International Journal of Computer Science Issues

Displaying 601-640 of 782 results

  • White Papers // Nov 2011

    LR-WPAN Formation Topologies Using IEEE 802.15.4

    IEEE 802.15.4 protocols are gaining interests in both industrial and research fields as candidate technologies for (WPAN) Wireless Personal Area Networks, (WSN) Wireless Sensor Network and control Wireless Networks applications. This paper analyzes multiple topologies such as Cluster-Tree, Mesh and Star in various scenarios to compare different performance metrics (Throughput,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    QGRP: A Novel QoS-Geographic Routing Protocol for Multimedia Wireless Sensor Networks

    Multimedia Wireless Sensor Networks (MWSN) are forecast to become highly integrated into the people daily activities. Due to the carried content nature, mainly composed of images and/or video streams with high throughput and delay constraints, Quality of Service in the context of MWSN is a crucial issue. In this paper,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Conception and Use of Ontologies for Indexing and Searching by Semantic Contents of Video Courses

    Nowadays, the video documents like educational courses available on the web increases significantly. However, the information retrieval systems today can not return to the users (students or teachers) of parts of those videos that meet their exact needs expressed by a query consisting of semantic information. In this paper, the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    A Collaborative Algorithm for Ontological Matching in E-Learning Courseware Domain Knowledge Network

    Domain Knowledge is the content repository of a courseware system consisting of a series of learning objects. However, the unstructured and inconsistent naming of domain knowledge components does not permit knowledge transfer across diverse collaborative systems due to differences in architecture, format and representations. To address this identified problem, the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    A Review of Burst Scheduling Algorithm in WDM Optical Burst Switching Network

    Optical Burst Switching (OBS) has proved to be an efficient paradigm for supporting IP-over-WDM networks. The growth of a variety of applications which transmit voice, data, video and multimedia, has necessitated the need to provide Quality of Service (QoS) over OBS networks. One of the key factors in OBS is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Performance Analysis of Observation Based Cooperation Enforcement in Ad Hoc Networks

    Node misbehavior due to selfish or malicious behavior could significantly degrade the performance of MANET because most existing routing protocols in MANET aim to find the most efficient path. Overhearing and reputation based cooperation schemes have been used to detect and isolate the misbehaving nodes as well as to force...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Cross Layer Implementation of Key Establishment and Configuration Protocols in WSN

    Security in Wireless Sensor Networks (WSN) can be achieved by establishing shared keys among the neighbor sensor nodes to create secure communication links. The protocol to be used for such a pairwise key establishment is a key factor determining the energy to be consumed by each sensor node during the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Design of a New Model of Multiband Miniature Antenna Near Isotropic

    In this paper, the authors propose a new slotted multiband antennas simulated at different frequencies. The insertion of slots in the patch gives a good adapting frequency with various forms on the radiation pattern. The main feature of the proposed antenna is the capability to generate a near isotropic radiation...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Comparing Online Analytical Processing and Data Mining Tasks In Enterprise Resource Planning Systems

    Enterprise Resource Planning (ERP) is an environment which is often rich of data about the enterprise. Data warehouse online analytical processing techniques provided decision makers a set of useful tools to analyze report and graphically represent data of the ERP. It can be said that OLAP tools provides different summarized...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Improving Security Levels of IEEE 802.16e Authentication by Diffie-Hellman Method

    In this paper, the authors proposed an authentication method according to Diffie-Hellman. First, they introduce different methods for authentication in IEEE.802.16 then they proposed an authentication method according to Diffie-Hellman and in the last they compare different methods for authentication to improve security in IEEE802.16e. CPN is a useful for...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    PPNOCS: Performance and Power Network on Chip Simulator Based on SystemC

    As technology moves towards multi-core System-On-Chips (SoCs), Networks-on-Chip (NoCs) are emerging as the scalable fabric for interconnecting the cores. Network-on-Chip architectures have a wide variety of parameters that can be adapted to the designer's requirements. This paper proposes a Performance and Power Network On Chip simulator (PPNOCS) based on SystemC...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Strategical Modelling With Virtual Competition for Analyzing Behavior of Malicious Node in Mobile Adhoc Network to Prevent Decamping

    The proposed system highlights a novel approach of identifying dynamic misbehaviour of the malicious node in mobile adhoc network. The main aim of the proposed work is to implement a new technique in the attack scenario of distributed network of MANET in order to analyze the policies and patterns of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    RDWSN: To Offer Reliable Algorithm for Routing in Wireless Sensor Network

