International Journal of Computer Science Issues

Displaying 1-40 of 968 results

  • White Papers // May 2015

    A Version of Parallel Odd-Even Sorting Algorithm Implemented in CUDA Paradigm

    Sorting data is an important problem for many applications. Parallel sorting is a way to improve sorting performance using more nodes or threads e.g. dividing data in more nodes and perform sorting in each node simultaneously or including more threads in process of sorting. It was experimented with one type...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2015

    Survey and Analysis of Searching Algorithms

    The data mining is vast field with application found in many areas such that science, industrial problems and business. The data mining system architecture has the several main components database, data warehouse or other information repositories, a server that extract the related data from repositories based on user request. The...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2015

    Proposed Active Noise Control System by Using FPGA

    Acoustic noise has become a serious problem as the number of industrial equipment such as engines, blowers, fans, compressors and transformers are increased. This paper proposed Active Noise Control (ANC) system by using Field Programmable Gate Array (FPGA) kit, it has been conducted through Least Mean Square (LMS) algorithm in...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2015

    Specification of Document Structure and Code Generation for Web Content Management

    In this paper, the authors present a simple model for declarative specification of the structure of documents for web-based content management. The proposed model allows the description of the hierarchical structure of multi-lingual documents, relationships and organization among documents of same type. They specify this model in a way that...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2015

    Study and Analysis of MAC/IPAD Lab Configuration

    In this paper, the authors proposed three virtualization modes: VMware, parallels and boot camping. The tradeoff of their testing is the hardware requirements. The main question is, among the three, which is the most suitable? The answer actually varies from user to user. It depends on the user needs. Moreover,...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2015

    AFDI: A Virtualization-based Accelerated Fault Diagnosis Innovation for High Availability Computing

    Fault diagnosis has attracted extensive attention for its importance in the exceedingly fault management framework for cloud virtualization, despite the fact that fault diagnosis becomes more difficult due to the increasing scalability and complexity in a heterogeneous environment for a virtualization technique. Most existing fault diagnoses methods are based on...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2015

    Fine-Grained Data Sharing Supporting Attribute Extension in Cloud Computing

    Attribute-Based Encryption (ABE) can be used for implementing fine-grained data sharing in cloud computing. However, most of the existing ABE schemes cannot realize attribute extension and provable security simultaneously. In this paper, the authors propose a fine-grained attribute-based data sharing system based on a hybrid encryption mechanism. A rigorous security...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2015

    Source Camera Identification for Mobile Phones using EXIF Data and Lens Features

    Source camera identification is the process of discerning which camera has been used to capture a particular image. This paper has focused on analyzing the relationship between mobile enabled cameras and the photographs. Mobile cameras are typically low-end cameras equipped on hand-held devices such as personal digital assistants and cellular...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2015

    An Enhanced Apriori Algorithm for Discovering Frequent Patterns with Optimal Number of Scans

    Data mining is wide spreading its applications in several areas. There are different tasks in mining which provides solutions for wide variety of problems in order to discover knowledge. Among those tasks association mining plays a pivotal role for identifying frequent patterns. Among the available association mining algorithms Apriori algorithm...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2015

    Rural Road Mapping Geographic Information System Using Mobile Android

    Road is a land transportation infrastructure which is used to connect one place to another. Since there are many roads in every province, it is a requirement for the government to conduct a road data collection. All this time the data collection is still conducted manually, therefore it is very...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2015

    Resource Reservation and Dynamic Admission Control for Distributed Multimedia Systems

    In this paper, the authors have proposed different approaches to achieve an admission control which can highly guarantee a Quality of Service (QoS) in distributed multimedia systems. Through this paper, they propose a new method for admission control in distributed multimedia systems namely a Feedback Control Architecture for Distributed Multimedia...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2015

    A Survey on Discovery of Distributed Denial of Service Attacks in Cloud

    Cloud computing is a paradigm which involves delivering hosted services over the internet and is predicted as the next generation of information technology architecture whose high potentiality enhances efficiency and reduces the costs. Although cloud computing is still considered as a young field, it has to deal with challenges such...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2015

    A Survey and Analysis on Recommendation System Algorithms

    In this paper, the authors proposed a comprehensive survey of methodologies and techniques used for recommendation systems. Recommendation shows significant part in many fields and has become a great attention in the field of research. Important factor for the searching and recommendation system is to recognize and recognize user's personalized...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2015

