International Journal of Computer Science Issues

Displaying 441-480 of 879 results

  • White Papers // Jul 2012

    An Empirical Framework To Detect Security Attacks On the Cloud Data Storage System

    Providing an adequate security level in Cloud Environments is currently a particularly active analysis space. A lot of specifically, malicious behaviors targeting massive scale Cloud knowledge repositories (e.g. Denial of Service attacks) could drastically degrade the general performance of such systems and can't be detected by typical authentication mechanisms. In...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jun 2012

    Security and Privacy of Electronic Banking

    The internet has played a key role in changing how the authors interact with other people and how they do business today. As a result of the internet, electronic commerce has emerged, allowing business to more effectively interact with their customers and other corporations inside and outside their industries. One...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    An Enhanced Evaluation Model for Vertical Handover Algorithm in Heterogeneous Networks

    The vertical handover decision is considered an NP-Hard problem. For that reason, a large variety of Vertical Handoff Algorithms (VHA) have been proposed to help the user to select dynamically the best access network in terms of Quality of Service (QoS). The objective of this paper is to provide a...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    Analysis of Cell Planning and Link Budgeting in WiMAX Communication

    This paper is related with the WiMAX (Worldwide Interoperatibility for Microwave Access) technology. Today, different types of cellular networks are actively working on the radio links. For instance, the Global System for Mobile Communication (GSM) is being used in nearly all of the countries of the world and currently it...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    I-PRE: Improved Proxy Re-Encryption Scheme for VANET

    Vehicular Ad hoc NETwork (VANET) is a network of self organized vehicles and road-side infrastructure communicating with each other over wireless, with a view to improve traffic safety and efficiency. Data interchanged over VANETs often play a vital role in traffic safety. Such information must be accurate and truthful, as...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    A Comparison Among Accuracy of KNN, PNN, KNCN, DANN and NFL

    In this paper, it is tried to implement classifying methods on some given data files and compare the results together in different cases with different parameters. First of all, the authors have a pre-processing step, data normalizing and then the chosen methods are K-Nearest Neighbor (KNN), Probabilistic Neural Network (PNN),...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    Routing Strategy for Data Transfer of Varying Packet Sizes in Virtual Private Networks

    The paper evolves a data transfer mechanism, with a view to arrive at the best performance in the minimum bandwidth path of a wired Virtual Private Network (VPN). It orients to establish a service similar to that of a private dedicated network with leased lines for the endpoints of the...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    Iris Image Quality Assessment for Biometric Application

    Image quality assessment plays an important role in the performance of biometric system involving iris images. Data quality assessment is a key issue in order to broaden the applicability of iris biometrics to unconstrained imaging conditions. In this paper, the authors have proposed the quality factors of individual iris images...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    A Web Services based Approach for Resource-Constrained Wireless Sensor Networks

    The large diffusion of Wireless Sensor Networks (WSNs) in the people contemporary life with their numerous applications has led to a huge heterogeneity. This heterogeneity makes the possibility of discovering and collecting data from the wireless sensors more and more difficult. Indeed, WSNs are currently developed around different communities of...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    Improving Quality of VoIP over WiMAX

    Real-time services such as VoIP are becoming popular and are major revenue earners for network service providers. These services are no longer confined to the wired domain and are being extended over wireless networks. Although some of the existing wireless technologies can support some low-bandwidth applications, the bandwidth demands of...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    Channel Reservation Model for User Class Based Admission Control in Next Generation Wireless Networks

    The Next Generation Wireless Networks (NGWN) are expected to offer abundant services to its users. Guaranteeing the agreed upon Quality of Service (QoS), while trying to maximize the revenue of the network operators by having more number of users in the system is a challenging problem. Call Admission Control (CAC)...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    Improvement in Medium Access Control Protocol Based on New Contention Scheme for Wireless Ad Hoc Network

    In todays wireless networks, stations using the IEEE 802.11 standard contend for the channel using the Distributed Coordination Function (DCF). Research has shown that DCF's performance degrades especially with the large number of stations. This becomes more concerning due to the increasing proliferation of wireless devices. In this paper, the...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    CMQ: Clustering Based Multipath Routing Algorithm to Improving QoS in Wireless Sensor Networks

    Multi-path is favorite alternative for sensor networks, as it provides an easy mechanism to distribute traffic and balance network's load, as well as considerate fault tolerance. For this purpose, a new clustering based multi path routing protocol namely CMQ is proposed in this paper, which guarantees achieve to required QoS...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    Fuzzy-Logic Based Probabilistic Broadcasting Technique for Mobile Adhoc Networks

