International Journal of Computer Science Issues

Displaying 161-200 of 926 results

  • White Papers // Sep 2013

    A Symbol Based Graphical Schema Resistant to Peeping Attack

    Alphanumeric passwords are the most commonly used way of authenticating users in computer systems. One of the disadvantages of alphanumeric passwords is that they are hard to remember. Image passwords have been proposed to aim to make passwords more memorable and easier for users to use and, for this reason,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2013

    The Impact of Indexes on Data Warehouse Performance

    A data warehouse designer should consider the effectiveness of data query, this depends on the selection of relevant indexes and their combination with the materialized views, note that the index selection is a NP-complete problem, because the number of indexes is exponential in the total number of attributes in the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2013

    Semi-Automatic Data Warehouse Design Methodologies: A Survey

    Faced to the large amounts of data and the remarkable diversification of their sources, a scientific and economic interest to explore the reservoirs of knowledge is established. Data warehouses are used in making strategic decisions. A data warehouse is a collection of integrated, historised data originating from heterogeneous sources which...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2013

    Mitigate Black Hole Attack In Dynamic Source Routing (DSR) Protocol By Trapping

    Ad hoc network maximize the total network throughput by using all available nodes for routing and forwarding. MANETs are highly vulnerable to attacks than wired networks due to the open medium, dynamically changing network topology, cooperative algorithms, and lack of centralized monitoring. Hence, a node can misbehave and fail to...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2013

    Assessment of Offline Digital Signature Recognition Classification Techniques

    The digital signature verification has become an interesting domain, which is widely needed. The usage of online and offline digital signatures has been spreaded worldwide due to the increase of use of bank transactions and user authentication and other similar activities. This requires the creation and the diversification of new...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2013

    A Model for Optimizing Data Caching of Dual Mode Handheld Devices

    Handheld apparatus are widely used especially when equipped with an automatic data capturing solutions. They are usually connected to the main database server using either an economic fixed location mode or a more expensive mobile mode. In order to quantify the gap of the two modes, a metric called mobility...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2013

    Biometric System by Pointing Finger

    Biometrics is an important application of pattern recognition, the cross-domain path between data analysis and artificial intelligence. Technological change and the growing computerization of society have paved the way for biometric systems. They rest on sequence procedures that always follow the same development: biometric data is converted to digital data...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2013

    Performance Evaluation of Naive Bayes and Decision Stump Algorithms in Mining Students' Educational Data

    Educational data mining is an emerging trend, concerned with developing methods for exploring the huge data that come from the educational system. This data is used to derive the knowledge which is useful in decision making which is known as Knowledge Discovery in Databases (KDD). EDM methods are useful to...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2013

    Intelligent Vehicle Recognition Based on Wireless Sensor Network

    One of the main requirements of any intelligent transportation system is to be able to identify vehicles in the traffic. This paper presents an intelligent vehicle identification system used within a complete solution for a traffic monitoring system that uses novel wireless sensor network architecture to monitor traffic. Novel wireless...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2013

    Broad View of Cryptographic Hash Functions

    In this paper the authors presented an extensive study of cryptographic hash functions. Cryptographic hash function is a function that takes an arbitrary length as an input and produces a fixed size of an output. The viability of using cryptographic hash function is to verify data integrity and sender identity...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2013

    Sentiment Analysis of Equities Using Data Mining Techniques and Visualizing the Trends

    Markets reflect sensitively towards opinions and sentiments. Investors should be wary of the fact that external factors interact deeply with the share markets and mark their influence over the coming period. National tragedy, low economic growth, IPO releases, RBI decisions on interest rates, foreign matters and many more have an...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2013

    Energy Efficient Topology Control Approach for Mobile Ad hoc Networks

    In MANET, energy consumption and network connectivity are the two very important issues. Due to the mobility of the nodes, the network partition occurs unlimitedly. To avoid this, several researches concentrated on this issue. But it is not focused on constantly. In this paper, the authors developed Energy Efficient Topology...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2013

    The Effect of Data Hiding at Various Bit Positions on Audio Stegnography in DCT Domain

    In this paper the authors presents the statistical analysis of various quality measuring parameters of audio stenography, e.g. Signal to Noise Ratio (SNR), Peak Signal to Noise Ratio (PSNR) and Mean Square Error (MSE), for different bit position substitution in an audio cover file in Discrete Cosine Transform (DCT) domain....

