International Journal of Computer Science Issues

Displaying 1-40 of 905 results

  • White Papers // Dec 2014

    A Multi-Agent Systems Engineering for Semantic Search of Reuse Software Components

    In Component-Based Software Development (CBSD) approach, the searching and retrieving of accurate reusable software components that are stored in large, distributed and heterogeneous-structured repositories is a tedious and time consuming process. This paper presents the design and implementation of ontology-based multi-agent software component retrieval system using semantic and structural formalism....

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2014

    Development of a Mobile Service on a WiFi Network for the Evaluation of Mathematical Skills

    In this paper, the authors describe the design and development of a mobile service to make practical assessments of different topics of mathematics in order to improve the skills of students in high school education. This tool has the ability to create user accounts for participants, as well as storing...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2014

    An Analytical Comparison between Applying FFT and DWT in WiMAX Systems

    Discrete Wavelet Transform (DWT) has advantages over Fast Fourier Transform (FFT) in analyzing signals containing sharp spikes. DWT processes data at different scales. If the people look at the signal with a large window, they would notice big features. Similarly, if they look at the signal with a small window,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2014

    A Delay Aware Routing Protocol for Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) consist of sensor nodes which can be deployed for various operations such as agriculture and environmental sensing, wild life monitoring, health care, military surveillance, industrial control, home automation, security etc. Quality of Service (QoS) is an important issue in Wireless Sensor Networks (WSNs) and providing QoS...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2014

    Securing VoIP Systems: A QoS-Oriented Approach

    Voice over IP (VoIP) is a communication technology allowing voice traffic transmission as data packets over a private or a public IP network. VoIP allows significant benefits for customers and service providers including cost savings, services integration, and systems extensibility. Nevertheless, the VoIP technology suffers from many hurdles such as...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2014

    The Impact of Capability Level on Maturity of Business Intelligence Initiatives

    In this paper, the authors propose enterprise business intelligence maturity model that involves thirteen capacity factors, which are (strategic management, performance measurement, balanced scorecard, information quality, data warehouse, master data management, metadata management, analytical, infrastructure, knowledge management, people, organization culture and change management). This paper is to investigate how does...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2014

    Predicting Sales In E-commerce Using Bayesian Network Model

    An area of substantial research is that of predicting product sales, such as books, video games and movie tickets. There are a number of prediction models that have been used to predict future sales however these models attempt to solve the problem by making assumptions. These models assume that independent...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2014

    Revisiting Security Ontologies

    Significant innovations in virtualization and distributed computing as well as improved access to high-speed Internet have induced interest in cloud computing. Contemporary exploration of all stages of service models clearly proves the immense significance of \"Security in cloud computing\", which being as obtuse as it is pertinent, demands attention. An...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Applying GIS Concepts to a Pervasive Game: Spatiotemporal Modeling and Analysis Using the Triad Representational Framework

    Given pervasive games that maintain a virtual spatiotemporal model of the physical world, game designers must contend with space and time in the virtual and physical. Previous papers on pervasive games have partially contended with these representations, but an integrated conceptual model is lacking. Because they both make use of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Oscillation Characteristics of the Multi-stage Learning for the Layered Neural Networks and Its Analysis

    In this paper, the authors propose an efficient learning method for the layered neural networks based on the selection of training data and input characteristics of an output layer unit. The multi-stage learning method proposes by the authors for the function approximation problems of classifying learning data in a phased...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    GINS: Dynamic Emissive Location-Based for Underwater Sensor Networks

    Due to collect and monitor exploration of natural location resources which was difficult to acquire the location without Global Position System (GPS) in the underwater. However, there are something research was used Inertial Navigation System (INS) to location, but the INS accuracy degrades over time that the issue will be...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    The Use of Big Data in Education

    In this paper, the authors will see the use of big data and open data in education. Also how big amount of data can be used and extracted to something useful, helping the industry to raise their profits. This paper is a study on the use of big data in...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Testing Security Policies for Distributed Systems: Vehicular Networks as a Case Study

    Due to the increasing complexity of distributed systems, security testing is becoming increasingly critical in insuring reliability of such systems in relation to their security requirements. To challenge this issue, the authors rely in this paper on model based active testing. In this paper, they propose a framework to specify...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    QoS Safety Protocol Analysis in FHAMIPv6/MPLS/Diffserv Integration and Load Balancing Algorithm