    Broadcasting also called as flooding is one of the earliest research interests in mobile Ad hoc networking. The main objective of broadcasting scheme is to avoid broadcast storm problem, provide good network performance and scalability. Existing probabilistic scheme consider only one parameter such as network density, node location or counter...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    Dual Amplitude-Width Pulse Interval Modulation for Optical Wireless Communications

    In this paper, a new modified digital pulse interval modulation called Dual Amplitude-Width Pulse Interval Modulation (DAWPIM) is presented, on the basis of Pulse Amplitude Modulation (PAM) and Pulse Width Modulation (PWM), and its properties are presented. After introducing symbol structure, data rate improvement, average normalized power requirement and bandwidth...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    Identity-based Trusted Authentication in Wireless Sensor Networks

    Secure communication mechanisms in Wireless Sensor Networks (WSNs) have been widely deployed to ensure confidentiality, authenticity and integrity of the nodes and data. Recently many WSNs applications rely on trusted communication to ensure large user acceptance. Indeed, the trusted relationship thus far can only be achieved through Trust Management System...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    An Multiple Pheromone Algorithm for Cloud Scheduling With Various QOS Requirements

    The Cloud computing is one of the rapidly improving technologies. Cloud computing is a new promising paradigm in distributed and parallel computing. As cloud-based services become more dynamic, resource provisioning becomes more challenging. One of the critical problems in cloud computing is job scheduling because it increases with the size...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    Real-time FPGA-based Non-Cryptography System for Wireless Network

    Traditional privacy techniques for wireless communications are facing great challenges, due to the open radio propagation environment and limited options of transmission techniques. A new bilateral pilot aided protocol is presented, with single-tone based burst transmission over slow time varying flat fading wireless channels, and is investigated to enhance the...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    An Intelligent Approach to Query Processing in Peer to Peer Networks

    Peer-to-peer systems are mainly used for object sharing and file sharing, but they can provide the infrastructure for many other applications. These systems need an algorithm to evaluate the queries efficiently so that the best of the results can be achieved in data sharing and message passing. The delay in...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    Performance Evaluation of Ant-Based Routing Protocols for Wireless Sensor Networks

    High efficient routing is an important issue in the design of limited energy resource Wireless Sensor Networks (WSNs). Due to the characteristic of the environment at which the sensor node is to operate, coupled with severe resources; on-board energy, transmission power, processing capability, and storage limitations, prompt for careful resource...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    QoS based Analysis of Proxied Adaptive Gateway Discovery Scheme for Mobile Ad hoc Networks

    One of the most important aspects a effecting the overall QoS performance of hybrid mobile ad hoc networks is the efficient discovery of Internet gateways. So many previous papers addressed the problem of interconnecting Mobile Ad Hoc Networks (MANET) to the Internet, via one or more attachment points called gateways....

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    Power Optimization Techniques in Wireless Sensor Network by using Packet Profile based Scheme

    A Network of complex sensor nodes equipped with limited sensing, computing, and radio communication capabilities is called a Wireless Sensor Network (WSN). The sensed data must be gathered and transmitted to a base station where it is further processed for end-user queries. Since the network consists of low-cost nodes with...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    Mobile Devices on IP Internetworks

    Due to advances in miniaturization, Mobile computing has greatly increased in popularity over the past years. Today the users can get in a notebook PC or even a hand-held computer the power that once required a massive machine. Wireless LAN technologies help a device to easily move from one place...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    Cache Replacement Policies for Cooperative Caching in Mobile Ad hoc Networks

    Cooperative caching is a technique used in mobile Ad hoc networks to improve the efficiency of information access by reducing the access latency and bandwidth usage. Cache replacement policy plays a significant role in response time reduction by selecting suitable subset of items for eviction from the cache. In this...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    Implementation of Energy Balancing in Wireless Sensor Networks

    In Wireless Sensor Networks (WSN), energy is a very precious resource for sensor nodes and communication overhead is to be minimized. So energy is an extremely critical resource for this type of battery-powered based Wireless Sensor Networks (WSN), and thus making energy-efficient smart protocol design is a key challenging problem....

