International Journal of Computer Science Issues

Displaying 281-320 of 870 results

  • White Papers // Nov 2012

    A Blind Detection Algorithm Utilizing Statistical Covariance in Cognitive Radio

    As the expression of performance parameters are obtained using asymptotic method in most blind covariance detection algorithm, the paper presented a new blind detection algorithm using cholesky factorization. Utilizing random matrix theory, the authors derived the performance parameters using non-asymptotic method. The proposed method overcomes the noise uncertainty problem and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Broad-band Circularly Polarized Patch Antenna for Multi-Mode Navigation Application

    A broad-band circularly polarized, patch antenna is developed for GPS/ GLONASS/ BEIDOU/ GALILEO systems. The antenna includes four L-probes, a circular patch with four edges trimming and a feed network. The four L-probes are excited by a feed network in equal magnitude and successive 90 phase difference. The edge cutting...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Content-Centric Networking: Effect of Content Caching on Mitigating DoS Attack

    Content-Centric Networking (CCN) is a novel networking paradigm making named data the first class entity rather than IP address. That is, it cares about which data to fetch rather than which host to reach. One key feature of CCN is the content caching that CCN routers are caching named contents...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Precedence Based Preemption and Bandwidth Reservation Scheme in MANET

    Infrastructures less mobile networks are commonly known as Mobile Ad Hoc NETworks (MANET). Quality of Service (QOS) constraints is highly required for multimedia communications with MANET. Providing QOS in MANET is not easy task due to its broadcast and dynamic nature. There are some number of protocols exist which takes...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Delay and Delay Variation Constrained Algorithm based on VNS Algorithm for RP Management in Mobile IPv6

    On account of the progress of network multimedia technology, more and more real-time multimedia applications arrive with the need to transmit information using multicast communication. These applications are more important with the arrival of mobile IPv6 protocol through mobile receivers and sources. These applications require a multicast routing protocol which...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Design and Simulation of an IPv6 Network Using Two Transition Mechanisms

    This paper is focused on the most important theoretical concepts of the IPv6 protocol, such as addressing, address allocation, routing with the RIPng protocol and two IPv4 to IPv6 transition mechanisms. It describes the design and simulation of connectivity between devices of a network configured with IPv6 protocol, employing dual...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Homemade Antennas Implementation: A Comparative Analysis of the Quality of Service

    The wireless antennas have become essential to the peoples life as can be seen at their homes, workplaces, schools, and some other common places. This paper describes the construction of three homemade wireless antennas operating in the frequency band of 2.4 GHz and replicating the signal to increase the covering...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Design of an interactive game-based application for improving the resolution of common Computer Network issues

    The need to find new ways to help students in the learning process makes the people more involved with technology which evolves every day. This background leads the authors' to find new methods and forms of teaching that help students accelerate their learning skills in a different way from the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Network traffic prediction based on ARFIMA model

    ARFIMA is a time series forecasting model, which is an improve d ARMA model, the ARFIMA model proposed in this paper is demonstrated and deduced in detail. combined with network traffic of CERNET backbone and the ARFIMA model, the result shows that, compare to the ARMA model, the prediction efficiency...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    A Novel Problem-solving Metric for Future Internet Routing Based on Virtualization and Cloud-computing

    The Internet has evolved from an academic network to a broad commercial platform and become an integral and indispensable part of the people daily life, economic operation, and society over forty years. However, many technical and non-technical challenges have emerged during this process. In order to address these challenges, the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    MuMoCo : a Framework for Improving Data Quality with Multi-modality Cooperation in Wireless Sensor Networks

    High quality sensor data stream is crucial to wireless sensor networks applications. However raw data streams in wireless sensor networks tend to be not reliable. Therefore, improving sensor data quality is an important issue for all kinds of wireless sensor networks applications. In this paper, the authors proposed an integrated...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Delay-aware Load Balanced Routing Protocol for IEEE 802.16 Wireless Mesh Networks

    In IEEE 802.16 Wireless Mesh Networks (WMN) routing, delay aware load balancing can be achieved by selecting the shortest path with low latency and network load. But network load and latency together are not considered in most of the existing routing metrics. Here, the authors propose a delay aware load...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Improve Downlink Burst Allocation to Achieve High Frame Utilization of Mobile WiMAX (802.16e)

