International Journal of Computer Science Issues

Displaying 601-640 of 968 results

  • White Papers // Mar 2012

    Fuzzy Integrity Constraints for Native XML Database

    XML is gradually accepted as a standard for representing, accessing, and exchanging data in internet applications. It poses many new challenges to XML storage or XML repositories. The data centric approach of XML has necessitated the definition of integrity constraints for XML. Integrity constraints have proved fundamentally important in Relational...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Application Independent Energy Efficient Data Aggregation in Wireless Sensor Networks

    Wireless Sensor networks are dense networks of small, low-cost sensors, which collect and disseminate environmental data and thus facilitate monitoring and controlling of physical environment from remote locations with better accuracy. The major challenge is to achieve energy efficiency during the communication among the nodes. This paper aims at proposing...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Architecture of Wireless Network

    To allow for wireless communications among a specific geographic area, base stations of communication network must be deployed to allow sufficient radio coverage to every mobile users. The base stations, successively, must be linked to a central hub called the MSC (Mobile Switching Centre). The mobile switching centre allow connectivity...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Hybrid Routing Protocol for Wireless Sensor Networks

    Increasing network (WSN) lifetime is a challenge in routing protocol design for ad hoc network, especially in such a network each node (sensor) is powered by batteries, characterized ability calculation and limited storage. Hierarchical routing protocols are best known in regard to energy efficiency. By using a clustering technique hierarchical...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    A Novel Architecture for Collaborative Environments

    A novel architecture, called Cognitive Social Knowledge Grid, is introduced as a solution for collaborative environments. The CSKG performs information and knowledge operations through collaboration of agents and services in a service-oriented context. Its services and mechanisms have been described and relationship models of its components and services have been...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Analysis of Security Techniques for Detecting Suspicious Activities and Intrusion Detection in Network Traffic

    In Computer Network number of security techniques provide security consolation but not up to optimal security extent. There are massive attacks and efficient viruses travel across the network which incapacitates computer system and default configuration of the operating system. Preceding techniques can capture anomalous activates and previous known attacks but...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Intrusion Detection System Using Memtic Algorithm Supporting With Genetic and Decision Tree Algorithms

    This paper has proposed a technique of combining Decision Tree, Genetic Algorithm, DT-GA and Memtic algorithm to find more accurate models for fitting the behavior of network intrusion detection system. The authors simulate this sort of integrated algorithm and the results obtained with encouragement to further work. Computer networks are...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Low-Power and High Speed 128-Point Pipline FFT/IFFT Processor for OFDM Applications

    This paper represents low power and high speed 128-point pipelined Fast Fourier Transform (FFT) and its Inverse Fast Fourier Transform (IFFT) processor for OFDM. The Modified architecture also provides concept of ROM module and variable length support from 128~2048 point for FFT/IFFT for OFDM applications such as Digital Audio Broadcasting...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Network Anomalies Detection Using Statistical Technique : A Chi-Square Approach

    Intrusion Detection System is used to detect suspicious activities is one form of defense. However, the sheer size of the network logs makes human log analysis intractable. Furthermore, traditional intrusion detection methods based on pattern matching techniques cannot cope with the need for faster speed to manually update those patterns....

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    A Systematic Study of Requirement Volatility During Software Development Process

    The amount and complexity of software produced today stagger the imagination. Software development strategies have not kept pace with them. Today's software and system's engineers are facing an increasing number of challenges as they attempt to develop new products that are faster, having high quality and are rich in features....

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Evaluation of Joint Sleep and Idle Mode in IEEE 802.16e WIMAX

    As energy availability limits usage time for mobile devices, modern wireless systems implement Power Saving Mechanisms (PSMs). Determining optimal PSM parameters and switch points when applying all PSM mechanisms jointly in the same scenario is a trade-off between power savings and system performance degradation. This paper presents an unpublished performance...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Fuzzy Algorithm to Mitigate Risk in the Assignment of Roles in a Wireless Network

    This paper is presenting a method of defining a fuzzy membership function which helps in role assignment for wireless network. There is a risk involved in assigning roles dynamically as there can be a false negative or in other words an intruder is permitted into the system. The present proposal...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Performance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols

    Mobile Ad hoc NETwork (MANET) is an organization of static and wireless mobile nodes having no any central administration and fixed infrastructure. In MANET, each node can acts as routing and hosting device. Performance comparison and analysis has been conducted by using four different scenarios in NS2 (Network Simulator) for...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Authentication Algorithm for Intrusion Detection in Wireless Networks

