International Journal of Computer Science Issues

Displaying 1-40 of 782 results

  • White Papers // Jan 2014

    VoIP versus VoMPLS Performance Evaluation

    Increasing number of Internet users forced them to use popular services, television and telephone, to use the Internet as a medium to reach their customers. Organizations are now applying VoIP and MPLS for providing the convergence of voice and data communications over single network infrastructure. VoIP (Voice over Internet Protocol)...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Information Security Modelling In an ELearning Environment

    The growth of information technology and communication has led the world to a dramatic change. This paper performs a research on the e-learning strategies involved in organizations, especially educational institutions. E-learning industry is poised to become one of the largest sectors in the world economy. A review into the literature...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Revealing a Novel Method for Detecting Positive and Negative Optimal Performance Association Rules in Very Large Databases Using BPSO

    Association rules mining is one of the useful data mining algorithm in presenting meaningful information through database. One of the important challenges for association rules mining is that; it might be extracted millions of rules which mostly are idol; furthermore current methods only seek positive rules which finding out the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Efficient Web Data Extraction Using Clusteringapproach in Web Usage Mining

    Web mining which is a type of data mining is used to extract web data from web pages. Web usage mining is used to record user behavior. These records are further used to extract data which helps in search engine optimization. In this research paper the authors propose an approach...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Secure Remote Access to Devices in a Smart Grid

    Seamless and efficient access to remote devices is imperative in the network operations of a smart grid. Traditional management mechanisms will have to be modified in order to sustain networks such as the ones utilized in the smart grid and the types of devices lying on them. Current multi-domain collaborative...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Change detection in Migrating Parallel Web Crawler: A Neural Network Based Approach

    Search engines are the tools for web site navigation and search. Search engines maintain indices for web documents and provide search facilities by continuously downloading web pages for processing. This process of downloading web pages is known as web crawling. In this paper the authors propose A neural network based...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Validation of Architecture of Migrating Parallel Web Crawler using Finite State Machine

    The process of downloading web pages is known as web crawling. In this paper the authors validate the architecture of migrating parallel web crawler using finite state machine. The method for migrating parallel web crawling approach will detect changes in the content and structure. Also domain specific crawling will yield...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Hierarchical Cluster-Based Routing Protocols for Wireless Sensor Networks - A Survey

    Hierarchical cluster-based routing protocols are considered as one of the most efficient routing protocols in Wireless Sensor Networks (WSN) due to its higher energy efficiency, network scalability, and lower data retransmission. In cluster-based routing protocols the network is divided into clusters each with a Cluster Head (CH) that is used...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Developing Web-Based Semantic Expert Systems

    Expert systems have provided solutions to different problems, from strategic planning of marketing to consulting in process reengineering. In general, the majority of studies published are based on advanced techniques of artificial intelligence, using specific languages or tools that require certain knowledge of reasoning processes to model information. With the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Fingerprint Classification Techniques: A Review

    A biometric is the automatic identification of an individual that is based on physiological or behavioral characteristics. Due to its security-related applications and the current world political climate, biometric is currently the subject of intense research by both private and academic institutions. Fingerprint is emerging as the most common and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    A Decentralized Fault Tolerant model for Grid Computing

    A current trend in high-performance computing is the use of large-scale computing grids. These platforms consist of geographically distributed cluster federations gathering thousands of nodes. At this scale, node and network failures are no more exceptions, but belong to the normal system behavior. Thus, grid applications must tolerate failures and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Secure Routing in Mobile Ad hoc Networks: Laurel verification based Node Selection Strategy

    As the nodes are self resourced in ad hoc networks, the denial of service as relay hop by any node is frequent. This is due to resource levels of that node are lower than the threshold, in another act the node may be irrational and selfish. In such cases the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Imposing Fairness in Electronic Commerce

    In the recent years, electronic commerce has gained much importance. Traditional commerce is slowly being replaced with ecommerce and more people tend to prefer doing their shopping online. One of the main reasons for this attraction is the convenience the e-commerce provides. Customers can choose from a lot of different...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    A Mobile Agent Approach for IDS in Mobile Ad Hoc Network

