International Journal of Computer Science Issues

Displaying 401-440 of 879 results

  • White Papers // Jul 2012

    Applying Data Mining Technique for the Optimal Usage of Neonatal Incubator

    This research aims to provide intelligent tool to predict incubator Length Of Stay (LOS) of infants which shall increase the utilization and management of infant incubators. The data sets of EGyptian Neonatal Network (EGNN) were employed and Oracle Data Miner (ODM) tool was used for the analysis and prediction of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Collaboration Schemes Evaluation in Multi-Domain Networks

    The monitoring of the quality of service in a multi-domain network supervises the multi-domain service performance. A multi-domain service is a service that crosses several domains which can be managed by different providers. Since, each domain can be managed with its own policies and may require confidential it of its...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Challenges Involved in Implementation of ERP on Demand Solution: Cloud Computing

    As the world is beginning towards the cloud where speed and scalability are critical; and the many software is taking over to one another even more intrinsic role in this period the Cloud ERP would play the vital role in organization specially in SME (i.e., Small Medium Enterprises). Organizations are...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    New Non Path Metrics for Evaluating Network Security Based on Vulnerability

    In this paper, the authors propose a new and simple metrics for evaluating network security. The proposed metrics are based on the existence of network vulnerabilities in the network. The proposed metrics are different with their previous metrics proposed. Exploited Vulnerability Percentage (EVP) metric, Vulnerable Host Percentage (VHP) metric and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Stability and Stabilization of a Flexible Manipulator

    In this paper, the stability and stabilization of a neutral system with time-delay are treated. First, the flexible manipulator is modeled as a neutral time-delay system form. Then, based on the Lyapunov-Krasovskii functional theory, a delay dependant condition is proposed to test studied system stability, which is applied to a...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    PCA-Based Relevance Feedback in Document Image Retrieval

    Research has been devoted in the past few years to relevance feedback as an effective solution to improve performance of information retrieval systems. Relevance feedback refers to an interactive process that helps to improve the retrieval performance. In this paper, the authors propose the use of relevance feedback to improve...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Shared Situation Awareness Architecture (S2A2) for Network Centric Disaster Management (NCDM)

    Having Shared Situation Awareness (SSA) in Network Centric Disaster Management (NCDM) lead to virtual collaboration, virtual organization and self-synchronization among people; therefore, having SSA reduces operation cost and risk and increases speed of responsibility and operation and total performance of decision-makers. In this paper, the authors present a new architecture...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Using Mobile Agent Technology to Develop a Collaborative Product Life-Cycle Oriented Architecture

    Today product development activities are becoming more and more agile, adaptable, and cost-effective. Multi-agent-based system technology has found wide applications in managing company's information. This paper applies Multi-mobile-agent technology in developing a collaborative architecture for product lifecycle. By adopting the Aglets mobile agent platform, a generic platform has been developed...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Developing E-Learning Based on Animation Content for Improving Mathematical Connection Abilities in High School Students

    The purpose of this paper is to develop e-learning based on animation content to improve mathematical connection abilities in senior high school students. The e-learning was developed using framework proposed by Moddle, while the animation content was developed using macromedia flash. To get the student mathematical connection abilities, pretest and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    User Network Modeling-Based Spatial Web Personalization

    Web personalization can be seen as an interdisciplinary field whose objective is to facilitate the interaction between web content and user's needs. It includes per definition several research domains from social to information sciences. The personalized search focuses on integrating the user context and needs in the information retrieval process....

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Wireless Security System Implemented in a Mobile Robot

    This paper presents the design and implementation of a security system in which a mobile robot Lego NXT continuously monitors its surroundings while traveling in search of moving objects or people, considered unauthorized elements. An ultrasonic sensor is used for the monitoring. On suspicious movement detection, a warning signal is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    University Authentication System Based on Java Card and Digital X.509 Certificate

    This paper presents a solution to the problem of strong authentication, portable and expandable using a combination of Java technology and storage of X.509 digital certificate in Java cards to access services offered by an institution, in this case, the technology of the University of Panama, ensuring the authenticity, confidentiality,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Design and Optimization of Photonic Crystal Triplexer for Optical Networks

    Photonic Crystals (PhCs), also known as Photonic Band-Gap (PBG) materials, can control the spontaneous emission and the propagation of Electro-Magnetic (EM) waves. Due to existence of PBG, PhCs have applications in different areas of optical engineering such as optical filters, switches, power splitters, and demultiplexers which may ultimately pave the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Implementation of ITIL in a Moroccan Company: The Case of Incident Management Process

