International Journal of Computer Science Issues

Displaying 41-80 of 870 results

  • White Papers // May 2014

    Mob-AIDS: An Intrusion Detection System for the Android Mobile Enterprise

    Researches in the development of efficient security models, policies and standards for the Android platform has increased significantly in recent times. Android suffers from the widespread security threats and malware due to the lack of efficient security tools for protection. However, recent studies on android mobile platform security stressed that...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2014

    A Formal Composition of a Distributed System with its Security Policy

    Now-a-days, information systems are becoming a vital and strategic component of any organization. However, in most cases, these systems are designed and implemented without taking into consideration security aspects. To ensure a certain level of security, the behavior of a system must be controlled by a \"Security policy\". This paper...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2014

    Organizing Software Architecture Based Measurement Analysis (OSAMA) Model

    Today's software engineering organizations seek to develop and improve the models that follow and are trying in various ways to reach the highest levels of quality in order to achieve user satisfaction. Organizing Software Architecture based Measurement Analysis (OSAMA) model provides a way that allows a great control on management,...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2014

    A Review Study of Hierarchical Clustering Algorithms for Wireless Sensor Networks

    The hierarchical clustering is an efficient way to reduce the overall energy consumption within the cluster by performing aggregation and fusion of data. Hence, the amount of transmitting information to the base station is decreased. Clusters create hierarchical Wireless Sensor Networks (WSNs) which facilitate efficient utilization of limited resources of...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2014

    Impacts of Linear Mobility on MANETs Routing Performance Under Different Network Loads

    Routing is the biggest challenge and significant area of research within ad hoc networks due to nodes mobility, dynamic topology, frequent link breakage, limitation of nodes (memory, battery, bandwidth, and processing power), and lack of central point like base stations or servers. Analyzing and comparing different MANET routing protocols give...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2014

    SwarmDroid: Swarm Optimized Intrusion Detection System for the Android Mobile Enterprise

    The inadequacies inherent in the current defense mechanism of the mobile enterprise led to the development of new breed of security systems known as mobile intrusion detection system. The major worry of mobile/ubiquitous device users is the issue of data security since no mobile security application is 100% efficient. Existing...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2014

    Network Mapping of SME's in Borobudur Cluster Using Social Network Analysis for Strengthening Local Economic Development Platform

    The Small and Medium Enterprise (SMEs) has a strategic role that could have a significant contribution in improving the prosperity of the society. The government has tried to empower SMEs through forming a forum in which those SMEs stakeholders could communicate to grow their businesses for economic community development. Whether...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2014

    Data Integrity Issues in Cloud Servers

    In the past few years cloud has become the buzzword in computing. But this wide acceptance and ease of use exposed the new IT based technology into a number of data integrity (correctness of data) and security issues. Integrity of user data in the cloud servers is one of the...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2014

    Comparing Priority and Round Robin Scheduling Algorithms

    Computer usage has come increasing with time. Now-a-days everybody needs to work with lots of programs at the same time and unfortunately this leads to slowing down the work. So software developers have to find a way how deal with workflows. At first, when the author chose this theme, the...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2014

    Overall PAPR Reduction for MIMO OFDM Systems

    Multiple Input Multiple Output (MIMO) Orthogonal Frequency Division Multiplexing (OFDM) systems have been receiving a great attention as one of the solutions for achieving high speed, efficient, and high quality of service wireless communications. However, the main drawback of MIMO OFDM systems is high Peak to Average Power Ratio (PAPR)...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2014

    Enhancing E-mail Filtering Based on GRF

    Feature selection is a problem of global combinatorial optimization in machine learning in which subsets of relevant features are selected to realize robust learning models. The implying of irrelevant and redundant features in the dataset can result in poor predictions and misclassification process. Thus, selecting relevant feature subsets can help...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2014

    Study on Productive Process Model Basic Oxygen Furnace Steelmaking Based on RBF Neural Network

    The endpoint temperature and carbon content of Basic Oxygen Furnace (BOF) are the control of the BOF steelmaking process. There exists a complex relationship among them and each control variable. While the multiple linear model is limited to predict the endpoint temperature and carbon content through each control variable, and...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2014

    Efficiency of Gaussian Pyramid Compression Technique for Biometric Images

    Images in their uncompressed form require large amount of storage capacity and uncompressed data needs large transmission bandwidth for the transmission. Image compression technique is used to reduce the storage requirement per image, while maintaining image quality. The proposed method investigates biometric image compression using Gaussian Pyramid Compression (GPC) in...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2014

