International Journal of Computer Science Issues

Displaying 201-240 of 928 results

  • White Papers // Mar 2013

    Predicting Customer Churn in Mobile Telephony Industry Using Probabilistic Classifiers in Data Mining

    Customer churn in the mobile telephony industry is a continuous problem owing to stiff competition, new technologies, low switching costs, deregulation by governments, among other factors. To address this issue, players in this industry must develop precise and reliable predictive models to identify the possible churners beforehand and then enlist...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    A Study on Data Privacy, Protection & Sanitization Practices During Disk Disposal by Indian Educational Institutes

    Information security practices are inevitable in this era of increased security breaches. With popularity of internet, cyber security issues have taken its main stay. Disk level security issues are ignored by Indian education institutes and society at large. The focus of this paper is to study data privacy, protection &...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    Agent Based Approach for Searching Document in Semantic Web

    The use of web service technology has increased and spread rapidly in many places providing dynamic information to meet the business goal of each provider. However, all of the existing facilities now-a-days are just for the direct users (human) and it is still impossible for its users (machine) to consume...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    Framework Model for Database Replication within the Availability Zones

    In this paper the authors present a proposed model for database replication model in private cloud availability regions, which is an enhancement of the SQL server always on layers of protection model presents by Microsoft in 2012. The enhancement concentrates in the database replication for private cloud availability regions through...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    Sliding Mode ANFIS-Based MIMO Fuzzy Neural Network Control for Robotic Systems

    In this paper the authors develop a design methodology of sliding mode ANFIS-based Multi-Inputs Multi-Outputs (MIMO) Fuzzy Neural Network (AMFNN) control for robotic systems. This control system consists of a Sliding Mode (SM) controller and an AMFNN controller. The SM controller is used to deal with uncertain parts of system...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    Based on RFID Products Information Tracing Anti-Counterfeiting Strategy Design and Application

    Research one security policy in the internet GSM or other possible environments based on the uniqueness and uniformity of RFID chips code and EPC. Its basic process: the data in RFID chips - products database - verification. Its technological process: the reader reads encrypted data in RFID chips some kind...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    Data Mining Framework for Direct Marketing: A Case Study of Bank Marketing

    Direct marketing has generated an increasing interest among academics and practitioners over the past few years. This is due to competitive market environment, advancement in technology and changing behavior of customers which are difficult to predict. Despite of numerous studies that have provided important insights into the direct marketing, the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    Distributed and Clustering Techniques for Multiprocessor Systems

    Hierarchical clustering is often depicted as the better quality clustering approach, but is limited because of its second degree complexity. The distributed clustering area aims to solve several problems that currently limit the scalability of network resources. While, clustering methods determine relationships among the objects, and allow the determination of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    Face Recognition Approach Using Gabor Wavelets, PCA and SVM

    Face recognition is an important research field of pattern recognition. Up to now, it caused researchers great concern from these fields, such as pattern recognition and computer vision. In general, the authors can make sure that the performance of face recognition system is determined by how to extract feature vector...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    Android-Based Java Programming for Mobile Phone LED Control

    The smart phone is quite common with closed market in the past. The mobile phone manufacturers started researching for mobile phone system since Google Ltd. started to develop a completely free open mobile phone platform called android Operation System (OS). The world's major manufacturers and scholars began to study the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    A Novel Low Complexity Combinational RNS Multiplier Using Parallel Prefix Adder

    Modular multiplication plays an important role in encryption. One of the encryption methods which need fast modular multiplication is RSA where large numbers are needed to empower large modules. In such methods, in order to show numbers, RNS is usually used with multiplication as the core. Modulo 2n+1 multipliers are...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    System Dynamics Simulation Model for the Electronic Commerce Credit Risk Mechanism Research

    The credit system is not perfect in e-commerce; lead to a lot of credit risk in e-commerce transaction, the rapid development of electronic commerce was been restrained. Application of system dynamics theory and the computer simulation, it has carried on the modeling of electronic commerce credit system composition, forming factors...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    Enterprise-Wide Logging Through Software Life-Cycle

