International Journal of Computer Science Issues

Displaying 321-360 of 870 results

  • White Papers // Sep 2012

    Prevention of Attacks Under DDoS Using Target Customer Behavior

    The possibility of sharing information through networking has been growing in geometrical progression. In this connection it is to be noted network attacks, in other words, DDoS attacks also are growing in equal proportion. Sharing of information is being carried out by means of server and client. The client requests...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Internet Intrusion Detection System Service in a Cloud

    Intrusion Detection Systems (IDS) have been used widely to detect malicious behaviors in network communication and hosts. It is defined as a computer network system to collect information on a number of key points, and analyze this information to see whether there are violations of network security policy behavior and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Enhanced ATM Security System Using Biometrics

    Because biometrics-based authentication offers several advantages over other authentication methods, there has been a significant surge in the use of biometrics for user authentication in recent years. In this paper the existing security of the ATM (Automated Teller Machine) system has been improved by integrating the fingerprint of the user...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Link Budget Analysis in the Network Designed Mobile WiMAX Technology in the Territory of the Urban Area of the City of Gjakova

    Wireless communication has now entered the second century of its use and has valuable merits of improving the quality of life of all mankind. Technologies for wireless and mobile communications are replaced every 2-3 years. The current version of the protocol provides Internet access up to 40 Mbps and this...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Service Oriented Architecture Role in the Comprehensive Systems Integration

    Today, any organization or economic enterprise, a method for systems integration application uses its collection and therefore can never found a unique method that can meet the needs of system integration is in all organizations. With a proposed solution to the issue of pay. Thus, for application integration systems should...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    A Trust-Based Security Mechanism for Nomadic Users in Pervasive Systems

    The emergence of network technologies and the appearance of new varied applications in terms of services and resources, have created new security problems for which existing solutions and mechanisms are inadequate, especially problems of identification and authentication. In a highly distributed and pervasive system, a uniform and centralized security management...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Remote Computer Access Through Android Mobiles

    In this paper, the authors will present the process to access the computers with the help of android mobile phones. This process is based on VNC (virtual network computing) technique. So to work on this, they must install VNC server on their computer connected with Wi-Fi network. The user can...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    A Rapid and Robust Method for Shot Boundary Detection and Classification in Uncompressed MPEG Video Sequences

    Shot boundary and classification is the first and most important step for further analysis of video content. Shot transitions include abrupt changes and gradual changes. A rapid and robust method for shot boundary detection and classification in MPEG compressed sequences is proposed in this paper. The authors firstly only decode...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Speedy Signature Based Intrusion Detection System Using Finite State Machine and Hashing Techniques

    This paper proposes a secure system designs for client-server based communication systems. In this system, security services are implemented on server, as generally data received on the servers contains malicious contents. The technique that the authors used is to perform speedy intrusive signature matching received inside a network with the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Design and Implementation of an IP-Based Security Surveillance System

    The tremendous loss of lives and properties that may be attributed to criminals in recent times worldwide has become a source of worry to all and sundry. The situation has come to the alarming rate that the authority has sought for the immediate means of checkmating it without delay. Therefore,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Developing Service Oriented Computing Model Based On Context-Aware

    SOA and Cloud computing are making major changes in the way companies build and deploy applications. The challenge is to meet the business expectation of faster delivery of new functionality, while at the same time maintaining control of application performance and availability across a growing network of service providers. SOA...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Feasibility Evaluation of VANET Using Directional-Location Aided Routing (D-LAR) Protocol

    Vehicular Ad hoc NETworks (VANETs) allow vehicles to form a self-organized network without any fixed infrastructure. VANETs have received wide attention and numerous research issues have been identified in the recent time. The design and implementation of efficient and scalable routing protocols for VANETs is a challenging task due to...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Credit Card Fraud Detection Using Decision Tree for Tracing Email and IP

    Credit card fraud is a wide-ranging term for theft and fraud committed using a credit card or any similar payment mechanism as a fraudulent source of funds in a transaction. The purpose may be to obtain goods without paying, or to obtain unauthorized funds from an account. Transactions completed with...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Analysis of AODV Over Increased Density and Mobility in Intelligent Transportation System

