International Journal of Computer Science Issues

Displaying 1-40 of 960 results

  • White Papers // May 2015

    A Version of Parallel Odd-Even Sorting Algorithm Implemented in CUDA Paradigm

    Sorting data is an important problem for many applications. Parallel sorting is a way to improve sorting performance using more nodes or threads e.g. dividing data in more nodes and perform sorting in each node simultaneously or including more threads in process of sorting. It was experimented with one type...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2015

    Survey and Analysis of Searching Algorithms

    The data mining is vast field with application found in many areas such that science, industrial problems and business. The data mining system architecture has the several main components database, data warehouse or other information repositories, a server that extract the related data from repositories based on user request. The...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2015

    Proposed Active Noise Control System by Using FPGA

    Acoustic noise has become a serious problem as the number of industrial equipment such as engines, blowers, fans, compressors and transformers are increased. This paper proposed Active Noise Control (ANC) system by using Field Programmable Gate Array (FPGA) kit, it has been conducted through Least Mean Square (LMS) algorithm in...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2015

    Specification of Document Structure and Code Generation for Web Content Management

    In this paper, the authors present a simple model for declarative specification of the structure of documents for web-based content management. The proposed model allows the description of the hierarchical structure of multi-lingual documents, relationships and organization among documents of same type. They specify this model in a way that...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2015

    Study and Analysis of MAC/IPAD Lab Configuration

    In this paper, the authors proposed three virtualization modes: VMware, parallels and boot camping. The tradeoff of their testing is the hardware requirements. The main question is, among the three, which is the most suitable? The answer actually varies from user to user. It depends on the user needs. Moreover,...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2015

    AFDI: A Virtualization-based Accelerated Fault Diagnosis Innovation for High Availability Computing

    Fault diagnosis has attracted extensive attention for its importance in the exceedingly fault management framework for cloud virtualization, despite the fact that fault diagnosis becomes more difficult due to the increasing scalability and complexity in a heterogeneous environment for a virtualization technique. Most existing fault diagnoses methods are based on...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2015

    Fine-Grained Data Sharing Supporting Attribute Extension in Cloud Computing

    Attribute-Based Encryption (ABE) can be used for implementing fine-grained data sharing in cloud computing. However, most of the existing ABE schemes cannot realize attribute extension and provable security simultaneously. In this paper, the authors propose a fine-grained attribute-based data sharing system based on a hybrid encryption mechanism. A rigorous security...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2015

    Source Camera Identification for Mobile Phones using EXIF Data and Lens Features

    Source camera identification is the process of discerning which camera has been used to capture a particular image. This paper has focused on analyzing the relationship between mobile enabled cameras and the photographs. Mobile cameras are typically low-end cameras equipped on hand-held devices such as personal digital assistants and cellular...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2015

    An Enhanced Apriori Algorithm for Discovering Frequent Patterns with Optimal Number of Scans

    Data mining is wide spreading its applications in several areas. There are different tasks in mining which provides solutions for wide variety of problems in order to discover knowledge. Among those tasks association mining plays a pivotal role for identifying frequent patterns. Among the available association mining algorithms Apriori algorithm...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2015

    Rural Road Mapping Geographic Information System Using Mobile Android

    Road is a land transportation infrastructure which is used to connect one place to another. Since there are many roads in every province, it is a requirement for the government to conduct a road data collection. All this time the data collection is still conducted manually, therefore it is very...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2015

    Resource Reservation and Dynamic Admission Control for Distributed Multimedia Systems

    In this paper, the authors have proposed different approaches to achieve an admission control which can highly guarantee a Quality of Service (QoS) in distributed multimedia systems. Through this paper, they propose a new method for admission control in distributed multimedia systems namely a Feedback Control Architecture for Distributed Multimedia...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2015

    A Survey on Discovery of Distributed Denial of Service Attacks in Cloud

    Cloud computing is a paradigm which involves delivering hosted services over the internet and is predicted as the next generation of information technology architecture whose high potentiality enhances efficiency and reduces the costs. Although cloud computing is still considered as a young field, it has to deal with challenges such...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2015

    A Survey and Analysis on Recommendation System Algorithms

    In this paper, the authors proposed a comprehensive survey of methodologies and techniques used for recommendation systems. Recommendation shows significant part in many fields and has become a great attention in the field of research. Important factor for the searching and recommendation system is to recognize and recognize user's personalized...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2015

    Inter Organizational System Management for Integrated Service Delivery: An Enterprise Architecture Perspective

