International Journal of Computer Science Issues

Displaying 121-160 of 926 results

  • White Papers // Jan 2014

    Hierarchical Cluster-Based Routing Protocols for Wireless Sensor Networks - A Survey

    Hierarchical cluster-based routing protocols are considered as one of the most efficient routing protocols in Wireless Sensor Networks (WSN) due to its higher energy efficiency, network scalability, and lower data retransmission. In cluster-based routing protocols the network is divided into clusters each with a Cluster Head (CH) that is used...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Developing Web-Based Semantic Expert Systems

    Expert systems have provided solutions to different problems, from strategic planning of marketing to consulting in process reengineering. In general, the majority of studies published are based on advanced techniques of artificial intelligence, using specific languages or tools that require certain knowledge of reasoning processes to model information. With the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Fingerprint Classification Techniques: A Review

    A biometric is the automatic identification of an individual that is based on physiological or behavioral characteristics. Due to its security-related applications and the current world political climate, biometric is currently the subject of intense research by both private and academic institutions. Fingerprint is emerging as the most common and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Validation of Architecture of Migrating Parallel Web Crawler using Finite State Machine

    The process of downloading web pages is known as web crawling. In this paper the authors validate the architecture of migrating parallel web crawler using finite state machine. The method for migrating parallel web crawling approach will detect changes in the content and structure. Also domain specific crawling will yield...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    New Generalized Interval Arithmetic and Its Applications to Structural Mechanics and Electrical Circuits

    In the paper, the authors solve parametric linear systems of equations whose co-efficient are, in the general case, non-linear functions of interval parameters. Here, solution means that they enclose the set of all solutions, the so-called parametric solution set, obtained when all parameters are allowed to vary within their intervals....

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Increase the Efficiency of Network on Chip Using Buffer Sharing Mechanism

    In this paper, the authors propose DAMQSV and DAMQS algorithms for systems-on-chip applications that require an interconnection network. The proposed schemes are based on a DAMQ buffer hardware design. DAMQSV and DAMQS are excellent schemes to optimize buffer management providing a good throughput when the network has a larger load....

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    A Maturity Model for Business Intelligence System Project in Small and Medium-Sized Enterprises: An Empirical Investigation

    In the recent years many studies on maturity model have been carried out. Some refer specifically to maturity models for Business Intelligence (BI). Starting from an analysis of the existing literature, the aim of this paper is to develop a maturity model for the business intelligence system project in Small...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Conceptual Framework for Internet of Things' Virtualization via OpenFlow in Context-aware Networks

    A novel conceptual framework is presented in this paper with an aim to standardize and virtualize Internet of Things' (IoT) infrastructure through the deploying OpenFlow technology. The framework can receive e-services based on context information leaving the current infrastructure un-changed. This framework allows the active collaboration of heterogeneous devices and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Review of Software Reuse Processes

    Clients expect that enterprise software systems, which are continually growing in complexity, are of high quality, with reasonable price and have a short time to market. To find ways to meet with the increasing demands of business, software engineers are forced to find ways to streamline development process. Software reuse...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Cluster Based Data Transfer Strategy for Layered Wireless Sensor Network

    The paper develops a relatively different cluster based data transfer pattern directed to enhance the lifetime of a layered Wireless Sensor Network (WSN). The interactive information flow between layers appears to captivate the resurgence of new definitions in the process of routing and forge attractive corner stone's in communication networks....

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Searching Encrypted Data on Cloud

    Encryption is an optimistic way to preserve the secrecy of the outsource data. On other hand, performing search operation on encrypted data is a complicated job. A lot of encryption techniques have been suggested by researchers to avoid improper usage of unstructured data on the cloud. But still by using...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Development of an Innovative Internet of Things Security System

    Recently, the concept of Internet of Things (IoT) has become the most popular term through the widespread of its applications such as greenhouse and telemedicine monitoring. Actually, building IoT systems requires an accurate infrastructure planning. Furthermore, management and security of these systems are considered as the most important challenges facing...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Performance and Proficiency Analysis for Cloud Storage

    Those who need to store larger amounts of data either for burst periods or for convenient synchronization. Between devices is currently looking at new ways of how to integrate cloud storage services into the data processing applications. The benefits (on-demand access and pricing, elasticity) and the drawbacks (reduced control, increased...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    A Study of Risk Management in Cloud Computing Bank