    The burst allocation algorithm is responsible about calculating the appropriate dimensions and location of each user's data to construct the bursts in the downlink subframe in term of the number of slots for each user. Burst allocation is one of the performance parameter which influences the mobile WiMAX systems, due...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Service Priority based Reliable Routing Path Select Method in Smart Grid Communication Network

    The new challenges and schemes for the Smart Grid require high reliable transmission technologies to support various types of electrical services and applications. This paper concentrates the degree of importance of services and tries to allocate more important service to more reliable network routing path to deliver the key instructions...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Novel Fast Encryption Algorithms for Multimedia Transmission over Mobile WiMax Networks

    Security support is mandatory for any communication networks. For wireless systems, security support is even more important to protect the users as well as the network. Since wireless medium is available to all, the attackers can easily access the network and the network becomes more vulnerable for the user and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    A Framework for Optimizing IP over Ethernet Naming System

    Due to the rapid expansion of the technology field. Developing the Internet has become more urgent to meet the needs of the expansion. TCP/IP is the most protocol used in the Internet. It consists from layers, each layer done its job separately. However these layers susceptible to different attacks and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Enhanced Fractional Frequency Reuse (EFFR) Technique in WiMAX Cellular Network

    WiMAX is a broad band high speed wireless communication system which use cellular network topology to deploy services to different subscribers. One of the major problems of deploying WiMAX base stations is the signal interference caused by neighboring cells which causes redaction in cell coverage area and capacity. The standard...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    An Efficient Encryption Algorithm for P2P Networks Robust Against Man-in-the-Middle Adversary

    Peer-to-Peer (P2P) networks have become popular as a new paradigm for information exchange and are being used in many applications such as file sharing, distributed computing, video conference, VoIP, radio and TV broadcasting. This popularity comes with security implications and vulnerabilities that need to be addressed. Especially duo to direct...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    On Reliability Modeling in Wireless Sensor Networks-A Review

    This paper presents a survey on existing reliability models in Wireless Sensor Networks (WSNs). Most of the existing mechanisms employ retransmissions, ignoring redundancy schemes and moreover no attempt has been made for biologically inspired WSNs. This paper proposes a biologically inspired wireless sensor network model where sensor nodes are intelligent...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Performance and Comparison of Multi-Hop Ad-Hoc Routing Protocols ? Quantitative Study

    Wireless Ad-hoc network is emerging network and form temporary networks. Due to its spontaneous nature the topology is frequently changes. Protocols selection and set up routing between any pair of nodes are the primary goal design for any wireless network. Several protocols are proposed in Mobile Ad hoc NETwork (MANET)...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    A Novel Problem-solvingMetric for Future Internet Routing Based on Virtualization and Cloud-computing

    The Internet has evolved from an academic network to a broad commercial platform and become an integral and indispensable part of their daily life, economic operation, and society over forty years. However, many technical and non-technical challenges have emerged during this process. In order to address these challenges, the authors...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Study and Optimization of Cooperative Spectrum Sensing in OFDM Cognitive Radio Networks

    In this paper, a cooperative sensing algorithm for OFDM is proposed in this paper based on the performance analysis of ONPD algorithm, then the system weight vector is optimized and the closed form expression of optimal weight vector is obtained using the maximum improved deflection coefficient. Theoretical analysis and simulation...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Towards a Next Generation of Scientific Computing in the Cloud

    More than ever, designing new types of highly scalable data intensive computing is needed to qualify the new generation of scientific computing and analytics effectively perform complex tasks on massive amounts of data such as clustering, matrix computation, data mining, information extraction, etc. Map-Reduce, put forward by Google, is a...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Performance of Network Coding Based Multipath Routing in Wireless Sensor Networks

    In recent times, there have been many advances in the field of information theory and Wireless Sensor Network (WSN) technologies. Network coding is a new paradigm in data transport and promises to change many aspects of WSN. In this paper, the authors introduce an analytical framework to study the performance...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    The Research on an Algorithm of Three-Dimensional Topology Control of Wireless Sensor Network

    Nowadays, the research about three-dimensional topology control has focused on ensuring the connectivity of the networks, and has seldom considered the balance between neighbor node degree and energy consumption minimum path. In order to solve this problem, this paper proposes an adjustable topology control algorithm in three-dimensional wireless sensor networks,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Middleware approaches for Wireless Sensor Networks: An overview

    Wireless Sensor Networks (WSN) has become highly attractive to researchers and industries due to its wide range of applications. Middleware is a distributed software that tries to provide a common platform for hiding the heterogeneity of the system, enabling multiple applications to work on a distributed network. This survey paper...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Performance Analysis of VoIP Codecs over WiMAX Networks

