International Journal of Computer Science Issues

Displaying 601-640 of 870 results

  • White Papers // Jan 2012

    HCTE: Hierarchical Clustering Based Routing Algorithm With Applying the Two Cluster Heads in Each Cluster for Energy Balancing in WSN

    In wireless sensor networks, the energy constraint is one of the most important restrictions. With considering this issue, the energy balancing is essential for prolonging the network lifetime. Hence this problem has been considered as a main challenge in the research of scientific communities. In the recent papers many clustering...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    An Accurate Arabic Root-Based Lemmatizer for Information Retrieval Purposes

    In spite of its robust syntax, semantic cohesion, and less ambiguity, lemma level analysis and generation does not yet focused in Arabic NLP literatures. In the current research, the authors propose the first non-statistical accurate Arabic lemmatizer algorithm that is suitable for Information Retrieval (IR) systems. The proposed lemmatizer makes...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    A Study of Edge Detection Method for Different Climate Condition Images Using Digital Image Processing

    Human eye can sense different weather conditions as same as the sensor. The human eye gives good result. In this proposal work the six different edge detection methods are applied to analyze weather condition. In this paper the special kind of changes in the picture for different weather condition are...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Survey of Tolerant Network in Mobile Communication

    Tolerant networks are a class of emerging networks that experience frequent and long-duration partitions. These networks have a variety of applications in situations such as crisis environments and deep-space communication. In this paper, the authors study the problem of multicasting in TNs. Multicast supports the distribution of data to a...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Analysis of Quality of Service Performances of Connection Admission Control Mechanisms in OFDMA IEEE 802.16 Network Using BMAP Queuing

    In this paper, the authors consider a single-cell IEEE 802.16 environment in which the base station allocates subchannels to the subscriber stations in its coverage area. The subchannels allocated to a subscriber station are shared by multiple connections at that subscriber station. To ensure the Quality of Service (QoS) performances,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Modelling Efficient Process Oriented Architecture for Secure Mobile Commerce Using Hybrid Routing Protocol in Mobile Adhoc Network

    The proposed research paper presents a novel approach of process oriented architecture for secure mobile commerce framework using uniquely designed hybrid mobile adhoc routing protocols using reactive and proactive type in real time test-bed. The research paper discusses about deployment of mobile commerce which is one of the emerging trend...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Performance Based Novel Techniques for Semantic Web Mining

    The explosive growth in the size and use of the World Wide Web continuously creates new great challenges and needs. The need for predicting the users' preferences in order to expedite and improve the browsing though a site can be achieved through personalizing of the websites. Most of the research...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Optimized Energy-Aware Algorithm for Collaboration in Visual Sensor Networks

    Network lifetime is one of the critical performance parameters in Visual Sensor Networks. In order to avoid transmission of redundant information to the base station, it becomes necessary to select among the nodes in the neighboring region having the same area of coverage for data transfer. This paper presents an...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Implication of Secure Micropayment System Using Process Oriented Structural Design by Hash Chaining in Mobile Network

    The proposed system presents a novel approach of designing a highly secured and robust process oriented architecture for micro-payment system in wireless adhoc network. Deployment of any confidential transaction over dynamic nature of wireless adhoc network will strike a high amount of security challenges which is very difficult to identify...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Designing Debugging Models for Object Oriented Systems

    Bugs are inevitable in any software development life cycle. Most bugs are detected and removed in the testing phase. In software, the authors can classify bugs into two categories: bugs of different severity, bugs of different complexity. Prior knowledge of bug distribution of different complexity in software can help project...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Designing of RF Single Balanced Mixer With a 65 nm CMOS Technology Dedicated to Low Power Consumption Wireless Applications

    The present paper consists of designing a Single Balanced Mixer (SBM) with the 65 nm CMOS technology, this for a 1.9 GHz RF channel, dedicated to wireless applications. This paper shows; the polarization chosen for this structure, models of evaluating parameters of the mixer, then simulation of the circuit in...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    A Quantitative Study and Comparison of AODV, OLSR and TORA Routing Protocols in MANET

    Mobile Ad-hoc NETwork (MANET) is a collection of wireless mobile hosts forming a temporary network without the aid of any stand-alone infrastructure or centralized administration. Most of the proposed MANET protocols do not address security issues. In MANETs routing algorithm is necessary to find specific routes between source and destination....

