International Journal of Computer Science Issues

Displaying 241-280 of 926 results

  • White Papers // Mar 2013

    Implementation of Data Privacy & Query Optimization in Data Providing Service Composition

    Data providing services allow query like access to organization's data via web services. The invocation of DP service results in the execution of a query over data sources. In most cases user's queries require the composition of several services. The RDF based query rewriting algorithm is used for DP services...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    A Study on Data Privacy, Protection & Sanitization Practices During Disk Disposal by Indian Educational Institutes

    Information security practices are inevitable in this era of increased security breaches. With popularity of internet, cyber security issues have taken its main stay. Disk level security issues are ignored by Indian education institutes and society at large. The focus of this paper is to study data privacy, protection &...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    Agent Based Approach for Searching Document in Semantic Web

    The use of web service technology has increased and spread rapidly in many places providing dynamic information to meet the business goal of each provider. However, all of the existing facilities now-a-days are just for the direct users (human) and it is still impossible for its users (machine) to consume...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    Framework Model for Database Replication within the Availability Zones

    In this paper the authors present a proposed model for database replication model in private cloud availability regions, which is an enhancement of the SQL server always on layers of protection model presents by Microsoft in 2012. The enhancement concentrates in the database replication for private cloud availability regions through...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    Sliding Mode ANFIS-Based MIMO Fuzzy Neural Network Control for Robotic Systems

    In this paper the authors develop a design methodology of sliding mode ANFIS-based Multi-Inputs Multi-Outputs (MIMO) Fuzzy Neural Network (AMFNN) control for robotic systems. This control system consists of a Sliding Mode (SM) controller and an AMFNN controller. The SM controller is used to deal with uncertain parts of system...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    Based on RFID Products Information Tracing Anti-Counterfeiting Strategy Design and Application

    Research one security policy in the internet GSM or other possible environments based on the uniqueness and uniformity of RFID chips code and EPC. Its basic process: the data in RFID chips - products database - verification. Its technological process: the reader reads encrypted data in RFID chips some kind...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    Data Mining Framework for Direct Marketing: A Case Study of Bank Marketing

    Direct marketing has generated an increasing interest among academics and practitioners over the past few years. This is due to competitive market environment, advancement in technology and changing behavior of customers which are difficult to predict. Despite of numerous studies that have provided important insights into the direct marketing, the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    Distributed and Clustering Techniques for Multiprocessor Systems

    Hierarchical clustering is often depicted as the better quality clustering approach, but is limited because of its second degree complexity. The distributed clustering area aims to solve several problems that currently limit the scalability of network resources. While, clustering methods determine relationships among the objects, and allow the determination of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    Face Recognition Approach Using Gabor Wavelets, PCA and SVM

    Face recognition is an important research field of pattern recognition. Up to now, it caused researchers great concern from these fields, such as pattern recognition and computer vision. In general, the authors can make sure that the performance of face recognition system is determined by how to extract feature vector...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    Android-Based Java Programming for Mobile Phone LED Control

    The smart phone is quite common with closed market in the past. The mobile phone manufacturers started researching for mobile phone system since Google Ltd. started to develop a completely free open mobile phone platform called android Operation System (OS). The world's major manufacturers and scholars began to study the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2013

    System Dynamics Simulation Model for the Electronic Commerce Credit Risk Mechanism Research

    The credit system is not perfect in e-commerce; lead to a lot of credit risk in e-commerce transaction, the rapid development of electronic commerce was been restrained. Application of system dynamics theory and the computer simulation, it has carried on the modeling of electronic commerce credit system composition, forming factors...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Knowledge Management System as Enabler for Knowledge Management Practices in Virtual Communities

    Knowledge Management System (KMS) was recognized as one of the key enablers in a knowledge management initiative. This is because KMS have been proving bringing value for Knowledge Management (KM) initiatives such as eliminate distance and time barriers. Furthermore KMS also made KM more effective for the organization. As general...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    The Study on the Application of Business Intelligence in Manufacturing: A Review

    A manufacturing based organization operates in an environment where a fast and effective decision is needed. This is to ensure that the output is met with customer compliance. There exists manufacturing systems that collect the operational data and the data turns out to be in a high volume due to...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Detection of False Alarm in Handling of Selfish Nodes in MANET With Congestion Control

    In a mobile ad hoc network, the mobile nodes will have the characteristics of mobility and constraints in resources. Since, the mobility is high, the nodes may move randomly and fastly, which lead to network partitioning. The resource constraints lead to a big problem as decrease in performance and the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    An Autonomic Intrusion Detection Model With Multi-Attribute Auction Mechanism

