International Journal of Computer Science Issues

Displaying 321-360 of 795 results

  • White Papers // Jul 2012

    New Non Path Metrics for Evaluating Network Security Based on Vulnerability

    In this paper, the authors propose a new and simple metrics for evaluating network security. The proposed metrics are based on the existence of network vulnerabilities in the network. The proposed metrics are different with their previous metrics proposed. Exploited Vulnerability Percentage (EVP) metric, Vulnerable Host Percentage (VHP) metric and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Stability and Stabilization of a Flexible Manipulator

    In this paper, the stability and stabilization of a neutral system with time-delay are treated. First, the flexible manipulator is modeled as a neutral time-delay system form. Then, based on the Lyapunov-Krasovskii functional theory, a delay dependant condition is proposed to test studied system stability, which is applied to a...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    PCA-Based Relevance Feedback in Document Image Retrieval

    Research has been devoted in the past few years to relevance feedback as an effective solution to improve performance of information retrieval systems. Relevance feedback refers to an interactive process that helps to improve the retrieval performance. In this paper, the authors propose the use of relevance feedback to improve...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Shared Situation Awareness Architecture (S2A2) for Network Centric Disaster Management (NCDM)

    Having Shared Situation Awareness (SSA) in Network Centric Disaster Management (NCDM) lead to virtual collaboration, virtual organization and self-synchronization among people; therefore, having SSA reduces operation cost and risk and increases speed of responsibility and operation and total performance of decision-makers. In this paper, the authors present a new architecture...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Using Mobile Agent Technology to Develop a Collaborative Product Life-Cycle Oriented Architecture

    Today product development activities are becoming more and more agile, adaptable, and cost-effective. Multi-agent-based system technology has found wide applications in managing company's information. This paper applies Multi-mobile-agent technology in developing a collaborative architecture for product lifecycle. By adopting the Aglets mobile agent platform, a generic platform has been developed...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Developing E-Learning Based on Animation Content for Improving Mathematical Connection Abilities in High School Students

    The purpose of this paper is to develop e-learning based on animation content to improve mathematical connection abilities in senior high school students. The e-learning was developed using framework proposed by Moddle, while the animation content was developed using macromedia flash. To get the student mathematical connection abilities, pretest and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    User Network Modeling-Based Spatial Web Personalization

    Web personalization can be seen as an interdisciplinary field whose objective is to facilitate the interaction between web content and user's needs. It includes per definition several research domains from social to information sciences. The personalized search focuses on integrating the user context and needs in the information retrieval process....

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Wireless Security System Implemented in a Mobile Robot

    This paper presents the design and implementation of a security system in which a mobile robot Lego NXT continuously monitors its surroundings while traveling in search of moving objects or people, considered unauthorized elements. An ultrasonic sensor is used for the monitoring. On suspicious movement detection, a warning signal is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    University Authentication System Based on Java Card and Digital X.509 Certificate

    This paper presents a solution to the problem of strong authentication, portable and expandable using a combination of Java technology and storage of X.509 digital certificate in Java cards to access services offered by an institution, in this case, the technology of the University of Panama, ensuring the authenticity, confidentiality,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Design and Optimization of Photonic Crystal Triplexer for Optical Networks

    Photonic Crystals (PhCs), also known as Photonic Band-Gap (PBG) materials, can control the spontaneous emission and the propagation of Electro-Magnetic (EM) waves. Due to existence of PBG, PhCs have applications in different areas of optical engineering such as optical filters, switches, power splitters, and demultiplexers which may ultimately pave the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Implementation of ITIL in a Moroccan Company: The Case of Incident Management Process

    IT departments were viewed as a cost center and not as an entity in the service of strategy. But this has changed in recent years because of market competitiveness and also due to the fact that the adoption of a management approach focused on the customer and driven by IT...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    A Method for Text Summarization by Bacterial Foraging Optimization Algorithm

    Due to rapid and increasingly growth of electronic texts and documents, the authors need some techniques for integration, communication and appropriate utilization of these texts. Summarizing the literature is one of the most fundamental tasks for integrating and taking advantages of these gathered texts. Selecting key words and then integrating...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Web Services Modeling and Composition Approach Using Objects-Oriented Petri Nets

    Now-a-days, with the emergence and the evolution of new technologies, such as e-business, a large number of companies are connected to Internet, and have proposed web services to trade. Web services as presented, are conceptually limited components to relatively simple functionalities. Generally, a single service does not satisfy the users...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    A Novel Image Encryption Using an Integration Technique of Blocks Rotation Based on the Magic Cube and the AES Algorithm

