International Journal of Computer Science Issues

Displaying 281-320 of 960 results

  • White Papers // Mar 2013

    Modified TCP Protocol for Wireless Sensor Networks

    The transport layer's protocols have been used in the Wireless Sensor Networks (WSNs) in order to achieve data reliability. However, the limitations of the WSNs did not usually considered when implementing these protocols in the stack of the sensor nodes. In this paper, the TCP protocol has been modified in...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Knowledge Management System as Enabler for Knowledge Management Practices in Virtual Communities

    Knowledge Management System (KMS) was recognized as one of the key enablers in a knowledge management initiative. This is because KMS have been proving bringing value for Knowledge Management (KM) initiatives such as eliminate distance and time barriers. Furthermore KMS also made KM more effective for the organization. As general...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    An Advanced Survey on Secure Energy-Efficient Hierarchical Routing Protocols in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are often deployed in hostile environments, which make such networks highly vulnerable and increase the risk of attacks against this type of network. WSN comprise of large number of sensor nodes with different hardware abilities and functions. Due to the limited memory resources and energy constraints,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Exploration on Big Data Oriented Data Analyzing and Processing Technology

    At present, enterprises have urgent needs to conduct an effective and stable statistical analysis on big data. With a view to solving the issue of analysis and processing of big data in respect of enterprise business, this essay proposes a hybrid structure mode based on the MapReduce technology and the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Application of SVM Optimization Based on GA in Electronic Sphygmomanometer Data Fusion

    If the proper kernel function parameter is chosen, using of the multi-sensor data fusion method based on SVM, the influence of cross sensitive disturbance variables including the temperatureT and the power supply current I, can be significantly suppressed and the stability of the pressure sensor can be improved in the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Personality Types Classification for Indonesian Text in Partners Searching Website Using Na

    The development of digital text information has been growing fast, but most of digital text is in unstructured form. Text mining analysis is needed in dealing with such unstructured text. One of the activities important in text mining is text classification or categorization. Text categorization itself currently has a variety...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    A Novel Malicious Web Crawler Detector: Performance and Evaluation

    Internet demands a robust and resilient protected communication and computing environment to enable information flows flawlessly with no down time. However, the Internet is exposed to the general public which will lead to loss of sensitive information as well as copyright protected content. To address this issue, in this paper,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    The Study on the Application of Business Intelligence in Manufacturing: A Review

    A manufacturing based organization operates in an environment where a fast and effective decision is needed. This is to ensure that the output is met with customer compliance. There exists manufacturing systems that collect the operational data and the data turns out to be in a high volume due to...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    A Comprehensive Review for Central Processing Unit Scheduling Algorithm

    The Central Processing Unit (CPU) is a component of a computer system that carries out the instructions of a computer program and is the primary element carrying out the computer's functions. This paper describe how does CPU facilitates tasks given by a user through a scheduling algorithm. CPU carries out...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    The Design of Statistic System in the Country Enterprise Based on SAS and GIS

    Statistics plays an important role in social and economic development. Traditional data collection is too laborious, time-consuming and ineffective. Its statistic is not correct and can't share the data. Aiming at the requirement for regional economy statistics of Pan Zhihua, this paper designed an analytical system based on regional economy...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Telco Business Process Transformation Using Agile Lean Six Sigma and Frameworx Components: Focus on the Core Engineering Aspects with a Case Study

    The business transformation, a worldwide trend in many industries, is to improve the business performance in order to remain competitive in a challenging market. To accompany Telco industry in this trend, TM Forum issued Frameworx which addresses the key business aspects namely process, information, application and integration ones. The purpose...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Using a KMERP Framework to Enhance Enterprise Resource Planning (ERP) Implementation

    Enterprise Resource planning (ERP) systems mainly aims to develop information sharing between different sections within the organization, and consider as a way of continuous improvement. Implementation and use of ERP systems require a tremendous amount of knowledge and experience. There are many failure reasons in the implementation of ERP systems...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Towards an Intelligent Project Based Organization Business Model

    Global economy is undergoing a recession phase that had made competition tougher and imposed new business framework. Businesses have to shift from the classical management approaches to an Intelligent Project Based Organization Model (IPBOM) that provides flexibility and agility. IPBOM is intended to reinforce the proven advantages of Project Based...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Job Scheduling Model for Cloud Computing Based on Multi- Objective Genetic Algorithm

