International Journal of Computer Science Issues

Displaying 281-320 of 782 results

  • White Papers // Sep 2012

    On Web Services Based Cloud Interoperability

    Cloud Computing is a paradigm shift in the field of Computing. It is moving at an incredible fast pace and one of the fastest evolving domains of computer science today. It consist set of technology and service models that concentrates on the internet base use and delivery of IT applications,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    A CDMA Based Scalable Hierarchical Architecture for Network-On-Chip

    A Scalable hierarchical architecture based Code-Division Multiple Access (CDMA) is proposed for high performance Network-on-Chip (NoC). This hierarchical architecture provides the integration of a large number of IPs in a single on-chip system. The network encoding and decoding schemes for CDMA transmission are provided. The proposed CDMA NoC architecture is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    A Stable Distributed Clustering Algorithm for Mobile Adhoc Networks

    Mobile Ad hoc NETworks (MANET) are distributed systems which consist of several mobile nodes; they do not include predetermined topology and have no concentrated control. The nodes connect wirelessly by the approach in which they decide themselves. To access the development in the MANET, an approach should be found such...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Towards Identification and Recognition of Trace Associations in Software Requirements Traceability

    In the field of software engineering, requirements traceability is becoming a dynamic area of research. Producing numerous artifacts is crucial activity to maintain and yield high quality software. These artifacts are created and generated throughout the lifetime of software development, and are highly interrelated where the impact of any change...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    A Comparison of Various Edge Detection Techniques Used in Image Processing

    In this paper the important problem is to understand the fundamental concepts of various filters and apply these filters in identifying a shark fish type which is taken as a case study. In this paper the edge detection techniques are taken for consideration. The software is implemented using MATLAB. The...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Real-Time Covert Communications Channel for Audio Signals

    Covert communications channel is considered as a type of secure communications that creates capability to transfer information between entities while hiding the contents of the channel. Multimedia data hiding techniques can be used to establish a covert channel for secret communications within a media carrier. In this paper, a high-rate...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Software Defect Prediction Models for Quality Improvement: A Literature Study

    In spite of meticulous planning, well documentation and proper process control during software development, occurrences of certain defects are inevitable. These software defects may lead to degradation of the quality which might be the underlying cause of failure. In today's cutting edge competition it's necessary to make conscious efforts to...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    SAHR: Swarm Adaptive Hybrid Routing Protocol for Mobile Ad hoc Networks

    The nodes in the Ad hoc networks are independent and well structured. The authors know that a couple of nodes can interact with one another, if they have entered into the opponent transition region. For this purpose wireless means is being utilized by the nodes. The tiniest creature in the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Hiding Data in Images Using New Random Technique

    Steganography is the art of hiding the fact that communication is taking place by hiding information in other information. In the field of Data Communication, Steganography play a major role. The transmission of information via the Internet may expose it to detect and theft. Some solution to be discussed is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Cloud Databases: A Paradigm Shift in Databases

    Relational databases ruled the Information Technology (IT) industry for almost 40 years. But last few years have seen sea changes in the way IT is being used and viewed. Stand alone applications have been replaced with web-based applications, dedicated servers with multiple distributed servers and dedicated storage with network storage....

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    An Optimized Query Tree Algorithm in RFID Inventory Tracking - A Case Study Evidence

    One of the challenged technical issue faced in inventory tracking applications with Radio Frequency IDentification (RFID) implementation environment, is the collisions due to responses from multiple tags on the shared channel between reader and the tags, which consumes further the energy as well as the delay in tag identification process....

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Application of Geographical Information System (GIS) in Urban Water of Amol in Iran at Time of Natural Disaster

    For the management of urban disaster risk, periodic updating of geo-databases of urban water is crucial, particularly in developing countries where urbanisation rates are very high. However, collecting information on the characteristics of buildings and lifelines through full ground surveys can be very costly and time-consuming. This paper has done...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Comparison Between MC-CDMA and CDMA-OFDM/OQAM Systems in Presence of MIMO Channel

    In this paper, the authors present a comparison between MC-CDMA and CDMA-OFDM/OQAM systems in the case of MIMO channel. The advanced Multi Carrier CDMA OFDM/OQAM modulation is a combination of CDMA and OFDM/OQAM. This combination takes advantages from multicarrier modulation and spread spectrum. Indeed, the use of OFDM has proved...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Application of Satellite Remote Sensing for Detailed Landslide Inventories Using Frequency Ratio Model and GIS