    In this paper, the authors present an innovative intrusion detection model based on autonomic computing to extend the passive detection mechanism in a traditional Intrusion Detection System (IDS). Centered on an autonomic manager, this model introduces a multi-attribute auction mechanism in the agent coordination layer to perceive environmental changes, manage...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Framework Design of Secure Cloud Transmission Protocol

    Cloud computing technologies are in high demand because of several benefits. Many business organizations are looking into cloud computing services to reduce the cost and complexity of their business infrastructure and its preservation. However, there are certain security issues in cloud computing technologies. To overcome those security issues, the authors...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Energy-Aware Scheme Used in Multi-level Heterogeneous Wireless Sensor Networks

    The Wireless Sensor Networks (WSNs) is a power constrained system, since nodes run on limited power batteries which shorten its lifespan. The main challenge facing in the design and conception of Wireless Sensor Networks (WSNs) is to find the best way to extend their life span. The clustering algorithm is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    A Study on Existing Gait Biometrics Approaches and Challenges

    Applications of biometrics system are increasingly day by day as these methods provide more reliable and accurate way of identification and verification. Psychological studies indicate that people have a small but statistically significant ability to recognize the gait of individuals that they know. Gait biometrics is one of the recent...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    A Review on: Issues Related to Security on Tree Structure Data

    The problem of tree structured data is that it requires different Integrity and confidentiality for different portion of same content. Integrity assurance technique not only applies integrity to received data by user, but also any compromise to data that must be precisely determined. In tree structures each node contains some...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Review of Security Approaches in Routing Protocol in Mobile Adhoc Network

    In this paper, the objective is to present a review of routing protocols in Mobile Ad hoc NETwork (MANET) exclusively from security viewpoint. In MANET, the mobile nodes often move randomly for which reason the cumulative network experiences rapid and much unpredictable topology alterations. Due to presence of dynamic topology...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Review of Load Balancing in Cloud Computing

    With the exponential rise in the demands of the clients worldwide, a large scale distributed systems have been introduced as a computing environment. Cloud computing has paved a revolutionary path in this direction of distributed environment for accomplishing optimized performance, shortest response time, network resource utilization, and adaptability of service...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    A Trust-Based Routing Protocol in VANET

    One of the greatest challenges in Vehicular Ad-hoc NETworks (VANET) is to establish stable routing. Due to the dynamic network this is a difficult problem. In this paper, the authors use trust-based routing. The node is chosen to be next-hop node until it reaches to trust threshold. To evaluate the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Network Security Using Job Oriented Architecture (SUJOA)

    In the modern world operating system, various security systems (Collection of various security components) are already installed or can be directly installed in it. They are responsible for checking the complete node for suspicious behavior. There are some intrusions having the ability to hide themselves from being checked called armoring...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Job Scheduling Model for Cloud Computing Based on Multi- Objective Genetic Algorithm

    Cloud computing is an emerging high performance computing environment with a large scale, heterogeneous collection of autonomous systems and flexible computational architecture. To improve the overall performance of cloud computing, with the deadline constraint, a task scheduling model is established for reducing the system power consumption of cloud computing and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Using Chinese Natural Language Interfaces for Navigation in Mobile GIS

    The combination of "Voice technology" and "Mobile GIS", has greatly improved the intelligent degree of mobile GIS. Recently, significant attention in the field of scientific research is turning to how to realize quick conversion between natural language and GIS commands. However, the current paper mostly concentrates on rules of conversion...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    The Design of Statistic System in the Country Enterprise Based on SAS and GIS

    Statistics plays an important role in social and economic development. Traditional data collection is too laborious, time-consuming and ineffective. Its statistic is not correct and can't share the data. Aiming at the requirement for regional economy statistics of Pan Zhihua, this paper designed an analytical system based on regional economy...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    A Cooperative Spectrum Sensing Scheme Based on Trust and Fuzzy Logic for Cognitive Radio Sensor Networks

    In this paper, the authors propose a cooperative spectrum sensing scheme based on trust and fuzzy logic for Cognitive Radio Sensor Networks (CRSN). The CRSN nodes use the T-S fuzzy logic to make local decisions on the presence or absence of the Primary User's (PU) signal, and then use a...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    A Cross-Domain Authentication Protocol Based on ID

    In large distributed networks, many computers must be mutual coordination to complete some works under the certain conditions, these computers may come from different domains. For ensuring the safety to access resources among these computers in different domains, the authors propose a cross-domain union authentication scheme. They compute a large...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    RFID Technology Based Attendance Management System

    RFID is a nascent technology, deeply rooted by its early developments in using radar as a harbinger of adversary planes during World War II. A plethora of industries have leveraged the benefits of RFID technology for enhancements in sectors like military, sports, security, airline, animal farms, healthcare and other areas....

