International Journal of Computer Science Issues

Displaying 1-40 of 795 results

  • White Papers // Mar 2014

    Real-Time Scheduling Algorithm Based on Dynamic Priority for Multi-Data Transmission

    In response to the demands of heterogeneous data acquisition, data transmission effectiveness and reliability in emergencies as well as environmental wireless monitoring etc., this paper presents a data transmission queue optimization algorithm based on dynamic priority. The algorithm dynamically assign priorities to different data according to their importance, historical transmission...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    A Dynamic Materialized View Selection in a Cloud-Based Data Warehouse

    A data warehouse is system which that support decision-making in production environment. Classical data warehouse management system is often optimized by improving query performance. Such improvement is casually achieved by using caches, indexes and materialized views and required selecting the best set of data structures (materialized views, indexes, etc...). In...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    Defending the Sensitive Data Using Lattice Structure in Privacy Preserving Association Rule Mining

    Innovation of association rules from enormous databases ensures benefits for the enterprises since such rules can be very operative in enlightening the knowledge that leads to tactical decisions. Association rule mining has acknowledged a proportion of attention in the collaborative business community and several algorithms were proposed to improve the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    Multi-Level Service Composition in Supervised Cloud Computing

    The role of AN agent system in an exceedingly cloud network is to spot the simplest obtainable resources and share them through a service created accessible over the net. Hence they act as inter-mediator for providing cloud services to varied users. The cloud service customers determine numerous service compositions through...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    Combining Clustering Solutions With Varying Number of Clusters

    Cluster ensemble algorithms have been used in different field like data mining, bioinformatics and pattern recognition. Many of them use label correspondence as a step which can be performed with some accuracy if all the input partitions are generated with same k. Thus these algorithms produce good results if this...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    Scalable and Efficient Self-Join Processing Technique in RDF Data

    Efficient management of RDF data plays an important role in successfully understanding and fast querying data. Although the current approaches of indexing in RDF Triples such as property tables and vertically partitioned solved many issues; however, they still suffer from the performance in the complex self-join queries and insert data...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    University Communication at Intelligent Ad Hoc Network using SIP services

    The frantic nature of technological advances in the area of multimedia communications, compounded with the convergence of telecommunication and computer networks has led to the emergence of new class of applications sometime called ubiquitous computing or ambient intelligence. In this paper the authors present a project which converges with this...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Iris Detection and Normalization in Image Domain Based on Morphological Features

    The interface of computer technologies and biology is having a huge impact on society. Human recognition research projects promises new life to many security-consulting. Iris recognition is considered to be the most reliable biometric authentication system. Very few iris recognition algorithms were commercialized. The authors implemented a system that process...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    An Enhanced AODV Routing Protocol for MANETs

    In the last few years, many studies have been performed in MANETs, especially in unicast routing protocols. In this paper, a new routing protocol for Mobile Ad-hoc NETworks (MANETs) is presented; the proposed Power-Hop based Ad-hoc On-demand Distance Vector (AODV) is named PH-AODV, it uses the node power and the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    An Efficient Pipelined Technique for Signcryption Algorithms

    Signcryption algorithms are based on public key cryptography. The main advantage of signcryption algorithms is to provide both confidentiality and authenticity in one step. Hence, signcryption algorithms lower both communication and computation overheads. This reduction, in communication and computation overheads, makes signcryption algorithms more suitable for realtime applications than other...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Analysis the Impacts of Transmission Range of AODV & DSDV Ad-Hoc Network Protocols Performance over Mobile WiMAX Networks

    The IEEE 802.16 technology (WiMAX) is facing great challenges due to owning high mobility of mobile nodes, limited radio coverage of wireless devices, time varying nature of wireless medium. The transmission range of Base Station (BS) has a vital influence and must achieve the most economic case of energy in...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Hierarchical Cluster-Based Routing Protocols for Wireless Sensor Networks - A Survey

    Hierarchical cluster-based routing protocols are considered as one of the most efficient routing protocols in Wireless Sensor Networks (WSN) due to its higher energy efficiency, network scalability, and lower data retransmission. In cluster-based routing protocols the network is divided into clusters each with a Cluster Head (CH) that is used...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Developing Web-Based Semantic Expert Systems

    Expert systems have provided solutions to different problems, from strategic planning of marketing to consulting in process reengineering. In general, the majority of studies published are based on advanced techniques of artificial intelligence, using specific languages or tools that require certain knowledge of reasoning processes to model information. With the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Fingerprint Classification Techniques: A Review

