International Journal of Computer Science Issues

Displaying 241-280 of 879 results

  • White Papers // Jan 2013

    RFID Technology Based Attendance Management System

    RFID is a nascent technology, deeply rooted by its early developments in using radar as a harbinger of adversary planes during World War II. A plethora of industries have leveraged the benefits of RFID technology for enhancements in sectors like military, sports, security, airline, animal farms, healthcare and other areas....

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Multiple Servers - Queue Model for Agent Based Technology in Cache Consistence Maintenance of Mobile Environment

    Caching is one of the important techniques in mobile computing. In caching, frequently accessed data is stored in mobile clients to avoid network traffic and improve the performance in mobile computing. In a mobile computing environment, the number of mobile users increases and requests the server for any updation, but...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Energy Efficient Routing in Mobile Ad-hoc Networks for Healthcare Environments

    The modern and innovative medical applications based on wireless network are being developed in the commercial sectors as well as in research. The emerging wireless networks are rapidly becoming a fundamental part of medical solutions due to increasing accessibility for healthcare professionals/patients reducing healthcare costs. Discovering the routes among hosts...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Detection of Pulsing DoS Attacks at Their Source Networks

    Pulsing Denial of Service (PDoS) is a type of DoS attack. Its attacking behavior is intermittent rather than constant, which helps it avoid being detected. In this paper, an adaptive detection method is proposed for source-end detection of PDoS attacks. It has three distinctive features: its detection statistic is based...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Modeling of Multipath Transport

    In this paper, the authors propose a model for evaluating the transmission performance of multipath transport. Previous researches focused exclusively on single pair users in simple scenarios. The distinct perspective in this paper is to build models for analyzing the performance when multipath transport is used in the entire network...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Enhanced Intrusion Detection System for Input Validation Attacks in Web Application

    Internet continues to expand exponentially and access to the Internet become more prevalent in users daily life but at the same time web application are becoming most attractive targets for hacker and cyber criminals. This paper presents an enhanced intrusion detection system approach for detecting input validation attacks in the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    User Behavior Prediction based Adaptive Policy Pre-fetching Scheme for Efficient Network Management

    In recent years, network management is commonly regarded as an essential and promising function for managing and improving the security of network infrastructures. However, as networks get faster and network centric applications get more complex, there is still significant ongoing work addressing many challenges of the network management. Traditional passive...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    An Improved Interference Cancellation Scheme for Two- User MIMO-MAC

    Multiple-Input Multiple-Output (MIMO), which is one of the mandatory techniques for the next generation wireless communication systems, has the features of spatial multiplexing and spatial diversity. MIMO Multiple Access Channels (MAC) offers substantial capacity improvements and has attracted considerable research attention. There is serious co-channel interference over MIMO-MAC since multiple...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Ant-Crypto, A Cryptographer for Data Encryption Standard

    Swarm Intelligence and Evolutionary Techniques are attracting the cryptanalysts in the field of cryptography. This paper presents a novel swarm based attack called Ant-Crypto (Ant-Cryptographer) for the cryptanalysis of Data Encryption Standard (DES). Ant-Crypto is based on Binary Ant Colony Optimization (BACO) i.e. a binary search space based directed graph...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Applying Encryption Algorithm for Data Security and Privacy in Cloud Computing

    Cloud computing is the next big thing after internet in the field of information technology; some say it's a metaphor for internet. It is an Internet-based computing technology, in which software, shared recourses and information, are provided to consumers and devices on-demand, and as per users requirement on a pay...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Phishing Detection Taxonomy for Mobile Device

    Phishing is one of the social engineering attacks and currently hit on mobile devices. Based on security report by Lookout, 30% of Lookout users clicking on an unsafe link per year by using mobile device. Few phishing detection techniques have been applied on mobile device. However, review on phishing detection...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Optimization of IPv4 Packet's Headers

    The current IPv4 Packet's scheme has several fields to be carried and transmitted in each packet even if the source, the destination and the payload of the packets are same. These fields utilize packet space and thus decrease the size of user data. Therefore the processing of each packet requires...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    A Cooperative Spectrum Sensing Scheme Based on Trust and Fuzzy Logic for Cognitive Radio Sensor Networks