    Cloud computing apparently helps in reducing costs and providing the scheduling optimal level. In practice however it may confront the problem of unavailability of resources. Taking into consideration the cloud computing bank with its somehow commercial nature, the resources unavailability, such as liquidity risk, remains. In this paper, an attempt...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Dynamic Workload Performance Optimization Model for Multiple-Tenancy in Cloud Systems

    Cloud entails the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer. With this concept it's easy to reduce complexity for the clients as they don't have to handle installations and other...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Investigational Study of 7 Effective Schemes of Load Balancing in Cloud Computing

    With the exponential increase in demands of online applications and services, cloud computing has evolved as a boon in modern information technology. Built over the base of grid and distributed computing, cloud computing offers services to cater the dynamic needs of massive user base. However, with the novelty associated with...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Effective Anomaly Intrusion Detection System Based on Neural Network with Indicator Variable and Rough Set Reduction

    Intrusion Detection System (IDS) is an important tool for the defense of a network against attacks. It monitors the activities occurring in a computer system or network and analyzes them for recognizing intrusions to protect the computer network. Most of the existing IDSs use all of the 41 features available...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    A Succinct Reflection on Data Classification Methodologies

    Classification is a data mining (machine learning) technique used to assign group membership to various data instances. Indeed there are many classification techniques available for a scientist wishing to discover a model for the user's data. This diversity can cause trouble as to which method should be applied to which...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Fuzzy Based Detection and Prediction of DDoS Attacks in IEEE 802.15.4 Low Rate Wireless Personal Area Network

    Detection and prediction mechanism against Distributed Denial of Service (DDoS) attacks is a critical component of any security system in which, these attacks can affect the availability of a node or an entire network. In this paper, the authors focus the detection and prediction mechanism against DDoS attacks in IEEE...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Enhanced Authentication Protocol EAP-TTLS Using Encrypted ECDSA

    The growing trend of wireless networks and risks associated with them has led to the development of authentication and application of stronger cryptographic methods to maintain a more robust security. This paper examined and compared two types of developed authentication protocols to provide an alternative method using strong cryptographic methods....

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Data Hiding over Mobile Phones Using Socket Network Communication

    The mobile phone is considered as wireless means of communication produced by sophisticated modern technology. After expanding use of mobile phones, establishing hidden communication is an important subject of security that has gained increasing importance. Therefore need to adopt the technology more sophisticated and more secret and preserve the information,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Effect of WiMAX Networks on IPTV Technology

    The IEEE 802.16 technology (WiMAX) is a better alternative to 3G or wireless LAN networks for providing last mile connectivity by radio link due to its high data rates, low cost of deployment and large coverage area and ease of Use. With the IEEE 802.16 2005 mobility amendment, WiMAX promises...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Traceability and Data Support in SME Manufacturing

    Appropriate description and implementation of internal part traceability in manufacturing is a complex task. Accurate and real-time traceability from a part to a manufacture, storage, or transport issue is essential to efficient and high-quality operations. With the increasing amount of machine status and product quality information coming from the manufacturing...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    A New Trust Reputation System for E-Commerce Applications

    Robust Trust Reputation Systems (TRS) provide a most trustful reputation score for a specific product or service so as to support relying parties taking the right decision while interacting with an e-commerce application. Thus, TRS must rely on an appropriate architecture and suitable algorithms that are able to improve the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    A Survey on Using Data Mining Techniques for Online Social Network Analysis

    In this paper the authors take into consideration the concepts of using algorithmic and data mining perspective of Online Social Networks (OSNs), with special emphasis on latest hot topics of research area. There are several factors which has made the study of OSNs gain enormous importance by researchers. Few such...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Extending CertificateLess Authentication for Wireless Sensor Networks: A Novel Insight

    Security is quite challenging in Wireless Sensor Networks (WSN) because of their constrained nature in terms of resources such as limited memory, low processing power, limited bandwidth etc. Authentication in low power devices is still considered to be an expensive process. Certificateless signature is one of the approaches to facilitate...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    ERP Success and Logistical Performance Indicators a Critical View:

    In this paper, the authors extract the literature based study on Critical Success Factors (CSF's) in Enterprise Resource Planning (ERP) Implementation, focusing on Supply Chain (SC) logistical performance indicators. The originality of this paper is to make clear identification of CSF's in term of ERP system implementation and the impact...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2013

    Security Issues and Challenges - Cloud Computing

    Cloud computing is in its preliminary stages when the authors respect to its implementation & usage. The reason for this is that the technology is heavily dependent on the high-tech resources that the academicians and researchers find it practically impossible to analyze & test the technology. The basis of the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2013

    Security in Electronic Business

    A crucial area of electronic transactions is the domain of electronic commerce. Yet, a large number of people do not want to transact online as they are not sure of the level of security that the transaction would be provided by the site and the technology used by the sites....