    Currently the area of VANET lacks in having some better designed algorithms to handle dynamic change and frequent disruption due to the high mobility of the vehicles. There are many techniques to disseminate messages across moving vehicles but they are all highly dependent on some conditions involving flow, density and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Edge Dominating Capability Based Backbone Construction in Wireless Networks

    Constructing a connected dominating set as the virtual backbone plays an important role in wireless networks. In this paper, the authors propose two novel approximate algorithms for dominating set and connected dominating set in wireless networks, respectively. Both of the algorithms are based on edge dominating capability which is a...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Relational Analysis Based Concurrent Multipath Transfer Over Heterogeneous Vehicular Networks

    In recent years, the growing interest in the Intelligent Transportation Systems (ITS) has resulted in variety of peer-reviewed publications. Significant results in this area have enabled many civilian and industry applications. As more and more vehicles are equipped with multiple network interfaces, how to efficient utilize the coexistence of Radio...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    A Study on Preference of Interface Design Techniques for Web Survey

    According to the advancement in internet and web-based application, the survey via the internet has been increasingly utilized due to its convenience and time saving. This paper studied the influence of five web-design techniques - screen design, response format, logo type, progress indicator, and image display on the interest of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Image Compression Using Harmony Search Algorithm

    Image compression techniques are important and useful in data storage and image transmission through the Internet. These techniques eliminate redundant information in an image which minimizes the physical space requirement of the image. Numerous types of image compression algorithms have been developed but the resulting image is still less than...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Wired and Wireless Parallel Simulation of Fluid Flow Problem on Heterogeneous Network Cluster

    In this paper, homogeneous and heterogeneous networks will be analyzed using parallel processing technique for highly sophisticated research problem. During the analysis sample networks will be considered and QoS parameters will be observed using simulation for end-to-end services. Analysis of the wireless LAN system is carried out and its efficiency...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    An Energy Aware Spatial Correlation Method in Event Driven Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are used to monitor and control the physical environment in different classes of applications. Due to the dense deployment of sensors and as the sensor observations are spatially correlated with respect to location of sensor nodes, it is not necessary for every sensor to transmit its...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Context-Awareness for Service Oriented Systems

    Today, service oriented systems need to be enhanced to sense and react to user's context in order to provide a better user experience. To meet this requirement, Context-Aware Services (CAS) has emerged as an underling design and development paradigm for the development of context-aware systems. The fundamental challenges for such...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Cryptanalysis of a Public-Key Cryptosystem Using Lattice Basis Reduction Algorithm

    The authors considered cryptanalysis of a knapsack-type public key cryptosystem. This cryptosystem uses a combination permutation algorithm in the encryption phase to avoid the low density attack by keeping the density high. This cryptosystem is vulnerable to LLL-lattice basis reduction algorithm, since it uses a super-increasing sequence as a private...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Probabilistic Checkpointing Protocol to Sensor Network Fault-Tolerant

    A wireless sensor network WSN is a collection of autonomous sensors nodes organized into a cooperative network. A sensor node transmits the data quantity to the sink. Indeed, a failed sink may abort the overall mission of the network. Due to their crucial functions, sinks must be designed and maintained...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Study of Face Recognition Approach Based on Similarity Measures

    Detecting the similarity of face image aims to determine the image of a face for verification purpose of documents such as passport, driving license, ID cards, etc. Similarity measures are essential to solve many pattern recognition problems such as classification, clustering, and retrieval problems. There are efforts in finding the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Enhancing Packet-Level Forward Error Correction for Streaming Video in Wireless Networks

    Forward Error Correction (FEC) is a common error control technique in which the streaming video is protected by adding redundant data to the encoded bitstream such that the original source information can still be recovered in the event of errors or losses. Based on the information on the video content...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Modelling of VoIP Based Tele-Teaching System: A Petri Net Based Approach

    In this paper, the authors propose an algorithm called interactive group synchronization to reduce the chance of audio speech overlapping in VoIP based conferencing. They also extend the capability of colored petri nets by introducing time parameter in it. The propose TCPN (Time Colored Petri Nets) tool is applied here...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    FIDRS: A Novel Framework for Integrated Distributed Reliable Systems

    In this paper, the authors represent a new framework for integrated distributed and reliable systems. In the proposed framework they have used three parts to increase satisfaction and performance of this framework. At first, they analyze previous frameworks related to integrated systems, then represent new proposed framework in order to...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Design and Implementation of Multitier Authentication Scheme in Cloud