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2013

    An Energy Efficient Data Redundancy Reduction Approach for Data Aggregation in WSN

    WSN has the potentiality to join the physical world with the virtual world by creating a network of sensor nodes. Here, sensor nodes are usually battery-operated devices, and hence energy reduction of sensor nodes is a major design issue. To extend the network's lifetime, minimization of energy consumption should be...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2013

    Dimension Reduction in Intrusion Detection Features Using Discriminative Machine Learning Approach

    With the growing need of internet in daily life and the dependence on the world wide system of computer networks, the network security is becoming a necessary requirement of the authors' world to secure the confidential information available on the networks. Efficient intrusion detection is needed as a defense of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2013

    A Novel Design to Increase Trust in Cloud IaaS Model

    In IaaS services of cloud the customers demand for hardware resources as a service like memory, processor cycles, disk storage even software. IaaS services of cloud rely heavily on virtualization. The service is provided by means of virtual machine. It is not easy task for cloud users to store their...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2013

    Keystroke Dynamics Authentication: A Survey of Free-Text Methods

    Current computer systems depend greatly on authentication methods in order to provide sufficient protection to the data handled by these systems. Rather than using the common username and password scheme which suffers from many security and usability limitations, the authors investigate in this paper the use of keystroke dynamics as...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2013

    Adaptive Approach for Spam Detection

    Spam has emerged as a major problem in recent years. The most widely recognized form of spam, is email spam. The accounts which contain spam messages must waste time deleting annoying and possibly offensive message. In this paper, the authors present a variety of machine learning algorithms to identify spam...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2013

    On the Limits of Perfect Security for Steganographic System

    Until now the discussion on perfect security for steganographic systems has remained confined within the realm of mathematicians and information theory experts whose concise and symbolic representation of their philosophies, postulates, and inference thereafter has made it hard for the na

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2013

    A Review of Fault Detection Techniques for Wireless Sensor Networks

    Today, Wireless Sensor Networks (WSNs) emerge as a revolution in all aspects of the people life. WSNs have unique specifications of themselves that describe them different from other networks. Fault tolerance is one of the most significant of many challenges in these networks. Five key features need to be considered...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2013

    Cloud Computing: A Survey on Its Limitations and Potential Solutions

    Cloud computing has brought a new paradigm shift in technology industry and becoming increasingly popular day by day. The Small to Medium Enterprises (SMEs) are now adopting cloud computing in much more higher rate than large enterprises. That raises a debate whether this cloud computing technology will penetrate throughout the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2013

    Improving the Methods of Email Classification Based on Words Ontology

    The internet has dramatically changed the relationship among people and their relationships with others people and made the valuable information available for the users. E-mail is the service, which the Internet provides today for its own users; this service has attracted most of the users' attention due to the low...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2013

    Ontology Based Data Warehouses Federation Management System

    Data warehouses are nowadays an important component in every competitive system, it's one of the main components on which business intelligence is based. The authors can even say that many companies are climbing to the next level and use a set of data warehouses to provide the complete information or...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2013

    Design and Implementation of a Telco Business Intelligence Solution Using ETOM, SID and Business Metrics: Focus on Data Mart and Application on Order-to-Payment End to End Process

    Facing the new market challenges, service providers are looking for solutions to improve three major business areas namely the Customer Experience, the Operational Efficiency and Revenue and Margin. To meet the business requirements related to these areas, service providers are going through three major transformation programs namely the Business Support...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2013

    Effects of Black Hole Attack on MANET Using Reactive and Proactive Protocols

    Wireless networks are gaining popularity to its peak in the present era and therefore appealing the users for wireless connectivity irrespective of their geographic position. There is an increasing threat of attacks on the Mobile Ad-hoc NETworks (MANET). Black hole attack is one of the security threat in which the...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2013

    A Content Based Classification of Spam Mails with Fuzzy Word Ranking

    The spam mails are used by spammers to steal the data of the users and organizations online. Rapid growth rate of the use of the internet has increased the spam mails. There are several methods employed for filtering spam. This approach is to classify the spam mails using spam word...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2013

    Secure Routing Schema for MANET with Probabilistic Node to Node forwarding

    In Mobile Ad hoc wireless NETworks (MANETs) there is no fixed infrastructure available for routing packets from end-to-end in a network and instead rely on intermediary peers. The nodes in MANET are subject to various attacks that range from na