    One of the most important aspects to consider in order to provide quality services in an ad hoc network is the security. In the integration FHAMIPv6/MPLS/DiffServ and congestion algorithms, the authors analyses QoS but do not consider the QoS safety. The security issue is essential for not degrade QoS. This...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Validating Predictive Performance of Classifier Models for Multiclass Problem in Educational Data Mining

    Classification is one of the most frequently studied problems in data mining and machine learning research areas. It consists of predicting the value of a class attribute based on the values of other attributes. There are different classifications models were proposed in Educational Data Mining (EDM) and it is used...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Implementation of End-to-End QoS Mapping Scheme on SCIS WiFi Network

    For developing countries, wireless networks seem to be the available alternative for providing affordable telecommunications services. In Iraq, the main governmental wireless Internet service provider is SCIS Company. It adopts WiMAX and WiFi wireless networks. Considering Quality of Service (QoS) as an indicator of network performance, it is a challenge...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Securing Data from Collusion Black Hole Attack Using Optimized Link Source Routing Protocol for MANET

    In this paper, a new algorithm for the selection of MultiPoint Relays (MPR) in Optimized Link State Routing protocol (OLSR) is proposed. OLSR is a routing protocol which could reduce the overhead of control messages by selecting MPRs. So, the number of MPRs is a key for the performance of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    A Knowledge Management Framework Using Business Intelligence Solutions

    The business environment, as a whole, was changed. It became more dynamic and more complex. Most organizations across the world have realized that in this rapidly changed environment, there is a strong need to become globally competitive and more interactive with the customers. The survival guide to competitiveness is to...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Influence of Mobile Device Categories on the Usability of Mobile Website Categories

    In this paper, the authors investigate the influence of mobile device categories on the usability of mobile website categories. The mobile website categories investigated were, news, search, service, portal, and media sharing website categories. And the mobile device categories used were, Touch Screen Mobile Phones (TSMP), Non-Touch Screen Mobile Phones...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Eye with Intelligence Connecting CCTV to Big Data, Hadoop and R

    Security, an abstraction which creates a virtual boundary and gives the sense of separation between the asset and the threat. It provides a layer of protection to the asset by encapsulating it and just making visible the necessary details to the outside world. In this paper, the authors are trying...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Web Service Security Overview, Analysis and Challenges

    The Web Services (WS) technology became the reference architecture during the last few years for the integration of heterogeneous systems. As it is now-a-days critical for business to make applications communicate over the internet. WS has take essential position for building and integrating e-business applications and to allow information system...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Spectrum Sensing for Cognitive Radio Users using Constant Threshold Range in Energy Detector

    Spectrum Sensing has an important role in Cognitive Radio Network (CRN). Different methodologies have been proposed in the literature for spectrum sensing. Energy detector method is more practical and less in complexity. This paper presents analysis of energy detection algorithm in different scenarios with different parameters to detect presence or...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Study on Secure Cloud Computing with Elliptic Curve Cryptography

    Cloud computing plays a major role by providing different resources in the form of web services like tax calculation web service, stock information web service, e-banking web service etc. But the authors can rely on cloud computing only when these web services are really secure enough to use. In this...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    A New Viewpoint to Database and Data Using Physics Concepts

    A modern tool has been introduced in this paper to researchers by definition of new concepts and approaches in order to optimize performance of databases. Although this is not going to argue that optimization of concepts like a better accessibility is impossible by the available tools, the main purpose is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Towards Gas Density Measurement: Design and Implementation of the Application-Oriented WSN

    Wireless Sensor Network (WSN) provides an effective real-time monitoring approach. A design and implementation of WSN is introduced in this paper, which is applied to concentration measurement of hazardous gas. A hardware platform solution with compatibility and scalability is proposed in the paper. The customized communication protocol and applications oriented...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    Facebook Page Spam Detection using Support Vector Machines based on n-gram Model

    With social networks like Facebook, twitter reaching to the common masses, these have become the best target for spammers. The newest way to mislead and fraud viewers is page spam. Viewers are deceived to click on links to spam their connections, redirect to a fraudulent business or spread wrong information...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2014

    A Review of the Problems and Impacts Related to Network Voids in Wireless Sensor Networks

    In this paper, an exploratory study has been conducted to understand the various aspects of the network void problem. This paper provides insights into multiple research questions, which include how and why each void problem occurs. The authors have covered ten void problems (i.e., coverage voids or holes, routing voids...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    Performance Evaluation of Three Node Tandem Communication Network Model With Feedback for First Two Nodes Having Homogeneous Poisson Arrivals