    In recent years, several encryption algorithms have been proposed to protect digital images from cryptographic attacks. These encryption algorithms typically use a relatively small key space and therefore, provide safe, especially if they are of a dimension. In this paper proposes an encryption algorithm for a new image protection scheme...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Hiding Data in Images Using New Random Technique

    Steganography is the art of hiding the fact that communication is taking place by hiding information in other information. In the field of Data Communication, Steganography play a major role. The transmission of information via the Internet may expose it to detect and theft. Some solution to be discussed is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Cloud Databases: A Paradigm Shift in Databases

    Relational databases ruled the Information Technology (IT) industry for almost 40 years. But last few years have seen sea changes in the way IT is being used and viewed. Stand alone applications have been replaced with web-based applications, dedicated servers with multiple distributed servers and dedicated storage with network storage....

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    An Optimized Query Tree Algorithm in RFID Inventory Tracking - A Case Study Evidence

    One of the challenged technical issue faced in inventory tracking applications with Radio Frequency IDentification (RFID) implementation environment, is the collisions due to responses from multiple tags on the shared channel between reader and the tags, which consumes further the energy as well as the delay in tag identification process....

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Application of Geographical Information System (GIS) in Urban Water of Amol in Iran at Time of Natural Disaster

    For the management of urban disaster risk, periodic updating of geo-databases of urban water is crucial, particularly in developing countries where urbanisation rates are very high. However, collecting information on the characteristics of buildings and lifelines through full ground surveys can be very costly and time-consuming. This paper has done...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Comparison Between MC-CDMA and CDMA-OFDM/OQAM Systems in Presence of MIMO Channel

    In this paper, the authors present a comparison between MC-CDMA and CDMA-OFDM/OQAM systems in the case of MIMO channel. The advanced Multi Carrier CDMA OFDM/OQAM modulation is a combination of CDMA and OFDM/OQAM. This combination takes advantages from multicarrier modulation and spread spectrum. Indeed, the use of OFDM has proved...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Application of Satellite Remote Sensing for Detailed Landslide Inventories Using Frequency Ratio Model and GIS

    This paper presents landslide susceptibility analysis in central Zab basin in the southwest mountainsides of West-Azerbaijan province in Iran using remotely sensed data and Geographic Information System. Landslide database was generated using satellite imagery and aerial photographs accompanied by field investigations using Differential Global Positioning System to generate a landslide...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    P2P Appliance Calculation Method for Trust Between Nodes Within a P2P Network

    Modern ways of communications, such as in a web services environment, also influences trust relationships between organisations. This concept of web-based (way towards semantic web services) trust is new and has as yet not been resolved. The authors hope that some of the trust properties mentioned above can be successfully...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    On the Current Measurement Practices in Agile Software Development

    Agile Software Development (ASD) methods were introduced as a reaction to traditional software development methods. Principles of these methods are different from traditional methods and so there are some different processes and activities in agile methods comparing to traditional methods. Thus, ASD methods require different measurement practices comparing to traditional...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Algorithm for Efficient Attendance Management: Face Recognition Based Approach

    Students attendance in the classroom is very important task and if taken manually wastes a lot of time. There are many automatic methods available for this purpose, i.e., biometric attendance. All these methods also waste time because students have to make a queue to touch their thumb on the scanning...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Adaptive Packet Buffering Algorithm Based on Priority and Traffic Throughput for Reducing Packet Loss in Fast Handover for Mobile IPv6

    The packet loss has become an important issue to the research community, which needs to be addressed. In FMIPv6, Packet losses are significantly related to the handover latency and buffer size used for packet buffering. In the case of increased handover latency or decreased buffer size, packet losses will be...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    A Primary User Authentication Scheme for Secure Cognitive TV Spectrum Sharing

    Cognitive radio is being intensively investigated by regulatory bodies as the enabling technology for opportunistic access to the TV white spaces. The successful deployment of cognitive radio networks and the realization of their benefits depend on the assignment of essential security challenges to resist misuse of the systems. In this...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Load Aware Congestion Detection Technique in Internet

    The Internet includes various ranges of applications such as multimedia, voice and data but it endures rigorous network congestion. Further, congestion detection is an essential preventive measure must be taken to provide congestion-free Internet. To stipulate proficient technique for congestion detection, in this paper, the authors propose a load aware...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Multi-Object Tracking in Dynamic Scenes by Integrating Statistical and Cognitive Approaches

