International Journal of Computer Science Issues

Displaying 41-80 of 968 results

  • White Papers // Nov 2014

    A Delay Aware Routing Protocol for Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) consist of sensor nodes which can be deployed for various operations such as agriculture and environmental sensing, wild life monitoring, health care, military surveillance, industrial control, home automation, security etc. Quality of Service (QoS) is an important issue in Wireless Sensor Networks (WSNs) and providing QoS...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2014

    Securing VoIP Systems: A QoS-Oriented Approach

    Voice over IP (VoIP) is a communication technology allowing voice traffic transmission as data packets over a private or a public IP network. VoIP allows significant benefits for customers and service providers including cost savings, services integration, and systems extensibility. Nevertheless, the VoIP technology suffers from many hurdles such as...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2014

    The Impact of Capability Level on Maturity of Business Intelligence Initiatives

    In this paper, the authors propose enterprise business intelligence maturity model that involves thirteen capacity factors, which are (strategic management, performance measurement, balanced scorecard, information quality, data warehouse, master data management, metadata management, analytical, infrastructure, knowledge management, people, organization culture and change management). This paper is to investigate how does...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2014

    Predicting Sales In E-commerce Using Bayesian Network Model

    An area of substantial research is that of predicting product sales, such as books, video games and movie tickets. There are a number of prediction models that have been used to predict future sales however these models attempt to solve the problem by making assumptions. These models assume that independent...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2014

    Revisiting Security Ontologies

    Significant innovations in virtualization and distributed computing as well as improved access to high-speed Internet have induced interest in cloud computing. Contemporary exploration of all stages of service models clearly proves the immense significance of \"Security in cloud computing\", which being as obtuse as it is pertinent, demands attention. An...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2014

    Development of a Mobile Service on a WiFi Network for the Evaluation of Mathematical Skills

    In this paper, the authors describe the design and development of a mobile service to make practical assessments of different topics of mathematics in order to improve the skills of students in high school education. This tool has the ability to create user accounts for participants, as well as storing...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2014

    From XML Schema to ODL Schema: Aggregation and Composition Transformation

    In this paper, the authors present an approach for transforming an existing XML schema in ODL (Object Definition Language) schemas, the authors chose oriented object database as a target database because there are many common characteristics between XML (eXtensible Markup Language) and object-oriented model, and they desire to have a...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2014

    Spatial-Temporal Outlier Sensing over Trajectory Data Streams

    The increasing capability to track moving vehicles in city roads enables people to probe the dynamics of a city. In this paper, the authors address the problem of detecting outliers and anomalies sources with trajectory data. Unlike existing anomaly detection methods, both spatial and temporal information are considered to find...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2014

    The Comparison WRR-SCAN Versus SCAN-EDF the Algorithms that are used in REAL-TIME Systems

    Scheduled algorithms in disc have a very important role in real time applications used in multimedia, in as much as the last ones generate I/O demands with their restrictions in real time. Both traditional algorithms and other two ones mentioned later during this study, serve to real-time tasks according their...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Development of a Business Logic Using Simple Application of Rough Set Theory

    In today's scenario, business establishment usually fails due to improper planning and lack of business knowledge. In this paper, the authors develop a concept which is precise and reduces the number of data attributes to start any business. For the development of the concept, they have used the concept of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    The Potential and Challenges of Big Data - Recommendation Systems Next Level Application

    The continuous increase of data generated provides enormous possibilities of both public and private companies. The management of this mass of data or big data will play a crucial role in the society of the future, as it finds applications in different fields. There are so much potential and extremely...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Implementation of End-to-End QoS Mapping Scheme on SCIS WiFi Network

    For developing countries, wireless networks seem to be the available alternative for providing affordable telecommunications services. In Iraq, the main governmental wireless Internet service provider is SCIS Company. It adopts WiMAX and WiFi wireless networks. Considering Quality of Service (QoS) as an indicator of network performance, it is a challenge...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Securing Data from Collusion Black Hole Attack Using Optimized Link Source Routing Protocol for MANET

    In this paper, a new algorithm for the selection of MultiPoint Relays (MPR) in Optimized Link State Routing protocol (OLSR) is proposed. OLSR is a routing protocol which could reduce the overhead of control messages by selecting MPRs. So, the number of MPRs is a key for the performance of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    A Knowledge Management Framework Using Business Intelligence Solutions