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2013

    Meta-Modeling Cloud Computing Architecture in Distance Learning

    Cloud computing architecture in distance learning has grown exponentially in the recent past. Distance Learning itself has been accommodated as an innovative technology in the IT infrastructure. It has had numerous inventions that have always offered substantial merits and benefits to major activities that human beings undertake. Due to increased...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2013

    A New Approach for Location Based Tracking

    Location tracking is becoming very popular in the modern era. It offers innovative applications in the market for mobile user. The technology is helpful for the parents who wants to be aware of where their children are. In this paper, a \"Localize intelligence algorithm\" is developed in the field of...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2013

    Privacy Preserving Data Mining: Case of Association Rules

    Data mining has become an important technology to discover a hidden and nontrivial knowledge from large amounts of data. A major problem is to achieve this discovery process with preserving privacy of extracted data and/or knowledge. Privacy Preserving Data Mining (PPDM) is a new area of research that studies the...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2013

    Capacity Crunch: Can Mosonets Offload Data Solve This

    Due to the increasing popularity of various applications for smart phones, 3G cellular networks are currently overloaded by mobile data traffic. Offloading mobile cellular network traffic through opportunistic communications is a promising solution to partially solve mobile data traffic, because there is no monetary cost for it. To solve this...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2013

    Customer Buying Behavior Analysis: A Clustered Closed Frequent Itemsets for Transactional Databases

    The problem in data mining applications is the mining of frequent patterns. Though there has been various techniques, such as pattern discovery, association rule mining etc, these methods generates a large volume of frequent patterns and rules which are not useful for finding the essential patterns among them, from the...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2013

    The Rumor Riding Anonymity Approach for Decentralized Peer to Peer Systems

    The anonymizing peer to peer system is frequently incurred additional expense in order to efficiency transfer and several systems execute to disguise the uniqueness privacy considerations issues for their users. Although, an anonymity technique mostly existing path base peer before transmits, it has pre-create an anonymous path. An information as...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2013

    Grid Security and Trust Management Overview

    Security is one of the most important aspects in all grid environments. Researchers and engineers developed many technologies and frameworks used to establish an environment, in which users can use grid capabilities in a secure manner. In traditional grid environments security is based on user authentication and authorization of user's...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2013

    Sensitivity Analysis of Cloud Under Transient Conditions

    Cloud computing is a new economic computing paradigm in which information and shared resources can be accessed from a web browser by customers. Clouds consists of a collection virtualized resources which includes both computational software and hardware facilities that can be provided to the customers based on demand. This on...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2013

    IAX-Based Peer-to-Peer VoIP Architecture

    Now-a-days, Voice over IP (VoIP) constitutes a privileged field of service innovation. One benefit of the VoIP technology is that it may be deployed using a centralized or a distributed architecture. The majority of today's VoIP systems are deployed using the client - server centralized architecture. One of the most...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2013

    Selection Criteria for Data Mining Software: A Study

    Now-a-days software are flooded in the market, there is a need for selection criteria of software package that should be available for individuals and organizations. As the number of software continues to grow and new features added to the new software the selection of the most suitable software package is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    System Dynamics Simulation Model for the Electronic Commerce Credit Risk Mechanism Research

    The credit system is not perfect in e-commerce; lead to a lot of credit risk in e-commerce transaction, the rapid development of electronic commerce was been restrained. Application of system dynamics theory and the computer simulation, it has carried on the modeling of electronic commerce credit system composition, forming factors...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    Secure and Effective P2P Reputation System using Trust Management and Self Certified Cryptographic Exchanges

    The main reason behind the success of Peer-To-Peer (P2P) networks is the anonymity and the utility offered by them to the users. The Client-server security policies implemented in centralized distributed systems do not provide a desirable solution for P2P networks to store peer reputation information. Though a centralized system does...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    General Approach for the Conservation Energy in Wireless Sensor Networks

    The Wireless Sensor Networks (WSN) typically consists of a large number of intelligent sensor nodes randomly deployed in an area of interest to supervise or monitor various phenomena (temperature, pressure, humidity. During these last years the research in wireless sensor networks has become a very rich field because of the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Credit Card Fraud Detection Using Decision Tree for Tracing Email and IP