    A software has distinctive phases; design, development, testing, deployment and retirement. Logging helps developers, testers, maintainers, and managers to effectively acting, reacting, and interacting with the planned and unplanned events during a program execution. Software gets input from and puts output to its dynamically changing operating environments. Logging helps to...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    A New Scheme Based Biometric to Protect Location Privacy in Wireless Body Area Networks

    The Wireless Body Area Network (WBAN) has emerged as a new technology for e-healthcare that allows real time monitoring of patients using small wearable and/or implantable sensors. The latest collect vital information of the patient and communicate them to a central unit using short-range wireless communication techniques. The security and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    Model Based Testing of Datawarehouse

    Testing forms a major part of development lifecycle of a software system. Testing is responsible for ensuring software product meets intended quality of software systems. Large percentage of failure of Datawarehouse projects necessitates an investigation into alternative techniques for all aspects of Datawarehouse development lifecycle including testing. Model based testing...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    Wimax Capacity Estimation through Different Channel Characteristic

    In this paper, the authors study the factors influencing system bandwidth capacity in IEEE 802.16e networks. Additionally, they investigate and evaluate the system capacity of 802.16j in order to understand how the relay architecture can lead to capacity increases in the downlink. An analytical study of the WiMAX propagation channel...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    UML Modeling for General Educational Services in KSA integrated with GIS

    In this paper, the authors has approached the distribution and planning of the educational services in Kingdom of Saudi Arabia (KSA) Governorate. This study is of importance since it dealt with one of the most important sections in any community over the economic and social development of the country, as...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    An End-to-End Secure Mail System Based on Certificateless Cryptography in the Standard Security Model

    Most of the existing mailing systems provide limited authentication mechanisms, including web trust model, password authentication or identity based cryptography. Few existing mailing systems found in the literature provide strong authentication based on Public Key Infrastructure (PKI). However, PKI based-systems generally suffer from certificate management and scalability problems. This paper...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    Building a Cloud Storage Encryption (CSE) Architecture for Enhancing Cloud Security

    Cloud computing is one of the most important way that allow users to share distributed resources now a days. Also it is more complex in nature and results in many security-related issues. Overall data security is an important factor in cloud computing as encryption technologies play a key role in...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    Effect of the MMF Curvature in the System Capacity of an Optical MIMO Channel Using MGDM Technique

    Due to its enormous bandwidth, Multi-Mode Fiber (MMF) seems the only medium able to offer a broadband multiservice system using Mode Group Diversity Multiplexing (MGDM) technique. As an Optical Multiple Input Multiple Output (O-MIMO) method, MGDM exploits efficiently the fiber bandwidth by spatial launching and reception, so that the capacity...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    Dynamic Matrices from Hardware Fingerprint and Its Application in Software Copyright Protection

    Software copyright piracy can be a worldwide sticky question. This encourages vendors to develop various methods against it. In general, the concept of software includes all kinds of electronic documents. While in particular, this concept includes computer programs. Der-Chyuan et al. proposed a two-phase watermarking scheme to protected images and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    Infrastructure Independent Mobility Support for Multiple Mobile Routers Multihomed NEMO Networks

    The performances of the handover through the heterogeneous networks play a crucial role for OoS-sensitive applications and real-time services. Although, NEMO BS protocol has the merit to allow today the deployment and the experimentation of non-temporal constraints services, without having to function in a degraded mode, its performances (high latency,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    A Tool for DataWarehouse Multidimensional Schema Design using Ontology

    The data warehouse has become a necessary component for an effective analysis of large businesses. It is widely accepted that the data warehouse must be structured according to the multidimensional model to facilitate OLAP analysis. The two driving force for the design of a multidimensional model are data source and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    Communication and Control in Home Gateway