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    A Semantically Enhanced Searching Framework to Discover the Sensor Web Services for Wireless Sensor Network

    The semantic based sensor service discovery is proposed to enhance the discovery of sensor services. The authors know web is one of the best medium connecting the service providers with their clients. Wireless sensor service generates a large number of heterogeneous raw data, so it's a big challenge now-a-days to...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    Distributed Data Mining by Associated Rules: Improvement of the Count Distribution Algorithm

    Today, most large systems are overwhelmed by a flood of data that is stored daily in databases distributed. It is in this context that the distributed data mining is used by offering many parallel and distributed algorithms to extract crucial information. Among the most popular techniques, the authors are interested...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    A Novel Advanced Heap Corruption and Security Method

    Heap security has been a major concern since the past two decades. Recently many methods have been proposed to secure heap i.e. to avoid heap overrun and attacks. The paper describes a method suggested to secure heap at the operating system level. Major emphasis is given to Solaris operating system's...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    Odyssey of Data Security with a New Perception

    Maintaining the security of the data is one of the most important and critical task organizations are facing today. This is due to the fact that the data are accessed by both types of users; first, those users who are authorized to do so and who needs to access the...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    An Empirical Evaluation of a Reuse Based Approach for ERP Customization

    One concern in ERP customization is the matching of ERP features with the organizations' requirements. An approach to achieve this more efficiently than with the traditional similarity measures consist in reusing generic domain knowledge. However, except for a case study, this claim has never been substantiated before. This paper reports...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    A Cloud Computing Collaborative Architecture Model

    This paper present a model to execute long computational and other service in cloud computing that couldn't be executing in single computer system alone. While in all other existing cloud computing model users must pay cost for using cloud services this model is based on collaborative between each using system...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    A Conceptual Framework to Analyze Enterprise Business Solutions From a Software Architecture Perspective

    The architectural aspects of software systems are not always explicitly exposed to customers when a product is presented to them by software vendors. Therefore, customers might be put at a major risk if new emerging business needs come to light that require modification of some of the core business processes...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    Presenting New Solution Based on Business Architecture for Enterprise Architecture

    Due to software production dominance development among all structures and information exchange growth among systems, Utilizing a suitable method for correct connection among information systems is important and worth to consider. At first look, work dependence to technology was more than business because of production variety. As business processes have...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    A New Mechanism for Mutual Authentication In SIP

    The greatest threat in the new generation network which is called NGN is unsafe authentication. Communication between new servers in NGN world is done based on Session Initiation Protocol (SIP). SIP is an application-layer control operating on top of a transport protocol which allows creating, modifying, and terminating sessions among...

    Provided By International Journal of Computer Science Issues

  • White Papers // Apr 2012

    Domain Ontology and Multi-Criteria Analysis for Enterprise Modeling

    TKnowing that an enterprise is a complex reality, it is necessary to develop a modeling framework allowing the description of system structure and dynamics that alter the structure. The concept of enterprise modeling addresses this need and many techniques have emerged. The authors' goal is to provide leaders of Algerian...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Implementing an Expert Diagnostic Assistance System for Car Failure and Malfunction

    Applications in fault diagnosis are continuously being implemented to serve different sectors. Car failure detection is a sequence of diagnostic processes that necessitates the deployment of expertise. The Expert System (ES) is one of the leading Artificial Intelligence (AI) techniques that have been adopted to handle such task. This paper...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Performance Analysis of Various Routing Protocols for Motorway Surveillance System Cameras' Network

    The Motorway Surveillance System (MSS) is one of the most important technologies used to collect information about road conditions and then provide that collected information to motorway users. The routing in networks used by these systems is a critical task due to the highly dynamic environments. This paper presents performance...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    An Analysis of Internet Banking Security of Foreign Subsidiary Banks in Australia: A Customer Perspective

    Internet banking has been deployed more frequently over the past few decades to support and improve the operational and managerial performance within the banking industry. However, the security issues of confidentiality, integrity and privacy have become increasingly more serious concerns in Internet banking systems because of the potential negative impact...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Improving Accuracy of Authentication Process Via Short Free Text Using Bayesian Network

    The internet security problems are a crucial threat to all users in the cyber world. One of the important problems about internet security concerned with user classification and authentication. However, there are multiple components to classify and authenticate users. The first one is using username/password and the second method is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Survey of NoC and Programming Models Proposals for MPSoC

    The aim of this paper is to give briefing of the concept of network-on-chip and programming model topics on multiprocessors System-on-Chip world, an attractive and relatively new field for academia. Numerous proposals from academia and industry are selected to highlight the evolution of the implementation approaches both on NoC proposals...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    A Goal Question Metric Approach for Evaluating Security in a Service Oriented Architecture Context