    Credit card fraud is a wide-ranging term for theft and fraud committed using a credit card or any similar payment mechanism as a fraudulent source of funds in a transaction. The purpose may be to obtain goods without paying, or to obtain unauthorized funds from an account. Transactions completed with...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Analysis of AODV Over Increased Density and Mobility in Intelligent Transportation System

    Currently the area of VANET lacks in having some better designed algorithms to handle dynamic change and frequent disruption due to the high mobility of the vehicles. There are many techniques to disseminate messages across moving vehicles but they are all highly dependent on some conditions involving flow, density and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Using Mobile Agent Technology to Develop a Collaborative Product Lifecycle Oriented Architecture

    Today product development activities are becoming more and more agile, adaptable, and cost-effective. Multi-agent-based system technology has found wide applications in managing company's information. This paper applies Multi-mobile-agent technology in developing a collaborative architecture for product lifecycle. By adopting the Aglets mobile agent platform, a generic platform has been developed...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    An Agent Oriented Information System: An MDA Based Development

    Information Systems (IS) development should not only accomplish functional models but also conceptual models to represent the organizational environment in which it will have to evolve and must be aligned with strategic objectives. Generally, a significant innovations in the enterprise, is to organize its IS around its business processes. Otherwise,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Study on Cloud Computing Resource Scheduling Strategy Based on the Ant Colony Optimization Algorithm

    In order to replace the traditional Internet software usage patterns and enterprise management mode, this paper proposes a new business calculation mode-cloud computing, resources scheduling strategy is the key technology in cloud computing, Based on the study of cloud computing system structure and the mode of operation, The key research...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Improving Handover Performance in Wireless Mobile Networks

    In this paper, the authors propose an enhanced packet scheduling scheme to favour UEs that experienced HandOver (HO) in wireless mobile networks. The main idea of the proposed scheme is not only prioritized the HO connections at the CAC level but also prioritized the HO connections at the scheduler level....

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Urban Data Collector Protocol: Performance Evaluation With Different Suppression Techniques

    This research was aimed at using Vehicular Adhoc NETworks (VANET) as infra-structure for an urban cyber-physical system in order to gather valuable data in a city. This paper is proposed an Urban Data Collector (UDC) protocol in urban area where all nodes are data sources and there is a gateway...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    A Lossless Data Hiding Technique Based on AES-DWT

    In this paper, the authors propose a new data hiding technique. The new technique uses steganography and cryptography on images with a size of 256x256 pixels and an 8-bit grayscale format. There are design restrictions such as a fixed-size cover image, and reconstruction without error of the hidden image. The...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Designing a High Efficiency Pulse Width Modulation Step-Down DC/DC Converter for Mobile Phone Applications

    This paper presents the design and analysis of a high efficiency, PWM (Pulse-Width-Modulation) Buck converters for mobile phone applications. The steady-state and average-value models for the proposed converter are developed and simulated. A practical design approach which aims at systematizing the procedure for the selection of the control parameters is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    A Semi-Structured Tailoring-Driven Approach for ERP Selection

    It has been widely reported that selecting an inappropriate system is a major reason for ERP implementation failures. The selection of an ERP system is therefore critical. While the number of papers related to ERP implementation is substantial, ERP evaluation and selection approaches have received few attention. Motivated by the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Wired and Wireless Parallel Simulation of Fluid Flow Problem on Heterogeneous Network Cluster

    In this paper, homogeneous and heterogeneous networks will be analyzed using parallel processing technique for highly sophisticated research problem. During the analysis sample networks will be considered and QoS parameters will be observed using simulation for end-to-end services. Analysis of the wireless LAN system is carried out and its efficiency...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    An Energy Aware Spatial Correlation Method in Event Driven Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are used to monitor and control the physical environment in different classes of applications. Due to the dense deployment of sensors and as the sensor observations are spatially correlated with respect to location of sensor nodes, it is not necessary for every sensor to transmit its...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Study of Face Recognition Approach Based on Similarity Measures

    Detecting the similarity of face image aims to determine the image of a face for verification purpose of documents such as passport, driving license, ID cards, etc. Similarity measures are essential to solve many pattern recognition problems such as classification, clustering, and retrieval problems. There are efforts in finding the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Enhancing Packet-Level Forward Error Correction for Streaming Video in Wireless Networks

