International Journal of Computer Science Issues

Displaying 321-360 of 968 results

  • White Papers // Jan 2013

    A Comparative Approach for Localization Techniques in Wireless Sensor Networks

    A Wireless Sensor Network is a collection of many tiny sensing and wireless communication device called sensor nodes. Each node consists of a processor, a battery and a transceiver for communication. Nodes are connected to each other via transceiver. Localization of sensor nodes in wireless sensor nodes plays an important...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    The Study on the Spam Filtering Technology Based on Bayesian Algorithm

    In this paper, the authors analyzed spam filtering technology, carried out a detailed study of Naive Bayes algorithm, and proposed the improved Naive Bayesian mail filtering technology. Improvement can be seen in text selection as well as feature extraction. The general Bayesian text classification algorithm mostly takes information gain and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Trust Based Infererence Violation Detection Scheme Using Acut Model

    The inference problem is the major problem in securing the sensitive data in the secured database. In the inference problem the user tries to access the sensitive data from the secured database by giving series of queries with the non-sensitive fields. Inference problems affect the securities in the database and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Embedded Wireless Fingerprint Exam Affair Management

    In this paper, the authors study the design method of fingerprint identification module based on embedded system, which can realize the design of wireless fingerprint examination management system. This method reduces the hardware cost by building hardware environment whose platform is ARM9 microprocessor and MBF200 fingerprint sensor-integrated module. And, under...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    The Evidential Reasoning Approach for Multiple Decision Analysis Using Normal Cloud Model

    In this paper, normal cloud model and Evidential Reasoning (E-R) approach is used in Multiple Attribute Decision Analysis (MADA) problems. Different attributes Belief function are represented by cloud model interval. Using cloud model generating algorithm, belief degree interval is obtained without numerical computation. In addition, it is reasonable and it...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Performance Optimization through Channel Profiling in Cognitive Sensor Networks

    Cognitive Radio (CR) is an important future wireless radio access technology having the potential to solve the spectrum scarcity and under-utilization problems. Using CR however, poses new challenges for network nodes and architectures due to the inherent complexity of cognitive radio technology. In this paper, the authors propose a unique...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Mobile Application of Water Meter Recorder Based on Short Message Service Transmissions Using Windows Mobile Platform

    The rapid development of technology nowadays has major impact to the development of cellular technology. This development led to a new wide range of Smartphone. The growth of life now-a-days requires people to work more quickly, so that they can use the time more effective and increase the performance. The...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Splitting of Traffic to Maximize the Data Transmission in Mobile Ad Hoc Network Under Different Constraints

    Mobile Ad-hoc NETwork (MANET) is a set of wireless mobile computer forming a temporary network without any wired infrastructure, due to dynamic nature of topology and other constraints transmission routing is a challenging task in MANET. The splittable routing establishes multi paths between source nodes and destination nodes; this scheme...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Smart Dynamic Software Components Enabling Decision Support in Machine-to-Machine Networks

    The future Internet of Things will be extended by Machine-to-Machine communication technologies in order to include sensor information. The overwhelming amount of data will require autonomous decision making processes which are directly executed at the location where data is generated or measured. An intelligent sensor system needs to be able...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Research on the Model of Secure Transmission of SOAP Messages

    SOAP as the basis application of Web Services, and, SOAP messages are closely related to the heterogeneous Web services. Secure transmission of SOAP messages play a vital role for the applicability of Web Services. The main challenges to the secure transmission of SOAP messages includes: confidentiality, authentication, integrity, both-party non-repudiation,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    WiMAX Based Audio/Video Transmission

    In this paper, the authors present the idea of a WiMAX based audio/video transmission. The data transmitter will transmit an audio/video signal, which will be received by the receiver side. The hardware of the data transmitter consists of a CCD camera and audio mic. The CCD camera will capture the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    RFID Technology Based Attendance Management System

    RFID is a nascent technology, deeply rooted by its early developments in using radar as a harbinger of adversary planes during World War II. A plethora of industries have leveraged the benefits of RFID technology for enhancements in sectors like military, sports, security, airline, animal farms, healthcare and other areas....