    The business environment, as a whole, was changed. It became more dynamic and more complex. Most organizations across the world have realized that in this rapidly changed environment, there is a strong need to become globally competitive and more interactive with the customers. The survival guide to competitiveness is to...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Influence of Mobile Device Categories on the Usability of Mobile Website Categories

    In this paper, the authors investigate the influence of mobile device categories on the usability of mobile website categories. The mobile website categories investigated were, news, search, service, portal, and media sharing website categories. And the mobile device categories used were, Touch Screen Mobile Phones (TSMP), Non-Touch Screen Mobile Phones...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Eye with Intelligence Connecting CCTV to Big Data, Hadoop and R

    Security, an abstraction which creates a virtual boundary and gives the sense of separation between the asset and the threat. It provides a layer of protection to the asset by encapsulating it and just making visible the necessary details to the outside world. In this paper, the authors are trying...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Web Service Security Overview, Analysis and Challenges

    The Web Services (WS) technology became the reference architecture during the last few years for the integration of heterogeneous systems. As it is now-a-days critical for business to make applications communicate over the internet. WS has take essential position for building and integrating e-business applications and to allow information system...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Spectrum Sensing for Cognitive Radio Users using Constant Threshold Range in Energy Detector

    Spectrum Sensing has an important role in Cognitive Radio Network (CRN). Different methodologies have been proposed in the literature for spectrum sensing. Energy detector method is more practical and less in complexity. This paper presents analysis of energy detection algorithm in different scenarios with different parameters to detect presence or...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Study on Secure Cloud Computing with Elliptic Curve Cryptography

    Cloud computing plays a major role by providing different resources in the form of web services like tax calculation web service, stock information web service, e-banking web service etc. But the authors can rely on cloud computing only when these web services are really secure enough to use. In this...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    A New Viewpoint to Database and Data Using Physics Concepts

    A modern tool has been introduced in this paper to researchers by definition of new concepts and approaches in order to optimize performance of databases. Although this is not going to argue that optimization of concepts like a better accessibility is impossible by the available tools, the main purpose is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Towards Gas Density Measurement: Design and Implementation of the Application-Oriented WSN

    Wireless Sensor Network (WSN) provides an effective real-time monitoring approach. A design and implementation of WSN is introduced in this paper, which is applied to concentration measurement of hazardous gas. A hardware platform solution with compatibility and scalability is proposed in the paper. The customized communication protocol and applications oriented...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Facebook Page Spam Detection using Support Vector Machines based on n-gram Model

    With social networks like Facebook, twitter reaching to the common masses, these have become the best target for spammers. The newest way to mislead and fraud viewers is page spam. Viewers are deceived to click on links to spam their connections, redirect to a fraudulent business or spread wrong information...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    A Review of the Problems and Impacts Related to Network Voids in Wireless Sensor Networks

    In this paper, an exploratory study has been conducted to understand the various aspects of the network void problem. This paper provides insights into multiple research questions, which include how and why each void problem occurs. The authors have covered ten void problems (i.e., coverage voids or holes, routing voids...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Oscillation Characteristics of the Multi-stage Learning for the Layered Neural Networks and Its Analysis

    In this paper, the authors propose an efficient learning method for the layered neural networks based on the selection of training data and input characteristics of an output layer unit. The multi-stage learning method proposes by the authors for the function approximation problems of classifying learning data in a phased...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    GINS: Dynamic Emissive Location-Based for Underwater Sensor Networks

    Due to collect and monitor exploration of natural location resources which was difficult to acquire the location without Global Position System (GPS) in the underwater. However, there are something research was used Inertial Navigation System (INS) to location, but the INS accuracy degrades over time that the issue will be...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    The Use of Big Data in Education

    In this paper, the authors will see the use of big data and open data in education. Also how big amount of data can be used and extracted to something useful, helping the industry to raise their profits. This paper is a study on the use of big data in...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Testing Security Policies for Distributed Systems: Vehicular Networks as a Case Study

    Due to the increasing complexity of distributed systems, security testing is becoming increasingly critical in insuring reliability of such systems in relation to their security requirements. To challenge this issue, the authors rely in this paper on model based active testing. In this paper, they propose a framework to specify...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    QoS Safety Protocol Analysis in FHAMIPv6/MPLS/Diffserv Integration and Load Balancing Algorithm

    One of the most important aspects to consider in order to provide quality services in an ad hoc network is the security. In the integration FHAMIPv6/MPLS/DiffServ and congestion algorithms, the authors analyses QoS but do not consider the QoS safety. The security issue is essential for not degrade QoS. This...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Validating Predictive Performance of Classifier Models for Multiclass Problem in Educational Data Mining