    Cloud computing is an emerging high performance computing environment with a large scale, heterogeneous collection of autonomous systems and flexible computational architecture. To improve the overall performance of cloud computing, with the deadline constraint, a task scheduling model is established for reducing the system power consumption of cloud computing and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Using Chinese Natural Language Interfaces for Navigation in Mobile GIS

    The combination of "Voice technology" and "Mobile GIS", has greatly improved the intelligent degree of mobile GIS. Recently, significant attention in the field of scientific research is turning to how to realize quick conversion between natural language and GIS commands. However, the current paper mostly concentrates on rules of conversion...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Dynamic Tracking Protocol for Maneuvering Targets in Sensor Network

    Target tracking is one of the most important applications in Wireless Sensor Networks (WSNs). Energy efficiency is one of the most important design goals for target tracking. The authors propose and evaluate a distributed, energy-efficient, light-weight framework dynamic clustering algorithm for target localization and tracking in wireless sensor networks. Since...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Achieving Load Balance by Separating IP Address Spaces

    In this paper, the authors propose a load balance approach by separating the host and router IP addresses into two spaces. In addition, in their approach, they propose a scheduling algorithm, named Edge Stream Balance (ESB), which is used by the proposed multipath routing scheme based on the address space...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Intelligent communication of WSN based on a multi-agent system

    The Wireless Sensor Network (WSN) consists of a large number of sensor nodes with limited batteries, which are deployed randomly over an area to collect data. Therefore, it is important to minimize energy consumption of each node, which leads to the extension of the life of the network. As many...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    A Novel Particle Swarm Optimization-based Algorithm for the Optimal Centralized Wireless Access Network

    The wireless access networks design problem is formulated as a constrained optimization problem, where the goal is to find a network topology such that an objective function is optimized, subject to a set of constraints. The objective function may be the total cost, or some performance measure like utilization, call...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Study of Online Bayesian Networks Learning in a Multi-Agent System

    The authors attempt to find how a common task can be performed by a multi-agent self-organizing system. The agents are independent in terms of their model of environment and their actions. Each agent explores the environment and decides its actions by itself. Agents will have no information about the environment...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Fuzzy Logic System for Opportunistic Spectrum Access using Cognitive Radio

    Opportunistic spectrum access approach is enabled by cognitive radios which are able to sense the unused spectrum and adapt their operating characteristics to the real-time environment. However, a naive spectrum access for secondary users can make spectrum utilization inefficient and increase interference to adjacent users. In this paper, the authors...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    A Cross-Domain Authentication Protocol Based on ID

    In large distributed networks, many computers must be mutual coordination to complete some works under the certain conditions, these computers may come from different domains. For ensuring the safety to access resources among these computers in different domains, the authors propose a cross-domain union authentication scheme. They compute a large...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Multiple Servers - Queue Model for Agent Based Technology in Cache Consistence Maintenance of Mobile Environment

    Caching is one of the important techniques in mobile computing. In caching, frequently accessed data is stored in mobile clients to avoid network traffic and improve the performance in mobile computing. In a mobile computing environment, the number of mobile users increases and requests the server for any updation, but...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Energy Efficient Routing in Mobile Ad-hoc Networks for Healthcare Environments

    The modern and innovative medical applications based on wireless network are being developed in the commercial sectors as well as in research. The emerging wireless networks are rapidly becoming a fundamental part of medical solutions due to increasing accessibility for healthcare professionals/patients reducing healthcare costs. Discovering the routes among hosts...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Detection of Pulsing DoS Attacks at Their Source Networks

    Pulsing Denial of Service (PDoS) is a type of DoS attack. Its attacking behavior is intermittent rather than constant, which helps it avoid being detected. In this paper, an adaptive detection method is proposed for source-end detection of PDoS attacks. It has three distinctive features: its detection statistic is based...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Modeling of Multipath Transport

    In this paper, the authors propose a model for evaluating the transmission performance of multipath transport. Previous researches focused exclusively on single pair users in simple scenarios. The distinct perspective in this paper is to build models for analyzing the performance when multipath transport is used in the entire network...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Enhanced Intrusion Detection System for Input Validation Attacks in Web Application

    Internet continues to expand exponentially and access to the Internet become more prevalent in users daily life but at the same time web application are becoming most attractive targets for hacker and cyber criminals. This paper presents an enhanced intrusion detection system approach for detecting input validation attacks in the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    User Behavior Prediction based Adaptive Policy Pre-fetching Scheme for Efficient Network Management