    This paper presents landslide susceptibility analysis in central Zab basin in the southwest mountainsides of West-Azerbaijan province in Iran using remotely sensed data and Geographic Information System. Landslide database was generated using satellite imagery and aerial photographs accompanied by field investigations using Differential Global Positioning System to generate a landslide...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    P2P Appliance Calculation Method for Trust Between Nodes Within a P2P Network

    Modern ways of communications, such as in a web services environment, also influences trust relationships between organisations. This concept of web-based (way towards semantic web services) trust is new and has as yet not been resolved. The authors hope that some of the trust properties mentioned above can be successfully...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    On the Current Measurement Practices in Agile Software Development

    Agile Software Development (ASD) methods were introduced as a reaction to traditional software development methods. Principles of these methods are different from traditional methods and so there are some different processes and activities in agile methods comparing to traditional methods. Thus, ASD methods require different measurement practices comparing to traditional...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Algorithm for Efficient Attendance Management: Face Recognition Based Approach

    Students attendance in the classroom is very important task and if taken manually wastes a lot of time. There are many automatic methods available for this purpose, i.e., biometric attendance. All these methods also waste time because students have to make a queue to touch their thumb on the scanning...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Adaptive Packet Buffering Algorithm Based on Priority and Traffic Throughput for Reducing Packet Loss in Fast Handover for Mobile IPv6

    The packet loss has become an important issue to the research community, which needs to be addressed. In FMIPv6, Packet losses are significantly related to the handover latency and buffer size used for packet buffering. In the case of increased handover latency or decreased buffer size, packet losses will be...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    A Primary User Authentication Scheme for Secure Cognitive TV Spectrum Sharing

    Cognitive radio is being intensively investigated by regulatory bodies as the enabling technology for opportunistic access to the TV white spaces. The successful deployment of cognitive radio networks and the realization of their benefits depend on the assignment of essential security challenges to resist misuse of the systems. In this...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Load Aware Congestion Detection Technique in Internet

    The Internet includes various ranges of applications such as multimedia, voice and data but it endures rigorous network congestion. Further, congestion detection is an essential preventive measure must be taken to provide congestion-free Internet. To stipulate proficient technique for congestion detection, in this paper, the authors propose a load aware...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Multi-Object Tracking in Dynamic Scenes by Integrating Statistical and Cognitive Approaches

    In this paper, the authors have addressed a quite researched problem in vision for tracking objects in realistic scenarios containing complex situations. The framework comprises of four phases: object detection and feature extraction, tracking event detection, integrated statistical and cognitive modules, and object tracker. The objects are detected using fused...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Comparative Study of CAD Software, Web3D Technologies and Existing Solutions to Support Distance-Learning Students of Engineering Profile

    Interactive simulations, virtual environments and 3D interfaces significantly contribute to the process of learning through collaboration and interaction with distant participants, and through simulation of real environments and real life situations. Depending on the needs and case studies, different technologies, software packages and their combinations are used. In this paper,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Manet Load Balancing Parallel Routing Protocol

    In recent years, multi-path routing protocols have attained more attention in mobile ad hoc networks as compared to other routing schemes due to their abilities and efficiency in improving bandwidth of communication, increasing delivery reliability, responding to congestion and heavy traffic. Several protocols have been developed to address multi path...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Feature Level Fusion of Palmprint and Iris

    In many real-life usages, single modal biometric systems repeatedly face significant restrictions due to noise in sensed data, spoof attacks, data quality, non-universality, and other factors. However, single traits alone may not be able to meet the increasing demand of high accuracy in today's biometric system. Multi-biometric systems is used...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Emergence of Robust Information Security Management Structure Around the World Wide Higher Education Institutions: A Multifaceted Security Solution

    Polarizing the views on the emergence of Information security around the campus arenas of higher education institutions is the utmost erg of both developing and developed nations in this post catastrophic era of September 11, 2001 where the unthinkable is now potentially a daily reality with root causes of information...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    A New Energy-Efficient TDMA-Based MAC Protocol for Periodic Sensing Applications in Wireless Sensor Networks

    Energy efficiency is a major requirement in wireless sensor networks. Media Access Control is one of the key areas where energy efficiency can be achieved by designing such MAC protocol that is tuned to the requirements of the sensor networks. Different applications have different requirements and a single MAC protocol...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    A Goal Question Metric Approach for Evaluating Security in a Service Oriented Architecture Context