    Classification is one of the most frequently studied problems in data mining and machine learning research areas. It consists of predicting the value of a class attribute based on the values of other attributes. There are different classifications models were proposed in Educational Data Mining (EDM) and it is used...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Applying GIS Concepts to a Pervasive Game: Spatiotemporal Modeling and Analysis Using the Triad Representational Framework

    Given pervasive games that maintain a virtual spatiotemporal model of the physical world, game designers must contend with space and time in the virtual and physical. Previous papers on pervasive games have partially contended with these representations, but an integrated conceptual model is lacking. Because they both make use of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    Software Architectures: A Comparative Study for Web Based Applications

    Correct architecture is the backbone of the successful software. To address the complexity of the growing software there are different architectural models that are designed to handle this problem. The most important thing is to differentiate software architecture from software design. As the web based applications are developed under tight...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    Design of an Ultra-Wideband Antenna Using Split Ring Resonator

    In this paper, the authors present a novel patch antenna using circular split ring resonator for ultra-wideband applications. The radiating element of the proposed antenna is a Split-Ring Resonator (SRR). The geometrical parameters are optimized to reach the best electromagnetic properties, with a small size (30 mm

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    Performance of COFDM Technology for the Fourth Generation (4G) of Mobile System With Convolutional Coding and Viterbi Decoding

    The Fourth Generation (4G) of mobile cellular system network is growing very fast and new services come-up, so intelligent way of visualization and managing the 4G network and service states are required. In this paper, Coded Orthogonal Frequency Division Multiplexing (COFDM) scheme using convolutional coding with different code rates and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    Performance Analysis of the Proxy Mobile IPv6 (PMIPv6) and Multiprotocol Label Switching (MPLS) Integration

    In this paper, the authors analyze and develops the integration of the PMIPv6 (Proxy Mobile IPv6) and MPLS (Multi-Protocol Label Switching) protocols in order to determine the impact at the time of handover in an IP micro mobility environment. The proposed integration suggests the establishment of abidirectional Label Switched Path...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    A Literature Review and Comparative Analyses on SQL Injection: Vulnerabilities, Attacks and Their Prevention and Detection Techniques

    SQL injection is a technique that exploits a security vulnerability occurring in the database layer of an application. The attack takes advantage of poor input validation in code and website administration. It allows attackers to obtain unauthorized access to the back- and database to change the intended application generated SQL...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    An Efficient Protective Layer Against SQL Injection Attacks

    In this paper, the authors present a detailed discussion on different SQL injection attacks and their prevention technique. In addition, they proposed a new scheme for prevention of SQL injection attack, which consist of three blocks or three tier architecture: the clients, the application server and the database server. Their...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    Performance Analysis of LTE Physical Layer Based on 3GPP-Release-8

    Long Term Evolution (LTE) is the last step towards the 4th generation of cellular networks. This revolution is necessitated by the unceasing increase in demand for high speed connection on LTE networks. This paper mainly focuses on performance evaluation of LTE physical layer to study and analysis the effect of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    Performance Evaluation of Some Routing Protocols Using TCP Traffic Types in Mobile Ad Hoc Networks

    Routing is a critical issue in a Mobile Ad-hoc NETwork (MANET). The most famous MANET routing protocols are AODV, DSDV, DSR and AOMDV. Although the performance evaluation of these routing protocols have been extensively simulated, most of the researchers are focusing on the User Datagram Protocol (UDP) traffic type supposing...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    Performance Evaluation of HEVC Over Broadband Networks

    High efficiency video coding is the current trend setting standard for coding and transmission of video content. This standard has brought in many improvements over its predecessor H264 standard. In this paper, performance evaluation of transmitting HEVC content over the simulated network environment for disaster and calamity stricken area has...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    A Survey of VPN Security Issues

    Recently secure access to the private sources is considered as of the essential needs. Thus, one of the most efficient and cost-effective ways for granting secure access needs from far path in the organizations is the use of VPN. Data security plays a crucial role in modern times; most business...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2011

    A Security Framework for Buddy System Based MANET Address Allocation Scheme

    Security for dynamic address allocation service in Mobile Adhoc Networks is still an open issue. This paper proposes a security framework to thwart all possible attacks related to the buddy system based Distributed Dynamic Address Assignment Protocol (DDAAP) proposed by Thoppian and Prakash. The authors' proposed protocol called SHEAP (Secured...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2011

    Energy-Aware Performance Metric for AODV and DSDV Routing Protocols in Mobile Ad-Hoc Networks