    Maintainability of Object- Oriented Software Metrics with Analyzability

    Design and analysis place crucial role in establishing the models of the software maintainability. Understandability, modifiability and analyzability are the maintainability factors with UML specifications of the class diagrams in Object-Oriented Design (OOD). In this paper, the authors include two more levels one is at the lowest and another one...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2015

    Ontology-Based Model for E-Learning Management System (O-BMEMS)

    E-learning is a process in which the electronic medium is used to access the defined set of applications and processes. With its increasing identification and recognition in academic and corporate world, a unique model or framework is required. E-learning is a critical support mechanism for educational institutions to grow the...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2015

    Testability Assessment of Object Oriented Software Using Static Metric Model and Analytic Hierarchy Process

    Based on existing software testability models for object oriented software, the authors have proposed a new testability assessment model for object oriented software. The model is based on those six important internal programming features of object oriented design which are not used before together at the same time in-spite of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2015

    Preserving Data in Cloud Computing

    Cloud computing is basically virtual pool of resources and it provides these resources to its users via internet as services who use them as when needed basis. On demands of user's data confidentiality and privacy the data is stored in cloud server as encrypted. Ideally, to maintain the security of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2015

    Joint Supplier Selection and Product Family Optimization in Supply Chain Design

    In order to incorporate the customer into the early phase of the product development cycle and to better satisfy customers' requirements. A need for effective integration of suppliers into the product value/supply chain will be a key factor for achieving this goal. Various decision making approaches have been proposed to...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2015

    Big Data: A Trouble or A Real Solution?

    Information today has gone from scarce to superabundant which brings immense new benefits but complementary big headache too. Users are surrounded only data. From where this data has flooded they hardly have time to track that. Today every bit of data is important and hence stored. The actual problem is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2015

    Overlapping and Non-overlapping Camera Layouts for Robot Pose Estimation

    In this paper, the authors study the use of overlapping and non-overlapping camera layouts in estimating the ego-motion of a moving robot. To estimate the location and orientation of the robot, they investigate using four cameras as non-overlapping individuals and as two stereo pairs. The pros and cons of the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2015

    A Survey on Clustering Algorithms and Complexity Analysis

    Clustering is a technique to group the data objects in such a way that the data objects of a group are similar to each other in that group and dissimilar to the data objects of other groups. It is being performed for the diverse purpose such as statistical data analysis...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2015

    Danger Theory Based Load Balancing (DTLB) Algorithm for Cloud Computing

    Cloud computing is one of the growing technology in computer science and an established way for sharing and accessing resources via internet. Load balancing is a method of reassigning the total load to the entity nodes of the collective system to create resource utilization useful and to improve the response...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2015

    Speaker Identification Using GMM with MFCC

    Speaker identification comes under the field of digital signal processing. The earliest systems were based on acoustic phonetics built for automatic speech recognition. For recognition part these systems used pattern matching and spectrum analysis. With recent advancement in technology voice recognition has become one of the efficient measure that is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2015

    Inter Organizational System Management for Integrated Service Delivery: An Enterprise Architecture Perspective

    Service sharing is a prominent operating model to support business. Many large inter-organizational networks have implemented some form of value added integrated services in order to reach efficiency and to reduce costs sustainably. Coupling service orientation with enterprise architecture paradigm is very important at improving organizational performance through business process...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2015

    Interoperable Distributed Data Warehouse Components

    Extraction, Transformation and Loading (ETL) are the major functionalities in Data Warehouse (DW) solutions. Lack of component distribution and interoperability is a gap that leads to many problems in the ETL domain, because these ETL components are tightly-coupled in the current ETL framework. Furthermore, complexity of components extensibility is another...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2015

    Generating Test Cases for E-Commerce Systems

    Software testing is the process of executing a program or system for finding any error or defect. Software testing strategy helps to convert test case designs into well-planned execution steps that will result in the construction of successful software. Software testing is any activity aimed at evaluating a capability of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2015

    Smart Geographic Object: Towards a New Understanding of GIS Technology in Ubiquitous Computing

    One of the fundamental aspects of ubiquitous computing is the instrumentation of the real world by smart devices. This instrumentation constitutes an opportunity to rethink the interactions between human beings and their environment on the one hand and between the components of this environment on the other. In this paper,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2015