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Analyzing the Complexity of Java Programs Using Object - Oriented Software Metrics

    Object-oriented technology has rapidly become accepted as the preferred paradigm for large-scale system design. With the help of this technology the authors can develop software product of higher quality and lower maintenance cost. It is evident that the available traditional software metrics are inadequate for case of object-oriented software, as...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Performance Evaluation of AODV and DSR With Varying Pause Time and Speed Time Over TCP and CBR Connections in VANET

    VANET (Vehicular Ad-hoc NETwork) is a new technology which has taken enormous attention in the recent years. Vehicular ad hoc network is formed by cars which are called nodes; allow them to communicate with one another without using any fixed road side unit. It has some unique characteristics which make...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Using Jquery With Snort to Visualize Intrusion

    The explosive growth of malicious activities on worldwide communication networks, such as the Internet, has highlighted the need for efficient intrusion detection systems. The efficiency of traditional intrusion detection systems is limited by their inability to effectively relay relevant information due to their lack of interactive/immersive technologies. Visualized information is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Network Threat Ratings in Conventional DREAD Model Using Fuzzy Logic

    One of the most popular techniques to deal with ever growing risks associated with security threats is DREAD model. It is used for rating risk of network threats identified in the abuser stories. In this model network threats needs to be defined by sharp cutoffs. However, such precise distribution is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Secured Distributed Cognitive MAC and Complexity Reduction in Channel Estimation for the Cross Layer Based Cognitive Radio Networks

    Secured opportunistic Medium Access Control (MAC) and complexity reduction in channel estimation are proposed in the Cross layer design Cognitive Radio Networks deploying the secured dynamic channel allocation from the endorsed channel reservation. Channel Endorsement and Transmission policy is deployed to optimize the free channel selection as well as channel...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Performance Evaluation of Statistical Approaches for Automatic Text-Independent Speaker Recognition Using Robust Features

    This paper introduces the performance evaluation of statististical approaches for Automatic-text-independent Speaker Recognition system. Automatic-text-independent Speaker Recognition system is to quickly and accurately identify the person from his/her voice. The study on the effect of feature vector size for good speaker recognition demonstrates that the feature vector size in the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Security Analysis of Routing Protocols in Wireless Sensor Networks

    In this paper, the author describes briefly some of the different types of attacks on wireless sensor networks such as Sybil, HELLO, Wormhole and Sinkhole attacks. Then the author describes security analysis of some major routing protocols in wireless sensor network such as Directed Diffusion, TinyOS beaconing, geographic and Rumor...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Comparison of Routing Protocols for Locating Moving Object in Large Scale Cellular Wireless Sensor Network

    A Wireless Sensor Network (WSN) is ad hoc dense wireless network of small, low-cost Sensor Nodes (SN), which collect and disseminate sensed data with limited power sources. WSNs can be used in many applications, such as environmental monitoring and object tracking. Organizing network topology with energy efficient traffic can maximize...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Implementation & Throughput Analysis of Perfect Difference Network (PDN) in Wired Environment

    This paper is about Perfect Difference Network (PDN) which is an asymptotically optimal method for connecting a set of nodes into a Perfect Difference Network with diameter 2, so that any node is reachable from any other node in one or two hops. Network throughput is measured as the average...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Proposal of a New Block Cipher Reasonably Non- Vulnerable Against Cryptanalytic Attacks

    This paper proposes a new block cipher termed as "Modular Arithmetic based Block Cipher with Varying Key-Spaces (MABCVK)" that uses private key-spaces of varying lengths to encrypt data files. There is a simple but intelligent use of theory of modular arithmetic in the scheme of the cipher. Based on observed...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Semantic Malware Detection by Deploying Graph Mining

    Today, malware is a serious threat to the people society. Several researchers are studying detection and mitigation of malware threats. On the other hand malware authors try to use obfuscation techniques for evading detection. Unfortunately usual approach (e.g., antivirus software) use signature based method which can easily be evaded. For...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Toward an Example-Based Machine Translation From Written Text to ASL Using Virtual Agent Animation

    Modern computational linguistic software cannot produce important aspects of sign language translation. Using some researches the authors deduce that the majority of automatic sign language translation systems ignore many aspects when they generate animation; therefore the interpretation lost the truth information meaning. This problem is due to sign language consideration...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Design and Development of Artificial Neural Network Based Tamil Unicode Symbols Identification System

    Design and Development of Unicode and its recognition especially for Indian script is an active area of research today. An attempt is made to identify Tamil-a vernacular of southern India, which is also the official language of Tamilnadu. Tamil language present great challenges to an OCR designer due to the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Mercator as a Web Crawler