    IT departments were viewed as a cost center and not as an entity in the service of strategy. But this has changed in recent years because of market competitiveness and also due to the fact that the adoption of a management approach focused on the customer and driven by IT...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    A Method for Text Summarization by Bacterial Foraging Optimization Algorithm

    Due to rapid and increasingly growth of electronic texts and documents, the authors need some techniques for integration, communication and appropriate utilization of these texts. Summarizing the literature is one of the most fundamental tasks for integrating and taking advantages of these gathered texts. Selecting key words and then integrating...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Web Services Modeling and Composition Approach Using Objects-Oriented Petri Nets

    Now-a-days, with the emergence and the evolution of new technologies, such as e-business, a large number of companies are connected to Internet, and have proposed web services to trade. Web services as presented, are conceptually limited components to relatively simple functionalities. Generally, a single service does not satisfy the users...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    A Novel Image Encryption Using an Integration Technique of Blocks Rotation Based on the Magic Cube and the AES Algorithm

    In recent years, several encryption algorithms have been proposed to protect digital images from cryptographic attacks. These encryption algorithms typically use a relatively small key space and therefore, provide safe, especially if they are of a dimension. In this paper proposes an encryption algorithm for a new image protection scheme...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Hiding Data in Images Using New Random Technique

    Steganography is the art of hiding the fact that communication is taking place by hiding information in other information. In the field of Data Communication, Steganography play a major role. The transmission of information via the Internet may expose it to detect and theft. Some solution to be discussed is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Cloud Databases: A Paradigm Shift in Databases

    Relational databases ruled the Information Technology (IT) industry for almost 40 years. But last few years have seen sea changes in the way IT is being used and viewed. Stand alone applications have been replaced with web-based applications, dedicated servers with multiple distributed servers and dedicated storage with network storage....

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    An Optimized Query Tree Algorithm in RFID Inventory Tracking - A Case Study Evidence

    One of the challenged technical issue faced in inventory tracking applications with Radio Frequency IDentification (RFID) implementation environment, is the collisions due to responses from multiple tags on the shared channel between reader and the tags, which consumes further the energy as well as the delay in tag identification process....

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Application of Geographical Information System (GIS) in Urban Water of Amol in Iran at Time of Natural Disaster

    For the management of urban disaster risk, periodic updating of geo-databases of urban water is crucial, particularly in developing countries where urbanisation rates are very high. However, collecting information on the characteristics of buildings and lifelines through full ground surveys can be very costly and time-consuming. This paper has done...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Comparison Between MC-CDMA and CDMA-OFDM/OQAM Systems in Presence of MIMO Channel

    In this paper, the authors present a comparison between MC-CDMA and CDMA-OFDM/OQAM systems in the case of MIMO channel. The advanced Multi Carrier CDMA OFDM/OQAM modulation is a combination of CDMA and OFDM/OQAM. This combination takes advantages from multicarrier modulation and spread spectrum. Indeed, the use of OFDM has proved...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Application of Satellite Remote Sensing for Detailed Landslide Inventories Using Frequency Ratio Model and GIS

    This paper presents landslide susceptibility analysis in central Zab basin in the southwest mountainsides of West-Azerbaijan province in Iran using remotely sensed data and Geographic Information System. Landslide database was generated using satellite imagery and aerial photographs accompanied by field investigations using Differential Global Positioning System to generate a landslide...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    P2P Appliance Calculation Method for Trust Between Nodes Within a P2P Network

    Modern ways of communications, such as in a web services environment, also influences trust relationships between organisations. This concept of web-based (way towards semantic web services) trust is new and has as yet not been resolved. The authors hope that some of the trust properties mentioned above can be successfully...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    On the Current Measurement Practices in Agile Software Development

    Agile Software Development (ASD) methods were introduced as a reaction to traditional software development methods. Principles of these methods are different from traditional methods and so there are some different processes and activities in agile methods comparing to traditional methods. Thus, ASD methods require different measurement practices comparing to traditional...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Algorithm for Efficient Attendance Management: Face Recognition Based Approach

    Students attendance in the classroom is very important task and if taken manually wastes a lot of time. There are many automatic methods available for this purpose, i.e., biometric attendance. All these methods also waste time because students have to make a queue to touch their thumb on the scanning...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Adaptive Packet Buffering Algorithm Based on Priority and Traffic Throughput for Reducing Packet Loss in Fast Handover for Mobile IPv6