    Redundancy Detection Protocol for Area Coverage Control in Heterogeneous Wireless Sensor Networks

    In a wireless sensor network, eliminating redundancies in area coverage in the deployment zone represents a major challenge where the stake is its lifetime increase. Current works dealing with this topic use different deterministic or probabilistic techniques for nodes redundancies check. In this paper, the authors propose a quasi-quadratic time...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2015

    A Taxonomy of Scheduling Algorithms for Cloud Computing

    Cloud computing or simply rental computing, is a new technology currently being studied in the academic world and broadly categorized as Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS).Virtualization is the backbone of cloud computing and scalable, dynamic resources can be effectively managed using virtualization technology. It is possible to remap...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2015

    SQL TO Flink Translator

    Flink has become an effective approach to big data analytics in large cluster systems, and with increasing needs of analysis this data Flink has become an effective technique for analysis big data and the need of optimized translator for SQL (Structured Query Language) query is very necessary to build efficient...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2015

    Implementation of a Secure Data Mining Technology to Develop Aknowledge Based System in a Business Environment

    Because the advancement of the internet, several small and large firms have developed their dealings with customers to offer goods through the internet worldwide. Online credit card deception or no card present deception is gradually rampant in the latest years because that the credit-card is mainly exploited to demand payments...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2015

    High Performance Computing Achieved in Personal Computers

    In this paper, the authors is to provide an up to date survey of the technologies that enables high performance computing on general purpose personal computers. Multiprocessor or multicore computers are widely available these days along with graphical processing units installed for gaming and other high speed common computing. Researchers...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2015

    Keyword Reduction for Text Categorization Using Neighborhood Rough Sets

    Keyword reduction is a technique that removes some less important keywords from the original dataset. Its aim is to decrease the training time of a learning machine and improve the performance of text categorization. Some researchers applied rough sets, which is a popular computational intelligent tool, to reduce keywords. However,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2015

    Emerging Trends in Learning Management Systems

    The ever emerging technology world is leaving no sphere of the people's lives untouched. Technology has also made its foray into the learning space and has completely redefined the way learning is imparted. From structured and formal environment the learning space has evolved into a virtual, mobile enabled, informal and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2015

    Exigency of Cognitive Radio Networks

    Cognitive radio is the restorative technology to authorize the efficient usage of restricted natural resource radio frequency spectrum for the wireless devices. The technology empowers the telecommunication industry by renovating the traditional static spectrum access approach to dynamic spectrum access to stimulate the unlicensed users to access underutilized licensed band;...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2015

    Power Aware Routing Protocol in Mobile Ad-hoc Networks

    Mobile Ad-hoc NETwork (MANET) are formed by a collection of mobile nodes, each equipped with wireless communication capabilities, without relying on any fixed infrastructure. In order to maintain network connectivity, each node may act as an ad hoc router, forwarding data packets for other mobile nodes that may not be...

    Provided By International Journal of Computer Science Issues

  • White Papers // Dec 2014

    A Multi-Agent Systems Engineering for Semantic Search of Reuse Software Components

    In Component-Based Software Development (CBSD) approach, the searching and retrieving of accurate reusable software components that are stored in large, distributed and heterogeneous-structured repositories is a tedious and time consuming process. This paper presents the design and implementation of ontology-based multi-agent software component retrieval system using semantic and structural formalism....

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2014

    From XML Schema to ODL Schema: Aggregation and Composition Transformation

    In this paper, the authors present an approach for transforming an existing XML schema in ODL (Object Definition Language) schemas, the authors chose oriented object database as a target database because there are many common characteristics between XML (eXtensible Markup Language) and object-oriented model, and they desire to have a...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2014

    Spatial-Temporal Outlier Sensing over Trajectory Data Streams

    The increasing capability to track moving vehicles in city roads enables people to probe the dynamics of a city. In this paper, the authors address the problem of detecting outliers and anomalies sources with trajectory data. Unlike existing anomaly detection methods, both spatial and temporal information are considered to find...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2014

    The Comparison WRR-SCAN Versus SCAN-EDF the Algorithms that are used in REAL-TIME Systems