    Security has been a major issue in wireless networks. In a wireless network, wireless devices are prone to be unauthorized accessing data or resources. Hence, it becomes necessary to consider issues of security such as: authentication and access Control. Traditional methods of Authentication has been to assign user names and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    A Reliable Multicast Routing Approach for VANET

    Safety applications of inter-vehicle and vehicle-to-roadside communication that make use of Vehicular Ad hoc NETworks (VANETs) will often require reliable communication that provides guaranteed real-time message propagation. An important aspect of network dynamics is failure handling, as link/node failure due to high mobility of nodes introduces service disruption in wireless...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    A Comprehensive Analysis of Wireless Mobile Based Tele-Monitoring System for Myocardial Malfunctioning

    The cardiac arrest is one of the leading causes for sudden death. The chance of occurrence of severe myocardial problem increases after the first attack. Detecting the one set of malfunctioning is ever challenging. The authors' paper intends to benefit those at high risk of myocardial can be detected early...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Modelling Virus Propagation in P2P Networks

    Peer-To-Peer (P2P) networking is currently an emerging technology that has gained dramatic increase in popularity both for network traffic and in the research domain. The growing popularity and use of P2P networks means that P2P has also attracted the attention of virus creators. A number of viruses have recently appeared...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    IPv6 Tunneling Over IPV4

    Due to the huge growth of the internet users, mobile users using internet connection makes development and implementation of IPv6 as an alternate solution. IPv6 is a long anticipated upgrade to the internet's main communication protocol, which is called IPv4. The current address space provided by IPv4, with only4, 294,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    RGB Technique of Intrusion Detection in IEEE 802.11 Wireless Mesh Networks

    According to the growth rate of wireless technology, Wireless Mesh Network (WMN) usage is significantly increased according to its advantages like inexpensive, fast and easy deployment. WMN have ability, easy to create mesh and provide internet access in a cost efficient manner in any type of area which is unable...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    A New Efficient Approach for Peer-To-Peer File Searching in Mobile Ad-Hoc Network

    The file searching efficiency and scalable property based on P2P (Peer-To-Peer) can be increased by reduction of message overhead. A single hop cluster based P2P file searching protocol for MANET (Mobile Ad-hoc Networks) focusing mainly over the reduction of message overhead. The searching processes are maintained by intra and inter...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    A Power Efficient, Oblivious, Path-Diverse, Minimal Routing for Mesh-Based Networks-on-Chip

    One of the most trade-off aspects in the design of NoCs is the improvement of the network performance, in terms of throughput and latency, while minimizing power consumption. 2D-mesh has become the preferred topology, since it offers low and constant link delay. This paper proposes a Power efficient, Oblivious, Path-diverse,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    A Quantitative Measurement and Validation of Granularity in Service Oriented Architecture

    The prominent principle of designing service in Service Oriented Architecture is service granularity. The granularity is a crucial design decision. The service should be neither too coarse nor too fine grained. Therefore, it should be evaluated at the design phase itself to measure its level of appropriateness. This paper proposes...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Stimulating Cooperation in Mobile Ad Hoc Networks Using Cut Diamond With Diamond Method

    In recent years, mobile ad-hoc networks have become very popular because of their widespread usage. Cooperation among the nodes in adhoc networks is an important issue for communication to be possible. But some nodes do not cooperate in communication and saves their energy. These nodes are called as selfish nodes....

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Fast Energy-Efficient Secure Dynamic Address Routing for Scalable WSNs

    Secure Routing is one of the important issues in wireless sensor networks. A number of approaches have been proposed for secure routing in wireless sensor networks, but there is a lack of sufficient support for quick &secure routing in large-scale sensor networks. The authors consider the dynamic address routing for...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Integration of Chaotic Sequences Uniformly Distributed in a New Image Encryption Algorithm

    In this paper, the authors propose a new chaotic secret key cryptosystem, adapted for image encryption in continuous mode, which is based on the use of two one-dimensional discrete chaotic systems: Bernoulli map and Tent map. The pseudorandom sequences generated by the two maps are characterized by independence of their...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Identifying Data Integrity in the Cloud Storage

    In cloud computing, data is moved to a remotely located cloud server. Cloud faithfully stores the data and return back to the owner whenever needed. But there is no guarantee that data stored in the cloud is secured and not altered by the cloud or Third Party Auditor (TPA). In...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    An Architecture of a Multi Agent Enterprise Knowledge Management System Based on Service Oriented Architecture