    The packet loss has become an important issue to the research community, which needs to be addressed. In FMIPv6, Packet losses are significantly related to the handover latency and buffer size used for packet buffering. In the case of increased handover latency or decreased buffer size, packet losses will be...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    A Primary User Authentication Scheme for Secure Cognitive TV Spectrum Sharing

    Cognitive radio is being intensively investigated by regulatory bodies as the enabling technology for opportunistic access to the TV white spaces. The successful deployment of cognitive radio networks and the realization of their benefits depend on the assignment of essential security challenges to resist misuse of the systems. In this...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Load Aware Congestion Detection Technique in Internet

    The Internet includes various ranges of applications such as multimedia, voice and data but it endures rigorous network congestion. Further, congestion detection is an essential preventive measure must be taken to provide congestion-free Internet. To stipulate proficient technique for congestion detection, in this paper, the authors propose a load aware...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Multi-Object Tracking in Dynamic Scenes by Integrating Statistical and Cognitive Approaches

    In this paper, the authors have addressed a quite researched problem in vision for tracking objects in realistic scenarios containing complex situations. The framework comprises of four phases: object detection and feature extraction, tracking event detection, integrated statistical and cognitive modules, and object tracker. The objects are detected using fused...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Comparative Study of CAD Software, Web3D Technologies and Existing Solutions to Support Distance-Learning Students of Engineering Profile

    Interactive simulations, virtual environments and 3D interfaces significantly contribute to the process of learning through collaboration and interaction with distant participants, and through simulation of real environments and real life situations. Depending on the needs and case studies, different technologies, software packages and their combinations are used. In this paper,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Manet Load Balancing Parallel Routing Protocol

    In recent years, multi-path routing protocols have attained more attention in mobile ad hoc networks as compared to other routing schemes due to their abilities and efficiency in improving bandwidth of communication, increasing delivery reliability, responding to congestion and heavy traffic. Several protocols have been developed to address multi path...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Feature Level Fusion of Palmprint and Iris

    In many real-life usages, single modal biometric systems repeatedly face significant restrictions due to noise in sensed data, spoof attacks, data quality, non-universality, and other factors. However, single traits alone may not be able to meet the increasing demand of high accuracy in today's biometric system. Multi-biometric systems is used...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Emergence of Robust Information Security Management Structure Around the World Wide Higher Education Institutions: A Multifaceted Security Solution

    Polarizing the views on the emergence of Information security around the campus arenas of higher education institutions is the utmost erg of both developing and developed nations in this post catastrophic era of September 11, 2001 where the unthinkable is now potentially a daily reality with root causes of information...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    A New Energy-Efficient TDMA-Based MAC Protocol for Periodic Sensing Applications in Wireless Sensor Networks

    Energy efficiency is a major requirement in wireless sensor networks. Media Access Control is one of the key areas where energy efficiency can be achieved by designing such MAC protocol that is tuned to the requirements of the sensor networks. Different applications have different requirements and a single MAC protocol...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    A Goal Question Metric Approach for Evaluating Security in a Service Oriented Architecture Context

    For interactions to be possible within the Service Oriented Architecture (SOA) ecosystem, each actor must be enough confident of other actors to engage safely in the interactions. Therefore, the establishing of objective metrics tailored to the context of SOA that show security of a system and lead to enhancements is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Energy Efficiency Analysis of Adaptive Error Correction in Wireless Sensor Networks

    In this paper, the authors develop an analytical energy efficiency model using Adaptive Error Correction Code (AECC) in wireless sensor networks in fading environments. To adapt energy efficiency of sensor node to channel variations, the packet length is tuned at the data link layer. In this model, they consider the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Energy Band Based Clustering Protocol for Wireless Sensor Networks

    Clustering is one of the widely used techniques to prolong the lifetime of wireless sensor networks in environments where battery replacement of individual sensor nodes is not an option after their deployment. However, clustering overheads such as cluster formation, its size, cluster head selection & rotation, directly affects the lifetime...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Analysis of QoS Routing Approach and the Starvation's Evaluation in LAN

    This paper gives a survey in QoS Routing Architecture implemented by Dijkstra's algorithm. The performance of QoS Routing architecture is evaluated by made a comparison between the Shortest Path Routing and QoS one. A very important feature in QoS routing are the conditions for elimination of starvation. Experimentally the authors...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    A Framework for Secure Cloud Computing

