International Journal of Computer Science Issues

Displaying 161-200 of 797 results

  • White Papers // Jan 2013

    Energy Efficient Routing in Mobile Ad-hoc Networks for Healthcare Environments

    The modern and innovative medical applications based on wireless network are being developed in the commercial sectors as well as in research. The emerging wireless networks are rapidly becoming a fundamental part of medical solutions due to increasing accessibility for healthcare professionals/patients reducing healthcare costs. Discovering the routes among hosts...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Detection of Pulsing DoS Attacks at Their Source Networks

    Pulsing Denial of Service (PDoS) is a type of DoS attack. Its attacking behavior is intermittent rather than constant, which helps it avoid being detected. In this paper, an adaptive detection method is proposed for source-end detection of PDoS attacks. It has three distinctive features: its detection statistic is based...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Modeling of Multipath Transport

    In this paper, the authors propose a model for evaluating the transmission performance of multipath transport. Previous researches focused exclusively on single pair users in simple scenarios. The distinct perspective in this paper is to build models for analyzing the performance when multipath transport is used in the entire network...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Enhanced Intrusion Detection System for Input Validation Attacks in Web Application

    Internet continues to expand exponentially and access to the Internet become more prevalent in users daily life but at the same time web application are becoming most attractive targets for hacker and cyber criminals. This paper presents an enhanced intrusion detection system approach for detecting input validation attacks in the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    User Behavior Prediction based Adaptive Policy Pre-fetching Scheme for Efficient Network Management

    In recent years, network management is commonly regarded as an essential and promising function for managing and improving the security of network infrastructures. However, as networks get faster and network centric applications get more complex, there is still significant ongoing work addressing many challenges of the network management. Traditional passive...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    An Improved Interference Cancellation Scheme for Two- User MIMO-MAC

    Multiple-Input Multiple-Output (MIMO), which is one of the mandatory techniques for the next generation wireless communication systems, has the features of spatial multiplexing and spatial diversity. MIMO Multiple Access Channels (MAC) offers substantial capacity improvements and has attracted considerable research attention. There is serious co-channel interference over MIMO-MAC since multiple...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Ant-Crypto, A Cryptographer for Data Encryption Standard

    Swarm Intelligence and Evolutionary Techniques are attracting the cryptanalysts in the field of cryptography. This paper presents a novel swarm based attack called Ant-Crypto (Ant-Cryptographer) for the cryptanalysis of Data Encryption Standard (DES). Ant-Crypto is based on Binary Ant Colony Optimization (BACO) i.e. a binary search space based directed graph...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Applying Encryption Algorithm for Data Security and Privacy in Cloud Computing

    Cloud computing is the next big thing after internet in the field of information technology; some say it's a metaphor for internet. It is an Internet-based computing technology, in which software, shared recourses and information, are provided to consumers and devices on-demand, and as per users requirement on a pay...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Phishing Detection Taxonomy for Mobile Device

    Phishing is one of the social engineering attacks and currently hit on mobile devices. Based on security report by Lookout, 30% of Lookout users clicking on an unsafe link per year by using mobile device. Few phishing detection techniques have been applied on mobile device. However, review on phishing detection...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Optimization of IPv4 Packet's Headers

    The current IPv4 Packet's scheme has several fields to be carried and transmitted in each packet even if the source, the destination and the payload of the packets are same. These fields utilize packet space and thus decrease the size of user data. Therefore the processing of each packet requires...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    A Cooperative Spectrum Sensing Scheme Based on Trust and Fuzzy Logic for Cognitive Radio Sensor Networks

    In this paper, the authors propose a cooperative spectrum sensing scheme based on trust and fuzzy logic for Cognitive Radio Sensor Networks (CRSN). The CRSN nodes use the T-S fuzzy logic to make local decisions on the presence or absence of the Primary User's (PU) signal, and then use a...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    A Cross-Domain Authentication Protocol Based on ID

    In large distributed networks, many computers must be mutual coordination to complete some works under the certain conditions, these computers may come from different domains. For ensuring the safety to access resources among these computers in different domains, the authors propose a cross-domain union authentication scheme. They compute a large...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Job Scheduling Model for Cloud Computing Based on Multi- Objective Genetic Algorithm

    Cloud computing is an emerging high performance computing environment with a large scale, heterogeneous collection of autonomous systems and flexible computational architecture. To improve the overall performance of cloud computing, with the deadline constraint, a task scheduling model is established for reducing the system power consumption of cloud computing and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Using Chinese Natural Language Interfaces for Navigation in Mobile GIS