    An enterprise system has many issues which are solved by incorporating the concepts of knowledge management into it. An effective Enterprise Knowledge Management System (EKMS) can be created by using a network of multi agents. An EKMS is a distributed system and distributed systems can be best designed using Service...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    A New Content Framework and Metamodel for Enterprise Architecture and IS Strategic Planning

    IS Strategic planning and Enterprise Architecture is two major disciplines in IT Architecture and Governance. They pursue the same objectives and have much in common. While ISSP has benefited from business strategic planning methods and techniques, it has not evolved much since the 90s and lacks from formal, tooled and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Social Engineering: A Partial Technical Attack

    In this paper, the authors suggest the crystal clear concept behind the social engineering attack. Basically social engineering is a non technical attack. But social engineering attack is an attack on human psychology to get the information, but by using what? Basically it is an attack on human psychology by...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Data Mining Classifiers for Static Security Evaluation in Power System

    In this paper, the authors address the application of data mining approach on Static Security Evaluation (SSE) of deregulated power system. The process of building binary class classifiers is divided into two components: comparison the methods, and selection of the best classifier. Preliminary results of using eleven algorithms of Decision...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Web Application Security by SQL Injection DetectionTools

    SQL injection is a type of attack which the attacker adds Structured Query Language code to a web form input box to gain access or make changes to data. SQL injection vulnerability allows an attacker to flow commands directly to a web application's underlying database and destroy functionality or confidentiality....

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Cryptography and State-of-the-art Techniques

    More generally, it is about constructing and analyzing protocols that overcome the influence of adversaries and which are related to various aspects in information security such as data confidentiality, data integrity, and authentication. Cryptography is an indispensable tool for protecting information in computer systems. Modern cryptography has strong relation with...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Analyzing Relation in Application Semantics and Extended Capabilities for Secret Sharing Schemes

    Secret Sharing Schemes (SSS) refers to method for distributing a secret amongst a group of participants, each of whom is allocated a share of the secret. The secret can be reconstructed only when a sufficient number of shares are combined together; individual shares are of no use on their own....

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    A Survey on Implementation of a Linux-based Operating System using LFS Method

    In recent years, the movement of open-source software and on top of them Linux open-source and free operating system has attracted the attention of many specialists, governments, organizations, etc. so that the biggest software companies such as Google, Oracle, etc. stepped forward in this movement and are developing open-source software,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Proposed Challenges and Areas of Concern in Operating System Research and Development

    Computers are a very important part of people lives and the major reason why they have been such a success is because of the excellent graphical operating systems that run on these powerful machines. As the computer hardware is becoming more and more powerful, it is also vital to keep...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Converting Relational Database Into XML Document

    XML (eXtensible Markup Language) is emerging and gradually accepted as the standard for data interchange in the Internet world. Interoperation of relational database and XML database involves schema and data translations. Through EER (Extended Entity Relationship) model can convert the schema of relational database into XML. The semantics of the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Accurate Dynamic Power Model for FPGA Based Implementations

    In this paper, the authors present an accurate Field Programmable Gate Array (FPGA) of analytical dynamic power models for basic operators at the RTL (Register Transfer Level) level. The models are based on the frequency, the activity rate and the input precision by using the Xpower tool in the presence...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    A Differential Double Pass Transistor Logic Unit

    In this paper, the authors present a new differential logic unit with duplicated functional outputs. The logic functions as well as their inverses are implemented within a single Logic Unit (LU) cell. The hardware overhead for the implementation of the proposed LU is lower than the hardware overhead required for...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Design, Simulation and Hardware Implementation of Low Density Parity Check Decoders Using Min-Sum Algorithm

    A Variable Node Processing Unit (VNPU) and a Check Node Processing Unit (CNPU) are designed in order to be used in Low Density Parity Check (LDPC) decoding by the Min-Sum Algorithm (MSA). The designed blocks are fully parallel and flexible to be used for different block length when a regular...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Implementation of the OFDM Physical Layer Using FPGA

    Orthogonal Frequency Division Multiplexing (OFDM) transmissions are emerging as important modulation technique because of its capacity of ensuring high level robustness against interference. OFDM is a modulation technique which is now widely used in various high speed mobile and wireless communication systems as; fixed Wi-Fi system, mobile Wi-Fi system, fixed...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Evaluation of Joint Sleep and Idle Mode in IEEE 802.16e WIMAX

