International Journal of Computer Science Issues

Displaying 601-640 of 880 results

  • White Papers // Jan 2012

    A Quantitative Study and Comparison of AODV, OLSR and TORA Routing Protocols in MANET

    Mobile Ad-hoc NETwork (MANET) is a collection of wireless mobile hosts forming a temporary network without the aid of any stand-alone infrastructure or centralized administration. Most of the proposed MANET protocols do not address security issues. In MANETs routing algorithm is necessary to find specific routes between source and destination....

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Analyzing the Complexity of Java Programs Using Object - Oriented Software Metrics

    Object-oriented technology has rapidly become accepted as the preferred paradigm for large-scale system design. With the help of this technology the authors can develop software product of higher quality and lower maintenance cost. It is evident that the available traditional software metrics are inadequate for case of object-oriented software, as...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Performance Evaluation of AODV and DSR With Varying Pause Time and Speed Time Over TCP and CBR Connections in VANET

    VANET (Vehicular Ad-hoc NETwork) is a new technology which has taken enormous attention in the recent years. Vehicular ad hoc network is formed by cars which are called nodes; allow them to communicate with one another without using any fixed road side unit. It has some unique characteristics which make...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Using Jquery With Snort to Visualize Intrusion

    The explosive growth of malicious activities on worldwide communication networks, such as the Internet, has highlighted the need for efficient intrusion detection systems. The efficiency of traditional intrusion detection systems is limited by their inability to effectively relay relevant information due to their lack of interactive/immersive technologies. Visualized information is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Network Threat Ratings in Conventional DREAD Model Using Fuzzy Logic

    One of the most popular techniques to deal with ever growing risks associated with security threats is DREAD model. It is used for rating risk of network threats identified in the abuser stories. In this model network threats needs to be defined by sharp cutoffs. However, such precise distribution is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Secured Distributed Cognitive MAC and Complexity Reduction in Channel Estimation for the Cross Layer Based Cognitive Radio Networks

    Secured opportunistic Medium Access Control (MAC) and complexity reduction in channel estimation are proposed in the Cross layer design Cognitive Radio Networks deploying the secured dynamic channel allocation from the endorsed channel reservation. Channel Endorsement and Transmission policy is deployed to optimize the free channel selection as well as channel...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Performance Evaluation of Statistical Approaches for Automatic Text-Independent Speaker Recognition Using Robust Features

    This paper introduces the performance evaluation of statististical approaches for Automatic-text-independent Speaker Recognition system. Automatic-text-independent Speaker Recognition system is to quickly and accurately identify the person from his/her voice. The study on the effect of feature vector size for good speaker recognition demonstrates that the feature vector size in the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Security Analysis of Routing Protocols in Wireless Sensor Networks

    In this paper, the author describes briefly some of the different types of attacks on wireless sensor networks such as Sybil, HELLO, Wormhole and Sinkhole attacks. Then the author describes security analysis of some major routing protocols in wireless sensor network such as Directed Diffusion, TinyOS beaconing, geographic and Rumor...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Helpful Business Value of Advance Bal Information System

    It has become progressively more complicated to pay more attention to the significance of business value of information system in early days. Above the past few days researchers have high bleached the need of information system in business field. Almost every organization like electronics, textile, computer, etc is investing significantly...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Hybrid Framework for Mitigating Illegitimate Peer Nodes in Multimedia File Sharing in P2p

    Peer-to-Peer network is one of the frequently used applications in terms of file sharing over a global large network. In such types of network, there can exist an illegitimate peer node who will attempt to have an unauthorized access to premium digital content. As it is very difficult to catch...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    A New Approach to the Data Aggregation in Wireless Sensor Network

    Several algorithms have been developed for problems of data aggregation in wireless sensor networks, all of which tried to increase networks lifetime. In this paper, the authors deal with this problem using a more efficient method, and offer a heuristic algorithm based on distributed learning automata to solve data aggregation...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Conceptualizing of Social Networking Sites