    The combination of "Voice technology" and "Mobile GIS", has greatly improved the intelligent degree of mobile GIS. Recently, significant attention in the field of scientific research is turning to how to realize quick conversion between natural language and GIS commands. However, the current paper mostly concentrates on rules of conversion...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Dynamic Tracking Protocol for Maneuvering Targets in Sensor Network

    Target tracking is one of the most important applications in Wireless Sensor Networks (WSNs). Energy efficiency is one of the most important design goals for target tracking. The authors propose and evaluate a distributed, energy-efficient, light-weight framework dynamic clustering algorithm for target localization and tracking in wireless sensor networks. Since...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Achieving Load Balance by Separating IP Address Spaces

    In this paper, the authors propose a load balance approach by separating the host and router IP addresses into two spaces. In addition, in their approach, they propose a scheduling algorithm, named Edge Stream Balance (ESB), which is used by the proposed multipath routing scheme based on the address space...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Intelligent communication of WSN based on a multi-agent system

    The Wireless Sensor Network (WSN) consists of a large number of sensor nodes with limited batteries, which are deployed randomly over an area to collect data. Therefore, it is important to minimize energy consumption of each node, which leads to the extension of the life of the network. As many...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    A Novel Particle Swarm Optimization-based Algorithm for the Optimal Centralized Wireless Access Network

    The wireless access networks design problem is formulated as a constrained optimization problem, where the goal is to find a network topology such that an objective function is optimized, subject to a set of constraints. The objective function may be the total cost, or some performance measure like utilization, call...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Study of Online Bayesian Networks Learning in a Multi-Agent System

    The authors attempt to find how a common task can be performed by a multi-agent self-organizing system. The agents are independent in terms of their model of environment and their actions. Each agent explores the environment and decides its actions by itself. Agents will have no information about the environment...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Fuzzy Logic System for Opportunistic Spectrum Access using Cognitive Radio

    Opportunistic spectrum access approach is enabled by cognitive radios which are able to sense the unused spectrum and adapt their operating characteristics to the real-time environment. However, a naive spectrum access for secondary users can make spectrum utilization inefficient and increase interference to adjacent users. In this paper, the authors...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    A Comparative Approach for Localization Techniques in Wireless Sensor Networks

    A Wireless Sensor Network is a collection of many tiny sensing and wireless communication device called sensor nodes. Each node consists of a processor, a battery and a transceiver for communication. Nodes are connected to each other via transceiver. Localization of sensor nodes in wireless sensor nodes plays an important...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    The Study on the Spam Filtering Technology Based on Bayesian Algorithm

    In this paper, the authors analyzed spam filtering technology, carried out a detailed study of Naive Bayes algorithm, and proposed the improved Naive Bayesian mail filtering technology. Improvement can be seen in text selection as well as feature extraction. The general Bayesian text classification algorithm mostly takes information gain and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Trust Based Infererence Violation Detection Scheme Using Acut Model

    The inference problem is the major problem in securing the sensitive data in the secured database. In the inference problem the user tries to access the sensitive data from the secured database by giving series of queries with the non-sensitive fields. Inference problems affect the securities in the database and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Embedded Wireless Fingerprint Exam Affair Management

    In this paper, the authors study the design method of fingerprint identification module based on embedded system, which can realize the design of wireless fingerprint examination management system. This method reduces the hardware cost by building hardware environment whose platform is ARM9 microprocessor and MBF200 fingerprint sensor-integrated module. And, under...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    The Evidential Reasoning Approach for Multiple Decision Analysis Using Normal Cloud Model

    In this paper, normal cloud model and Evidential Reasoning (E-R) approach is used in Multiple Attribute Decision Analysis (MADA) problems. Different attributes Belief function are represented by cloud model interval. Using cloud model generating algorithm, belief degree interval is obtained without numerical computation. In addition, it is reasonable and it...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    An Autonomic Intrusion Detection Model With Multi-Attribute Auction Mechanism

    In this paper, the authors present an innovative intrusion detection model based on autonomic computing to extend the passive detection mechanism in a traditional Intrusion Detection System (IDS). Centered on an autonomic manager, this model introduces a multi-attribute auction mechanism in the agent coordination layer to perceive environmental changes, manage...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Framework Design of Secure Cloud Transmission Protocol