    Forward Error Correction (FEC) is a common error control technique in which the streaming video is protected by adding redundant data to the encoded bitstream such that the original source information can still be recovered in the event of errors or losses. Based on the information on the video content...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Modelling of VoIP Based Tele-Teaching System: A Petri Net Based Approach

    In this paper, the authors propose an algorithm called interactive group synchronization to reduce the chance of audio speech overlapping in VoIP based conferencing. They also extend the capability of colored petri nets by introducing time parameter in it. The propose TCPN (Time Colored Petri Nets) tool is applied here...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    FIDRS: A Novel Framework for Integrated Distributed Reliable Systems

    In this paper, the authors represent a new framework for integrated distributed and reliable systems. In the proposed framework they have used three parts to increase satisfaction and performance of this framework. At first, they analyze previous frameworks related to integrated systems, then represent new proposed framework in order to...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Design and Implementation of Multitier Authentication Scheme in Cloud

    The purpose of this paper is to present the design of a secure and more advanced authentication scheme for executing secure financial transactions over Internet. There has been continuous change in technology day by day, so security mechanisms like authentication schemes are also required to be updated. The security measures...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    A Novel Technique Based on Node Registration in MANETs

    In ad hoc network communication links between the nodes are wireless and each node acts as a router for the other node and packet is forward from one node to other. This type of networks helps in solving challenges and problems that may arise in every day communication. Mobile Ad...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    New Capabilities of Visual Cryptography

    Visual Cryptography Schemes (VCS) consider the problem of encrypting and sharing images (printed text, hand written notes, pictures, etc.) in a perfectly secure way which can be decrypted directly by the human visual system. A k out of n VCS for is a technique by which a Secret Image (SI)...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Snapshot Based Virtualization Mechanism for Cloud Computing

    Virtualization in cloud computing has been the latest evolutionary technology in current applications of various industries and IT firms are adopting cloud technology. The concept of cloud computing was introduced long back. Since its inception there have been many number of new innovations implemented by different experts and researchers etc....

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    On Web Services Based Cloud Interoperability

    Cloud Computing is a paradigm shift in the field of Computing. It is moving at an incredible fast pace and one of the fastest evolving domains of computer science today. It consist set of technology and service models that concentrates on the internet base use and delivery of IT applications,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    A CDMA Based Scalable Hierarchical Architecture for Network-On-Chip

    A Scalable hierarchical architecture based Code-Division Multiple Access (CDMA) is proposed for high performance Network-on-Chip (NoC). This hierarchical architecture provides the integration of a large number of IPs in a single on-chip system. The network encoding and decoding schemes for CDMA transmission are provided. The proposed CDMA NoC architecture is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    A Stable Distributed Clustering Algorithm for Mobile Adhoc Networks

    Mobile Ad hoc NETworks (MANET) are distributed systems which consist of several mobile nodes; they do not include predetermined topology and have no concentrated control. The nodes connect wirelessly by the approach in which they decide themselves. To access the development in the MANET, an approach should be found such...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Towards Identification and Recognition of Trace Associations in Software Requirements Traceability

    In the field of software engineering, requirements traceability is becoming a dynamic area of research. Producing numerous artifacts is crucial activity to maintain and yield high quality software. These artifacts are created and generated throughout the lifetime of software development, and are highly interrelated where the impact of any change...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    A Comparison of Various Edge Detection Techniques Used in Image Processing

    In this paper the important problem is to understand the fundamental concepts of various filters and apply these filters in identifying a shark fish type which is taken as a case study. In this paper the edge detection techniques are taken for consideration. The software is implemented using MATLAB. The...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Context-Awareness for Service Oriented Systems

    Today, service oriented systems need to be enhanced to sense and react to user's context in order to provide a better user experience. To meet this requirement, Context-Aware Services (CAS) has emerged as an underling design and development paradigm for the development of context-aware systems. The fundamental challenges for such...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Cryptanalysis of a Public-Key Cryptosystem Using Lattice Basis Reduction Algorithm

    The authors considered cryptanalysis of a knapsack-type public key cryptosystem. This cryptosystem uses a combination permutation algorithm in the encryption phase to avoid the low density attack by keeping the density high. This cryptosystem is vulnerable to LLL-lattice basis reduction algorithm, since it uses a super-increasing sequence as a private...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Probabilistic Checkpointing Protocol to Sensor Network Fault-Tolerant