    Cloud computing is one of the most discussed topics today in the field of information technology. It introduces a new Internet-based environment for on-demand, dynamic provision of reconfigurable computing resources. The biggest challenge in cloud computing is the security and privacy problems caused by its multi-tenancy nature and the outsourcing...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Transmitting Cryptographic Data Through Steganography

    Computers are being used worldwide. The internet connects the world as one. Cybercrime is a huge issue which can be resolved by some approaches. In this paper an approach is introduced to ensure the security of data. Steganography and cryptography are merged together in order to obtain a secure and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    An Approach of Digital Image Copyright Protection by Using Watermarking Technology

    Digital watermarking system is a paramount for safeguarding valuable resources and information. Digital watermarks are generally imperceptible to the human eye and ear. Digital watermark can be used in video, audio and digital images for a wide variety of applications such as copy prevention right management, authentication and filtering of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Cloud Infrastructure Service Management - A Review

    The new era of computing called Cloud Computing allows the user to access the cloud services dynamically over the Internet wherever and whenever needed. Cloud consists of data and resources; and the cloud services include the delivery of software, infrastructure, applications, and storage over the Internet based on user demand...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    SNMP Based Network Optimization Technique Using Genetic Algorithms

    Genetic Algorithms (GAs) has innumerable applications through the optimization techniques and network optimization is one of them. SNMP (Simple Network Management Protocol) is used as the basic network protocol for monitoring the network activities & health of the systems. This paper deals with adding "Intelligence" to the various aspects of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Energy Efficient Routing Protocol for MANET

    In recent years, many energy-efficient routing protocols have been proposed. However, very little efforts have been taken in studying the energy consumption of individual node, overhead and route maintaining issues. While not considering the design of energy efficient routing protocol, it may perform very worst than the normal routing protocol....

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Cognitive Approach Based User Node Activity Monitoring for Intrusion Detection in Wireless Networks

    Cognitive networks are the solution for the problems existing on the current networks. Users maintain integrity of the networks and user node activity monitoring is required for provision of security. Cognitive Networks discussed in this paper not only monitor user node activity but also take preventive measures if user node...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    RGB Technique of Intrusion Detection in IEEE 802.11 Wireless Mesh Networks

    According to the growth rate of wireless technology, Wireless Mesh Network (WMN) usage is significantly increased according to its advantages like inexpensive, fast and easy deployment. WMN have ability, easy to create mesh and provide internet access in a cost efficient manner in any type of area which is unable...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    An Optical/Wireless Integrated Approach to Provide Multiple Gateways in Wireless Mesh Networks

    Wireless Mesh Network is an application technology different from the traditional peer-to-peer wireless bridge; it provides the multi-hop and multi-path connection to form a wireless environment of MESH framework so that the occurrence of single point failure can be prevented. WMNs are to provide high bandwidth broadband service to a...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    A New Efficient Approach for Peer-To-Peer File Searching in Mobile Ad-Hoc Network

    The file searching efficiency and scalable property based on P2P (Peer-To-Peer) can be increased by reduction of message overhead. A single hop cluster based P2P file searching protocol for MANET (Mobile Ad-hoc Networks) focusing mainly over the reduction of message overhead. The searching processes are maintained by intra and inter...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Maximising Wireless Sensor Network Life Time Through Cluster Head Selection Using Hit Sets

    The main aim of this paper is to propose a solution to improve the life time of the network by reducing the no of active nodes that participate in communication. Life time of a WSN is improved through optimizing communication and minimizing energy usage. One way of optimizing communication is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    A Power Efficient, Oblivious, Path-Diverse, Minimal Routing for Mesh-Based Networks-on-Chip

    One of the most trade-off aspects in the design of NoCs is the improvement of the network performance, in terms of throughput and latency, while minimizing power consumption. 2D-mesh has become the preferred topology, since it offers low and constant link delay. This paper proposes a Power efficient, Oblivious, Path-diverse,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Wired and Wireless Parallel Simulation of Fluid Flow Problem on Heterogeneous Network Cluster

    In this paper, homogeneous and heterogeneous networks will be analyzed using parallel processing technique for highly sophisticated research problem. During the analysis sample networks will be considered and QoS parameters will be observed using simulation for end-to-end services. Analysis of the wireless LAN system is carried out and its efficiency...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    An Energy Aware Spatial Correlation Method in Event Driven Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are used to monitor and control the physical environment in different classes of applications. Due to the dense deployment of sensors and as the sensor observations are spatially correlated with respect to location of sensor nodes, it is not necessary for every sensor to transmit its...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Context-Awareness for Service Oriented Systems