    The authors would offer a reliable algorithm for routing in Wireless Sensor Network (WSN). RDWSN algorithm by using of outstanding parameters has been evaluated compared with previous algorithms. The proposed algorithm with respect to size and distance in basic capability function has created a new target function that bears more...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Cloud Services for Collaborative Web Based Project Management System

    Cloud computing is a style of computing which is having dynamically scalable virtualized resources provided as a service over the Internet. In this paper, the authors are presenting Project Management System (P.M.S.) based on cloud computing. Lack of manageability and variant projects scope are two of the worst problems plaguing...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Color Features Integrated With Line Detection for Object Extraction and Recognition in Traffic Images Retrieval

    This paper proposes a simple object extraction and recognition method with efficient searching for identifying and extracting the objects in a complex scene based on the color features. The background of the images is needed to be extracted and recognized in order to get the object of the interested in...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Comprehensive Analysis of Web Log Files for Mining

    World Wide Web is a global village and rich source of information. Day by day number of web sites and its users are increasing rapidly. Information extracted from WWW may sometimes do not turn up to desired expectations of the user. A refined approach, referred as Web Mining, which is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Design and Implementation of Memory-Less Forbidden Transition Free Crosstalk Avoidance CODECs for On-Chip Buses

    Recently, reducing crosstalk noise delay is an important issue in VLSI design. As circuit geometries become smaller, wire interconnections become closer together and taller, thus increasing the cross-coupling capacitance between nets. At the same time, parasitic capacitance to the substrate becomes less as interconnections become narrower, and cell delays are...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    A Critical Simulation of CPU Scheduling Algorithm Using Exponential Distribution

    A multiprogramming operating system allows more than one process to be loaded into the executable memory at a time and for the loaded process to share the CPU using time-multiplexing. Part of the reason for using multiprogramming is that the operating system itself is implemented as one or more processes,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Theoretical Analysis of VoIP Transmission Through Different Wireless Access Technologies

    One of the challenges in today's wireless networks is to provide appropriate throughput for data and multimedia application. The physical data rate enhancements can be achieved through new physical capabilities, however to achieve high efficiency and to improve the throughput at the Medium Access Control (MAC) layer, new and innovative...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Scalable Symmetric Key Cryptography Using Asynchronous Data Exchange in Enterprise Grid

    Symmetric key cryptography is one of the most critical computing problems that need high performance computing power resources. The use of large key sizes and complex encryption/decryption algorithms to achieve unbreakable state has led to an increased time computational complexity. Traditionally, this problem is solved in the grid environment by...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Grayscale Image Compression Based on Min Max Block Truncating Coding

    Image compression is an important tool to reduce the bandwidth and storage requirements of practical image systems such as multimedia, communication, medical images, education and business etc. The image compression techniques are categorized into two main classification namely lossy compression techniques and lossless compression techniques. Lossy compression techniques lead to...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    A Model for Crises Management in Software Projects

    Today software projects are important part into almost every business application. It is quality, efficiency and effectiveness of these applications will determine the failure or success of many business solutions. Consequently, businesses often find that they need to have a competitive and efficient advantage through the development and improve of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Nurture IDR Segmentation and Multiple Instruction Queues in Superscalar Pipelining Processor

    This paper proposes a model which improves the speed of the pipelining mechanism therefore increasing the speed of the processor. Superscalar operation is used to get maximum throughput from the processor using the pipelining concept. This proposal can be considered as the advancement of the super scalar property in pipelining...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Design of a High Performance Reversible Multiplier

    Reversible logic circuits are increasingly used in power minimization having applications such as low power CMOS design, optical information processing, DNA computing, bioinformatics, quantum computing and nanotechnology. The problem of minimizing the number of garbage outputs is an important issue in reversible logic design. In this paper, the authors propose...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Marginal Object Weight Ranking for Nearest Neighbor Search in Spatial Databases

    Uncertainty prevails in spatial databases whose objects are defined as multidimensional probable density function. Identifying an object is tedious task in uncertain spatial databases. Recent work on searching objects and its closeness to other objects was presented as superseding nearest neighbor search technique. In superseding neighbor search, one of all...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Incorporating Security in Embedded System - A Critical Analysis

    Security is becoming a major concern in embedded system designing and development. This paper surveys security requirements, attack techniques and will review countermeasures for these attacks. Use of embedded systems in diverse and complex applications have relentless importance of secure and fault tolerant system. It is essential for embedded device's...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Integrated Circuit of CMOS DC-DC Buck Converter With Differential Active Inductor