    Scheduled algorithms in disc have a very important role in real time applications used in multimedia, in as much as the last ones generate I/O demands with their restrictions in real time. Both traditional algorithms and other two ones mentioned later during this study, serve to real-time tasks according their...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Functional Behavior Pattern for Data Mart Based on Attribute Relativity

    The growing need for huge volume of data in enterprise and corporate environment, fuel the demand of data warehousing. Data warehousing collects the data at different levels (i.e., departmental, operational and functional) and stored as a collective data repository with better storage efficiency. Various data warehousing models concentrate on storing...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Mining Association Rules in Student's Assessment Data

    Higher education, throughout the world is delivered through universities and colleges affiliated to various universities and some other recognized academic institutes. Today one of the biggest challenges, the educational institutions face, is the explosive growth of educational data and to use this data to improve the quality of managerial decisions...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2010

    Analysis of FFSR, VFSR, MFSR Techniques for Feature Extraction in Speaker Recognition: A Review

    In this paper, the authors provide the brief overview of FFSR, VFSR and MFSR (Multiple Frame Size and Rate) technique for speech analysis in speaker recognition system. Following this overview they will discuss some of the strength and weakness of current frame size and frame rate technique. A Fixed Frame...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Using Mobile Agent Technology to Develop a Collaborative Product Life-Cycle Oriented Architecture

    Today product development activities are becoming more and more agile, adaptable, and cost-effective. Multi-agent-based system technology has found wide applications in managing company's information. This paper applies Multi-mobile-agent technology in developing a collaborative architecture for product lifecycle. By adopting the Aglets mobile agent platform, a generic platform has been developed...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Developing E-Learning Based on Animation Content for Improving Mathematical Connection Abilities in High School Students

    The purpose of this paper is to develop e-learning based on animation content to improve mathematical connection abilities in senior high school students. The e-learning was developed using framework proposed by Moddle, while the animation content was developed using macromedia flash. To get the student mathematical connection abilities, pretest and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    User Network Modeling-Based Spatial Web Personalization

    Web personalization can be seen as an interdisciplinary field whose objective is to facilitate the interaction between web content and user's needs. It includes per definition several research domains from social to information sciences. The personalized search focuses on integrating the user context and needs in the information retrieval process....

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Wireless Security System Implemented in a Mobile Robot

    This paper presents the design and implementation of a security system in which a mobile robot Lego NXT continuously monitors its surroundings while traveling in search of moving objects or people, considered unauthorized elements. An ultrasonic sensor is used for the monitoring. On suspicious movement detection, a warning signal is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    University Authentication System Based on Java Card and Digital X.509 Certificate

    This paper presents a solution to the problem of strong authentication, portable and expandable using a combination of Java technology and storage of X.509 digital certificate in Java cards to access services offered by an institution, in this case, the technology of the University of Panama, ensuring the authenticity, confidentiality,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Speedy Signature Based Intrusion Detection System Using Finite State Machine and Hashing Techniques

    This paper proposes a secure system designs for client-server based communication systems. In this system, security services are implemented on server, as generally data received on the servers contains malicious contents. The technique that the authors used is to perform speedy intrusive signature matching received inside a network with the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Design and Implementation of an IP-Based Security Surveillance System

    The tremendous loss of lives and properties that may be attributed to criminals in recent times worldwide has become a source of worry to all and sundry. The situation has come to the alarming rate that the authority has sought for the immediate means of checkmating it without delay. Therefore,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Developing Service Oriented Computing Model Based On Context-Aware

    SOA and Cloud computing are making major changes in the way companies build and deploy applications. The challenge is to meet the business expectation of faster delivery of new functionality, while at the same time maintaining control of application performance and availability across a growing network of service providers. SOA...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Feasibility Evaluation of VANET Using Directional-Location Aided Routing (D-LAR) Protocol

    Vehicular Ad hoc NETworks (VANETs) allow vehicles to form a self-organized network without any fixed infrastructure. VANETs have received wide attention and numerous research issues have been identified in the recent time. The design and implementation of efficient and scalable routing protocols for VANETs is a challenging task due to...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Credit Card Fraud Detection Using Decision Tree for Tracing Email and IP

    Credit card fraud is a wide-ranging term for theft and fraud committed using a credit card or any similar payment mechanism as a fraudulent source of funds in a transaction. The purpose may be to obtain goods without paying, or to obtain unauthorized funds from an account. Transactions completed with...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Analysis of AODV Over Increased Density and Mobility in Intelligent Transportation System