    An Efficient Genetic Algorithm Based Clonal Selection and Hill Climbing for Solving QoS Multicast Routing Problem

    Quality of Service (QoS) multicast routing is essential for many network applications such as IPTV, Internet radio, multimedia broadcasting, and real-time telecommunication. Multicast routing involves transport of information from one single sender to multiple destinations. There are two requirements of multicast routing in many multimedia real time applications: one is...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2014

    Enhancement of Web Proxy Caching Using Random Forest Machine Learning Technique

    Web proxy caching plays a significant part in improving Web performance by conversing web objects that are likely to be visited again in the proxy server close to the user. The random forest tree is an ensemble learning method for Web data classification. In this paper, the authors attempt to...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2014

    Performance Evaluation of the Effect of Primary Users on the Rendezvous Process for Cognitive Radios

    The rendezvous process is an essential process for establishing a communication link between two nodes in cognitive radio networks. A number of rendezvous protocols have been developed in the last few years. However, many protocols ignore one of the basic constraints of cognitive radio networks which are the impact of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    Scalable and Efficient Self-Join Processing Technique in RDF Data

    Efficient management of RDF data plays an important role in successfully understanding and fast querying data. Although the current approaches of indexing in RDF Triples such as property tables and vertically partitioned solved many issues; however, they still suffer from the performance in the complex self-join queries and insert data...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    Combining Clustering Solutions With Varying Number of Clusters

    Cluster ensemble algorithms have been used in different field like data mining, bioinformatics and pattern recognition. Many of them use label correspondence as a step which can be performed with some accuracy if all the input partitions are generated with same k. Thus these algorithms produce good results if this...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    Real-Time Scheduling Algorithm Based on Dynamic Priority for Multi-Data Transmission

    In response to the demands of heterogeneous data acquisition, data transmission effectiveness and reliability in emergencies as well as environmental wireless monitoring etc., this paper presents a data transmission queue optimization algorithm based on dynamic priority. The algorithm dynamically assign priorities to different data according to their importance, historical transmission...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    A Dynamic Materialized View Selection in a Cloud-Based Data Warehouse

    A data warehouse is system which that support decision-making in production environment. Classical data warehouse management system is often optimized by improving query performance. Such improvement is casually achieved by using caches, indexes and materialized views and required selecting the best set of data structures (materialized views, indexes, etc...). In...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    Multi-Level Service Composition in Supervised Cloud Computing

    The role of AN agent system in an exceedingly cloud network is to spot the simplest obtainable resources and share them through a service created accessible over the net. Hence they act as inter-mediator for providing cloud services to varied users. The cloud service customers determine numerous service compositions through...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    Defending the Sensitive Data Using Lattice Structure in Privacy Preserving Association Rule Mining

    Innovation of association rules from enormous databases ensures benefits for the enterprises since such rules can be very operative in enlightening the knowledge that leads to tactical decisions. Association rule mining has acknowledged a proportion of attention in the collaborative business community and several algorithms were proposed to improve the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    Mobile Agent Systems, Recent Security Threats and Counter Measures

    Mobile agent technology offers a dramatically evolving computing paradigm in which a program, in the form of a software agent, can suspend its execution on a host computer, transfers itself to another agent-enabled host on the network, and resumes execution on the new host. It is 1960's since mobile code...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    Design & Modeling of Hidden Nodes WLAN and MAC Layer Protocol Simulated By NS-2

    In wireless network, the authors are facing a problem to transmitting simultaneously to same receiving node. So that performance of network not same as normal network (may be central control or ad-hoc network). Normally, such type problem solves MAC layer protocol using Ready-To-Send/Clear-To-Send (RTS/CTS), but not only RTS/CTS, also need...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    Importance of Software Testing in Software Development Life Cycle

    Software development life cycle is a structure imposed on the development of a software product. Software development life cycle is closely linked to what has come to known as structured analysis and design. Testing is an important part of software development. Testing should be started as early as possible to...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    A Practical Approach to Infuse Security Patterns into Undergraduate Software Engineering Course Projects

    In this paper, the authors introduce the use of security patterns as a teaching aid to help software engineering students better understand and solve security problems. With the wide spread use of various applications in different domains and industries security is a growing problem that requires swift address. The lack...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    A Survey of Bandwidth Optimization Techniques and Patterns in VoIP Services and Applications