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    The Design of Statistic System in the Country Enterprise Based on SAS and GIS

    Statistics plays an important role in social and economic development. Traditional data collection is too laborious, time-consuming and ineffective. Its statistic is not correct and can't share the data. Aiming at the requirement for regional economy statistics of Pan Zhihua, this paper designed an analytical system based on regional economy...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Telco Business Process Transformation Using Agile Lean Six Sigma and Frameworx Components: Focus on the Core Engineering Aspects with a Case Study

    The business transformation, a worldwide trend in many industries, is to improve the business performance in order to remain competitive in a challenging market. To accompany Telco industry in this trend, TM Forum issued Frameworx which addresses the key business aspects namely process, information, application and integration ones. The purpose...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Using a KMERP Framework to Enhance Enterprise Resource Planning (ERP) Implementation

    Enterprise Resource planning (ERP) systems mainly aims to develop information sharing between different sections within the organization, and consider as a way of continuous improvement. Implementation and use of ERP systems require a tremendous amount of knowledge and experience. There are many failure reasons in the implementation of ERP systems...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Towards an Intelligent Project Based Organization Business Model

    Global economy is undergoing a recession phase that had made competition tougher and imposed new business framework. Businesses have to shift from the classical management approaches to an Intelligent Project Based Organization Model (IPBOM) that provides flexibility and agility. IPBOM is intended to reinforce the proven advantages of Project Based...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Exploration on Big Data Oriented Data Analyzing and Processing Technology

    At present, enterprises have urgent needs to conduct an effective and stable statistical analysis on big data. With a view to solving the issue of analysis and processing of big data in respect of enterprise business, this essay proposes a hybrid structure mode based on the MapReduce technology and the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Application of SVM Optimization Based on GA in Electronic Sphygmomanometer Data Fusion

    If the proper kernel function parameter is chosen, using of the multi-sensor data fusion method based on SVM, the influence of cross sensitive disturbance variables including the temperatureT and the power supply current I, can be significantly suppressed and the stability of the pressure sensor can be improved in the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Personality Types Classification for Indonesian Text in Partners Searching Website Using Na

    The development of digital text information has been growing fast, but most of digital text is in unstructured form. Text mining analysis is needed in dealing with such unstructured text. One of the activities important in text mining is text classification or categorization. Text categorization itself currently has a variety...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    A Novel Malicious Web Crawler Detector: Performance and Evaluation

    Internet demands a robust and resilient protected communication and computing environment to enable information flows flawlessly with no down time. However, the Internet is exposed to the general public which will lead to loss of sensitive information as well as copyright protected content. To address this issue, in this paper,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    An Advanced Survey on Secure Energy-Efficient Hierarchical Routing Protocols in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are often deployed in hostile environments, which make such networks highly vulnerable and increase the risk of attacks against this type of network. WSN comprise of large number of sensor nodes with different hardware abilities and functions. Due to the limited memory resources and energy constraints,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    A Comprehensive Review for Central Processing Unit Scheduling Algorithm

    The Central Processing Unit (CPU) is a component of a computer system that carries out the instructions of a computer program and is the primary element carrying out the computer's functions. This paper describe how does CPU facilitates tasks given by a user through a scheduling algorithm. CPU carries out...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    The Study on the Application of Business Intelligence in Manufacturing: A Review

    A manufacturing based organization operates in an environment where a fast and effective decision is needed. This is to ensure that the output is met with customer compliance. There exists manufacturing systems that collect the operational data and the data turns out to be in a high volume due to...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Knowledge Management System as Enabler for Knowledge Management Practices in Virtual Communities

    Knowledge Management System (KMS) was recognized as one of the key enablers in a knowledge management initiative. This is because KMS have been proving bringing value for Knowledge Management (KM) initiatives such as eliminate distance and time barriers. Furthermore KMS also made KM more effective for the organization. As general...