    In recent years, network management is commonly regarded as an essential and promising function for managing and improving the security of network infrastructures. However, as networks get faster and network centric applications get more complex, there is still significant ongoing work addressing many challenges of the network management. Traditional passive...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    An Improved Interference Cancellation Scheme for Two- User MIMO-MAC

    Multiple-Input Multiple-Output (MIMO), which is one of the mandatory techniques for the next generation wireless communication systems, has the features of spatial multiplexing and spatial diversity. MIMO Multiple Access Channels (MAC) offers substantial capacity improvements and has attracted considerable research attention. There is serious co-channel interference over MIMO-MAC since multiple...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Ant-Crypto, A Cryptographer for Data Encryption Standard

    Swarm Intelligence and Evolutionary Techniques are attracting the cryptanalysts in the field of cryptography. This paper presents a novel swarm based attack called Ant-Crypto (Ant-Cryptographer) for the cryptanalysis of Data Encryption Standard (DES). Ant-Crypto is based on Binary Ant Colony Optimization (BACO) i.e. a binary search space based directed graph...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Applying Encryption Algorithm for Data Security and Privacy in Cloud Computing

    Cloud computing is the next big thing after internet in the field of information technology; some say it's a metaphor for internet. It is an Internet-based computing technology, in which software, shared recourses and information, are provided to consumers and devices on-demand, and as per users requirement on a pay...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Phishing Detection Taxonomy for Mobile Device

    Phishing is one of the social engineering attacks and currently hit on mobile devices. Based on security report by Lookout, 30% of Lookout users clicking on an unsafe link per year by using mobile device. Few phishing detection techniques have been applied on mobile device. However, review on phishing detection...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Optimization of IPv4 Packet's Headers

    The current IPv4 Packet's scheme has several fields to be carried and transmitted in each packet even if the source, the destination and the payload of the packets are same. These fields utilize packet space and thus decrease the size of user data. Therefore the processing of each packet requires...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    A Cooperative Spectrum Sensing Scheme Based on Trust and Fuzzy Logic for Cognitive Radio Sensor Networks

    In this paper, the authors propose a cooperative spectrum sensing scheme based on trust and fuzzy logic for Cognitive Radio Sensor Networks (CRSN). The CRSN nodes use the T-S fuzzy logic to make local decisions on the presence or absence of the Primary User's (PU) signal, and then use a...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    A Comparative Approach for Localization Techniques in Wireless Sensor Networks

    A Wireless Sensor Network is a collection of many tiny sensing and wireless communication device called sensor nodes. Each node consists of a processor, a battery and a transceiver for communication. Nodes are connected to each other via transceiver. Localization of sensor nodes in wireless sensor nodes plays an important...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    The Study on the Spam Filtering Technology Based on Bayesian Algorithm

    In this paper, the authors analyzed spam filtering technology, carried out a detailed study of Naive Bayes algorithm, and proposed the improved Naive Bayesian mail filtering technology. Improvement can be seen in text selection as well as feature extraction. The general Bayesian text classification algorithm mostly takes information gain and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Trust Based Infererence Violation Detection Scheme Using Acut Model

    The inference problem is the major problem in securing the sensitive data in the secured database. In the inference problem the user tries to access the sensitive data from the secured database by giving series of queries with the non-sensitive fields. Inference problems affect the securities in the database and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Embedded Wireless Fingerprint Exam Affair Management

    In this paper, the authors study the design method of fingerprint identification module based on embedded system, which can realize the design of wireless fingerprint examination management system. This method reduces the hardware cost by building hardware environment whose platform is ARM9 microprocessor and MBF200 fingerprint sensor-integrated module. And, under...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    The Evidential Reasoning Approach for Multiple Decision Analysis Using Normal Cloud Model

    In this paper, normal cloud model and Evidential Reasoning (E-R) approach is used in Multiple Attribute Decision Analysis (MADA) problems. Different attributes Belief function are represented by cloud model interval. Using cloud model generating algorithm, belief degree interval is obtained without numerical computation. In addition, it is reasonable and it...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Performance Optimization through Channel Profiling in Cognitive Sensor Networks

    Cognitive Radio (CR) is an important future wireless radio access technology having the potential to solve the spectrum scarcity and under-utilization problems. Using CR however, poses new challenges for network nodes and architectures due to the inherent complexity of cognitive radio technology. In this paper, the authors propose a unique...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2014

    Performance Evaluation of the Effect of Primary Users on the Rendezvous Process for Cognitive Radios