    In Mobile Ad-Hoc NETworks (MANETs), mobile devices are equipped with power (energy). In order to utilize this energy equipped devices efficiently for transmission of data packets, many energy aware routing strategies are followed. As a key note to these routing strategies, the energy aware performance metrics are analyzed on two...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2011

    Design of an Energy Efficient Routing Protocol for MANETs Based on AODV

    Mobile Ad Hoc NETworks (MANETs) also called mesh networks are self-configuring networks of mobile devices connected by wireless links. MANETs are deployed in situations where there is no existing infrastructure, such as emergency search and rescue, military, etc. Each application has a different set of requirements. In this paper, the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2011

    Performance Evaluation of Efficient MAC in Mobile Ad Hoc Wireless Networks

    Wireless media is in very much demand because of high mobility of the users and establishing ad hoc network in emergency situations, which requires the designing of an efficient and priority based MAC (Medium Access Protocol) as a resource to support MANET (Mobile Ad hoc NETworks) adequately. There are various...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2011

    Real Time Communication Capacity for Data Delivery in Wireless Sensor Networks

    Real-time applications are performance critical applications that require bounded service latency. In multi-hop wireless ad-hoc and sensor networks, communication delays are dominant over processing delays. Therefore, to enable real-time applications in such networks, the communication latency must be bounded. In this paper, the authors derive expressions of real-time capacity that...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    Encrypted IT Auditing and Log Management on Cloud Computing

    In this paper, the authors are conducting the investigation studies over the IT auditing for assuring the security for cloud computing. During this investigation, they are implementing working of IT auditing mechanism over the cloud computing framework in order to assure the desired level of security. In the IT auditing...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    Decentralized Lifetime Maximizing Tree With Clustering for Data Delivery in Wireless Sensor Networks

    A wireless sensor network has a wide application domain which is expanding everyday and they have been deployed pertaining to their application area. An application independent approach is yet to come to terms with the ongoing exploitation of the WSNs. In this paper, the authors propose a decentralized lifetime maximizing...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    Bandwidth Estimation in Mobile Ad-Hoc Network (MANET)

    In this paper, the authors presents bandwidth estimation scheme for MANET, which uses some components of the two methods for the bandwidth estimation: "Hello Bandwidth Estimation" & "Listen Bandwidth Estimation." This paper also gives the advantages of the proposed method. The proposed method is based on the comparison of these...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    Implementation of Re-Configurable Digital Front End Module of MIMO-OFDM Using NCO

    This paper focuses on FPGA implementation of reconfigurable Digital Front end MIMO-OFDM module. The modeling of the MIMO-OFDM system was carried out in MATLAB followed by Verilog HDL implementation. Unlike the conventional OFDM based systems, the Numerically Controlled Oscillators (NCO) is used for mapping modulated data onto the sub carriers....

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    A Detailed Study on Energy Efficient Techniques for Mobile Adhoc Networks

    The performance of wireless networks in the applications like transferring video files is subjected to dual constraints. Both minimization of power and other QoS requirements like delay, throughputs are have to be take care properly. Mobile Ad Hoc Networks are more perceptive to these issues where each mobile device is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    Power Optimization in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) consist of a network of wireless nodes that have the capability to sense a parameter of interest. Sensors of various types are deployed ubiquitously and pervasively in varied environments such as office buildings, wildlife reserves, battle fields, mobile networks, etc. The sensed parameter is relayed to...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    Comparative Performance Analysis of Different Radio Channel Modelling For Bluetooth Localization System

    This paper studied the possibility in a Bluetooth network of using channel simulated results as alternatives to on-site measurements and compares the average localization error as a function of a radio map resolution for the free-space path loss wall Attenuation Factor and Ray-Tracer (RT) models. Three reference radio maps were...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    Obstacle Based Range-Free Localization-Error Estimation for WSN

    The projected paper considers a range-free localization protocols for the wireless sensor networks that highlights the localization irrationality problem in presence of obstruction. Here in the authors' proposed research work the mobile anchor node is assumed to have the evidence of their position where an interaction protocol is considered. The...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    RGWSN: Presenting a Genetic-Based Routing Algorithm to Reduce Energy Consumption in Wireless Sensor Network

    In this paper, a genetic-based routing algorithm to reduce energy consumption in sensor networks is presented. This method, by regarding distances hybrid parameters, energy and density, has created a fitness function which has optimal conditions compared to previous parameters. In the proposed algorithm, a new technique to select several probable...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    Performance Modeling and Analysis of Distributed-Based Polling Networks