    The Mercator describes, as a scalable, extensible web crawler written entirely in Java. In term of Scalable, web crawlers must be scalable and it is important component of many web services, but their design is not well-documented in the literature. In this paper, the authors enumerate the major components of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Tradeoff Analysis of Bit-Error-Rate (BER) in Cognitive Radio Based on Genetic Algorithm

    The authors know that the radio electromagnetic spectrum is a natural resource and efficient usage of the inadequate natural resource is one of the greatest challenges of today's wireless communication system just like petrol, coal and water. The efficient use of the available licensed spectrum is becoming more and more...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Hybrid DCT-DWT Watermarking and IDEA Encryption of Internet Contents

    Encryption and watermarking are complementary lines of defense in protecting multimedia content. Recent watermarking techniques have therefore been developed independent from encryption techniques. In this paper, the authors present a hybrid image protection scheme to establish a relation between the data encryption key and the watermark. Prepositioned secret sharing allows...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Vehicular Ad-Hoc Networks

    Modern day's vehicles require advanced communication system on board to enable passengers benefit the most from available services. IEEE 802.11p is the new extension of IEEE 802.11 standards; especially proposed for the high vehicular environment. The WAVE documentation represents enhancements to the Media Access Control (MAC) and PHYsical (PHY) layer...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    (IPTV) Internet Protocol Television's Key Broadcast Building Blocks

    Telcos, in pursuit of the triple play (voice, video, and data), are investing heavily to compete with the cable companies in providing quality video content to the consumer. However, most telco infrastructures do not currently have the bandwidth to support high-quality video distribution. The telcos are updating their Internet Protocol...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Design of Power Efficient Schema for Energy Optimization in Data Center With Massive Task Execution Using DVFS

    The proposed system highlights a novel energy efficient technique by considering an entire datacenter using DVFS (Dynamic Voltage and Frequency Scaling). Unwanted power consumption was always a matter of concern from last 2 years for the administrators of datacenters. Therefore, a research trial in order to minimize the power consumption...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    A Review of QoS in Mobility Phillic Communication

    This particular outlook represents, in brief the recent & upcoming issues associated with QoS guarantee & mobility in communications. Moreover it also presents a brief context of QoS attributes & handling techniques thereby. Even more, it covers aspects of QoS fundamentals in deployment of mobility led approaches. There are different...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    3D Media over Future Internet: Current Status and Future Research Directions

    Future Media Internet has been designed to overcome current limitations and address emerging trends including: network architecture, content and service delivery across heterogeneous networks, diffusion of heterogeneous nodes and devices, mass digitization, new forms of (3D) user centric/user generated content provisioning, emergence of software as a service and interaction with...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Mobile Agent Based Hierarchical Intrusion Detection System in Wireless Sensor Networks

    Security mechanism is a fundamental requirement of wireless networks in general and Wireless Sensor Networks (WSN) in particular. Therefore, it is necessary that this security concern must be articulate right from the beginning of the network design and deployment. WSN needs strong security mechanism as it is usually deployed in...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    An Enhanced Backoff Method used between Mobiles Moving in Industrial 802.11

    The purpose of this paper is to discuss the exchanges between mobiles moving in an industrial environment. To reach this study, a simulation approach has been chosen to be used. The selection of relevant propagation model for the selected industrial site is based on several measurements. By adjusting the parameters...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Gossip Based Routing Protocol Design for Ad Hoc Networks

    A spontaneously mannered decentralized network with no formal infrastructure and limited in temporal and spatial extent where each node communicate with each other over a wireless channel and is willing to forward data for other nodes is called as Wireless Ad Hoc network. In this paper, the authors proposed a...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    An Overview of Applications, Standards and Challenges in Futuristic Wireless Body Area Networks

    Recent technical advancements in low-power integrated circuits, ultra low-power RF (Radio Frequency) technology, wireless communications and micro sensors allowed the realization of Wireless Body Area Networks (WBANs). It is one of the latest technologies in health care diagnosis and management. A body area network wirelessly connects independent nodes (e.g. medical...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Secure Routing in Wireless Sensor Networks

    Wireless sensor networks is the new concept in the field of networks consists of small, large number of sensing nodes which is having the sensing, computational and transmission power. Due to lack of tamper-resistant infrastructure and the insecure nature of wireless communication channels, these networks are vulnerable to internal and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Improving Internet Quality of Service through Active Queue Management in Routers