    Mobile ad hoc networks are a group of wireless computers, forming a communication network that has no predetermined structure. Its highly vulnerable to attacks due to the open medium dynamically changing network topology, co-operative algorithm and lack of centralized. The fact is that security is a critical problem. This paper...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Classification and Recognition of Fingerprints using Self Organizing Maps(SOM)

    Feature extraction and matching are important in Automatic Fingerprint Identification Systems (AFIS) in the field of biometric technology. In this work, a filter-based algorithm uses a bank of Gabor filters to capture local and global features in a fingerprint as a compact fixed length FingerCode. These fingercodes are matched using...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    A Proposed Cryptosystem Algorithm Based on Two Different Chaotic Systems (PCA2CS) for Securing the Colored Images

    In this paper, a proposed cryptosystem algorithm based on two different chaotic systems is presented. Chen's chaotic system and Henon chaotic system is used as different chaotic systems to obtain the authors' proposed encryption algorithm; in order to meet the requirements of secure image transfer. The proposed encryption algorithm will...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Exploring Technical Deployments of IPv6 on University LANs

    The current version of the Internet Protocol version 4 (IPv4) addressing scheme is officially exhausted. Internet Protocol version 6 (IPv6) is the next generation internet protocol proposed by the Internet Engineering Task Force (IETF) to supplant the current IPv4. Every device connected to the internet is expected to support this...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    University Communication at Intelligent Ad Hoc Network using SIP services

    The frantic nature of technological advances in the area of multimedia communications, compounded with the convergence of telecommunication and computer networks has led to the emergence of new class of applications sometime called ubiquitous computing or ambient intelligence. In this paper the authors present a project which converges with this...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Iris Detection and Normalization in Image Domain Based on Morphological Features

    The interface of computer technologies and biology is having a huge impact on society. Human recognition research projects promises new life to many security-consulting. Iris recognition is considered to be the most reliable biometric authentication system. Very few iris recognition algorithms were commercialized. The authors implemented a system that process...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    An Enhanced AODV Routing Protocol for MANETs

    In the last few years, many studies have been performed in MANETs, especially in unicast routing protocols. In this paper, a new routing protocol for Mobile Ad-hoc NETworks (MANETs) is presented; the proposed Power-Hop based Ad-hoc On-demand Distance Vector (AODV) is named PH-AODV, it uses the node power and the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    An Efficient Pipelined Technique for Signcryption Algorithms

    Signcryption algorithms are based on public key cryptography. The main advantage of signcryption algorithms is to provide both confidentiality and authenticity in one step. Hence, signcryption algorithms lower both communication and computation overheads. This reduction, in communication and computation overheads, makes signcryption algorithms more suitable for realtime applications than other...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2014

    Analysis the Impacts of Transmission Range of AODV & DSDV Ad-Hoc Network Protocols Performance over Mobile WiMAX Networks

    The IEEE 802.16 technology (WiMAX) is facing great challenges due to owning high mobility of mobile nodes, limited radio coverage of wireless devices, time varying nature of wireless medium. The transmission range of Base Station (BS) has a vital influence and must achieve the most economic case of energy in...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Conceptual Framework for Internet of Things' Virtualization via OpenFlow in Context-aware Networks

    A novel conceptual framework is presented in this paper with an aim to standardize and virtualize Internet of Things' (IoT) infrastructure through the deploying OpenFlow technology. The framework can receive e-services based on context information leaving the current infrastructure un-changed. This framework allows the active collaboration of heterogeneous devices and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Review of Software Reuse Processes

    Clients expect that enterprise software systems, which are continually growing in complexity, are of high quality, with reasonable price and have a short time to market. To find ways to meet with the increasing demands of business, software engineers are forced to find ways to streamline development process. Software reuse...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Cluster Based Data Transfer Strategy for Layered Wireless Sensor Network

    The paper develops a relatively different cluster based data transfer pattern directed to enhance the lifetime of a layered Wireless Sensor Network (WSN). The interactive information flow between layers appears to captivate the resurgence of new definitions in the process of routing and forge attractive corner stone's in communication networks....