    Service sharing is a prominent operating model to support business. Many large inter-organizational networks have implemented some form of value added integrated services in order to reach efficiency and to reduce costs sustainably. Coupling service orientation with enterprise architecture paradigm is very important at improving organizational performance through business process...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2015

    Interoperable Distributed Data Warehouse Components

    Extraction, Transformation and Loading (ETL) are the major functionalities in Data Warehouse (DW) solutions. Lack of component distribution and interoperability is a gap that leads to many problems in the ETL domain, because these ETL components are tightly-coupled in the current ETL framework. Furthermore, complexity of components extensibility is another...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2015

    Generating Test Cases for E-Commerce Systems

    Software testing is the process of executing a program or system for finding any error or defect. Software testing strategy helps to convert test case designs into well-planned execution steps that will result in the construction of successful software. Software testing is any activity aimed at evaluating a capability of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2015

    Preserving Data in Cloud Computing

    Cloud computing is basically virtual pool of resources and it provides these resources to its users via internet as services who use them as when needed basis. On demands of user's data confidentiality and privacy the data is stored in cloud server as encrypted. Ideally, to maintain the security of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2015

    Joint Supplier Selection and Product Family Optimization in Supply Chain Design

    In order to incorporate the customer into the early phase of the product development cycle and to better satisfy customers' requirements. A need for effective integration of suppliers into the product value/supply chain will be a key factor for achieving this goal. Various decision making approaches have been proposed to...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2015

    Big Data: A Trouble or A Real Solution?

    Information today has gone from scarce to superabundant which brings immense new benefits but complementary big headache too. Users are surrounded only data. From where this data has flooded they hardly have time to track that. Today every bit of data is important and hence stored. The actual problem is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2015

    Overlapping and Non-overlapping Camera Layouts for Robot Pose Estimation

    In this paper, the authors study the use of overlapping and non-overlapping camera layouts in estimating the ego-motion of a moving robot. To estimate the location and orientation of the robot, they investigate using four cameras as non-overlapping individuals and as two stereo pairs. The pros and cons of the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2015

    A Survey on Clustering Algorithms and Complexity Analysis

    Clustering is a technique to group the data objects in such a way that the data objects of a group are similar to each other in that group and dissimilar to the data objects of other groups. It is being performed for the diverse purpose such as statistical data analysis...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2015

    Danger Theory Based Load Balancing (DTLB) Algorithm for Cloud Computing

    Cloud computing is one of the growing technology in computer science and an established way for sharing and accessing resources via internet. Load balancing is a method of reassigning the total load to the entity nodes of the collective system to create resource utilization useful and to improve the response...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2015

    Speaker Identification Using GMM with MFCC

    Speaker identification comes under the field of digital signal processing. The earliest systems were based on acoustic phonetics built for automatic speech recognition. For recognition part these systems used pattern matching and spectrum analysis. With recent advancement in technology voice recognition has become one of the efficient measure that is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2015

    Keyword Reduction for Text Categorization Using Neighborhood Rough Sets

    Keyword reduction is a technique that removes some less important keywords from the original dataset. Its aim is to decrease the training time of a learning machine and improve the performance of text categorization. Some researchers applied rough sets, which is a popular computational intelligent tool, to reduce keywords. However,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2015

    A Taxonomy of Scheduling Algorithms for Cloud Computing

    Cloud computing or simply rental computing, is a new technology currently being studied in the academic world and broadly categorized as Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS).Virtualization is the backbone of cloud computing and scalable, dynamic resources can be effectively managed using virtualization technology. It is possible to remap...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2015

    SQL TO Flink Translator

    Flink has become an effective approach to big data analytics in large cluster systems, and with increasing needs of analysis this data Flink has become an effective technique for analysis big data and the need of optimized translator for SQL (Structured Query Language) query is very necessary to build efficient...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2015

    Implementation of a Secure Data Mining Technology to Develop Aknowledge Based System in a Business Environment

    Because the advancement of the internet, several small and large firms have developed their dealings with customers to offer goods through the internet worldwide. Online credit card deception or no card present deception is gradually rampant in the latest years because that the credit-card is mainly exploited to demand payments...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2015

    High Performance Computing Achieved in Personal Computers

    In this paper, the authors is to provide an up to date survey of the technologies that enables high performance computing on general purpose personal computers. Multiprocessor or multicore computers are widely available these days along with graphical processing units installed for gaming and other high speed common computing. Researchers...

