International Journal of Computer Science Issues

Displaying 161-200 of 795 results

  • White Papers // Jan 2013

    A Trust-Based Routing Protocol in VANET

    One of the greatest challenges in Vehicular Ad-hoc NETworks (VANET) is to establish stable routing. Due to the dynamic network this is a difficult problem. In this paper, the authors use trust-based routing. The node is chosen to be next-hop node until it reaches to trust threshold. To evaluate the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Network Security Using Job Oriented Architecture (SUJOA)

    In the modern world operating system, various security systems (Collection of various security components) are already installed or can be directly installed in it. They are responsible for checking the complete node for suspicious behavior. There are some intrusions having the ability to hide themselves from being checked called armoring...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Detection of False Alarm in Handling of Selfish Nodes in MANET With Congestion Control

    In a mobile ad hoc network, the mobile nodes will have the characteristics of mobility and constraints in resources. Since, the mobility is high, the nodes may move randomly and fastly, which lead to network partitioning. The resource constraints lead to a big problem as decrease in performance and the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Achieving Load Balance by Separating IP Address Spaces

    In this paper, the authors propose a load balance approach by separating the host and router IP addresses into two spaces. In addition, in their approach, they propose a scheduling algorithm, named Edge Stream Balance (ESB), which is used by the proposed multipath routing scheme based on the address space...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Intelligent communication of WSN based on a multi-agent system

    The Wireless Sensor Network (WSN) consists of a large number of sensor nodes with limited batteries, which are deployed randomly over an area to collect data. Therefore, it is important to minimize energy consumption of each node, which leads to the extension of the life of the network. As many...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    A Novel Particle Swarm Optimization-based Algorithm for the Optimal Centralized Wireless Access Network

    The wireless access networks design problem is formulated as a constrained optimization problem, where the goal is to find a network topology such that an objective function is optimized, subject to a set of constraints. The objective function may be the total cost, or some performance measure like utilization, call...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Study of Online Bayesian Networks Learning in a Multi-Agent System

    The authors attempt to find how a common task can be performed by a multi-agent self-organizing system. The agents are independent in terms of their model of environment and their actions. Each agent explores the environment and decides its actions by itself. Agents will have no information about the environment...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Fuzzy Logic System for Opportunistic Spectrum Access using Cognitive Radio

    Opportunistic spectrum access approach is enabled by cognitive radios which are able to sense the unused spectrum and adapt their operating characteristics to the real-time environment. However, a naive spectrum access for secondary users can make spectrum utilization inefficient and increase interference to adjacent users. In this paper, the authors...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    A Comparative Approach for Localization Techniques in Wireless Sensor Networks

    A Wireless Sensor Network is a collection of many tiny sensing and wireless communication device called sensor nodes. Each node consists of a processor, a battery and a transceiver for communication. Nodes are connected to each other via transceiver. Localization of sensor nodes in wireless sensor nodes plays an important...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    The Study on the Spam Filtering Technology Based on Bayesian Algorithm

    In this paper, the authors analyzed spam filtering technology, carried out a detailed study of Naive Bayes algorithm, and proposed the improved Naive Bayesian mail filtering technology. Improvement can be seen in text selection as well as feature extraction. The general Bayesian text classification algorithm mostly takes information gain and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Trust Based Infererence Violation Detection Scheme Using Acut Model

    The inference problem is the major problem in securing the sensitive data in the secured database. In the inference problem the user tries to access the sensitive data from the secured database by giving series of queries with the non-sensitive fields. Inference problems affect the securities in the database and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Embedded Wireless Fingerprint Exam Affair Management

    In this paper, the authors study the design method of fingerprint identification module based on embedded system, which can realize the design of wireless fingerprint examination management system. This method reduces the hardware cost by building hardware environment whose platform is ARM9 microprocessor and MBF200 fingerprint sensor-integrated module. And, under...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    The Evidential Reasoning Approach for Multiple Decision Analysis Using Normal Cloud Model

    In this paper, normal cloud model and Evidential Reasoning (E-R) approach is used in Multiple Attribute Decision Analysis (MADA) problems. Different attributes Belief function are represented by cloud model interval. Using cloud model generating algorithm, belief degree interval is obtained without numerical computation. In addition, it is reasonable and it...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    The Design of Statistic System in the Country Enterprise Based on SAS and GIS