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Multiple Servers - Queue Model for Agent Based Technology in Cache Consistence Maintenance of Mobile Environment

    Caching is one of the important techniques in mobile computing. In caching, frequently accessed data is stored in mobile clients to avoid network traffic and improve the performance in mobile computing. In a mobile computing environment, the number of mobile users increases and requests the server for any updation, but...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Energy Efficient Routing in Mobile Ad-hoc Networks for Healthcare Environments

    The modern and innovative medical applications based on wireless network are being developed in the commercial sectors as well as in research. The emerging wireless networks are rapidly becoming a fundamental part of medical solutions due to increasing accessibility for healthcare professionals/patients reducing healthcare costs. Discovering the routes among hosts...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Detection of Pulsing DoS Attacks at Their Source Networks

    Pulsing Denial of Service (PDoS) is a type of DoS attack. Its attacking behavior is intermittent rather than constant, which helps it avoid being detected. In this paper, an adaptive detection method is proposed for source-end detection of PDoS attacks. It has three distinctive features: its detection statistic is based...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Modeling of Multipath Transport

    In this paper, the authors propose a model for evaluating the transmission performance of multipath transport. Previous researches focused exclusively on single pair users in simple scenarios. The distinct perspective in this paper is to build models for analyzing the performance when multipath transport is used in the entire network...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Enhanced Intrusion Detection System for Input Validation Attacks in Web Application

    Internet continues to expand exponentially and access to the Internet become more prevalent in users daily life but at the same time web application are becoming most attractive targets for hacker and cyber criminals. This paper presents an enhanced intrusion detection system approach for detecting input validation attacks in the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    User Behavior Prediction based Adaptive Policy Pre-fetching Scheme for Efficient Network Management

    In recent years, network management is commonly regarded as an essential and promising function for managing and improving the security of network infrastructures. However, as networks get faster and network centric applications get more complex, there is still significant ongoing work addressing many challenges of the network management. Traditional passive...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    An Improved Interference Cancellation Scheme for Two- User MIMO-MAC

    Multiple-Input Multiple-Output (MIMO), which is one of the mandatory techniques for the next generation wireless communication systems, has the features of spatial multiplexing and spatial diversity. MIMO Multiple Access Channels (MAC) offers substantial capacity improvements and has attracted considerable research attention. There is serious co-channel interference over MIMO-MAC since multiple...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Ant-Crypto, A Cryptographer for Data Encryption Standard

    Swarm Intelligence and Evolutionary Techniques are attracting the cryptanalysts in the field of cryptography. This paper presents a novel swarm based attack called Ant-Crypto (Ant-Cryptographer) for the cryptanalysis of Data Encryption Standard (DES). Ant-Crypto is based on Binary Ant Colony Optimization (BACO) i.e. a binary search space based directed graph...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Applying Encryption Algorithm for Data Security and Privacy in Cloud Computing

    Cloud computing is the next big thing after internet in the field of information technology; some say it's a metaphor for internet. It is an Internet-based computing technology, in which software, shared recourses and information, are provided to consumers and devices on-demand, and as per users requirement on a pay...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Phishing Detection Taxonomy for Mobile Device

    Phishing is one of the social engineering attacks and currently hit on mobile devices. Based on security report by Lookout, 30% of Lookout users clicking on an unsafe link per year by using mobile device. Few phishing detection techniques have been applied on mobile device. However, review on phishing detection...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Optimization of IPv4 Packet's Headers

    The current IPv4 Packet's scheme has several fields to be carried and transmitted in each packet even if the source, the destination and the payload of the packets are same. These fields utilize packet space and thus decrease the size of user data. Therefore the processing of each packet requires...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Prediction based Link Stability Scheme for Mobile Ad Hoc Networks

    Mobile Ad Hoc NETworks (MANETs) consist of mobile nodes which are not controlled by any base station. Mobile nodes act as a major role because of performing the data transmission, route discovery, route maintenance. The packet loss occurs often while the nodes are moving out of range, or the node...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Precedence Based Preemption and Bandwidth Reservation Scheme in MANET