    In this paper, the authors propose a cooperative spectrum sensing scheme based on trust and fuzzy logic for Cognitive Radio Sensor Networks (CRSN). The CRSN nodes use the T-S fuzzy logic to make local decisions on the presence or absence of the Primary User's (PU) signal, and then use a...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    A Cross-Domain Authentication Protocol Based on ID

    In large distributed networks, many computers must be mutual coordination to complete some works under the certain conditions, these computers may come from different domains. For ensuring the safety to access resources among these computers in different domains, the authors propose a cross-domain union authentication scheme. They compute a large...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Job Scheduling Model for Cloud Computing Based on Multi- Objective Genetic Algorithm

    Cloud computing is an emerging high performance computing environment with a large scale, heterogeneous collection of autonomous systems and flexible computational architecture. To improve the overall performance of cloud computing, with the deadline constraint, a task scheduling model is established for reducing the system power consumption of cloud computing and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Using Chinese Natural Language Interfaces for Navigation in Mobile GIS

    The combination of "Voice technology" and "Mobile GIS", has greatly improved the intelligent degree of mobile GIS. Recently, significant attention in the field of scientific research is turning to how to realize quick conversion between natural language and GIS commands. However, the current paper mostly concentrates on rules of conversion...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Dynamic Tracking Protocol for Maneuvering Targets in Sensor Network

    Target tracking is one of the most important applications in Wireless Sensor Networks (WSNs). Energy efficiency is one of the most important design goals for target tracking. The authors propose and evaluate a distributed, energy-efficient, light-weight framework dynamic clustering algorithm for target localization and tracking in wireless sensor networks. Since...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Achieving Load Balance by Separating IP Address Spaces

    In this paper, the authors propose a load balance approach by separating the host and router IP addresses into two spaces. In addition, in their approach, they propose a scheduling algorithm, named Edge Stream Balance (ESB), which is used by the proposed multipath routing scheme based on the address space...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Intelligent communication of WSN based on a multi-agent system

    The Wireless Sensor Network (WSN) consists of a large number of sensor nodes with limited batteries, which are deployed randomly over an area to collect data. Therefore, it is important to minimize energy consumption of each node, which leads to the extension of the life of the network. As many...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    A Novel Particle Swarm Optimization-based Algorithm for the Optimal Centralized Wireless Access Network

    The wireless access networks design problem is formulated as a constrained optimization problem, where the goal is to find a network topology such that an objective function is optimized, subject to a set of constraints. The objective function may be the total cost, or some performance measure like utilization, call...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Study of Online Bayesian Networks Learning in a Multi-Agent System

    The authors attempt to find how a common task can be performed by a multi-agent self-organizing system. The agents are independent in terms of their model of environment and their actions. Each agent explores the environment and decides its actions by itself. Agents will have no information about the environment...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Fuzzy Logic System for Opportunistic Spectrum Access using Cognitive Radio

    Opportunistic spectrum access approach is enabled by cognitive radios which are able to sense the unused spectrum and adapt their operating characteristics to the real-time environment. However, a naive spectrum access for secondary users can make spectrum utilization inefficient and increase interference to adjacent users. In this paper, the authors...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    A Comparative Approach for Localization Techniques in Wireless Sensor Networks

    A Wireless Sensor Network is a collection of many tiny sensing and wireless communication device called sensor nodes. Each node consists of a processor, a battery and a transceiver for communication. Nodes are connected to each other via transceiver. Localization of sensor nodes in wireless sensor nodes plays an important...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    The Study on the Spam Filtering Technology Based on Bayesian Algorithm

    In this paper, the authors analyzed spam filtering technology, carried out a detailed study of Naive Bayes algorithm, and proposed the improved Naive Bayesian mail filtering technology. Improvement can be seen in text selection as well as feature extraction. The general Bayesian text classification algorithm mostly takes information gain and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Trust Based Infererence Violation Detection Scheme Using Acut Model

    The inference problem is the major problem in securing the sensitive data in the secured database. In the inference problem the user tries to access the sensitive data from the secured database by giving series of queries with the non-sensitive fields. Inference problems affect the securities in the database and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Embedded Wireless Fingerprint Exam Affair Management

    In this paper, the authors study the design method of fingerprint identification module based on embedded system, which can realize the design of wireless fingerprint examination management system. This method reduces the hardware cost by building hardware environment whose platform is ARM9 microprocessor and MBF200 fingerprint sensor-integrated module. And, under...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    The Evidential Reasoning Approach for Multiple Decision Analysis Using Normal Cloud Model