    Statistics plays an important role in social and economic development. Traditional data collection is too laborious, time-consuming and ineffective. Its statistic is not correct and can't share the data. Aiming at the requirement for regional economy statistics of Pan Zhihua, this paper designed an analytical system based on regional economy...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Telco Business Process Transformation Using Agile Lean Six Sigma and Frameworx Components: Focus on the Core Engineering Aspects with a Case Study

    The business transformation, a worldwide trend in many industries, is to improve the business performance in order to remain competitive in a challenging market. To accompany Telco industry in this trend, TM Forum issued Frameworx which addresses the key business aspects namely process, information, application and integration ones. The purpose...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Exploration on Big Data Oriented Data Analyzing and Processing Technology

    At present, enterprises have urgent needs to conduct an effective and stable statistical analysis on big data. With a view to solving the issue of analysis and processing of big data in respect of enterprise business, this essay proposes a hybrid structure mode based on the MapReduce technology and the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Application of SVM Optimization Based on GA in Electronic Sphygmomanometer Data Fusion

    If the proper kernel function parameter is chosen, using of the multi-sensor data fusion method based on SVM, the influence of cross sensitive disturbance variables including the temperatureT and the power supply current I, can be significantly suppressed and the stability of the pressure sensor can be improved in the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Personality Types Classification for Indonesian Text in Partners Searching Website Using Na

    The development of digital text information has been growing fast, but most of digital text is in unstructured form. Text mining analysis is needed in dealing with such unstructured text. One of the activities important in text mining is text classification or categorization. Text categorization itself currently has a variety...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    A Novel Malicious Web Crawler Detector: Performance and Evaluation

    Internet demands a robust and resilient protected communication and computing environment to enable information flows flawlessly with no down time. However, the Internet is exposed to the general public which will lead to loss of sensitive information as well as copyright protected content. To address this issue, in this paper,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    An Advanced Survey on Secure Energy-Efficient Hierarchical Routing Protocols in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are often deployed in hostile environments, which make such networks highly vulnerable and increase the risk of attacks against this type of network. WSN comprise of large number of sensor nodes with different hardware abilities and functions. Due to the limited memory resources and energy constraints,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Performance Optimization through Channel Profiling in Cognitive Sensor Networks

    Cognitive Radio (CR) is an important future wireless radio access technology having the potential to solve the spectrum scarcity and under-utilization problems. Using CR however, poses new challenges for network nodes and architectures due to the inherent complexity of cognitive radio technology. In this paper, the authors propose a unique...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Mobile Application of Water Meter Recorder Based on Short Message Service Transmissions Using Windows Mobile Platform

    The rapid development of technology nowadays has major impact to the development of cellular technology. This development led to a new wide range of Smartphone. The growth of life now-a-days requires people to work more quickly, so that they can use the time more effective and increase the performance. The...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Splitting of Traffic to Maximize the Data Transmission in Mobile Ad Hoc Network Under Different Constraints

    Mobile Ad-hoc NETwork (MANET) is a set of wireless mobile computer forming a temporary network without any wired infrastructure, due to dynamic nature of topology and other constraints transmission routing is a challenging task in MANET. The splittable routing establishes multi paths between source nodes and destination nodes; this scheme...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Smart Dynamic Software Components Enabling Decision Support in Machine-to-Machine Networks

    The future Internet of Things will be extended by Machine-to-Machine communication technologies in order to include sensor information. The overwhelming amount of data will require autonomous decision making processes which are directly executed at the location where data is generated or measured. An intelligent sensor system needs to be able...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Research on the Model of Secure Transmission of SOAP Messages

    SOAP as the basis application of Web Services, and, SOAP messages are closely related to the heterogeneous Web services. Secure transmission of SOAP messages play a vital role for the applicability of Web Services. The main challenges to the secure transmission of SOAP messages includes: confidentiality, authentication, integrity, both-party non-repudiation,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    WiMAX Based Audio/Video Transmission

    In this paper, the authors present the idea of a WiMAX based audio/video transmission. The data transmitter will transmit an audio/video signal, which will be received by the receiver side. The hardware of the data transmitter consists of a CCD camera and audio mic. The CCD camera will capture the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    RFID Technology Based Attendance Management System

    RFID is a nascent technology, deeply rooted by its early developments in using radar as a harbinger of adversary planes during World War II. A plethora of industries have leveraged the benefits of RFID technology for enhancements in sectors like military, sports, security, airline, animal farms, healthcare and other areas....