    As energy availability limits usage time for mobile devices, modern wireless systems implement Power Saving Mechanisms (PSMs). Determining optimal PSM parameters and switch points when applying all PSM mechanisms jointly in the same scenario is a trade-off between power savings and system performance degradation. This paper presents an unpublished performance...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Fuzzy Algorithm to Mitigate Risk in the Assignment of Roles in a Wireless Network

    This paper is presenting a method of defining a fuzzy membership function which helps in role assignment for wireless network. There is a risk involved in assigning roles dynamically as there can be a false negative or in other words an intruder is permitted into the system. The present proposal...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Performance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols

    Mobile Ad hoc NETwork (MANET) is an organization of static and wireless mobile nodes having no any central administration and fixed infrastructure. In MANET, each node can acts as routing and hosting device. Performance comparison and analysis has been conducted by using four different scenarios in NS2 (Network Simulator) for...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Authentication Algorithm for Intrusion Detection in Wireless Networks

    Security has been a major issue in wireless networks. In a wireless network, wireless devices are prone to be unauthorized accessing data or resources. Hence, it becomes necessary to consider issues of security such as: authentication and access Control. Traditional methods of Authentication has been to assign user names and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    A Reliable Multicast Routing Approach for VANET

    Safety applications of inter-vehicle and vehicle-to-roadside communication that make use of Vehicular Ad hoc NETworks (VANETs) will often require reliable communication that provides guaranteed real-time message propagation. An important aspect of network dynamics is failure handling, as link/node failure due to high mobility of nodes introduces service disruption in wireless...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    A Comprehensive Analysis of Wireless Mobile Based Tele-Monitoring System for Myocardial Malfunctioning

    The cardiac arrest is one of the leading causes for sudden death. The chance of occurrence of severe myocardial problem increases after the first attack. Detecting the one set of malfunctioning is ever challenging. The authors' paper intends to benefit those at high risk of myocardial can be detected early...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Modelling Virus Propagation in P2P Networks

    Peer-To-Peer (P2P) networking is currently an emerging technology that has gained dramatic increase in popularity both for network traffic and in the research domain. The growing popularity and use of P2P networks means that P2P has also attracted the attention of virus creators. A number of viruses have recently appeared...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    IPv6 Tunneling Over IPV4

    Due to the huge growth of the internet users, mobile users using internet connection makes development and implementation of IPv6 as an alternate solution. IPv6 is a long anticipated upgrade to the internet's main communication protocol, which is called IPv4. The current address space provided by IPv4, with only4, 294,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    RGB Technique of Intrusion Detection in IEEE 802.11 Wireless Mesh Networks

    According to the growth rate of wireless technology, Wireless Mesh Network (WMN) usage is significantly increased according to its advantages like inexpensive, fast and easy deployment. WMN have ability, easy to create mesh and provide internet access in a cost efficient manner in any type of area which is unable...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    A New Efficient Approach for Peer-To-Peer File Searching in Mobile Ad-Hoc Network

    The file searching efficiency and scalable property based on P2P (Peer-To-Peer) can be increased by reduction of message overhead. A single hop cluster based P2P file searching protocol for MANET (Mobile Ad-hoc Networks) focusing mainly over the reduction of message overhead. The searching processes are maintained by intra and inter...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    A Power Efficient, Oblivious, Path-Diverse, Minimal Routing for Mesh-Based Networks-on-Chip

    One of the most trade-off aspects in the design of NoCs is the improvement of the network performance, in terms of throughput and latency, while minimizing power consumption. 2D-mesh has become the preferred topology, since it offers low and constant link delay. This paper proposes a Power efficient, Oblivious, Path-diverse,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    A Quantitative Measurement and Validation of Granularity in Service Oriented Architecture

    The prominent principle of designing service in Service Oriented Architecture is service granularity. The granularity is a crucial design decision. The service should be neither too coarse nor too fine grained. Therefore, it should be evaluated at the design phase itself to measure its level of appropriateness. This paper proposes...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Stimulating Cooperation in Mobile Ad Hoc Networks Using Cut Diamond With Diamond Method

    In recent years, mobile ad-hoc networks have become very popular because of their widespread usage. Cooperation among the nodes in adhoc networks is an important issue for communication to be possible. But some nodes do not cooperate in communication and saves their energy. These nodes are called as selfish nodes....

