International Journal of Computer Science Issues

Displaying 521-560 of 926 results

  • White Papers // Mar 2012

    RGB Technique of Intrusion Detection in IEEE 802.11 Wireless Mesh Networks

    According to the growth rate of wireless technology, Wireless Mesh Network (WMN) usage is significantly increased according to its advantages like inexpensive, fast and easy deployment. WMN have ability, easy to create mesh and provide internet access in a cost efficient manner in any type of area which is unable...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    An Optical/Wireless Integrated Approach to Provide Multiple Gateways in Wireless Mesh Networks

    Wireless Mesh Network is an application technology different from the traditional peer-to-peer wireless bridge; it provides the multi-hop and multi-path connection to form a wireless environment of MESH framework so that the occurrence of single point failure can be prevented. WMNs are to provide high bandwidth broadband service to a...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    A New Efficient Approach for Peer-To-Peer File Searching in Mobile Ad-Hoc Network

    The file searching efficiency and scalable property based on P2P (Peer-To-Peer) can be increased by reduction of message overhead. A single hop cluster based P2P file searching protocol for MANET (Mobile Ad-hoc Networks) focusing mainly over the reduction of message overhead. The searching processes are maintained by intra and inter...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Maximising Wireless Sensor Network Life Time Through Cluster Head Selection Using Hit Sets

    The main aim of this paper is to propose a solution to improve the life time of the network by reducing the no of active nodes that participate in communication. Life time of a WSN is improved through optimizing communication and minimizing energy usage. One way of optimizing communication is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    A Power Efficient, Oblivious, Path-Diverse, Minimal Routing for Mesh-Based Networks-on-Chip

    One of the most trade-off aspects in the design of NoCs is the improvement of the network performance, in terms of throughput and latency, while minimizing power consumption. 2D-mesh has become the preferred topology, since it offers low and constant link delay. This paper proposes a Power efficient, Oblivious, Path-diverse,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Cryptographic Hash Functions: A Review

    Cryptographic Hash functions are used to achieve a number of security objectives. In this paper, the authors bring out the importance of hash functions, its various structures, design techniques, attacks and the progressive recent development in this field. Cryptographic techniques mainly encryption & decryptions have been used for centuries to...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Fuzzy Integrity Constraints for Native XML Database

    XML is gradually accepted as a standard for representing, accessing, and exchanging data in internet applications. It poses many new challenges to XML storage or XML repositories. The data centric approach of XML has necessitated the definition of integrity constraints for XML. Integrity constraints have proved fundamentally important in Relational...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Application Independent Energy Efficient Data Aggregation in Wireless Sensor Networks

    Wireless Sensor networks are dense networks of small, low-cost sensors, which collect and disseminate environmental data and thus facilitate monitoring and controlling of physical environment from remote locations with better accuracy. The major challenge is to achieve energy efficiency during the communication among the nodes. This paper aims at proposing...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Architecture of Wireless Network

    To allow for wireless communications among a specific geographic area, base stations of communication network must be deployed to allow sufficient radio coverage to every mobile users. The base stations, successively, must be linked to a central hub called the MSC (Mobile Switching Centre). The mobile switching centre allow connectivity...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Hybrid Routing Protocol for Wireless Sensor Networks

    Increasing network (WSN) lifetime is a challenge in routing protocol design for ad hoc network, especially in such a network each node (sensor) is powered by batteries, characterized ability calculation and limited storage. Hierarchical routing protocols are best known in regard to energy efficiency. By using a clustering technique hierarchical...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    A Novel Architecture for Collaborative Environments

    A novel architecture, called Cognitive Social Knowledge Grid, is introduced as a solution for collaborative environments. The CSKG performs information and knowledge operations through collaboration of agents and services in a service-oriented context. Its services and mechanisms have been described and relationship models of its components and services have been...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Intrusion Detection System Using Memtic Algorithm Supporting With Genetic and Decision Tree Algorithms