    In this paper, the authors introduce the design of home gateway communication control part, including the network interface circuit, network interface driver, Client/Server (C/S) mode of communication, embedded server programming, remote client programming .The server uses LPC2290 as the processing chip, the transplantation of uClinux operating system, in the redhat9.0...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    A Proposed SOAP Model Against Wrapping Attacks and Insecure Conversation

    The web services in SOA are under the heterogeneous ownership domains, there should be a uniform means to offer, discover and interact with each other. Ensuring interoperatability among the web service which is under various ownership domains is the most important challenge. One of the major interoperatablilty issues is protecting...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    Secure and Effective P2P Reputation System using Trust Management and Self Certified Cryptographic Exchanges

    The main reason behind the success of Peer-To-Peer (P2P) networks is the anonymity and the utility offered by them to the users. The Client-server security policies implemented in centralized distributed systems do not provide a desirable solution for P2P networks to store peer reputation information. Though a centralized system does...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    General Approach for the Conservation Energy in Wireless Sensor Networks

    The Wireless Sensor Networks (WSN) typically consists of a large number of intelligent sensor nodes randomly deployed in an area of interest to supervise or monitor various phenomena (temperature, pressure, humidity. During these last years the research in wireless sensor networks has become a very rich field because of the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    Improved Mobile WiMax Image Privacy Using Novel Encryption Techniques

    Mobile WiMAX security standards from IEEE specify some powerful standards-based security controls, including PKMv2 EAP-based authentication and over-the-air AES-based encryption. But encryption technique does not guarantee a powerful secure end-to-end image transmission, and, consequently, WiMAX presents a range of security design and integration challenges. In this paper, two proposed chaos...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    Cognitive Sensor Techniques to Face Security Challenges in CWSN

    Cognitive radio has emerged as the key technology to address efficient spectrum utilization challenge according to the increasing demand for wireless communication. Cognitive Wireless Sensor Networks (CWSNs) are introduced to use Dynamic Spectrum Access (DSA) to effectively face coexistence issues in overcrowded environments. Features existed in CWSNs make security really...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    Managing Vulnerabilities in a Networked System

    Intrusion Detection Systems are not easily constructed or maintained due to the almost daily evolution of network traffic and known exploits. The research in this paper evaluates it through analysis of the documentation published for the University Network as well as experimentation using different rule customizations. Snort is selected because...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    An Improved AES Masking Method Smartcard Implementation for Resisting DPA Attacks

    Currently, side-channel analysis has become a hotspot of cryptographic analyses. Different from conventional cryptographic security analyses, side-channel analyses monitors the changes in the electronic features of the IC, and exploit the information leakage with side channel characteristics (E.g. Power and EM). With modern statistics, now engineers and attackers are able...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    An Efficient Trojan Horse Classification (ETC)

    For the past few years, malware or also known as malicious code is seen as one of the biggest threats of the cyber attacks. It has caused lot of damages, loss of money and productivity to many organizations and end users. Malicious code can be divided into many categories such...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    New DTN Routing Algorithm

    Routing in Delay Tolerant Networks is currently considered as one of the most attracting research areas. While several efforts have led to the introduction of different routing protocols for Delay Tolerant Networks, there are few approaches, which aimed to improve existing protocols. In this paper, the authors present a new...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    A SMS Based Security Providing for an Email ID by Creating an Email Server

    Email is a method of exchanging digital messages from an author to one or more recipients. Email communication is responsible for spreading the majority of virtual infections and poses one of the greatest security risks for companies today. Furthermore, unprotected email messaging also violates compliance regulations in terms of sending...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    Analysis of Modified Cooperative Transmission Routing Protocol in MANET

    The major problems faced by wireless communication in real time environment are that of interference and un-reliable communication links. A lot of research work has been done to overcome this using various techniques. Two of the techniques that help in reducing interference and communication link failures are cooperative communication and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    A Symbol-Based Estimation Technique for Inter-vehicular Communication Performance Optimization