    Real-time services such as VoIP are becoming popular and are major revenue earners for network service providers. These services no longer confined to the wired domain and extended over wireless networks. Although some of the existing wireless technologies can support some low-band width applications, the bandwidth demands of many multimedia...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Wifi-based Indoor Navigation with Mobile GIS and Speech Recognition

    As the development of mobile communications and wireless networking technology and people's increasing demand for wireless location services, positioning services are more and more important and become the focus of research. However, the most common technology which supports outdoor positioning services is Plobal Positioning System (GPS), but GPS has been...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Performance Analysis of Scheduling Algorithms For VoIP Services in IEEE 802.16 Systems

    VoIP applications are being widely used in today's networks challenging their capabilities to provide a good quality of experience level to the users. In particular, there are several scheduling algorithms for Voice over IP (VoIP) services in IEEE 802.16 systems, such as Unsolicited Frant Service (UGS), realtime Polling Service (rtPS),...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Using Modified Partitioning Around Medoids Clustering Technique in Mobile Network Planning

    Optimization mobile radio network planning is a very complex task, as many aspects must be taken into account. Deciding upon the optimum placement for the Base Stations (BS's) to achieve best services while reducing the cost is a complex task requiring vast computational resource. This paper introduces the spatial clustering...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Energy Efficient Routing in Mobile Adhoc Networks based on AODV Protocol

    Mobile Ad hoc NETworks (MANETs) suffer from power exhaustion as many nodes use batteries as their source. Energy consumption is one of the most important system design optimization criterion in MANETs. The conventional routing protocols do not consider energy of nodes while selecting routes. So, using the same route for...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    MuMoCo : a Framework for Improving Data Quality with Multiple Modalities Cooperation in Wireless Sensor Networks

    High quality sensor data stream is crucial to wireless sensor networks applications. However raw data streams in wireless sensor networks tend to be not reliable. Therefore, improving sensor data quality is an important issue for all kinds of wireless sensor networks applications. In this paper, the authors proposed an integrated...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    A Review on Node Deployment of Wireless Sensor Network

    Wireless Sensor Network (WSN) is nowadays being applied in many different civilian applications like vehicle tracking, habitat monitoring, forest surveillance, earthquake observation, biomedical or health care applications and building surveillance. To a large extent the effectiveness of the wireless sensor networks depends on the coverage provided by the sensor deployment...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Prediction based Link Stability Scheme for Mobile Ad Hoc Networks

    Mobile Ad Hoc NETworks (MANETs) consist of mobile nodes which are not controlled by any base station. Mobile nodes act as a major role because of performing the data transmission, route discovery, route maintenance. The packet loss occurs often while the nodes are moving out of range, or the node...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Application of Inventory Management Principles for Efficient Data Placement in Storage Networks

    The principles and strategies found in material management are comparable and analogue with the data management. This paper concentrates on the conversion of product inventory management principles into data inventory management principles. Efforts were made to enumerate various impacting parameters that would be appropriate to consider if any data inventory...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Effective Business Value of Bal Information System

    It has become increasingly difficult to ignore the importance of business value of information system. Over the past few years researchers have high lightened the need of information system in business field. More over individuals, organizations and countries are investing considerably in information system. It is widely observed that IS...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    How Using Business Intelligence Can Improve SCPMS Project Maturity: An Empirical Investigation in Large Sized Moroccan Companies

    Business analytics tools in Supply Chains have become an essential support for their Performance Measurement System (SCPMS); therefore they are considered as a critical success factors for a project of designing and implementing SCPMS. However, there is a lack of studies addressing the issue of the contribution of Business intelligence...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Agent-Oriented Enterprise Architecture: New Approach for Enterprise Architecture

    Now-a-days, utilizing EA by enterprises with medium and long term goals causes improvement in their productivity and competitiveness. With respect to varied changes in enterprise's business activities and attitudes, flexibility in information systems of EA is a crucial factor. Agent's capacities in implementation of complex systems goal convince huge enterprises...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Influence of Customer Relationship Management on Online Shopping

    The rapid development of internet user has made it easy and improved the online marketing in the global market, as a result the number of customer shopping online are increasing more than the number of customer using internet for others purposes, customer participations are the basic of every business success,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    SAHR: Swarm Adaptive Hybrid Routing Protocol for Mobile Ad hoc Networks