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2013

    An Efficient and Secure Handover Protocol for IEEE 802.16m Networks

    Mobile WiMAX (Worldwide interoperability Microwave Access) requires the re-authentication of mobile stations as they change from one base station to another. IEEE 802.16e uses the Extensible Authentication Protocol (EAP) for authentication and key management. This requires about 1000 ms, therefore, it could not support mobile WiMAX applications such as video...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2013

    IT-Infrastructure of University Based on Cloud Computing

    In this paper, the authors devoted to the organization of e-education environment of the university based on cloud computing. Cloud services and one of its components - a virtual work place introduce innovations in an education system. The introduction and the use of cloud services at the university will significantly...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2013

    Propose HMNIDS Hybrid Multilevel Network Intrusion Detection System

    In this paper, the authors present a proposal Hybrid Multilevel Network Intrusion Detection System (HMNIDS) which is a \"Hybrid Multilevel IDS\", is hybrid because use misuse and anomaly techniques in intrusion detection, and is multilevel since it applies the two detection techniques hierarchal in two levels. First level applies anomaly...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2013

    A Symbol Based Graphical Schema Resistant to Peeping Attack

    Alphanumeric passwords are the most commonly used way of authenticating users in computer systems. One of the disadvantages of alphanumeric passwords is that they are hard to remember. Image passwords have been proposed to aim to make passwords more memorable and easier for users to use and, for this reason,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2013

    The Impact of Indexes on Data Warehouse Performance

    A data warehouse designer should consider the effectiveness of data query, this depends on the selection of relevant indexes and their combination with the materialized views, note that the index selection is a NP-complete problem, because the number of indexes is exponential in the total number of attributes in the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2013

    Semi-Automatic Data Warehouse Design Methodologies: A Survey

    Faced to the large amounts of data and the remarkable diversification of their sources, a scientific and economic interest to explore the reservoirs of knowledge is established. Data warehouses are used in making strategic decisions. A data warehouse is a collection of integrated, historised data originating from heterogeneous sources which...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2013

    Emulating Trust Zone in Android Emulator with Secure Channeling

    There is a raise in penetration of smart phone while using enterprise application, as most of them are downloaded from the public market, resulting in challenge for security framework, causing a threat to lose sensitive user data. To prevent this ARM introduces the virtualization technique in hardware level, which prevents...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2013

    Link Quality and MAC-Overhead Aware Predictive Preemptive Routing Protocol for Mobile Ad hoc Network

    In ad hoc networks, route failure may occur due to less received power, mobility, congestion and node failures. Many approaches have been proposed in literature to solve this problem, where a node predicts pre-emptively the route failure that occurs with the less received power. However, this paper encounters some difficulties,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2013

    Algorithms for Data Compression in Wireless Computing Systems

    Data compression can be defined as encoding the information using the small number of bits rather than original representation. Compression is a technique used for reducing data size by manipulating data redundancy; so that the packet transmission time and storage cost can be reduced. This can be achieved with the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2013

    Cluster Head Recovery Mechanism for Hierarchical Protocols

    Due to the big and essential role played by the cluster head in hierarchical protocols of wireless sensor network, it consumes an amount of energy more than the member nodes of the cluster. Therefore, the hierarchical protocols usually suffer from a packet loss due to frequent cluster head failure during...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2013

    Quality Issues in Infrastructure as a Service

    With rapid development in IT world, technologies are getting dynamic and very advance. With this advancement in IT world, online services have also been proliferated a lot. Now-a-days, computer resources are made available to users online on temporarily basis. This technology is cloud computing. In cloud computing environment, different services...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    A Novel Protocol for IP Traceback to Detect DDoS Attack