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Fast Energy-Efficient Secure Dynamic Address Routing for Scalable WSNs

    Secure Routing is one of the important issues in wireless sensor networks. A number of approaches have been proposed for secure routing in wireless sensor networks, but there is a lack of sufficient support for quick &secure routing in large-scale sensor networks. The authors consider the dynamic address routing for...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Integration of Chaotic Sequences Uniformly Distributed in a New Image Encryption Algorithm

    In this paper, the authors propose a new chaotic secret key cryptosystem, adapted for image encryption in continuous mode, which is based on the use of two one-dimensional discrete chaotic systems: Bernoulli map and Tent map. The pseudorandom sequences generated by the two maps are characterized by independence of their...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Identifying Data Integrity in the Cloud Storage

    In cloud computing, data is moved to a remotely located cloud server. Cloud faithfully stores the data and return back to the owner whenever needed. But there is no guarantee that data stored in the cloud is secured and not altered by the cloud or Third Party Auditor (TPA). In...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    University Communication at Intelligent Ad Hoc Network using SIP services

    The frantic nature of technological advances in the area of multimedia communications, compounded with the convergence of telecommunication and computer networks has led to the emergence of new class of applications sometime called ubiquitous computing or ambient intelligence. In this paper the authors present a project which converges with this...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Iris Detection and Normalization in Image Domain Based on Morphological Features

    The interface of computer technologies and biology is having a huge impact on society. Human recognition research projects promises new life to many security-consulting. Iris recognition is considered to be the most reliable biometric authentication system. Very few iris recognition algorithms were commercialized. The authors implemented a system that process...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    An Enhanced AODV Routing Protocol for MANETs

    In the last few years, many studies have been performed in MANETs, especially in unicast routing protocols. In this paper, a new routing protocol for Mobile Ad-hoc NETworks (MANETs) is presented; the proposed Power-Hop based Ad-hoc On-demand Distance Vector (AODV) is named PH-AODV, it uses the node power and the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Information Security Modelling In an ELearning Environment

    The growth of information technology and communication has led the world to a dramatic change. This paper performs a research on the e-learning strategies involved in organizations, especially educational institutions. E-learning industry is poised to become one of the largest sectors in the world economy. A review into the literature...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Revealing a Novel Method for Detecting Positive and Negative Optimal Performance Association Rules in Very Large Databases Using BPSO

    Association rules mining is one of the useful data mining algorithm in presenting meaningful information through database. One of the important challenges for association rules mining is that; it might be extracted millions of rules which mostly are idol; furthermore current methods only seek positive rules which finding out the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Efficient Web Data Extraction Using Clusteringapproach in Web Usage Mining

    Web mining which is a type of data mining is used to extract web data from web pages. Web usage mining is used to record user behavior. These records are further used to extract data which helps in search engine optimization. In this research paper the authors propose an approach...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Secure Remote Access to Devices in a Smart Grid

    Seamless and efficient access to remote devices is imperative in the network operations of a smart grid. Traditional management mechanisms will have to be modified in order to sustain networks such as the ones utilized in the smart grid and the types of devices lying on them. Current multi-domain collaborative...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Change detection in Migrating Parallel Web Crawler: A Neural Network Based Approach

    Search engines are the tools for web site navigation and search. Search engines maintain indices for web documents and provide search facilities by continuously downloading web pages for processing. This process of downloading web pages is known as web crawling. In this paper the authors propose A neural network based...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Validation of Architecture of Migrating Parallel Web Crawler using Finite State Machine

    The process of downloading web pages is known as web crawling. In this paper the authors validate the architecture of migrating parallel web crawler using finite state machine. The method for migrating parallel web crawling approach will detect changes in the content and structure. Also domain specific crawling will yield...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Conceptual Framework for Internet of Things' Virtualization via OpenFlow in Context-aware Networks

    A novel conceptual framework is presented in this paper with an aim to standardize and virtualize Internet of Things' (IoT) infrastructure through the deploying OpenFlow technology. The framework can receive e-services based on context information leaving the current infrastructure un-changed. This framework allows the active collaboration of heterogeneous devices and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Review of Software Reuse Processes

    Clients expect that enterprise software systems, which are continually growing in complexity, are of high quality, with reasonable price and have a short time to market. To find ways to meet with the increasing demands of business, software engineers are forced to find ways to streamline development process. Software reuse...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Cluster Based Data Transfer Strategy for Layered Wireless Sensor Network

    The paper develops a relatively different cluster based data transfer pattern directed to enhance the lifetime of a layered Wireless Sensor Network (WSN). The interactive information flow between layers appears to captivate the resurgence of new definitions in the process of routing and forge attractive corner stone's in communication networks....