    The aim of this paper is to enhance the quality of Orthogonal Frequency Division Multiplexing (OFDM) estimation in dedicated vehicular communication transmission V2X networks. Wireless Access in Vehicular Environment WAVE as also known IEEE 802.11p represents the standard for these networks. Developing a reliable inter-vehicular V2X communication has to focus...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    Performance Analysis of Variable Energy Levels of Clustering Protocols for Wireless Sensor Network

    Wireless Sensor Network (WSN) is a large network which is consist of huge number of sensor nodes and these nodes are directly interacting with their environment by sensing the physical parameters such as temperature, humidity, etc. All the sensor nodes send or receive data to/from a fixed wired station called...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    A New Robust Cryptography Algorithm Based on Symmetric Key to Prevent Unauthorized Access to Contents of Encrypted Files

    Cryptography has specific role to protect secret file from unauthorized access. Cryptography algorithms are classified in to two types. Symmetric-key producing and Public-key producing algorithms. In this paper, the authors suggested a new cryptography algorithm to increase security in the Symmetric-key producing algorithm. The main features of cryptography algorithm defined...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    Graphical Password Authentication Schemes: Current Status and Key Issues

    Authentication is one the most important security primitive. Password authentication is most widely used authentication mechanism. Users generally use characters as passwords but text-based passwords are difficult to remember and if they are easy to remember then they are vulnerable to various kinds of attacks and are predictable. To address...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    Proposal to Enhance AntNet Routing Algorithm by Exploiting Association Rules as Analysis Tool

    In this paper, the authors introduce a proposal to enhance routing in internetworking depending on Ant Colony Optimization (ACO). The proposal concentrate on truth said: ACO itself is a metaheuristic, so when combined with an actual problem area, it can lead to several heuristics. This research presented AntNet, based on...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    Infrastructure Independent Mobility Support for Multiple Mobile Routers Multihomed NEMO Networks

    The performances of the handover through the heterogeneous networks play a crucial role for OoS-sensitive applications and real-time services. Although, NEMO BS protocol has the merit to allow today the deployment and the experimentation of non-temporal constraints services, without having to function in a degraded mode, its performances (high latency,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    A Tool for DataWarehouse Multidimensional Schema Design using Ontology

    The data warehouse has become a necessary component for an effective analysis of large businesses. It is widely accepted that the data warehouse must be structured according to the multidimensional model to facilitate OLAP analysis. The two driving force for the design of a multidimensional model are data source and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    Communication and Control in Home Gateway

    In this paper, the authors introduce the design of home gateway communication control part, including the network interface circuit, network interface driver, Client/Server (C/S) mode of communication, embedded server programming, remote client programming .The server uses LPC2290 as the processing chip, the transplantation of uClinux operating system, in the redhat9.0...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    A Proposed SOAP Model Against Wrapping Attacks and Insecure Conversation

    The web services in SOA are under the heterogeneous ownership domains, there should be a uniform means to offer, discover and interact with each other. Ensuring interoperatability among the web service which is under various ownership domains is the most important challenge. One of the major interoperatablilty issues is protecting...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Job Scheduling Model for Cloud Computing Based on Multi- Objective Genetic Algorithm

    Cloud computing is an emerging high performance computing environment with a large scale, heterogeneous collection of autonomous systems and flexible computational architecture. To improve the overall performance of cloud computing, with the deadline constraint, a task scheduling model is established for reducing the system power consumption of cloud computing and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Using Chinese Natural Language Interfaces for Navigation in Mobile GIS

    The combination of "Voice technology" and "Mobile GIS", has greatly improved the intelligent degree of mobile GIS. Recently, significant attention in the field of scientific research is turning to how to realize quick conversion between natural language and GIS commands. However, the current paper mostly concentrates on rules of conversion...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    Secure and Effective P2P Reputation System using Trust Management and Self Certified Cryptographic Exchanges