    Cloud computing technologies are in high demand because of several benefits. Many business organizations are looking into cloud computing services to reduce the cost and complexity of their business infrastructure and its preservation. However, there are certain security issues in cloud computing technologies. To overcome those security issues, the authors...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Energy-Aware Scheme Used in Multi-level Heterogeneous Wireless Sensor Networks

    The Wireless Sensor Networks (WSNs) is a power constrained system, since nodes run on limited power batteries which shorten its lifespan. The main challenge facing in the design and conception of Wireless Sensor Networks (WSNs) is to find the best way to extend their life span. The clustering algorithm is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    A Study on Existing Gait Biometrics Approaches and Challenges

    Applications of biometrics system are increasingly day by day as these methods provide more reliable and accurate way of identification and verification. Psychological studies indicate that people have a small but statistically significant ability to recognize the gait of individuals that they know. Gait biometrics is one of the recent...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    A Review on: Issues Related to Security on Tree Structure Data

    The problem of tree structured data is that it requires different Integrity and confidentiality for different portion of same content. Integrity assurance technique not only applies integrity to received data by user, but also any compromise to data that must be precisely determined. In tree structures each node contains some...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Review of Security Approaches in Routing Protocol in Mobile Adhoc Network

    In this paper, the objective is to present a review of routing protocols in Mobile Ad hoc NETwork (MANET) exclusively from security viewpoint. In MANET, the mobile nodes often move randomly for which reason the cumulative network experiences rapid and much unpredictable topology alterations. Due to presence of dynamic topology...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Review of Load Balancing in Cloud Computing

    With the exponential rise in the demands of the clients worldwide, a large scale distributed systems have been introduced as a computing environment. Cloud computing has paved a revolutionary path in this direction of distributed environment for accomplishing optimized performance, shortest response time, network resource utilization, and adaptability of service...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    A Trust-Based Routing Protocol in VANET

    One of the greatest challenges in Vehicular Ad-hoc NETworks (VANET) is to establish stable routing. Due to the dynamic network this is a difficult problem. In this paper, the authors use trust-based routing. The node is chosen to be next-hop node until it reaches to trust threshold. To evaluate the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Network Security Using Job Oriented Architecture (SUJOA)

    In the modern world operating system, various security systems (Collection of various security components) are already installed or can be directly installed in it. They are responsible for checking the complete node for suspicious behavior. There are some intrusions having the ability to hide themselves from being checked called armoring...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Detection of False Alarm in Handling of Selfish Nodes in MANET With Congestion Control

    In a mobile ad hoc network, the mobile nodes will have the characteristics of mobility and constraints in resources. Since, the mobility is high, the nodes may move randomly and fastly, which lead to network partitioning. The resource constraints lead to a big problem as decrease in performance and the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    The Design of Statistic System in the Country Enterprise Based on SAS and GIS

    Statistics plays an important role in social and economic development. Traditional data collection is too laborious, time-consuming and ineffective. Its statistic is not correct and can't share the data. Aiming at the requirement for regional economy statistics of Pan Zhihua, this paper designed an analytical system based on regional economy...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Personality Types Classification for Indonesian Text in Partners Searching Website Using Na

    The development of digital text information has been growing fast, but most of digital text is in unstructured form. Text mining analysis is needed in dealing with such unstructured text. One of the activities important in text mining is text classification or categorization. Text categorization itself currently has a variety...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Application of SVM Optimization Based on GA in Electronic Sphygmomanometer Data Fusion

    If the proper kernel function parameter is chosen, using of the multi-sensor data fusion method based on SVM, the influence of cross sensitive disturbance variables including the temperatureT and the power supply current I, can be significantly suppressed and the stability of the pressure sensor can be improved in the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Exploration on Big Data Oriented Data Analyzing and Processing Technology

    At present, enterprises have urgent needs to conduct an effective and stable statistical analysis on big data. With a view to solving the issue of analysis and processing of big data in respect of enterprise business, this essay proposes a hybrid structure mode based on the MapReduce technology and the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    A Novel Malicious Web Crawler Detector: Performance and Evaluation

    Internet demands a robust and resilient protected communication and computing environment to enable information flows flawlessly with no down time. However, the Internet is exposed to the general public which will lead to loss of sensitive information as well as copyright protected content. To address this issue, in this paper,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    A Robust Client Verification in Cloud Enabled m-Commerce Using Gaining Protocol