    The purpose of this paper is to present the design of a secure and more advanced authentication scheme for executing secure financial transactions over Internet. There has been continuous change in technology day by day, so security mechanisms like authentication schemes are also required to be updated. The security measures...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    A Novel Technique Based on Node Registration in MANETs

    In ad hoc network communication links between the nodes are wireless and each node acts as a router for the other node and packet is forward from one node to other. This type of networks helps in solving challenges and problems that may arise in every day communication. Mobile Ad...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    New Capabilities of Visual Cryptography

    Visual Cryptography Schemes (VCS) consider the problem of encrypting and sharing images (printed text, hand written notes, pictures, etc.) in a perfectly secure way which can be decrypted directly by the human visual system. A k out of n VCS for is a technique by which a Secret Image (SI)...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Snapshot Based Virtualization Mechanism for Cloud Computing

    Virtualization in cloud computing has been the latest evolutionary technology in current applications of various industries and IT firms are adopting cloud technology. The concept of cloud computing was introduced long back. Since its inception there have been many number of new innovations implemented by different experts and researchers etc....

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    On Web Services Based Cloud Interoperability

    Cloud Computing is a paradigm shift in the field of Computing. It is moving at an incredible fast pace and one of the fastest evolving domains of computer science today. It consist set of technology and service models that concentrates on the internet base use and delivery of IT applications,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    A CDMA Based Scalable Hierarchical Architecture for Network-On-Chip

    A Scalable hierarchical architecture based Code-Division Multiple Access (CDMA) is proposed for high performance Network-on-Chip (NoC). This hierarchical architecture provides the integration of a large number of IPs in a single on-chip system. The network encoding and decoding schemes for CDMA transmission are provided. The proposed CDMA NoC architecture is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    A Stable Distributed Clustering Algorithm for Mobile Adhoc Networks

    Mobile Ad hoc NETworks (MANET) are distributed systems which consist of several mobile nodes; they do not include predetermined topology and have no concentrated control. The nodes connect wirelessly by the approach in which they decide themselves. To access the development in the MANET, an approach should be found such...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Towards Identification and Recognition of Trace Associations in Software Requirements Traceability

    In the field of software engineering, requirements traceability is becoming a dynamic area of research. Producing numerous artifacts is crucial activity to maintain and yield high quality software. These artifacts are created and generated throughout the lifetime of software development, and are highly interrelated where the impact of any change...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    A Comparison of Various Edge Detection Techniques Used in Image Processing

    In this paper the important problem is to understand the fundamental concepts of various filters and apply these filters in identifying a shark fish type which is taken as a case study. In this paper the edge detection techniques are taken for consideration. The software is implemented using MATLAB. The...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Real-Time Covert Communications Channel for Audio Signals

    Covert communications channel is considered as a type of secure communications that creates capability to transfer information between entities while hiding the contents of the channel. Multimedia data hiding techniques can be used to establish a covert channel for secret communications within a media carrier. In this paper, a high-rate...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Software Defect Prediction Models for Quality Improvement: A Literature Study

    In spite of meticulous planning, well documentation and proper process control during software development, occurrences of certain defects are inevitable. These software defects may lead to degradation of the quality which might be the underlying cause of failure. In today's cutting edge competition it's necessary to make conscious efforts to...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Evaluating on Performance of Single-Source Single-Relay SR-CARQ Protocol in TDMA Networks With Raleigh Fading

    This paper analyzes the performance of single-source and single-relay SR-CARQ protocol in TDMA wireless communication system. The authors establish its M/G/1 queuing model with vacations, and provide the expressions of its system time delay and saturation throughput. Then the analysis of theory and simulation results under the slow Raleigh fading...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    An Efficient Collision Detection Scheme for Generation-2 RFID Systems

    In Radio-Frequency IDentification (RFID) systems, tag collision resolution is a significant issue for fast tag identification. Dynamic Framed Slotted ALOHA (DFSA) is one of the most widely used algorithms to resolve tag collision. Collision Detection (CD) plays an important role in determining the efficiency of DFSA-based algorithms because most DFSA-based...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    QoS-Aware SINR-Based Call Blocking Evaluation in Cellular Networks With 3G Interface