    As internet telephony unveils a communication system that allows for the conduction and reception of voice signals and data over the internet network, the volume of voice traffic and (or) packets on IP networks have grown substantially. However, a crucial problem imminent is that of inefficient bandwidth utilization which is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    Knowledge-Based Software System for Space Exploration

    It has been observed that transformation in space exploration is done by various innovations in robotic spacecraft. Space exploration using spacecraft are becoming software-intensive supporting remote-control, increased productive science gathering and analysis, good troubleshooting during flight accelerated understanding of universe. Furthermore, software engineering approach will also incorporate in this system,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    High Capacity Information Hiding System for Encrypted Text Message Using Pixel Intensity Based LSB Substitution Technique

    In this paper, the authors present the spatial domain image steganography based embedding system using different pixel intensities. Here, the efforts have been done to combine cryptography with the steganography for imparting better security to the proposed system. Various performance measures like peak signal to noise ratio, mean square error...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    Artificial Bee Colony Based Multifeature Recognition

    In this paper, the authors present a new approach to improve the recognition performance of existing authentication systems based on palmprint. The technique presented extracts multiple features namely, minutiae, texture and ridge from the palmprint image using novel algorithms. The images are then classified using artificial bee colony classifier. The...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    DP-UREA: An Algorithm for Autonomous Reorganization of Mobile Sensor Nodes to Improve Coverage

    Stochastic deployments of mobile Wireless Sensor Networks (WSNs) are practical in harsh fields, disaster areas, toxic urban regions or hostile environments where human reachability or intervention is impossible, and WSN deployment cannot be performed manually. These deployments may not always lead to effective coverage or; result in a connected network....

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    Cognitive Radio Handover in Cellular Networks

    In cellular networks the continuity of communication has high significance in real-time services, therefore, the HandOver (HO), transferring communication from one base station to another one, always has been the main concept of all mobile's generations. In cellular networks for avoidance of frequency interference, different channel allocation scheme are proposed;...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    Probabilistic Multicast Trees in Different Network Topology Environments

    Node loss and congestion changes the performance characteristics of the multicast trees. Probabilistic Multicast Trees (PMT) makes use of performance feedback, generates a probability of usage for each multicast tree based on that feedback and then makes intelligent choices about which multicast tree to use for a given packet in...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    Investigating Software Maintainability Development: A Case for ISO 9126

    Software maintainability has been considered as a main characteristic in many software product quality models. However, these models have different definitions for maintainability and sub characteristics. ISO 9126 is one of the main and most frequently used models in software product quality. This model has been revised and replaced by...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    Tree Reconfiguration without Lightpath Interruption in Wavelength Division Multiplexing Optical Networks with Limited Resources

    Today, operators use reconfiguration to improve the performance of connection oriented networks. In the authors' paper, they studied tree reconfiguration without data flow interruption in wavelength division multiplexing optical networks. In their previous approach, the available resources of the network (wavelengths) are not considered as limited. In this paper, they...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    Assessing the Feasibility of Approximating Higher-Order Problem Signatures in Artificial Neural Networks With Hybrid Transfer Functions

    Problem signatures are patterns that reveal a glimpse of the computational strategy most likely to be suitable for a given problem. Such a pattern could be the preferred choice of the activation and output functions for a given problem in neural networks that implement transfer functions optimization. The authors refer...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    An Exploration Scrutiny of Systems Performance Monitoring Tools: An Applications and Agentless Server Approach

    Performance monitoring tools play a critical role in the overall productivity of business organizations by providing the necessary means of measuring the performance of the system or server attributes of the organization. They measure system or server throughput and processor usage through programmed software or technological platforms. Their monitoring is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    A Comprehensive Review for Disk Scheduling Algorithms

    This paper aims to discuss the structure of a disk and the hardware activities involved in the retrieval of data on a direct access storage device. Tackles and compute the different Disk Scheduling algorithms such as First Come First Serve (FCFS), Shortest Seek Time First (SSTF), Scan, Look, Circular Scan...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Presenting a Novel Method for Mining Association Rules Using Binary Genetic Algorithm

    Today, mining association rule is one of the important data mining algorithms which enable managers to make correct decisions based on the knowledge obtained from the detected patterns by databases. Traditional algorithms of discovering association rules such as Apriori and FP-growth may extract millions of rules from databases, many of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    A Pattern Based Methodology for Evolution Management in Business Process Reuse

    Today, there are Process-Aware Information Systems (PAIS) with a set of business process models which vary over time to meet the new requirements. In a competitive environment, the key challenge of enterprises is to reduce the cost and time of process design and application development. For this purpose, research on...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Reliable and Efficient Routing Using Adaptive Genetic Algorithm in Packet Switched Networks