    Today, service oriented systems need to be enhanced to sense and react to user's context in order to provide a better user experience. To meet this requirement, Context-Aware Services (CAS) has emerged as an underling design and development paradigm for the development of context-aware systems. The fundamental challenges for such...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Cryptanalysis of a Public-Key Cryptosystem Using Lattice Basis Reduction Algorithm

    The authors considered cryptanalysis of a knapsack-type public key cryptosystem. This cryptosystem uses a combination permutation algorithm in the encryption phase to avoid the low density attack by keeping the density high. This cryptosystem is vulnerable to LLL-lattice basis reduction algorithm, since it uses a super-increasing sequence as a private...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Probabilistic Checkpointing Protocol to Sensor Network Fault-Tolerant

    A wireless sensor network WSN is a collection of autonomous sensors nodes organized into a cooperative network. A sensor node transmits the data quantity to the sink. Indeed, a failed sink may abort the overall mission of the network. Due to their crucial functions, sinks must be designed and maintained...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Study of Face Recognition Approach Based on Similarity Measures

    Detecting the similarity of face image aims to determine the image of a face for verification purpose of documents such as passport, driving license, ID cards, etc. Similarity measures are essential to solve many pattern recognition problems such as classification, clustering, and retrieval problems. There are efforts in finding the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Enhancing Packet-Level Forward Error Correction for Streaming Video in Wireless Networks

    Forward Error Correction (FEC) is a common error control technique in which the streaming video is protected by adding redundant data to the encoded bitstream such that the original source information can still be recovered in the event of errors or losses. Based on the information on the video content...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Modelling of VoIP Based Tele-Teaching System: A Petri Net Based Approach

    In this paper, the authors propose an algorithm called interactive group synchronization to reduce the chance of audio speech overlapping in VoIP based conferencing. They also extend the capability of colored petri nets by introducing time parameter in it. The propose TCPN (Time Colored Petri Nets) tool is applied here...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    FIDRS: A Novel Framework for Integrated Distributed Reliable Systems

    In this paper, the authors represent a new framework for integrated distributed and reliable systems. In the proposed framework they have used three parts to increase satisfaction and performance of this framework. At first, they analyze previous frameworks related to integrated systems, then represent new proposed framework in order to...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Design and Implementation of Multitier Authentication Scheme in Cloud

    The purpose of this paper is to present the design of a secure and more advanced authentication scheme for executing secure financial transactions over Internet. There has been continuous change in technology day by day, so security mechanisms like authentication schemes are also required to be updated. The security measures...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    A Novel Technique Based on Node Registration in MANETs

    In ad hoc network communication links between the nodes are wireless and each node acts as a router for the other node and packet is forward from one node to other. This type of networks helps in solving challenges and problems that may arise in every day communication. Mobile Ad...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    New Capabilities of Visual Cryptography

    Visual Cryptography Schemes (VCS) consider the problem of encrypting and sharing images (printed text, hand written notes, pictures, etc.) in a perfectly secure way which can be decrypted directly by the human visual system. A k out of n VCS for is a technique by which a Secret Image (SI)...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Snapshot Based Virtualization Mechanism for Cloud Computing

    Virtualization in cloud computing has been the latest evolutionary technology in current applications of various industries and IT firms are adopting cloud technology. The concept of cloud computing was introduced long back. Since its inception there have been many number of new innovations implemented by different experts and researchers etc....

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    On Web Services Based Cloud Interoperability

    Cloud Computing is a paradigm shift in the field of Computing. It is moving at an incredible fast pace and one of the fastest evolving domains of computer science today. It consist set of technology and service models that concentrates on the internet base use and delivery of IT applications,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    A CDMA Based Scalable Hierarchical Architecture for Network-On-Chip

    A Scalable hierarchical architecture based Code-Division Multiple Access (CDMA) is proposed for high performance Network-on-Chip (NoC). This hierarchical architecture provides the integration of a large number of IPs in a single on-chip system. The network encoding and decoding schemes for CDMA transmission are provided. The proposed CDMA NoC architecture is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    A Stable Distributed Clustering Algorithm for Mobile Adhoc Networks

    Mobile Ad hoc NETworks (MANET) are distributed systems which consist of several mobile nodes; they do not include predetermined topology and have no concentrated control. The nodes connect wirelessly by the approach in which they decide themselves. To access the development in the MANET, an approach should be found such...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Towards Identification and Recognition of Trace Associations in Software Requirements Traceability