    Provided By International Journal of Computer Science Issues

  • White Papers // Dec 2012

    Sales Forecasting Based on ERP System Through Delphi, Fuzzy Clustering and Back-Propagation Neural Networks with Adaptive Learning Rate

    Recent years, there has been a strong tendency by companies to use centralized management systems like Enterprise Resource Planning (ERP). ERP systems offer a comprehensive and simplified process managements and extensive functional coverage. Sales management module is an important element business management of ERP. This paper describes an intelligent hybrid...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Using Modified Partitioning Around Medoids Clustering Technique in Mobile Network Planning

    Optimization mobile radio network planning is a very complex task, as many aspects must be taken into account. Deciding upon the optimum placement for the Base Stations (BS's) to achieve best services while reducing the cost is a complex task requiring vast computational resource. This paper introduces the spatial clustering...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Energy Efficient Routing in Mobile Adhoc Networks based on AODV Protocol

    Mobile Ad hoc NETworks (MANETs) suffer from power exhaustion as many nodes use batteries as their source. Energy consumption is one of the most important system design optimization criterion in MANETs. The conventional routing protocols do not consider energy of nodes while selecting routes. So, using the same route for...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    MuMoCo : a Framework for Improving Data Quality with Multiple Modalities Cooperation in Wireless Sensor Networks

    High quality sensor data stream is crucial to wireless sensor networks applications. However raw data streams in wireless sensor networks tend to be not reliable. Therefore, improving sensor data quality is an important issue for all kinds of wireless sensor networks applications. In this paper, the authors proposed an integrated...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    A Review on Node Deployment of Wireless Sensor Network

    Wireless Sensor Network (WSN) is nowadays being applied in many different civilian applications like vehicle tracking, habitat monitoring, forest surveillance, earthquake observation, biomedical or health care applications and building surveillance. To a large extent the effectiveness of the wireless sensor networks depends on the coverage provided by the sensor deployment...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Prediction based Link Stability Scheme for Mobile Ad Hoc Networks

    Mobile Ad Hoc NETworks (MANETs) consist of mobile nodes which are not controlled by any base station. Mobile nodes act as a major role because of performing the data transmission, route discovery, route maintenance. The packet loss occurs often while the nodes are moving out of range, or the node...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Precedence Based Preemption and Bandwidth Reservation Scheme in MANET

    Infrastructures less mobile networks are commonly known as Mobile Ad Hoc NETworks (MANET). Quality of Service (QOS) constraints is highly required for multimedia communications with MANET. Providing QOS in MANET is not easy task due to its broadcast and dynamic nature. There are some number of protocols exist which takes...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    On Reliability Modeling in Wireless Sensor Networks-A Review

    This paper presents a survey on existing reliability models in Wireless Sensor Networks (WSNs). Most of the existing mechanisms employ retransmissions, ignoring redundancy schemes and moreover no attempt has been made for biologically inspired WSNs. This paper proposes a biologically inspired wireless sensor network model where sensor nodes are intelligent...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Performance and Comparison of Multi-Hop Ad-Hoc Routing Protocols ? Quantitative Study

    Wireless Ad-hoc network is emerging network and form temporary networks. Due to its spontaneous nature the topology is frequently changes. Protocols selection and set up routing between any pair of nodes are the primary goal design for any wireless network. Several protocols are proposed in Mobile Ad hoc NETwork (MANET)...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    A Novel Problem-solvingMetric for Future Internet Routing Based on Virtualization and Cloud-computing

    The Internet has evolved from an academic network to a broad commercial platform and become an integral and indispensable part of their daily life, economic operation, and society over forty years. However, many technical and non-technical challenges have emerged during this process. In order to address these challenges, the authors...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Study and Optimization of Cooperative Spectrum Sensing in OFDM Cognitive Radio Networks