    The traffic characteristics of real-time and non real-time applications require a certain Quality of Service (QoS) from the Internet in terms of bandwidth, delay, packet loss, fairness and jitter. However, most of the current Active Queue Management (AQM) algorithms at the Internet routers do not guarantee QoS for real time...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Fault Tolerance-Challenges, Techniques and Implementation in Cloud Computing

    Fault tolerance is a major concern to guarantee availability and reliability of critical services as well as application execution. In order to minimize failure impact on the system and application execution, failures should be anticipated and pro-actively handled. Fault tolerance techniques are used to predict these failures and take an...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Middleware approaches for Wireless Sensor Networks: An overview

    Wireless Sensor Networks (WSN) has become highly attractive to researchers and industries due to its wide range of applications. Middleware is a distributed software that tries to provide a common platform for hiding the heterogeneity of the system, enabling multiple applications to work on a distributed network. This survey paper...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Performance Analysis of VoIP Codecs over WiMAX Networks

    Real-time services such as VoIP are becoming popular and are major revenue earners for network service providers. These services no longer confined to the wired domain and extended over wireless networks. Although some of the existing wireless technologies can support some low-band width applications, the bandwidth demands of many multimedia...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Wifi-based Indoor Navigation with Mobile GIS and Speech Recognition

    As the development of mobile communications and wireless networking technology and people's increasing demand for wireless location services, positioning services are more and more important and become the focus of research. However, the most common technology which supports outdoor positioning services is Plobal Positioning System (GPS), but GPS has been...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Performance Analysis of Scheduling Algorithms For VoIP Services in IEEE 802.16 Systems

    VoIP applications are being widely used in today's networks challenging their capabilities to provide a good quality of experience level to the users. In particular, there are several scheduling algorithms for Voice over IP (VoIP) services in IEEE 802.16 systems, such as Unsolicited Frant Service (UGS), realtime Polling Service (rtPS),...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Using Modified Partitioning Around Medoids Clustering Technique in Mobile Network Planning

    Optimization mobile radio network planning is a very complex task, as many aspects must be taken into account. Deciding upon the optimum placement for the Base Stations (BS's) to achieve best services while reducing the cost is a complex task requiring vast computational resource. This paper introduces the spatial clustering...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Energy Efficient Routing in Mobile Adhoc Networks based on AODV Protocol

    Mobile Ad hoc NETworks (MANETs) suffer from power exhaustion as many nodes use batteries as their source. Energy consumption is one of the most important system design optimization criterion in MANETs. The conventional routing protocols do not consider energy of nodes while selecting routes. So, using the same route for...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    MuMoCo : a Framework for Improving Data Quality with Multiple Modalities Cooperation in Wireless Sensor Networks

    High quality sensor data stream is crucial to wireless sensor networks applications. However raw data streams in wireless sensor networks tend to be not reliable. Therefore, improving sensor data quality is an important issue for all kinds of wireless sensor networks applications. In this paper, the authors proposed an integrated...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    A Review on Node Deployment of Wireless Sensor Network

    Wireless Sensor Network (WSN) is nowadays being applied in many different civilian applications like vehicle tracking, habitat monitoring, forest surveillance, earthquake observation, biomedical or health care applications and building surveillance. To a large extent the effectiveness of the wireless sensor networks depends on the coverage provided by the sensor deployment...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Prediction based Link Stability Scheme for Mobile Ad Hoc Networks

    Mobile Ad Hoc NETworks (MANETs) consist of mobile nodes which are not controlled by any base station. Mobile nodes act as a major role because of performing the data transmission, route discovery, route maintenance. The packet loss occurs often while the nodes are moving out of range, or the node...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    A Review on: Issues Related to Security on Tree Structure Data

    The problem of tree structured data is that it requires different Integrity and confidentiality for different portion of same content. Integrity assurance technique not only applies integrity to received data by user, but also any compromise to data that must be precisely determined. In tree structures each node contains some...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Review of Security Approaches in Routing Protocol in Mobile Adhoc Network

    In this paper, the objective is to present a review of routing protocols in Mobile Ad hoc NETwork (MANET) exclusively from security viewpoint. In MANET, the mobile nodes often move randomly for which reason the cumulative network experiences rapid and much unpredictable topology alterations. Due to presence of dynamic topology...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Review of Load Balancing in Cloud Computing