    The nodes in the Ad hoc networks are independent and well structured. The authors know that a couple of nodes can interact with one another, if they have entered into the opponent transition region. For this purpose wireless means is being utilized by the nodes. The tiniest creature in the...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2010

    A Situational Approach for Web Applications Design

    The paper introduces a situational approach for Web applications design. the authors, first, define development situations and identify their specific characteristics through situational factors in projects. Using these situational factors, the most appropriate design process-model is selected. A meta-modeling technique is proposed that integrates the Map formalism for modeling existing...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2010

    Performance Evaluation of Two Reactive Routing Protocols of MANET Using Group Mobility Model

    Mobile ad-hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any stand-alone infrastructure or centralized administration. Mobile ad-hoc networks have the attributes such as wireless connection, continuously changing topology, distributed operation and ease of deployment. In this paper the authors have compared...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2010

    Image Compression Algorithms for Fingerprint System

    Fingerprint-which have been used for about 100 years are the oldest biometric signs of identity. Humans have used fingerprints for personal identification for centuries and the validity of fingerprint identification has been well established. In fact, fingerprint technology is so common in Human Identification that it has almost become the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2010

    Comprehensive Security Framework for Global Threats Analysis

    Cyber criminality activities are changing and becoming more and more professional. With the growth of financial flows through the Internet and the Information System (IS), new kinds of thread arise involving complex scenarios spread within multiple IS components. The IS information modeling and Behavioral Analysis are becoming new solutions to...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2010

    3D/2D Registration of Mapping Catheter Images for Arrhythmia Interventional Assistance

    RadioFrequency (RF) catheter ablation has transformed treatment for tachyarrhythmias and has become first-line therapy for some tachycardias. The precise localization of the arrhythmogenic site and the positioning of the RF catheter over that site are problematic: They can impair the efficiency of the procedure and are time consuming (several hours)....

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2010

    Performance Analysis of Software to Hardware Task Migration in Codesign

    The complexity of multimedia applications in terms of intensity of computation and heterogeneity of treated data led the designers to embark them on multiprocessor systems on chip. The complexity of these systems on one hand and the expectations of the consumers on the other hand complicate the designers job to...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2010

    Efficient Password-Typed Key Agreement Scheme

    In this paper, the authors will study Lee, Kim and Yoo, a verifier password typed key agreement scheme and demonstrate that the scheme is not secure. Then, the authors will propose an enhanced verifier typed key agreement scheme relied on Lee, Kim and Yoo scheme and demonstrate that the propose...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2010

    Shape-Adaptive Motion Estimation Algorithm for MPEG-4 Video Coding

    This paper presents a gradient based motion estimation algorithm based on shape-motion prediction, which takes advantage of the correlation between neighboring Binary Alpha Blocks (BABs), to match with the Mpeg-4 shape coding case and speed up the estimation process. The PSNR and computation time achieved by the proposed algorithm seem...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2010

    A New Approach to Supervise Security in Social Network Through Quantum Cryptography and Non-Linear Dimension Reduction Techniques

    Social networking sites such as Orkut, Tribe, or Facebook allow millions of individuals to create online profiles and share personal information with vast networks of friends - and, often, unknown numbers of strangers. Some of the information revealed inside these networks is private and it is possible that corporations could...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    SAHR: Swarm Adaptive Hybrid Routing Protocol for Mobile Ad hoc Networks

    The nodes in the Ad hoc networks are independent and well structured. The authors know that a couple of nodes can interact with one another, if they have entered into the opponent transition region. For this purpose wireless means is being utilized by the nodes. The tiniest creature in the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Prevention of Attacks Under DDoS Using Target Customer Behavior

    The possibility of sharing information through networking has been growing in geometrical progression. In this connection it is to be noted network attacks, in other words, DDoS attacks also are growing in equal proportion. Sharing of information is being carried out by means of server and client. The client requests...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Internet Intrusion Detection System Service in a Cloud

    Intrusion Detection Systems (IDS) have been used widely to detect malicious behaviors in network communication and hosts. It is defined as a computer network system to collect information on a number of key points, and analyze this information to see whether there are violations of network security policy behavior and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Enhanced ATM Security System Using Biometrics

    Because biometrics-based authentication offers several advantages over other authentication methods, there has been a significant surge in the use of biometrics for user authentication in recent years. In this paper the existing security of the ATM (Automated Teller Machine) system has been improved by integrating the fingerprint of the user...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Link Budget Analysis in the Network Designed Mobile WiMAX Technology in the Territory of the Urban Area of the City of Gjakova

