International Journal of Computer Science Issues

Displaying 401-440 of 880 results

  • White Papers // Jul 2012

    Destination Based Group Gray Hole Attack Detection in MANET Through AODV

    MANET is easily vulnerable because of dynamic topology, infrastructure less nature and also due to lack of centralized administration. One of the most common attack on such networks is gray hole attack which drop some selective data. It is challenge to keep the network free form this attack. This paper...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Network Based Anti-Virus Technology for Real-Time Scanning

    Negative aspects of networking lately became one of the most crucial problems in the information world. Protection against malware and malicious code must balance between being capable of fast detection of malware and being light on resources. Since modern antivirus systems are not optimized in the terms of speed, this...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Ranking Search Engine Result Pages Based on Trustworthiness of Websites

    The World Wide Web (WWW) is the repository of large number of web pages which can be accessed via Internet by multiple users at the same time and therefore it is Ubiquitous in nature. The search engine is a key application used to search the web pages from this huge...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Fuzzy Maintainability Model for Object Oriented Software System

    In recent years for achieving considerable success in software system, maintainability plays a very crucial role and it is considered as an important quality characteristics. In this paper a maintainability model has been proposed to compare maintainability of object-oriented software system. Attempts have been made on software developed in different...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Model Based Neuro-Fuzzy ASR on Texas Processor

    In this paper an algorithm for recognizing speech has been proposed. The recognized speech is used to execute related commands which use the MFCC and two kinds of classifiers, first one uses MLP and second one uses fuzzy inference system as a classifier. The experimental results demonstrate the high gain...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    MISR: Multiple Inheritor Selection for Recovery of Nodes in Faulty Cluster in Wireless Sensor Networks

    A wireless sensor network composed of many sensor nodes which are used to monitor unavailable and harsh environments. Because these nodes are too small and battery operated which have limited energy, faults may occur. Fault tolerance is one of the most important issues in wireless sensor networks and must be...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Performance Comparison of SCTP and UDP Over Mobile Ad Hoc Networks

    Countless researchers have put efforts to conduct researches about the performance of the traditional Transport Control Protocols (TCP) and User Datagram Protocol (UDP). Recently new transport protocol had been designed called Stream Control Transmission Protocol (SCTP). In this paper, the authors will focus to study the effect of Mobile Ad...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Applying Data Mining Technique for the Optimal Usage of Neonatal Incubator

    This research aims to provide intelligent tool to predict incubator Length Of Stay (LOS) of infants which shall increase the utilization and management of infant incubators. The data sets of EGyptian Neonatal Network (EGNN) were employed and Oracle Data Miner (ODM) tool was used for the analysis and prediction of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Collaboration Schemes Evaluation in Multi-Domain Networks

    The monitoring of the quality of service in a multi-domain network supervises the multi-domain service performance. A multi-domain service is a service that crosses several domains which can be managed by different providers. Since, each domain can be managed with its own policies and may require confidential it of its...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Challenges Involved in Implementation of ERP on Demand Solution: Cloud Computing

    As the world is beginning towards the cloud where speed and scalability are critical; and the many software is taking over to one another even more intrinsic role in this period the Cloud ERP would play the vital role in organization specially in SME (i.e., Small Medium Enterprises). Organizations are...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    New Non Path Metrics for Evaluating Network Security Based on Vulnerability

    In this paper, the authors propose a new and simple metrics for evaluating network security. The proposed metrics are based on the existence of network vulnerabilities in the network. The proposed metrics are different with their previous metrics proposed. Exploited Vulnerability Percentage (EVP) metric, Vulnerable Host Percentage (VHP) metric and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Comparison Between MC-CDMA and CDMA-OFDM/OQAM Systems in Presence of MIMO Channel

    In this paper, the authors present a comparison between MC-CDMA and CDMA-OFDM/OQAM systems in the case of MIMO channel. The advanced Multi Carrier CDMA OFDM/OQAM modulation is a combination of CDMA and OFDM/OQAM. This combination takes advantages from multicarrier modulation and spread spectrum. Indeed, the use of OFDM has proved...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Application of Satellite Remote Sensing for Detailed Landslide Inventories Using Frequency Ratio Model and GIS