    People often move to their friends, families and colleagues when they feel urge and having doubts or queries to solve. Participation in social networking site has dramatically increased in recent years. Many social networking sites boost with millions of members using their network on regular basis to communicate, share, create...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    3D Media over Future Internet: Current Status and Future Research Directions

    Future Media Internet has been designed to overcome current limitations and address emerging trends including: network architecture, content and service delivery across heterogeneous networks, diffusion of heterogeneous nodes and devices, mass digitization, new forms of (3D) user centric/user generated content provisioning, emergence of software as a service and interaction with...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Mobile Agent Based Hierarchical Intrusion Detection System in Wireless Sensor Networks

    Security mechanism is a fundamental requirement of wireless networks in general and Wireless Sensor Networks (WSN) in particular. Therefore, it is necessary that this security concern must be articulate right from the beginning of the network design and deployment. WSN needs strong security mechanism as it is usually deployed in...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    An Enhanced Backoff Method used between Mobiles Moving in Industrial 802.11

    The purpose of this paper is to discuss the exchanges between mobiles moving in an industrial environment. To reach this study, a simulation approach has been chosen to be used. The selection of relevant propagation model for the selected industrial site is based on several measurements. By adjusting the parameters...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Gossip Based Routing Protocol Design for Ad Hoc Networks

    A spontaneously mannered decentralized network with no formal infrastructure and limited in temporal and spatial extent where each node communicate with each other over a wireless channel and is willing to forward data for other nodes is called as Wireless Ad Hoc network. In this paper, the authors proposed a...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    An Overview of Applications, Standards and Challenges in Futuristic Wireless Body Area Networks

    Recent technical advancements in low-power integrated circuits, ultra low-power RF (Radio Frequency) technology, wireless communications and micro sensors allowed the realization of Wireless Body Area Networks (WBANs). It is one of the latest technologies in health care diagnosis and management. A body area network wirelessly connects independent nodes (e.g. medical...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Secure Routing in Wireless Sensor Networks

    Wireless sensor networks is the new concept in the field of networks consists of small, large number of sensing nodes which is having the sensing, computational and transmission power. Due to lack of tamper-resistant infrastructure and the insecure nature of wireless communication channels, these networks are vulnerable to internal and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Improving Internet Quality of Service through Active Queue Management in Routers

    The traffic characteristics of real-time and non real-time applications require a certain Quality of Service (QoS) from the Internet in terms of bandwidth, delay, packet loss, fairness and jitter. However, most of the current Active Queue Management (AQM) algorithms at the Internet routers do not guarantee QoS for real time...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Fault Tolerance-Challenges, Techniques and Implementation in Cloud Computing

    Fault tolerance is a major concern to guarantee availability and reliability of critical services as well as application execution. In order to minimize failure impact on the system and application execution, failures should be anticipated and pro-actively handled. Fault tolerance techniques are used to predict these failures and take an...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    IPTV-Internet Protocol Televisions Key Broadcast Building Blocks

    Telcos, in pursuit of the triple play (voice, video, and data), are investing heavily to compete with the cable companies in providing quality video content to the consumer. However, most telco infrastructures do not currently have the bandwidth to support high-quality video distribution. The telcos are updating their Internet Protocol...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    An Accurate Arabic Root-Based Lemmatizer for Information Retrieval Purposes

    In spite of its robust syntax, semantic cohesion, and less ambiguity, lemma level analysis and generation does not yet focused in Arabic NLP literatures. In the current research, the authors propose the first non-statistical accurate Arabic lemmatizer algorithm that is suitable for Information Retrieval (IR) systems. The proposed lemmatizer makes...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Dynamic Replica Control Algorithm for Periodic/Aperiodic Transactions in Distributed Real-Time Databases