    This paper has proposed a technique of combining Decision Tree, Genetic Algorithm, DT-GA and Memtic algorithm to find more accurate models for fitting the behavior of network intrusion detection system. The authors simulate this sort of integrated algorithm and the results obtained with encouragement to further work. Computer networks are...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Low-Power and High Speed 128-Point Pipline FFT/IFFT Processor for OFDM Applications

    This paper represents low power and high speed 128-point pipelined Fast Fourier Transform (FFT) and its Inverse Fast Fourier Transform (IFFT) processor for OFDM. The Modified architecture also provides concept of ROM module and variable length support from 128~2048 point for FFT/IFFT for OFDM applications such as Digital Audio Broadcasting...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Network Anomalies Detection Using Statistical Technique : A Chi-Square Approach

    Intrusion Detection System is used to detect suspicious activities is one form of defense. However, the sheer size of the network logs makes human log analysis intractable. Furthermore, traditional intrusion detection methods based on pattern matching techniques cannot cope with the need for faster speed to manually update those patterns....

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    A Systematic Study of Requirement Volatility During Software Development Process

    The amount and complexity of software produced today stagger the imagination. Software development strategies have not kept pace with them. Today's software and system's engineers are facing an increasing number of challenges as they attempt to develop new products that are faster, having high quality and are rich in features....

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Evaluation of Joint Sleep and Idle Mode in IEEE 802.16e WIMAX

    As energy availability limits usage time for mobile devices, modern wireless systems implement Power Saving Mechanisms (PSMs). Determining optimal PSM parameters and switch points when applying all PSM mechanisms jointly in the same scenario is a trade-off between power savings and system performance degradation. This paper presents an unpublished performance...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Fuzzy Algorithm to Mitigate Risk in the Assignment of Roles in a Wireless Network

    This paper is presenting a method of defining a fuzzy membership function which helps in role assignment for wireless network. There is a risk involved in assigning roles dynamically as there can be a false negative or in other words an intruder is permitted into the system. The present proposal...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    PCLA: A New Public-Key Cryptosystem Based on Logarithmic Approach

    A public key cryptosystem is an asymmetric cryptosystem where the key consist of a public key and a private key. As the public key is public (known to all), can be used to encrypt the messages. The private key, kept as secret, can be used to decrypt the messages by...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    A Quantitative Measurement and Validation of Granularity in Service Oriented Architecture

    The prominent principle of designing service in Service Oriented Architecture is service granularity. The granularity is a crucial design decision. The service should be neither too coarse nor too fine grained. Therefore, it should be evaluated at the design phase itself to measure its level of appropriateness. This paper proposes...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Stimulating Cooperation in Mobile Ad Hoc Networks Using Cut Diamond With Diamond Method

    In recent years, mobile ad-hoc networks have become very popular because of their widespread usage. Cooperation among the nodes in adhoc networks is an important issue for communication to be possible. But some nodes do not cooperate in communication and saves their energy. These nodes are called as selfish nodes....

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Fast Energy-Efficient Secure Dynamic Address Routing for Scalable WSNs

    Secure Routing is one of the important issues in wireless sensor networks. A number of approaches have been proposed for secure routing in wireless sensor networks, but there is a lack of sufficient support for quick &secure routing in large-scale sensor networks. The authors consider the dynamic address routing for...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Integration of Chaotic Sequences Uniformly Distributed in a New Image Encryption Algorithm

    In this paper, the authors propose a new chaotic secret key cryptosystem, adapted for image encryption in continuous mode, which is based on the use of two one-dimensional discrete chaotic systems: Bernoulli map and Tent map. The pseudorandom sequences generated by the two maps are characterized by independence of their...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Identifying Data Integrity in the Cloud Storage

    In cloud computing, data is moved to a remotely located cloud server. Cloud faithfully stores the data and return back to the owner whenever needed. But there is no guarantee that data stored in the cloud is secured and not altered by the cloud or Third Party Auditor (TPA). In...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    A Framework for Outdoor Mobile Augmented Reality