    The main reason behind the success of Peer-To-Peer (P2P) networks is the anonymity and the utility offered by them to the users. The Client-server security policies implemented in centralized distributed systems do not provide a desirable solution for P2P networks to store peer reputation information. Though a centralized system does...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    General Approach for the Conservation Energy in Wireless Sensor Networks

    The Wireless Sensor Networks (WSN) typically consists of a large number of intelligent sensor nodes randomly deployed in an area of interest to supervise or monitor various phenomena (temperature, pressure, humidity. During these last years the research in wireless sensor networks has become a very rich field because of the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    Improved Mobile WiMax Image Privacy Using Novel Encryption Techniques

    Mobile WiMAX security standards from IEEE specify some powerful standards-based security controls, including PKMv2 EAP-based authentication and over-the-air AES-based encryption. But encryption technique does not guarantee a powerful secure end-to-end image transmission, and, consequently, WiMAX presents a range of security design and integration challenges. In this paper, two proposed chaos...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    AODV with Source Route Accumulation for improved Routing in WiMAX

    Worldwide Interoperability for Microwave Access (WiMAX) is a technology that bridges the gap between fixed and mobile access and offer the same subscriber experience for fixed and mobile user. Routing protocols for WiMAX mobile ad-hoc networks have to face the challenge of frequently changing topology, low transmission power, asymmetric links...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Traffic Analysis and Optimization of GSM Network

    Accurate traffic dimensioning plays an important role in telecommunications network planning and is particularly important for the performance analysis of mobile and wireless networks. The main goal of cellular operators now a day with the increasing number of mobile subscribers is to keep the subscribers satisfied with the delivered Quality...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Multiple Parameters Based Approach to Estimate Band Width in Mobile Ad Hoc Networks

    Mobile Ad-hoc NETwork (MANET) is a self-organized network where network is set up on the fly. Some of the issues in MANETs are routing, security, power management, bandwidth management, mobility management, etc. Correct estimation of the available bandwidth is one of the essential components for efficient network resource management and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Performance Analysis of Multicast Routing and Wavelength Assignment (MRWA) Protocol with Dynamic Traffic Grooming in WDM Networks

    The need for on-demand provisioning of wavelength routed channels with service differentiated offerings within the transport layer has become more essential due to the recent emergence of high bit rate IP network applications such as multimedia conferencing systems, video on demand systems, real-time control systems, etc. Diverse optical transport network...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Frequency Reconfigurable Conformal Antennas for Wireless Networks

    Frequency Reconfigurable antennas have received significant attention for their applications in communications, electronic surveillance and countermeasures, by adapting their properties to achieve selectivity in frequency, bandwidth, polarization and gain. This paper presents the design of reconfigurable conformal antenna for Wireless LAN networks. The proposed antenna is suitable for wireless networks...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Analysis of V-BLAST Techniques for MIMO Wireless Channels with Different Modulation Techniques Using Linear and Non Linear Detection

    The rich-scattering wireless channel is capable of huge theoretical capacities. The Multiple Input Multiple Output (MIMO) antenna system provides very promising gain in capacity without increasing the use of spectrum, throughput, and power consumption. This is also less sensitivity to fading, hence leading to a breakthrough in the data rate...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Monitoring of Risky Parameters Using ZigBee Based Wireless Sensor Network

    Wireless Sensor Networks have emerged as a growing research area where most research scholars and industrialists focus on. Many people believe Wireless Sensor Network would become more important than internet in future. In this paper, the authors have designed and developed ZigBee network in real time using ZigBee nodes to...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Peak to Average Power Ratio (PAPR) Reduction Techniques for OFDM-MIMO System

    To get high data rate transmission, High Throughput techniques were analyzed for OFDM-MIMO System. OFDM-MIMO systems based on OFDM symbols suffer from the problem of inherent Peak to Average Power Ratio (PAPR). The peak power of a multi carrier OFDM signal is a critical design factor for band limited communication...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    Cognitive Sensor Techniques to Face Security Challenges in CWSN