    For interactions to be possible within the Service Oriented Architecture (SOA) ecosystem, each actor must be enough confident of other actors to engage safely in the interactions. Therefore, the establishing of objective metrics tailored to the context of SOA that show security of a system and lead to enhancements is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Testing Websites by P3R2 Model

    Cyber espionage at the government, corporate and individual levels has increased dramatically over the last few years. The cyberspace has become the latest domain of Chinese belligerence. There is a crying need for a cohesive global arrangement to address the emerging issues of Cyberspace. Apart from trying to cull out...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Using Mobile Agent Technology to Develop a Collaborative Product Life-Cycle Oriented Architecture

    Today product development activities are becoming more and more agile, adaptable, and cost-effective. Multi-agent-based system technology has found wide applications in managing company's information. This paper applies Multi-mobile-agent technology in developing a collaborative architecture for product lifecycle. By adopting the Aglets mobile agent platform, a generic platform has been developed...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Developing E-Learning Based on Animation Content for Improving Mathematical Connection Abilities in High School Students

    The purpose of this paper is to develop e-learning based on animation content to improve mathematical connection abilities in senior high school students. The e-learning was developed using framework proposed by Moddle, while the animation content was developed using macromedia flash. To get the student mathematical connection abilities, pretest and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    User Network Modeling-Based Spatial Web Personalization

    Web personalization can be seen as an interdisciplinary field whose objective is to facilitate the interaction between web content and user's needs. It includes per definition several research domains from social to information sciences. The personalized search focuses on integrating the user context and needs in the information retrieval process....

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Wireless Security System Implemented in a Mobile Robot

    This paper presents the design and implementation of a security system in which a mobile robot Lego NXT continuously monitors its surroundings while traveling in search of moving objects or people, considered unauthorized elements. An ultrasonic sensor is used for the monitoring. On suspicious movement detection, a warning signal is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    University Authentication System Based on Java Card and Digital X.509 Certificate

    This paper presents a solution to the problem of strong authentication, portable and expandable using a combination of Java technology and storage of X.509 digital certificate in Java cards to access services offered by an institution, in this case, the technology of the University of Panama, ensuring the authenticity, confidentiality,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Design and Optimization of Photonic Crystal Triplexer for Optical Networks

    Photonic Crystals (PhCs), also known as Photonic Band-Gap (PBG) materials, can control the spontaneous emission and the propagation of Electro-Magnetic (EM) waves. Due to existence of PBG, PhCs have applications in different areas of optical engineering such as optical filters, switches, power splitters, and demultiplexers which may ultimately pave the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Implementation of ITIL in a Moroccan Company: The Case of Incident Management Process

    IT departments were viewed as a cost center and not as an entity in the service of strategy. But this has changed in recent years because of market competitiveness and also due to the fact that the adoption of a management approach focused on the customer and driven by IT...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    A Method for Text Summarization by Bacterial Foraging Optimization Algorithm

    Due to rapid and increasingly growth of electronic texts and documents, the authors need some techniques for integration, communication and appropriate utilization of these texts. Summarizing the literature is one of the most fundamental tasks for integrating and taking advantages of these gathered texts. Selecting key words and then integrating...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Web Services Modeling and Composition Approach Using Objects-Oriented Petri Nets

    Now-a-days, with the emergence and the evolution of new technologies, such as e-business, a large number of companies are connected to Internet, and have proposed web services to trade. Web services as presented, are conceptually limited components to relatively simple functionalities. Generally, a single service does not satisfy the users...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    A Novel Image Encryption Using an Integration Technique of Blocks Rotation Based on the Magic Cube and the AES Algorithm

    In recent years, several encryption algorithms have been proposed to protect digital images from cryptographic attacks. These encryption algorithms typically use a relatively small key space and therefore, provide safe, especially if they are of a dimension. In this paper proposes an encryption algorithm for a new image protection scheme...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Network Based Anti-Virus Technology for Real-Time Scanning

    Negative aspects of networking lately became one of the most crucial problems in the information world. Protection against malware and malicious code must balance between being capable of fast detection of malware and being light on resources. Since modern antivirus systems are not optimized in the terms of speed, this...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Ranking Search Engine Result Pages Based on Trustworthiness of Websites