    In this paper, normal cloud model and Evidential Reasoning (E-R) approach is used in Multiple Attribute Decision Analysis (MADA) problems. Different attributes Belief function are represented by cloud model interval. Using cloud model generating algorithm, belief degree interval is obtained without numerical computation. In addition, it is reasonable and it...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    An Autonomic Intrusion Detection Model With Multi-Attribute Auction Mechanism

    In this paper, the authors present an innovative intrusion detection model based on autonomic computing to extend the passive detection mechanism in a traditional Intrusion Detection System (IDS). Centered on an autonomic manager, this model introduces a multi-attribute auction mechanism in the agent coordination layer to perceive environmental changes, manage...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Framework Design of Secure Cloud Transmission Protocol

    Cloud computing technologies are in high demand because of several benefits. Many business organizations are looking into cloud computing services to reduce the cost and complexity of their business infrastructure and its preservation. However, there are certain security issues in cloud computing technologies. To overcome those security issues, the authors...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Energy-Aware Scheme Used in Multi-level Heterogeneous Wireless Sensor Networks

    The Wireless Sensor Networks (WSNs) is a power constrained system, since nodes run on limited power batteries which shorten its lifespan. The main challenge facing in the design and conception of Wireless Sensor Networks (WSNs) is to find the best way to extend their life span. The clustering algorithm is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    A Study on Existing Gait Biometrics Approaches and Challenges

    Applications of biometrics system are increasingly day by day as these methods provide more reliable and accurate way of identification and verification. Psychological studies indicate that people have a small but statistically significant ability to recognize the gait of individuals that they know. Gait biometrics is one of the recent...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    A Review on: Issues Related to Security on Tree Structure Data

    The problem of tree structured data is that it requires different Integrity and confidentiality for different portion of same content. Integrity assurance technique not only applies integrity to received data by user, but also any compromise to data that must be precisely determined. In tree structures each node contains some...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Review of Security Approaches in Routing Protocol in Mobile Adhoc Network

    In this paper, the objective is to present a review of routing protocols in Mobile Ad hoc NETwork (MANET) exclusively from security viewpoint. In MANET, the mobile nodes often move randomly for which reason the cumulative network experiences rapid and much unpredictable topology alterations. Due to presence of dynamic topology...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Review of Load Balancing in Cloud Computing

    With the exponential rise in the demands of the clients worldwide, a large scale distributed systems have been introduced as a computing environment. Cloud computing has paved a revolutionary path in this direction of distributed environment for accomplishing optimized performance, shortest response time, network resource utilization, and adaptability of service...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    A Trust-Based Routing Protocol in VANET

    One of the greatest challenges in Vehicular Ad-hoc NETworks (VANET) is to establish stable routing. Due to the dynamic network this is a difficult problem. In this paper, the authors use trust-based routing. The node is chosen to be next-hop node until it reaches to trust threshold. To evaluate the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Network Security Using Job Oriented Architecture (SUJOA)

    In the modern world operating system, various security systems (Collection of various security components) are already installed or can be directly installed in it. They are responsible for checking the complete node for suspicious behavior. There are some intrusions having the ability to hide themselves from being checked called armoring...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Detection of False Alarm in Handling of Selfish Nodes in MANET With Congestion Control

    In a mobile ad hoc network, the mobile nodes will have the characteristics of mobility and constraints in resources. Since, the mobility is high, the nodes may move randomly and fastly, which lead to network partitioning. The resource constraints lead to a big problem as decrease in performance and the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Knowledge Management System as Enabler for Knowledge Management Practices in Virtual Communities

    Knowledge Management System (KMS) was recognized as one of the key enablers in a knowledge management initiative. This is because KMS have been proving bringing value for Knowledge Management (KM) initiatives such as eliminate distance and time barriers. Furthermore KMS also made KM more effective for the organization. As general...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Telco Business Process Transformation Using Agile Lean Six Sigma and Frameworx Components: Focus on the Core Engineering Aspects with a Case Study

    The business transformation, a worldwide trend in many industries, is to improve the business performance in order to remain competitive in a challenging market. To accompany Telco industry in this trend, TM Forum issued Frameworx which addresses the key business aspects namely process, information, application and integration ones. The purpose...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Towards an Intelligent Project Based Organization Business Model