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Multiple Servers - Queue Model for Agent Based Technology in Cache Consistence Maintenance of Mobile Environment

    Caching is one of the important techniques in mobile computing. In caching, frequently accessed data is stored in mobile clients to avoid network traffic and improve the performance in mobile computing. In a mobile computing environment, the number of mobile users increases and requests the server for any updation, but...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Energy Efficient Routing in Mobile Ad-hoc Networks for Healthcare Environments

    The modern and innovative medical applications based on wireless network are being developed in the commercial sectors as well as in research. The emerging wireless networks are rapidly becoming a fundamental part of medical solutions due to increasing accessibility for healthcare professionals/patients reducing healthcare costs. Discovering the routes among hosts...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Detection of Pulsing DoS Attacks at Their Source Networks

    Pulsing Denial of Service (PDoS) is a type of DoS attack. Its attacking behavior is intermittent rather than constant, which helps it avoid being detected. In this paper, an adaptive detection method is proposed for source-end detection of PDoS attacks. It has three distinctive features: its detection statistic is based...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Modeling of Multipath Transport

    In this paper, the authors propose a model for evaluating the transmission performance of multipath transport. Previous researches focused exclusively on single pair users in simple scenarios. The distinct perspective in this paper is to build models for analyzing the performance when multipath transport is used in the entire network...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Enhanced Intrusion Detection System for Input Validation Attacks in Web Application

    Internet continues to expand exponentially and access to the Internet become more prevalent in users daily life but at the same time web application are becoming most attractive targets for hacker and cyber criminals. This paper presents an enhanced intrusion detection system approach for detecting input validation attacks in the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    User Behavior Prediction based Adaptive Policy Pre-fetching Scheme for Efficient Network Management

    In recent years, network management is commonly regarded as an essential and promising function for managing and improving the security of network infrastructures. However, as networks get faster and network centric applications get more complex, there is still significant ongoing work addressing many challenges of the network management. Traditional passive...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    An Improved Interference Cancellation Scheme for Two- User MIMO-MAC

    Multiple-Input Multiple-Output (MIMO), which is one of the mandatory techniques for the next generation wireless communication systems, has the features of spatial multiplexing and spatial diversity. MIMO Multiple Access Channels (MAC) offers substantial capacity improvements and has attracted considerable research attention. There is serious co-channel interference over MIMO-MAC since multiple...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Ant-Crypto, A Cryptographer for Data Encryption Standard

    Swarm Intelligence and Evolutionary Techniques are attracting the cryptanalysts in the field of cryptography. This paper presents a novel swarm based attack called Ant-Crypto (Ant-Cryptographer) for the cryptanalysis of Data Encryption Standard (DES). Ant-Crypto is based on Binary Ant Colony Optimization (BACO) i.e. a binary search space based directed graph...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Applying Encryption Algorithm for Data Security and Privacy in Cloud Computing

    Cloud computing is the next big thing after internet in the field of information technology; some say it's a metaphor for internet. It is an Internet-based computing technology, in which software, shared recourses and information, are provided to consumers and devices on-demand, and as per users requirement on a pay...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Phishing Detection Taxonomy for Mobile Device

    Phishing is one of the social engineering attacks and currently hit on mobile devices. Based on security report by Lookout, 30% of Lookout users clicking on an unsafe link per year by using mobile device. Few phishing detection techniques have been applied on mobile device. However, review on phishing detection...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Optimization of IPv4 Packet's Headers

    The current IPv4 Packet's scheme has several fields to be carried and transmitted in each packet even if the source, the destination and the payload of the packets are same. These fields utilize packet space and thus decrease the size of user data. Therefore the processing of each packet requires...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    A Cooperative Spectrum Sensing Scheme Based on Trust and Fuzzy Logic for Cognitive Radio Sensor Networks

    In this paper, the authors propose a cooperative spectrum sensing scheme based on trust and fuzzy logic for Cognitive Radio Sensor Networks (CRSN). The CRSN nodes use the T-S fuzzy logic to make local decisions on the presence or absence of the Primary User's (PU) signal, and then use a...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    A Cross-Domain Authentication Protocol Based on ID

    In large distributed networks, many computers must be mutual coordination to complete some works under the certain conditions, these computers may come from different domains. For ensuring the safety to access resources among these computers in different domains, the authors propose a cross-domain union authentication scheme. They compute a large...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Modified Secret Sharing Over a Single Path in VoIP With Reliable Data Delivery