    This paper presents landslide susceptibility analysis in central Zab basin in the southwest mountainsides of West-Azerbaijan province in Iran using remotely sensed data and Geographic Information System. Landslide database was generated using satellite imagery and aerial photographs accompanied by field investigations using Differential Global Positioning System to generate a landslide...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    P2P Appliance Calculation Method for Trust Between Nodes Within a P2P Network

    Modern ways of communications, such as in a web services environment, also influences trust relationships between organisations. This concept of web-based (way towards semantic web services) trust is new and has as yet not been resolved. The authors hope that some of the trust properties mentioned above can be successfully...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    On the Current Measurement Practices in Agile Software Development

    Agile Software Development (ASD) methods were introduced as a reaction to traditional software development methods. Principles of these methods are different from traditional methods and so there are some different processes and activities in agile methods comparing to traditional methods. Thus, ASD methods require different measurement practices comparing to traditional...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Algorithm for Efficient Attendance Management: Face Recognition Based Approach

    Students attendance in the classroom is very important task and if taken manually wastes a lot of time. There are many automatic methods available for this purpose, i.e., biometric attendance. All these methods also waste time because students have to make a queue to touch their thumb on the scanning...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Adaptive Packet Buffering Algorithm Based on Priority and Traffic Throughput for Reducing Packet Loss in Fast Handover for Mobile IPv6

    The packet loss has become an important issue to the research community, which needs to be addressed. In FMIPv6, Packet losses are significantly related to the handover latency and buffer size used for packet buffering. In the case of increased handover latency or decreased buffer size, packet losses will be...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    A Primary User Authentication Scheme for Secure Cognitive TV Spectrum Sharing

    Cognitive radio is being intensively investigated by regulatory bodies as the enabling technology for opportunistic access to the TV white spaces. The successful deployment of cognitive radio networks and the realization of their benefits depend on the assignment of essential security challenges to resist misuse of the systems. In this...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Load Aware Congestion Detection Technique in Internet

    The Internet includes various ranges of applications such as multimedia, voice and data but it endures rigorous network congestion. Further, congestion detection is an essential preventive measure must be taken to provide congestion-free Internet. To stipulate proficient technique for congestion detection, in this paper, the authors propose a load aware...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Multi-Object Tracking in Dynamic Scenes by Integrating Statistical and Cognitive Approaches

    In this paper, the authors have addressed a quite researched problem in vision for tracking objects in realistic scenarios containing complex situations. The framework comprises of four phases: object detection and feature extraction, tracking event detection, integrated statistical and cognitive modules, and object tracker. The objects are detected using fused...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Comparative Study of CAD Software, Web3D Technologies and Existing Solutions to Support Distance-Learning Students of Engineering Profile

    Interactive simulations, virtual environments and 3D interfaces significantly contribute to the process of learning through collaboration and interaction with distant participants, and through simulation of real environments and real life situations. Depending on the needs and case studies, different technologies, software packages and their combinations are used. In this paper,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Manet Load Balancing Parallel Routing Protocol

    In recent years, multi-path routing protocols have attained more attention in mobile ad hoc networks as compared to other routing schemes due to their abilities and efficiency in improving bandwidth of communication, increasing delivery reliability, responding to congestion and heavy traffic. Several protocols have been developed to address multi path...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Feature Level Fusion of Palmprint and Iris

    In many real-life usages, single modal biometric systems repeatedly face significant restrictions due to noise in sensed data, spoof attacks, data quality, non-universality, and other factors. However, single traits alone may not be able to meet the increasing demand of high accuracy in today's biometric system. Multi-biometric systems is used...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Emergence of Robust Information Security Management Structure Around the World Wide Higher Education Institutions: A Multifaceted Security Solution

    Polarizing the views on the emergence of Information security around the campus arenas of higher education institutions is the utmost erg of both developing and developed nations in this post catastrophic era of September 11, 2001 where the unthinkable is now potentially a daily reality with root causes of information...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    A New Energy-Efficient TDMA-Based MAC Protocol for Periodic Sensing Applications in Wireless Sensor Networks

    Energy efficiency is a major requirement in wireless sensor networks. Media Access Control is one of the key areas where energy efficiency can be achieved by designing such MAC protocol that is tuned to the requirements of the sensor networks. Different applications have different requirements and a single MAC protocol...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    A Goal Question Metric Approach for Evaluating Security in a Service Oriented Architecture Context