    In this paper, the authors introduced the three node communication model with feedback for the first and second nodes assuming where every arrival makes homogeneous Poisson process one of the possible decisions by forwarding to the next node or to return back to nodes without taking service. Assuming such a...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    Comparison of PBRR Scheduling Algorithm with Round Robin and Heuristic Priority Scheduling Algorithm in Virtual Cloud Environment

    While considering the virtual cloud environment and various terms associated with it resource provisioning and load balancing are the main areas where research work has been going on at vast pace. Here the authors will discuss the various things related to the cloud environment. Their paper is to compare the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    Algorithmic Solution to Reduce Storage Overhead On Cloud Based System

    Cloud computing is a technology that provide on-demand services namely storage-as-a-service, platform-as-a-service etc. over the internet via cloud vendors from the market to the user. Cloud computing allows utilization of the services regardless of the installation and maintenance problems to the users. Storage of data on single local machine or...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    Email Filtering and Analysis Using Classification Algorithms

    With the various developments that are taking place in the field of technology especially in the communication domain, there are a plethora of malpractices that are being practiced to hinder the users` chores. Most of these practices can be observed in the email account of a user. Any internet user...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    FHAMIPv6/AHRA vs FHAMIPV6/AODV

    In order to support the FHMIPv6 protocol in an ad-hoc network, the authors introduced a series of changes in the source code, they modified the ability to recognize and process messages of the intermediate nodes during the registration process, so that messages were successfully transmitted from source to destination. The...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    Digital Educational Resource to Support the Computer Networks Course

    In this paper, the authors present an educational game developed in three dimensions using software for modeling and animation (blender). The thematic that this development encompasses aims at providing students of computer networks with a tool that helps them to have a more meaningful learning in the process that involves...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    A Literature Review and Comparative Analyses on SQL Injection: Vulnerabilities, Attacks and Their Prevention and Detection Techniques

    SQL injection is a technique that exploits a security vulnerability occurring in the database layer of an application. The attack takes advantage of poor input validation in code and website administration. It allows attackers to obtain unauthorized access to the back- and database to change the intended application generated SQL...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    An Efficient Protective Layer Against SQL Injection Attacks

    In this paper, the authors present a detailed discussion on different SQL injection attacks and their prevention technique. In addition, they proposed a new scheme for prevention of SQL injection attack, which consist of three blocks or three tier architecture: the clients, the application server and the database server. Their...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    Performance Analysis of LTE Physical Layer Based on 3GPP-Release-8

    Long Term Evolution (LTE) is the last step towards the 4th generation of cellular networks. This revolution is necessitated by the unceasing increase in demand for high speed connection on LTE networks. This paper mainly focuses on performance evaluation of LTE physical layer to study and analysis the effect of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    Performance Evaluation of Some Routing Protocols Using TCP Traffic Types in Mobile Ad Hoc Networks

    Routing is a critical issue in a Mobile Ad-hoc NETwork (MANET). The most famous MANET routing protocols are AODV, DSDV, DSR and AOMDV. Although the performance evaluation of these routing protocols have been extensively simulated, most of the researchers are focusing on the User Datagram Protocol (UDP) traffic type supposing...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    Performance Evaluation of HEVC Over Broadband Networks

    High efficiency video coding is the current trend setting standard for coding and transmission of video content. This standard has brought in many improvements over its predecessor H264 standard. In this paper, performance evaluation of transmitting HEVC content over the simulated network environment for disaster and calamity stricken area has...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    A Survey of VPN Security Issues

    Recently secure access to the private sources is considered as of the essential needs. Thus, one of the most efficient and cost-effective ways for granting secure access needs from far path in the organizations is the use of VPN. Data security plays a crucial role in modern times; most business...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2014

    Streaming Algorithm For Multi-path Secure Routing in Mobile Networks

    Mobile Ad hoc NETworks (MANETs) have a self-organizing network architecture, where a set of mobile nodes with wireless network interfaces may form a temporary network without any infrastructure. The characteristic features of ad hoc networks are dynamic topology, lack of infrastructure, the compounds of variable capacity, etc., which are the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Energy Efficient Security Preserving VM Live Migration in Data Centers for Cloud Computing