    Distributed Denial of Service (DDoS) attacks continue to pose higher threats to the internet. There are so many protocols designed to trace the attacker's address. The authors want to trace back attack source (i.e., "IP addresses"), they need to examine the tradeoff between different existing IP Trace back techniques. They...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Internet Connectivity Using Vehicular Ad-Hoc Networks

    Although a Mobile Ad-hoc NETwork (MANET) can be used in many cases but the most preferable is a MANET connected to the internet. This is achieved by using gateways which act as bridges between a MANET and the internet. To communicate in-between, a mobile node needs to find a valid...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Personalization in Geographic Information Systems: A Survey

    Geographic Information Systems (GIS) are widely used in different domains of applications, such as maritime navigation, museums visits and route planning, as well as ecological, demographical and economical applications. Nowadays, organizations need sophisticated and adapted GIS-based Decision Support System (DSS) to get quick access to relevant information and to analyze...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Destination Based Group Gray Hole Attack Detection in MANET Through AODV

    MANET is easily vulnerable because of dynamic topology, infrastructure less nature and also due to lack of centralized administration. One of the most common attack on such networks is gray hole attack which drop some selective data. It is challenge to keep the network free form this attack. This paper...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Network Based Anti-Virus Technology for Real-Time Scanning

    Negative aspects of networking lately became one of the most crucial problems in the information world. Protection against malware and malicious code must balance between being capable of fast detection of malware and being light on resources. Since modern antivirus systems are not optimized in the terms of speed, this...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Ranking Search Engine Result Pages Based on Trustworthiness of Websites

    The World Wide Web (WWW) is the repository of large number of web pages which can be accessed via Internet by multiple users at the same time and therefore it is Ubiquitous in nature. The search engine is a key application used to search the web pages from this huge...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Fuzzy Maintainability Model for Object Oriented Software System

    In recent years for achieving considerable success in software system, maintainability plays a very crucial role and it is considered as an important quality characteristics. In this paper a maintainability model has been proposed to compare maintainability of object-oriented software system. Attempts have been made on software developed in different...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Model Based Neuro-Fuzzy ASR on Texas Processor

    In this paper an algorithm for recognizing speech has been proposed. The recognized speech is used to execute related commands which use the MFCC and two kinds of classifiers, first one uses MLP and second one uses fuzzy inference system as a classifier. The experimental results demonstrate the high gain...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    MISR: Multiple Inheritor Selection for Recovery of Nodes in Faulty Cluster in Wireless Sensor Networks

    A wireless sensor network composed of many sensor nodes which are used to monitor unavailable and harsh environments. Because these nodes are too small and battery operated which have limited energy, faults may occur. Fault tolerance is one of the most important issues in wireless sensor networks and must be...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Performance Comparison of SCTP and UDP Over Mobile Ad Hoc Networks

    Countless researchers have put efforts to conduct researches about the performance of the traditional Transport Control Protocols (TCP) and User Datagram Protocol (UDP). Recently new transport protocol had been designed called Stream Control Transmission Protocol (SCTP). In this paper, the authors will focus to study the effect of Mobile Ad...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Applying Data Mining Technique for the Optimal Usage of Neonatal Incubator

    This research aims to provide intelligent tool to predict incubator Length Of Stay (LOS) of infants which shall increase the utilization and management of infant incubators. The data sets of EGyptian Neonatal Network (EGNN) were employed and Oracle Data Miner (ODM) tool was used for the analysis and prediction of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Collaboration Schemes Evaluation in Multi-Domain Networks

    The monitoring of the quality of service in a multi-domain network supervises the multi-domain service performance. A multi-domain service is a service that crosses several domains which can be managed by different providers. Since, each domain can be managed with its own policies and may require confidential it of its...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Challenges Involved in Implementation of ERP on Demand Solution: Cloud Computing

    As the world is beginning towards the cloud where speed and scalability are critical; and the many software is taking over to one another even more intrinsic role in this period the Cloud ERP would play the vital role in organization specially in SME (i.e., Small Medium Enterprises). Organizations are...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    New Non Path Metrics for Evaluating Network Security Based on Vulnerability

    In this paper, the authors propose a new and simple metrics for evaluating network security. The proposed metrics are based on the existence of network vulnerabilities in the network. The proposed metrics are different with their previous metrics proposed. Exploited Vulnerability Percentage (EVP) metric, Vulnerable Host Percentage (VHP) metric and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Delay and Delay Variation Constrained Algorithm based on VNS Algorithm for RP Management in Mobile IPv6