    In this paper, the authors have addressed a quite researched problem in vision for tracking objects in realistic scenarios containing complex situations. The framework comprises of four phases: object detection and feature extraction, tracking event detection, integrated statistical and cognitive modules, and object tracker. The objects are detected using fused...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Comparative Study of CAD Software, Web3D Technologies and Existing Solutions to Support Distance-Learning Students of Engineering Profile

    Interactive simulations, virtual environments and 3D interfaces significantly contribute to the process of learning through collaboration and interaction with distant participants, and through simulation of real environments and real life situations. Depending on the needs and case studies, different technologies, software packages and their combinations are used. In this paper,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Manet Load Balancing Parallel Routing Protocol

    In recent years, multi-path routing protocols have attained more attention in mobile ad hoc networks as compared to other routing schemes due to their abilities and efficiency in improving bandwidth of communication, increasing delivery reliability, responding to congestion and heavy traffic. Several protocols have been developed to address multi path...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Feature Level Fusion of Palmprint and Iris

    In many real-life usages, single modal biometric systems repeatedly face significant restrictions due to noise in sensed data, spoof attacks, data quality, non-universality, and other factors. However, single traits alone may not be able to meet the increasing demand of high accuracy in today's biometric system. Multi-biometric systems is used...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Emergence of Robust Information Security Management Structure Around the World Wide Higher Education Institutions: A Multifaceted Security Solution

    Polarizing the views on the emergence of Information security around the campus arenas of higher education institutions is the utmost erg of both developing and developed nations in this post catastrophic era of September 11, 2001 where the unthinkable is now potentially a daily reality with root causes of information...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    A New Energy-Efficient TDMA-Based MAC Protocol for Periodic Sensing Applications in Wireless Sensor Networks

    Energy efficiency is a major requirement in wireless sensor networks. Media Access Control is one of the key areas where energy efficiency can be achieved by designing such MAC protocol that is tuned to the requirements of the sensor networks. Different applications have different requirements and a single MAC protocol...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    A Goal Question Metric Approach for Evaluating Security in a Service Oriented Architecture Context

    For interactions to be possible within the Service Oriented Architecture (SOA) ecosystem, each actor must be enough confident of other actors to engage safely in the interactions. Therefore, the establishing of objective metrics tailored to the context of SOA that show security of a system and lead to enhancements is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    An Empirical Framework To Detect Security Attacks On the Cloud Data Storage System

    Providing an adequate security level in Cloud Environments is currently a particularly active analysis space. A lot of specifically, malicious behaviors targeting massive scale Cloud knowledge repositories (e.g. Denial of Service attacks) could drastically degrade the general performance of such systems and can't be detected by typical authentication mechanisms. In...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Energy Efficiency Analysis of Adaptive Error Correction in Wireless Sensor Networks

    In this paper, the authors develop an analytical energy efficiency model using Adaptive Error Correction Code (AECC) in wireless sensor networks in fading environments. To adapt energy efficiency of sensor node to channel variations, the packet length is tuned at the data link layer. In this model, they consider the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Energy Band Based Clustering Protocol for Wireless Sensor Networks

    Clustering is one of the widely used techniques to prolong the lifetime of wireless sensor networks in environments where battery replacement of individual sensor nodes is not an option after their deployment. However, clustering overheads such as cluster formation, its size, cluster head selection & rotation, directly affects the lifetime...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Analysis of QoS Routing Approach and the Starvation's Evaluation in LAN

    This paper gives a survey in QoS Routing Architecture implemented by Dijkstra's algorithm. The performance of QoS Routing architecture is evaluated by made a comparison between the Shortest Path Routing and QoS one. A very important feature in QoS routing are the conditions for elimination of starvation. Experimentally the authors...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    A Framework for Secure Cloud Computing

    Cloud computing is one of the most discussed topics today in the field of information technology. It introduces a new Internet-based environment for on-demand, dynamic provision of reconfigurable computing resources. The biggest challenge in cloud computing is the security and privacy problems caused by its multi-tenancy nature and the outsourcing...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jun 2012

    Security and Privacy of Electronic Banking

    The internet has played a key role in changing how the authors interact with other people and how they do business today. As a result of the internet, electronic commerce has emerged, allowing business to more effectively interact with their customers and other corporations inside and outside their industries. One...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2012

    Distributed Data Mining by Associated Rules: Improvement of the Count Distribution Algorithm