    In this paper, the authors propose a new design of DC-DC Buck Converter (BC), which the spiral inductor is replaced by a differential gyrator with capacitor load (gyrator-C) implemented in 0.18um CMOS process. The gyrator-C transforms the capacitor load (which is the parasitic capacitor of MOSFETS) to differential active inductor...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Implementing VoIP Over Fatima Jinnah Women University

    Working people employee the use of technology in such very effective natural ways that permit them to do what they want: they can communicate with anyone as per need, in the time and space that suits them the best. Easily accessible and user-friendly, collaboration tools allow them to explore, share,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Reengineering Multi Tiered Enterprise Business Applications for Performance Enhancement and Reciprocal or Rectangular Hyperbolic Relation of Variation of Data Transportation Time with Row Prefetch Size of Relational Database Drivers

    In a traditional multitier applications performance bottlenecks can be in user interactions level or network latency or data access or business logic level. The solutions as changes or tuning parameters can be applied at architect, design, framework or algorithm or at coding level. This paper highlights an inquisitive, experimental, top...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Performance Analysis of Multicast Routing and Wavelength Assignment (MRWA) Protocol with Dynamic Traffic Grooming in WDM Networks

    The need for on-demand provisioning of wavelength routed channels with service differentiated offerings within the transport layer has become more essential due to the recent emergence of high bit rate IP network applications such as multimedia conferencing systems, video on demand systems, real-time control systems, etc. Diverse optical transport network...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Frequency Reconfigurable Conformal Antennas for Wireless Networks

    Frequency Reconfigurable antennas have received significant attention for their applications in communications, electronic surveillance and countermeasures, by adapting their properties to achieve selectivity in frequency, bandwidth, polarization and gain. This paper presents the design of reconfigurable conformal antenna for Wireless LAN networks. The proposed antenna is suitable for wireless networks...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Analysis of V-BLAST Techniques for MIMO Wireless Channels with Different Modulation Techniques Using Linear and Non Linear Detection

    The rich-scattering wireless channel is capable of huge theoretical capacities. The Multiple Input Multiple Output (MIMO) antenna system provides very promising gain in capacity without increasing the use of spectrum, throughput, and power consumption. This is also less sensitivity to fading, hence leading to a breakthrough in the data rate...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Monitoring of Risky Parameters Using ZigBee Based Wireless Sensor Network

    Wireless Sensor Networks have emerged as a growing research area where most research scholars and industrialists focus on. Many people believe Wireless Sensor Network would become more important than internet in future. In this paper, the authors have designed and developed ZigBee network in real time using ZigBee nodes to...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Peak to Average Power Ratio (PAPR) Reduction Techniques for OFDM-MIMO System

    To get high data rate transmission, High Throughput techniques were analyzed for OFDM-MIMO System. OFDM-MIMO systems based on OFDM symbols suffer from the problem of inherent Peak to Average Power Ratio (PAPR). The peak power of a multi carrier OFDM signal is a critical design factor for band limited communication...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    AODV with Source Route Accumulation for improved Routing in WiMAX

    Worldwide Interoperability for Microwave Access (WiMAX) is a technology that bridges the gap between fixed and mobile access and offer the same subscriber experience for fixed and mobile user. Routing protocols for WiMAX mobile ad-hoc networks have to face the challenge of frequently changing topology, low transmission power, asymmetric links...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Traffic Analysis and Optimization of GSM Network

    Accurate traffic dimensioning plays an important role in telecommunications network planning and is particularly important for the performance analysis of mobile and wireless networks. The main goal of cellular operators now a day with the increasing number of mobile subscribers is to keep the subscribers satisfied with the delivered Quality...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Multiple Parameters Based Approach to Estimate Band Width in Mobile Ad Hoc Networks

    Mobile Ad-hoc NETwork (MANET) is a self-organized network where network is set up on the fly. Some of the issues in MANETs are routing, security, power management, bandwidth management, mobility management, etc. Correct estimation of the available bandwidth is one of the essential components for efficient network resource management and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Multi Databases in Health Care Networks

    E-Health is a relatively recent term for healthcare practice supported by electronic processes and communication, dating back to at least 1999. E-Health is greatly impacting on information distribution and availability within the health services, hospitals and to the public. E-health was introduced as the death of telemedicine, because - in...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    A Comparison Between Data Mining Prediction Algorithms for Fault Detection