    Cognitive radio has emerged as the key technology to address efficient spectrum utilization challenge according to the increasing demand for wireless communication. Cognitive Wireless Sensor Networks (CWSNs) are introduced to use Dynamic Spectrum Access (DSA) to effectively face coexistence issues in overcrowded environments. Features existed in CWSNs make security really...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    Managing Vulnerabilities in a Networked System

    Intrusion Detection Systems are not easily constructed or maintained due to the almost daily evolution of network traffic and known exploits. The research in this paper evaluates it through analysis of the documentation published for the University Network as well as experimentation using different rule customizations. Snort is selected because...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    An Improved AES Masking Method Smartcard Implementation for Resisting DPA Attacks

    Currently, side-channel analysis has become a hotspot of cryptographic analyses. Different from conventional cryptographic security analyses, side-channel analyses monitors the changes in the electronic features of the IC, and exploit the information leakage with side channel characteristics (E.g. Power and EM). With modern statistics, now engineers and attackers are able...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    An Efficient Trojan Horse Classification (ETC)

    For the past few years, malware or also known as malicious code is seen as one of the biggest threats of the cyber attacks. It has caused lot of damages, loss of money and productivity to many organizations and end users. Malicious code can be divided into many categories such...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    New DTN Routing Algorithm

    Routing in Delay Tolerant Networks is currently considered as one of the most attracting research areas. While several efforts have led to the introduction of different routing protocols for Delay Tolerant Networks, there are few approaches, which aimed to improve existing protocols. In this paper, the authors present a new...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    A SMS Based Security Providing for an Email ID by Creating an Email Server

    Email is a method of exchanging digital messages from an author to one or more recipients. Email communication is responsible for spreading the majority of virtual infections and poses one of the greatest security risks for companies today. Furthermore, unprotected email messaging also violates compliance regulations in terms of sending...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    A Blind Detection Algorithm Utilizing Statistical Covariance in Cognitive Radio

    As the expression of performance parameters are obtained using asymptotic method in most blind covariance detection algorithm, the paper presented a new blind detection algorithm using cholesky factorization. Utilizing random matrix theory, the authors derived the performance parameters using non-asymptotic method. The proposed method overcomes the noise uncertainty problem and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Broad-band Circularly Polarized Patch Antenna for Multi-Mode Navigation Application

    A broad-band circularly polarized, patch antenna is developed for GPS/ GLONASS/ BEIDOU/ GALILEO systems. The antenna includes four L-probes, a circular patch with four edges trimming and a feed network. The four L-probes are excited by a feed network in equal magnitude and successive 90 phase difference. The edge cutting...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Content-Centric Networking: Effect of Content Caching on Mitigating DoS Attack

    Content-Centric Networking (CCN) is a novel networking paradigm making named data the first class entity rather than IP address. That is, it cares about which data to fetch rather than which host to reach. One key feature of CCN is the content caching that CCN routers are caching named contents...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    Analysis of Modified Cooperative Transmission Routing Protocol in MANET

    The major problems faced by wireless communication in real time environment are that of interference and un-reliable communication links. A lot of research work has been done to overcome this using various techniques. Two of the techniques that help in reducing interference and communication link failures are cooperative communication and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    A Symbol-Based Estimation Technique for Inter-vehicular Communication Performance Optimization

    The aim of this paper is to enhance the quality of Orthogonal Frequency Division Multiplexing (OFDM) estimation in dedicated vehicular communication transmission V2X networks. Wireless Access in Vehicular Environment WAVE as also known IEEE 802.11p represents the standard for these networks. Developing a reliable inter-vehicular V2X communication has to focus...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    Performance Analysis of Variable Energy Levels of Clustering Protocols for Wireless Sensor Network

    Wireless Sensor Network (WSN) is a large network which is consist of huge number of sensor nodes and these nodes are directly interacting with their environment by sensing the physical parameters such as temperature, humidity, etc. All the sensor nodes send or receive data to/from a fixed wired station called...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    A New Robust Cryptography Algorithm Based on Symmetric Key to Prevent Unauthorized Access to Contents of Encrypted Files