    A Quality of Service (QoS)-aware Signal to Interference and Noise Ratio (SINR)-based blocking probability model is simulated in this paper to evaluate the performance of networks with Third Generation (3G) interface. But this in turn yields an increased blocking probability and reduces the spectral efficiency. In this paper, the authors...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Qos-Based Rate Allocation in Wireless Mesh Networks

    In this paper, the authors present a centralized algorithm for QoS based rate allocation in wireless mesh networks. The main objective is to find approach that also satisfy user-specified QoS constraints, specifically with respect to rate and delay demands. Their approach provides higher priority to real-time flows than elastic flows...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Mobile Node for Wireless Sensor Network to Detect Landmines

    Individual sensor nodes are low power devices which integrate computing, wireless communication and sensing capabilities to detect land mine. Such multiple nodes collectively form wireless sensor network. To detect landmine in ground surface, sensor node that able to sense the mine and to process the information locally are mounted on...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Cryptographic Hash Functions: A Review

    Cryptographic Hash functions are used to achieve a number of security objectives. In this paper, the authors bring out the importance of hash functions, its various structures, design techniques, attacks and the progressive recent development in this field. Cryptographic techniques mainly encryption & decryptions have been used for centuries to...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Fuzzy Integrity Constraints for Native XML Database

    XML is gradually accepted as a standard for representing, accessing, and exchanging data in internet applications. It poses many new challenges to XML storage or XML repositories. The data centric approach of XML has necessitated the definition of integrity constraints for XML. Integrity constraints have proved fundamentally important in Relational...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Application Independent Energy Efficient Data Aggregation in Wireless Sensor Networks

    Wireless Sensor networks are dense networks of small, low-cost sensors, which collect and disseminate environmental data and thus facilitate monitoring and controlling of physical environment from remote locations with better accuracy. The major challenge is to achieve energy efficiency during the communication among the nodes. This paper aims at proposing...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Architecture of Wireless Network

    To allow for wireless communications among a specific geographic area, base stations of communication network must be deployed to allow sufficient radio coverage to every mobile users. The base stations, successively, must be linked to a central hub called the MSC (Mobile Switching Centre). The mobile switching centre allow connectivity...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Hybrid Routing Protocol for Wireless Sensor Networks

    Increasing network (WSN) lifetime is a challenge in routing protocol design for ad hoc network, especially in such a network each node (sensor) is powered by batteries, characterized ability calculation and limited storage. Hierarchical routing protocols are best known in regard to energy efficiency. By using a clustering technique hierarchical...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    A Novel Architecture for Collaborative Environments

    A novel architecture, called Cognitive Social Knowledge Grid, is introduced as a solution for collaborative environments. The CSKG performs information and knowledge operations through collaboration of agents and services in a service-oriented context. Its services and mechanisms have been described and relationship models of its components and services have been...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Intrusion Detection System Using Memtic Algorithm Supporting With Genetic and Decision Tree Algorithms

    This paper has proposed a technique of combining Decision Tree, Genetic Algorithm, DT-GA and Memtic algorithm to find more accurate models for fitting the behavior of network intrusion detection system. The authors simulate this sort of integrated algorithm and the results obtained with encouragement to further work. Computer networks are...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Low-Power and High Speed 128-Point Pipline FFT/IFFT Processor for OFDM Applications

    This paper represents low power and high speed 128-point pipelined Fast Fourier Transform (FFT) and its Inverse Fast Fourier Transform (IFFT) processor for OFDM. The Modified architecture also provides concept of ROM module and variable length support from 128~2048 point for FFT/IFFT for OFDM applications such as Digital Audio Broadcasting...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Network Anomalies Detection Using Statistical Technique : A Chi-Square Approach

    Intrusion Detection System is used to detect suspicious activities is one form of defense. However, the sheer size of the network logs makes human log analysis intractable. Furthermore, traditional intrusion detection methods based on pattern matching techniques cannot cope with the need for faster speed to manually update those patterns....

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    A Systematic Study of Requirement Volatility During Software Development Process

    The amount and complexity of software produced today stagger the imagination. Software development strategies have not kept pace with them. Today's software and system's engineers are facing an increasing number of challenges as they attempt to develop new products that are faster, having high quality and are rich in features....