    On account of the progress of network multimedia technology, more and more real-time multimedia applications arrive with the need to transmit information using multicast communication. These applications are more important with the arrival of mobile IPv6 protocol through mobile receivers and sources. These applications require a multicast routing protocol which...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Design and Simulation of an IPv6 Network Using Two Transition Mechanisms

    This paper is focused on the most important theoretical concepts of the IPv6 protocol, such as addressing, address allocation, routing with the RIPng protocol and two IPv4 to IPv6 transition mechanisms. It describes the design and simulation of connectivity between devices of a network configured with IPv6 protocol, employing dual...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Homemade Antennas Implementation: A Comparative Analysis of the Quality of Service

    The wireless antennas have become essential to the peoples life as can be seen at their homes, workplaces, schools, and some other common places. This paper describes the construction of three homemade wireless antennas operating in the frequency band of 2.4 GHz and replicating the signal to increase the covering...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Design of an interactive game-based application for improving the resolution of common Computer Network issues

    The need to find new ways to help students in the learning process makes the people more involved with technology which evolves every day. This background leads the authors' to find new methods and forms of teaching that help students accelerate their learning skills in a different way from the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Network traffic prediction based on ARFIMA model

    ARFIMA is a time series forecasting model, which is an improve d ARMA model, the ARFIMA model proposed in this paper is demonstrated and deduced in detail. combined with network traffic of CERNET backbone and the ARFIMA model, the result shows that, compare to the ARMA model, the prediction efficiency...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    A Novel Problem-solving Metric for Future Internet Routing Based on Virtualization and Cloud-computing

    The Internet has evolved from an academic network to a broad commercial platform and become an integral and indispensable part of the people daily life, economic operation, and society over forty years. However, many technical and non-technical challenges have emerged during this process. In order to address these challenges, the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    MuMoCo : a Framework for Improving Data Quality with Multi-modality Cooperation in Wireless Sensor Networks

    High quality sensor data stream is crucial to wireless sensor networks applications. However raw data streams in wireless sensor networks tend to be not reliable. Therefore, improving sensor data quality is an important issue for all kinds of wireless sensor networks applications. In this paper, the authors proposed an integrated...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Delay-aware Load Balanced Routing Protocol for IEEE 802.16 Wireless Mesh Networks

    In IEEE 802.16 Wireless Mesh Networks (WMN) routing, delay aware load balancing can be achieved by selecting the shortest path with low latency and network load. But network load and latency together are not considered in most of the existing routing metrics. Here, the authors propose a delay aware load...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Using Mobile Agent Technology to Develop a Collaborative Product Life-Cycle Oriented Architecture

    Today product development activities are becoming more and more agile, adaptable, and cost-effective. Multi-agent-based system technology has found wide applications in managing company's information. This paper applies Multi-mobile-agent technology in developing a collaborative architecture for product lifecycle. By adopting the Aglets mobile agent platform, a generic platform has been developed...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Developing E-Learning Based on Animation Content for Improving Mathematical Connection Abilities in High School Students

    The purpose of this paper is to develop e-learning based on animation content to improve mathematical connection abilities in senior high school students. The e-learning was developed using framework proposed by Moddle, while the animation content was developed using macromedia flash. To get the student mathematical connection abilities, pretest and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    User Network Modeling-Based Spatial Web Personalization

    Web personalization can be seen as an interdisciplinary field whose objective is to facilitate the interaction between web content and user's needs. It includes per definition several research domains from social to information sciences. The personalized search focuses on integrating the user context and needs in the information retrieval process....