    A wireless sensor network WSN is a collection of autonomous sensors nodes organized into a cooperative network. A sensor node transmits the data quantity to the sink. Indeed, a failed sink may abort the overall mission of the network. Due to their crucial functions, sinks must be designed and maintained...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    Energy Efficient Routing Scheme for Sensor Networks Using Connected Dominating Set

    A power efficient scheduling scheme extending the life time of sensor nodes on wireless sensor networks has been proposed in this paper. This power efficient sleep scheduling algorithm is based on the connected dominating set approach. This approach first constructs a connected dominating set for parent selection and uses the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Edge Dominating Capability Based Backbone Construction in Wireless Networks

    Constructing a connected dominating set as the virtual backbone plays an important role in wireless networks. In this paper, the authors propose two novel approximate algorithms for dominating set and connected dominating set in wireless networks, respectively. Both of the algorithms are based on edge dominating capability which is a...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Relational Analysis Based Concurrent Multipath Transfer Over Heterogeneous Vehicular Networks

    In recent years, the growing interest in the Intelligent Transportation Systems (ITS) has resulted in variety of peer-reviewed publications. Significant results in this area have enabled many civilian and industry applications. As more and more vehicles are equipped with multiple network interfaces, how to efficient utilize the coexistence of Radio...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    A Study on Preference of Interface Design Techniques for Web Survey

    According to the advancement in internet and web-based application, the survey via the internet has been increasingly utilized due to its convenience and time saving. This paper studied the influence of five web-design techniques - screen design, response format, logo type, progress indicator, and image display on the interest of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Image Compression Using Harmony Search Algorithm

    Image compression techniques are important and useful in data storage and image transmission through the Internet. These techniques eliminate redundant information in an image which minimizes the physical space requirement of the image. Numerous types of image compression algorithms have been developed but the resulting image is still less than...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Evaluating on Performance of Single-Source Single-Relay SR-CARQ Protocol in TDMA Networks With Raleigh Fading

    This paper analyzes the performance of single-source and single-relay SR-CARQ protocol in TDMA wireless communication system. The authors establish its M/G/1 queuing model with vacations, and provide the expressions of its system time delay and saturation throughput. Then the analysis of theory and simulation results under the slow Raleigh fading...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    An Efficient Collision Detection Scheme for Generation-2 RFID Systems

    In Radio-Frequency IDentification (RFID) systems, tag collision resolution is a significant issue for fast tag identification. Dynamic Framed Slotted ALOHA (DFSA) is one of the most widely used algorithms to resolve tag collision. Collision Detection (CD) plays an important role in determining the efficiency of DFSA-based algorithms because most DFSA-based...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Formalized Security Model of Identity-Based Multi-Proxy Signature

    Multi-proxy signature is an extension of the primitive basic proxy signature. In a multi-proxy signature scheme, an original signer could delegate his signing rights to a group of proxy signers. And only the cooperation of all the proxy signers can generate the proxy signature on behalf of the original signer....

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Real-Time Covert Communications Channel for Audio Signals

    Covert communications channel is considered as a type of secure communications that creates capability to transfer information between entities while hiding the contents of the channel. Multimedia data hiding techniques can be used to establish a covert channel for secret communications within a media carrier. In this paper, a high-rate...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Software Defect Prediction Models for Quality Improvement: A Literature Study

    In spite of meticulous planning, well documentation and proper process control during software development, occurrences of certain defects are inevitable. These software defects may lead to degradation of the quality which might be the underlying cause of failure. In today's cutting edge competition it's necessary to make conscious efforts to...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    SAHR: Swarm Adaptive Hybrid Routing Protocol for Mobile Ad hoc Networks

    The nodes in the Ad hoc networks are independent and well structured. The authors know that a couple of nodes can interact with one another, if they have entered into the opponent transition region. For this purpose wireless means is being utilized by the nodes. The tiniest creature in the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Prevention of Attacks Under DDoS Using Target Customer Behavior

    The possibility of sharing information through networking has been growing in geometrical progression. In this connection it is to be noted network attacks, in other words, DDoS attacks also are growing in equal proportion. Sharing of information is being carried out by means of server and client. The client requests...

    Provided By International Journal of Computer Science Issues