    A biometric is the automatic identification of an individual that is based on physiological or behavioral characteristics. Due to its security-related applications and the current world political climate, biometric is currently the subject of intense research by both private and academic institutions. Fingerprint is emerging as the most common and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    A Decentralized Fault Tolerant model for Grid Computing

    A current trend in high-performance computing is the use of large-scale computing grids. These platforms consist of geographically distributed cluster federations gathering thousands of nodes. At this scale, node and network failures are no more exceptions, but belong to the normal system behavior. Thus, grid applications must tolerate failures and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Secure Routing in Mobile Ad hoc Networks: Laurel verification based Node Selection Strategy

    As the nodes are self resourced in ad hoc networks, the denial of service as relay hop by any node is frequent. This is due to resource levels of that node are lower than the threshold, in another act the node may be irrational and selfish. In such cases the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Imposing Fairness in Electronic Commerce

    In the recent years, electronic commerce has gained much importance. Traditional commerce is slowly being replaced with ecommerce and more people tend to prefer doing their shopping online. One of the main reasons for this attraction is the convenience the e-commerce provides. Customers can choose from a lot of different...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    A Mobile Agent Approach for IDS in Mobile Ad Hoc Network

    Mobile ad hoc networks are a group of wireless computers, forming a communication network that has no predetermined structure. Its highly vulnerable to attacks due to the open medium dynamically changing network topology, co-operative algorithm and lack of centralized. The fact is that security is a critical problem. This paper...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Classification and Recognition of Fingerprints using Self Organizing Maps(SOM)

    Feature extraction and matching are important in Automatic Fingerprint Identification Systems (AFIS) in the field of biometric technology. In this work, a filter-based algorithm uses a bank of Gabor filters to capture local and global features in a fingerprint as a compact fixed length FingerCode. These fingercodes are matched using...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    A Proposed Cryptosystem Algorithm Based on Two Different Chaotic Systems (PCA2CS) for Securing the Colored Images

    In this paper, a proposed cryptosystem algorithm based on two different chaotic systems is presented. Chen's chaotic system and Henon chaotic system is used as different chaotic systems to obtain the authors' proposed encryption algorithm; in order to meet the requirements of secure image transfer. The proposed encryption algorithm will...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Exploring Technical Deployments of IPv6 on University LANs

    The current version of the Internet Protocol version 4 (IPv4) addressing scheme is officially exhausted. Internet Protocol version 6 (IPv6) is the next generation internet protocol proposed by the Internet Engineering Task Force (IETF) to supplant the current IPv4. Every device connected to the internet is expected to support this...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    VoIP versus VoMPLS Performance Evaluation

    Increasing number of Internet users forced them to use popular services, television and telephone, to use the Internet as a medium to reach their customers. Organizations are now applying VoIP and MPLS for providing the convergence of voice and data communications over single network infrastructure. VoIP (Voice over Internet Protocol)...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Information Security Modelling In an ELearning Environment

    The growth of information technology and communication has led the world to a dramatic change. This paper performs a research on the e-learning strategies involved in organizations, especially educational institutions. E-learning industry is poised to become one of the largest sectors in the world economy. A review into the literature...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Revealing a Novel Method for Detecting Positive and Negative Optimal Performance Association Rules in Very Large Databases Using BPSO

    Association rules mining is one of the useful data mining algorithm in presenting meaningful information through database. One of the important challenges for association rules mining is that; it might be extracted millions of rules which mostly are idol; furthermore current methods only seek positive rules which finding out the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Efficient Web Data Extraction Using Clusteringapproach in Web Usage Mining

    Web mining which is a type of data mining is used to extract web data from web pages. Web usage mining is used to record user behavior. These records are further used to extract data which helps in search engine optimization. In this research paper the authors propose an approach...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Secure Remote Access to Devices in a Smart Grid

    Seamless and efficient access to remote devices is imperative in the network operations of a smart grid. Traditional management mechanisms will have to be modified in order to sustain networks such as the ones utilized in the smart grid and the types of devices lying on them. Current multi-domain collaborative...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Change detection in Migrating Parallel Web Crawler: A Neural Network Based Approach