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Evaluation of Joint Sleep and Idle Mode in IEEE 802.16e WIMAX

    As energy availability limits usage time for mobile devices, modern wireless systems implement Power Saving Mechanisms (PSMs). Determining optimal PSM parameters and switch points when applying all PSM mechanisms jointly in the same scenario is a trade-off between power savings and system performance degradation. This paper presents an unpublished performance...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Fuzzy Algorithm to Mitigate Risk in the Assignment of Roles in a Wireless Network

    This paper is presenting a method of defining a fuzzy membership function which helps in role assignment for wireless network. There is a risk involved in assigning roles dynamically as there can be a false negative or in other words an intruder is permitted into the system. The present proposal...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Performance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols

    Mobile Ad hoc NETwork (MANET) is an organization of static and wireless mobile nodes having no any central administration and fixed infrastructure. In MANET, each node can acts as routing and hosting device. Performance comparison and analysis has been conducted by using four different scenarios in NS2 (Network Simulator) for...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Authentication Algorithm for Intrusion Detection in Wireless Networks

    Security has been a major issue in wireless networks. In a wireless network, wireless devices are prone to be unauthorized accessing data or resources. Hence, it becomes necessary to consider issues of security such as: authentication and access Control. Traditional methods of Authentication has been to assign user names and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    A Reliable Multicast Routing Approach for VANET

    Safety applications of inter-vehicle and vehicle-to-roadside communication that make use of Vehicular Ad hoc NETworks (VANETs) will often require reliable communication that provides guaranteed real-time message propagation. An important aspect of network dynamics is failure handling, as link/node failure due to high mobility of nodes introduces service disruption in wireless...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    A Comprehensive Analysis of Wireless Mobile Based Tele-Monitoring System for Myocardial Malfunctioning

    The cardiac arrest is one of the leading causes for sudden death. The chance of occurrence of severe myocardial problem increases after the first attack. Detecting the one set of malfunctioning is ever challenging. The authors' paper intends to benefit those at high risk of myocardial can be detected early...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Modelling Virus Propagation in P2P Networks

    Peer-To-Peer (P2P) networking is currently an emerging technology that has gained dramatic increase in popularity both for network traffic and in the research domain. The growing popularity and use of P2P networks means that P2P has also attracted the attention of virus creators. A number of viruses have recently appeared...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    IPv6 Tunneling Over IPV4

    Due to the huge growth of the internet users, mobile users using internet connection makes development and implementation of IPv6 as an alternate solution. IPv6 is a long anticipated upgrade to the internet's main communication protocol, which is called IPv4. The current address space provided by IPv4, with only4, 294,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Testing Websites by P3R2 Model

    Cyber espionage at the government, corporate and individual levels has increased dramatically over the last few years. The cyberspace has become the latest domain of Chinese belligerence. There is a crying need for a cohesive global arrangement to address the emerging issues of Cyberspace. Apart from trying to cull out...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Using Aspect Oriented Techniques to Build-in Software Quality

    Today's software systems are growing rapidly in number, size, complexity, amount of distribution and number of users with the evolving technologies being geared towards improving their quality. Aspect oriented software development is a new paradigm that claims to improve the quality of software using separation of concerns. In this paper,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Multi Feature Content Based Video Retrieval Using High Level Semantic Concept

    Content-based retrieval allows finding information by searching its content rather than its attributes. The challenge facing Content-Based Video Retrieval (CBVR) is to design systems that can accurately and automatically process large amounts of heterogeneous videos. Moreover, content-based video retrieval system requires in its first stage to segment the video stream...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Multiprocessor Scheduling Using Parallel Genetic Algorithm

    Tasks scheduling is the most challenging problem in the parallel computing. Hence, the inappropriate scheduling will reduce or even abort the utilization of the true potential of the parallelization. Genetic Algorithm (GA) has been successfully applied to solve the scheduling problem. The fitness evaluation is the most time consuming GA...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Cellphone as a Traffic Guidance System

    The worldwide proliferation of cellphones has created numerous opportunities for new and powerful applications that contribute towards improving the quality of life. Traffic problems due to traffic congestions, especially in cities with high population density, is one of the areas that need attention. GPS-enabled cellphones can contribute towards alleviating some...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Clouds for Different Services