    In this paper, a cooperative sensing algorithm for OFDM is proposed in this paper based on the performance analysis of ONPD algorithm, then the system weight vector is optimized and the closed form expression of optimal weight vector is obtained using the maximum improved deflection coefficient. Theoretical analysis and simulation...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Towards a Next Generation of Scientific Computing in the Cloud

    More than ever, designing new types of highly scalable data intensive computing is needed to qualify the new generation of scientific computing and analytics effectively perform complex tasks on massive amounts of data such as clustering, matrix computation, data mining, information extraction, etc. Map-Reduce, put forward by Google, is a...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Performance of Network Coding Based Multipath Routing in Wireless Sensor Networks

    In recent times, there have been many advances in the field of information theory and Wireless Sensor Network (WSN) technologies. Network coding is a new paradigm in data transport and promises to change many aspects of WSN. In this paper, the authors introduce an analytical framework to study the performance...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    The Research on an Algorithm of Three-Dimensional Topology Control of Wireless Sensor Network

    Nowadays, the research about three-dimensional topology control has focused on ensuring the connectivity of the networks, and has seldom considered the balance between neighbor node degree and energy consumption minimum path. In order to solve this problem, this paper proposes an adjustable topology control algorithm in three-dimensional wireless sensor networks,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Middleware approaches for Wireless Sensor Networks: An overview

    Wireless Sensor Networks (WSN) has become highly attractive to researchers and industries due to its wide range of applications. Middleware is a distributed software that tries to provide a common platform for hiding the heterogeneity of the system, enabling multiple applications to work on a distributed network. This survey paper...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Performance Analysis of VoIP Codecs over WiMAX Networks

    Real-time services such as VoIP are becoming popular and are major revenue earners for network service providers. These services no longer confined to the wired domain and extended over wireless networks. Although some of the existing wireless technologies can support some low-band width applications, the bandwidth demands of many multimedia...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Detection of False Alarm in Handling of Selfish Nodes in MANET With Congestion Control

    In a mobile ad hoc network, the mobile nodes will have the characteristics of mobility and constraints in resources. Since, the mobility is high, the nodes may move randomly and fastly, which lead to network partitioning. The resource constraints lead to a big problem as decrease in performance and the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    An Autonomic Intrusion Detection Model With Multi-Attribute Auction Mechanism

    In this paper, the authors present an innovative intrusion detection model based on autonomic computing to extend the passive detection mechanism in a traditional Intrusion Detection System (IDS). Centered on an autonomic manager, this model introduces a multi-attribute auction mechanism in the agent coordination layer to perceive environmental changes, manage...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Framework Design of Secure Cloud Transmission Protocol

    Cloud computing technologies are in high demand because of several benefits. Many business organizations are looking into cloud computing services to reduce the cost and complexity of their business infrastructure and its preservation. However, there are certain security issues in cloud computing technologies. To overcome those security issues, the authors...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2013

    Energy-Aware Scheme Used in Multi-level Heterogeneous Wireless Sensor Networks

    The Wireless Sensor Networks (WSNs) is a power constrained system, since nodes run on limited power batteries which shorten its lifespan. The main challenge facing in the design and conception of Wireless Sensor Networks (WSNs) is to find the best way to extend their life span. The clustering algorithm is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Secure Routing in Wireless Sensor Networks

    Wireless sensor networks is the new concept in the field of networks consists of small, large number of sensing nodes which is having the sensing, computational and transmission power. Due to lack of tamper-resistant infrastructure and the insecure nature of wireless communication channels, these networks are vulnerable to internal and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Improving Internet Quality of Service through Active Queue Management in Routers