    Currently the area of VANET lacks in having some better designed algorithms to handle dynamic change and frequent disruption due to the high mobility of the vehicles. There are many techniques to disseminate messages across moving vehicles but they are all highly dependent on some conditions involving flow, density and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2012

    Using Mobile Agent Technology to Develop a Collaborative Product Lifecycle Oriented Architecture

    Today product development activities are becoming more and more agile, adaptable, and cost-effective. Multi-agent-based system technology has found wide applications in managing company's information. This paper applies Multi-mobile-agent technology in developing a collaborative architecture for product lifecycle. By adopting the Aglets mobile agent platform, a generic platform has been developed...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Probabilistic Checkpointing Protocol to Sensor Network Fault-Tolerant

    A wireless sensor network WSN is a collection of autonomous sensors nodes organized into a cooperative network. A sensor node transmits the data quantity to the sink. Indeed, a failed sink may abort the overall mission of the network. Due to their crucial functions, sinks must be designed and maintained...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Study of Face Recognition Approach Based on Similarity Measures

    Detecting the similarity of face image aims to determine the image of a face for verification purpose of documents such as passport, driving license, ID cards, etc. Similarity measures are essential to solve many pattern recognition problems such as classification, clustering, and retrieval problems. There are efforts in finding the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Enhancing Packet-Level Forward Error Correction for Streaming Video in Wireless Networks

    Forward Error Correction (FEC) is a common error control technique in which the streaming video is protected by adding redundant data to the encoded bitstream such that the original source information can still be recovered in the event of errors or losses. Based on the information on the video content...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Modelling of VoIP Based Tele-Teaching System: A Petri Net Based Approach

    In this paper, the authors propose an algorithm called interactive group synchronization to reduce the chance of audio speech overlapping in VoIP based conferencing. They also extend the capability of colored petri nets by introducing time parameter in it. The propose TCPN (Time Colored Petri Nets) tool is applied here...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    FIDRS: A Novel Framework for Integrated Distributed Reliable Systems

    In this paper, the authors represent a new framework for integrated distributed and reliable systems. In the proposed framework they have used three parts to increase satisfaction and performance of this framework. At first, they analyze previous frameworks related to integrated systems, then represent new proposed framework in order to...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Design and Implementation of Multitier Authentication Scheme in Cloud

    The purpose of this paper is to present the design of a secure and more advanced authentication scheme for executing secure financial transactions over Internet. There has been continuous change in technology day by day, so security mechanisms like authentication schemes are also required to be updated. The security measures...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    A Novel Technique Based on Node Registration in MANETs

    In ad hoc network communication links between the nodes are wireless and each node acts as a router for the other node and packet is forward from one node to other. This type of networks helps in solving challenges and problems that may arise in every day communication. Mobile Ad...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    New Capabilities of Visual Cryptography

    Visual Cryptography Schemes (VCS) consider the problem of encrypting and sharing images (printed text, hand written notes, pictures, etc.) in a perfectly secure way which can be decrypted directly by the human visual system. A k out of n VCS for is a technique by which a Secret Image (SI)...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Snapshot Based Virtualization Mechanism for Cloud Computing

    Virtualization in cloud computing has been the latest evolutionary technology in current applications of various industries and IT firms are adopting cloud technology. The concept of cloud computing was introduced long back. Since its inception there have been many number of new innovations implemented by different experts and researchers etc....

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    On Web Services Based Cloud Interoperability

    Cloud Computing is a paradigm shift in the field of Computing. It is moving at an incredible fast pace and one of the fastest evolving domains of computer science today. It consist set of technology and service models that concentrates on the internet base use and delivery of IT applications,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    A CDMA Based Scalable Hierarchical Architecture for Network-On-Chip

    A Scalable hierarchical architecture based Code-Division Multiple Access (CDMA) is proposed for high performance Network-on-Chip (NoC). This hierarchical architecture provides the integration of a large number of IPs in a single on-chip system. The network encoding and decoding schemes for CDMA transmission are provided. The proposed CDMA NoC architecture is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    A Stable Distributed Clustering Algorithm for Mobile Adhoc Networks