    For interactions to be possible within the Service Oriented Architecture (SOA) ecosystem, each actor must be enough confident of other actors to engage safely in the interactions. Therefore, the establishing of objective metrics tailored to the context of SOA that show security of a system and lead to enhancements is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Testing Websites by P3R2 Model

    Cyber espionage at the government, corporate and individual levels has increased dramatically over the last few years. The cyberspace has become the latest domain of Chinese belligerence. There is a crying need for a cohesive global arrangement to address the emerging issues of Cyberspace. Apart from trying to cull out...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Using Aspect Oriented Techniques to Build-in Software Quality

    Today's software systems are growing rapidly in number, size, complexity, amount of distribution and number of users with the evolving technologies being geared towards improving their quality. Aspect oriented software development is a new paradigm that claims to improve the quality of software using separation of concerns. In this paper,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Multi Feature Content Based Video Retrieval Using High Level Semantic Concept

    Content-based retrieval allows finding information by searching its content rather than its attributes. The challenge facing Content-Based Video Retrieval (CBVR) is to design systems that can accurately and automatically process large amounts of heterogeneous videos. Moreover, content-based video retrieval system requires in its first stage to segment the video stream...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Multiprocessor Scheduling Using Parallel Genetic Algorithm

    Tasks scheduling is the most challenging problem in the parallel computing. Hence, the inappropriate scheduling will reduce or even abort the utilization of the true potential of the parallelization. Genetic Algorithm (GA) has been successfully applied to solve the scheduling problem. The fitness evaluation is the most time consuming GA...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Cellphone as a Traffic Guidance System

    The worldwide proliferation of cellphones has created numerous opportunities for new and powerful applications that contribute towards improving the quality of life. Traffic problems due to traffic congestions, especially in cities with high population density, is one of the areas that need attention. GPS-enabled cellphones can contribute towards alleviating some...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Clouds for Different Services

    The Cloud has become a new vehicle for delivering resources such as computing and storage to customers on demand. Rather than being a new technology in itself, the cloud is a new business model wrapped around new technologies such as server visualization that take advantage of economies of scale and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    A Hybrid Approach of Using Anycast Addressing With Zone Routing Protocol

    Zone Routing Protocol (ZRP) is a hybrid protocol that combines the advantages of both the proactive and reactive protocols. It is classified as: Intra Zone Routing, which uses hop count of the N-neighbors using proactive techniques and Inter Zone Routing, which includes the rest of the network excluding the N-neighbors...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    A Novel Protocol for IP Traceback to Detect DDoS Attack

    Distributed Denial of Service (DDoS) attacks continue to pose higher threats to the internet. There are so many protocols designed to trace the attacker's address. The authors want to trace back attack source (i.e., "IP addresses"), they need to examine the tradeoff between different existing IP Trace back techniques. They...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Stability and Stabilization of a Flexible Manipulator

    In this paper, the stability and stabilization of a neutral system with time-delay are treated. First, the flexible manipulator is modeled as a neutral time-delay system form. Then, based on the Lyapunov-Krasovskii functional theory, a delay dependant condition is proposed to test studied system stability, which is applied to a...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    PCA-Based Relevance Feedback in Document Image Retrieval

    Research has been devoted in the past few years to relevance feedback as an effective solution to improve performance of information retrieval systems. Relevance feedback refers to an interactive process that helps to improve the retrieval performance. In this paper, the authors propose the use of relevance feedback to improve...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Shared Situation Awareness Architecture (S2A2) for Network Centric Disaster Management (NCDM)

    Having Shared Situation Awareness (SSA) in Network Centric Disaster Management (NCDM) lead to virtual collaboration, virtual organization and self-synchronization among people; therefore, having SSA reduces operation cost and risk and increases speed of responsibility and operation and total performance of decision-makers. In this paper, the authors present a new architecture...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Using Mobile Agent Technology to Develop a Collaborative Product Life-Cycle Oriented Architecture

    Today product development activities are becoming more and more agile, adaptable, and cost-effective. Multi-agent-based system technology has found wide applications in managing company's information. This paper applies Multi-mobile-agent technology in developing a collaborative architecture for product lifecycle. By adopting the Aglets mobile agent platform, a generic platform has been developed...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Energy Efficiency Analysis of Adaptive Error Correction in Wireless Sensor Networks