    The traffic characteristics of real-time and non real-time applications require a certain Quality of Service (QoS) from the Internet in terms of bandwidth, delay, packet loss, fairness and jitter. However, most of the current Active Queue Management (AQM) algorithms at the Internet routers do not guarantee QoS for real time...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Fault Tolerance-Challenges, Techniques and Implementation in Cloud Computing

    Fault tolerance is a major concern to guarantee availability and reliability of critical services as well as application execution. In order to minimize failure impact on the system and application execution, failures should be anticipated and pro-actively handled. Fault tolerance techniques are used to predict these failures and take an...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    IPTV-Internet Protocol Televisions Key Broadcast Building Blocks

    Telcos, in pursuit of the triple play (voice, video, and data), are investing heavily to compete with the cable companies in providing quality video content to the consumer. However, most telco infrastructures do not currently have the bandwidth to support high-quality video distribution. The telcos are updating their Internet Protocol...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    A New Approach to the Data Aggregation in Wireless Sensor Network

    Several algorithms have been developed for problems of data aggregation in wireless sensor networks, all of which tried to increase networks lifetime. In this paper, the authors deal with this problem using a more efficient method, and offer a heuristic algorithm based on distributed learning automata to solve data aggregation...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Conceptualizing of Social Networking Sites

    People often move to their friends, families and colleagues when they feel urge and having doubts or queries to solve. Participation in social networking site has dramatically increased in recent years. Many social networking sites boost with millions of members using their network on regular basis to communicate, share, create...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Improve Downlink Burst Allocation to Achieve High Frame Utilization of Mobile WiMAX (802.16e)

    The burst allocation algorithm is responsible about calculating the appropriate dimensions and location of each user's data to construct the bursts in the downlink subframe in term of the number of slots for each user. Burst allocation is one of the performance parameter which influences the mobile WiMAX systems, due...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Service Priority based Reliable Routing Path Select Method in Smart Grid Communication Network

    The new challenges and schemes for the Smart Grid require high reliable transmission technologies to support various types of electrical services and applications. This paper concentrates the degree of importance of services and tries to allocate more important service to more reliable network routing path to deliver the key instructions...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Novel Fast Encryption Algorithms for Multimedia Transmission over Mobile WiMax Networks

    Security support is mandatory for any communication networks. For wireless systems, security support is even more important to protect the users as well as the network. Since wireless medium is available to all, the attackers can easily access the network and the network becomes more vulnerable for the user and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    A Framework for Optimizing IP over Ethernet Naming System

    Due to the rapid expansion of the technology field. Developing the Internet has become more urgent to meet the needs of the expansion. TCP/IP is the most protocol used in the Internet. It consists from layers, each layer done its job separately. However these layers susceptible to different attacks and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Enhanced Fractional Frequency Reuse (EFFR) Technique in WiMAX Cellular Network

    WiMAX is a broad band high speed wireless communication system which use cellular network topology to deploy services to different subscribers. One of the major problems of deploying WiMAX base stations is the signal interference caused by neighboring cells which causes redaction in cell coverage area and capacity. The standard...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    An Efficient Encryption Algorithm for P2P Networks Robust Against Man-in-the-Middle Adversary

    Peer-to-Peer (P2P) networks have become popular as a new paradigm for information exchange and are being used in many applications such as file sharing, distributed computing, video conference, VoIP, radio and TV broadcasting. This popularity comes with security implications and vulnerabilities that need to be addressed. Especially duo to direct...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    QoS based Analysis of Proxied Adaptive Gateway Discovery Scheme for Mobile Ad hoc Networks

    One of the most important aspects a effecting the overall QoS performance of hybrid mobile ad hoc networks is the efficient discovery of Internet gateways. So many previous papers addressed the problem of interconnecting Mobile Ad Hoc Networks (MANET) to the Internet, via one or more attachment points called gateways....