    Maintaining consistency between the actual state of the real-time object of the external environment and its images as reflected by all its replicas distributed over multiple nodes is one of the most important issue affecting the design of real-time database. Efficient replica control algorithm can contribute significantly to maintain this...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Performance Evaluation of QoS Parameters in Dynamic Spectrum Sharing for Heterogeneous Wireless Communication Networks

    Cognitive radio nodes have been proposed as means to improve the spectrum utilization. It reuses the spectrum of a primary service provider under the condition that the primary service provider services are not harmfully interrupted. A cognitive radio can sense its operating environment's conditions and it is able to reconfigure...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    A Priority Based Bandwidth Reservation Protocol for Wireless Mesh Networks

    In wireless mesh networks, when compared with traditional applications, multimedia application requires the need of inflexible Quality of Services (QoS) for high speed digital audio and videos. Under such a condition, the need of proper resource allocation is extremely handy. In this paper, the authors propose to develop a Priority...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Analysis of the Similarities and Differences Between MPLS Label Distribution Protocols RSVP and CR-LDP

    MPLS is a new technology that offers to open up the Internet by providing many additional services to applications using IP. MPLS forwards data using labels that are attached to each data packet. These labels must be distributed between the nodes that comprise the network. Many of the new services...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Comparison Based Analysis of Different Cryptographic and Encryption Techniques Using Message Authentication Code (MAC) in Wireless Sensor Networks (WSN)

    Wireless Sensor Networks (WSN) are becoming popular day by day, however one of the main issue in WSN is its limited resources. The authors have to look to the resources to create Message Authentication Code (MAC) keeping in mind the feasibility of technique used for the sensor network at hand....

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Fuzzy-Controlled Load-Balanced Broadcasting (FLB) in Clustered Mobile Ad Hoc Networks

    A mobile ad hoc network is a wireless network that is self-organized with many mobile nodes. No static infrastructure such as a wired backbone is available. All nodes are free to move around and the network topology may change frequently. Due to limited transmission range of wireless network interface, nodes...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Robust Iris Recognition Based on Statistical Properties of Walsh Hadamard Transform Domain

    In this paper, a new approach of iris image feature extraction technique based on the statistical properties of Walsh Hadamard Transform (WHT) domain is proposed. A Canny Edge Detection followed by Hough Transform is used to detect the iris boundaries in the digital image of an eye. The segmented and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Ultra-Wide-Band Microstrip Concentric Annular Ring Antenna for Wireless Communications

    In this paper, a new design technique for bandwidth enhancement of concentric microstrip annular ring slot antennas is presented. Using this technique, an Ultra-Wide-Band antenna is designed with simulated bandwidth of 111.29%. Microstrip patch antennas are widely used because of their several advantages such as light weight, low volume, low...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Peer to Peer Networks Management Survey

    Peer-to-Peer systems are based on the concept of resources localization and mutualisation in dynamic context. In specific environment such as mobile networks, characterized by high variability and dynamicity of network conditions and performances, where nodes can join and leave the network dynamically, resources reliability and availability constitute a critical issue....

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Privacy Preserving RFE-SVM for Distributed Gene Selection

    The Support Vector Machine Recursive Feature Elimination (SVMRFE) is one of the most effective feature selection methods which has been successfully used in selecting informative genes for cancer classification. This paper extends this well-studied algorithm to the privacy preserving distributed data mining issue. For gene selection over multiple patient data...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Reliable and Efficient Routing Using Adaptive Genetic Algorithm in Packet Switched Networks

    To identify the optimal route is a complex task in packet switched network because optimization depends upon a number of parameters. In this paper Genetic Algorithm is used to locate the optimal route. Genetic Algorithm starts with a number of solutions where each solution is represented in the form of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Human Iris Segmentation for Iris Recognition in Unconstrained Environments

    This paper presents a human iris recognition system in unconstrained environments in which an effective method is proposed for localization of iris inner and outer boundaries. In this method, after pre-processing stage, circular Hough transform was utilized for localizing circular area of iris inner and outer boundaries. Also, through applying...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    A Conventional Authentication in Key Management Using Progressive Approach

    Secure and reliable group communication is an increasingly active research area prompted by the growing popularity of many types of group-oriented applications. The main building block to achieve security in group communication scenarios is management of the secret information that should be known only to group members involved in communication....