    Global economy is undergoing a recession phase that had made competition tougher and imposed new business framework. Businesses have to shift from the classical management approaches to an Intelligent Project Based Organization Model (IPBOM) that provides flexibility and agility. IPBOM is intended to reinforce the proven advantages of Project Based...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Investigational Study of 7 Effective Schemes of Load Balancing in Cloud Computing

    With the exponential increase in demands of online applications and services, cloud computing has evolved as a boon in modern information technology. Built over the base of grid and distributed computing, cloud computing offers services to cater the dynamic needs of massive user base. However, with the novelty associated with...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Searching Encrypted Data on Cloud

    Encryption is an optimistic way to preserve the secrecy of the outsource data. On other hand, performing search operation on encrypted data is a complicated job. A lot of encryption techniques have been suggested by researchers to avoid improper usage of unstructured data on the cloud. But still by using...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2013

    Security in Electronic Business

    A crucial area of electronic transactions is the domain of electronic commerce. Yet, a large number of people do not want to transact online as they are not sure of the level of security that the transaction would be provided by the site and the technology used by the sites....

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2013

    Security Issues and Challenges - Cloud Computing

    Cloud computing is in its preliminary stages when the authors respect to its implementation & usage. The reason for this is that the technology is heavily dependent on the high-tech resources that the academicians and researchers find it practically impossible to analyze & test the technology. The basis of the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2013

    IT-Infrastructure of University Based on Cloud Computing

    In this paper, the authors devoted to the organization of e-education environment of the university based on cloud computing. Cloud services and one of its components - a virtual work place introduce innovations in an education system. The introduction and the use of cloud services at the university will significantly...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2013

    An Efficient and Secure Handover Protocol for IEEE 802.16m Networks

    Mobile WiMAX (Worldwide interoperability Microwave Access) requires the re-authentication of mobile stations as they change from one base station to another. IEEE 802.16e uses the Extensible Authentication Protocol (EAP) for authentication and key management. This requires about 1000 ms, therefore, it could not support mobile WiMAX applications such as video...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2013

    A Symbol Based Graphical Schema Resistant to Peeping Attack

    Alphanumeric passwords are the most commonly used way of authenticating users in computer systems. One of the disadvantages of alphanumeric passwords is that they are hard to remember. Image passwords have been proposed to aim to make passwords more memorable and easier for users to use and, for this reason,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2013

    Propose HMNIDS Hybrid Multilevel Network Intrusion Detection System

    In this paper, the authors present a proposal Hybrid Multilevel Network Intrusion Detection System (HMNIDS) which is a \"Hybrid Multilevel IDS\", is hybrid because use misuse and anomaly techniques in intrusion detection, and is multilevel since it applies the two detection techniques hierarchal in two levels. First level applies anomaly...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2013

    Adaptive Approach for Spam Detection

    Spam has emerged as a major problem in recent years. The most widely recognized form of spam, is email spam. The accounts which contain spam messages must waste time deleting annoying and possibly offensive message. In this paper, the authors present a variety of machine learning algorithms to identify spam...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2013

    Keystroke Dynamics Authentication: A Survey of Free-Text Methods

    Current computer systems depend greatly on authentication methods in order to provide sufficient protection to the data handled by these systems. Rather than using the common username and password scheme which suffers from many security and usability limitations, the authors investigate in this paper the use of keystroke dynamics as...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Effective Anomaly Intrusion Detection System Based on Neural Network with Indicator Variable and Rough Set Reduction

    Intrusion Detection System (IDS) is an important tool for the defense of a network against attacks. It monitors the activities occurring in a computer system or network and analyzes them for recognizing intrusions to protect the computer network. Most of the existing IDSs use all of the 41 features available...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2013

    Semi-Automatic Data Warehouse Design Methodologies: A Survey

    Faced to the large amounts of data and the remarkable diversification of their sources, a scientific and economic interest to explore the reservoirs of knowledge is established. Data warehouses are used in making strategic decisions. A data warehouse is a collection of integrated, historised data originating from heterogeneous sources which...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2013

    The Impact of Indexes on Data Warehouse Performance

    A data warehouse designer should consider the effectiveness of data query, this depends on the selection of relevant indexes and their combination with the materialized views, note that the index selection is a NP-complete problem, because the number of indexes is exponential in the total number of attributes in the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2013