    Augmented Reality (AR) presents a particularly powerful User Interface (UI) to context-aware computing environments. AR systems integrate virtual information into a person's physical environment so that he or she can get the latest information about the environment. In a limited mobile platform, the authors propose a framework for outdoor augmented...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Secure and Compressed Secret Writing Using DES and DEFLATE Algorithm

    A new secret writing using DES and DEFLATE algorithm is explored by improving the previous attempts in this sense in terms of security and compression. A Matching Pursuit algorithm using redundant basis decomposition technique is used to securely hide a message. The stability and computational complexity problems are solved by...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Comparative Study of CDMA and OFDM in WI-FI

    There have been extensive research efforts on simulating Wireless Local Area Networks. Many papers have studied the performance of IEEE 802.11 WLANs by using simulation under different channels and for different modulations. In this paper, the authors first simulate a simplified IEEE 802.11a standard based on Orthogonal Frequency Division Multiplexing...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    QoS-Aware SINR-Based Call Blocking Evaluation in Cellular Networks With 3G Interface

    A Quality of Service (QoS)-aware Signal to Interference and Noise Ratio (SINR)-based blocking probability model is simulated in this paper to evaluate the performance of networks with Third Generation (3G) interface. But this in turn yields an increased blocking probability and reduces the spectral efficiency. In this paper, the authors...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Qos-Based Rate Allocation in Wireless Mesh Networks

    In this paper, the authors present a centralized algorithm for QoS based rate allocation in wireless mesh networks. The main objective is to find approach that also satisfy user-specified QoS constraints, specifically with respect to rate and delay demands. Their approach provides higher priority to real-time flows than elastic flows...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Mobile Node for Wireless Sensor Network to Detect Landmines

    Individual sensor nodes are low power devices which integrate computing, wireless communication and sensing capabilities to detect land mine. Such multiple nodes collectively form wireless sensor network. To detect landmine in ground surface, sensor node that able to sense the mine and to process the information locally are mounted on...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Energy Aware Reliable Routing Protocol (EARRP) for Mobile Ad Hoc Networks Using Bee Foraging Behavior and Ant Colony Optimization

    Energy aware reliable routing in mobile ad hoc networks is an astonishing task and in this paper, the authors propose to design, develop such protocol which will be a good solution. For developing such protocol EARRP, two swarm intelligence techniques are involved namely ant colony optimization and bee colony foraging...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    CDMA Based Interconnect Mechanism for SOPC

    The Network-on-Chip (NoC) designs consisting of large pack of Intellectual Property (IP) blocks (cores) on the same silicon die is becoming technically possible nowadays. But, the communication between the IP Cores is the main issue in recent years. This paper presents the design of a Code Division Multiple Access (CDMA)...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Energy-Aware Task Partitioning on Heterogeneous Multiprocessor Platforms

    Efficient task partitioning plays a crucial role in achieving high performance at multiprocessor platforms. This paper addresses the problem of energy-aware static partitioning of periodic real-time tasks on heterogeneous multiprocessor platforms. A Particle Swarm Optimization variant based on Min-min technique for task partitioning is proposed. The proposed approach aims to...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    An Efficient Clustered Multipath Routing to Improve Lifespan in WSN

    A wireless sensor network with a large number of tiny sensor nodes can be used as an effective way for gathering data in various environments. One of the significant challenges in the wireless sensor network is the energy saving and increasing the lifetime of the network. In order to increase...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Fast and Accurate Practical Positioning Method Using Enhanced-Lateration Technique and Adaptive Propagation Model in GSM Mode

    In this paper, the authors consider problem of positioning of mobile phones, different approaches were produced for these targets using GPS, WiFi, GSM, UMTS and other sensors, which exist in today smart phone sensors. Location awareness in general is emerging a tremendous interest in different fields and scopes. Position is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Fortification of Transport Layer Security Protocol With Hashed Fingerprint Identity Parameter