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Serious Security Weakness in RSA Cryptosystem

    Nowadays, RSA is the well-known cryptosystem which supports most of electronic commercial communications. RSA is working on the base of multiplication of two prime numbers. Currently different kinds of attacks have identified against RSA by cryptanalysis. This paper has shown that regardless to the size of secret key and public...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Design and Implementation of Mobile IPv6 Data Communication in Dual Networks

    Dual Stack Mobile IPv6 is an extension of Mobile IPv6 to support mobility of devices irrespective of IPv4 and IPv6 Networks. This is implemented by combining different modules. IPv4 private networks are behind Network Address Translation (NAT) devices. So, to bypass the Binding Update and Binding Acknowledgment by NAT, the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    A Data Transfer in Wireless Sensor Networks Using AODV Protocol

    Sensor networks present unique opportunities for a broad spectrum of applications such as industrial automation, situation awareness, tactical surveillance for military application and environmental monitoring, chemical/biological detection etc. Sensor Network can monitor ambient condition such as temperature, sound, light and others. Information is collected from many sensor devices for further...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    An Advanced Survey on Cloud Computing and State-of-the-Art Research Issues

    Cloud Computing is considered as one of the emerging arenas of computer science in recent times. It is providing excellent facilities to business entrepreneurs by flexible infrastructure. Although, cloud computing is facilitating the Information Technology industry, the research and development in this arena is yet to be satisfactory. The authors'...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Usability of Collaborative Web Surfing Systems in e-Research

    Software's developed for the e-Research are generic in nature and are used in diverse application context. The Usability evaluation becomes more severe for that type of software's. In this paper, the authors focus on e-Research application based software on small scale to evaluate the quality assessment in accordance to the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Performance Analysis of VoIP Codecs over WiMAX Networks

    Real-time services such as VoIP are becoming popular and are major revenue earners for network service providers. These services no longer confined to the wired domain and extended over wireless networks. Although some of the existing wireless technologies can support some low-band width applications, the bandwidth demands of many multimedia...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Wifi-based Indoor Navigation with Mobile GIS and Speech Recognition

    As the development of mobile communications and wireless networking technology and people's increasing demand for wireless location services, positioning services are more and more important and become the focus of research. However, the most common technology which supports outdoor positioning services is Plobal Positioning System (GPS), but GPS has been...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Performance Analysis of Scheduling Algorithms For VoIP Services in IEEE 802.16 Systems

    VoIP applications are being widely used in today's networks challenging their capabilities to provide a good quality of experience level to the users. In particular, there are several scheduling algorithms for Voice over IP (VoIP) services in IEEE 802.16 systems, such as Unsolicited Frant Service (UGS), realtime Polling Service (rtPS),...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Using Modified Partitioning Around Medoids Clustering Technique in Mobile Network Planning

    Optimization mobile radio network planning is a very complex task, as many aspects must be taken into account. Deciding upon the optimum placement for the Base Stations (BS's) to achieve best services while reducing the cost is a complex task requiring vast computational resource. This paper introduces the spatial clustering...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Energy Efficient Routing in Mobile Adhoc Networks based on AODV Protocol

    Mobile Ad hoc NETworks (MANETs) suffer from power exhaustion as many nodes use batteries as their source. Energy consumption is one of the most important system design optimization criterion in MANETs. The conventional routing protocols do not consider energy of nodes while selecting routes. So, using the same route for...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    MuMoCo : a Framework for Improving Data Quality with Multiple Modalities Cooperation in Wireless Sensor Networks

