International Journal of Computer Science Issues

Displaying 401-440 of 928 results

  • White Papers // Sep 2012

    A Rapid and Robust Method for Shot Boundary Detection and Classification in Uncompressed MPEG Video Sequences

    Shot boundary and classification is the first and most important step for further analysis of video content. Shot transitions include abrupt changes and gradual changes. A rapid and robust method for shot boundary detection and classification in MPEG compressed sequences is proposed in this paper. The authors firstly only decode...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Executive Enhance Business Value of BAL Information System

    It has become gradually more complex to give more attention to the importance of business value of information system in the early hours of time. Above the past few days researchers have high lightened the requirement of information system in business field. Almost every organization and industry like electronics, textile,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Enterprise Resource Planning (ERP) and Integration of Purchase, Inventory and Sale Processes: Proposition of a Common Minimal Model

    After illustrating the contribution of information systems (especially ERP - Enterprise Resource Planning) in the supply chain optimization imposed by the current context of modern companies, this paper defines a theoretical framework for the purchase, inventory and sale processes according to the standard APICS (Advanced Productivity, Innovation and Competitive Success...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    The Virtual Information: A Case Study

    In today's economics, the fact that information is a major factor of production and of increasing importance as a source of competitive advantage is a generally accepted truism. The trend towards global markets has strongly impacted the competitive situation of many enterprises. Never has the economic environment been subject to...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Design of an Enhanced Integrated Management System with Customer Experience Focus: The Business Process Framework (also Known as ETOM) and ISO9001 Together

    The purpose of this paper is to suggest an enhanced Process model with customer experience focus and its related documentation structure applicable to many industrial contexts. Since the Business Process Framework, also known as eTOM, is originally a Process Model for Telco industry and now being used broadly in many...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Mining Association Rules in Student's Assessment Data

    Higher education, throughout the world is delivered through universities and colleges affiliated to various universities and some other recognized academic institutes. Today one of the biggest challenges, the educational institutions face, is the explosive growth of educational data and to use this data to improve the quality of managerial decisions...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Energy Efficiency Analysis of Adaptive Error Correction in Wireless Sensor Networks

    In this paper, the authors develop an analytical energy efficiency model using Adaptive Error Correction Code (AECC) in wireless sensor networks in fading environments. To adapt energy efficiency of sensor node to channel variations, the packet length is tuned at the data link layer. In this model, they consider the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Energy Band Based Clustering Protocol for Wireless Sensor Networks

    Clustering is one of the widely used techniques to prolong the lifetime of wireless sensor networks in environments where battery replacement of individual sensor nodes is not an option after their deployment. However, clustering overheads such as cluster formation, its size, cluster head selection & rotation, directly affects the lifetime...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Analysis of QoS Routing Approach and the Starvation's Evaluation in LAN

    This paper gives a survey in QoS Routing Architecture implemented by Dijkstra's algorithm. The performance of QoS Routing architecture is evaluated by made a comparison between the Shortest Path Routing and QoS one. A very important feature in QoS routing are the conditions for elimination of starvation. Experimentally the authors...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    A Framework for Secure Cloud Computing

    Cloud computing is one of the most discussed topics today in the field of information technology. It introduces a new Internet-based environment for on-demand, dynamic provision of reconfigurable computing resources. The biggest challenge in cloud computing is the security and privacy problems caused by its multi-tenancy nature and the outsourcing...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Challenges Involved in Implementation of ERP on Demand Solution: Cloud Computing

    As the world is beginning towards the cloud where speed and scalability are critical; and the many software is taking over to one another even more intrinsic role in this period the Cloud ERP would play the vital role in organization specially in SME (i.e., Small Medium Enterprises). Organizations are...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    New Non Path Metrics for Evaluating Network Security Based on Vulnerability

    In this paper, the authors propose a new and simple metrics for evaluating network security. The proposed metrics are based on the existence of network vulnerabilities in the network. The proposed metrics are different with their previous metrics proposed. Exploited Vulnerability Percentage (EVP) metric, Vulnerable Host Percentage (VHP) metric and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Stability and Stabilization of a Flexible Manipulator

    In this paper, the stability and stabilization of a neutral system with time-delay are treated. First, the flexible manipulator is modeled as a neutral time-delay system form. Then, based on the Lyapunov-Krasovskii functional theory, a delay dependant condition is proposed to test studied system stability, which is applied to a...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    PCA-Based Relevance Feedback in Document Image Retrieval