    The proposed system highlights a novel approach of exclusive verification process using gain protocol for ensuring security among both the parties (client-service provider) in m-commerce application with cloud enabled service. The proposed system is based on the potential to verify the clients with trusted hand held device depending on the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    HASoC for Developing a Software System

    The authors present an object-oriented development of a software system. The development is based on the customization of the life-cycle of a novel developing method called HASoC (Hardware And Software Objects on Chip). The development is presented in order to evaluate HASoC and establish a complete A-to-Z object-oriented teaching example...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Multimodal Biometric System Using Linear Discriminant Analysis For Improved Performance

    Essentially a biometric system is a pattern recognition system which recognizes a user by determining the authenticity of a specific anatomical or behavioral characteristic possessed by the user. With the ever increasing integration of computers and Internet into daily life style, it has become necessary to protect sensitive and personal...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Fuzzy Priority CPU Scheduling Algorithm

    There are several CPU scheduling algorithms like FCFS, SRTN,RR, priority etc. Scheduling decision of these algorithms are based on parameters which are assumed to be crisp. However, in many circumstances these parameters are vague. The vagueness of these parameters suggests that scheduler should use fuzzy logic in scheduling the jobs....

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Performance Comparison of Routing Protocols for Zigbee Wpan

    A Wireless Sensor Network (WSN) is ad hoc network. Each node in WSN will participate in routing process, based on the dynamic activity of the network connectivity. The peer-to-peer nature of wireless ad hoc networks makes them suitable for a variety of applications where coordinator can't be relied on, and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Digital Image Watermarking Algorithm Based on Wavelet Packet

    In this paper, a method for Digital Image Watermarking based on the modification of certain subband of the wavelet packet decomposition was presented. A key is used for wavelet bases selection, watermark generation and selection of blocks for embedding the watermark bits. To efficiently embed the watermark within the images...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Operating System Based Analysis of Security Tools for Detecting Suspicious Events in Network Traffic

    Computer networks have important role regarding communication between the machines. Providing finite number of connections could be a little difficult to secure every connection from security hazards. Researchers have proposed many solutions for possible security hazards and known attacks but unfortunately it does not provide consolation up to satisfactory extents....

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    A Comparison Between Data Mining Prediction Algorithms for Fault Detection (Case Study: Ahanpishegan co.)

    In the current competitive world, industrial companies seek to manufacture products of higher quality which can be achieved by increasing reliability, maintainability and thus the availability of products. On the other hand, improvement in products life-cycle is necessary for achieving high reliability. Typically, maintenance activities are aimed to reduce failures...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    A Comprehensive Performance Analysis of Proactive, Reactive and Hybrid MANETs Routing Protocols

    A Mobile Ad-hoc NETwork (MANET) is a dynamic multi hop wireless network established by a group of nodes in which there is no central administration. Due to mobility of nodes and dynamic network topology, the routing is one of the most important challenges in ad-hoc networks. Several routing algorithms for...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    A PKI-Based Track and Trace Network for Cross-Boundary Container Security

    Challenges in container management, such as theft of products, cross-border smuggling, long checking time in processes of customs clearance and unable to track locations of products in real time, are currently faced by supply chain parties. In recent year, Electronic Seal (e-Seal) technology is introduced to protect containers in a...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    A Conceptual Framework of Knowledge Transfer in Malaysia E-Government IT Outsourcing: An Integration With Transactive Memory System (TMS)

    Despite extensive research on knowledge transfer issues, there is a dearth of research that has explicitly focused on the role of Transactive Memory System (TMS) in enabling inter-organizational knowledge transfer in e-government IT outsourcing. Although the information systems literature has recently acknowledged the role of TMS in improving knowledge processes,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    Minutiae Extraction From Fingerprint Images - A Review

    Fingerprints are the oldest and most widely used form of biometric identification. Everyone is known to have unique, immutable fingerprints. As most Automatic Fingerprint Recognition Systems are based on local ridge features known as minutiae, marking minutiae accurately and rejecting false ones is very important. However, fingerprint images get degraded...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    A Metric for Measuring Degree of Service Cohesion in Service Oriented Designs

    Service Orientation has gained momentum as a fundamental design paradigm for developing distributed enterprise applications. However, comprehensive and quantitative metrics for estimating the appropriateness of the service designs are still lacking. One of the quality attributes as to a SOA is cohesion, which is a determining factor for many other...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    Graph Based E-Government Web Service Composition