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Data Hiding over Mobile Phones Using Socket Network Communication

    The mobile phone is considered as wireless means of communication produced by sophisticated modern technology. After expanding use of mobile phones, establishing hidden communication is an important subject of security that has gained increasing importance. Therefore need to adopt the technology more sophisticated and more secret and preserve the information,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Effect of WiMAX Networks on IPTV Technology

    The IEEE 802.16 technology (WiMAX) is a better alternative to 3G or wireless LAN networks for providing last mile connectivity by radio link due to its high data rates, low cost of deployment and large coverage area and ease of Use. With the IEEE 802.16 2005 mobility amendment, WiMAX promises...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    A Succinct Reflection on Data Classification Methodologies

    Classification is a data mining (machine learning) technique used to assign group membership to various data instances. Indeed there are many classification techniques available for a scientist wishing to discover a model for the user's data. This diversity can cause trouble as to which method should be applied to which...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Fuzzy Based Detection and Prediction of DDoS Attacks in IEEE 802.15.4 Low Rate Wireless Personal Area Network

    Detection and prediction mechanism against Distributed Denial of Service (DDoS) attacks is a critical component of any security system in which, these attacks can affect the availability of a node or an entire network. In this paper, the authors focus the detection and prediction mechanism against DDoS attacks in IEEE...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Enhanced Authentication Protocol EAP-TTLS Using Encrypted ECDSA

    The growing trend of wireless networks and risks associated with them has led to the development of authentication and application of stronger cryptographic methods to maintain a more robust security. This paper examined and compared two types of developed authentication protocols to provide an alternative method using strong cryptographic methods....

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Traceability and Data Support in SME Manufacturing

    Appropriate description and implementation of internal part traceability in manufacturing is a complex task. Accurate and real-time traceability from a part to a manufacture, storage, or transport issue is essential to efficient and high-quality operations. With the increasing amount of machine status and product quality information coming from the manufacturing...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    A New Trust Reputation System for E-Commerce Applications

    Robust Trust Reputation Systems (TRS) provide a most trustful reputation score for a specific product or service so as to support relying parties taking the right decision while interacting with an e-commerce application. Thus, TRS must rely on an appropriate architecture and suitable algorithms that are able to improve the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    A Survey on Using Data Mining Techniques for Online Social Network Analysis

    In this paper the authors take into consideration the concepts of using algorithmic and data mining perspective of Online Social Networks (OSNs), with special emphasis on latest hot topics of research area. There are several factors which has made the study of OSNs gain enormous importance by researchers. Few such...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Extending CertificateLess Authentication for Wireless Sensor Networks: A Novel Insight

    Security is quite challenging in Wireless Sensor Networks (WSN) because of their constrained nature in terms of resources such as limited memory, low processing power, limited bandwidth etc. Authentication in low power devices is still considered to be an expensive process. Certificateless signature is one of the approaches to facilitate...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Searching Encrypted Data on Cloud

    Encryption is an optimistic way to preserve the secrecy of the outsource data. On other hand, performing search operation on encrypted data is a complicated job. A lot of encryption techniques have been suggested by researchers to avoid improper usage of unstructured data on the cloud. But still by using...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Development of an Innovative Internet of Things Security System

    Recently, the concept of Internet of Things (IoT) has become the most popular term through the widespread of its applications such as greenhouse and telemedicine monitoring. Actually, building IoT systems requires an accurate infrastructure planning. Furthermore, management and security of these systems are considered as the most important challenges facing...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Performance and Proficiency Analysis for Cloud Storage

    Those who need to store larger amounts of data either for burst periods or for convenient synchronization. Between devices is currently looking at new ways of how to integrate cloud storage services into the data processing applications. The benefits (on-demand access and pricing, elasticity) and the drawbacks (reduced control, increased...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    A Study of Risk Management in Cloud Computing Bank

    Cloud computing apparently helps in reducing costs and providing the scheduling optimal level. In practice however it may confront the problem of unavailability of resources. Taking into consideration the cloud computing bank with its somehow commercial nature, the resources unavailability, such as liquidity risk, remains. In this paper, an attempt...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Dynamic Workload Performance Optimization Model for Multiple-Tenancy in Cloud Systems

    Cloud entails the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer. With this concept it's easy to reduce complexity for the clients as they don't have to handle installations and other...