    Research has been devoted in the past few years to relevance feedback as an effective solution to improve performance of information retrieval systems. Relevance feedback refers to an interactive process that helps to improve the retrieval performance. In this paper, the authors propose the use of relevance feedback to improve...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Shared Situation Awareness Architecture (S2A2) for Network Centric Disaster Management (NCDM)

    Having Shared Situation Awareness (SSA) in Network Centric Disaster Management (NCDM) lead to virtual collaboration, virtual organization and self-synchronization among people; therefore, having SSA reduces operation cost and risk and increases speed of responsibility and operation and total performance of decision-makers. In this paper, the authors present a new architecture...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    A Hybrid Approach of Using Anycast Addressing With Zone Routing Protocol

    Zone Routing Protocol (ZRP) is a hybrid protocol that combines the advantages of both the proactive and reactive protocols. It is classified as: Intra Zone Routing, which uses hop count of the N-neighbors using proactive techniques and Inter Zone Routing, which includes the rest of the network excluding the N-neighbors...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    A Novel Protocol for IP Traceback to Detect DDoS Attack

    Distributed Denial of Service (DDoS) attacks continue to pose higher threats to the internet. There are so many protocols designed to trace the attacker's address. The authors want to trace back attack source (i.e., "IP addresses"), they need to examine the tradeoff between different existing IP Trace back techniques. They...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Internet Connectivity Using Vehicular Ad-Hoc Networks

    Although a Mobile Ad-hoc NETwork (MANET) can be used in many cases but the most preferable is a MANET connected to the internet. This is achieved by using gateways which act as bridges between a MANET and the internet. To communicate in-between, a mobile node needs to find a valid...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Personalization in Geographic Information Systems: A Survey

    Geographic Information Systems (GIS) are widely used in different domains of applications, such as maritime navigation, museums visits and route planning, as well as ecological, demographical and economical applications. Nowadays, organizations need sophisticated and adapted GIS-based Decision Support System (DSS) to get quick access to relevant information and to analyze...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Destination Based Group Gray Hole Attack Detection in MANET Through AODV

    MANET is easily vulnerable because of dynamic topology, infrastructure less nature and also due to lack of centralized administration. One of the most common attack on such networks is gray hole attack which drop some selective data. It is challenge to keep the network free form this attack. This paper...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Network Based Anti-Virus Technology for Real-Time Scanning

    Negative aspects of networking lately became one of the most crucial problems in the information world. Protection against malware and malicious code must balance between being capable of fast detection of malware and being light on resources. Since modern antivirus systems are not optimized in the terms of speed, this...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Ranking Search Engine Result Pages Based on Trustworthiness of Websites

    The World Wide Web (WWW) is the repository of large number of web pages which can be accessed via Internet by multiple users at the same time and therefore it is Ubiquitous in nature. The search engine is a key application used to search the web pages from this huge...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Fuzzy Maintainability Model for Object Oriented Software System

    In recent years for achieving considerable success in software system, maintainability plays a very crucial role and it is considered as an important quality characteristics. In this paper a maintainability model has been proposed to compare maintainability of object-oriented software system. Attempts have been made on software developed in different...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Model Based Neuro-Fuzzy ASR on Texas Processor

    In this paper an algorithm for recognizing speech has been proposed. The recognized speech is used to execute related commands which use the MFCC and two kinds of classifiers, first one uses MLP and second one uses fuzzy inference system as a classifier. The experimental results demonstrate the high gain...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    MISR: Multiple Inheritor Selection for Recovery of Nodes in Faulty Cluster in Wireless Sensor Networks

    A wireless sensor network composed of many sensor nodes which are used to monitor unavailable and harsh environments. Because these nodes are too small and battery operated which have limited energy, faults may occur. Fault tolerance is one of the most important issues in wireless sensor networks and must be...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Performance Comparison of SCTP and UDP Over Mobile Ad Hoc Networks

    Countless researchers have put efforts to conduct researches about the performance of the traditional Transport Control Protocols (TCP) and User Datagram Protocol (UDP). Recently new transport protocol had been designed called Stream Control Transmission Protocol (SCTP). In this paper, the authors will focus to study the effect of Mobile Ad...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Applying Data Mining Technique for the Optimal Usage of Neonatal Incubator

    This research aims to provide intelligent tool to predict incubator Length Of Stay (LOS) of infants which shall increase the utilization and management of infant incubators. The data sets of EGyptian Neonatal Network (EGNN) were employed and Oracle Data Miner (ODM) tool was used for the analysis and prediction of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Collaboration Schemes Evaluation in Multi-Domain Networks