    For interactions to be possible within the Service Oriented Architecture (SOA) ecosystem, each actor must be enough confident of other actors to engage safely in the interactions. Therefore, the establishing of objective metrics tailored to the context of SOA that show security of a system and lead to enhancements is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Evaluating on Performance of Single-Source Single-Relay SR-CARQ Protocol in TDMA Networks With Raleigh Fading

    This paper analyzes the performance of single-source and single-relay SR-CARQ protocol in TDMA wireless communication system. The authors establish its M/G/1 queuing model with vacations, and provide the expressions of its system time delay and saturation throughput. Then the analysis of theory and simulation results under the slow Raleigh fading...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    An Efficient Collision Detection Scheme for Generation-2 RFID Systems

    In Radio-Frequency IDentification (RFID) systems, tag collision resolution is a significant issue for fast tag identification. Dynamic Framed Slotted ALOHA (DFSA) is one of the most widely used algorithms to resolve tag collision. Collision Detection (CD) plays an important role in determining the efficiency of DFSA-based algorithms because most DFSA-based...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Formalized Security Model of Identity-Based Multi-Proxy Signature

    Multi-proxy signature is an extension of the primitive basic proxy signature. In a multi-proxy signature scheme, an original signer could delegate his signing rights to a group of proxy signers. And only the cooperation of all the proxy signers can generate the proxy signature on behalf of the original signer....

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    An Agent Oriented Information System: An MDA Based Development

    Information Systems (IS) development should not only accomplish functional models but also conceptual models to represent the organizational environment in which it will have to evolve and must be aligned with strategic objectives. Generally, a significant innovations in the enterprise, is to organize its IS around its business processes. Otherwise,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Study on Cloud Computing Resource Scheduling Strategy Based on the Ant Colony Optimization Algorithm

    In order to replace the traditional Internet software usage patterns and enterprise management mode, this paper proposes a new business calculation mode-cloud computing, resources scheduling strategy is the key technology in cloud computing, Based on the study of cloud computing system structure and the mode of operation, The key research...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Improving Handover Performance in Wireless Mobile Networks

    In this paper, the authors propose an enhanced packet scheduling scheme to favour UEs that experienced HandOver (HO) in wireless mobile networks. The main idea of the proposed scheme is not only prioritized the HO connections at the CAC level but also prioritized the HO connections at the scheduler level....

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Urban Data Collector Protocol: Performance Evaluation With Different Suppression Techniques

    This research was aimed at using Vehicular Adhoc NETworks (VANET) as infra-structure for an urban cyber-physical system in order to gather valuable data in a city. This paper is proposed an Urban Data Collector (UDC) protocol in urban area where all nodes are data sources and there is a gateway...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    A Lossless Data Hiding Technique Based on AES-DWT

    In this paper, the authors propose a new data hiding technique. The new technique uses steganography and cryptography on images with a size of 256x256 pixels and an 8-bit grayscale format. There are design restrictions such as a fixed-size cover image, and reconstruction without error of the hidden image. The...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Designing a High Efficiency Pulse Width Modulation Step-Down DC/DC Converter for Mobile Phone Applications

    This paper presents the design and analysis of a high efficiency, PWM (Pulse-Width-Modulation) Buck converters for mobile phone applications. The steady-state and average-value models for the proposed converter are developed and simulated. A practical design approach which aims at systematizing the procedure for the selection of the control parameters is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    A Semi-Structured Tailoring-Driven Approach for ERP Selection

    It has been widely reported that selecting an inappropriate system is a major reason for ERP implementation failures. The selection of an ERP system is therefore critical. While the number of papers related to ERP implementation is substantial, ERP evaluation and selection approaches have received few attention. Motivated by the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Performance Optimization through Channel Profiling in Cognitive Sensor Networks

    Cognitive Radio (CR) is an important future wireless radio access technology having the potential to solve the spectrum scarcity and under-utilization problems. Using CR however, poses new challenges for network nodes and architectures due to the inherent complexity of cognitive radio technology. In this paper, the authors propose a unique...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Mobile Application of Water Meter Recorder Based on Short Message Service Transmissions Using Windows Mobile Platform

    The rapid development of technology nowadays has major impact to the development of cellular technology. This development led to a new wide range of Smartphone. The growth of life now-a-days requires people to work more quickly, so that they can use the time more effective and increase the performance. The...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Splitting of Traffic to Maximize the Data Transmission in Mobile Ad Hoc Network Under Different Constraints