    Provided By International Journal of Computer Science Issues

  • White Papers // Dec 2014

    A Multi-Agent Systems Engineering for Semantic Search of Reuse Software Components

    In Component-Based Software Development (CBSD) approach, the searching and retrieving of accurate reusable software components that are stored in large, distributed and heterogeneous-structured repositories is a tedious and time consuming process. This paper presents the design and implementation of ontology-based multi-agent software component retrieval system using semantic and structural formalism....

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2014

    An Analytical Comparison between Applying FFT and DWT in WiMAX Systems

    Discrete Wavelet Transform (DWT) has advantages over Fast Fourier Transform (FFT) in analyzing signals containing sharp spikes. DWT processes data at different scales. If the people look at the signal with a large window, they would notice big features. Similarly, if they look at the signal with a small window,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2014

    A Delay Aware Routing Protocol for Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) consist of sensor nodes which can be deployed for various operations such as agriculture and environmental sensing, wild life monitoring, health care, military surveillance, industrial control, home automation, security etc. Quality of Service (QoS) is an important issue in Wireless Sensor Networks (WSNs) and providing QoS...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2014

    Securing VoIP Systems: A QoS-Oriented Approach

    Voice over IP (VoIP) is a communication technology allowing voice traffic transmission as data packets over a private or a public IP network. VoIP allows significant benefits for customers and service providers including cost savings, services integration, and systems extensibility. Nevertheless, the VoIP technology suffers from many hurdles such as...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2014

    The Impact of Capability Level on Maturity of Business Intelligence Initiatives

    In this paper, the authors propose enterprise business intelligence maturity model that involves thirteen capacity factors, which are (strategic management, performance measurement, balanced scorecard, information quality, data warehouse, master data management, metadata management, analytical, infrastructure, knowledge management, people, organization culture and change management). This paper is to investigate how does...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2014

    Predicting Sales In E-commerce Using Bayesian Network Model

    An area of substantial research is that of predicting product sales, such as books, video games and movie tickets. There are a number of prediction models that have been used to predict future sales however these models attempt to solve the problem by making assumptions. These models assume that independent...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2014

    Revisiting Security Ontologies

    Significant innovations in virtualization and distributed computing as well as improved access to high-speed Internet have induced interest in cloud computing. Contemporary exploration of all stages of service models clearly proves the immense significance of \"Security in cloud computing\", which being as obtuse as it is pertinent, demands attention. An...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2014

    Development of a Mobile Service on a WiFi Network for the Evaluation of Mathematical Skills

    In this paper, the authors describe the design and development of a mobile service to make practical assessments of different topics of mathematics in order to improve the skills of students in high school education. This tool has the ability to create user accounts for participants, as well as storing...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2014

    Constructing Sierpinski Gasket Using GPUs Arrays

    A fractal is a mathematical set that typically displays self-similar patterns, which means it is "The same from near as from far". Fractals may be exactly the same at every scale; they may be nearly the same at different scales. The concept of fractal extends beyond trivial self-similarity and includes...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2014

    A Context-Based Approach for Troubleshooting Database Problems

    In the area of database administration, when a hot critical problem suddenly occurs, an organization may lose large amounts of money for each hour of downtime. In such situations, the life of a DataBase Administrator (DBA) can become stressful because of the excessive pressure to solve problems quickly. Most of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2014

    From XML Schema to ODL Schema: Aggregation and Composition Transformation

    In this paper, the authors present an approach for transforming an existing XML schema in ODL (Object Definition Language) schemas, the authors chose oriented object database as a target database because there are many common characteristics between XML (eXtensible Markup Language) and object-oriented model, and they desire to have a...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2014

    Spatial-Temporal Outlier Sensing over Trajectory Data Streams

    The increasing capability to track moving vehicles in city roads enables people to probe the dynamics of a city. In this paper, the authors address the problem of detecting outliers and anomalies sources with trajectory data. Unlike existing anomaly detection methods, both spatial and temporal information are considered to find...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2010

    A New Approach to Supervise Security in Social Network Through Quantum Cryptography and Non-Linear Dimension Reduction Techniques

    Social networking sites such as Orkut, Tribe, or Facebook allow millions of individuals to create online profiles and share personal information with vast networks of friends - and, often, unknown numbers of strangers. Some of the information revealed inside these networks is private and it is possible that corporations could...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2011

    A Paper Presentation on Software Development Automation by Computer Aided Software Engineering (CASE)