    In this paper, the performance evaluation of distributed polling networks using the analytical equations and a developed simulation model is considered. The exhaustive service versus K-limited service are also investigated and compared. Other main measurements such as average cycle time, walking time are also compared and calculated. In general, the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    Non DTN Geographic Routing Protocols for Vehicular Ad Hoc Networks

    Vehicular Ad Hoc Networks are highly mobile wireless ad hoc networks. Routing of data in VANETs is a challenging task due to rapidly changing topology and high speed mobility of vehicles. Geographic routing protocols are becoming popular due to advancement and availability of GPS devices. In this paper, the authors...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    A Graphical Password Based System for Small Mobile Devices

    Passwords provide security mechanism for authentication and protection services against unwanted access to resources. A graphical based password is one promising alternatives of textual passwords. According to human psychology, humans are able to remember pictures easily. In this paper, the authors have proposed a new hybrid graphical password based system,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    A Comparative Study of Multi-Hop Wireless Ad-Hoc Network Routing Protocols in MANET

    Mobile Ad-hoc NETwork (MANET) is a collection of wireless mobile hosts forming a temporary network without the aid of any stand-alone infrastructure or centralized administration. Most of the proposed MANET protocols do not address security issues. In MANETs routing algorithm is necessary to find specific routes between source and destination....

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    An Efficient Algorithm for the Nearest Neighbourhood Search for Point Clouds

    This paper presents a high-performance method for the k-nearest neighbourhood search. Starting from a point cloud, first the method carries out the space division by the typical cubic grid partition of the bounding box; then a new data structure is constructed. Based on these two previous steps, an efficient implementation...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    Improved Free-Form Database Query Language for Mobile Phones

    This paper explains that it is possible to develop a database query formulation system for mobile phones which accepts unplanned queries, by allowing imprecise inputs. Since cell phones are poor in terms of resources as compared to other devices, the success of implementing such a method on them would mean...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    Architectural Model of Localization in Multi-Scale Communication for Wireless Sensor Networks

    There are several range-based localization algorithms that identify sensor's positions for different wireless sensor networks. In this paper, the authors propose the approach that highlights a new method of localization scheme to achieve high localization accuracy in the presence of radio irregularity and obstacles effects for wireless sensor networks. They...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    Comparative Study of 3G and 4G in Mobile Technology

    Mobile communication is one of the hottest areas and it is developing extremely fast in present times, thanks to the advances of technology in all the fields of mobile and wireless communications. Nowadays the use of 3G mobile communication systems seem to be the standard, while 4G stands for the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    Energy Efficient Clustering Algorithms in Wireless Sensor Networks: A Survey

    To maximize network lifetime in Wireless Sensor Networks (WSNs) the paths for data transfer are selected in such a way that the total energy consumed along the path is minimized. To support high scalability and better data aggregation, sensor nodes are often grouped into disjoint, non overlapping subsets called clusters....

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    Modelling an Enhanced Routing Protocol for Wireless Sensor Networks Using Implicit Clustering Technique

    The localization of sensor nodes can be a very enabling technology that can help in improving the performance of many algorithms designed for Wireless Sensor Networks (WSNs). This paper is geared towards developing a positioning system that uses received signal strength based on fingerprinting technique. The proposed system models the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    Study of Performance of the Combined MIM0 MMSE VBLAST-OFDM for Wi-Fi (802.11n)

    Wireless technologies such as Wi-Fi and Bluetooth have transformed the world of networks, and this technical revolution is still in its infancy. Wi-Fi (802.11b and g) now offers a limited range. It is also very susceptible to interference originating DECT phones and other wireless units. Finally, the Wi-Fi in its...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    Performance of MIMO VBLAST-OFDM in Ka-Band

    Technological advances have allowed the use of Ka-band for transmission in 30 GHz uplink and 20 GHz at downlink. The use of Ka-band has advantages over lower frequency bands; it allows a wider bandwidth and therefore a greater flow to pass. In addition, multi-beams technology allows a wide reuse frequency,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    Implementing and Managing Framework for PaaS in Cloud Computing

    With the rapid development of Internet and Cloud computing, there are more and more network resources. Sharing, management and on-demand allocation of network resources are particularly important in Cloud computing. Platform as a Service (PaaS) is one of the key services in Cloud computing. PaaS is very attractive for schools,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    Design and Implementation of a Platform for Location-Based Services: A Case Study of GIS of Archaeological and Handicraft of Fez Medina