    Provided By International Journal of Computer Science Issues

  • White Papers // Nov 2013

    Investigational Study of 7 Effective Schemes of Load Balancing in Cloud Computing

    With the exponential increase in demands of online applications and services, cloud computing has evolved as a boon in modern information technology. Built over the base of grid and distributed computing, cloud computing offers services to cater the dynamic needs of massive user base. However, with the novelty associated with...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Survey of Tolerant Network in Mobile Communication

    Tolerant networks are a class of emerging networks that experience frequent and long-duration partitions. These networks have a variety of applications in situations such as crisis environments and deep-space communication. In this paper, the authors study the problem of multicasting in TNs. Multicast supports the distribution of data to a...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Analysis of Quality of Service Performances of Connection Admission Control Mechanisms in OFDMA IEEE 802.16 Network Using BMAP Queuing

    In this paper, the authors consider a single-cell IEEE 802.16 environment in which the base station allocates subchannels to the subscriber stations in its coverage area. The subchannels allocated to a subscriber station are shared by multiple connections at that subscriber station. To ensure the Quality of Service (QoS) performances,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Modelling Efficient Process Oriented Architecture for Secure Mobile Commerce Using Hybrid Routing Protocol in Mobile Adhoc Network

    The proposed research paper presents a novel approach of process oriented architecture for secure mobile commerce framework using uniquely designed hybrid mobile adhoc routing protocols using reactive and proactive type in real time test-bed. The research paper discusses about deployment of mobile commerce which is one of the emerging trend...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Performance Based Novel Techniques for Semantic Web Mining

    The explosive growth in the size and use of the World Wide Web continuously creates new great challenges and needs. The need for predicting the users' preferences in order to expedite and improve the browsing though a site can be achieved through personalizing of the websites. Most of the research...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Optimized Energy-Aware Algorithm for Collaboration in Visual Sensor Networks

    Network lifetime is one of the critical performance parameters in Visual Sensor Networks. In order to avoid transmission of redundant information to the base station, it becomes necessary to select among the nodes in the neighboring region having the same area of coverage for data transfer. This paper presents an...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Implication of Secure Micropayment System Using Process Oriented Structural Design by Hash Chaining in Mobile Network

    The proposed system presents a novel approach of designing a highly secured and robust process oriented architecture for micro-payment system in wireless adhoc network. Deployment of any confidential transaction over dynamic nature of wireless adhoc network will strike a high amount of security challenges which is very difficult to identify...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Designing Debugging Models for Object Oriented Systems

    Bugs are inevitable in any software development life cycle. Most bugs are detected and removed in the testing phase. In software, the authors can classify bugs into two categories: bugs of different severity, bugs of different complexity. Prior knowledge of bug distribution of different complexity in software can help project...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Designing of RF Single Balanced Mixer With a 65 nm CMOS Technology Dedicated to Low Power Consumption Wireless Applications

    The present paper consists of designing a Single Balanced Mixer (SBM) with the 65 nm CMOS technology, this for a 1.9 GHz RF channel, dedicated to wireless applications. This paper shows; the polarization chosen for this structure, models of evaluating parameters of the mixer, then simulation of the circuit in...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    A Quantitative Study and Comparison of AODV, OLSR and TORA Routing Protocols in MANET

    Mobile Ad-hoc NETwork (MANET) is a collection of wireless mobile hosts forming a temporary network without the aid of any stand-alone infrastructure or centralized administration. Most of the proposed MANET protocols do not address security issues. In MANETs routing algorithm is necessary to find specific routes between source and destination....