    Virtualization is an innovation that has widely been utilized in modern data centers for cloud computing to realize energy-efficient operations of servers. Virtual Machine (VM) migration brings multiple benefits such as resource distribution and energy aware consolidation. Server consolidation achieves energy efficiency by enabling multiple instances of operating systems to...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Semantic Service Composition With QoS End -To- End Constraints Via AND/OR Graphs

    In this paper, the authors present AND/OR graphs as a unifying framework for semantic service composition that considers users QoS constraints. The main virtues of this representation among others are its ability to express semantic inference and to deal with QoS constraints from different perspectives. In addition, it correctly handles...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Graphical Model Based for Robust Fault Diagnosis

    In this paper, robust Fault Detection and Isolation (FDI) design in nonlinear uncertain dynamic system, with chemical and thermodynamic phenomenon, is addressed. The methodology using a Bond Graph (BG) representation in Linear Fractional Transformation (LFT) form is shown to be a valuable tool for developing dynamic threshold generators and achieving...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Modify AODV Routing Protocol to Improve Motorway Surveillance System Performance

    This paper presents an algorithm to modify the Ad hoc On-demand Distance Vector (AODV) routing protocol in order to improve the routing performance in motorway surveillance systems. The proposed protocol has all the characteristics of the original AODV routing protocol since it follows all the steps of the route discovery...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Comparison Between Poissonian and Markovian Primary Traffics in Cognitive Radio Networks

    Cognitive Radio generates a big interest as a key cost-effective solution for the underutilization of frequency spectrum in legacy communication networks. The objective of this paper lies in conducting a performance evaluation of the end-to-end message delivery under both Markovian and Poissonian primary traffics in lossy Cognitive Radio networks. The...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Identification of Nominated Classes for Software Refactoring Using Object-Oriented Cohesion Metrics

    The production of well-developed software reduces the cost of the software maintainability. Therefore, many software metrics have been developed to measure the quality of the software design. Measuring class cohesion is considered as one of the most important software quality measurements. Unfortunately, most of approaches that have been proposed on...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Improving Performance of Distributed Data Mining (DDM) With Multi-Agent System

    Autonomous agents and multi-agent systems (or agents) and knowledge discovery (or data mining) are two of the most active areas in information technology. Ongoing research has revealed a number of intrinsic challenges and problems facing each area, which can't be addressed solely within the confines of the respective discipline. A...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    MVSDAP: A New Extensible, Modifiable and Secure Data Access Pattern for Layered Information Systems

    Nowadays, in software architecture especially in agile methodologies dynamicity, extendibility and modifiability are important challenges. In three layered architecture, plenty of patterns are provided for data access layer. In this paper, additional to secure access to data and dynamic validation controls, emphasis is on extendibility and modifiability of data access...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    A Novel Approach of Query Optimization for Genetic Population

    In relational database large information is maintained and organized so that user can get the desired information in predictable and reliable fashion through the query processing. Retrieving these results in timely manner is Query Optimization. Optimization is a process of choosing most efficient way to execute a SQL query. This...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    An Improved Authentication Scheme for Passport Verification Using Watermarking Technique

    The prominent problem in passport authentication is to authenticate the passport document for its owner. The critical factor of this authentication procedure is to establish a correspondence between Passport's photo and its owner. A passport document contains holder details in supplement to the holder's signature. The authors propose an authentication...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Design and Performance Evaluation of a New Irregular Fault-Tolerant Multistage Interconnection Network

    Inter-connecting processors and linking them efficiently to the memory modules in a parallel computer is not an easy task. Hence, an interconnection network that provides the desired connectivity and performance at minimum cost is required. The design of a suitable interconnection network for inter-processor communication is one of the key...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Mean Square Error Performance of OFDM Systems Against Signal to Noise Ratio Under Different Fading Channels

    The well known problem in an Orthogonal Frequency Division Multiplexing (OFDM) system is its sensitivity to frequency offset. Most of the coherent OFDM systems transmit pilot symbols on some of the subcarriers to estimate channel attenuation and also add a Cyclic Prefix (CP) to avoid inter carrier interference and inter...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Cloud Load Balancing Techniques : A Step Towards Green Computing

    Cloud computing is emerging as a new paradigm of large-scale distributed computing. It is a framework for enabling convenient, on-demand network access to a shared pool of computing resources. Load balancing is one of the main challenges in cloud computing which is required to distribute the dynamic workload across multiple...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    MC-CDMA Scheme in Wi-Fi Environment