    In the current competitive world, industrial companies seek to manufacture products of higher quality which can be achieved by increasing reliability, maintainability and thus the availability of products. On the other hand, improvement in products lifecycle is necessary for achieving high reliability. Typically, maintenance activities are aimed to reduce failures...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    A PKI-Based Track and Trace Network for Cross-Boundary Container Security

    Challenges in container management, such as theft of products, cross-border smuggling, long checking time in processes of customs clearance and unable to track locations of products in real time, are currently faced by supply chain parties. In recent year, Electronic Seal (e-Seal) technology is introduced to protect containers in a...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Enhanced Authentication Protocol EAP-TTLS Using Encrypted ECDSA

    The growing trend of wireless networks and risks associated with them has led to the development of authentication and application of stronger cryptographic methods to maintain a more robust security. This paper examined and compared two types of developed authentication protocols to provide an alternative method using strong cryptographic methods....

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2013

    IAX-Based Peer-to-Peer VoIP Architecture

    Now-a-days, Voice over IP (VoIP) constitutes a privileged field of service innovation. One benefit of the VoIP technology is that it may be deployed using a centralized or a distributed architecture. The majority of today's VoIP systems are deployed using the client - server centralized architecture. One of the most...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2013

    Selection Criteria for Data Mining Software: A Study

    Now-a-days software are flooded in the market, there is a need for selection criteria of software package that should be available for individuals and organizations. As the number of software continues to grow and new features added to the new software the selection of the most suitable software package is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    Swarm Optimization Algorithm for Privacy Preserving in Data Mining

    Free competition in business can be compromised as data mining techniques reveal critical information about business transactions. Hence, there is a need to ensure prevention of disclosures both of confidential personal information which is contextually sensitive. Literature is abounding with state-of-the-art methods for privacy preserving Evolutionary Algorithms (EAs) that give...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    Predicting Customer Churn in Mobile Telephony Industry Using Probabilistic Classifiers in Data Mining

    Customer churn in the mobile telephony industry is a continuous problem owing to stiff competition, new technologies, low switching costs, deregulation by governments, among other factors. To address this issue, players in this industry must develop precise and reliable predictive models to identify the possible churners beforehand and then enlist...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    Parallel and Distributed Closed Regular Pattern Mining in Large Databases

    Due to huge increase in the records and dimensions of available databases pattern mining in large databases is a challenging problem. A good number of parallel and distributed FP mining algorithms have been proposed for large and distributed databases based on frequency of item set. Not only the frequency, regularity...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    Implementation of Data Privacy & Query Optimization in Data Providing Service Composition

    Data providing services allow query like access to organization's data via web services. The invocation of DP service results in the execution of a query over data sources. In most cases user's queries require the composition of several services. The RDF based query rewriting algorithm is used for DP services...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Exploration on Big Data Oriented Data Analyzing and Processing Technology

    At present, enterprises have urgent needs to conduct an effective and stable statistical analysis on big data. With a view to solving the issue of analysis and processing of big data in respect of enterprise business, this essay proposes a hybrid structure mode based on the MapReduce technology and the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Application of SVM Optimization Based on GA in Electronic Sphygmomanometer Data Fusion

    If the proper kernel function parameter is chosen, using of the multi-sensor data fusion method based on SVM, the influence of cross sensitive disturbance variables including the temperatureT and the power supply current I, can be significantly suppressed and the stability of the pressure sensor can be improved in the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Personality Types Classification for Indonesian Text in Partners Searching Website Using Na

    The development of digital text information has been growing fast, but most of digital text is in unstructured form. Text mining analysis is needed in dealing with such unstructured text. One of the activities important in text mining is text classification or categorization. Text categorization itself currently has a variety...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    A Study on Data Privacy, Protection & Sanitization Practices During Disk Disposal by Indian Educational Institutes

    Information security practices are inevitable in this era of increased security breaches. With popularity of internet, cyber security issues have taken its main stay. Disk level security issues are ignored by Indian education institutes and society at large. The focus of this paper is to study data privacy, protection &...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    Secure Biometric Key Generation Scheme for Cryptography Using Combined Biometric Features of Fingerprint and Iris

    Exact and automatic recognition and authentication of users are an essential difficulty in all systems. Shared secrets like Personal Identification Numbers or Passwords and key devices such as Smart cards are not presently sufficient in few situations. What is required is a system that could authenticate that the person is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    Secure Authentication using Anti-Screenshot Virtual Keyboard