    Mobile Ad-hoc NETwork (MANET) is a set of wireless mobile computer forming a temporary network without any wired infrastructure, due to dynamic nature of topology and other constraints transmission routing is a challenging task in MANET. The splittable routing establishes multi paths between source nodes and destination nodes; this scheme...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Smart Dynamic Software Components Enabling Decision Support in Machine-to-Machine Networks

    The future Internet of Things will be extended by Machine-to-Machine communication technologies in order to include sensor information. The overwhelming amount of data will require autonomous decision making processes which are directly executed at the location where data is generated or measured. An intelligent sensor system needs to be able...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Research on the Model of Secure Transmission of SOAP Messages

    SOAP as the basis application of Web Services, and, SOAP messages are closely related to the heterogeneous Web services. Secure transmission of SOAP messages play a vital role for the applicability of Web Services. The main challenges to the secure transmission of SOAP messages includes: confidentiality, authentication, integrity, both-party non-repudiation,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    WiMAX Based Audio/Video Transmission

    In this paper, the authors present the idea of a WiMAX based audio/video transmission. The data transmitter will transmit an audio/video signal, which will be received by the receiver side. The hardware of the data transmitter consists of a CCD camera and audio mic. The CCD camera will capture the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    RFID Technology Based Attendance Management System

    RFID is a nascent technology, deeply rooted by its early developments in using radar as a harbinger of adversary planes during World War II. A plethora of industries have leveraged the benefits of RFID technology for enhancements in sectors like military, sports, security, airline, animal farms, healthcare and other areas....

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Multiple Servers - Queue Model for Agent Based Technology in Cache Consistence Maintenance of Mobile Environment

    Caching is one of the important techniques in mobile computing. In caching, frequently accessed data is stored in mobile clients to avoid network traffic and improve the performance in mobile computing. In a mobile computing environment, the number of mobile users increases and requests the server for any updation, but...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Energy Efficient Routing in Mobile Ad-hoc Networks for Healthcare Environments

    The modern and innovative medical applications based on wireless network are being developed in the commercial sectors as well as in research. The emerging wireless networks are rapidly becoming a fundamental part of medical solutions due to increasing accessibility for healthcare professionals/patients reducing healthcare costs. Discovering the routes among hosts...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Detection of Pulsing DoS Attacks at Their Source Networks

    Pulsing Denial of Service (PDoS) is a type of DoS attack. Its attacking behavior is intermittent rather than constant, which helps it avoid being detected. In this paper, an adaptive detection method is proposed for source-end detection of PDoS attacks. It has three distinctive features: its detection statistic is based...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Modeling of Multipath Transport

    In this paper, the authors propose a model for evaluating the transmission performance of multipath transport. Previous researches focused exclusively on single pair users in simple scenarios. The distinct perspective in this paper is to build models for analyzing the performance when multipath transport is used in the entire network...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Enhanced Intrusion Detection System for Input Validation Attacks in Web Application

    Internet continues to expand exponentially and access to the Internet become more prevalent in users daily life but at the same time web application are becoming most attractive targets for hacker and cyber criminals. This paper presents an enhanced intrusion detection system approach for detecting input validation attacks in the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    User Behavior Prediction based Adaptive Policy Pre-fetching Scheme for Efficient Network Management

    In recent years, network management is commonly regarded as an essential and promising function for managing and improving the security of network infrastructures. However, as networks get faster and network centric applications get more complex, there is still significant ongoing work addressing many challenges of the network management. Traditional passive...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    An Improved Interference Cancellation Scheme for Two- User MIMO-MAC

    Multiple-Input Multiple-Output (MIMO), which is one of the mandatory techniques for the next generation wireless communication systems, has the features of spatial multiplexing and spatial diversity. MIMO Multiple Access Channels (MAC) offers substantial capacity improvements and has attracted considerable research attention. There is serious co-channel interference over MIMO-MAC since multiple...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Ant-Crypto, A Cryptographer for Data Encryption Standard

    Swarm Intelligence and Evolutionary Techniques are attracting the cryptanalysts in the field of cryptography. This paper presents a novel swarm based attack called Ant-Crypto (Ant-Cryptographer) for the cryptanalysis of Data Encryption Standard (DES). Ant-Crypto is based on Binary Ant Colony Optimization (BACO) i.e. a binary search space based directed graph...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Applying Encryption Algorithm for Data Security and Privacy in Cloud Computing

    Cloud computing is the next big thing after internet in the field of information technology; some say it's a metaphor for internet. It is an Internet-based computing technology, in which software, shared recourses and information, are provided to consumers and devices on-demand, and as per users requirement on a pay...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Phishing Detection Taxonomy for Mobile Device