    The monitoring of the quality of service in a multi-domain network supervises the multi-domain service performance. A multi-domain service is a service that crosses several domains which can be managed by different providers. Since, each domain can be managed with its own policies and may require confidential it of its...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Design and Optimization of Photonic Crystal Triplexer for Optical Networks

    Photonic Crystals (PhCs), also known as Photonic Band-Gap (PBG) materials, can control the spontaneous emission and the propagation of Electro-Magnetic (EM) waves. Due to existence of PBG, PhCs have applications in different areas of optical engineering such as optical filters, switches, power splitters, and demultiplexers which may ultimately pave the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Implementation of ITIL in a Moroccan Company: The Case of Incident Management Process

    IT departments were viewed as a cost center and not as an entity in the service of strategy. But this has changed in recent years because of market competitiveness and also due to the fact that the adoption of a management approach focused on the customer and driven by IT...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    A Method for Text Summarization by Bacterial Foraging Optimization Algorithm

    Due to rapid and increasingly growth of electronic texts and documents, the authors need some techniques for integration, communication and appropriate utilization of these texts. Summarizing the literature is one of the most fundamental tasks for integrating and taking advantages of these gathered texts. Selecting key words and then integrating...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Web Services Modeling and Composition Approach Using Objects-Oriented Petri Nets

    Now-a-days, with the emergence and the evolution of new technologies, such as e-business, a large number of companies are connected to Internet, and have proposed web services to trade. Web services as presented, are conceptually limited components to relatively simple functionalities. Generally, a single service does not satisfy the users...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Using Mobile Agent Technology to Develop a Collaborative Product Life-Cycle Oriented Architecture

    Today product development activities are becoming more and more agile, adaptable, and cost-effective. Multi-agent-based system technology has found wide applications in managing company's information. This paper applies Multi-mobile-agent technology in developing a collaborative architecture for product lifecycle. By adopting the Aglets mobile agent platform, a generic platform has been developed...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Developing E-Learning Based on Animation Content for Improving Mathematical Connection Abilities in High School Students

    The purpose of this paper is to develop e-learning based on animation content to improve mathematical connection abilities in senior high school students. The e-learning was developed using framework proposed by Moddle, while the animation content was developed using macromedia flash. To get the student mathematical connection abilities, pretest and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    User Network Modeling-Based Spatial Web Personalization

    Web personalization can be seen as an interdisciplinary field whose objective is to facilitate the interaction between web content and user's needs. It includes per definition several research domains from social to information sciences. The personalized search focuses on integrating the user context and needs in the information retrieval process....

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Wireless Security System Implemented in a Mobile Robot

    This paper presents the design and implementation of a security system in which a mobile robot Lego NXT continuously monitors its surroundings while traveling in search of moving objects or people, considered unauthorized elements. An ultrasonic sensor is used for the monitoring. On suspicious movement detection, a warning signal is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    University Authentication System Based on Java Card and Digital X.509 Certificate

    This paper presents a solution to the problem of strong authentication, portable and expandable using a combination of Java technology and storage of X.509 digital certificate in Java cards to access services offered by an institution, in this case, the technology of the University of Panama, ensuring the authenticity, confidentiality,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    A Novel Image Encryption Using an Integration Technique of Blocks Rotation Based on the Magic Cube and the AES Algorithm

    In recent years, several encryption algorithms have been proposed to protect digital images from cryptographic attacks. These encryption algorithms typically use a relatively small key space and therefore, provide safe, especially if they are of a dimension. In this paper proposes an encryption algorithm for a new image protection scheme...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Hiding Data in Images Using New Random Technique

    Steganography is the art of hiding the fact that communication is taking place by hiding information in other information. In the field of Data Communication, Steganography play a major role. The transmission of information via the Internet may expose it to detect and theft. Some solution to be discussed is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Cloud Databases: A Paradigm Shift in Databases

    Relational databases ruled the Information Technology (IT) industry for almost 40 years. But last few years have seen sea changes in the way IT is being used and viewed. Stand alone applications have been replaced with web-based applications, dedicated servers with multiple distributed servers and dedicated storage with network storage....