    Today, most large systems are overwhelmed by a flood of data that is stored daily in databases distributed. It is in this context that the distributed data mining is used by offering many parallel and distributed algorithms to extract crucial information. Among the most popular techniques, the authors are interested...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Using Cryptography in Trust Computing for Networked Communications

    The authors highlight some major difficulties encountered by current approaches that try to model trust computing in a realistic networked communications system. They characterize these approaches as top-down since they assume that trust is universal and readily quantifiable. Their main concern with these approaches is that their quest to define...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Implementation of MDA Method into SOA Environment for Enterprise Integration

    Even though SOA provides real contribution, it is not adequate to implement enterprise integration. There are still problems in the implementation of enterprise integration in SOA environment, they are the absence of modeling language support, the absence of guideline of the services implementation produced by services identification, and service orchestration...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Learning Mechanisms and Local Search Heuristics for the Fixed Charge Capacitated Multicommodity Network Design

    In this paper, the authors propose a method based on learning mechanisms to address the fixed charge capacitated multicommodity network design problem. Learning mechanisms are applied on each solution to extract meaningful fragments to build a pattern solution. Cycle-based neighborhoods are used both to generate solutions and to move along...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    LR-WPAN Formation Topologies Using IEEE 802.15.4

    IEEE 802.15.4 protocols are gaining interests in both industrial and research fields as candidate technologies for (WPAN) Wireless Personal Area Networks, (WSN) Wireless Sensor Network and control Wireless Networks applications. This paper analyzes multiple topologies such as Cluster-Tree, Mesh and Star in various scenarios to compare different performance metrics (Throughput,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    QGRP: A Novel QoS-Geographic Routing Protocol for Multimedia Wireless Sensor Networks

    Multimedia Wireless Sensor Networks (MWSN) are forecast to become highly integrated into the people daily activities. Due to the carried content nature, mainly composed of images and/or video streams with high throughput and delay constraints, Quality of Service in the context of MWSN is a crucial issue. In this paper,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Conception and Use of Ontologies for Indexing and Searching by Semantic Contents of Video Courses

    Nowadays, the video documents like educational courses available on the web increases significantly. However, the information retrieval systems today can not return to the users (students or teachers) of parts of those videos that meet their exact needs expressed by a query consisting of semantic information. In this paper, the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    A Collaborative Algorithm for Ontological Matching in E-Learning Courseware Domain Knowledge Network

    Domain Knowledge is the content repository of a courseware system consisting of a series of learning objects. However, the unstructured and inconsistent naming of domain knowledge components does not permit knowledge transfer across diverse collaborative systems due to differences in architecture, format and representations. To address this identified problem, the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    A Review of Burst Scheduling Algorithm in WDM Optical Burst Switching Network

    Optical Burst Switching (OBS) has proved to be an efficient paradigm for supporting IP-over-WDM networks. The growth of a variety of applications which transmit voice, data, video and multimedia, has necessitated the need to provide Quality of Service (QoS) over OBS networks. One of the key factors in OBS is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Performance Analysis of Observation Based Cooperation Enforcement in Ad Hoc Networks

    Node misbehavior due to selfish or malicious behavior could significantly degrade the performance of MANET because most existing routing protocols in MANET aim to find the most efficient path. Overhearing and reputation based cooperation schemes have been used to detect and isolate the misbehaving nodes as well as to force...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2011

    Cross Layer Implementation of Key Establishment and Configuration Protocols in WSN

    Security in Wireless Sensor Networks (WSN) can be achieved by establishing shared keys among the neighbor sensor nodes to create secure communication links. The protocol to be used for such a pairwise key establishment is a key factor determining the energy to be consumed by each sensor node during the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    A Succinct Reflection on Data Classification Methodologies

    Classification is a data mining (machine learning) technique used to assign group membership to various data instances. Indeed there are many classification techniques available for a scientist wishing to discover a model for the user's data. This diversity can cause trouble as to which method should be applied to which...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Fuzzy Based Detection and Prediction of DDoS Attacks in IEEE 802.15.4 Low Rate Wireless Personal Area Network

    Detection and prediction mechanism against Distributed Denial of Service (DDoS) attacks is a critical component of any security system in which, these attacks can affect the availability of a node or an entire network. In this paper, the authors focus the detection and prediction mechanism against DDoS attacks in IEEE...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2013

    Emulating Trust Zone in Android Emulator with Secure Channeling

    There is a raise in penetration of smart phone while using enterprise application, as most of them are downloaded from the public market, resulting in challenge for security framework, causing a threat to lose sensitive user data. To prevent this ARM introduces the virtualization technique in hardware level, which prevents...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2013