    High quality sensor data stream is crucial to wireless sensor networks applications. However raw data streams in wireless sensor networks tend to be not reliable. Therefore, improving sensor data quality is an important issue for all kinds of wireless sensor networks applications. In this paper, the authors proposed an integrated...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    A Review on Node Deployment of Wireless Sensor Network

    Wireless Sensor Network (WSN) is nowadays being applied in many different civilian applications like vehicle tracking, habitat monitoring, forest surveillance, earthquake observation, biomedical or health care applications and building surveillance. To a large extent the effectiveness of the wireless sensor networks depends on the coverage provided by the sensor deployment...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    A New Approach to the Data Aggregation in Wireless Sensor Network

    Several algorithms have been developed for problems of data aggregation in wireless sensor networks, all of which tried to increase networks lifetime. In this paper, the authors deal with this problem using a more efficient method, and offer a heuristic algorithm based on distributed learning automata to solve data aggregation...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Conceptualizing of Social Networking Sites

    People often move to their friends, families and colleagues when they feel urge and having doubts or queries to solve. Participation in social networking site has dramatically increased in recent years. Many social networking sites boost with millions of members using their network on regular basis to communicate, share, create...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Improve Downlink Burst Allocation to Achieve High Frame Utilization of Mobile WiMAX (802.16e)

    The burst allocation algorithm is responsible about calculating the appropriate dimensions and location of each user's data to construct the bursts in the downlink subframe in term of the number of slots for each user. Burst allocation is one of the performance parameter which influences the mobile WiMAX systems, due...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Service Priority based Reliable Routing Path Select Method in Smart Grid Communication Network

    The new challenges and schemes for the Smart Grid require high reliable transmission technologies to support various types of electrical services and applications. This paper concentrates the degree of importance of services and tries to allocate more important service to more reliable network routing path to deliver the key instructions...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Novel Fast Encryption Algorithms for Multimedia Transmission over Mobile WiMax Networks

    Security support is mandatory for any communication networks. For wireless systems, security support is even more important to protect the users as well as the network. Since wireless medium is available to all, the attackers can easily access the network and the network becomes more vulnerable for the user and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    A Framework for Optimizing IP over Ethernet Naming System

    Due to the rapid expansion of the technology field. Developing the Internet has become more urgent to meet the needs of the expansion. TCP/IP is the most protocol used in the Internet. It consists from layers, each layer done its job separately. However these layers susceptible to different attacks and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Enhanced Fractional Frequency Reuse (EFFR) Technique in WiMAX Cellular Network

    WiMAX is a broad band high speed wireless communication system which use cellular network topology to deploy services to different subscribers. One of the major problems of deploying WiMAX base stations is the signal interference caused by neighboring cells which causes redaction in cell coverage area and capacity. The standard...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    An Efficient Encryption Algorithm for P2P Networks Robust Against Man-in-the-Middle Adversary

    Peer-to-Peer (P2P) networks have become popular as a new paradigm for information exchange and are being used in many applications such as file sharing, distributed computing, video conference, VoIP, radio and TV broadcasting. This popularity comes with security implications and vulnerabilities that need to be addressed. Especially duo to direct...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    On Reliability Modeling in Wireless Sensor Networks-A Review

    This paper presents a survey on existing reliability models in Wireless Sensor Networks (WSNs). Most of the existing mechanisms employ retransmissions, ignoring redundancy schemes and moreover no attempt has been made for biologically inspired WSNs. This paper proposes a biologically inspired wireless sensor network model where sensor nodes are intelligent...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Performance and Comparison of Multi-Hop Ad-Hoc Routing Protocols ? Quantitative Study

    Wireless Ad-hoc network is emerging network and form temporary networks. Due to its spontaneous nature the topology is frequently changes. Protocols selection and set up routing between any pair of nodes are the primary goal design for any wireless network. Several protocols are proposed in Mobile Ad hoc NETwork (MANET)...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    A Novel Problem-solvingMetric for Future Internet Routing Based on Virtualization and Cloud-computing