    In this paper, the authors develop an analytical energy efficiency model using Adaptive Error Correction Code (AECC) in wireless sensor networks in fading environments. To adapt energy efficiency of sensor node to channel variations, the packet length is tuned at the data link layer. In this model, they consider the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Energy Band Based Clustering Protocol for Wireless Sensor Networks

    Clustering is one of the widely used techniques to prolong the lifetime of wireless sensor networks in environments where battery replacement of individual sensor nodes is not an option after their deployment. However, clustering overheads such as cluster formation, its size, cluster head selection & rotation, directly affects the lifetime...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Dynamic Workload Performance Optimization Model for Multiple-Tenancy in Cloud Systems

    Cloud entails the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer. With this concept it's easy to reduce complexity for the clients as they don't have to handle installations and other...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Investigational Study of 7 Effective Schemes of Load Balancing in Cloud Computing

    With the exponential increase in demands of online applications and services, cloud computing has evolved as a boon in modern information technology. Built over the base of grid and distributed computing, cloud computing offers services to cater the dynamic needs of massive user base. However, with the novelty associated with...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Effective Anomaly Intrusion Detection System Based on Neural Network with Indicator Variable and Rough Set Reduction

    Intrusion Detection System (IDS) is an important tool for the defense of a network against attacks. It monitors the activities occurring in a computer system or network and analyzes them for recognizing intrusions to protect the computer network. Most of the existing IDSs use all of the 41 features available...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2013

    The Impact of Indexes on Data Warehouse Performance

    A data warehouse designer should consider the effectiveness of data query, this depends on the selection of relevant indexes and their combination with the materialized views, note that the index selection is a NP-complete problem, because the number of indexes is exponential in the total number of attributes in the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2013

    Semi-Automatic Data Warehouse Design Methodologies: A Survey

    Faced to the large amounts of data and the remarkable diversification of their sources, a scientific and economic interest to explore the reservoirs of knowledge is established. Data warehouses are used in making strategic decisions. A data warehouse is a collection of integrated, historised data originating from heterogeneous sources which...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2013

    Security Issues and Challenges - Cloud Computing

    Cloud computing is in its preliminary stages when the authors respect to its implementation & usage. The reason for this is that the technology is heavily dependent on the high-tech resources that the academicians and researchers find it practically impossible to analyze & test the technology. The basis of the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2013

    Security in Electronic Business

    A crucial area of electronic transactions is the domain of electronic commerce. Yet, a large number of people do not want to transact online as they are not sure of the level of security that the transaction would be provided by the site and the technology used by the sites....

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2013

    An Efficient and Secure Handover Protocol for IEEE 802.16m Networks

    Mobile WiMAX (Worldwide interoperability Microwave Access) requires the re-authentication of mobile stations as they change from one base station to another. IEEE 802.16e uses the Extensible Authentication Protocol (EAP) for authentication and key management. This requires about 1000 ms, therefore, it could not support mobile WiMAX applications such as video...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2013

    IT-Infrastructure of University Based on Cloud Computing

    In this paper, the authors devoted to the organization of e-education environment of the university based on cloud computing. Cloud services and one of its components - a virtual work place introduce innovations in an education system. The introduction and the use of cloud services at the university will significantly...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2013

    Propose HMNIDS Hybrid Multilevel Network Intrusion Detection System

    In this paper, the authors present a proposal Hybrid Multilevel Network Intrusion Detection System (HMNIDS) which is a \"Hybrid Multilevel IDS\", is hybrid because use misuse and anomaly techniques in intrusion detection, and is multilevel since it applies the two detection techniques hierarchal in two levels. First level applies anomaly...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Effective Business Value of Bal Information System

    It has become increasingly difficult to ignore the importance of business value of information system. Over the past few years researchers have high lightened the need of information system in business field. More over individuals, organizations and countries are investing considerably in information system. It is widely observed that IS...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    How Workflow Systems Facilitate Business Process Reengineering and Improvement

    This paper investigates the relationship between workflow systems and business process reengineering and improvement. The study is based on a real case study at the \"Centre R?gional d'Investissement\" (CRI) of Marrakech, Morocco. The CRI is entrusted to coordinate various investment projects at the regional level. The authors' previous paper has...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Advanced SWOT Analysis of e-Commerce

    This research paper describes the invention and accessibility of internet connectivity and powerful online tools has resulted a new commerce era that is e-commerce, which has completely revolutionized the conventional concept of business. E-commerce deals with selling and purchasing of goods and services through internet and computer networks. E-commerce can...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    The Design of Statistic System in the Country Enterprise Based on SAS and GIS

    Statistics plays an important role in social and economic development. Traditional data collection is too laborious, time-consuming and ineffective. Its statistic is not correct and can't share the data. Aiming at the requirement for regional economy statistics of Pan Zhihua, this paper designed an analytical system based on regional economy...