    To identify the optimal route is a complex task in packet switched network because optimization depends upon a number of parameters. In this paper Genetic Algorithm is used to locate the optimal route. Genetic Algorithm starts with a number of solutions where each solution is represented in the form of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Human Iris Segmentation for Iris Recognition in Unconstrained Environments

    This paper presents a human iris recognition system in unconstrained environments in which an effective method is proposed for localization of iris inner and outer boundaries. In this method, after pre-processing stage, circular Hough transform was utilized for localizing circular area of iris inner and outer boundaries. Also, through applying...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    A Conventional Authentication in Key Management Using Progressive Approach

    Secure and reliable group communication is an increasingly active research area prompted by the growing popularity of many types of group-oriented applications. The main building block to achieve security in group communication scenarios is management of the secret information that should be known only to group members involved in communication....

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Serious Security Weakness in RSA Cryptosystem

    Nowadays, RSA is the well-known cryptosystem which supports most of electronic commercial communications. RSA is working on the base of multiplication of two prime numbers. Currently different kinds of attacks have identified against RSA by cryptanalysis. This paper has shown that regardless to the size of secret key and public...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Design and Implementation of Mobile IPv6 Data Communication in Dual Networks

    Dual Stack Mobile IPv6 is an extension of Mobile IPv6 to support mobility of devices irrespective of IPv4 and IPv6 Networks. This is implemented by combining different modules. IPv4 private networks are behind Network Address Translation (NAT) devices. So, to bypass the Binding Update and Binding Acknowledgment by NAT, the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    A Data Transfer in Wireless Sensor Networks Using AODV Protocol

    Sensor networks present unique opportunities for a broad spectrum of applications such as industrial automation, situation awareness, tactical surveillance for military application and environmental monitoring, chemical/biological detection etc. Sensor Network can monitor ambient condition such as temperature, sound, light and others. Information is collected from many sensor devices for further...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    An Advanced Survey on Cloud Computing and State-of-the-Art Research Issues

    Cloud Computing is considered as one of the emerging arenas of computer science in recent times. It is providing excellent facilities to business entrepreneurs by flexible infrastructure. Although, cloud computing is facilitating the Information Technology industry, the research and development in this arena is yet to be satisfactory. The authors'...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Usability of Collaborative Web Surfing Systems in e-Research

    Software's developed for the e-Research are generic in nature and are used in diverse application context. The Usability evaluation becomes more severe for that type of software's. In this paper, the authors focus on e-Research application based software on small scale to evaluate the quality assessment in accordance to the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Search Engine Optimization With Google

    Search engine optimization is a strategical technique to take a web document in top search results of a search engine. Online presence of an organisation is not only an easy way to reach among the target users but it may be profitable too if optimization is done keeping in view...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    An Empirical Study of Underwater Acoustic Sensor Network and Terrestrial Wireless Network

    Two third of the earth is covered with water and there has been a growing interest in monitoring underwater medium for scientific exploration and attack protection. Underwater sensor nodes will find application in ocean-graphic data collection, pollution monitoring, disaster prevention and tactical surveillance application. Underwater network consist of a variable...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Hole Detection for Increasing Coverage in Wireless Sensor Network Using Triangular Structure

    The emerging technology of Wireless Sensor Network (WSN) is expected to provide a broad range of applications, such as battlefield surveillance, environmental monitoring, smart spaces and so on. The coverage problem is a fundamental issue in WSN, which mainly concerns with a fundamental question: how well a sensor field is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Modified Secret Sharing Over a Single Path in VoIP With Reliable Data Delivery

    Voice over Internet Protocol (VoIP) is a new fancy and up growing technology. A major change in telecommunication industry is VoIP. The transmission of Real time voice data is not as easy as ordinary text data. The real time voice transmission faces lot of difficulties. It suffers from packet loss,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Implementation of Location Based Services in Android Using GPS and Web Services

    Location based Services offer many advantages to the mobile users to retrieve the information about their current location and process that data to get more useful information near to their location. With the help of A-GPS in phones and through Web Services using GPRS, Location based Services can be implemented...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Cloud Load Balancing Techniques : A Step Towards Green Computing

    Cloud computing is emerging as a new paradigm of large-scale distributed computing. It is a framework for enabling convenient, on-demand network access to a shared pool of computing resources. Load balancing is one of the main challenges in cloud computing which is required to distribute the dynamic workload across multiple...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    MC-CDMA Scheme in Wi-Fi Environment