    The Cloud has become a new vehicle for delivering resources such as computing and storage to customers on demand. Rather than being a new technology in itself, the cloud is a new business model wrapped around new technologies such as server visualization that take advantage of economies of scale and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    A Hybrid Approach of Using Anycast Addressing With Zone Routing Protocol

    Zone Routing Protocol (ZRP) is a hybrid protocol that combines the advantages of both the proactive and reactive protocols. It is classified as: Intra Zone Routing, which uses hop count of the N-neighbors using proactive techniques and Inter Zone Routing, which includes the rest of the network excluding the N-neighbors...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    A Novel Protocol for IP Traceback to Detect DDoS Attack

    Distributed Denial of Service (DDoS) attacks continue to pose higher threats to the internet. There are so many protocols designed to trace the attacker's address. The authors want to trace back attack source (i.e., "IP addresses"), they need to examine the tradeoff between different existing IP Trace back techniques. They...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Internet Connectivity Using Vehicular Ad-Hoc Networks

    Although a Mobile Ad-hoc NETwork (MANET) can be used in many cases but the most preferable is a MANET connected to the internet. This is achieved by using gateways which act as bridges between a MANET and the internet. To communicate in-between, a mobile node needs to find a valid...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Personalization in Geographic Information Systems: A Survey

    Geographic Information Systems (GIS) are widely used in different domains of applications, such as maritime navigation, museums visits and route planning, as well as ecological, demographical and economical applications. Nowadays, organizations need sophisticated and adapted GIS-based Decision Support System (DSS) to get quick access to relevant information and to analyze...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Destination Based Group Gray Hole Attack Detection in MANET Through AODV

    MANET is easily vulnerable because of dynamic topology, infrastructure less nature and also due to lack of centralized administration. One of the most common attack on such networks is gray hole attack which drop some selective data. It is challenge to keep the network free form this attack. This paper...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Network Based Anti-Virus Technology for Real-Time Scanning

    Negative aspects of networking lately became one of the most crucial problems in the information world. Protection against malware and malicious code must balance between being capable of fast detection of malware and being light on resources. Since modern antivirus systems are not optimized in the terms of speed, this...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Ranking Search Engine Result Pages Based on Trustworthiness of Websites

    The World Wide Web (WWW) is the repository of large number of web pages which can be accessed via Internet by multiple users at the same time and therefore it is Ubiquitous in nature. The search engine is a key application used to search the web pages from this huge...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Fuzzy Maintainability Model for Object Oriented Software System

    In recent years for achieving considerable success in software system, maintainability plays a very crucial role and it is considered as an important quality characteristics. In this paper a maintainability model has been proposed to compare maintainability of object-oriented software system. Attempts have been made on software developed in different...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Model Based Neuro-Fuzzy ASR on Texas Processor

    In this paper an algorithm for recognizing speech has been proposed. The recognized speech is used to execute related commands which use the MFCC and two kinds of classifiers, first one uses MLP and second one uses fuzzy inference system as a classifier. The experimental results demonstrate the high gain...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    MISR: Multiple Inheritor Selection for Recovery of Nodes in Faulty Cluster in Wireless Sensor Networks

    A wireless sensor network composed of many sensor nodes which are used to monitor unavailable and harsh environments. Because these nodes are too small and battery operated which have limited energy, faults may occur. Fault tolerance is one of the most important issues in wireless sensor networks and must be...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Performance Comparison of SCTP and UDP Over Mobile Ad Hoc Networks

    Countless researchers have put efforts to conduct researches about the performance of the traditional Transport Control Protocols (TCP) and User Datagram Protocol (UDP). Recently new transport protocol had been designed called Stream Control Transmission Protocol (SCTP). In this paper, the authors will focus to study the effect of Mobile Ad...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Applying Data Mining Technique for the Optimal Usage of Neonatal Incubator

    This research aims to provide intelligent tool to predict incubator Length Of Stay (LOS) of infants which shall increase the utilization and management of infant incubators. The data sets of EGyptian Neonatal Network (EGNN) were employed and Oracle Data Miner (ODM) tool was used for the analysis and prediction of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Collaboration Schemes Evaluation in Multi-Domain Networks

    The monitoring of the quality of service in a multi-domain network supervises the multi-domain service performance. A multi-domain service is a service that crosses several domains which can be managed by different providers. Since, each domain can be managed with its own policies and may require confidential it of its...

    Provided By International Journal of Computer Science Issues