    The rendezvous process is an essential process for establishing a communication link between two nodes in cognitive radio networks. A number of rendezvous protocols have been developed in the last few years. However, many protocols ignore one of the basic constraints of cognitive radio networks which are the impact of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Oscillation Characteristics of the Multi-stage Learning for the Layered Neural Networks and Its Analysis

    In this paper, the authors propose an efficient learning method for the layered neural networks based on the selection of training data and input characteristics of an output layer unit. The multi-stage learning method proposes by the authors for the function approximation problems of classifying learning data in a phased...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    GINS: Dynamic Emissive Location-Based for Underwater Sensor Networks

    Due to collect and monitor exploration of natural location resources which was difficult to acquire the location without Global Position System (GPS) in the underwater. However, there are something research was used Inertial Navigation System (INS) to location, but the INS accuracy degrades over time that the issue will be...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    The Use of Big Data in Education

    In this paper, the authors will see the use of big data and open data in education. Also how big amount of data can be used and extracted to something useful, helping the industry to raise their profits. This paper is a study on the use of big data in...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Testing Security Policies for Distributed Systems: Vehicular Networks as a Case Study

    Due to the increasing complexity of distributed systems, security testing is becoming increasingly critical in insuring reliability of such systems in relation to their security requirements. To challenge this issue, the authors rely in this paper on model based active testing. In this paper, they propose a framework to specify...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    QoS Safety Protocol Analysis in FHAMIPv6/MPLS/Diffserv Integration and Load Balancing Algorithm

    One of the most important aspects to consider in order to provide quality services in an ad hoc network is the security. In the integration FHAMIPv6/MPLS/DiffServ and congestion algorithms, the authors analyses QoS but do not consider the QoS safety. The security issue is essential for not degrade QoS. This...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Validating Predictive Performance of Classifier Models for Multiclass Problem in Educational Data Mining

    Classification is one of the most frequently studied problems in data mining and machine learning research areas. It consists of predicting the value of a class attribute based on the values of other attributes. There are different classifications models were proposed in Educational Data Mining (EDM) and it is used...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    A Survey of Bandwidth Optimization Techniques and Patterns in VoIP Services and Applications

    As internet telephony unveils a communication system that allows for the conduction and reception of voice signals and data over the internet network, the volume of voice traffic and (or) packets on IP networks have grown substantially. However, a crucial problem imminent is that of inefficient bandwidth utilization which is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Opportunistic Spectrum Access in Cognitive Radio Ad Hoc Networks

    Cognitive Radio (CR) technology is envisaged to solve the problems in wireless networks resulting from the limited available spectrum and the inefficiency in the spectrum usage by exploiting the existing wireless spectrum opportunistically. CR networks, equipped with the intrinsic capabilities of the cognitive radio, will provide an ultimate spectrum aware...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Detection of Reliable Pareto Software Using SPRT

    Rapid growth of software usage enforces the user to access the software reliability, a critical task in the development of a software system. Various models are adopted to assess the software reliability. In this paper, a well known test procedure of statistical science called as Sequential Probability Ratio Test (SPRT)...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    A Best Approach In Intrusion Detection For Computer Network PNN /GRNN/ RBF

    As attacks became more complicated, the traditional and contemporary methods such as firewalls were not successful and suitable in exact diagnosis. This caused Intrusion Detection System (IDS) to finally the strictly centralized role in network security. First is misuse and second is abnormal detection. Misuse detection compares data to well-known...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    Software Architectures: A Comparative Study for Web Based Applications

    Correct architecture is the backbone of the successful software. To address the complexity of the growing software there are different architectural models that are designed to handle this problem. The most important thing is to differentiate software architecture from software design. As the web based applications are developed under tight...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    Design of an Ultra-Wideband Antenna Using Split Ring Resonator

    In this paper, the authors present a novel patch antenna using circular split ring resonator for ultra-wideband applications. The radiating element of the proposed antenna is a Split-Ring Resonator (SRR). The geometrical parameters are optimized to reach the best electromagnetic properties, with a small size (30 mm

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    Performance of COFDM Technology for the Fourth Generation (4G) of Mobile System With Convolutional Coding and Viterbi Decoding

    The Fourth Generation (4G) of mobile cellular system network is growing very fast and new services come-up, so intelligent way of visualization and managing the 4G network and service states are required. In this paper, Coded Orthogonal Frequency Division Multiplexing (COFDM) scheme using convolutional coding with different code rates and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    Performance Analysis of the Proxy Mobile IPv6 (PMIPv6) and Multiprotocol Label Switching (MPLS) Integration