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    An Efficient Pipelined Technique for Signcryption Algorithms

    Signcryption algorithms are based on public key cryptography. The main advantage of signcryption algorithms is to provide both confidentiality and authenticity in one step. Hence, signcryption algorithms lower both communication and computation overheads. This reduction, in communication and computation overheads, makes signcryption algorithms more suitable for realtime applications than other...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Analysis the Impacts of Transmission Range of AODV & DSDV Ad-Hoc Network Protocols Performance over Mobile WiMAX Networks

    The IEEE 802.16 technology (WiMAX) is facing great challenges due to owning high mobility of mobile nodes, limited radio coverage of wireless devices, time varying nature of wireless medium. The transmission range of Base Station (BS) has a vital influence and must achieve the most economic case of energy in...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Hierarchical Cluster-Based Routing Protocols for Wireless Sensor Networks - A Survey

    Hierarchical cluster-based routing protocols are considered as one of the most efficient routing protocols in Wireless Sensor Networks (WSN) due to its higher energy efficiency, network scalability, and lower data retransmission. In cluster-based routing protocols the network is divided into clusters each with a Cluster Head (CH) that is used...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Developing Web-Based Semantic Expert Systems

    Expert systems have provided solutions to different problems, from strategic planning of marketing to consulting in process reengineering. In general, the majority of studies published are based on advanced techniques of artificial intelligence, using specific languages or tools that require certain knowledge of reasoning processes to model information. With the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Fingerprint Classification Techniques: A Review

    A biometric is the automatic identification of an individual that is based on physiological or behavioral characteristics. Due to its security-related applications and the current world political climate, biometric is currently the subject of intense research by both private and academic institutions. Fingerprint is emerging as the most common and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    A Decentralized Fault Tolerant model for Grid Computing

    A current trend in high-performance computing is the use of large-scale computing grids. These platforms consist of geographically distributed cluster federations gathering thousands of nodes. At this scale, node and network failures are no more exceptions, but belong to the normal system behavior. Thus, grid applications must tolerate failures and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Secure Routing in Mobile Ad hoc Networks: Laurel verification based Node Selection Strategy

    As the nodes are self resourced in ad hoc networks, the denial of service as relay hop by any node is frequent. This is due to resource levels of that node are lower than the threshold, in another act the node may be irrational and selfish. In such cases the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Imposing Fairness in Electronic Commerce

    In the recent years, electronic commerce has gained much importance. Traditional commerce is slowly being replaced with ecommerce and more people tend to prefer doing their shopping online. One of the main reasons for this attraction is the convenience the e-commerce provides. Customers can choose from a lot of different...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    A Mobile Agent Approach for IDS in Mobile Ad Hoc Network

    Mobile ad hoc networks are a group of wireless computers, forming a communication network that has no predetermined structure. Its highly vulnerable to attacks due to the open medium dynamically changing network topology, co-operative algorithm and lack of centralized. The fact is that security is a critical problem. This paper...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Classification and Recognition of Fingerprints using Self Organizing Maps(SOM)

    Feature extraction and matching are important in Automatic Fingerprint Identification Systems (AFIS) in the field of biometric technology. In this work, a filter-based algorithm uses a bank of Gabor filters to capture local and global features in a fingerprint as a compact fixed length FingerCode. These fingercodes are matched using...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    A Proposed Cryptosystem Algorithm Based on Two Different Chaotic Systems (PCA2CS) for Securing the Colored Images

    In this paper, a proposed cryptosystem algorithm based on two different chaotic systems is presented. Chen's chaotic system and Henon chaotic system is used as different chaotic systems to obtain the authors' proposed encryption algorithm; in order to meet the requirements of secure image transfer. The proposed encryption algorithm will...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Exploring Technical Deployments of IPv6 on University LANs

    The current version of the Internet Protocol version 4 (IPv4) addressing scheme is officially exhausted. Internet Protocol version 6 (IPv6) is the next generation internet protocol proposed by the Internet Engineering Task Force (IETF) to supplant the current IPv4. Every device connected to the internet is expected to support this...

    Provided By International Journal of Computer Science Issues