    The Internet has evolved from an academic network to a broad commercial platform and become an integral and indispensable part of their daily life, economic operation, and society over forty years. However, many technical and non-technical challenges have emerged during this process. In order to address these challenges, the authors...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Prediction based Link Stability Scheme for Mobile Ad Hoc Networks

    Mobile Ad Hoc NETworks (MANETs) consist of mobile nodes which are not controlled by any base station. Mobile nodes act as a major role because of performing the data transmission, route discovery, route maintenance. The packet loss occurs often while the nodes are moving out of range, or the node...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Precedence Based Preemption and Bandwidth Reservation Scheme in MANET

    Infrastructures less mobile networks are commonly known as Mobile Ad Hoc NETworks (MANET). Quality of Service (QOS) constraints is highly required for multimedia communications with MANET. Providing QOS in MANET is not easy task due to its broadcast and dynamic nature. There are some number of protocols exist which takes...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Agent Virus of Cooperation (Avicoop): an Intelligent Model of Cooperation and Collaboration Based on the MAS for Data Exchange in Ad hoc Network

    The authors propose in this paper a response to the problem of cooperation and collaboration between nodes in a Mobile Ad hoc NETwork (MANET) for intelligent data relays from one source to a destination. In their operation, each routing protocol relies on the support of each node for end-to-end messages...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Energy Efficiency Analysis of Adaptive Error Correction in Wireless Sensor Networks

    In this paper, the authors develop an analytical energy efficiency model using Adaptive Error Correction Code (AECC) in wireless sensor networks in fading environments. To adapt energy efficiency of sensor node to channel variations, the packet length is tuned at the data link layer. In this model, they consider the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Energy Band Based Clustering Protocol for Wireless Sensor Networks

    Clustering is one of the widely used techniques to prolong the lifetime of wireless sensor networks in environments where battery replacement of individual sensor nodes is not an option after their deployment. However, clustering overheads such as cluster formation, its size, cluster head selection & rotation, directly affects the lifetime...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Analysis of QoS Routing Approach and the Starvation's Evaluation in LAN

    This paper gives a survey in QoS Routing Architecture implemented by Dijkstra's algorithm. The performance of QoS Routing architecture is evaluated by made a comparison between the Shortest Path Routing and QoS one. A very important feature in QoS routing are the conditions for elimination of starvation. Experimentally the authors...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    A Framework for Secure Cloud Computing

    Cloud computing is one of the most discussed topics today in the field of information technology. It introduces a new Internet-based environment for on-demand, dynamic provision of reconfigurable computing resources. The biggest challenge in cloud computing is the security and privacy problems caused by its multi-tenancy nature and the outsourcing...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    A Web Services based Approach for Resource-Constrained Wireless Sensor Networks

    The large diffusion of Wireless Sensor Networks (WSNs) in the people contemporary life with their numerous applications has led to a huge heterogeneity. This heterogeneity makes the possibility of discovering and collecting data from the wireless sensors more and more difficult. Indeed, WSNs are currently developed around different communities of...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    Improving Quality of VoIP over WiMAX

    Real-time services such as VoIP are becoming popular and are major revenue earners for network service providers. These services are no longer confined to the wired domain and are being extended over wireless networks. Although some of the existing wireless technologies can support some low-bandwidth applications, the bandwidth demands of...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    Channel Reservation Model for User Class Based Admission Control in Next Generation Wireless Networks

    The Next Generation Wireless Networks (NGWN) are expected to offer abundant services to its users. Guaranteeing the agreed upon Quality of Service (QoS), while trying to maximize the revenue of the network operators by having more number of users in the system is a challenging problem. Call Admission Control (CAC)...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    Improvement in Medium Access Control Protocol Based on New Contention Scheme for Wireless Ad Hoc Network