    Provided By International Journal of Computer Science Issues

  • White Papers // Dec 2012

    Sales Forecasting Based on ERP System Through Delphi, Fuzzy Clustering and Back-Propagation Neural Networks with Adaptive Learning Rate

    Recent years, there has been a strong tendency by companies to use centralized management systems like Enterprise Resource Planning (ERP). ERP systems offer a comprehensive and simplified process managements and extensive functional coverage. Sales management module is an important element business management of ERP. This paper describes an intelligent hybrid...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    A Dynamic Load Balancing Algorithm in Computational Grid Using Fair Scheduling

    Grid Computing has emerged as an important new field focusing on resource sharing. One of the most challenging issues in Grid Computing is efficient scheduling of tasks. In this paper, the authors propose a Load balancing algorithm for fair scheduling, and they compare it to other scheduling schemes such as...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    A Cloud Computing Collaborative Architecture Model

    This paper present a model to execute long computational and other service in cloud computing that couldn't be executing in single computer system alone. While in all other existing cloud computing model users must pay cost for using cloud services this model is based on collaborative between each using system...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2011

    Choreography and Orchestration Using Business Process Execution Language for SOA with Web Services

    Web services using XML provide information to applications through an application oriented interface, so that it can be parsed and processed easily rather than being formatted for display. Web services combine the advantages of the component-oriented methods and web techniques. An orchestration process presents different services which can be composed...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Helpful Business Value of Advance Bal Information System

    It has become progressively more complicated to pay more attention to the significance of business value of information system in early days. Above the past few days researchers have high bleached the need of information system in business field. Almost every organization like electronics, textile, computer, etc is investing significantly...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Executive Enhance Business Value of BAL Information System

    It has become gradually more complex to give more attention to the importance of business value of information system in the early hours of time. Above the past few days researchers have high lightened the requirement of information system in business field. Almost every organization and industry like electronics, textile,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Telco Business Process Transformation Using Agile Lean Six Sigma and Frameworx Components: Focus on the Core Engineering Aspects with a Case Study

    The business transformation, a worldwide trend in many industries, is to improve the business performance in order to remain competitive in a challenging market. To accompany Telco industry in this trend, TM Forum issued Frameworx which addresses the key business aspects namely process, information, application and integration ones. The purpose...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    A Collective Intelligence Based Approach to Business-to-Business e-Marketplaces

    This paper describes a novel approach for addressing the issue of business-matching and recommending in business-to-business e-marketplaces. The presented matching system makes use of Collective Intelligence (CI) means for identifying and recommending business opportunities that are best correlated with the user's need. The objective from this approach is to shift...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2013

    A New Approach for Location Based Tracking

    Location tracking is becoming very popular in the modern era. It offers innovative applications in the market for mobile user. The technology is helpful for the parents who wants to be aware of where their children are. In this paper, a \"Localize intelligence algorithm\" is developed in the field of...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2013

    Privacy Preserving Data Mining: Case of Association Rules

    Data mining has become an important technology to discover a hidden and nontrivial knowledge from large amounts of data. A major problem is to achieve this discovery process with preserving privacy of extracted data and/or knowledge. Privacy Preserving Data Mining (PPDM) is a new area of research that studies the...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2013

    Capacity Crunch: Can Mosonets Offload Data Solve This

    Due to the increasing popularity of various applications for smart phones, 3G cellular networks are currently overloaded by mobile data traffic. Offloading mobile cellular network traffic through opportunistic communications is a promising solution to partially solve mobile data traffic, because there is no monetary cost for it. To solve this...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2013

    Customer Buying Behavior Analysis: A Clustered Closed Frequent Itemsets for Transactional Databases

    The problem in data mining applications is the mining of frequent patterns. Though there has been various techniques, such as pattern discovery, association rule mining etc, these methods generates a large volume of frequent patterns and rules which are not useful for finding the essential patterns among them, from the...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2013