    In the field of software engineering, requirements traceability is becoming a dynamic area of research. Producing numerous artifacts is crucial activity to maintain and yield high quality software. These artifacts are created and generated throughout the lifetime of software development, and are highly interrelated where the impact of any change...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    A Comparison of Various Edge Detection Techniques Used in Image Processing

    In this paper the important problem is to understand the fundamental concepts of various filters and apply these filters in identifying a shark fish type which is taken as a case study. In this paper the edge detection techniques are taken for consideration. The software is implemented using MATLAB. The...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Real-Time Covert Communications Channel for Audio Signals

    Covert communications channel is considered as a type of secure communications that creates capability to transfer information between entities while hiding the contents of the channel. Multimedia data hiding techniques can be used to establish a covert channel for secret communications within a media carrier. In this paper, a high-rate...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Software Defect Prediction Models for Quality Improvement: A Literature Study

    In spite of meticulous planning, well documentation and proper process control during software development, occurrences of certain defects are inevitable. These software defects may lead to degradation of the quality which might be the underlying cause of failure. In today's cutting edge competition it's necessary to make conscious efforts to...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Adaptive Packet Buffering Algorithm Based on Priority and Traffic Throughput for Reducing Packet Loss in Fast Handover for Mobile IPv6

    The packet loss has become an important issue to the research community, which needs to be addressed. In FMIPv6, Packet losses are significantly related to the handover latency and buffer size used for packet buffering. In the case of increased handover latency or decreased buffer size, packet losses will be...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    A Primary User Authentication Scheme for Secure Cognitive TV Spectrum Sharing

    Cognitive radio is being intensively investigated by regulatory bodies as the enabling technology for opportunistic access to the TV white spaces. The successful deployment of cognitive radio networks and the realization of their benefits depend on the assignment of essential security challenges to resist misuse of the systems. In this...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Load Aware Congestion Detection Technique in Internet

    The Internet includes various ranges of applications such as multimedia, voice and data but it endures rigorous network congestion. Further, congestion detection is an essential preventive measure must be taken to provide congestion-free Internet. To stipulate proficient technique for congestion detection, in this paper, the authors propose a load aware...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Multi-Object Tracking in Dynamic Scenes by Integrating Statistical and Cognitive Approaches

    In this paper, the authors have addressed a quite researched problem in vision for tracking objects in realistic scenarios containing complex situations. The framework comprises of four phases: object detection and feature extraction, tracking event detection, integrated statistical and cognitive modules, and object tracker. The objects are detected using fused...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Comparative Study of CAD Software, Web3D Technologies and Existing Solutions to Support Distance-Learning Students of Engineering Profile

    Interactive simulations, virtual environments and 3D interfaces significantly contribute to the process of learning through collaboration and interaction with distant participants, and through simulation of real environments and real life situations. Depending on the needs and case studies, different technologies, software packages and their combinations are used. In this paper,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Manet Load Balancing Parallel Routing Protocol

    In recent years, multi-path routing protocols have attained more attention in mobile ad hoc networks as compared to other routing schemes due to their abilities and efficiency in improving bandwidth of communication, increasing delivery reliability, responding to congestion and heavy traffic. Several protocols have been developed to address multi path...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Feature Level Fusion of Palmprint and Iris

    In many real-life usages, single modal biometric systems repeatedly face significant restrictions due to noise in sensed data, spoof attacks, data quality, non-universality, and other factors. However, single traits alone may not be able to meet the increasing demand of high accuracy in today's biometric system. Multi-biometric systems is used...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Emergence of Robust Information Security Management Structure Around the World Wide Higher Education Institutions: A Multifaceted Security Solution

    Polarizing the views on the emergence of Information security around the campus arenas of higher education institutions is the utmost erg of both developing and developed nations in this post catastrophic era of September 11, 2001 where the unthinkable is now potentially a daily reality with root causes of information...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    A New Energy-Efficient TDMA-Based MAC Protocol for Periodic Sensing Applications in Wireless Sensor Networks

    Energy efficiency is a major requirement in wireless sensor networks. Media Access Control is one of the key areas where energy efficiency can be achieved by designing such MAC protocol that is tuned to the requirements of the sensor networks. Different applications have different requirements and a single MAC protocol...

    Provided By International Journal of Computer Science Issues