    Identity over the public links becomes quiet complex as Client and Server needs proper access rights with authentication. For determining clients identity with password Secured Shell Protocol or Public Key Infrastructure is deployed by various organizations. For end to end transport security SSL (Secured Socket Layer) is the de facto...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Traceability Method for Software Engineering Documentation

    Traceability has been widely discussed in research area. It has been one of interest topic to be research in software engineering. Traceability in software documentation is one of the interesting topics to be research further. It is important in software documentation to trace out the flow or process in all...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Performance Analysis of Receivers in WDM for Extended Reach Passive Optical Networks

    In this paper, the authors have investigated and analyzed the performance of receivers for different classes of WDM PON system for next generation Passive Optical Networks. The performance is analyzed using Manchester coding for different receivers using various data rates and various fibre distances at the optical network unit in...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Recycling RF Energy in the GSM-1800 Band

    In this paper, the authors present a study about the recuperation and the wireless transfer of the RF micro-energy in the waveband 1800 MHz -1900MHz. The extension of the telecommunication systems increasingly generates the electromagnetic waves in their environment at various frequencies and powers. This existing energy RF can be...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    A Survey Paper on Ant Colony Optimization Routing Algorithm for Selecting Multiple Feasible Paths for Packet Switched Networks

    ACO algorithms for datagram networks was given by Di Caro & Dorigo, in year 1996. Basic mechanisms in typical ACO routing algorithms is Ant-like agents are proactively generated at the nodes to find/check paths toward assigned destinations Ants move hop-by-hop according to a exploratory routing policy based on the local...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Transmitting Cryptographic Data Through Steganography

    Computers are being used worldwide. The internet connects the world as one. Cybercrime is a huge issue which can be resolved by some approaches. In this paper an approach is introduced to ensure the security of data. Steganography and cryptography are merged together in order to obtain a secure and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2011

    Object-Based Video Compression Using Neural Networks

    This paper presents a new object-based video compression approach. It consists on predicting video objects motions throughout the scene. Neural networks are used to carry out the prediction step. A multi-step - ahead prediction is performed to predict the video objects trajectories over the sequence. In order to reduce video...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Performance Evaluation of Fingerprint Identification Based on DCT and DWT Using Multiple Matching Techniques

    The fingerprint is a physiological trait used to identify a person. In this paper, Performance Evaluation of Fingerprint Identification based on DCT and DWT using Multiple Matching Techniques (FDDMM) is proposed. The fingerprint is segmented into four cells of each size 150240. The DCT is applied on each cell. The...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Implementation of Wireless Group Support System in Mobile Healthcare

    In Mobile healthcare service, Wireless Group Support System can assist physicians or nurses in improving the quality of care and saving valuable time for emergency patients. Medical practitioners (often nurses) collect various physiological signals, as well as subjective parameters. Physiological signals may include ECG, EEG, SpO2, temperature, continuous blood pressure...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    TBEE: Tier Based Energy Efficient Protocol Providing Sink and Source Mobility in Wireless Sensor Networks

    In resource constrained Wireless Sensor Networks (WSNs) it is important to utilize energy efficiently. Data dissemination is mainly responsible for the consumption of energy in Sensor Nodes (SNs). The data dissemination protocols for WSNs should reduce the energy consumption of the SNs. Sink and source mobility is the major challenge...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    A Synthetic Heuristic Algorithm for Independent Task Scheduling in Cloud Systems

    In this paper, the authors present a synthetic method based on genetic algorithm, for independent task scheduling in cloud computing systems. Task scheduling is a major issue in large-scale distributed systems that impresses on system performance. For some reasons such as heterogeneous and dynamic features in cloud environment, task scheduling...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    iAgile: A Tool for Database Generation Guided by Graphical User Interface