    The World Wide Web (WWW) is the repository of large number of web pages which can be accessed via Internet by multiple users at the same time and therefore it is Ubiquitous in nature. The search engine is a key application used to search the web pages from this huge...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Network Based Anti-Virus Technology for Real-Time Scanning

    Negative aspects of networking lately became one of the most crucial problems in the information world. Protection against malware and malicious code must balance between being capable of fast detection of malware and being light on resources. Since modern antivirus systems are not optimized in the terms of speed, this...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Ranking Search Engine Result Pages Based on Trustworthiness of Websites

    The World Wide Web (WWW) is the repository of large number of web pages which can be accessed via Internet by multiple users at the same time and therefore it is Ubiquitous in nature. The search engine is a key application used to search the web pages from this huge...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Fuzzy Maintainability Model for Object Oriented Software System

    In recent years for achieving considerable success in software system, maintainability plays a very crucial role and it is considered as an important quality characteristics. In this paper a maintainability model has been proposed to compare maintainability of object-oriented software system. Attempts have been made on software developed in different...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Model Based Neuro-Fuzzy ASR on Texas Processor

    In this paper an algorithm for recognizing speech has been proposed. The recognized speech is used to execute related commands which use the MFCC and two kinds of classifiers, first one uses MLP and second one uses fuzzy inference system as a classifier. The experimental results demonstrate the high gain...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    MISR: Multiple Inheritor Selection for Recovery of Nodes in Faulty Cluster in Wireless Sensor Networks

    A wireless sensor network composed of many sensor nodes which are used to monitor unavailable and harsh environments. Because these nodes are too small and battery operated which have limited energy, faults may occur. Fault tolerance is one of the most important issues in wireless sensor networks and must be...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Performance Comparison of SCTP and UDP Over Mobile Ad Hoc Networks

    Countless researchers have put efforts to conduct researches about the performance of the traditional Transport Control Protocols (TCP) and User Datagram Protocol (UDP). Recently new transport protocol had been designed called Stream Control Transmission Protocol (SCTP). In this paper, the authors will focus to study the effect of Mobile Ad...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Applying Data Mining Technique for the Optimal Usage of Neonatal Incubator

    This research aims to provide intelligent tool to predict incubator Length Of Stay (LOS) of infants which shall increase the utilization and management of infant incubators. The data sets of EGyptian Neonatal Network (EGNN) were employed and Oracle Data Miner (ODM) tool was used for the analysis and prediction of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Collaboration Schemes Evaluation in Multi-Domain Networks

    The monitoring of the quality of service in a multi-domain network supervises the multi-domain service performance. A multi-domain service is a service that crosses several domains which can be managed by different providers. Since, each domain can be managed with its own policies and may require confidential it of its...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Challenges Involved in Implementation of ERP on Demand Solution: Cloud Computing

    As the world is beginning towards the cloud where speed and scalability are critical; and the many software is taking over to one another even more intrinsic role in this period the Cloud ERP would play the vital role in organization specially in SME (i.e., Small Medium Enterprises). Organizations are...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    New Non Path Metrics for Evaluating Network Security Based on Vulnerability

    In this paper, the authors propose a new and simple metrics for evaluating network security. The proposed metrics are based on the existence of network vulnerabilities in the network. The proposed metrics are different with their previous metrics proposed. Exploited Vulnerability Percentage (EVP) metric, Vulnerable Host Percentage (VHP) metric and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Stability and Stabilization of a Flexible Manipulator

    In this paper, the stability and stabilization of a neutral system with time-delay are treated. First, the flexible manipulator is modeled as a neutral time-delay system form. Then, based on the Lyapunov-Krasovskii functional theory, a delay dependant condition is proposed to test studied system stability, which is applied to a...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    PCA-Based Relevance Feedback in Document Image Retrieval

    Research has been devoted in the past few years to relevance feedback as an effective solution to improve performance of information retrieval systems. Relevance feedback refers to an interactive process that helps to improve the retrieval performance. In this paper, the authors propose the use of relevance feedback to improve...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Shared Situation Awareness Architecture (S2A2) for Network Centric Disaster Management (NCDM)

    Having Shared Situation Awareness (SSA) in Network Centric Disaster Management (NCDM) lead to virtual collaboration, virtual organization and self-synchronization among people; therefore, having SSA reduces operation cost and risk and increases speed of responsibility and operation and total performance of decision-makers. In this paper, the authors present a new architecture...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    An Enhanced Evaluation Model for Vertical Handover Algorithm in Heterogeneous Networks