    With the exponential rise in the demands of the clients worldwide, a large scale distributed systems have been introduced as a computing environment. Cloud computing has paved a revolutionary path in this direction of distributed environment for accomplishing optimized performance, shortest response time, network resource utilization, and adaptability of service...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    A Trust-Based Routing Protocol in VANET

    One of the greatest challenges in Vehicular Ad-hoc NETworks (VANET) is to establish stable routing. Due to the dynamic network this is a difficult problem. In this paper, the authors use trust-based routing. The node is chosen to be next-hop node until it reaches to trust threshold. To evaluate the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Network Security Using Job Oriented Architecture (SUJOA)

    In the modern world operating system, various security systems (Collection of various security components) are already installed or can be directly installed in it. They are responsible for checking the complete node for suspicious behavior. There are some intrusions having the ability to hide themselves from being checked called armoring...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Detection of False Alarm in Handling of Selfish Nodes in MANET With Congestion Control

    In a mobile ad hoc network, the mobile nodes will have the characteristics of mobility and constraints in resources. Since, the mobility is high, the nodes may move randomly and fastly, which lead to network partitioning. The resource constraints lead to a big problem as decrease in performance and the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    Larg Band Ridged Waveguide Polarizer as Feed for Telecommunications Satellites Antennas

    For the transmission in high power in the systems of telecommunications Satellite; the systems in technology guides wave are best placed. The current progress recorded in the field of telecommunications requires an increase in the performances of these devices, more especially as average data processing and the recent software, such...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    FEA-OLSR: An Adaptive Energy Aware Routing Protocol for MANETs Using Zero-Order Sugeno Fuzzy System

    Optimized Link State Routing (OLSR) is a standard proactive routing protocol for Mobile Ad-hoc NETworks (MANETs). In this paper, the authors use a zero-order Sugeno Fuzzy Logic System (FLS) for adjusting the willingness parameter in OLSR protocol. Decisions made at each mobile node by the FLS take into account its...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    Modified TCP Protocol for Wireless Sensor Networks

    The transport layer's protocols have been used in the Wireless Sensor Networks (WSNs) in order to achieve data reliability. However, the limitations of the WSNs did not usually considered when implementing these protocols in the stack of the sensor nodes. In this paper, the TCP protocol has been modified in...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    A Semantically Enhanced Searching Framework to Discover the Sensor Web Services for Wireless Sensor Network

    The semantic based sensor service discovery is proposed to enhance the discovery of sensor services. The authors know web is one of the best medium connecting the service providers with their clients. Wireless sensor service generates a large number of heterogeneous raw data, so it's a big challenge now-a-days to...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Development of an Innovative Internet of Things Security System

    Recently, the concept of Internet of Things (IoT) has become the most popular term through the widespread of its applications such as greenhouse and telemedicine monitoring. Actually, building IoT systems requires an accurate infrastructure planning. Furthermore, management and security of these systems are considered as the most important challenges facing...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Performance and Proficiency Analysis for Cloud Storage

    Those who need to store larger amounts of data either for burst periods or for convenient synchronization. Between devices is currently looking at new ways of how to integrate cloud storage services into the data processing applications. The benefits (on-demand access and pricing, elasticity) and the drawbacks (reduced control, increased...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    A Study of Risk Management in Cloud Computing Bank

    Cloud computing apparently helps in reducing costs and providing the scheduling optimal level. In practice however it may confront the problem of unavailability of resources. Taking into consideration the cloud computing bank with its somehow commercial nature, the resources unavailability, such as liquidity risk, remains. In this paper, an attempt...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Dynamic Workload Performance Optimization Model for Multiple-Tenancy in Cloud Systems

    Cloud entails the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer. With this concept it's easy to reduce complexity for the clients as they don't have to handle installations and other...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Investigational Study of 7 Effective Schemes of Load Balancing in Cloud Computing

    With the exponential increase in demands of online applications and services, cloud computing has evolved as a boon in modern information technology. Built over the base of grid and distributed computing, cloud computing offers services to cater the dynamic needs of massive user base. However, with the novelty associated with...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Searching Encrypted Data on Cloud

    Encryption is an optimistic way to preserve the secrecy of the outsource data. On other hand, performing search operation on encrypted data is a complicated job. A lot of encryption techniques have been suggested by researchers to avoid improper usage of unstructured data on the cloud. But still by using...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2013

    Security in Electronic Business

    A crucial area of electronic transactions is the domain of electronic commerce. Yet, a large number of people do not want to transact online as they are not sure of the level of security that the transaction would be provided by the site and the technology used by the sites....