    A Novel Design to Increase Trust in Cloud IaaS Model

    In IaaS services of cloud the customers demand for hardware resources as a service like memory, processor cycles, disk storage even software. IaaS services of cloud rely heavily on virtualization. The service is provided by means of virtual machine. It is not easy task for cloud users to store their...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2013

    Ontology Based Data Warehouses Federation Management System

    Data warehouses are nowadays an important component in every competitive system, it's one of the main components on which business intelligence is based. The authors can even say that many companies are climbing to the next level and use a set of data warehouses to provide the complete information or...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2013

    Dimension Reduction in Intrusion Detection Features Using Discriminative Machine Learning Approach

    With the growing need of internet in daily life and the dependence on the world wide system of computer networks, the network security is becoming a necessary requirement of the authors' world to secure the confidential information available on the networks. Efficient intrusion detection is needed as a defense of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2013

    Cloud Computing: A Survey on Its Limitations and Potential Solutions

    Cloud computing has brought a new paradigm shift in technology industry and becoming increasingly popular day by day. The Small to Medium Enterprises (SMEs) are now adopting cloud computing in much more higher rate than large enterprises. That raises a debate whether this cloud computing technology will penetrate throughout the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2013

    Improving the Methods of Email Classification Based on Words Ontology

    The internet has dramatically changed the relationship among people and their relationships with others people and made the valuable information available for the users. E-mail is the service, which the Internet provides today for its own users; this service has attracted most of the users' attention due to the low...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2013

    On the Limits of Perfect Security for Steganographic System

    Until now the discussion on perfect security for steganographic systems has remained confined within the realm of mathematicians and information theory experts whose concise and symbolic representation of their philosophies, postulates, and inference thereafter has made it hard for the na

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2013

    A Review of Fault Detection Techniques for Wireless Sensor Networks

    Today, Wireless Sensor Networks (WSNs) emerge as a revolution in all aspects of the people life. WSNs have unique specifications of themselves that describe them different from other networks. Fault tolerance is one of the most significant of many challenges in these networks. Five key features need to be considered...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Cloud Computing and Its Applications in the World of Networking

    The paper discusses the most discussed topic nowadays 'Cloud computing'. Cloud computing is becoming a buzzword. The paper explains the concept, Services provided by cloud computing and different service providers. Also it works out how this technology can be harnessed to bring benefits to the challenges of the business, in...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Email Mining: A Review

    E-mail is one of the most widely used ways of written communication over the internet, and its traffic has increased exponentially with the advent of World Wide Web. The increase in email traffic comes also with an increase in the use of emails for illegitimate purpose. Phishing, Spamming, email bombing,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    A Generalized Framework of Privacy Preservation in Distributed Data Mining for Unstructured Data Environment

    The management of unstructured data is recognized as one of the major unsolved problems in the information industry and data mining paradigm. Unstructured data in computerized information that either does not have a data model and there are not easily usable by data mining. This paper proposes a solution to...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Data Optimization From a Multiple Species Network Using Modified SFLA(Shuffled Frog Leaping Algorithm)

    In this paper, the authors present a novel approach that uses inter-species sequences homology to connect the networks of multi species and possible more species and possible more species together with gene ontology dependencies in order to improve protein classification for research work. Proteins are involved in many for all...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Presentation an Approach for Scientific Workflow Distribution on Cloud Computing Data Center's Servers to Optimization Usage of Computational Resource

    In a distributed system Timing and mapping the priority of tasks among processors is one of the issues attracted most of attention to itself. This issue consists of mapping a DAG with a set of tasks on a number of parallel processors and its purpose is allocating tasks to the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    A Novel Chaotic Encryption Scheme Based on Pseudorandom Bit Padding

    Cryptography is always very important in data origin authentications, entity authentication, data integrity and confidentiality. In recent years, a variety of chaotic cryptographic schemes have been proposed. These schemes have typical structure which performed the permutation and the diffusion stages, alternatively. The random number generators are intransitive in cryptographic schemes...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Implementing an Expert Diagnostic Assistance System for Car Failure and Malfunction

    Applications in fault diagnosis are continuously being implemented to serve different sectors. Car failure detection is a sequence of diagnostic processes that necessitates the deployment of expertise. The Expert System (ES) is one of the leading Artificial Intelligence (AI) techniques that have been adopted to handle such task. This paper...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Performance Analysis of Various Routing Protocols for Motorway Surveillance System Cameras' Network