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2014

    Predicting Sales In E-commerce Using Bayesian Network Model

    An area of substantial research is that of predicting product sales, such as books, video games and movie tickets. There are a number of prediction models that have been used to predict future sales however these models attempt to solve the problem by making assumptions. These models assume that independent...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2014

    Revisiting Security Ontologies

    Significant innovations in virtualization and distributed computing as well as improved access to high-speed Internet have induced interest in cloud computing. Contemporary exploration of all stages of service models clearly proves the immense significance of \"Security in cloud computing\", which being as obtuse as it is pertinent, demands attention. An...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2014

    Development of a Mobile Service on a WiFi Network for the Evaluation of Mathematical Skills

    In this paper, the authors describe the design and development of a mobile service to make practical assessments of different topics of mathematics in order to improve the skills of students in high school education. This tool has the ability to create user accounts for participants, as well as storing...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Applying GIS Concepts to a Pervasive Game: Spatiotemporal Modeling and Analysis Using the Triad Representational Framework

    Given pervasive games that maintain a virtual spatiotemporal model of the physical world, game designers must contend with space and time in the virtual and physical. Previous papers on pervasive games have partially contended with these representations, but an integrated conceptual model is lacking. Because they both make use of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Converting Relational Database Into XML Document

    XML (eXtensible Markup Language) is emerging and gradually accepted as the standard for data interchange in the Internet world. Interoperation of relational database and XML database involves schema and data translations. Through EER (Extended Entity Relationship) model can convert the schema of relational database into XML. The semantics of the...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2014

    Designing of Efficient Adders by Using a Novel Reversible SDNG Gate

    In recent years, reversible logic circuits are increasingly used in power minimization and having applications such as low power CMOS design, optical information processing, DNA computing, bioinformatics, quantum computing and nanotechnology. Under ideal conditions, reversible logic gates produce zero power dissipation. The main motivation behind the study of this technology...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Optimized Design of Carry Skip BCD Adder using New FHNG Reversible Logic Gates

    Reversible logic has received great attention in the recent years due to its ability to reduce the power dissipation. Reversible logic is very essential for the construction of low power, low loss computational structures which are very essential for the construction of arithmetic circuits used in quantum computation, nanotechnology and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2010

    Static Noise Margin Analysis of SRAM Cell for High Speed Application

    In this paper, the authors present the different types of analysis such as noise, voltage, read margin and write margin of Static Random Access Memory (SRAM) cell for high-speed application. The design is based upon the 0.18 μm CMOS process technology. Static Noise Margin (SNM) is the most important parameter...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2011

    A Technique to Reduce Transition Energy for Data-Bus in DSM Technology

    As CMOS VLSI integration continues with shrinking feature size, the energy dissipation on the on-chip data buses and long interconnects becoming a bottle neck for high performance integrated circuits. This energy dissipation is due to increase in inter-wire capacitance. This capacitance on on-chip data buses and long interconnects plays an...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Efficient Circuit Configuration for Enhancing Resolution of 8-Bit Flash Analog to Digital Converter

    The need constantly exists for converters with higher resolution, faster conversion speeds and lower power dissipation. High speed Analog to Digital Converters (ADC's) has been based on flash architecture, because all comparators sample the analog input voltage simultaneously, this ADC is thus inherently fast. Unfortunately flash ADC requires 2N -...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    The Study on the Application of Business Intelligence in Manufacturing: A Review

    A manufacturing based organization operates in an environment where a fast and effective decision is needed. This is to ensure that the output is met with customer compliance. There exists manufacturing systems that collect the operational data and the data turns out to be in a high volume due to...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    A Maturity Model for Business Intelligence System Project in Small and Medium-Sized Enterprises: An Empirical Investigation

    In the recent years many studies on maturity model have been carried out. Some refer specifically to maturity models for Business Intelligence (BI). Starting from an analysis of the existing literature, the aim of this paper is to develop a maturity model for the business intelligence system project in Small...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Design Approaches to Enhance Usability for E-Commerce Sites

    Human computer interaction has a great collaboration with World Wide Web (WWW). The fastest growing web technology and interaction issues are compelling web designers to think for quality and user friendly designs in the web. Websites are expected to be designed in a way which will allure the visitors who...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2014

    Modeling and Simulation of Multiprocessor Systems MPSoC by SystemC/TLM2

    The current manufacturing technology allows the integration of a complex multiprocessor system on one piece of silicon (MPSoC for Multiprocessor System-on-Chip). One way to manage the growing complexity of these systems is to increase the level of abstraction and to address the system-level design. In this paper, the authors focus...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    Asynchronous Hybrid Kogge-Stone Structure Carry Select Adder Based IEEE-754 Double-Precision Floating-Point Adder