    Search engines are the tools for web site navigation and search. Search engines maintain indices for web documents and provide search facilities by continuously downloading web pages for processing. This process of downloading web pages is known as web crawling. In this paper the authors propose A neural network based...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Validation of Architecture of Migrating Parallel Web Crawler using Finite State Machine

    The process of downloading web pages is known as web crawling. In this paper the authors validate the architecture of migrating parallel web crawler using finite state machine. The method for migrating parallel web crawling approach will detect changes in the content and structure. Also domain specific crawling will yield...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    A Comprehensive Review for Disk Scheduling Algorithms

    This paper aims to discuss the structure of a disk and the hardware activities involved in the retrieval of data on a direct access storage device. Tackles and compute the different Disk Scheduling algorithms such as First Come First Serve (FCFS), Shortest Seek Time First (SSTF), Scan, Look, Circular Scan...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Presenting a Novel Method for Mining Association Rules Using Binary Genetic Algorithm

    Today, mining association rule is one of the important data mining algorithms which enable managers to make correct decisions based on the knowledge obtained from the detected patterns by databases. Traditional algorithms of discovering association rules such as Apriori and FP-growth may extract millions of rules from databases, many of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    A Pattern Based Methodology for Evolution Management in Business Process Reuse

    Today, there are Process-Aware Information Systems (PAIS) with a set of business process models which vary over time to meet the new requirements. In a competitive environment, the key challenge of enterprises is to reduce the cost and time of process design and application development. For this purpose, research on...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    An Exploration Scrutiny of Systems Performance Monitoring Tools: An Applications and Agentless Server Approach

    Performance monitoring tools play a critical role in the overall productivity of business organizations by providing the necessary means of measuring the performance of the system or server attributes of the organization. They measure system or server throughput and processor usage through programmed software or technological platforms. Their monitoring is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Enhanced Authentication Protocol EAP-TTLS Using Encrypted ECDSA

    The growing trend of wireless networks and risks associated with them has led to the development of authentication and application of stronger cryptographic methods to maintain a more robust security. This paper examined and compared two types of developed authentication protocols to provide an alternative method using strong cryptographic methods....

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Data Hiding over Mobile Phones Using Socket Network Communication

    The mobile phone is considered as wireless means of communication produced by sophisticated modern technology. After expanding use of mobile phones, establishing hidden communication is an important subject of security that has gained increasing importance. Therefore need to adopt the technology more sophisticated and more secret and preserve the information,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Effect of WiMAX Networks on IPTV Technology

    The IEEE 802.16 technology (WiMAX) is a better alternative to 3G or wireless LAN networks for providing last mile connectivity by radio link due to its high data rates, low cost of deployment and large coverage area and ease of Use. With the IEEE 802.16 2005 mobility amendment, WiMAX promises...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    A New Trust Reputation System for E-Commerce Applications

    Robust Trust Reputation Systems (TRS) provide a most trustful reputation score for a specific product or service so as to support relying parties taking the right decision while interacting with an e-commerce application. Thus, TRS must rely on an appropriate architecture and suitable algorithms that are able to improve the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    A Survey on Using Data Mining Techniques for Online Social Network Analysis

    In this paper the authors take into consideration the concepts of using algorithmic and data mining perspective of Online Social Networks (OSNs), with special emphasis on latest hot topics of research area. There are several factors which has made the study of OSNs gain enormous importance by researchers. Few such...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Extending CertificateLess Authentication for Wireless Sensor Networks: A Novel Insight

    Security is quite challenging in Wireless Sensor Networks (WSN) because of their constrained nature in terms of resources such as limited memory, low processing power, limited bandwidth etc. Authentication in low power devices is still considered to be an expensive process. Certificateless signature is one of the approaches to facilitate...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Conceptual Framework for Internet of Things' Virtualization via OpenFlow in Context-aware Networks

    A novel conceptual framework is presented in this paper with an aim to standardize and virtualize Internet of Things' (IoT) infrastructure through the deploying OpenFlow technology. The framework can receive e-services based on context information leaving the current infrastructure un-changed. This framework allows the active collaboration of heterogeneous devices and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Review of Software Reuse Processes

    Clients expect that enterprise software systems, which are continually growing in complexity, are of high quality, with reasonable price and have a short time to market. To find ways to meet with the increasing demands of business, software engineers are forced to find ways to streamline development process. Software reuse...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Design of a New Model of Multiband Miniature Antenna Near Isotropic