    Voice over Internet Protocol (VoIP) is a new fancy and up growing technology. A major change in telecommunication industry is VoIP. The transmission of Real time voice data is not as easy as ordinary text data. The real time voice transmission faces lot of difficulties. It suffers from packet loss,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Implementation of Location Based Services in Android Using GPS and Web Services

    Location based Services offer many advantages to the mobile users to retrieve the information about their current location and process that data to get more useful information near to their location. With the help of A-GPS in phones and through Web Services using GPRS, Location based Services can be implemented...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Cloud Load Balancing Techniques : A Step Towards Green Computing

    Cloud computing is emerging as a new paradigm of large-scale distributed computing. It is a framework for enabling convenient, on-demand network access to a shared pool of computing resources. Load balancing is one of the main challenges in cloud computing which is required to distribute the dynamic workload across multiple...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    MC-CDMA Scheme in Wi-Fi Environment

    The combination of OFDM and Code Division Multiple Access (CDMA) is seen as an attractive and practical solution to enhance the throughput and/or robustness for future high-speed indoor WLANs. The multi-path Rayleigh channel represents a hostile environment for WLANs communication. So, the authors have proposed the MC-CDMA system to overcome...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    A Comparative Study on Performance Benefits of Multi-Core CPUs Using OpenMP

    Achieving scalable parallelism from general programs was not successful to this point. To extract parallelism from programs has become the key focus of interest on multi-core CPUs. There are many techniques and programming models such as MPI, CUDA and OpenMP adopted in order to exploit more performance. But there is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Mobility Metrics Estimation and Categorization for SNET Protocols

    In the performance assessment of an ad-hoc protocol, the protocol should be verified under genuine circumstances including, but not restricted to, an effective transmission range, inadequate buffer space for the storage of messages, illustrative data traffic models, and a mobility model. Deterioration of average speed as the simulation growths, a...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Using Petri Nets for Resource Management Modeling in the Operating Systems

    Nowadays, with advances in computer science and increase in processor speed, modeling methods have found extensive applications in industrial fields. Petri Nets are one of these modeling methods. Petri Nets are based on graph theory and are applied specifically for concurrent and asynchronous applications. As executable models, they are capable...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Fault Tolerance- Challenges, Techniques and Implementation in Cloud Computing

    Fault tolerance is a major concern to guarantee availability and reliability of critical services as well as application execution. In order to minimize failure impact on the system and application execution, failures should be anticipated and proactively handled. Fault tolerance techniques are used to predict these failures and take an...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    MPLS - A Choice of Signaling Protocol

    Multi Protocol Label Switching (MPLS) is a core networking technology that operates essentially in between Layers 2 and 3 of the OSI model; for this reason, MPLS has been referred to as operating at Layer 2.5. MPLS can overlay existing technologies such as ATM (Asynchronous Transfer Mode) or Frame Relay,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    A Study of Edge Detection Method for Different Climate Condition Images Using Digital Image Processing

    Human eye can sense different weather conditions as same as the sensor. The human eye gives good result. In this proposal work the six different edge detection methods are applied to analyze weather condition. In this paper the special kind of changes in the picture for different weather condition are...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Survey of Tolerant Network in Mobile Communication

    Tolerant networks are a class of emerging networks that experience frequent and long-duration partitions. These networks have a variety of applications in situations such as crisis environments and deep-space communication. In this paper, the authors study the problem of multicasting in TNs. Multicast supports the distribution of data to a...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Analysis of Quality of Service Performances of Connection Admission Control Mechanisms in OFDMA IEEE 802.16 Network Using BMAP Queuing

    In this paper, the authors consider a single-cell IEEE 802.16 environment in which the base station allocates subchannels to the subscriber stations in its coverage area. The subchannels allocated to a subscriber station are shared by multiple connections at that subscriber station. To ensure the Quality of Service (QoS) performances,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    Graph Based E-Government Web Service Composition

    Nowadays, e-government has emerged as a government policy to improve the quality and efficiency of public administrations. By exploiting the potential of new information and communication technologies, government agencies are providing a wide spectrum of online services. These services are composed of several web services that comply with well defined...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    3D Model Classification and Retrieval Based on Semantic and Ontology