    Nowadays, e-government has emerged as a government policy to improve the quality and efficiency of public administrations. By exploiting the potential of new information and communication technologies, government agencies are providing a wide spectrum of online services. These services are composed of several web services that comply with well defined...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    3D Model Classification and Retrieval Based on Semantic and Ontology

    Classifying 3D models into classes is an important step in 3D model retrieval process. However, most classification system does not include semantic information. In this paper, a new method has been proposed to classify and to retrieve 3D model using semantic concepts and ontology. First, the authors use the machine...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    Web Services Non-Functional Classification to Enhance Discovery Speed

    Recently, the use and deployment of web services has dramatically increased. This is due to the easiness, interoperability, and flexibility that web services offer to the software systems, which other software structures don't support or support poorly. Web services discovery became more important and research conducted in this area became...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    Specification and Verification of Uplink Framework for Application of Software Engineering Using RM-ODP

    An Architectural Framework for Wireless Mobile has been proposed. This Architectural Framework will allow Uplink to be used in any wireless environment, as required, to provide any type of services demanded by the user regardless whether the uplink is a stand alone, a pure Wireless sensor network or integrated with...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    3D Graphical User Interface on Personal Computer Using p5 Data Glove

    This paper presents Essential Reality works on 3D HCI for changing 2D visual to 3D visual. The mouse is the critical interface to handle 3D graphical objects. Using data glove it's possible to put it on like a normal glove and it then acts as an input device that senses...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    Mingling Multipath Routing With Quality Of Service

    The QoS issue in the Internet have become essential for the successful transmission of multimedia applications. The basic problem of QoS routing is to find a path satisfying multiple constraints. It is concerned with identifying the path that will consider multiple parameters like bandwidth, delay, cost, hopcount etc. instead of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    Dynamic Reputation Based Trust Management Using Neural Network Approach

    Multi-agent systems like Peer-To-Peer (P2P) Networks employ scalable mechanisms that allow anyone to offer content and services to other system users. The open accessibility of these networks makes them vulnerable to malicious users wishing to poison the system. This paper proposed a novel trust and reputation system, using RBF artificial...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Semantic Malware Detection by Deploying Graph Mining

    Today, malware is a serious threat to the people society. Several researchers are studying detection and mitigation of malware threats. On the other hand malware authors try to use obfuscation techniques for evading detection. Unfortunately usual approach (e.g., antivirus software) use signature based method which can easily be evaded. For...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Toward an Example-Based Machine Translation From Written Text to ASL Using Virtual Agent Animation

    Modern computational linguistic software cannot produce important aspects of sign language translation. Using some researches the authors deduce that the majority of automatic sign language translation systems ignore many aspects when they generate animation; therefore the interpretation lost the truth information meaning. This problem is due to sign language consideration...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Design and Development of Artificial Neural Network Based Tamil Unicode Symbols Identification System

    Design and Development of Unicode and its recognition especially for Indian script is an active area of research today. An attempt is made to identify Tamil-a vernacular of southern India, which is also the official language of Tamilnadu. Tamil language present great challenges to an OCR designer due to the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Mercator as a Web Crawler

    The Mercator describes, as a scalable, extensible web crawler written entirely in Java. In term of Scalable, web crawlers must be scalable and it is important component of many web services, but their design is not well-documented in the literature. In this paper, the authors enumerate the major components of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Tradeoff Analysis of Bit-Error-Rate (BER) in Cognitive Radio Based on Genetic Algorithm

    The authors know that the radio electromagnetic spectrum is a natural resource and efficient usage of the inadequate natural resource is one of the greatest challenges of today's wireless communication system just like petrol, coal and water. The efficient use of the available licensed spectrum is becoming more and more...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Hybrid DCT-DWT Watermarking and IDEA Encryption of Internet Contents

    Encryption and watermarking are complementary lines of defense in protecting multimedia content. Recent watermarking techniques have therefore been developed independent from encryption techniques. In this paper, the authors present a hybrid image protection scheme to establish a relation between the data encryption key and the watermark. Prepositioned secret sharing allows...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Vehicular Ad-Hoc Networks

    Modern day's vehicles require advanced communication system on board to enable passengers benefit the most from available services. IEEE 802.11p is the new extension of IEEE 802.11 standards; especially proposed for the high vehicular environment. The WAVE documentation represents enhancements to the Media Access Control (MAC) and PHYsical (PHY) layer...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    (IPTV) Internet Protocol Television's Key Broadcast Building Blocks