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    Power Optimization Techniques in Wireless Sensor Network by using Packet Profile based Scheme

    A Network of complex sensor nodes equipped with limited sensing, computing, and radio communication capabilities is called a Wireless Sensor Network (WSN). The sensed data must be gathered and transmitted to a base station where it is further processed for end-user queries. Since the network consists of low-cost nodes with...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    Mobile Devices on IP Internetworks

    Due to advances in miniaturization, Mobile computing has greatly increased in popularity over the past years. Today the users can get in a notebook PC or even a hand-held computer the power that once required a massive machine. Wireless LAN technologies help a device to easily move from one place...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    Cache Replacement Policies for Cooperative Caching in Mobile Ad hoc Networks

    Cooperative caching is a technique used in mobile Ad hoc networks to improve the efficiency of information access by reducing the access latency and bandwidth usage. Cache replacement policy plays a significant role in response time reduction by selecting suitable subset of items for eviction from the cache. In this...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    Implementation of Energy Balancing in Wireless Sensor Networks

    In Wireless Sensor Networks (WSN), energy is a very precious resource for sensor nodes and communication overhead is to be minimized. So energy is an extremely critical resource for this type of battery-powered based Wireless Sensor Networks (WSN), and thus making energy-efficient smart protocol design is a key challenging problem....

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    An Approach for Data Storage Security in Cloud Computing

    Cloud computing is now days emerging field because of its performance, high availability, low cost. In the cloud many services are provided to the client by cloud. Data store is main future that cloud service provides to the companies to store huge amount of storage capacity. But still many companies...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Multiband F-PIFA Fractal Antennas for the Mobile Communication Systems

    The fractals antennas are composed of repeated geometrical forms. Each form has single attributes. The Fractal Planar Inverted F (F-PIFA) antenna, based on Koch Island form geometries, is proposed to facilitate multi-bands applications. The design is carried out by two software: CST Microwave Studio and HFSS. The obtained results for...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    An Optical / Wireless Integrated Approach to provide Multiple Gateways in Wireless Mesh Networks

    Wireless mesh network is an application technology different from the traditional peer-to-peer wireless bridge; it provides the multi-hop and multi-path connection to form a wireless environment of MESH framework so that the occurrence of single point failure can be prevented. WMNs are to provide high bandwidth broadband service to a...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Demand Based Effective Energy Utilization in Mobile Ad Hoc Networks

    Mobile Ad Hoc NETworks (MANET) is the collection of mobile nodes without any centralized infrastructure. The underlying assumption is that the intermediate nodes cooperate in forwarding packets. Mobile nodes collect the route information through overhearing and stores these information in route caches with the use of Dynamic Source Routing (DSR)...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Qos Based Rate Allocation in Wireless Mesh Networks

    In this paper, the authors present a centralized algorithm for QoS based rate allocation in wireless mesh networks. The main objective is to find approach that also satisfy user-specified QoS constraints, specifically with respect to rate and delay demands. Their approach provides higher priority to real-time flows than elastic flows...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Using Modified Partitioning Around Medoids Clustering Technique in Mobile Network Planning

    Optimization mobile radio network planning is a very complex task, as many aspects must be taken into account. Deciding upon the optimum placement for the Base Stations (BS's) to achieve best services while reducing the cost is a complex task requiring vast computational resource. This paper introduces the spatial clustering...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Energy Efficient Routing in Mobile Adhoc Networks based on AODV Protocol

    Mobile Ad hoc NETworks (MANETs) suffer from power exhaustion as many nodes use batteries as their source. Energy consumption is one of the most important system design optimization criterion in MANETs. The conventional routing protocols do not consider energy of nodes while selecting routes. So, using the same route for...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    MuMoCo : a Framework for Improving Data Quality with Multiple Modalities Cooperation in Wireless Sensor Networks

    High quality sensor data stream is crucial to wireless sensor networks applications. However raw data streams in wireless sensor networks tend to be not reliable. Therefore, improving sensor data quality is an important issue for all kinds of wireless sensor networks applications. In this paper, the authors proposed an integrated...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    A Review on Node Deployment of Wireless Sensor Network