    The combination of OFDM and Code Division Multiple Access (CDMA) is seen as an attractive and practical solution to enhance the throughput and/or robustness for future high-speed indoor WLANs. The multi-path Rayleigh channel represents a hostile environment for WLANs communication. So, the authors have proposed the MC-CDMA system to overcome...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    A Comparative Study on Performance Benefits of Multi-Core CPUs Using OpenMP

    Achieving scalable parallelism from general programs was not successful to this point. To extract parallelism from programs has become the key focus of interest on multi-core CPUs. There are many techniques and programming models such as MPI, CUDA and OpenMP adopted in order to exploit more performance. But there is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Mobility Metrics Estimation and Categorization for SNET Protocols

    In the performance assessment of an ad-hoc protocol, the protocol should be verified under genuine circumstances including, but not restricted to, an effective transmission range, inadequate buffer space for the storage of messages, illustrative data traffic models, and a mobility model. Deterioration of average speed as the simulation growths, a...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Using Petri Nets for Resource Management Modeling in the Operating Systems

    Nowadays, with advances in computer science and increase in processor speed, modeling methods have found extensive applications in industrial fields. Petri Nets are one of these modeling methods. Petri Nets are based on graph theory and are applied specifically for concurrent and asynchronous applications. As executable models, they are capable...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Fault Tolerance- Challenges, Techniques and Implementation in Cloud Computing

    Fault tolerance is a major concern to guarantee availability and reliability of critical services as well as application execution. In order to minimize failure impact on the system and application execution, failures should be anticipated and proactively handled. Fault tolerance techniques are used to predict these failures and take an...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    MPLS - A Choice of Signaling Protocol

    Multi Protocol Label Switching (MPLS) is a core networking technology that operates essentially in between Layers 2 and 3 of the OSI model; for this reason, MPLS has been referred to as operating at Layer 2.5. MPLS can overlay existing technologies such as ATM (Asynchronous Transfer Mode) or Frame Relay,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    A Study of Edge Detection Method for Different Climate Condition Images Using Digital Image Processing

    Human eye can sense different weather conditions as same as the sensor. The human eye gives good result. In this proposal work the six different edge detection methods are applied to analyze weather condition. In this paper the special kind of changes in the picture for different weather condition are...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Survey of Tolerant Network in Mobile Communication

    Tolerant networks are a class of emerging networks that experience frequent and long-duration partitions. These networks have a variety of applications in situations such as crisis environments and deep-space communication. In this paper, the authors study the problem of multicasting in TNs. Multicast supports the distribution of data to a...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Analysis of Quality of Service Performances of Connection Admission Control Mechanisms in OFDMA IEEE 802.16 Network Using BMAP Queuing

    In this paper, the authors consider a single-cell IEEE 802.16 environment in which the base station allocates subchannels to the subscriber stations in its coverage area. The subchannels allocated to a subscriber station are shared by multiple connections at that subscriber station. To ensure the Quality of Service (QoS) performances,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Modelling Efficient Process Oriented Architecture for Secure Mobile Commerce Using Hybrid Routing Protocol in Mobile Adhoc Network

    The proposed research paper presents a novel approach of process oriented architecture for secure mobile commerce framework using uniquely designed hybrid mobile adhoc routing protocols using reactive and proactive type in real time test-bed. The research paper discusses about deployment of mobile commerce which is one of the emerging trend...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Performance Based Novel Techniques for Semantic Web Mining

    The explosive growth in the size and use of the World Wide Web continuously creates new great challenges and needs. The need for predicting the users' preferences in order to expedite and improve the browsing though a site can be achieved through personalizing of the websites. Most of the research...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    A Review of QoS in Mobility Phillic Communication

    This particular outlook represents, in brief the recent & upcoming issues associated with QoS guarantee & mobility in communications. Moreover it also presents a brief context of QoS attributes & handling techniques thereby. Even more, it covers aspects of QoS fundamentals in deployment of mobility led approaches. There are different...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Cloud Computing and Its Applications in the World of Networking

    The paper discusses the most discussed topic nowadays 'Cloud computing'. Cloud computing is becoming a buzzword. The paper explains the concept, Services provided by cloud computing and different service providers. Also it works out how this technology can be harnessed to bring benefits to the challenges of the business, in...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Email Mining: A Review

    E-mail is one of the most widely used ways of written communication over the internet, and its traffic has increased exponentially with the advent of World Wide Web. The increase in email traffic comes also with an increase in the use of emails for illegitimate purpose. Phishing, Spamming, email bombing,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    A Generalized Framework of Privacy Preservation in Distributed Data Mining for Unstructured Data Environment