    Mobile Ad hoc NETworks (MANET) are distributed systems which consist of several mobile nodes; they do not include predetermined topology and have no concentrated control. The nodes connect wirelessly by the approach in which they decide themselves. To access the development in the MANET, an approach should be found such...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Towards Identification and Recognition of Trace Associations in Software Requirements Traceability

    In the field of software engineering, requirements traceability is becoming a dynamic area of research. Producing numerous artifacts is crucial activity to maintain and yield high quality software. These artifacts are created and generated throughout the lifetime of software development, and are highly interrelated where the impact of any change...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Context-Awareness for Service Oriented Systems

    Today, service oriented systems need to be enhanced to sense and react to user's context in order to provide a better user experience. To meet this requirement, Context-Aware Services (CAS) has emerged as an underling design and development paradigm for the development of context-aware systems. The fundamental challenges for such...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Cryptanalysis of a Public-Key Cryptosystem Using Lattice Basis Reduction Algorithm

    The authors considered cryptanalysis of a knapsack-type public key cryptosystem. This cryptosystem uses a combination permutation algorithm in the encryption phase to avoid the low density attack by keeping the density high. This cryptosystem is vulnerable to LLL-lattice basis reduction algorithm, since it uses a super-increasing sequence as a private...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    A Comparison of Various Edge Detection Techniques Used in Image Processing

    In this paper the important problem is to understand the fundamental concepts of various filters and apply these filters in identifying a shark fish type which is taken as a case study. In this paper the edge detection techniques are taken for consideration. The software is implemented using MATLAB. The...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Real-Time Covert Communications Channel for Audio Signals

    Covert communications channel is considered as a type of secure communications that creates capability to transfer information between entities while hiding the contents of the channel. Multimedia data hiding techniques can be used to establish a covert channel for secret communications within a media carrier. In this paper, a high-rate...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Software Defect Prediction Models for Quality Improvement: A Literature Study

    In spite of meticulous planning, well documentation and proper process control during software development, occurrences of certain defects are inevitable. These software defects may lead to degradation of the quality which might be the underlying cause of failure. In today's cutting edge competition it's necessary to make conscious efforts to...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    SAHR: Swarm Adaptive Hybrid Routing Protocol for Mobile Ad hoc Networks

    The nodes in the Ad hoc networks are independent and well structured. The authors know that a couple of nodes can interact with one another, if they have entered into the opponent transition region. For this purpose wireless means is being utilized by the nodes. The tiniest creature in the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Prevention of Attacks Under DDoS Using Target Customer Behavior

    The possibility of sharing information through networking has been growing in geometrical progression. In this connection it is to be noted network attacks, in other words, DDoS attacks also are growing in equal proportion. Sharing of information is being carried out by means of server and client. The client requests...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Internet Intrusion Detection System Service in a Cloud

    Intrusion Detection Systems (IDS) have been used widely to detect malicious behaviors in network communication and hosts. It is defined as a computer network system to collect information on a number of key points, and analyze this information to see whether there are violations of network security policy behavior and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Enhanced ATM Security System Using Biometrics

    Because biometrics-based authentication offers several advantages over other authentication methods, there has been a significant surge in the use of biometrics for user authentication in recent years. In this paper the existing security of the ATM (Automated Teller Machine) system has been improved by integrating the fingerprint of the user...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Link Budget Analysis in the Network Designed Mobile WiMAX Technology in the Territory of the Urban Area of the City of Gjakova

    Wireless communication has now entered the second century of its use and has valuable merits of improving the quality of life of all mankind. Technologies for wireless and mobile communications are replaced every 2-3 years. The current version of the protocol provides Internet access up to 40 Mbps and this...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    Service Oriented Architecture Role in the Comprehensive Systems Integration

    Today, any organization or economic enterprise, a method for systems integration application uses its collection and therefore can never found a unique method that can meet the needs of system integration is in all organizations. With a proposed solution to the issue of pay. Thus, for application integration systems should...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2012

    A Trust-Based Security Mechanism for Nomadic Users in Pervasive Systems

    The emergence of network technologies and the appearance of new varied applications in terms of services and resources, have created new security problems for which existing solutions and mechanisms are inadequate, especially problems of identification and authentication. In a highly distributed and pervasive system, a uniform and centralized security management...

    Provided By International Journal of Computer Science Issues