    Infrastructures less mobile networks are commonly known as Mobile Ad Hoc NETworks (MANET). Quality of Service (QOS) constraints is highly required for multimedia communications with MANET. Providing QOS in MANET is not easy task due to its broadcast and dynamic nature. There are some number of protocols exist which takes...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Agent Virus of Cooperation (Avicoop): an Intelligent Model of Cooperation and Collaboration Based on the MAS for Data Exchange in Ad hoc Network

    The authors propose in this paper a response to the problem of cooperation and collaboration between nodes in a Mobile Ad hoc NETwork (MANET) for intelligent data relays from one source to a destination. In their operation, each routing protocol relies on the support of each node for end-to-end messages...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Energy Efficiency Analysis of Adaptive Error Correction in Wireless Sensor Networks

    In this paper, the authors develop an analytical energy efficiency model using Adaptive Error Correction Code (AECC) in wireless sensor networks in fading environments. To adapt energy efficiency of sensor node to channel variations, the packet length is tuned at the data link layer. In this model, they consider the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Energy Band Based Clustering Protocol for Wireless Sensor Networks

    Clustering is one of the widely used techniques to prolong the lifetime of wireless sensor networks in environments where battery replacement of individual sensor nodes is not an option after their deployment. However, clustering overheads such as cluster formation, its size, cluster head selection & rotation, directly affects the lifetime...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Analysis of QoS Routing Approach and the Starvation's Evaluation in LAN

    This paper gives a survey in QoS Routing Architecture implemented by Dijkstra's algorithm. The performance of QoS Routing architecture is evaluated by made a comparison between the Shortest Path Routing and QoS one. A very important feature in QoS routing are the conditions for elimination of starvation. Experimentally the authors...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    A Framework for Secure Cloud Computing

    Cloud computing is one of the most discussed topics today in the field of information technology. It introduces a new Internet-based environment for on-demand, dynamic provision of reconfigurable computing resources. The biggest challenge in cloud computing is the security and privacy problems caused by its multi-tenancy nature and the outsourcing...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    A Web Services based Approach for Resource-Constrained Wireless Sensor Networks

    The large diffusion of Wireless Sensor Networks (WSNs) in the people contemporary life with their numerous applications has led to a huge heterogeneity. This heterogeneity makes the possibility of discovering and collecting data from the wireless sensors more and more difficult. Indeed, WSNs are currently developed around different communities of...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    Improving Quality of VoIP over WiMAX

    Real-time services such as VoIP are becoming popular and are major revenue earners for network service providers. These services are no longer confined to the wired domain and are being extended over wireless networks. Although some of the existing wireless technologies can support some low-bandwidth applications, the bandwidth demands of...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    Channel Reservation Model for User Class Based Admission Control in Next Generation Wireless Networks

    The Next Generation Wireless Networks (NGWN) are expected to offer abundant services to its users. Guaranteeing the agreed upon Quality of Service (QoS), while trying to maximize the revenue of the network operators by having more number of users in the system is a challenging problem. Call Admission Control (CAC)...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    Improvement in Medium Access Control Protocol Based on New Contention Scheme for Wireless Ad Hoc Network

    In todays wireless networks, stations using the IEEE 802.11 standard contend for the channel using the Distributed Coordination Function (DCF). Research has shown that DCF's performance degrades especially with the large number of stations. This becomes more concerning due to the increasing proliferation of wireless devices. In this paper, the...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    CMQ: Clustering Based Multipath Routing Algorithm to Improving QoS in Wireless Sensor Networks

    Multi-path is favorite alternative for sensor networks, as it provides an easy mechanism to distribute traffic and balance network's load, as well as considerate fault tolerance. For this purpose, a new clustering based multi path routing protocol namely CMQ is proposed in this paper, which guarantees achieve to required QoS...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    Fuzzy-Logic Based Probabilistic Broadcasting Technique for Mobile Adhoc Networks

    Broadcasting also called as flooding is one of the earliest research interests in mobile Ad hoc networking. The main objective of broadcasting scheme is to avoid broadcast storm problem, provide good network performance and scalability. Existing probabilistic scheme consider only one parameter such as network density, node location or counter...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    Dual Amplitude-Width Pulse Interval Modulation for Optical Wireless Communications

    In this paper, a new modified digital pulse interval modulation called Dual Amplitude-Width Pulse Interval Modulation (DAWPIM) is presented, on the basis of Pulse Amplitude Modulation (PAM) and Pulse Width Modulation (PWM), and its properties are presented. After introducing symbol structure, data rate improvement, average normalized power requirement and bandwidth...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    Identity-based Trusted Authentication in Wireless Sensor Networks