    The Location-Based Services (LBS) allow users on the go with access to geographic data from micro-laptops, tablet PCs, Personal Digital Assistants (PDA). These services refer to technologies GPRS2 UMTS3 and can use data on the spatial location of GPS devices in map. This paper presents a platform dedicated to the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2011

    Object-Based Video Compression Using Neural Networks

    This paper presents a new object-based video compression approach. It consists on predicting video objects motions throughout the scene. Neural networks are used to carry out the prediction step. A multi-step - ahead prediction is performed to predict the video objects trajectories over the sequence. In order to reduce video...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2011

    The Improvement of the Semantic Classification Tool to a SOA to Ensure a Better Tutoring

    For a best collaboration between tutor and learner and relatively to discussion forum, the authors have proposed to tutor a semantic classification tool of messages, which helps him to manage the mass of messages accumulating during the time. The tool provides a semantic classification mechanism based on a chosen theme....

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2011

    Fuzzy Logic Approach for Threat Prioritization in Agile Security Framework Using DREAD Model

    For a qualitative system sound security practices must be a crucial part throughout the entire software lifecycle. Furthermore, agile software development has paved the way for overcoming the problems faced by developers during traditional development process. In the given paper, the authors are using an Agile Security Framework that is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2011

    Ontology Based Qos Driven Web Service Discovery

    In today's scenario web services have become a grand vision to implement the business process functionalities. With increase in number of similar web services, one of the essential challenges is to discover relevant web service with regard to user specification. Relevancy of web service discovery can be improved by augmenting...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2011

    Minimizing the Switch and Link Conflicts in an Optical Multi-Stage Interconnection Network

    Multistage Interconnection Networks (MINs) are very popular in switching and communication applications. A MIN connects N inputs to N outputs and is referred as an N ? N MIN; having size N. Optical Multistage Interconnection Network (OMIN) represents an important class of Interconnection networks. Crosstalk is the basic problem of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2011

    A New Improved Particle Swarm Optimization Algorithm for Multiprocessor Job Scheduling

    Job Scheduling in a Multiprocessor architecture is an extremely difficult NP hard problem, because it requires a large combinatorial search space and also precedence constraints between the processes. For the effective utilization of multiprocessor system, efficient assignment and scheduling of jobs is more important. This paper proposes a new Improved...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2011

    Enhanced Hierarchical Clustering for Genome Databases

    Clustering techniques find interesting and previously unknown patterns in large scale data embedded in a large multi dimensional space and are applied to a wide variety of problems like customer segmentation, Biology, data mining techniques, machine Learning and geographical information systems. Clustering algorithms are used efficiently to scale up with...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2011

    Disjoint Paths Multi-Stage Interconnection Networks Stability Problem

    This research paper emphasizes that the Stable Matching problems are the same as the problems of stable configurations of Multi-stage Interconnection Networks (MIN). The authors have solved the Stability Problem of Existing Regular Gamma Multistage Interconnection Network (GMIN), 3-Disjoint Gamma Multi-stage Interconnection Network (3DGMIN) and 3-Disjoint path Cyclic Gamma Multi-stage...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2011

    Design of an Optical Character Recognition System for Camera-Based Handheld Devices

    This paper presents a complete Optical Character Recognition (OCR) system for camera captured image/graphics embedded textual documents for handheld devices. At first, text regions are extracted and skew corrected. Then, these regions are binarized and segmented into lines and characters. Characters are passed into the recognition module. Experimenting with a...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2011

    Generation of Test Cases From Software Requirements Using Combination Trees

    Requirements play an important role in conformance of software quality, which is verified and validated through software testing. Usually the software requirements are expressed natural language such as English. In this paper, the authors present an approach to generate test case from requirements. Their approach takes requirements expressed in natural...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2011

    Mining Databases on World Wide Web

    The power of the WWW comes not simply from static HTML pages - which can be very attractive, but the important first step into the WWW is especially the ability to support those pages with powerful software, especially when interfacing to databases. The combination of attractive screen displays, exceptionally easy...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    MVSDAP: A New Extensible, Modifiable and Secure Data Access Pattern for Layered Information Systems

    Nowadays, in software architecture especially in agile methodologies dynamicity, extendibility and modifiability are important challenges. In three layered architecture, plenty of patterns are provided for data access layer. In this paper, additional to secure access to data and dynamic validation controls, emphasis is on extendibility and modifiability of data access...

    Provided By International Journal of Computer Science Issues