    Classifying 3D models into classes is an important step in 3D model retrieval process. However, most classification system does not include semantic information. In this paper, a new method has been proposed to classify and to retrieve 3D model using semantic concepts and ontology. First, the authors use the machine...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    Web Services Non-Functional Classification to Enhance Discovery Speed

    Recently, the use and deployment of web services has dramatically increased. This is due to the easiness, interoperability, and flexibility that web services offer to the software systems, which other software structures don't support or support poorly. Web services discovery became more important and research conducted in this area became...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    Specification and Verification of Uplink Framework for Application of Software Engineering Using RM-ODP

    An Architectural Framework for Wireless Mobile has been proposed. This Architectural Framework will allow Uplink to be used in any wireless environment, as required, to provide any type of services demanded by the user regardless whether the uplink is a stand alone, a pure Wireless sensor network or integrated with...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    3D Graphical User Interface on Personal Computer Using p5 Data Glove

    This paper presents Essential Reality works on 3D HCI for changing 2D visual to 3D visual. The mouse is the critical interface to handle 3D graphical objects. Using data glove it's possible to put it on like a normal glove and it then acts as an input device that senses...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    Mingling Multipath Routing With Quality Of Service

    The QoS issue in the Internet have become essential for the successful transmission of multimedia applications. The basic problem of QoS routing is to find a path satisfying multiple constraints. It is concerned with identifying the path that will consider multiple parameters like bandwidth, delay, cost, hopcount etc. instead of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    Dynamic Reputation Based Trust Management Using Neural Network Approach

    Multi-agent systems like Peer-To-Peer (P2P) Networks employ scalable mechanisms that allow anyone to offer content and services to other system users. The open accessibility of these networks makes them vulnerable to malicious users wishing to poison the system. This paper proposed a novel trust and reputation system, using RBF artificial...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    A Subnet Based Intrusion Detection Scheme for Tracking down the Origin of Man-In-The-Middle Attack

    The Address Resolution Protocol (ARP), has proved to work well under regular circumstances, but it is not equipped to cope with malicious hosts. Several methods to mitigate, detect and prevent these attacks do exist for the gateways/routers and nodes. This paper is focused towards developing the authors' own tailor made...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    Amalgamation of Automated Testing and Data Mining : A Novel Approach in Software Testing

    Software engineering comprehends several disciplines devoted to prevent and remedy malfunctions and to warrant adequate behavior. Testing is a widespread validation approach in industry, but it is still largely ad hoc, expensive, and unpredictably effective. In today's industry, the design of software tests is mostly based on the testers' expertise,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    Evaluation Of Scheduling And Load Balancing Techniques in Mobile Grid Architecture

    Recent advances in mobile communications and computing are strong interest of the scientific community in the Grid have led to research into the Mobile Grid. Based on a realistic Mobile Grid architecture the authors formulate the problem of job scheduling and load balancing techniques in a mobile environment and performance...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2011

    A Quality Based Method to Analyze Software Architectures

    In order to produce and develop a software system, it is necessary to have a method of choosing a suitable software architecture which satisfies the required quality attributes and maintains a trade-off between sometimes conflicting ones. Each software architecture includes a set of design decisions for each of which there...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2011

    Applying Fuzzy ID3 Decision Tree for Software Effort Estimation

    Web Effort Estimation is a process of predicting the efforts and cost in terms of money, schedule and staff for any software project system. Many estimation models have been proposed over the last three decades and it is believed that it is a must for the purpose of: Budgeting, risk...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2011

    Object-Based Video Compression Using Neural Networks

    This paper presents a new object-based video compression approach. It consists on predicting video objects motions throughout the scene. Neural networks are used to carry out the prediction step. A multi-step - ahead prediction is performed to predict the video objects trajectories over the sequence. In order to reduce video...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2011

    The Improvement of the Semantic Classification Tool to a SOA to Ensure a Better Tutoring

    For a best collaboration between tutor and learner and relatively to discussion forum, the authors have proposed to tutor a semantic classification tool of messages, which helps him to manage the mass of messages accumulating during the time. The tool provides a semantic classification mechanism based on a chosen theme....