    Link Quality and MAC-Overhead Aware Predictive Preemptive Routing Protocol for Mobile Ad hoc Network

    In ad hoc networks, route failure may occur due to less received power, mobility, congestion and node failures. Many approaches have been proposed in literature to solve this problem, where a node predicts pre-emptively the route failure that occurs with the less received power. However, this paper encounters some difficulties,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2013

    Algorithms for Data Compression in Wireless Computing Systems

    Data compression can be defined as encoding the information using the small number of bits rather than original representation. Compression is a technique used for reducing data size by manipulating data redundancy; so that the packet transmission time and storage cost can be reduced. This can be achieved with the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2013

    Cluster Head Recovery Mechanism for Hierarchical Protocols

    Due to the big and essential role played by the cluster head in hierarchical protocols of wireless sensor network, it consumes an amount of energy more than the member nodes of the cluster. Therefore, the hierarchical protocols usually suffer from a packet loss due to frequent cluster head failure during...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2013

    Quality Issues in Infrastructure as a Service

    With rapid development in IT world, technologies are getting dynamic and very advance. With this advancement in IT world, online services have also been proliferated a lot. Now-a-days, computer resources are made available to users online on temporarily basis. This technology is cloud computing. In cloud computing environment, different services...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2013

    Enhanced Technique for Data Cleaning in Text File

    Data cleaning is a process of correcting or removing of erroneous data caused by contradictions, disparities, keying mistakes, missing bits, etc to create consistent and reliable information. Text files are used to store simple information and which can be also deceptive in terms of dirty data. In this paper the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2013

    A Vision Based Approach for Web Data Extraction Using Enhanced Cocitation Algorithm

    Normally, the World Wide Web maintains a set of databases which can store several data records retrieved by web query interface. The information maintained in web is hidden in the database that can be retrieved through dynamic script pages are termed as deep web content. These forms of deep web...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2013

    Assessment of Offline Digital Signature Recognition Classification Techniques

    The digital signature verification has become an interesting domain, which is widely needed. The usage of online and offline digital signatures has been spreaded worldwide due to the increase of use of bank transactions and user authentication and other similar activities. This requires the creation and the diversification of new...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2013

    A Model for Optimizing Data Caching of Dual Mode Handheld Devices

    Handheld apparatus are widely used especially when equipped with an automatic data capturing solutions. They are usually connected to the main database server using either an economic fixed location mode or a more expensive mobile mode. In order to quantify the gap of the two modes, a metric called mobility...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2013

    Biometric System by Pointing Finger

    Biometrics is an important application of pattern recognition, the cross-domain path between data analysis and artificial intelligence. Technological change and the growing computerization of society have paved the way for biometric systems. They rest on sequence procedures that always follow the same development: biometric data is converted to digital data...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2013

    Performance Evaluation of Naive Bayes and Decision Stump Algorithms in Mining Students' Educational Data

    Educational data mining is an emerging trend, concerned with developing methods for exploring the huge data that come from the educational system. This data is used to derive the knowledge which is useful in decision making which is known as Knowledge Discovery in Databases (KDD). EDM methods are useful to...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2013

    Intelligent Vehicle Recognition Based on Wireless Sensor Network

    One of the main requirements of any intelligent transportation system is to be able to identify vehicles in the traffic. This paper presents an intelligent vehicle identification system used within a complete solution for a traffic monitoring system that uses novel wireless sensor network architecture to monitor traffic. Novel wireless...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2013

    Broad View of Cryptographic Hash Functions

    In this paper the authors presented an extensive study of cryptographic hash functions. Cryptographic hash function is a function that takes an arbitrary length as an input and produces a fixed size of an output. The viability of using cryptographic hash function is to verify data integrity and sender identity...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2013

    Sentiment Analysis of Equities Using Data Mining Techniques and Visualizing the Trends

    Markets reflect sensitively towards opinions and sentiments. Investors should be wary of the fact that external factors interact deeply with the share markets and mark their influence over the coming period. National tragedy, low economic growth, IPO releases, RBI decisions on interest rates, foreign matters and many more have an...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2013

    Energy Efficient Topology Control Approach for Mobile Ad hoc Networks

    In MANET, energy consumption and network connectivity are the two very important issues. Due to the mobility of the nodes, the network partition occurs unlimitedly. To avoid this, several researches concentrated on this issue. But it is not focused on constantly. In this paper, the authors developed Energy Efficient Topology...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2013

    The Effect of Data Hiding at Various Bit Positions on Audio Stegnography in DCT Domain

    In this paper the authors presents the statistical analysis of various quality measuring parameters of audio stenography, e.g. Signal to Noise Ratio (SNR), Peak Signal to Noise Ratio (PSNR) and Mean Square Error (MSE), for different bit position substitution in an audio cover file in Discrete Cosine Transform (DCT) domain....