    In this paper, the design and implementation of a generic fast asynchronous Hybrid Kogge-Stone Structure Carry Select based Adder (HKSS-CSA) is described in detail and its application in the design of asynchronous Double Precision Floating-Point Adder (DPFPA) is presented and the improved latency performance it provides is discussed. A detailed...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    A Novel Low Complexity Combinational RNS Multiplier Using Parallel Prefix Adder

    Modular multiplication plays an important role in encryption. One of the encryption methods which need fast modular multiplication is RSA where large numbers are needed to empower large modules. In such methods, in order to show numbers, RNS is usually used with multiplication as the core. Modulo 2n+1 multipliers are...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    Design of an Energy-Efficient CNFET Full Adder Cell

    In this paper, by using the Carbon Nanotube Field Effect Transistor (CNFET), which is a promising alternative for the MOSFET transistor, two novel energy-efficient Full Adders are proposed. The proposed full adders show full swing logic and strong output drivability. The first design uses eight transistors and nine capacitors and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Six New Full Adder Cells Based on Majority-Not Gate in 45nm CMOS Technology and Analysis in SOI Technology

    In this paper, the authors present six new 1-bit full adder topologies operating 45nm technology and SOI technology. Inverse Majority Gate (IMG) together with NAND/NOR were used as the main computational building blocks. Six new 1-bit full adder cells are simulated 45nm CMOS technology and SOI technology with different supply...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Multimode FPGAwith Flexible Embedded FPUS

    The performance of field-programmable gate arrays used for floating-point applications is poor due to complexity of floating-point arithmetic. Implementing floating-point units on FPGAs consume a large amount of resources. This makes FPGAs less attractive for use in floating-point intensive applications. There is a need for embedded FPUs in FPGAs. The...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2011

    A New Design for Array Multiplier with Trade Off in Power and Area

    In this paper, a low power and low area array multiplier with carry save adder is proposed. The proposed adder eliminates the final addition stage of the multiplier than the conventional parallel array multiplier. The conventional and proposed multiplier both are synthesized with 16-T full adder. Among transmission gate, transmission...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Comment on "Quantum Multiplexer Designing and Optimization Applying Genetic Algorithm"

    The authors have noticed that many fundamental laws and rules of quantum-circuit are violated in a work published in International Journal of Computer Science Issues. The authors of this published paper presented a quantum multiplexing circuit which is composed of half-adders, i.e. quantum multiplexing functionality is claimed to achieve by...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    A Novel Architecture for Quantum-Dot Cellular Automata Multiplexer

    Quantum-dot Cellular Automata (QCA) technology is attractive due to its low power consumption, fast speed and small dimension; therefore it is a promising alternative to CMOS technology. Additionally, multiplexer is a useful part in many important circuits. In this paper, the authors propose a novel design of 2:1 MUX in...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2011

    Using Evolutionary Strategies Algorithm in the Evolutionary Design of Sequential Logic Circuits

    Evolvable HardWare (EHW) is a set of techniques that are based on the idea of combining reconfiguration hardware systems with evolutionary algorithms. In other word, EHW has two sections; the reconfigurable hardware and evolutionary algorithm where the configurations are under the control of an evolutionary algorithm. This paper, suggests a...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Research of Embedded Hardware Optimization Design Algorithm

    Embedded hardware design is important in real world applications, but with the increase of the hardware scale the traditional methods cannot design them well. Cultural algorithms are a class of computational models derived from observing the cultural evolution process in nature. Aiming at the disadvantages of basic cultural algorithms like...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Accurate Dynamic Power Model for FPGA Based Implementations

    In this paper, the authors present an accurate Field Programmable Gate Array (FPGA) of analytical dynamic power models for basic operators at the RTL (Register Transfer Level) level. The models are based on the frequency, the activity rate and the input precision by using the Xpower tool in the presence...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    A Differential Double Pass Transistor Logic Unit

    In this paper, the authors present a new differential logic unit with duplicated functional outputs. The logic functions as well as their inverses are implemented within a single Logic Unit (LU) cell. The hardware overhead for the implementation of the proposed LU is lower than the hardware overhead required for...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    A Proficient Design of Hybrid Synchronous and Asynchronous Digital FIR Filter Using FPGA

    In this paper, a hybrid synchronous and asynchronous digital FIR filter is designed and implemented in FPGA using VHDL. The digital FIR filter of high throughput, low latency operating at above 1.3GHz was designed. An adaptive high capacity pipelined was introduced in the hybrid synchronous asynchronous design of the filter....