    The vertical handover decision is considered an NP-Hard problem. For that reason, a large variety of Vertical Handoff Algorithms (VHA) have been proposed to help the user to select dynamically the best access network in terms of Quality of Service (QoS). The objective of this paper is to provide a...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    Energy Efficient Routing Scheme for Sensor Networks Using Connected Dominating Set

    A power efficient scheduling scheme extending the life time of sensor nodes on wireless sensor networks has been proposed in this paper. This power efficient sleep scheduling algorithm is based on the connected dominating set approach. This approach first constructs a connected dominating set for parent selection and uses the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Edge Dominating Capability Based Backbone Construction in Wireless Networks

    Constructing a connected dominating set as the virtual backbone plays an important role in wireless networks. In this paper, the authors propose two novel approximate algorithms for dominating set and connected dominating set in wireless networks, respectively. Both of the algorithms are based on edge dominating capability which is a...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Relational Analysis Based Concurrent Multipath Transfer Over Heterogeneous Vehicular Networks

    In recent years, the growing interest in the Intelligent Transportation Systems (ITS) has resulted in variety of peer-reviewed publications. Significant results in this area have enabled many civilian and industry applications. As more and more vehicles are equipped with multiple network interfaces, how to efficient utilize the coexistence of Radio...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    A Study on Preference of Interface Design Techniques for Web Survey

    According to the advancement in internet and web-based application, the survey via the internet has been increasingly utilized due to its convenience and time saving. This paper studied the influence of five web-design techniques - screen design, response format, logo type, progress indicator, and image display on the interest of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Image Compression Using Harmony Search Algorithm

    Image compression techniques are important and useful in data storage and image transmission through the Internet. These techniques eliminate redundant information in an image which minimizes the physical space requirement of the image. Numerous types of image compression algorithms have been developed but the resulting image is still less than...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Evaluating on Performance of Single-Source Single-Relay SR-CARQ Protocol in TDMA Networks With Raleigh Fading

    This paper analyzes the performance of single-source and single-relay SR-CARQ protocol in TDMA wireless communication system. The authors establish its M/G/1 queuing model with vacations, and provide the expressions of its system time delay and saturation throughput. Then the analysis of theory and simulation results under the slow Raleigh fading...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Mobile Node for Wireless Sensor Network to Detect Landmines

    Individual sensor nodes are low power devices which integrate computing, wireless communication and sensing capabilities to detect land mine. Such multiple nodes collectively form wireless sensor network. To detect landmine in ground surface, sensor node that able to sense the mine and to process the information locally are mounted on...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Cryptographic Hash Functions: A Review

    Cryptographic Hash functions are used to achieve a number of security objectives. In this paper, the authors bring out the importance of hash functions, its various structures, design techniques, attacks and the progressive recent development in this field. Cryptographic techniques mainly encryption & decryptions have been used for centuries to...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Fuzzy Integrity Constraints for Native XML Database

    XML is gradually accepted as a standard for representing, accessing, and exchanging data in internet applications. It poses many new challenges to XML storage or XML repositories. The data centric approach of XML has necessitated the definition of integrity constraints for XML. Integrity constraints have proved fundamentally important in Relational...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Application Independent Energy Efficient Data Aggregation in Wireless Sensor Networks

    Wireless Sensor networks are dense networks of small, low-cost sensors, which collect and disseminate environmental data and thus facilitate monitoring and controlling of physical environment from remote locations with better accuracy. The major challenge is to achieve energy efficiency during the communication among the nodes. This paper aims at proposing...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Architecture of Wireless Network

    To allow for wireless communications among a specific geographic area, base stations of communication network must be deployed to allow sufficient radio coverage to every mobile users. The base stations, successively, must be linked to a central hub called the MSC (Mobile Switching Centre). The mobile switching centre allow connectivity...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Hybrid Routing Protocol for Wireless Sensor Networks

    Increasing network (WSN) lifetime is a challenge in routing protocol design for ad hoc network, especially in such a network each node (sensor) is powered by batteries, characterized ability calculation and limited storage. Hierarchical routing protocols are best known in regard to energy efficiency. By using a clustering technique hierarchical...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    A Novel Architecture for Collaborative Environments