    With the development of electronic commerce, a lot of companies have established online trading platforms of their own such as e-tickets, online booking, online shopping, etc. virtual keyboard is used for authentication on such web based platform. However, virtual keyboard still suffers from numerous other fallacies that an attacker can...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Cryptography and State-of-the-art Techniques

    More generally, it is about constructing and analyzing protocols that overcome the influence of adversaries and which are related to various aspects in information security such as data confidentiality, data integrity, and authentication. Cryptography is an indispensable tool for protecting information in computer systems. Modern cryptography has strong relation with...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Analyzing Relation in Application Semantics and Extended Capabilities for Secret Sharing Schemes

    Secret Sharing Schemes (SSS) refers to method for distributing a secret amongst a group of participants, each of whom is allocated a share of the secret. The secret can be reconstructed only when a sufficient number of shares are combined together; individual shares are of no use on their own....

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    A New Mechanism for Mutual Authentication In SIP

    The greatest threat in the new generation network which is called NGN is unsafe authentication. Communication between new servers in NGN world is done based on Session Initiation Protocol (SIP). SIP is an application-layer control operating on top of a transport protocol which allows creating, modifying, and terminating sessions among...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jun 2012

    Security and Privacy of Electronic Banking

    The internet has played a key role in changing how the authors interact with other people and how they do business today. As a result of the internet, electronic commerce has emerged, allowing business to more effectively interact with their customers and other corporations inside and outside their industries. One...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    An Advanced Survey on Secure Energy-Efficient Hierarchical Routing Protocols in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are often deployed in hostile environments, which make such networks highly vulnerable and increase the risk of attacks against this type of network. WSN comprise of large number of sensor nodes with different hardware abilities and functions. Due to the limited memory resources and energy constraints,...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2010

    Footprint Recognition Using Modified Sequential Haar Energy Transform (MSHET)

    Footprint identification is the measurement of footprint features for recognizing the identity of a user. Footprint is universal, easy to capture and does not change much across time. Footprint biometric system does not require specialized acquisition devices. Footprint image of a left leg is captured for hundred people in different...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2011

    Prevention of Cross-Site Scripting Attacks (XSS) on Web Applications in the Client Side

    Cross Site Scripting (XSS) attacks are currently the most popular security problems in modern web applications. These attacks make use of vulnerabilities in the code of web-applications, resulting in serious consequences, such as theft of cookies, passwords and other personal credentials. Cross Site Scripting (XSS) attacks occur when accessing information...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2011

    Analytical Model and Performance Evaluation for the TRIDNT Protocol

    In Mobile ad-hoc networks, nodes must cooperate to achieve the routing functions. Node misbehavior due to selfish or malicious intention could significantly degrade the performance of MANET because most existing routing protocols in MANET are aiming at finding the most efficient path. A Two node-disjoint Routes scheme for Isolating Dropper...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2013

    An Energy Efficient Data Redundancy Reduction Approach for Data Aggregation in WSN

    WSN has the potentiality to join the physical world with the virtual world by creating a network of sensor nodes. Here, sensor nodes are usually battery-operated devices, and hence energy reduction of sensor nodes is a major design issue. To extend the network's lifetime, minimization of energy consumption should be...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Traceability and Data Support in SME Manufacturing

    Appropriate description and implementation of internal part traceability in manufacturing is a complex task. Accurate and real-time traceability from a part to a manufacture, storage, or transport issue is essential to efficient and high-quality operations. With the increasing amount of machine status and product quality information coming from the manufacturing...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    A New Trust Reputation System for E-Commerce Applications

    Robust Trust Reputation Systems (TRS) provide a most trustful reputation score for a specific product or service so as to support relying parties taking the right decision while interacting with an e-commerce application. Thus, TRS must rely on an appropriate architecture and suitable algorithms that are able to improve the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    A Survey on Using Data Mining Techniques for Online Social Network Analysis

    In this paper the authors take into consideration the concepts of using algorithmic and data mining perspective of Online Social Networks (OSNs), with special emphasis on latest hot topics of research area. There are several factors which has made the study of OSNs gain enormous importance by researchers. Few such...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Extending CertificateLess Authentication for Wireless Sensor Networks: A Novel Insight

    Security is quite challenging in Wireless Sensor Networks (WSN) because of their constrained nature in terms of resources such as limited memory, low processing power, limited bandwidth etc. Authentication in low power devices is still considered to be an expensive process. Certificateless signature is one of the approaches to facilitate...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    University Communication at Intelligent Ad Hoc Network using SIP services