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2013

    Security Issues and Challenges - Cloud Computing

    Cloud computing is in its preliminary stages when the authors respect to its implementation & usage. The reason for this is that the technology is heavily dependent on the high-tech resources that the academicians and researchers find it practically impossible to analyze & test the technology. The basis of the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2013

    IT-Infrastructure of University Based on Cloud Computing

    In this paper, the authors devoted to the organization of e-education environment of the university based on cloud computing. Cloud services and one of its components - a virtual work place introduce innovations in an education system. The introduction and the use of cloud services at the university will significantly...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2013

    An Efficient and Secure Handover Protocol for IEEE 802.16m Networks

    Mobile WiMAX (Worldwide interoperability Microwave Access) requires the re-authentication of mobile stations as they change from one base station to another. IEEE 802.16e uses the Extensible Authentication Protocol (EAP) for authentication and key management. This requires about 1000 ms, therefore, it could not support mobile WiMAX applications such as video...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2013

    A Symbol Based Graphical Schema Resistant to Peeping Attack

    Alphanumeric passwords are the most commonly used way of authenticating users in computer systems. One of the disadvantages of alphanumeric passwords is that they are hard to remember. Image passwords have been proposed to aim to make passwords more memorable and easier for users to use and, for this reason,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2013

    Propose HMNIDS Hybrid Multilevel Network Intrusion Detection System

    In this paper, the authors present a proposal Hybrid Multilevel Network Intrusion Detection System (HMNIDS) which is a \"Hybrid Multilevel IDS\", is hybrid because use misuse and anomaly techniques in intrusion detection, and is multilevel since it applies the two detection techniques hierarchal in two levels. First level applies anomaly...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2013

    Adaptive Approach for Spam Detection

    Spam has emerged as a major problem in recent years. The most widely recognized form of spam, is email spam. The accounts which contain spam messages must waste time deleting annoying and possibly offensive message. In this paper, the authors present a variety of machine learning algorithms to identify spam...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2013

    Keystroke Dynamics Authentication: A Survey of Free-Text Methods

    Current computer systems depend greatly on authentication methods in order to provide sufficient protection to the data handled by these systems. Rather than using the common username and password scheme which suffers from many security and usability limitations, the authors investigate in this paper the use of keystroke dynamics as...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Effective Anomaly Intrusion Detection System Based on Neural Network with Indicator Variable and Rough Set Reduction

    Intrusion Detection System (IDS) is an important tool for the defense of a network against attacks. It monitors the activities occurring in a computer system or network and analyzes them for recognizing intrusions to protect the computer network. Most of the existing IDSs use all of the 41 features available...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2013

    Semi-Automatic Data Warehouse Design Methodologies: A Survey

    Faced to the large amounts of data and the remarkable diversification of their sources, a scientific and economic interest to explore the reservoirs of knowledge is established. Data warehouses are used in making strategic decisions. A data warehouse is a collection of integrated, historised data originating from heterogeneous sources which...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2013

    The Impact of Indexes on Data Warehouse Performance

    A data warehouse designer should consider the effectiveness of data query, this depends on the selection of relevant indexes and their combination with the materialized views, note that the index selection is a NP-complete problem, because the number of indexes is exponential in the total number of attributes in the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2013

    A Novel Design to Increase Trust in Cloud IaaS Model

    In IaaS services of cloud the customers demand for hardware resources as a service like memory, processor cycles, disk storage even software. IaaS services of cloud rely heavily on virtualization. The service is provided by means of virtual machine. It is not easy task for cloud users to store their...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2013

    Ontology Based Data Warehouses Federation Management System

    Data warehouses are nowadays an important component in every competitive system, it's one of the main components on which business intelligence is based. The authors can even say that many companies are climbing to the next level and use a set of data warehouses to provide the complete information or...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2013

    Dimension Reduction in Intrusion Detection Features Using Discriminative Machine Learning Approach

    With the growing need of internet in daily life and the dependence on the world wide system of computer networks, the network security is becoming a necessary requirement of the authors' world to secure the confidential information available on the networks. Efficient intrusion detection is needed as a defense of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2013

    Cloud Computing: A Survey on Its Limitations and Potential Solutions

    Cloud computing has brought a new paradigm shift in technology industry and becoming increasingly popular day by day. The Small to Medium Enterprises (SMEs) are now adopting cloud computing in much more higher rate than large enterprises. That raises a debate whether this cloud computing technology will penetrate throughout the...

    Provided By International Journal of Computer Science Issues