    Now a day, system developers are faced to produce complex, high quality software to support the demand for new and revised computer applications. This challenge is complicated by strict resource constraints, forcing management to deploy new technologies, methods and procedures to manage this increasingly complex environment. Often the methods, procedures...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2011

    A Generalized Framework for Energy Conservation in Wireless Sensor Network

    A Wireless Sensor Networks (WSN) consists of spatially distributed autonomous sensors to cooperatively monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants. WSN contains a large number of nodes with a limited energy supply. A wireless sensor network consists of nodes that can communicate with...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2011

    A User-Centric PKI Based-Protocol to Manage FC2 Digital Identities

    The proliferation of e-services (e.g. e-commerce, e-health, e-government) within the emerging digital Identity Management Systems make Internet an undeniable convenient and powerful tool for users. However in this environment, users are required to manage several digital identities and a great number of personal data. As such, simplification of users' involvement...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2010

    Comprehensive Security Framework for Global Threats Analysis

    Cyber criminality activities are changing and becoming more and more professional. With the growth of financial flows through the Internet and the Information System (IS), new kinds of thread arise involving complex scenarios spread within multiple IS components. The IS information modeling and Behavioral Analysis are becoming new solutions to...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2010

    Shape-Adaptive Motion Estimation Algorithm for MPEG-4 Video Coding

    This paper presents a gradient based motion estimation algorithm based on shape-motion prediction, which takes advantage of the correlation between neighboring Binary Alpha Blocks (BABs), to match with the Mpeg-4 shape coding case and speed up the estimation process. The PSNR and computation time achieved by the proposed algorithm seem...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2010

    Performance Analysis of Software to Hardware Task Migration in Codesign

    The complexity of multimedia applications in terms of intensity of computation and heterogeneity of treated data led the designers to embark them on multiprocessor systems on chip. The complexity of these systems on one hand and the expectations of the consumers on the other hand complicate the designers job to...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2010

    Efficient Password-Typed Key Agreement Scheme

    In this paper, the authors will study Lee, Kim and Yoo, a verifier password typed key agreement scheme and demonstrate that the scheme is not secure. Then, the authors will propose an enhanced verifier typed key agreement scheme relied on Lee, Kim and Yoo scheme and demonstrate that the propose...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2010

    3D/2D Registration of Mapping Catheter Images for Arrhythmia Interventional Assistance

    RadioFrequency (RF) catheter ablation has transformed treatment for tachyarrhythmias and has become first-line therapy for some tachycardias. The precise localization of the arrhythmogenic site and the positioning of the RF catheter over that site are problematic: They can impair the efficiency of the procedure and are time consuming (several hours)....

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2010

    Image Compression Algorithms for Fingerprint System

    Fingerprint-which have been used for about 100 years are the oldest biometric signs of identity. Humans have used fingerprints for personal identification for centuries and the validity of fingerprint identification has been well established. In fact, fingerprint technology is so common in Human Identification that it has almost become the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2010

    Comparative Performance Investigations of Different Scenarios for 802.15.4 WPAN

    Brought up in 1990s, Wireless Personal Area Networks (WPANs) are the youngest members in the networking hierarchy. WPAN consists of number of nodes distributed in a given area, where a specific phenomenon must be measured and monitored. The construction of WPAN includes the physical deployment and the organization of its...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2010

    Policies and Economics of Digital Multimedia Transmission

    There are different Standards of digital multimedia transmission, for example DVB in Europe and ISDB in Japan and DMB in Korea, with different delivery system (example MPEG-2, MPEG-4).This paper describe an overview of Digital Multimedia Transmission (DMT) technologies. The economic aspects of digital content & software solution industry as a...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2010

    A Situational Approach for Web Applications Design

    The paper introduces a situational approach for Web applications design. the authors, first, define development situations and identify their specific characteristics through situational factors in projects. Using these situational factors, the most appropriate design process-model is selected. A meta-modeling technique is proposed that integrates the Map formalism for modeling existing...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2010

    Performance Evaluation of Two Reactive Routing Protocols of MANET Using Group Mobility Model

    Mobile ad-hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any stand-alone infrastructure or centralized administration. Mobile ad-hoc networks have the attributes such as wireless connection, continuously changing topology, distributed operation and ease of deployment. In this paper the authors have compared...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2011

    Noise Estimation Algorithms for Speech Enhancement in Highly Non-Stationary Environments

    A noise estimation algorithm plays an important role in speech enhancement. Speech enhancement for automatic speaker recognition system, Man - Machine communication, Voice recognition systems, speech coders, Hearing aids, Video conferencing and many applications are related to speech processing. All these systems are real world systems and input available for...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2011

    Fundamentals for the Automation of Object-Relational Database Design

    In the market there is a wide amount of CASE tools for the design of relational databases. Object-Relational DataBase Management System (ORDBMS) emerged at the end of the 90's to incorporate the object technology into the relational databases, allowing the treatment of more complex data and relationships than its predecessor....