    The Rumor Riding Anonymity Approach for Decentralized Peer to Peer Systems

    The anonymizing peer to peer system is frequently incurred additional expense in order to efficiency transfer and several systems execute to disguise the uniqueness privacy considerations issues for their users. Although, an anonymity technique mostly existing path base peer before transmits, it has pre-create an anonymous path. An information as...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2013

    Grid Security and Trust Management Overview

    Security is one of the most important aspects in all grid environments. Researchers and engineers developed many technologies and frameworks used to establish an environment, in which users can use grid capabilities in a secure manner. In traditional grid environments security is based on user authentication and authorization of user's...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2013

    Sensitivity Analysis of Cloud Under Transient Conditions

    Cloud computing is a new economic computing paradigm in which information and shared resources can be accessed from a web browser by customers. Clouds consists of a collection virtualized resources which includes both computational software and hardware facilities that can be provided to the customers based on demand. This on...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2013

    IAX-Based Peer-to-Peer VoIP Architecture

    Now-a-days, Voice over IP (VoIP) constitutes a privileged field of service innovation. One benefit of the VoIP technology is that it may be deployed using a centralized or a distributed architecture. The majority of today's VoIP systems are deployed using the client - server centralized architecture. One of the most...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2013

    Selection Criteria for Data Mining Software: A Study

    Now-a-days software are flooded in the market, there is a need for selection criteria of software package that should be available for individuals and organizations. As the number of software continues to grow and new features added to the new software the selection of the most suitable software package is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    Swarm Optimization Algorithm for Privacy Preserving in Data Mining

    Free competition in business can be compromised as data mining techniques reveal critical information about business transactions. Hence, there is a need to ensure prevention of disclosures both of confidential personal information which is contextually sensitive. Literature is abounding with state-of-the-art methods for privacy preserving Evolutionary Algorithms (EAs) that give...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    Predicting Customer Churn in Mobile Telephony Industry Using Probabilistic Classifiers in Data Mining

    Customer churn in the mobile telephony industry is a continuous problem owing to stiff competition, new technologies, low switching costs, deregulation by governments, among other factors. To address this issue, players in this industry must develop precise and reliable predictive models to identify the possible churners beforehand and then enlist...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    Parallel and Distributed Closed Regular Pattern Mining in Large Databases

    Due to huge increase in the records and dimensions of available databases pattern mining in large databases is a challenging problem. A good number of parallel and distributed FP mining algorithms have been proposed for large and distributed databases based on frequency of item set. Not only the frequency, regularity...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    Implementation of Data Privacy & Query Optimization in Data Providing Service Composition

    Data providing services allow query like access to organization's data via web services. The invocation of DP service results in the execution of a query over data sources. In most cases user's queries require the composition of several services. The RDF based query rewriting algorithm is used for DP services...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    An Empirical Evaluation of a Reuse Based Approach for ERP Customization

    One concern in ERP customization is the matching of ERP features with the organizations' requirements. An approach to achieve this more efficiently than with the traditional similarity measures consist in reusing generic domain knowledge. However, except for a case study, this claim has never been substantiated before. This paper reports...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    Odyssey of Data Security with a New Perception

    Maintaining the security of the data is one of the most important and critical task organizations are facing today. This is due to the fact that the data are accessed by both types of users; first, those users who are authorized to do so and who needs to access the...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    A Novel Advanced Heap Corruption and Security Method

    Heap security has been a major concern since the past two decades. Recently many methods have been proposed to secure heap i.e. to avoid heap overrun and attacks. The paper describes a method suggested to secure heap at the operating system level. Major emphasis is given to Solaris operating system's...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    A Study on Cyber Crimes and Protection

    Information technology has widened itself over the last two decades and has become the axis of today's global development. The world of internet provides every user all the required information and latest information making it the most valuable source of information. With the advancement of internet, the crime has also...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2011

    Vulnerabilities of Electronics Communication: Solution Mechanism Through Script

    World trade and related business ventures are more or less dependent on communication. Information content of communication is to be protected as miscommunication or incorrect information may ruin any business prospect. Communication using Internet or any other electronic communication is having various kinds of threat and vulnerability. Information should be...

    Provided By International Journal of Computer Science Issues