    Wireless communication has now entered the second century of its use and has valuable merits of improving the quality of life of all mankind. Technologies for wireless and mobile communications are replaced every 2-3 years. The current version of the protocol provides Internet access up to 40 Mbps and this...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Service Oriented Architecture Role in the Comprehensive Systems Integration

    Today, any organization or economic enterprise, a method for systems integration application uses its collection and therefore can never found a unique method that can meet the needs of system integration is in all organizations. With a proposed solution to the issue of pay. Thus, for application integration systems should...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    A Trust-Based Security Mechanism for Nomadic Users in Pervasive Systems

    The emergence of network technologies and the appearance of new varied applications in terms of services and resources, have created new security problems for which existing solutions and mechanisms are inadequate, especially problems of identification and authentication. In a highly distributed and pervasive system, a uniform and centralized security management...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Remote Computer Access Through Android Mobiles

    In this paper, the authors will present the process to access the computers with the help of android mobile phones. This process is based on VNC (virtual network computing) technique. So to work on this, they must install VNC server on their computer connected with Wi-Fi network. The user can...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    A Rapid and Robust Method for Shot Boundary Detection and Classification in Uncompressed MPEG Video Sequences

    Shot boundary and classification is the first and most important step for further analysis of video content. Shot transitions include abrupt changes and gradual changes. A rapid and robust method for shot boundary detection and classification in MPEG compressed sequences is proposed in this paper. The authors firstly only decode...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Speedy Signature Based Intrusion Detection System Using Finite State Machine and Hashing Techniques

    This paper proposes a secure system designs for client-server based communication systems. In this system, security services are implemented on server, as generally data received on the servers contains malicious contents. The technique that the authors used is to perform speedy intrusive signature matching received inside a network with the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Design and Implementation of an IP-Based Security Surveillance System

    The tremendous loss of lives and properties that may be attributed to criminals in recent times worldwide has become a source of worry to all and sundry. The situation has come to the alarming rate that the authority has sought for the immediate means of checkmating it without delay. Therefore,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Developing Service Oriented Computing Model Based On Context-Aware

    SOA and Cloud computing are making major changes in the way companies build and deploy applications. The challenge is to meet the business expectation of faster delivery of new functionality, while at the same time maintaining control of application performance and availability across a growing network of service providers. SOA...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Feasibility Evaluation of VANET Using Directional-Location Aided Routing (D-LAR) Protocol

    Vehicular Ad hoc NETworks (VANETs) allow vehicles to form a self-organized network without any fixed infrastructure. VANETs have received wide attention and numerous research issues have been identified in the recent time. The design and implementation of efficient and scalable routing protocols for VANETs is a challenging task due to...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Credit Card Fraud Detection Using Decision Tree for Tracing Email and IP

    Credit card fraud is a wide-ranging term for theft and fraud committed using a credit card or any similar payment mechanism as a fraudulent source of funds in a transaction. The purpose may be to obtain goods without paying, or to obtain unauthorized funds from an account. Transactions completed with...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Analysis of AODV Over Increased Density and Mobility in Intelligent Transportation System

    Currently the area of VANET lacks in having some better designed algorithms to handle dynamic change and frequent disruption due to the high mobility of the vehicles. There are many techniques to disseminate messages across moving vehicles but they are all highly dependent on some conditions involving flow, density and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Using Mobile Agent Technology to Develop a Collaborative Product Lifecycle Oriented Architecture

    Today product development activities are becoming more and more agile, adaptable, and cost-effective. Multi-agent-based system technology has found wide applications in managing company's information. This paper applies Multi-mobile-agent technology in developing a collaborative architecture for product lifecycle. By adopting the Aglets mobile agent platform, a generic platform has been developed...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2011

    Secure Geographic Routing Protocols: Issues and Approaches

    In the years, routing protocols in Wireless Sensor Networks (WSN) have been substantially investigated by researches. Most state-of-the-art surveys have focused on reviewing of wireless sensor network .In this paper, the authors review the existing secure geographic routing protocols for wireless sensor network (WSN) and also provide a qualitative comparison...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Multi Databases in Health Care Networks

    E-Health is a relatively recent term for healthcare practice supported by electronic processes and communication, dating back to at least 1999. E-Health is greatly impacting on information distribution and availability within the health services, hospitals and to the public. E-health was introduced as the death of telemedicine, because - in...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2011