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2013

    An Energy Efficient Data Redundancy Reduction Approach for Data Aggregation in WSN

    WSN has the potentiality to join the physical world with the virtual world by creating a network of sensor nodes. Here, sensor nodes are usually battery-operated devices, and hence energy reduction of sensor nodes is a major design issue. To extend the network's lifetime, minimization of energy consumption should be...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Traceability and Data Support in SME Manufacturing

    Appropriate description and implementation of internal part traceability in manufacturing is a complex task. Accurate and real-time traceability from a part to a manufacture, storage, or transport issue is essential to efficient and high-quality operations. With the increasing amount of machine status and product quality information coming from the manufacturing...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Presenting a Novel Method for Mining Association Rules Using Binary Genetic Algorithm

    Today, mining association rule is one of the important data mining algorithms which enable managers to make correct decisions based on the knowledge obtained from the detected patterns by databases. Traditional algorithms of discovering association rules such as Apriori and FP-growth may extract millions of rules from databases, many of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    A Pattern Based Methodology for Evolution Management in Business Process Reuse

    Today, there are Process-Aware Information Systems (PAIS) with a set of business process models which vary over time to meet the new requirements. In a competitive environment, the key challenge of enterprises is to reduce the cost and time of process design and application development. For this purpose, research on...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    An Exploration Scrutiny of Systems Performance Monitoring Tools: An Applications and Agentless Server Approach

    Performance monitoring tools play a critical role in the overall productivity of business organizations by providing the necessary means of measuring the performance of the system or server attributes of the organization. They measure system or server throughput and processor usage through programmed software or technological platforms. Their monitoring is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    Real-Time Scheduling Algorithm Based on Dynamic Priority for Multi-Data Transmission

    In response to the demands of heterogeneous data acquisition, data transmission effectiveness and reliability in emergencies as well as environmental wireless monitoring etc., this paper presents a data transmission queue optimization algorithm based on dynamic priority. The algorithm dynamically assign priorities to different data according to their importance, historical transmission...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    A Dynamic Materialized View Selection in a Cloud-Based Data Warehouse

    A data warehouse is system which that support decision-making in production environment. Classical data warehouse management system is often optimized by improving query performance. Such improvement is casually achieved by using caches, indexes and materialized views and required selecting the best set of data structures (materialized views, indexes, etc...). In...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    Defending the Sensitive Data Using Lattice Structure in Privacy Preserving Association Rule Mining

    Innovation of association rules from enormous databases ensures benefits for the enterprises since such rules can be very operative in enlightening the knowledge that leads to tactical decisions. Association rule mining has acknowledged a proportion of attention in the collaborative business community and several algorithms were proposed to improve the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    Multi-Level Service Composition in Supervised Cloud Computing

    The role of AN agent system in an exceedingly cloud network is to spot the simplest obtainable resources and share them through a service created accessible over the net. Hence they act as inter-mediator for providing cloud services to varied users. The cloud service customers determine numerous service compositions through...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    Combining Clustering Solutions With Varying Number of Clusters

    Cluster ensemble algorithms have been used in different field like data mining, bioinformatics and pattern recognition. Many of them use label correspondence as a step which can be performed with some accuracy if all the input partitions are generated with same k. Thus these algorithms produce good results if this...

    Provided By International Journal of Computer Science Issues

  • White Papers // Aug 2010

    Analysis of Server Log by Web Usage Mining for Website Improvement

    Web server logs stores click stream data which can be useful for mining purposes. The data is stored as a result of user's access to a website. Web usage mining an application of data mining can be used to discover user access patterns from weblog data. The obtained results are...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2014

    Scalable and Efficient Self-Join Processing Technique in RDF Data

    Efficient management of RDF data plays an important role in successfully understanding and fast querying data. Although the current approaches of indexing in RDF Triples such as property tables and vertically partitioned solved many issues; however, they still suffer from the performance in the complex self-join queries and insert data...

    Provided By International Journal of Computer Science Issues