    Telcos, in pursuit of the triple play (voice, video, and data), are investing heavily to compete with the cable companies in providing quality video content to the consumer. However, most telco infrastructures do not currently have the bandwidth to support high-quality video distribution. The telcos are updating their Internet Protocol...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Design of Power Efficient Schema for Energy Optimization in Data Center With Massive Task Execution Using DVFS

    The proposed system highlights a novel energy efficient technique by considering an entire datacenter using DVFS (Dynamic Voltage and Frequency Scaling). Unwanted power consumption was always a matter of concern from last 2 years for the administrators of datacenters. Therefore, a research trial in order to minimize the power consumption...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    A Review of QoS in Mobility Phillic Communication

    This particular outlook represents, in brief the recent & upcoming issues associated with QoS guarantee & mobility in communications. Moreover it also presents a brief context of QoS attributes & handling techniques thereby. Even more, it covers aspects of QoS fundamentals in deployment of mobility led approaches. There are different...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Design of a New Model of Multiband Miniature Antenna Near Isotropic

    In this paper, the authors propose a new slotted multiband antennas simulated at different frequencies. The insertion of slots in the patch gives a good adapting frequency with various forms on the radiation pattern. The main feature of the proposed antenna is the capability to generate a near isotropic radiation...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Theoretical Analysis of VoIP Transmission Through Different Wireless Access Technologies

    One of the challenges in today's wireless networks is to provide appropriate throughput for data and multimedia application. The physical data rate enhancements can be achieved through new physical capabilities, however to achieve high efficiency and to improve the throughput at the Medium Access Control (MAC) layer, new and innovative...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Scalable Symmetric Key Cryptography Using Asynchronous Data Exchange in Enterprise Grid

    Symmetric key cryptography is one of the most critical computing problems that need high performance computing power resources. The use of large key sizes and complex encryption/decryption algorithms to achieve unbreakable state has led to an increased time computational complexity. Traditionally, this problem is solved in the grid environment by...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Grayscale Image Compression Based on Min Max Block Truncating Coding

    Image compression is an important tool to reduce the bandwidth and storage requirements of practical image systems such as multimedia, communication, medical images, education and business etc. The image compression techniques are categorized into two main classification namely lossy compression techniques and lossless compression techniques. Lossy compression techniques lead to...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    A Model for Crises Management in Software Projects

    Today software projects are important part into almost every business application. It is quality, efficiency and effectiveness of these applications will determine the failure or success of many business solutions. Consequently, businesses often find that they need to have a competitive and efficient advantage through the development and improve of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Nurture IDR Segmentation and Multiple Instruction Queues in Superscalar Pipelining Processor

    This paper proposes a model which improves the speed of the pipelining mechanism therefore increasing the speed of the processor. Superscalar operation is used to get maximum throughput from the processor using the pipelining concept. This proposal can be considered as the advancement of the super scalar property in pipelining...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Design of a High Performance Reversible Multiplier

    Reversible logic circuits are increasingly used in power minimization having applications such as low power CMOS design, optical information processing, DNA computing, bioinformatics, quantum computing and nanotechnology. The problem of minimizing the number of garbage outputs is an important issue in reversible logic design. In this paper, the authors propose...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Marginal Object Weight Ranking for Nearest Neighbor Search in Spatial Databases

    Uncertainty prevails in spatial databases whose objects are defined as multidimensional probable density function. Identifying an object is tedious task in uncertain spatial databases. Recent work on searching objects and its closeness to other objects was presented as superseding nearest neighbor search technique. In superseding neighbor search, one of all...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Incorporating Security in Embedded System - A Critical Analysis

    Security is becoming a major concern in embedded system designing and development. This paper surveys security requirements, attack techniques and will review countermeasures for these attacks. Use of embedded systems in diverse and complex applications have relentless importance of secure and fault tolerant system. It is essential for embedded device's...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Integrated Circuit of CMOS DC-DC Buck Converter With Differential Active Inductor

    In this paper, the authors propose a new design of DC-DC Buck Converter (BC), which the spiral inductor is replaced by a differential gyrator with capacitor load (gyrator-C) implemented in 0.18um CMOS process. The gyrator-C transforms the capacitor load (which is the parasitic capacitor of MOSFETS) to differential active inductor...

    Provided By International Journal of Computer Science Issues