    The management of unstructured data is recognized as one of the major unsolved problems in the information industry and data mining paradigm. Unstructured data in computerized information that either does not have a data model and there are not easily usable by data mining. This paper proposes a solution to...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Data Optimization From a Multiple Species Network Using Modified SFLA(Shuffled Frog Leaping Algorithm)

    In this paper, the authors present a novel approach that uses inter-species sequences homology to connect the networks of multi species and possible more species and possible more species together with gene ontology dependencies in order to improve protein classification for research work. Proteins are involved in many for all...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Presentation an Approach for Scientific Workflow Distribution on Cloud Computing Data Center's Servers to Optimization Usage of Computational Resource

    In a distributed system Timing and mapping the priority of tasks among processors is one of the issues attracted most of attention to itself. This issue consists of mapping a DAG with a set of tasks on a number of parallel processors and its purpose is allocating tasks to the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    A Novel Chaotic Encryption Scheme Based on Pseudorandom Bit Padding

    Cryptography is always very important in data origin authentications, entity authentication, data integrity and confidentiality. In recent years, a variety of chaotic cryptographic schemes have been proposed. These schemes have typical structure which performed the permutation and the diffusion stages, alternatively. The random number generators are intransitive in cryptographic schemes...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Implementing an Expert Diagnostic Assistance System for Car Failure and Malfunction

    Applications in fault diagnosis are continuously being implemented to serve different sectors. Car failure detection is a sequence of diagnostic processes that necessitates the deployment of expertise. The Expert System (ES) is one of the leading Artificial Intelligence (AI) techniques that have been adopted to handle such task. This paper...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Performance Analysis of Various Routing Protocols for Motorway Surveillance System Cameras' Network

    The Motorway Surveillance System (MSS) is one of the most important technologies used to collect information about road conditions and then provide that collected information to motorway users. The routing in networks used by these systems is a critical task due to the highly dynamic environments. This paper presents performance...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    An Analysis of Internet Banking Security of Foreign Subsidiary Banks in Australia: A Customer Perspective

    Internet banking has been deployed more frequently over the past few decades to support and improve the operational and managerial performance within the banking industry. However, the security issues of confidentiality, integrity and privacy have become increasingly more serious concerns in Internet banking systems because of the potential negative impact...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Improving Accuracy of Authentication Process Via Short Free Text Using Bayesian Network

    The internet security problems are a crucial threat to all users in the cyber world. One of the important problems about internet security concerned with user classification and authentication. However, there are multiple components to classify and authenticate users. The first one is using username/password and the second method is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Survey of NoC and Programming Models Proposals for MPSoC

    The aim of this paper is to give briefing of the concept of network-on-chip and programming model topics on multiprocessors System-on-Chip world, an attractive and relatively new field for academia. Numerous proposals from academia and industry are selected to highlight the evolution of the implementation approaches both on NoC proposals...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Comparison of Routing Protocols for Locating Moving Object in Large Scale Cellular Wireless Sensor Network

    A Wireless Sensor Network (WSN) is ad hoc dense wireless network of small, low-cost Sensor Nodes (SN), which collect and disseminate sensed data with limited power sources. WSNs can be used in many applications, such as environmental monitoring and object tracking. Organizing network topology with energy efficient traffic can maximize...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Implementation & Throughput Analysis of Perfect Difference Network (PDN) in Wired Environment

    This paper is about Perfect Difference Network (PDN) which is an asymptotically optimal method for connecting a set of nodes into a Perfect Difference Network with diameter 2, so that any node is reachable from any other node in one or two hops. Network throughput is measured as the average...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Proposal of a New Block Cipher Reasonably Non- Vulnerable Against Cryptanalytic Attacks

    This paper proposes a new block cipher termed as "Modular Arithmetic based Block Cipher with Varying Key-Spaces (MABCVK)" that uses private key-spaces of varying lengths to encrypt data files. There is a simple but intelligent use of theory of modular arithmetic in the scheme of the cipher. Based on observed...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Semantic Malware Detection by Deploying Graph Mining

    Today, malware is a serious threat to the people society. Several researchers are studying detection and mitigation of malware threats. On the other hand malware authors try to use obfuscation techniques for evading detection. Unfortunately usual approach (e.g., antivirus software) use signature based method which can easily be evaded. For...

    Provided By International Journal of Computer Science Issues