    In todays wireless networks, stations using the IEEE 802.11 standard contend for the channel using the Distributed Coordination Function (DCF). Research has shown that DCF's performance degrades especially with the large number of stations. This becomes more concerning due to the increasing proliferation of wireless devices. In this paper, the...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    CMQ: Clustering Based Multipath Routing Algorithm to Improving QoS in Wireless Sensor Networks

    Multi-path is favorite alternative for sensor networks, as it provides an easy mechanism to distribute traffic and balance network's load, as well as considerate fault tolerance. For this purpose, a new clustering based multi path routing protocol namely CMQ is proposed in this paper, which guarantees achieve to required QoS...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    3D Media over Future Internet: Current Status and Future Research Directions

    Future Media Internet has been designed to overcome current limitations and address emerging trends including: network architecture, content and service delivery across heterogeneous networks, diffusion of heterogeneous nodes and devices, mass digitization, new forms of (3D) user centric/user generated content provisioning, emergence of software as a service and interaction with...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Mobile Agent Based Hierarchical Intrusion Detection System in Wireless Sensor Networks

    Security mechanism is a fundamental requirement of wireless networks in general and Wireless Sensor Networks (WSN) in particular. Therefore, it is necessary that this security concern must be articulate right from the beginning of the network design and deployment. WSN needs strong security mechanism as it is usually deployed in...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    An Enhanced Backoff Method used between Mobiles Moving in Industrial 802.11

    The purpose of this paper is to discuss the exchanges between mobiles moving in an industrial environment. To reach this study, a simulation approach has been chosen to be used. The selection of relevant propagation model for the selected industrial site is based on several measurements. By adjusting the parameters...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Gossip Based Routing Protocol Design for Ad Hoc Networks

    A spontaneously mannered decentralized network with no formal infrastructure and limited in temporal and spatial extent where each node communicate with each other over a wireless channel and is willing to forward data for other nodes is called as Wireless Ad Hoc network. In this paper, the authors proposed a...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    An Overview of Applications, Standards and Challenges in Futuristic Wireless Body Area Networks

    Recent technical advancements in low-power integrated circuits, ultra low-power RF (Radio Frequency) technology, wireless communications and micro sensors allowed the realization of Wireless Body Area Networks (WBANs). It is one of the latest technologies in health care diagnosis and management. A body area network wirelessly connects independent nodes (e.g. medical...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Secure Routing in Wireless Sensor Networks

    Wireless sensor networks is the new concept in the field of networks consists of small, large number of sensing nodes which is having the sensing, computational and transmission power. Due to lack of tamper-resistant infrastructure and the insecure nature of wireless communication channels, these networks are vulnerable to internal and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Improving Internet Quality of Service through Active Queue Management in Routers

    The traffic characteristics of real-time and non real-time applications require a certain Quality of Service (QoS) from the Internet in terms of bandwidth, delay, packet loss, fairness and jitter. However, most of the current Active Queue Management (AQM) algorithms at the Internet routers do not guarantee QoS for real time...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Fault Tolerance-Challenges, Techniques and Implementation in Cloud Computing

    Fault tolerance is a major concern to guarantee availability and reliability of critical services as well as application execution. In order to minimize failure impact on the system and application execution, failures should be anticipated and pro-actively handled. Fault tolerance techniques are used to predict these failures and take an...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    IPTV-Internet Protocol Televisions Key Broadcast Building Blocks

    Telcos, in pursuit of the triple play (voice, video, and data), are investing heavily to compete with the cable companies in providing quality video content to the consumer. However, most telco infrastructures do not currently have the bandwidth to support high-quality video distribution. The telcos are updating their Internet Protocol...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    Implementation of Energy Balancing in Wireless Sensor Networks

    In Wireless Sensor Networks (WSN), energy is a very precious resource for sensor nodes and communication overhead is to be minimized. So energy is an extremely critical resource for this type of battery-powered based Wireless Sensor Networks (WSN), and thus making energy-efficient smart protocol design is a key challenging problem....

    Provided By International Journal of Computer Science Issues