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Wireless Security System Implemented in a Mobile Robot

    This paper presents the design and implementation of a security system in which a mobile robot Lego NXT continuously monitors its surroundings while traveling in search of moving objects or people, considered unauthorized elements. An ultrasonic sensor is used for the monitoring. On suspicious movement detection, a warning signal is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    University Authentication System Based on Java Card and Digital X.509 Certificate

    This paper presents a solution to the problem of strong authentication, portable and expandable using a combination of Java technology and storage of X.509 digital certificate in Java cards to access services offered by an institution, in this case, the technology of the University of Panama, ensuring the authenticity, confidentiality,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Design and Optimization of Photonic Crystal Triplexer for Optical Networks

    Photonic Crystals (PhCs), also known as Photonic Band-Gap (PBG) materials, can control the spontaneous emission and the propagation of Electro-Magnetic (EM) waves. Due to existence of PBG, PhCs have applications in different areas of optical engineering such as optical filters, switches, power splitters, and demultiplexers which may ultimately pave the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Implementation of ITIL in a Moroccan Company: The Case of Incident Management Process

    IT departments were viewed as a cost center and not as an entity in the service of strategy. But this has changed in recent years because of market competitiveness and also due to the fact that the adoption of a management approach focused on the customer and driven by IT...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    A Method for Text Summarization by Bacterial Foraging Optimization Algorithm

    Due to rapid and increasingly growth of electronic texts and documents, the authors need some techniques for integration, communication and appropriate utilization of these texts. Summarizing the literature is one of the most fundamental tasks for integrating and taking advantages of these gathered texts. Selecting key words and then integrating...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Web Services Modeling and Composition Approach Using Objects-Oriented Petri Nets

    Now-a-days, with the emergence and the evolution of new technologies, such as e-business, a large number of companies are connected to Internet, and have proposed web services to trade. Web services as presented, are conceptually limited components to relatively simple functionalities. Generally, a single service does not satisfy the users...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    A Novel Image Encryption Using an Integration Technique of Blocks Rotation Based on the Magic Cube and the AES Algorithm

    In recent years, several encryption algorithms have been proposed to protect digital images from cryptographic attacks. These encryption algorithms typically use a relatively small key space and therefore, provide safe, especially if they are of a dimension. In this paper proposes an encryption algorithm for a new image protection scheme...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Hiding Data in Images Using New Random Technique

    Steganography is the art of hiding the fact that communication is taking place by hiding information in other information. In the field of Data Communication, Steganography play a major role. The transmission of information via the Internet may expose it to detect and theft. Some solution to be discussed is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Cloud Databases: A Paradigm Shift in Databases

    Relational databases ruled the Information Technology (IT) industry for almost 40 years. But last few years have seen sea changes in the way IT is being used and viewed. Stand alone applications have been replaced with web-based applications, dedicated servers with multiple distributed servers and dedicated storage with network storage....

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    An Optimized Query Tree Algorithm in RFID Inventory Tracking - A Case Study Evidence

    One of the challenged technical issue faced in inventory tracking applications with Radio Frequency IDentification (RFID) implementation environment, is the collisions due to responses from multiple tags on the shared channel between reader and the tags, which consumes further the energy as well as the delay in tag identification process....

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Application of Geographical Information System (GIS) in Urban Water of Amol in Iran at Time of Natural Disaster

    For the management of urban disaster risk, periodic updating of geo-databases of urban water is crucial, particularly in developing countries where urbanisation rates are very high. However, collecting information on the characteristics of buildings and lifelines through full ground surveys can be very costly and time-consuming. This paper has done...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    An Enhanced Evaluation Model for Vertical Handover Algorithm in Heterogeneous Networks

    The vertical handover decision is considered an NP-Hard problem. For that reason, a large variety of Vertical Handoff Algorithms (VHA) have been proposed to help the user to select dynamically the best access network in terms of Quality of Service (QoS). The objective of this paper is to provide a...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Design and Implementation of an IP-Based Security Surveillance System

    The tremendous loss of lives and properties that may be attributed to criminals in recent times worldwide has become a source of worry to all and sundry. The situation has come to the alarming rate that the authority has sought for the immediate means of checkmating it without delay. Therefore,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Developing Service Oriented Computing Model Based On Context-Aware

    SOA and Cloud computing are making major changes in the way companies build and deploy applications. The challenge is to meet the business expectation of faster delivery of new functionality, while at the same time maintaining control of application performance and availability across a growing network of service providers. SOA...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Feasibility Evaluation of VANET Using Directional-Location Aided Routing (D-LAR) Protocol

    Vehicular Ad hoc NETworks (VANETs) allow vehicles to form a self-organized network without any fixed infrastructure. VANETs have received wide attention and numerous research issues have been identified in the recent time. The design and implementation of efficient and scalable routing protocols for VANETs is a challenging task due to...

    Provided By International Journal of Computer Science Issues