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2011

    Chain-Chain Based Routing Protocol

    Wireless Sensor Network (WSN) is an emerging technology for monitoring physical world. WSNs consist of large numbers of sensor nodes operated by battery mostly in harsh environment. Thus energy conservation is a primary issue for organization of these sensor nodes. Another crucial issue is the data delivery time by sensor...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2011

    Analyzing the Impact of Scalability on QoS-Aware Routing for MANETs

    Mobile Ad hoc NETworks (MANETs) are self-created and self organized by a collection of mobile nodes, interconnected by multi-hop wireless paths in a strictly peer to peer fashion. Scalability of a routing protocol is its ability to support the continuous increase in the network parameters (such as mobility rate, traffic...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2011

    Data-Acquisition, Data Analysis and Prediction Model for Share Market

    Data-acquisition involves gathering signals from measurement sources and digitizing the signal for storage, analysis and presentation on a PC. Analysis and prediction is very necessary in today's market for the accurate utilization of funds at hand. For analysis, there has to a proper system where in the required data is...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2011

    A Multi-Modal Recognition System Using Face and Speech

    Nowadays Person Recognition has got more and more interest especially for security reasons. The recognition performed by a biometric system using a single modality tends to be less performing due to sensor data, restricted degrees of freedom and unacceptable error rates. To alleviate some of these problems the authors use...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2011

    A Survey on Data Mining and Pattern Recognition Techniques for Soil Data Mining

    Data mining has emerged as one of the major research domain in the recent decades in order to extract implicit and useful knowledge. This knowledge can be comprehended by humans easily. Initially, this knowledge extraction was computed and evaluated manually using statistical techniques. Subsequently, semi-automated data mining techniques emerged because...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2011

    IBook: Interactive and Semantic Multimedia Content Generation for eLearning

    Over the years the World Wide Web has seen a major transformation with dynamic content and interactivity being delivered through Web 2.0 and provision of meaning to Web content through the Semantic Web. Web 2.0 has given rise to special methods of eLearning; the authors believe that interactive multimedia and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2011

    A Novel Energy Efficient Mechanism for Secured Routing of Wireless Sensor Network

    Large-scale wireless sensor networks are highly vulnerable to attacks because they consist of numerous resource-constrained devices and communicate via wireless links. As wireless sensor networks are continue to grow, so they need an effective security mechanisms. As sensor networks may interact with sensitive data and/or operate in hostile unattended environments,...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2011

    Facial Expression Classification Based on Multi Artificial Neural Network and Two Dimensional Principal Component Analysis

    Facial expression classification is a kind of image classification and it has received much attention, in recent years. There are many approaches to solve these problems with aiming to increase efficient classification. One of famous suggestions is described as first step, project image to different spaces; second step, in each...

    Provided By International Journal of Computer Science Issues

  • White Papers // May 2011

    Determining Covers in Combinational Circuits

    In this paper the authors propose a procedure for determining 0 - or 1 - cover of an arbitrary line in a combinational circuit. When determining a cover they do not need Boolean expression for the line; only the circuit structure is used. Within the proposed procedure they use the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2010

    A Robust and Secure Methodology for Network Communications

    With the rapid development of a network multimedia environment, digital data can now be distributed much faster and easier. To maintain privacy and security cryptographic alone is not enough. In recent years, steganography has become attractive vicinity for network communications. In this paper, an attempt is made to develop a...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2010

    Application of Some Retrieved Information Method on Internet

    This paper compares several methods of information extraction on the internet. Today, internet has become a treasure of knowledge. Every year, thousands of pieces of different information are posted on the internet. So, extracted information on the internet for many different purposes has become an important problem today. Users may...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2010

    Computer Science in Education

    Computer Science or Computing Science (sometimes abbreviated CS) is the learning of the theoretical foundations of information and computation, and of practical techniques for their execution and application in computer systems. It is often described as the efficient study of algorithmic processes that produce, explain, and transform information. In this...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2010