    The agile development of the database and software systems is highly productive activity; it reduces time consumed, cost and effort invested in project development, but many agile projects do not apply agile practices to database development and still consider it in a serial manner as heavy-weight methodologies exactly work, while...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Study of Reputation Based Defense Mechanism in Peer To Peer Live Streaming

    Peer-to-peer live video streaming systems are having more popularity as the information technology is advancing fast. Peer-to-peer live video streaming systems are like peer-to-peer file sharing system and they are also vulnerable to content pollution attack as file sharing. In this type of attack, the attacker mixes polluted or unnecessary...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Impact of Data Mining in Drought Monitoring

    This paper focuses on association rule mining and decision tree classification in the rainfall and temperature data. The authors have used Apriori association rule mining algorithm with data mining tool WEKA. They have to try to generate Association rules and decision tree model. Data mining is the process of discovering...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Developing an Intelligent User Interaction Development Engine

    This paper presents an Intelligent User Interaction Development (IUID) engine that helps to enhance the structure of the relational database by using artificial intelligence. The IUID consists of two phases, the first phase enhances the user database by comparing it with a well structured pre-defined database, and the second phase...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Operating System Performance Analyzer for Low-End Embedded Systems

    RTOS provides a number of services to an embedded system designs such as case management, memory management, and Resource Management to build a program. Choosing the best OS for an embedded system is based on the available OS for system designers and their previous knowledge and experience. This can cause...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Semantic Analysis of Energy Consumption for Estimating SLA Violation With Virtual Machine Provisioning Schema Using DVFS

    Energy consumption is one of the major expense in IT industry which has attracted the attentions of various data centers which deploys huge quantity of power supply. So attempt to reduce energy utilization is very prime concern in cloud computing as it supports various complex services obeying SLA. In this...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Symmetrical Dispersion Compensation for High Speed Optical Links

    In this paper, the performance of high speed optical fiber based network is analyzed by using Dispersion Compensating Module (DCM). The optimal operating condition of the DCM is obtained by considering dispersion management configurations for the symmetrical system i.e Pre-compensation & Post-compensation. The dispersion compensating fiber (DCF) is tested for...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Improvement the Flatness, Gain and Bandwidth of Cascaded Raman Amplifiers for Long- Haul UW-WDM Optical Communications Systems

    In the present paper, the problem of multi-pumping all Raman amplifier has been investigated to obtain a maximum flatness gain and increases the bandwidth of the cascaded Raman amplifiers over a wide range of optical signal wavelengths for long-haul Ultra-Wide Wavelength Division Multiplexing (UW-WDM) transmission systems due to multi-pumping wavelengths...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    A Robust Client Verification in Cloud Enabled m-Commerce Using Gaining Protocol

    The proposed system highlights a novel approach of exclusive verification process using gain protocol for ensuring security among both the parties (client-service provider) in m-commerce application with cloud enabled service. The proposed system is based on the potential to verify the clients with trusted hand held device depending on the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    HASoC for Developing a Software System

    The authors present an object-oriented development of a software system. The development is based on the customization of the life-cycle of a novel developing method called HASoC (Hardware And Software Objects on Chip). The development is presented in order to evaluate HASoC and establish a complete A-to-Z object-oriented teaching example...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Multimodal Biometric System Using Linear Discriminant Analysis For Improved Performance

    Essentially a biometric system is a pattern recognition system which recognizes a user by determining the authenticity of a specific anatomical or behavioral characteristic possessed by the user. With the ever increasing integration of computers and Internet into daily life style, it has become necessary to protect sensitive and personal...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Fuzzy Priority CPU Scheduling Algorithm

    There are several CPU scheduling algorithms like FCFS, SRTN,RR, priority etc. Scheduling decision of these algorithms are based on parameters which are assumed to be crisp. However, in many circumstances these parameters are vague. The vagueness of these parameters suggests that scheduler should use fuzzy logic in scheduling the jobs....