    In this paper, the authors propose a new slotted multiband antennas simulated at different frequencies. The insertion of slots in the patch gives a good adapting frequency with various forms on the radiation pattern. The main feature of the proposed antenna is the capability to generate a near isotropic radiation...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Theoretical Analysis of VoIP Transmission Through Different Wireless Access Technologies

    One of the challenges in today's wireless networks is to provide appropriate throughput for data and multimedia application. The physical data rate enhancements can be achieved through new physical capabilities, however to achieve high efficiency and to improve the throughput at the Medium Access Control (MAC) layer, new and innovative...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Scalable Symmetric Key Cryptography Using Asynchronous Data Exchange in Enterprise Grid

    Symmetric key cryptography is one of the most critical computing problems that need high performance computing power resources. The use of large key sizes and complex encryption/decryption algorithms to achieve unbreakable state has led to an increased time computational complexity. Traditionally, this problem is solved in the grid environment by...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Grayscale Image Compression Based on Min Max Block Truncating Coding

    Image compression is an important tool to reduce the bandwidth and storage requirements of practical image systems such as multimedia, communication, medical images, education and business etc. The image compression techniques are categorized into two main classification namely lossy compression techniques and lossless compression techniques. Lossy compression techniques lead to...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    A Model for Crises Management in Software Projects

    Today software projects are important part into almost every business application. It is quality, efficiency and effectiveness of these applications will determine the failure or success of many business solutions. Consequently, businesses often find that they need to have a competitive and efficient advantage through the development and improve of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Nurture IDR Segmentation and Multiple Instruction Queues in Superscalar Pipelining Processor

    This paper proposes a model which improves the speed of the pipelining mechanism therefore increasing the speed of the processor. Superscalar operation is used to get maximum throughput from the processor using the pipelining concept. This proposal can be considered as the advancement of the super scalar property in pipelining...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Design of a High Performance Reversible Multiplier

    Reversible logic circuits are increasingly used in power minimization having applications such as low power CMOS design, optical information processing, DNA computing, bioinformatics, quantum computing and nanotechnology. The problem of minimizing the number of garbage outputs is an important issue in reversible logic design. In this paper, the authors propose...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Marginal Object Weight Ranking for Nearest Neighbor Search in Spatial Databases

    Uncertainty prevails in spatial databases whose objects are defined as multidimensional probable density function. Identifying an object is tedious task in uncertain spatial databases. Recent work on searching objects and its closeness to other objects was presented as superseding nearest neighbor search technique. In superseding neighbor search, one of all...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Incorporating Security in Embedded System - A Critical Analysis

    Security is becoming a major concern in embedded system designing and development. This paper surveys security requirements, attack techniques and will review countermeasures for these attacks. Use of embedded systems in diverse and complex applications have relentless importance of secure and fault tolerant system. It is essential for embedded device's...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Integrated Circuit of CMOS DC-DC Buck Converter With Differential Active Inductor

    In this paper, the authors propose a new design of DC-DC Buck Converter (BC), which the spiral inductor is replaced by a differential gyrator with capacitor load (gyrator-C) implemented in 0.18um CMOS process. The gyrator-C transforms the capacitor load (which is the parasitic capacitor of MOSFETS) to differential active inductor...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Implementing VoIP Over Fatima Jinnah Women University

    Working people employee the use of technology in such very effective natural ways that permit them to do what they want: they can communicate with anyone as per need, in the time and space that suits them the best. Easily accessible and user-friendly, collaboration tools allow them to explore, share,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Comparing Online Analytical Processing and Data Mining Tasks In Enterprise Resource Planning Systems

    Enterprise Resource Planning (ERP) is an environment which is often rich of data about the enterprise. Data warehouse online analytical processing techniques provided decision makers a set of useful tools to analyze report and graphically represent data of the ERP. It can be said that OLAP tools provides different summarized...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Improving Security Levels of IEEE 802.16e Authentication by Diffie-Hellman Method

    In this paper, the authors proposed an authentication method according to Diffie-Hellman. First, they introduce different methods for authentication in IEEE.802.16 then they proposed an authentication method according to Diffie-Hellman and in the last they compare different methods for authentication to improve security in IEEE802.16e. CPN is a useful for...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    PPNOCS: Performance and Power Network on Chip Simulator Based on SystemC