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2011

    Fuzzy Logic Approach for Threat Prioritization in Agile Security Framework Using DREAD Model

    For a qualitative system sound security practices must be a crucial part throughout the entire software lifecycle. Furthermore, agile software development has paved the way for overcoming the problems faced by developers during traditional development process. In the given paper, the authors are using an Agile Security Framework that is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2011

    Ontology Based Qos Driven Web Service Discovery

    In today's scenario web services have become a grand vision to implement the business process functionalities. With increase in number of similar web services, one of the essential challenges is to discover relevant web service with regard to user specification. Relevancy of web service discovery can be improved by augmenting...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2011

    Minimizing the Switch and Link Conflicts in an Optical Multi-Stage Interconnection Network

    Multistage Interconnection Networks (MINs) are very popular in switching and communication applications. A MIN connects N inputs to N outputs and is referred as an N ? N MIN; having size N. Optical Multistage Interconnection Network (OMIN) represents an important class of Interconnection networks. Crosstalk is the basic problem of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2011

    A New Improved Particle Swarm Optimization Algorithm for Multiprocessor Job Scheduling

    Job Scheduling in a Multiprocessor architecture is an extremely difficult NP hard problem, because it requires a large combinatorial search space and also precedence constraints between the processes. For the effective utilization of multiprocessor system, efficient assignment and scheduling of jobs is more important. This paper proposes a new Improved...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2011

    Enhanced Hierarchical Clustering for Genome Databases

    Clustering techniques find interesting and previously unknown patterns in large scale data embedded in a large multi dimensional space and are applied to a wide variety of problems like customer segmentation, Biology, data mining techniques, machine Learning and geographical information systems. Clustering algorithms are used efficiently to scale up with...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2011

    Disjoint Paths Multi-Stage Interconnection Networks Stability Problem

    This research paper emphasizes that the Stable Matching problems are the same as the problems of stable configurations of Multi-stage Interconnection Networks (MIN). The authors have solved the Stability Problem of Existing Regular Gamma Multistage Interconnection Network (GMIN), 3-Disjoint Gamma Multi-stage Interconnection Network (3DGMIN) and 3-Disjoint path Cyclic Gamma Multi-stage...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2011

    Process and Database Modelling of a University Bursary System: A Perspective of Cash Office

    It is generally recognized that System Development Method widely known as System Development Life Cycle (SDLC) is vital instrument that aids toward having an effective and efficient Information system. A lot of IT projects these days are outright failures; IT projects are cancelled before completion. Many failed systems were abandoned...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2011

    Variable Chunk Based Parallel Switching To Minimizing File Download Time in P2P Network

    The Peer-To-Peer (P2P) computing has been one of the emerging technologies in distributed file sharing. Experimental studies show that for a file download, service capacity fluctuation takes minutes to several hours. For a P2P one of the fundamental performances metric is the average download time. The common approach to analyze...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2011

    A Full Featured Component (Object Oriented) Based Architecture Testing Tool

    Object-orientation has rapidly become accepted as the preferred paradigm for large-scale system design. The product created during Software Development effort has to be tested since bugs may get introduced during its development. In this research paper, the authors establish a requirement specification for a comprehensive software testing tool. This will...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2011

    Generation of Test Cases From Software Requirements Using Combination Trees

    Requirements play an important role in conformance of software quality, which is verified and validated through software testing. Usually the software requirements are expressed natural language such as English. In this paper, the authors present an approach to generate test case from requirements. Their approach takes requirements expressed in natural...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2011

    Mining Databases on World Wide Web

    The power of the WWW comes not simply from static HTML pages - which can be very attractive, but the important first step into the WWW is especially the ability to support those pages with powerful software, especially when interfacing to databases. The combination of attractive screen displays, exceptionally easy...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2010

    A RSS Based Adaptive Hand-Off Management Scheme in Heterogeneous Networks

    Mobility management, integration and interworking of existing wireless systems are important factors to obtain seamless roaming and services continuity in Next Generation Wireless Systems (NGWS).So it is important to have a handoff scheme that takes into account the heterogeneity of the network. In this paper, the authors propose a handoff...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Reuse of Use Cases Diagrams: An Approach Based on Ontologies and Semantic Web Technologies

    Software reuse is defined as the use of any artifact, or part thereof, created before, on a new Project. This practice has significant benefits in reducing costs and increasing quality and productivity in software development. Numerous approaches have been proposed aimed mostly at the source code reuse, but this type...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Efficient Digital Image Authentication and Tamper Localization Technique Using 3Lsb Watermarking

    The authentications of digital images have become the center of attentions for certain group of companies since the number of doctored images increased. Tampering the digital images in a way that it's impossible to be detected by naked eyes has become easier with development of image editing tools. Digital watermarking...

    Provided By International Journal of Computer Science Issues