    Wireless Sensor Network (WSN) is nowadays being applied in many different civilian applications like vehicle tracking, habitat monitoring, forest surveillance, earthquake observation, biomedical or health care applications and building surveillance. To a large extent the effectiveness of the wireless sensor networks depends on the coverage provided by the sensor deployment...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Prediction based Link Stability Scheme for Mobile Ad Hoc Networks

    Mobile Ad Hoc NETworks (MANETs) consist of mobile nodes which are not controlled by any base station. Mobile nodes act as a major role because of performing the data transmission, route discovery, route maintenance. The packet loss occurs often while the nodes are moving out of range, or the node...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2012

    Precedence Based Preemption and Bandwidth Reservation Scheme in MANET

    Infrastructures less mobile networks are commonly known as Mobile Ad Hoc NETworks (MANET). Quality of Service (QOS) constraints is highly required for multimedia communications with MANET. Providing QOS in MANET is not easy task due to its broadcast and dynamic nature. There are some number of protocols exist which takes...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Agent Virus of Cooperation (Avicoop): an Intelligent Model of Cooperation and Collaboration Based on the MAS for Data Exchange in Ad hoc Network

    The authors propose in this paper a response to the problem of cooperation and collaboration between nodes in a Mobile Ad hoc NETwork (MANET) for intelligent data relays from one source to a destination. In their operation, each routing protocol relies on the support of each node for end-to-end messages...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Energy Efficiency Analysis of Adaptive Error Correction in Wireless Sensor Networks

    In this paper, the authors develop an analytical energy efficiency model using Adaptive Error Correction Code (AECC) in wireless sensor networks in fading environments. To adapt energy efficiency of sensor node to channel variations, the packet length is tuned at the data link layer. In this model, they consider the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Energy Band Based Clustering Protocol for Wireless Sensor Networks

    Clustering is one of the widely used techniques to prolong the lifetime of wireless sensor networks in environments where battery replacement of individual sensor nodes is not an option after their deployment. However, clustering overheads such as cluster formation, its size, cluster head selection & rotation, directly affects the lifetime...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Analysis of QoS Routing Approach and the Starvation's Evaluation in LAN

    This paper gives a survey in QoS Routing Architecture implemented by Dijkstra's algorithm. The performance of QoS Routing architecture is evaluated by made a comparison between the Shortest Path Routing and QoS one. A very important feature in QoS routing are the conditions for elimination of starvation. Experimentally the authors...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    A Framework for Secure Cloud Computing

    Cloud computing is one of the most discussed topics today in the field of information technology. It introduces a new Internet-based environment for on-demand, dynamic provision of reconfigurable computing resources. The biggest challenge in cloud computing is the security and privacy problems caused by its multi-tenancy nature and the outsourcing...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    A Web Services based Approach for Resource-Constrained Wireless Sensor Networks

    The large diffusion of Wireless Sensor Networks (WSNs) in the people contemporary life with their numerous applications has led to a huge heterogeneity. This heterogeneity makes the possibility of discovering and collecting data from the wireless sensors more and more difficult. Indeed, WSNs are currently developed around different communities of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    3D Media over Future Internet: Current Status and Future Research Directions

    Future Media Internet has been designed to overcome current limitations and address emerging trends including: network architecture, content and service delivery across heterogeneous networks, diffusion of heterogeneous nodes and devices, mass digitization, new forms of (3D) user centric/user generated content provisioning, emergence of software as a service and interaction with...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Mobile Agent Based Hierarchical Intrusion Detection System in Wireless Sensor Networks

    Security mechanism is a fundamental requirement of wireless networks in general and Wireless Sensor Networks (WSN) in particular. Therefore, it is necessary that this security concern must be articulate right from the beginning of the network design and deployment. WSN needs strong security mechanism as it is usually deployed in...

    Provided By International Journal of Computer Science Issues