    A novel architecture, called Cognitive Social Knowledge Grid, is introduced as a solution for collaborative environments. The CSKG performs information and knowledge operations through collaboration of agents and services in a service-oriented context. Its services and mechanisms have been described and relationship models of its components and services have been...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Intrusion Detection System Using Memtic Algorithm Supporting With Genetic and Decision Tree Algorithms

    This paper has proposed a technique of combining Decision Tree, Genetic Algorithm, DT-GA and Memtic algorithm to find more accurate models for fitting the behavior of network intrusion detection system. The authors simulate this sort of integrated algorithm and the results obtained with encouragement to further work. Computer networks are...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Low-Power and High Speed 128-Point Pipline FFT/IFFT Processor for OFDM Applications

    This paper represents low power and high speed 128-point pipelined Fast Fourier Transform (FFT) and its Inverse Fast Fourier Transform (IFFT) processor for OFDM. The Modified architecture also provides concept of ROM module and variable length support from 128~2048 point for FFT/IFFT for OFDM applications such as Digital Audio Broadcasting...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Network Anomalies Detection Using Statistical Technique : A Chi-Square Approach

    Intrusion Detection System is used to detect suspicious activities is one form of defense. However, the sheer size of the network logs makes human log analysis intractable. Furthermore, traditional intrusion detection methods based on pattern matching techniques cannot cope with the need for faster speed to manually update those patterns....

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    An Energy Aware Spatial Correlation Method in Event Driven Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are used to monitor and control the physical environment in different classes of applications. Due to the dense deployment of sensors and as the sensor observations are spatially correlated with respect to location of sensor nodes, it is not necessary for every sensor to transmit its...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Context-Awareness for Service Oriented Systems

    Today, service oriented systems need to be enhanced to sense and react to user's context in order to provide a better user experience. To meet this requirement, Context-Aware Services (CAS) has emerged as an underling design and development paradigm for the development of context-aware systems. The fundamental challenges for such...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Cryptanalysis of a Public-Key Cryptosystem Using Lattice Basis Reduction Algorithm

    The authors considered cryptanalysis of a knapsack-type public key cryptosystem. This cryptosystem uses a combination permutation algorithm in the encryption phase to avoid the low density attack by keeping the density high. This cryptosystem is vulnerable to LLL-lattice basis reduction algorithm, since it uses a super-increasing sequence as a private...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Probabilistic Checkpointing Protocol to Sensor Network Fault-Tolerant

    A wireless sensor network WSN is a collection of autonomous sensors nodes organized into a cooperative network. A sensor node transmits the data quantity to the sink. Indeed, a failed sink may abort the overall mission of the network. Due to their crucial functions, sinks must be designed and maintained...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Study of Face Recognition Approach Based on Similarity Measures

    Detecting the similarity of face image aims to determine the image of a face for verification purpose of documents such as passport, driving license, ID cards, etc. Similarity measures are essential to solve many pattern recognition problems such as classification, clustering, and retrieval problems. There are efforts in finding the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Enhancing Packet-Level Forward Error Correction for Streaming Video in Wireless Networks

    Forward Error Correction (FEC) is a common error control technique in which the streaming video is protected by adding redundant data to the encoded bitstream such that the original source information can still be recovered in the event of errors or losses. Based on the information on the video content...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Modelling of VoIP Based Tele-Teaching System: A Petri Net Based Approach

    In this paper, the authors propose an algorithm called interactive group synchronization to reduce the chance of audio speech overlapping in VoIP based conferencing. They also extend the capability of colored petri nets by introducing time parameter in it. The propose TCPN (Time Colored Petri Nets) tool is applied here...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    FIDRS: A Novel Framework for Integrated Distributed Reliable Systems

    In this paper, the authors represent a new framework for integrated distributed and reliable systems. In the proposed framework they have used three parts to increase satisfaction and performance of this framework. At first, they analyze previous frameworks related to integrated systems, then represent new proposed framework in order to...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Design and Implementation of Multitier Authentication Scheme in Cloud

    The purpose of this paper is to present the design of a secure and more advanced authentication scheme for executing secure financial transactions over Internet. There has been continuous change in technology day by day, so security mechanisms like authentication schemes are also required to be updated. The security measures...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    A Novel Technique Based on Node Registration in MANETs

    In ad hoc network communication links between the nodes are wireless and each node acts as a router for the other node and packet is forward from one node to other. This type of networks helps in solving challenges and problems that may arise in every day communication. Mobile Ad...

    Provided By International Journal of Computer Science Issues