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Performance Comparison of Routing Protocols for Zigbee Wpan

    A Wireless Sensor Network (WSN) is ad hoc network. Each node in WSN will participate in routing process, based on the dynamic activity of the network connectivity. The peer-to-peer nature of wireless ad hoc networks makes them suitable for a variety of applications where coordinator can't be relied on, and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Digital Image Watermarking Algorithm Based on Wavelet Packet

    In this paper, a method for Digital Image Watermarking based on the modification of certain subband of the wavelet packet decomposition was presented. A key is used for wavelet bases selection, watermark generation and selection of blocks for embedding the watermark bits. To efficiently embed the watermark within the images...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Operating System Based Analysis of Security Tools for Detecting Suspicious Events in Network Traffic

    Computer networks have important role regarding communication between the machines. Providing finite number of connections could be a little difficult to secure every connection from security hazards. Researchers have proposed many solutions for possible security hazards and known attacks but unfortunately it does not provide consolation up to satisfactory extents....

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    A Comparison Between Data Mining Prediction Algorithms for Fault Detection (Case Study: Ahanpishegan co.)

    In the current competitive world, industrial companies seek to manufacture products of higher quality which can be achieved by increasing reliability, maintainability and thus the availability of products. On the other hand, improvement in products life-cycle is necessary for achieving high reliability. Typically, maintenance activities are aimed to reduce failures...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    A Comprehensive Performance Analysis of Proactive, Reactive and Hybrid MANETs Routing Protocols

    A Mobile Ad-hoc NETwork (MANET) is a dynamic multi hop wireless network established by a group of nodes in which there is no central administration. Due to mobility of nodes and dynamic network topology, the routing is one of the most important challenges in ad-hoc networks. Several routing algorithms for...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    A PKI-Based Track and Trace Network for Cross-Boundary Container Security

    Challenges in container management, such as theft of products, cross-border smuggling, long checking time in processes of customs clearance and unable to track locations of products in real time, are currently faced by supply chain parties. In recent year, Electronic Seal (e-Seal) technology is introduced to protect containers in a...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    A Conceptual Framework of Knowledge Transfer in Malaysia E-Government IT Outsourcing: An Integration With Transactive Memory System (TMS)

    Despite extensive research on knowledge transfer issues, there is a dearth of research that has explicitly focused on the role of Transactive Memory System (TMS) in enabling inter-organizational knowledge transfer in e-government IT outsourcing. Although the information systems literature has recently acknowledged the role of TMS in improving knowledge processes,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    Minutiae Extraction From Fingerprint Images - A Review

    Fingerprints are the oldest and most widely used form of biometric identification. Everyone is known to have unique, immutable fingerprints. As most Automatic Fingerprint Recognition Systems are based on local ridge features known as minutiae, marking minutiae accurately and rejecting false ones is very important. However, fingerprint images get degraded...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    A Metric for Measuring Degree of Service Cohesion in Service Oriented Designs

    Service Orientation has gained momentum as a fundamental design paradigm for developing distributed enterprise applications. However, comprehensive and quantitative metrics for estimating the appropriateness of the service designs are still lacking. One of the quality attributes as to a SOA is cohesion, which is a determining factor for many other...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    Graph Based E-Government Web Service Composition

    Nowadays, e-government has emerged as a government policy to improve the quality and efficiency of public administrations. By exploiting the potential of new information and communication technologies, government agencies are providing a wide spectrum of online services. These services are composed of several web services that comply with well defined...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    3D Model Classification and Retrieval Based on Semantic and Ontology

    Classifying 3D models into classes is an important step in 3D model retrieval process. However, most classification system does not include semantic information. In this paper, a new method has been proposed to classify and to retrieve 3D model using semantic concepts and ontology. First, the authors use the machine...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    Web Services Non-Functional Classification to Enhance Discovery Speed

