's conditions and it is able to reconfigure...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    A Priority Based Bandwidth Reservation Protocol for Wireless Mesh Networks

    In wireless mesh networks, when compared with traditional applications, multimedia application requires the need of inflexible Quality of Services (QoS) for high speed digital audio and videos. Under such a condition, the need of proper resource allocation is extremely handy. In this paper, the authors propose to develop a Priority...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Analysis of the Similarities and Differences Between MPLS Label Distribution Protocols RSVP and CR-LDP

    MPLS is a new technology that offers to open up the Internet by providing many additional services to applications using IP. MPLS forwards data using labels that are attached to each data packet. These labels must be distributed between the nodes that comprise the network. Many of the new services...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Comparison Based Analysis of Different Cryptographic and Encryption Techniques Using Message Authentication Code (MAC) in Wireless Sensor Networks (WSN)

    Wireless Sensor Networks (WSN) are becoming popular day by day, however one of the main issue in WSN is its limited resources. The authors have to look to the resources to create Message Authentication Code (MAC) keeping in mind the feasibility of technique used for the sensor network at hand....

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Fuzzy-Controlled Load-Balanced Broadcasting (FLB) in Clustered Mobile Ad Hoc Networks

    A mobile ad hoc network is a wireless network that is self-organized with many mobile nodes. No static infrastructure such as a wired backbone is available. All nodes are free to move around and the network topology may change frequently. Due to limited transmission range of wireless network interface, nodes...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Robust Iris Recognition Based on Statistical Properties of Walsh Hadamard Transform Domain

    In this paper, a new approach of iris image feature extraction technique based on the statistical properties of Walsh Hadamard Transform (WHT) domain is proposed. A Canny Edge Detection followed by Hough Transform is used to detect the iris boundaries in the digital image of an eye. The segmented and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Ultra-Wide-Band Microstrip Concentric Annular Ring Antenna for Wireless Communications

    In this paper, a new design technique for bandwidth enhancement of concentric microstrip annular ring slot antennas is presented. Using this technique, an Ultra-Wide-Band antenna is designed with simulated bandwidth of 111.29%. Microstrip patch antennas are widely used because of their several advantages such as light weight, low volume, low...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Peer to Peer Networks Management Survey

    Peer-to-Peer systems are based on the concept of resources localization and mutualisation in dynamic context. In specific environment such as mobile networks, characterized by high variability and dynamicity of network conditions and performances, where nodes can join and leave the network dynamically, resources reliability and availability constitute a critical issue....

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Privacy Preserving RFE-SVM for Distributed Gene Selection

    The Support Vector Machine Recursive Feature Elimination (SVMRFE) is one of the most effective feature selection methods which has been successfully used in selecting informative genes for cancer classification. This paper extends this well-studied algorithm to the privacy preserving distributed data mining issue. For gene selection over multiple patient data...

    Provided By International Journal of Computer Science Issues