    Secure communication mechanisms in Wireless Sensor Networks (WSNs) have been widely deployed to ensure confidentiality, authenticity and integrity of the nodes and data. Recently many WSNs applications rely on trusted communication to ensure large user acceptance. Indeed, the trusted relationship thus far can only be achieved through Trust Management System...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    An Multiple Pheromone Algorithm for Cloud Scheduling With Various QOS Requirements

    The Cloud computing is one of the rapidly improving technologies. Cloud computing is a new promising paradigm in distributed and parallel computing. As cloud-based services become more dynamic, resource provisioning becomes more challenging. One of the critical problems in cloud computing is job scheduling because it increases with the size...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    Real-time FPGA-based Non-Cryptography System for Wireless Network

    Traditional privacy techniques for wireless communications are facing great challenges, due to the open radio propagation environment and limited options of transmission techniques. A new bilateral pilot aided protocol is presented, with single-tone based burst transmission over slow time varying flat fading wireless channels, and is investigated to enhance the...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    An Intelligent Approach to Query Processing in Peer to Peer Networks

    Peer-to-peer systems are mainly used for object sharing and file sharing, but they can provide the infrastructure for many other applications. These systems need an algorithm to evaluate the queries efficiently so that the best of the results can be achieved in data sharing and message passing. The delay in...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    Performance Evaluation of Ant-Based Routing Protocols for Wireless Sensor Networks

    High efficient routing is an important issue in the design of limited energy resource Wireless Sensor Networks (WSNs). Due to the characteristic of the environment at which the sensor node is to operate, coupled with severe resources; on-board energy, transmission power, processing capability, and storage limitations, prompt for careful resource...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    QoS based Analysis of Proxied Adaptive Gateway Discovery Scheme for Mobile Ad hoc Networks

    One of the most important aspects a effecting the overall QoS performance of hybrid mobile ad hoc networks is the efficient discovery of Internet gateways. So many previous papers addressed the problem of interconnecting Mobile Ad Hoc Networks (MANET) to the Internet, via one or more attachment points called gateways....

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    Power Optimization Techniques in Wireless Sensor Network by using Packet Profile based Scheme

    A Network of complex sensor nodes equipped with limited sensing, computing, and radio communication capabilities is called a Wireless Sensor Network (WSN). The sensed data must be gathered and transmitted to a base station where it is further processed for end-user queries. Since the network consists of low-cost nodes with...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    Mobile Devices on IP Internetworks

    Due to advances in miniaturization, Mobile computing has greatly increased in popularity over the past years. Today the users can get in a notebook PC or even a hand-held computer the power that once required a massive machine. Wireless LAN technologies help a device to easily move from one place...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    Cache Replacement Policies for Cooperative Caching in Mobile Ad hoc Networks

    Cooperative caching is a technique used in mobile Ad hoc networks to improve the efficiency of information access by reducing the access latency and bandwidth usage. Cache replacement policy plays a significant role in response time reduction by selecting suitable subset of items for eviction from the cache. In this...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    Implementation of Energy Balancing in Wireless Sensor Networks

    In Wireless Sensor Networks (WSN), energy is a very precious resource for sensor nodes and communication overhead is to be minimized. So energy is an extremely critical resource for this type of battery-powered based Wireless Sensor Networks (WSN), and thus making energy-efficient smart protocol design is a key challenging problem....

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    An Approach for Data Storage Security in Cloud Computing

    Cloud computing is now days emerging field because of its performance, high availability, low cost. In the cloud many services are provided to the client by cloud. Data store is main future that cloud service provides to the companies to store huge amount of storage capacity. But still many companies...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Multiband F-PIFA Fractal Antennas for the Mobile Communication Systems

    The fractals antennas are composed of repeated geometrical forms. Each form has single attributes. The Fractal Planar Inverted F (F-PIFA) antenna, based on Koch Island form geometries, is proposed to facilitate multi-bands applications. The design is carried out by two software: CST Microwave Studio and HFSS. The obtained results for...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    An Optical / Wireless Integrated Approach to provide Multiple Gateways in Wireless Mesh Networks

    Wireless mesh network is an application technology different from the traditional peer-to-peer wireless bridge; it provides the multi-hop and multi-path connection to form a wireless environment of MESH framework so that the occurrence of single point failure can be prevented. WMNs are to provide high bandwidth broadband service to a...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Demand Based Effective Energy Utilization in Mobile Ad Hoc Networks