    Phishing is one of the social engineering attacks and currently hit on mobile devices. Based on security report by Lookout, 30% of Lookout users clicking on an unsafe link per year by using mobile device. Few phishing detection techniques have been applied on mobile device. However, review on phishing detection...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Optimization of IPv4 Packet's Headers

    The current IPv4 Packet's scheme has several fields to be carried and transmitted in each packet even if the source, the destination and the payload of the packets are same. These fields utilize packet space and thus decrease the size of user data. Therefore the processing of each packet requires...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    A Cooperative Spectrum Sensing Scheme Based on Trust and Fuzzy Logic for Cognitive Radio Sensor Networks

    In this paper, the authors propose a cooperative spectrum sensing scheme based on trust and fuzzy logic for Cognitive Radio Sensor Networks (CRSN). The CRSN nodes use the T-S fuzzy logic to make local decisions on the presence or absence of the Primary User's (PU) signal, and then use a...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    A Cross-Domain Authentication Protocol Based on ID

    In large distributed networks, many computers must be mutual coordination to complete some works under the certain conditions, these computers may come from different domains. For ensuring the safety to access resources among these computers in different domains, the authors propose a cross-domain union authentication scheme. They compute a large...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Job Scheduling Model for Cloud Computing Based on Multi- Objective Genetic Algorithm

    Cloud computing is an emerging high performance computing environment with a large scale, heterogeneous collection of autonomous systems and flexible computational architecture. To improve the overall performance of cloud computing, with the deadline constraint, a task scheduling model is established for reducing the system power consumption of cloud computing and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Using Chinese Natural Language Interfaces for Navigation in Mobile GIS

    The combination of "Voice technology" and "Mobile GIS", has greatly improved the intelligent degree of mobile GIS. Recently, significant attention in the field of scientific research is turning to how to realize quick conversion between natural language and GIS commands. However, the current paper mostly concentrates on rules of conversion...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    Secure and Effective P2P Reputation System using Trust Management and Self Certified Cryptographic Exchanges

    The main reason behind the success of Peer-To-Peer (P2P) networks is the anonymity and the utility offered by them to the users. The Client-server security policies implemented in centralized distributed systems do not provide a desirable solution for P2P networks to store peer reputation information. Though a centralized system does...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    General Approach for the Conservation Energy in Wireless Sensor Networks

    The Wireless Sensor Networks (WSN) typically consists of a large number of intelligent sensor nodes randomly deployed in an area of interest to supervise or monitor various phenomena (temperature, pressure, humidity. During these last years the research in wireless sensor networks has become a very rich field because of the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    Improved Mobile WiMax Image Privacy Using Novel Encryption Techniques

    Mobile WiMAX security standards from IEEE specify some powerful standards-based security controls, including PKMv2 EAP-based authentication and over-the-air AES-based encryption. But encryption technique does not guarantee a powerful secure end-to-end image transmission, and, consequently, WiMAX presents a range of security design and integration challenges. In this paper, two proposed chaos...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    AODV with Source Route Accumulation for improved Routing in WiMAX

    Worldwide Interoperability for Microwave Access (WiMAX) is a technology that bridges the gap between fixed and mobile access and offer the same subscriber experience for fixed and mobile user. Routing protocols for WiMAX mobile ad-hoc networks have to face the challenge of frequently changing topology, low transmission power, asymmetric links...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Traffic Analysis and Optimization of GSM Network

    Accurate traffic dimensioning plays an important role in telecommunications network planning and is particularly important for the performance analysis of mobile and wireless networks. The main goal of cellular operators now a day with the increasing number of mobile subscribers is to keep the subscribers satisfied with the delivered Quality...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Multiple Parameters Based Approach to Estimate Band Width in Mobile Ad Hoc Networks

    Mobile Ad-hoc NETwork (MANET) is a self-organized network where network is set up on the fly. Some of the issues in MANETs are routing, security, power management, bandwidth management, mobility management, etc. Correct estimation of the available bandwidth is one of the essential components for efficient network resource management and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Performance Analysis of Multicast Routing and Wavelength Assignment (MRWA) Protocol with Dynamic Traffic Grooming in WDM Networks

    The need for on-demand provisioning of wavelength routed channels with service differentiated offerings within the transport layer has become more essential due to the recent emergence of high bit rate IP network applications such as multimedia conferencing systems, video on demand systems, real-time control systems, etc. Diverse optical transport network...

    Provided By International Journal of Computer Science Issues