    In this paper, the authors analyze and develops the integration of the PMIPv6 (Proxy Mobile IPv6) and MPLS (Multi-Protocol Label Switching) protocols in order to determine the impact at the time of handover in an IP micro mobility environment. The proposed integration suggests the establishment of abidirectional Label Switched Path...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2014

    A Formal Composition of a Distributed System with its Security Policy

    Now-a-days, information systems are becoming a vital and strategic component of any organization. However, in most cases, these systems are designed and implemented without taking into consideration security aspects. To ensure a certain level of security, the behavior of a system must be controlled by a \"Security policy\". This paper...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2014

    Impacts of Linear Mobility on MANETs Routing Performance Under Different Network Loads

    Routing is the biggest challenge and significant area of research within ad hoc networks due to nodes mobility, dynamic topology, frequent link breakage, limitation of nodes (memory, battery, bandwidth, and processing power), and lack of central point like base stations or servers. Analyzing and comparing different MANET routing protocols give...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2014

    SwarmDroid: Swarm Optimized Intrusion Detection System for the Android Mobile Enterprise

    The inadequacies inherent in the current defense mechanism of the mobile enterprise led to the development of new breed of security systems known as mobile intrusion detection system. The major worry of mobile/ubiquitous device users is the issue of data security since no mobile security application is 100% efficient. Existing...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2014

    Organizing Software Architecture Based Measurement Analysis (OSAMA) Model

    Today's software engineering organizations seek to develop and improve the models that follow and are trying in various ways to reach the highest levels of quality in order to achieve user satisfaction. Organizing Software Architecture based Measurement Analysis (OSAMA) model provides a way that allows a great control on management,...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2014

    A Review Study of Hierarchical Clustering Algorithms for Wireless Sensor Networks

    The hierarchical clustering is an efficient way to reduce the overall energy consumption within the cluster by performing aggregation and fusion of data. Hence, the amount of transmitting information to the base station is decreased. Clusters create hierarchical Wireless Sensor Networks (WSNs) which facilitate efficient utilization of limited resources of...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2014

    Critical Review of Authentication Mechanisms in Cloud Computing

    Cloud computing is a technology, which provides low cost, scalable computation capacity and a stack of services to enterprises on demand for expansion. The complications caused by data security and privacy are the main hindrances in its acceptance. Threats in cloud computing can be faced by adopting various security measures....

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2014

    Mob-AIDS: An Intrusion Detection System for the Android Mobile Enterprise

    Researches in the development of efficient security models, policies and standards for the Android platform has increased significantly in recent times. Android suffers from the widespread security threats and malware due to the lack of efficient security tools for protection. However, recent studies on android mobile platform security stressed that...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2014

    RPAR: Pharaonis Approach Based Reserve Path Adaptive Routing Topology for Handling QoS Constraints in Mobile Ad Hoc Networks

    Specially structured and independent nodes are the special of ad hoc. To exchange data, Nodes always use a medium which is wireless due to that, message or data can be transferred only when both are in broadcast range. The difficult behavior which needs no efforts is the result of biologically...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2014

    Implementation of Android Based Mobile Learning Application as a Flexible Learning Media

    Computer technology has been experiencing a quite rapid development in which it, in turn, has also caused a change in human life style. One of technologies bringing an impact on such life style is in the use of computer technology embedded in mobile communication devices. Now-a-days, a new trend in...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    Probabilistic Multicast Trees in Different Network Topology Environments

    Node loss and congestion changes the performance characteristics of the multicast trees. Probabilistic Multicast Trees (PMT) makes use of performance feedback, generates a probability of usage for each multicast tree based on that feedback and then makes intelligent choices about which multicast tree to use for a given packet in...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    Investigating Software Maintainability Development: A Case for ISO 9126

    Software maintainability has been considered as a main characteristic in many software product quality models. However, these models have different definitions for maintainability and sub characteristics. ISO 9126 is one of the main and most frequently used models in software product quality. This model has been revised and replaced by...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    DP-UREA: An Algorithm for Autonomous Reorganization of Mobile Sensor Nodes to Improve Coverage

    Stochastic deployments of mobile Wireless Sensor Networks (WSNs) are practical in harsh fields, disaster areas, toxic urban regions or hostile environments where human reachability or intervention is impossible, and WSN deployment cannot be performed manually. These deployments may not always lead to effective coverage or; result in a connected network....