    Cryptography has specific role to protect secret file from unauthorized access. Cryptography algorithms are classified in to two types. Symmetric-key producing and Public-key producing algorithms. In this paper, the authors suggested a new cryptography algorithm to increase security in the Symmetric-key producing algorithm. The main features of cryptography algorithm defined...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    Graphical Password Authentication Schemes: Current Status and Key Issues

    Authentication is one the most important security primitive. Password authentication is most widely used authentication mechanism. Users generally use characters as passwords but text-based passwords are difficult to remember and if they are easy to remember then they are vulnerable to various kinds of attacks and are predictable. To address...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    Proposal to Enhance AntNet Routing Algorithm by Exploiting Association Rules as Analysis Tool

    In this paper, the authors introduce a proposal to enhance routing in internetworking depending on Ant Colony Optimization (ACO). The proposal concentrate on truth said: ACO itself is a metaheuristic, so when combined with an actual problem area, it can lead to several heuristics. This research presented AntNet, based on...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    Failure Detection and Recovery in Hierarchical Network Using FTN Approach

    In current scenario several commercial and social organizations are using computer networks for their business and management purposes. In order to meet the business requirements networks are also grow. The growth of network also promotes the handling capability of large networks because it counter raises the possibilities of various faults...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    Multi-Objective Particle Swarm Optimization for Facility Location Problem in Wireless Mesh Networks

    Wireless Mesh Networks have seen a real progress due of their implementation at a low cost. They present one of Next Generation Networks technologies and can serve as home, companies and universities networks. In this paper, the authors propose and discuss a new multi-objective model for nodes deployment optimization in...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    Performance Analysis of ST, SF and STF in MIMO-OFDM Technique

    In this paper, with the advent of next generation (4G) broadband wireless communications, the combination of Multiple-Input Multiple-Output (MIMO) wireless technology with Orthogonal Frequency Division Multiplexing (OFDM) has been recognized as one of the most promising techniques to support high data rate and high performance. In particular, coding over the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    A New Secure Geographical Routing Protocol Based on Location Pairwise Keys in Wireless Sensor Networks

    Geographical and Energy Aware Routing (GEAR) is an efficient routing protocol in Wireless Sensor Networks (WSN). It behaves well in the face of routing attacks, but it is incapable of defending bogus routing information, Sybil attack and selective forwarding. Aimed at this problem, this paper present a location pairwise keys...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    Performance Comparison of MIMO Systems over AWGN and Rician Channels using OSTBC3 with Zero Forcing Receivers

    Multiple-Input Multiple-Output (MIMO) wireless antenna systems are being recognized as a key technology for future wireless communications. In the present wireless systems, high data rates can be achieved due to the spatial diversity. In this paper, the performance of MIMO system over AWGN and Rician fading channels using OSTBC3 with...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    A Study on Existing Gait Biometrics Approaches and Challenges

    Applications of biometrics system are increasingly day by day as these methods provide more reliable and accurate way of identification and verification. Psychological studies indicate that people have a small but statistically significant ability to recognize the gait of individuals that they know. Gait biometrics is one of the recent...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    A Review on: Issues Related to Security on Tree Structure Data

    The problem of tree structured data is that it requires different Integrity and confidentiality for different portion of same content. Integrity assurance technique not only applies integrity to received data by user, but also any compromise to data that must be precisely determined. In tree structures each node contains some...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Review of Security Approaches in Routing Protocol in Mobile Adhoc Network

    In this paper, the objective is to present a review of routing protocols in Mobile Ad hoc NETwork (MANET) exclusively from security viewpoint. In MANET, the mobile nodes often move randomly for which reason the cumulative network experiences rapid and much unpredictable topology alterations. Due to presence of dynamic topology...

    Provided By International Journal of Computer Science Issues