    The frantic nature of technological advances in the area of multimedia communications, compounded with the convergence of telecommunication and computer networks has led to the emergence of new class of applications sometime called ubiquitous computing or ambient intelligence. In this paper the authors present a project which converges with this...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Iris Detection and Normalization in Image Domain Based on Morphological Features

    The interface of computer technologies and biology is having a huge impact on society. Human recognition research projects promises new life to many security-consulting. Iris recognition is considered to be the most reliable biometric authentication system. Very few iris recognition algorithms were commercialized. The authors implemented a system that process...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    An Enhanced AODV Routing Protocol for MANETs

    In the last few years, many studies have been performed in MANETs, especially in unicast routing protocols. In this paper, a new routing protocol for Mobile Ad-hoc NETworks (MANETs) is presented; the proposed Power-Hop based Ad-hoc On-demand Distance Vector (AODV) is named PH-AODV, it uses the node power and the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    An Efficient Pipelined Technique for Signcryption Algorithms

    Signcryption algorithms are based on public key cryptography. The main advantage of signcryption algorithms is to provide both confidentiality and authenticity in one step. Hence, signcryption algorithms lower both communication and computation overheads. This reduction, in communication and computation overheads, makes signcryption algorithms more suitable for realtime applications than other...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Analysis the Impacts of Transmission Range of AODV & DSDV Ad-Hoc Network Protocols Performance over Mobile WiMAX Networks

    The IEEE 802.16 technology (WiMAX) is facing great challenges due to owning high mobility of mobile nodes, limited radio coverage of wireless devices, time varying nature of wireless medium. The transmission range of Base Station (BS) has a vital influence and must achieve the most economic case of energy in...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Data Mining Classifiers for Static Security Evaluation in Power System

    In this paper, the authors address the application of data mining approach on Static Security Evaluation (SSE) of deregulated power system. The process of building binary class classifiers is divided into two components: comparison the methods, and selection of the best classifier. Preliminary results of using eleven algorithms of Decision...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Web Application Security by SQL Injection DetectionTools

    SQL injection is a type of attack which the attacker adds Structured Query Language code to a web form input box to gain access or make changes to data. SQL injection vulnerability allows an attacker to flow commands directly to a web application's underlying database and destroy functionality or confidentiality....

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    An Empirical Framework To Detect Security Attacks On the Cloud Data Storage System

    Providing an adequate security level in Cloud Environments is currently a particularly active analysis space. A lot of specifically, malicious behaviors targeting massive scale Cloud knowledge repositories (e.g. Denial of Service attacks) could drastically degrade the general performance of such systems and can't be detected by typical authentication mechanisms. In...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Social Engineering: A Partial Technical Attack

    In this paper, the authors suggest the crystal clear concept behind the social engineering attack. Basically social engineering is a non technical attack. But social engineering attack is an attack on human psychology to get the information, but by using what? Basically it is an attack on human psychology by...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2013

    Mitigate Black Hole Attack In Dynamic Source Routing (DSR) Protocol By Trapping

    Ad hoc network maximize the total network throughput by using all available nodes for routing and forwarding. MANETs are highly vulnerable to attacks than wired networks due to the open medium, dynamically changing network topology, cooperative algorithms, and lack of centralized monitoring. Hence, a node can misbehave and fail to...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2013

    Effects of Black Hole Attack on MANET Using Reactive and Proactive Protocols

    Wireless networks are gaining popularity to its peak in the present era and therefore appealing the users for wireless connectivity irrespective of their geographic position. There is an increasing threat of attacks on the Mobile Ad-hoc NETworks (MANET). Black hole attack is one of the security threat in which the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Searching Encrypted Data on Cloud

    Encryption is an optimistic way to preserve the secrecy of the outsource data. On other hand, performing search operation on encrypted data is a complicated job. A lot of encryption techniques have been suggested by researchers to avoid improper usage of unstructured data on the cloud. But still by using...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Development of an Innovative Internet of Things Security System

    Recently, the concept of Internet of Things (IoT) has become the most popular term through the widespread of its applications such as greenhouse and telemedicine monitoring. Actually, building IoT systems requires an accurate infrastructure planning. Furthermore, management and security of these systems are considered as the most important challenges facing...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Performance and Proficiency Analysis for Cloud Storage

    Those who need to store larger amounts of data either for burst periods or for convenient synchronization. Between devices is currently looking at new ways of how to integrate cloud storage services into the data processing applications. The benefits (on-demand access and pricing, elasticity) and the drawbacks (reduced control, increased...

    Provided By International Journal of Computer Science Issues