    As technology moves towards multi-core System-On-Chips (SoCs), Networks-on-Chip (NoCs) are emerging as the scalable fabric for interconnecting the cores. Network-on-Chip architectures have a wide variety of parameters that can be adapted to the designer's requirements. This paper proposes a Performance and Power Network On Chip simulator (PPNOCS) based on SystemC...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Strategical Modelling With Virtual Competition for Analyzing Behavior of Malicious Node in Mobile Adhoc Network to Prevent Decamping

    The proposed system highlights a novel approach of identifying dynamic misbehaviour of the malicious node in mobile adhoc network. The main aim of the proposed work is to implement a new technique in the attack scenario of distributed network of MANET in order to analyze the policies and patterns of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    RDWSN: To Offer Reliable Algorithm for Routing in Wireless Sensor Network

    The authors would offer a reliable algorithm for routing in Wireless Sensor Network (WSN). RDWSN algorithm by using of outstanding parameters has been evaluated compared with previous algorithms. The proposed algorithm with respect to size and distance in basic capability function has created a new target function that bears more...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Cloud Services for Collaborative Web Based Project Management System

    Cloud computing is a style of computing which is having dynamically scalable virtualized resources provided as a service over the Internet. In this paper, the authors are presenting Project Management System (P.M.S.) based on cloud computing. Lack of manageability and variant projects scope are two of the worst problems plaguing...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Color Features Integrated With Line Detection for Object Extraction and Recognition in Traffic Images Retrieval

    This paper proposes a simple object extraction and recognition method with efficient searching for identifying and extracting the objects in a complex scene based on the color features. The background of the images is needed to be extracted and recognized in order to get the object of the interested in...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Comprehensive Analysis of Web Log Files for Mining

    World Wide Web is a global village and rich source of information. Day by day number of web sites and its users are increasing rapidly. Information extracted from WWW may sometimes do not turn up to desired expectations of the user. A refined approach, referred as Web Mining, which is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Design and Implementation of Memory-Less Forbidden Transition Free Crosstalk Avoidance CODECs for On-Chip Buses

    Recently, reducing crosstalk noise delay is an important issue in VLSI design. As circuit geometries become smaller, wire interconnections become closer together and taller, thus increasing the cross-coupling capacitance between nets. At the same time, parasitic capacitance to the substrate becomes less as interconnections become narrower, and cell delays are...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    A Critical Simulation of CPU Scheduling Algorithm Using Exponential Distribution

    A multiprogramming operating system allows more than one process to be loaded into the executable memory at a time and for the loaded process to share the CPU using time-multiplexing. Part of the reason for using multiprogramming is that the operating system itself is implemented as one or more processes,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Efficient Web Usage Mining With Clustering

    Web usage mining attempts to discover useful knowledge from the secondary data obtained from the interactions of the users with the Web. Web usage mining has become very critical for effective Web site management, creating adaptive Web sites, business and support services, personalization, network traffic flow analysis etc., Web site...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Extending XACML to Support Credential Based Hybrid Access Control

    Various research efforts are in progress to enforce credential based access control using XACML standard. The current standard of XACML supports attribute based access control. While XACML accepts certified attributes through digital certificates, it does not support credential based access control in which the access conditions are defined not only...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Implementation of Portion Approach in Distributed Firewall Application for Network Security Framework

    The stimulate of this research seeks collaboration of firewalls which, could reach to the capability of distributed points of security policy; the front-end entity may much interact by the invaders so the separation between this entity and back-end entity to make the secure domain protection is necessary; collaborative security entity...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    New Channel Assignment Method for Access Points in Wireless LANs

    Wireless LANs topology communicates using radio frequencies. The number of these frequencies is limited and not enough to assign a special frequency for each Access Point, this means that the communication topology should use a "Re-use" mechanism, which allows the system to assign the same frequency that assigned previously for...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Pseudonymous Privacy Preserving Buyer-Seller Watermarking Protocol

    A buyer-seller watermarking protocol utilize watermarking along with cryptography for copyright and copy protection for the seller and meanwhile it also preserve buyers rights for privacy. Up to now many secure BSW protocol has been suggested but the common problem with all of them is that in all of them...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Comparison of Routing Protocols to Assess Network Lifetime of WSN

    Rapid pace of improving technology in Wireless Sensor Networks (WSN) made it possible to manufacture low power, multifunctional sensor nodes. WSN is the set of small power energy confined sensor nodes which can be deployed in unapproachable domains. In WNS biggest constraint is to employ an efficient power consumption scheme....