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2011

    Optimization of Power Consumption in VLSI Circuit

    Space, power consumption and speed are major design issues in VLSI circuit. The design component has conflicting affect on overall performance of circuits. An optimization of power dissipation can be achieved by compromising various components. Power consumption in VLSI circuit (like in multipliers) is also data dependent. In this paper,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Design, Simulation and Hardware Implementation of Low Density Parity Check Decoders Using Min-Sum Algorithm

    A Variable Node Processing Unit (VNPU) and a Check Node Processing Unit (CNPU) are designed in order to be used in Low Density Parity Check (LDPC) decoding by the Min-Sum Algorithm (MSA). The designed blocks are fully parallel and flexible to be used for different block length when a regular...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    A Fault-Tolerant 32 nm CMOS Double Sideband Amplitude Suppressed Carrier Modulator-Demodulator Circuit Implementation

    In this paper, the authors present a low-voltage, low-power and fault-tolerant implementation of Double SideBand Suppressed Carrier (DSB-SC) amplitude modulator-demodulator circuit for portable communication systems. Through the approximation proposed in this work, a CMOS four quadrant multiplier is used as a (de)modulator circuit to generate DSB-SC (de)modulated signals. Furthermore, the...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2011

    SEWOS: Bringing Semantics into Web Operating System

    The revolution in web world led to increasing users' needs, demands and expectations. By the time, those needs developed starting from ordinary static pages, moving on to fully dynamic ones and reaching the need for services and applications to be available on the web. Those demands changed the perspective of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    A Comprehensive Review for Central Processing Unit Scheduling Algorithm

    The Central Processing Unit (CPU) is a component of a computer system that carries out the instructions of a computer program and is the primary element carrying out the computer's functions. This paper describe how does CPU facilitates tasks given by a user through a scheduling algorithm. CPU carries out...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    A Survey on Implementation of a Linux-based Operating System using LFS Method

    In recent years, the movement of open-source software and on top of them Linux open-source and free operating system has attracted the attention of many specialists, governments, organizations, etc. so that the biggest software companies such as Google, Oracle, etc. stepped forward in this movement and are developing open-source software,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    An Adaptive Real Time Task Scheduler

    Time constraint is the main factor in real time operating system. Different scheduling algorithm is used to schedule the task. The earliest deadline first and ant colony optimization is a dynamic scheduling algorithm used in a real time system and it is most beneficial scheduling algorithm for single processor real-time...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Proposed Challenges and Areas of Concern in Operating System Research and Development

    Computers are a very important part of people lives and the major reason why they have been such a success is because of the excellent graphical operating systems that run on these powerful machines. As the computer hardware is becoming more and more powerful, it is also vital to keep...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2013

    Mapping Wireless Sensor Network Applications Requirements to Existing Operating Systems

    The design of operating system for Wireless Sensor Network (WSN) deviates from traditional operating system design due to significant and specific characteristics like constrained resources, high dynamics and inaccessible deployment. This paper is to classify existing operating systems according to the important Operating System (OS) features and to propose the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Scheduling Model for Symmetric Multiprocessing Architecture based on Process Behavior

    In this paper, the authors present a new method for scheduling of Symmetric MultiProcessing (SMP) architecture based on process behavior. The method takes advantage of process behavior, which includes system calls to create groups of similar processes using machine-learning techniques like clustering or classification and then makes process distribution decisions...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    Developing an Activity-Based Costing Approach to Maximize the Efficiency of Customer Relationship Management Projects

    In today's competitive environment, profitability analysis is not just about looking at the profit and loss statement. It is more about knowing which of the organizations customers are making them money and which are losing them money. This paper considers how activity-based costing approach may complement a customer relationship management...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    Rise of Data Mining: Current and Future Application Areas

    Knowledge has played a significant role on human activities since in development. Data mining is the process of knowledge discovery where knowledge is gained by analyzing the data store in very large repositories, which are analyzed from various perspectives and the result is summarized it into useful information. Due to...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    The Potential and Challenges of Big Data - Recommendation Systems Next Level Application

    The continuous increase of data generated provides enormous possibilities of both public and private companies. The management of this mass of data or big data will play a crucial role in the society of the future, as it finds applications in different fields. There are so much potential and extremely...

    Provided By International Journal of Computer Science Issues