    An Effective Solution to Reduce Count-to-Infinity Problem in Ethernet

    Ethernet is currently the most popular networking technology because of its high performance, low cost and ubiquity nature. Ethernets rely on the dynamic computation of a cycle-free active forwarding topology. For that it uses rapid spanning tree protocol. Unfortunately, it exhibits count-to-infinity problem that may lead to forwarding loops under...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2011

    A Security Framework for Buddy System Based MANET Address Allocation Scheme

    Security for dynamic address allocation service in Mobile Adhoc Networks is still an open issue. This paper proposes a security framework to thwart all possible attacks related to the buddy system based Distributed Dynamic Address Assignment Protocol (DDAAP) proposed by Thoppian and Prakash. The authors' proposed protocol called SHEAP (Secured...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2011

    Energy-Aware Performance Metric for AODV and DSDV Routing Protocols in Mobile Ad-Hoc Networks

    In Mobile Ad-Hoc NETworks (MANETs), mobile devices are equipped with power (energy). In order to utilize this energy equipped devices efficiently for transmission of data packets, many energy aware routing strategies are followed. As a key note to these routing strategies, the energy aware performance metrics are analyzed on two...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2011

    Design of an Energy Efficient Routing Protocol for MANETs Based on AODV

    Mobile Ad Hoc NETworks (MANETs) also called mesh networks are self-configuring networks of mobile devices connected by wireless links. MANETs are deployed in situations where there is no existing infrastructure, such as emergency search and rescue, military, etc. Each application has a different set of requirements. In this paper, the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2011

    Performance Evaluation of Efficient MAC in Mobile Ad Hoc Wireless Networks

    Wireless media is in very much demand because of high mobility of the users and establishing ad hoc network in emergency situations, which requires the designing of an efficient and priority based MAC (Medium Access Protocol) as a resource to support MANET (Mobile Ad hoc NETworks) adequately. There are various...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jul 2011

    Real Time Communication Capacity for Data Delivery in Wireless Sensor Networks

    Real-time applications are performance critical applications that require bounded service latency. In multi-hop wireless ad-hoc and sensor networks, communication delays are dominant over processing delays. Therefore, to enable real-time applications in such networks, the communication latency must be bounded. In this paper, the authors derive expressions of real-time capacity that...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    Encrypted IT Auditing and Log Management on Cloud Computing

    In this paper, the authors are conducting the investigation studies over the IT auditing for assuring the security for cloud computing. During this investigation, they are implementing working of IT auditing mechanism over the cloud computing framework in order to assure the desired level of security. In the IT auditing...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    Decentralized Lifetime Maximizing Tree With Clustering for Data Delivery in Wireless Sensor Networks

    A wireless sensor network has a wide application domain which is expanding everyday and they have been deployed pertaining to their application area. An application independent approach is yet to come to terms with the ongoing exploitation of the WSNs. In this paper, the authors propose a decentralized lifetime maximizing...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    Bandwidth Estimation in Mobile Ad-Hoc Network (MANET)

    In this paper, the authors presents bandwidth estimation scheme for MANET, which uses some components of the two methods for the bandwidth estimation: "Hello Bandwidth Estimation" & "Listen Bandwidth Estimation." This paper also gives the advantages of the proposed method. The proposed method is based on the comparison of these...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    Implementation of Re-Configurable Digital Front End Module of MIMO-OFDM Using NCO

    This paper focuses on FPGA implementation of reconfigurable Digital Front end MIMO-OFDM module. The modeling of the MIMO-OFDM system was carried out in MATLAB followed by Verilog HDL implementation. Unlike the conventional OFDM based systems, the Numerically Controlled Oscillators (NCO) is used for mapping modulated data onto the sub carriers....

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    A Detailed Study on Energy Efficient Techniques for Mobile Adhoc Networks

    The performance of wireless networks in the applications like transferring video files is subjected to dual constraints. Both minimization of power and other QoS requirements like delay, throughputs are have to be take care properly. Mobile Ad Hoc Networks are more perceptive to these issues where each mobile device is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Sep 2011

    Power Optimization in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) consist of a network of wireless nodes that have the capability to sense a parameter of interest. Sensors of various types are deployed ubiquitously and pervasively in varied environments such as office buildings, wildlife reserves, battle fields, mobile networks, etc. The sensed parameter is relayed to...

    Provided By International Journal of Computer Science Issues