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Fault Localization for Java Programs Using Probabilistic Program Dependence Graph

    Fault localization is a process to find the location of faults. It determines the root cause of the failure. It identifies the causes of abnormal behaviour of a faulty program. It identifies exactly where the bugs are. Existing fault localization techniques are Slice based technique, Program-Spectrum based Technique, Statistics Based...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Approach to a Conceptual Model of Indexation in a Weak Ontology Described in RDFS

    In this paper, the authors describe a model of conceptual indexation adapted to the RDFS structured resources. The process of the structured IR (Information Research) in XML corpus, based on the balancing of a document terms improves the IR. However, silence in the resources return remains a concern. Operating a...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Search Content Via Cloud Storage System

    With cloud computing growing in IT Enterprise. the importance of storing and searching files on the cloud increase. cloud storage is defined as a set of scalable data servers or chunk servers that provide computing and storage services to clients. The authors' research concern with searching in the file content...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    A New Trust Reputation System for E-Commerce Applications

    Robust Trust Reputation Systems (TRS) provide a most trustful reputation score for a specific product or service so as to support relying parties taking the right decision while interacting with an e-commerce application. Thus, TRS must rely on an appropriate architecture and suitable algorithms that are able to improve the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    A Survey on Using Data Mining Techniques for Online Social Network Analysis

    In this paper the authors take into consideration the concepts of using algorithmic and data mining perspective of Online Social Networks (OSNs), with special emphasis on latest hot topics of research area. There are several factors which has made the study of OSNs gain enormous importance by researchers. Few such...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Extending CertificateLess Authentication for Wireless Sensor Networks: A Novel Insight

    Security is quite challenging in Wireless Sensor Networks (WSN) because of their constrained nature in terms of resources such as limited memory, low processing power, limited bandwidth etc. Authentication in low power devices is still considered to be an expensive process. Certificateless signature is one of the approaches to facilitate...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    University Communication at Intelligent Ad Hoc Network using SIP services

    The frantic nature of technological advances in the area of multimedia communications, compounded with the convergence of telecommunication and computer networks has led to the emergence of new class of applications sometime called ubiquitous computing or ambient intelligence. In this paper the authors present a project which converges with this...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Iris Detection and Normalization in Image Domain Based on Morphological Features

    The interface of computer technologies and biology is having a huge impact on society. Human recognition research projects promises new life to many security-consulting. Iris recognition is considered to be the most reliable biometric authentication system. Very few iris recognition algorithms were commercialized. The authors implemented a system that process...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    An Enhanced AODV Routing Protocol for MANETs

    In the last few years, many studies have been performed in MANETs, especially in unicast routing protocols. In this paper, a new routing protocol for Mobile Ad-hoc NETworks (MANETs) is presented; the proposed Power-Hop based Ad-hoc On-demand Distance Vector (AODV) is named PH-AODV, it uses the node power and the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    An Efficient Pipelined Technique for Signcryption Algorithms

    Signcryption algorithms are based on public key cryptography. The main advantage of signcryption algorithms is to provide both confidentiality and authenticity in one step. Hence, signcryption algorithms lower both communication and computation overheads. This reduction, in communication and computation overheads, makes signcryption algorithms more suitable for realtime applications than other...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Analysis the Impacts of Transmission Range of AODV & DSDV Ad-Hoc Network Protocols Performance over Mobile WiMAX Networks

    The IEEE 802.16 technology (WiMAX) is facing great challenges due to owning high mobility of mobile nodes, limited radio coverage of wireless devices, time varying nature of wireless medium. The transmission range of Base Station (BS) has a vital influence and must achieve the most economic case of energy in...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Hierarchical Cluster-Based Routing Protocols for Wireless Sensor Networks - A Survey

    Hierarchical cluster-based routing protocols are considered as one of the most efficient routing protocols in Wireless Sensor Networks (WSN) due to its higher energy efficiency, network scalability, and lower data retransmission. In cluster-based routing protocols the network is divided into clusters each with a Cluster Head (CH) that is used...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Developing Web-Based Semantic Expert Systems

    Expert systems have provided solutions to different problems, from strategic planning of marketing to consulting in process reengineering. In general, the majority of studies published are based on advanced techniques of artificial intelligence, using specific languages or tools that require certain knowledge of reasoning processes to model information. With the...

    Provided By International Journal of Computer Science Issues