    The combination of OFDM and Code Division Multiple Access (CDMA) is seen as an attractive and practical solution to enhance the throughput and/or robustness for future high-speed indoor WLANs. The multi-path Rayleigh channel represents a hostile environment for WLANs communication. So, the authors have proposed the MC-CDMA system to overcome...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    A Comparative Study on Performance Benefits of Multi-Core CPUs Using OpenMP

    Achieving scalable parallelism from general programs was not successful to this point. To extract parallelism from programs has become the key focus of interest on multi-core CPUs. There are many techniques and programming models such as MPI, CUDA and OpenMP adopted in order to exploit more performance. But there is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Mobility Metrics Estimation and Categorization for SNET Protocols

    In the performance assessment of an ad-hoc protocol, the protocol should be verified under genuine circumstances including, but not restricted to, an effective transmission range, inadequate buffer space for the storage of messages, illustrative data traffic models, and a mobility model. Deterioration of average speed as the simulation growths, a...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Using Petri Nets for Resource Management Modeling in the Operating Systems

    Nowadays, with advances in computer science and increase in processor speed, modeling methods have found extensive applications in industrial fields. Petri Nets are one of these modeling methods. Petri Nets are based on graph theory and are applied specifically for concurrent and asynchronous applications. As executable models, they are capable...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Fault Tolerance- Challenges, Techniques and Implementation in Cloud Computing

    Fault tolerance is a major concern to guarantee availability and reliability of critical services as well as application execution. In order to minimize failure impact on the system and application execution, failures should be anticipated and proactively handled. Fault tolerance techniques are used to predict these failures and take an...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    MPLS - A Choice of Signaling Protocol

    Multi Protocol Label Switching (MPLS) is a core networking technology that operates essentially in between Layers 2 and 3 of the OSI model; for this reason, MPLS has been referred to as operating at Layer 2.5. MPLS can overlay existing technologies such as ATM (Asynchronous Transfer Mode) or Frame Relay,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Hierarchal Object Oriented Fault Tolerant Secured and Atomic Mobile Agent Model

    Mobile Agents are soft wares migrating from one node to another to fulfill the task of its owner. Mobility introduces two major challenges in front of mobile agent namely reliability and security. As the agent moves from one node to another the goal to complete its task safely is difficult...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    A New Factorization Method to Factorize RSA Public Key Encryption

    The security of public key encryption such as RSA scheme relied on the integer factoring problem. The security of RSA algorithm is based on positive integer N, because each transmitting node generates pair of keys such as public and private. Encryption and decryption of any message depends on N. Where,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Comparison of Cloud Database: Amazon's SimpleDB and Google's Bigtable

    Cloud Computing can be defined as a service or a platform, or an operating system over the Internet to perform tasks. Database has become a part and parcel of life and is being used in almost every computer application. As it is considered the most basic thing, Cloud Computing offers...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Six Layers Architecture Model for Object Oriented Database

    In this paper, a six layered architecture for object oriented database from access and management point of view is proposed. This architecture model consist of six layers: Interaction layer, Application layer, Administration layer, Security layer, Paging layer, and Virtual layer. The very popular ANSI/SPARC architecture gives three levels that drive...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    A Classical Fuzzy Approach for Software Effort Estimation on Machine Learning Technique

    Software Cost Estimation with resounding reliability, productivity and development effort is a challenging and onerous task. This has incited the software community to give much needed thrust and delve into extensive research in software effort estimation for evolving sophisticated methods. Estimation by analogy is one of the expedient techniques in...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Intelligent Paging Strategy for Multi-Carrier CDMA System

    Subscriber satisfaction and maximum radio resource utilization are the pivotal criteria in communication system design. In multi-Carrier CDMA system, different paging algorithms are used for locating user within the shortest possible time and best possible utilization of radio resources. Different paging algorithms underscored different techniques based on the different purposes....