    A Fusion Algorithm for Joins Based on Collections in Odra (Object Database for Rapid Application Development)

    In this paper, the authors present the functionality of a currently under development database programming methodology called ODRA (Object Database for Rapid Application development) which works fully on the object oriented principles. The database programming language is called SBQL (Stack Based Query Language). They discuss some concepts in ODRA for...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    A Comparison Between Data Mining Prediction Algorithms for Fault Detection

    In the current competitive world, industrial companies seek to manufacture products of higher quality which can be achieved by increasing reliability, maintainability and thus the availability of products. On the other hand, improvement in products lifecycle is necessary for achieving high reliability. Typically, maintenance activities are aimed to reduce failures...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2010

    Multiple Criteria Decision-Making Preprocessing Using Data Mining Tools

    Real-life engineering optimization problems need MultiObjective Optimization (MOO) tools. These problems are highly nonlinear. As the process of Multiple Criteria Decision-Making (MCDM) is much expanded most MOO problems in different disciplines can be classified on the basis of it. Thus MCDM methods have gained wide popularity in different sciences and...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2011

    Bridging the Gap Between Technical Heterogeneity of Context-Aware Platforms: Experimenting a Service Based Connectivity Between Adaptable Android, WComp and OpenORB

    Many companies include in their Information Systems (IS) several communicating heterogeneous middleware according to their technical needs. The need is the same when IS requires using context aware platforms for different aims. Moreover, users may be mobile and want to receive and send services with their PDA that more often...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    PCLA: A New Public-Key Cryptosystem Based on Logarithmic Approach

    A public key cryptosystem is an asymmetric cryptosystem where the key consist of a public key and a private key. As the public key is public (known to all), can be used to encrypt the messages. The private key, kept as secret, can be used to decrypt the messages by...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    A Quantitative Measurement and Validation of Granularity in Service Oriented Architecture

    The prominent principle of designing service in Service Oriented Architecture is service granularity. The granularity is a crucial design decision. The service should be neither too coarse nor too fine grained. Therefore, it should be evaluated at the design phase itself to measure its level of appropriateness. This paper proposes...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Stimulating Cooperation in Mobile Ad Hoc Networks Using Cut Diamond With Diamond Method

    In recent years, mobile ad-hoc networks have become very popular because of their widespread usage. Cooperation among the nodes in adhoc networks is an important issue for communication to be possible. But some nodes do not cooperate in communication and saves their energy. These nodes are called as selfish nodes....

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Fast Energy-Efficient Secure Dynamic Address Routing for Scalable WSNs

    Secure Routing is one of the important issues in wireless sensor networks. A number of approaches have been proposed for secure routing in wireless sensor networks, but there is a lack of sufficient support for quick &secure routing in large-scale sensor networks. The authors consider the dynamic address routing for...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Integration of Chaotic Sequences Uniformly Distributed in a New Image Encryption Algorithm

    In this paper, the authors propose a new chaotic secret key cryptosystem, adapted for image encryption in continuous mode, which is based on the use of two one-dimensional discrete chaotic systems: Bernoulli map and Tent map. The pseudorandom sequences generated by the two maps are characterized by independence of their...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Identifying Data Integrity in the Cloud Storage

    In cloud computing, data is moved to a remotely located cloud server. Cloud faithfully stores the data and return back to the owner whenever needed. But there is no guarantee that data stored in the cloud is secured and not altered by the cloud or Third Party Auditor (TPA). In...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    A Framework for Outdoor Mobile Augmented Reality

    Augmented Reality (AR) presents a particularly powerful User Interface (UI) to context-aware computing environments. AR systems integrate virtual information into a person's physical environment so that he or she can get the latest information about the environment. In a limited mobile platform, the authors propose a framework for outdoor augmented...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Secure and Compressed Secret Writing Using DES and DEFLATE Algorithm

    A new secret writing using DES and DEFLATE algorithm is explored by improving the previous attempts in this sense in terms of security and compression. A Matching Pursuit algorithm using redundant basis decomposition technique is used to securely hide a message. The stability and computational complexity problems are solved by...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Comparative Study of CDMA and OFDM in WI-FI

    There have been extensive research efforts on simulating Wireless Local Area Networks. Many papers have studied the performance of IEEE 802.11 WLANs by using simulation under different channels and for different modulations. In this paper, the authors first simulate a simplified IEEE 802.11a standard based on Orthogonal Frequency Division Multiplexing...

    Provided By International Journal of Computer Science Issues