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    Cognitive Radio Handover in Cellular Networks

    In cellular networks the continuity of communication has high significance in real-time services, therefore, the HandOver (HO), transferring communication from one base station to another one, always has been the main concept of all mobile's generations. In cellular networks for avoidance of frequency interference, different channel allocation scheme are proposed;...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    A Practical Approach to Infuse Security Patterns into Undergraduate Software Engineering Course Projects

    In this paper, the authors introduce the use of security patterns as a teaching aid to help software engineering students better understand and solve security problems. With the wide spread use of various applications in different domains and industries security is a growing problem that requires swift address. The lack...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    Importance of Software Testing in Software Development Life Cycle

    Software development life cycle is a structure imposed on the development of a software product. Software development life cycle is closely linked to what has come to known as structured analysis and design. Testing is an important part of software development. Testing should be started as early as possible to...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    Design & Modeling of Hidden Nodes WLAN and MAC Layer Protocol Simulated By NS-2

    In wireless network, the authors are facing a problem to transmitting simultaneously to same receiving node. So that performance of network not same as normal network (may be central control or ad-hoc network). Normally, such type problem solves MAC layer protocol using Ready-To-Send/Clear-To-Send (RTS/CTS), but not only RTS/CTS, also need...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    Mobile Agent Systems, Recent Security Threats and Counter Measures

    Mobile agent technology offers a dramatically evolving computing paradigm in which a program, in the form of a software agent, can suspend its execution on a host computer, transfers itself to another agent-enabled host on the network, and resumes execution on the new host. It is 1960's since mobile code...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    Artificial Bee Colony Based Multifeature Recognition

    In this paper, the authors present a new approach to improve the recognition performance of existing authentication systems based on palmprint. The technique presented extracts multiple features namely, minutiae, texture and ridge from the palmprint image using novel algorithms. The images are then classified using artificial bee colony classifier. The...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    High Capacity Information Hiding System for Encrypted Text Message Using Pixel Intensity Based LSB Substitution Technique

    In this paper, the authors present the spatial domain image steganography based embedding system using different pixel intensities. Here, the efforts have been done to combine cryptography with the steganography for imparting better security to the proposed system. Various performance measures like peak signal to noise ratio, mean square error...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    Knowledge-Based Software System for Space Exploration

    It has been observed that transformation in space exploration is done by various innovations in robotic spacecraft. Space exploration using spacecraft are becoming software-intensive supporting remote-control, increased productive science gathering and analysis, good troubleshooting during flight accelerated understanding of universe. Furthermore, software engineering approach will also incorporate in this system,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    A Literature Review and Comparative Analyses on SQL Injection: Vulnerabilities, Attacks and Their Prevention and Detection Techniques

    SQL injection is a technique that exploits a security vulnerability occurring in the database layer of an application. The attack takes advantage of poor input validation in code and website administration. It allows attackers to obtain unauthorized access to the back- and database to change the intended application generated SQL...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    An Efficient Protective Layer Against SQL Injection Attacks

    In this paper, the authors present a detailed discussion on different SQL injection attacks and their prevention technique. In addition, they proposed a new scheme for prevention of SQL injection attack, which consist of three blocks or three tier architecture: the clients, the application server and the database server. Their...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    Performance Analysis of LTE Physical Layer Based on 3GPP-Release-8

    Long Term Evolution (LTE) is the last step towards the 4th generation of cellular networks. This revolution is necessitated by the unceasing increase in demand for high speed connection on LTE networks. This paper mainly focuses on performance evaluation of LTE physical layer to study and analysis the effect of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    Performance Evaluation of Some Routing Protocols Using TCP Traffic Types in Mobile Ad Hoc Networks

    Routing is a critical issue in a Mobile Ad-hoc NETwork (MANET). The most famous MANET routing protocols are AODV, DSDV, DSR and AOMDV. Although the performance evaluation of these routing protocols have been extensively simulated, most of the researchers are focusing on the User Datagram Protocol (UDP) traffic type supposing...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    Performance Evaluation of HEVC Over Broadband Networks

    High efficiency video coding is the current trend setting standard for coding and transmission of video content. This standard has brought in many improvements over its predecessor H264 standard. In this paper, performance evaluation of transmitting HEVC content over the simulated network environment for disaster and calamity stricken area has...

    Provided By International Journal of Computer Science Issues