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Apply Multi-Layer Perceptrons Neural Network for Off-Line Signature Verification and Recognition

    This paper discusses the applying of Multi-layer perceptrons for signature verification and recognition using a new approach enables the user to recognize whether a signature is original or a fraud. The approach starts by scanning images into the computer, then modifying their quality through image enhancement and noise reduction, followed...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    An Efficient and Secure Protocol for Ensuring Data Storage Security in Cloud Computing

    Currently, there has been an increasing trend in outsourcing data to remote cloud, where the people outsource their data at Cloud Service Provider(CSP) who offers huge storage space with low cost. Thus users can reduce the maintenance and burden of local data storage. Meanwhile, once data goes into cloud they...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Performance Evaluation of Fingerprint Identification Based on DCT and DWT Using Multiple Matching Techniques

    The fingerprint is a physiological trait used to identify a person. In this paper, Performance Evaluation of Fingerprint Identification based on DCT and DWT using Multiple Matching Techniques (FDDMM) is proposed. The fingerprint is segmented into four cells of each size 150240. The DCT is applied on each cell. The...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Implementation of Wireless Group Support System in Mobile Healthcare

    In Mobile healthcare service, Wireless Group Support System can assist physicians or nurses in improving the quality of care and saving valuable time for emergency patients. Medical practitioners (often nurses) collect various physiological signals, as well as subjective parameters. Physiological signals may include ECG, EEG, SpO2, temperature, continuous blood pressure...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    TBEE: Tier Based Energy Efficient Protocol Providing Sink and Source Mobility in Wireless Sensor Networks

    In resource constrained Wireless Sensor Networks (WSNs) it is important to utilize energy efficiently. Data dissemination is mainly responsible for the consumption of energy in Sensor Nodes (SNs). The data dissemination protocols for WSNs should reduce the energy consumption of the SNs. Sink and source mobility is the major challenge...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    A Synthetic Heuristic Algorithm for Independent Task Scheduling in Cloud Systems

    In this paper, the authors present a synthetic method based on genetic algorithm, for independent task scheduling in cloud computing systems. Task scheduling is a major issue in large-scale distributed systems that impresses on system performance. For some reasons such as heterogeneous and dynamic features in cloud environment, task scheduling...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    iAgile: A Tool for Database Generation Guided by Graphical User Interface

    The agile development of the database and software systems is highly productive activity; it reduces time consumed, cost and effort invested in project development, but many agile projects do not apply agile practices to database development and still consider it in a serial manner as heavy-weight methodologies exactly work, while...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Study of Reputation Based Defense Mechanism in Peer To Peer Live Streaming

    Peer-to-peer live video streaming systems are having more popularity as the information technology is advancing fast. Peer-to-peer live video streaming systems are like peer-to-peer file sharing system and they are also vulnerable to content pollution attack as file sharing. In this type of attack, the attacker mixes polluted or unnecessary...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Impact of Data Mining in Drought Monitoring

    This paper focuses on association rule mining and decision tree classification in the rainfall and temperature data. The authors have used Apriori association rule mining algorithm with data mining tool WEKA. They have to try to generate Association rules and decision tree model. Data mining is the process of discovering...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Developing an Intelligent User Interaction Development Engine

    This paper presents an Intelligent User Interaction Development (IUID) engine that helps to enhance the structure of the relational database by using artificial intelligence. The IUID consists of two phases, the first phase enhances the user database by comparing it with a well structured pre-defined database, and the second phase...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Operating System Performance Analyzer for Low-End Embedded Systems

    RTOS provides a number of services to an embedded system designs such as case management, memory management, and Resource Management to build a program. Choosing the best OS for an embedded system is based on the available OS for system designers and their previous knowledge and experience. This can cause...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Semantic Analysis of Energy Consumption for Estimating SLA Violation With Virtual Machine Provisioning Schema Using DVFS

    Energy consumption is one of the major expense in IT industry which has attracted the attentions of various data centers which deploys huge quantity of power supply. So attempt to reduce energy utilization is very prime concern in cloud computing as it supports various complex services obeying SLA. In this...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Symmetrical Dispersion Compensation for High Speed Optical Links

    In this paper, the performance of high speed optical fiber based network is analyzed by using Dispersion Compensating Module (DCM). The optimal operating condition of the DCM is obtained by considering dispersion management configurations for the symmetrical system i.e Pre-compensation & Post-compensation. The dispersion compensating fiber (DCF) is tested for...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Improvement the Flatness, Gain and Bandwidth of Cascaded Raman Amplifiers for Long- Haul UW-WDM Optical Communications Systems

    In the present paper, the problem of multi-pumping all Raman amplifier has been investigated to obtain a maximum flatness gain and increases the bandwidth of the cascaded Raman amplifiers over a wide range of optical signal wavelengths for long-haul Ultra-Wide Wavelength Division Multiplexing (UW-WDM) transmission systems due to multi-pumping wavelengths...

    Provided By International Journal of Computer Science Issues