    Mobile Ad Hoc NETworks (MANET) is the collection of mobile nodes without any centralized infrastructure. The underlying assumption is that the intermediate nodes cooperate in forwarding packets. Mobile nodes collect the route information through overhearing and stores these information in route caches with the use of Dynamic Source Routing (DSR)...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Qos Based Rate Allocation in Wireless Mesh Networks

    In this paper, the authors present a centralized algorithm for QoS based rate allocation in wireless mesh networks. The main objective is to find approach that also satisfy user-specified QoS constraints, specifically with respect to rate and delay demands. Their approach provides higher priority to real-time flows than elastic flows...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Enhanced Fractional Frequency Reuse (EFFR) Technique in WiMAX Cellular Network

    WiMAX is a broad band high speed wireless communication system which use cellular network topology to deploy services to different subscribers. One of the major problems of deploying WiMAX base stations is the signal interference caused by neighboring cells which causes redaction in cell coverage area and capacity. The standard...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    An Efficient Encryption Algorithm for P2P Networks Robust Against Man-in-the-Middle Adversary

    Peer-to-Peer (P2P) networks have become popular as a new paradigm for information exchange and are being used in many applications such as file sharing, distributed computing, video conference, VoIP, radio and TV broadcasting. This popularity comes with security implications and vulnerabilities that need to be addressed. Especially duo to direct...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    On Reliability Modeling in Wireless Sensor Networks-A Review

    This paper presents a survey on existing reliability models in Wireless Sensor Networks (WSNs). Most of the existing mechanisms employ retransmissions, ignoring redundancy schemes and moreover no attempt has been made for biologically inspired WSNs. This paper proposes a biologically inspired wireless sensor network model where sensor nodes are intelligent...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Performance and Comparison of Multi-Hop Ad-Hoc Routing Protocols ? Quantitative Study

    Wireless Ad-hoc network is emerging network and form temporary networks. Due to its spontaneous nature the topology is frequently changes. Protocols selection and set up routing between any pair of nodes are the primary goal design for any wireless network. Several protocols are proposed in Mobile Ad hoc NETwork (MANET)...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    A Novel Problem-solvingMetric for Future Internet Routing Based on Virtualization and Cloud-computing

    The Internet has evolved from an academic network to a broad commercial platform and become an integral and indispensable part of their daily life, economic operation, and society over forty years. However, many technical and non-technical challenges have emerged during this process. In order to address these challenges, the authors...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Study and Optimization of Cooperative Spectrum Sensing in OFDM Cognitive Radio Networks

    In this paper, a cooperative sensing algorithm for OFDM is proposed in this paper based on the performance analysis of ONPD algorithm, then the system weight vector is optimized and the closed form expression of optimal weight vector is obtained using the maximum improved deflection coefficient. Theoretical analysis and simulation...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Towards a Next Generation of Scientific Computing in the Cloud

    More than ever, designing new types of highly scalable data intensive computing is needed to qualify the new generation of scientific computing and analytics effectively perform complex tasks on massive amounts of data such as clustering, matrix computation, data mining, information extraction, etc. Map-Reduce, put forward by Google, is a...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Performance of Network Coding Based Multipath Routing in Wireless Sensor Networks

    In recent times, there have been many advances in the field of information theory and Wireless Sensor Network (WSN) technologies. Network coding is a new paradigm in data transport and promises to change many aspects of WSN. In this paper, the authors introduce an analytical framework to study the performance...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    The Research on an Algorithm of Three-Dimensional Topology Control of Wireless Sensor Network

    Nowadays, the research about three-dimensional topology control has focused on ensuring the connectivity of the networks, and has seldom considered the balance between neighbor node degree and energy consumption minimum path. In order to solve this problem, this paper proposes an adjustable topology control algorithm in three-dimensional wireless sensor networks,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Middleware approaches for Wireless Sensor Networks: An overview

    Wireless Sensor Networks (WSN) has become highly attractive to researchers and industries due to its wide range of applications. Middleware is a distributed software that tries to provide a common platform for hiding the heterogeneity of the system, enabling multiple applications to work on a distributed network. This survey paper...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Performance Analysis of VoIP Codecs over WiMAX Networks

    Real-time services such as VoIP are becoming popular and are major revenue earners for network service providers. These services no longer confined to the wired domain and extended over wireless networks. Although some of the existing wireless technologies can support some low-band width applications, the bandwidth demands of many multimedia...

    Provided By International Journal of Computer Science Issues