    The Motorway Surveillance System (MSS) is one of the most important technologies used to collect information about road conditions and then provide that collected information to motorway users. The routing in networks used by these systems is a critical task due to the highly dynamic environments. This paper presents performance...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    An Analysis of Internet Banking Security of Foreign Subsidiary Banks in Australia: A Customer Perspective

    Internet banking has been deployed more frequently over the past few decades to support and improve the operational and managerial performance within the banking industry. However, the security issues of confidentiality, integrity and privacy have become increasingly more serious concerns in Internet banking systems because of the potential negative impact...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Improving Accuracy of Authentication Process Via Short Free Text Using Bayesian Network

    The internet security problems are a crucial threat to all users in the cyber world. One of the important problems about internet security concerned with user classification and authentication. However, there are multiple components to classify and authenticate users. The first one is using username/password and the second method is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Survey of NoC and Programming Models Proposals for MPSoC

    The aim of this paper is to give briefing of the concept of network-on-chip and programming model topics on multiprocessors System-on-Chip world, an attractive and relatively new field for academia. Numerous proposals from academia and industry are selected to highlight the evolution of the implementation approaches both on NoC proposals...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Energy Efficient Security Preserving VM Live Migration in Data Centers for Cloud Computing

    Virtualization is an innovation that has widely been utilized in modern data centers for cloud computing to realize energy-efficient operations of servers. Virtual Machine (VM) migration brings multiple benefits such as resource distribution and energy aware consolidation. Server consolidation achieves energy efficiency by enabling multiple instances of operating systems to...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Semantic Service Composition With QoS End -To- End Constraints Via AND/OR Graphs

    In this paper, the authors present AND/OR graphs as a unifying framework for semantic service composition that considers users QoS constraints. The main virtues of this representation among others are its ability to express semantic inference and to deal with QoS constraints from different perspectives. In addition, it correctly handles...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Graphical Model Based for Robust Fault Diagnosis

    In this paper, robust Fault Detection and Isolation (FDI) design in nonlinear uncertain dynamic system, with chemical and thermodynamic phenomenon, is addressed. The methodology using a Bond Graph (BG) representation in Linear Fractional Transformation (LFT) form is shown to be a valuable tool for developing dynamic threshold generators and achieving...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Modify AODV Routing Protocol to Improve Motorway Surveillance System Performance

    This paper presents an algorithm to modify the Ad hoc On-demand Distance Vector (AODV) routing protocol in order to improve the routing performance in motorway surveillance systems. The proposed protocol has all the characteristics of the original AODV routing protocol since it follows all the steps of the route discovery...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Comparison Between Poissonian and Markovian Primary Traffics in Cognitive Radio Networks

    Cognitive Radio generates a big interest as a key cost-effective solution for the underutilization of frequency spectrum in legacy communication networks. The objective of this paper lies in conducting a performance evaluation of the end-to-end message delivery under both Markovian and Poissonian primary traffics in lossy Cognitive Radio networks. The...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Identification of Nominated Classes for Software Refactoring Using Object-Oriented Cohesion Metrics

    The production of well-developed software reduces the cost of the software maintainability. Therefore, many software metrics have been developed to measure the quality of the software design. Measuring class cohesion is considered as one of the most important software quality measurements. Unfortunately, most of approaches that have been proposed on...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Improving Performance of Distributed Data Mining (DDM) With Multi-Agent System

    Autonomous agents and multi-agent systems (or agents) and knowledge discovery (or data mining) are two of the most active areas in information technology. Ongoing research has revealed a number of intrinsic challenges and problems facing each area, which can't be addressed solely within the confines of the respective discipline. A...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    MVSDAP: A New Extensible, Modifiable and Secure Data Access Pattern for Layered Information Systems

    Nowadays, in software architecture especially in agile methodologies dynamicity, extendibility and modifiability are important challenges. In three layered architecture, plenty of patterns are provided for data access layer. In this paper, additional to secure access to data and dynamic validation controls, emphasis is on extendibility and modifiability of data access...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    A Novel Approach of Query Optimization for Genetic Population

    In relational database large information is maintained and organized so that user can get the desired information in predictable and reliable fashion through the query processing. Retrieving these results in timely manner is Query Optimization. Optimization is a process of choosing most efficient way to execute a SQL query. This...

    Provided By International Journal of Computer Science Issues