    Recently, the use and deployment of web services has dramatically increased. This is due to the easiness, interoperability, and flexibility that web services offer to the software systems, which other software structures don't support or support poorly. Web services discovery became more important and research conducted in this area became...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    Specification and Verification of Uplink Framework for Application of Software Engineering Using RM-ODP

    An Architectural Framework for Wireless Mobile has been proposed. This Architectural Framework will allow Uplink to be used in any wireless environment, as required, to provide any type of services demanded by the user regardless whether the uplink is a stand alone, a pure Wireless sensor network or integrated with...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    3D Graphical User Interface on Personal Computer Using p5 Data Glove

    This paper presents Essential Reality works on 3D HCI for changing 2D visual to 3D visual. The mouse is the critical interface to handle 3D graphical objects. Using data glove it's possible to put it on like a normal glove and it then acts as an input device that senses...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    Mingling Multipath Routing With Quality Of Service

    The QoS issue in the Internet have become essential for the successful transmission of multimedia applications. The basic problem of QoS routing is to find a path satisfying multiple constraints. It is concerned with identifying the path that will consider multiple parameters like bandwidth, delay, cost, hopcount etc. instead of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    Dynamic Reputation Based Trust Management Using Neural Network Approach

    Multi-agent systems like Peer-To-Peer (P2P) Networks employ scalable mechanisms that allow anyone to offer content and services to other system users. The open accessibility of these networks makes them vulnerable to malicious users wishing to poison the system. This paper proposed a novel trust and reputation system, using RBF artificial...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    A Subnet Based Intrusion Detection Scheme for Tracking down the Origin of Man-In-The-Middle Attack

    The Address Resolution Protocol (ARP), has proved to work well under regular circumstances, but it is not equipped to cope with malicious hosts. Several methods to mitigate, detect and prevent these attacks do exist for the gateways/routers and nodes. This paper is focused towards developing the authors' own tailor made...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    Amalgamation of Automated Testing and Data Mining : A Novel Approach in Software Testing

    Software engineering comprehends several disciplines devoted to prevent and remedy malfunctions and to warrant adequate behavior. Testing is a widespread validation approach in industry, but it is still largely ad hoc, expensive, and unpredictably effective. In today's industry, the design of software tests is mostly based on the testers' expertise,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    Evaluation Of Scheduling And Load Balancing Techniques in Mobile Grid Architecture

    Recent advances in mobile communications and computing are strong interest of the scientific community in the Grid have led to research into the Mobile Grid. Based on a realistic Mobile Grid architecture the authors formulate the problem of job scheduling and load balancing techniques in a mobile environment and performance...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    Energy Aware Adaptive Image Transmission Scheme with Data Authentication in Wireless Sensor Networks

    Wireless Multimedia Sensor Networks (WMSNs) are gaining research interest due to the availability of low-cost cameras and CMOS image sensors, also due to their broad application opportunities. The energy and resource constrained environment of WMSNs calls for low complexity energy aware image authentication and transmission schemes with minimal overheads. The...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Dynamic Tracking Protocol for Maneuvering Targets in Sensor Network

    Target tracking is one of the most important applications in Wireless Sensor Networks (WSNs). Energy efficiency is one of the most important design goals for target tracking. The authors propose and evaluate a distributed, energy-efficient, light-weight framework dynamic clustering algorithm for target localization and tracking in wireless sensor networks. Since...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Achieving Load Balance by Separating IP Address Spaces

    In this paper, the authors propose a load balance approach by separating the host and router IP addresses into two spaces. In addition, in their approach, they propose a scheduling algorithm, named Edge Stream Balance (ESB), which is used by the proposed multipath routing scheme based on the address space...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Intelligent communication of WSN based on a multi-agent system

    The Wireless Sensor Network (WSN) consists of a large number of sensor nodes with limited batteries, which are deployed randomly over an area to collect data. Therefore, it is important to minimize energy consumption of each node, which leads to the extension of the life of the network. As many...

    Provided By International Journal of Computer Science Issues