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Analyzing the Complexity of Java Programs Using Object - Oriented Software Metrics

    Object-oriented technology has rapidly become accepted as the preferred paradigm for large-scale system design. With the help of this technology the authors can develop software product of higher quality and lower maintenance cost. It is evident that the available traditional software metrics are inadequate for case of object-oriented software, as...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Performance Evaluation of AODV and DSR With Varying Pause Time and Speed Time Over TCP and CBR Connections in VANET

    VANET (Vehicular Ad-hoc NETwork) is a new technology which has taken enormous attention in the recent years. Vehicular ad hoc network is formed by cars which are called nodes; allow them to communicate with one another without using any fixed road side unit. It has some unique characteristics which make...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Using Jquery With Snort to Visualize Intrusion

    The explosive growth of malicious activities on worldwide communication networks, such as the Internet, has highlighted the need for efficient intrusion detection systems. The efficiency of traditional intrusion detection systems is limited by their inability to effectively relay relevant information due to their lack of interactive/immersive technologies. Visualized information is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Network Threat Ratings in Conventional DREAD Model Using Fuzzy Logic

    One of the most popular techniques to deal with ever growing risks associated with security threats is DREAD model. It is used for rating risk of network threats identified in the abuser stories. In this model network threats needs to be defined by sharp cutoffs. However, such precise distribution is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Secured Distributed Cognitive MAC and Complexity Reduction in Channel Estimation for the Cross Layer Based Cognitive Radio Networks

    Secured opportunistic Medium Access Control (MAC) and complexity reduction in channel estimation are proposed in the Cross layer design Cognitive Radio Networks deploying the secured dynamic channel allocation from the endorsed channel reservation. Channel Endorsement and Transmission policy is deployed to optimize the free channel selection as well as channel...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Performance Evaluation of Statistical Approaches for Automatic Text-Independent Speaker Recognition Using Robust Features

    This paper introduces the performance evaluation of statististical approaches for Automatic-text-independent Speaker Recognition system. Automatic-text-independent Speaker Recognition system is to quickly and accurately identify the person from his/her voice. The study on the effect of feature vector size for good speaker recognition demonstrates that the feature vector size in the...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Security Analysis of Routing Protocols in Wireless Sensor Networks

    In this paper, the author describes briefly some of the different types of attacks on wireless sensor networks such as Sybil, HELLO, Wormhole and Sinkhole attacks. Then the author describes security analysis of some major routing protocols in wireless sensor network such as Directed Diffusion, TinyOS beaconing, geographic and Rumor...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Comparison of Routing Protocols for Locating Moving Object in Large Scale Cellular Wireless Sensor Network

    A Wireless Sensor Network (WSN) is ad hoc dense wireless network of small, low-cost Sensor Nodes (SN), which collect and disseminate sensed data with limited power sources. WSNs can be used in many applications, such as environmental monitoring and object tracking. Organizing network topology with energy efficient traffic can maximize...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Implementation & Throughput Analysis of Perfect Difference Network (PDN) in Wired Environment

    This paper is about Perfect Difference Network (PDN) which is an asymptotically optimal method for connecting a set of nodes into a Perfect Difference Network with diameter 2, so that any node is reachable from any other node in one or two hops. Network throughput is measured as the average...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Proposal of a New Block Cipher Reasonably Non- Vulnerable Against Cryptanalytic Attacks

    This paper proposes a new block cipher termed as "Modular Arithmetic based Block Cipher with Varying Key-Spaces (MABCVK)" that uses private key-spaces of varying lengths to encrypt data files. There is a simple but intelligent use of theory of modular arithmetic in the scheme of the cipher. Based on observed...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2012

    Semantic Malware Detection by Deploying Graph Mining

    Today, malware is a serious threat to the people society. Several researchers are studying detection and mitigation of malware threats. On the other hand malware authors try to use obfuscation techniques for evading detection. Unfortunately usual approach (e.g., antivirus software) use signature based method which can easily be evaded. For...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Energy-Aware Task Partitioning on Heterogeneous Multiprocessor Platforms

    Efficient task partitioning plays a crucial role in achieving high performance at multiprocessor platforms. This paper addresses the problem of energy-aware static partitioning of periodic real-time tasks on heterogeneous multiprocessor platforms. A Particle Swarm Optimization variant based on Min-min technique for task partitioning is proposed. The proposed approach aims to...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    An Efficient Clustered Multipath Routing to Improve Lifespan in WSN

    A wireless sensor network with a large number of tiny sensor nodes can be used as an effective way for gathering data in various environments. One of the significant challenges in the wireless sensor network is the energy saving and increasing the lifetime of the network. In order to increase...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Fast and Accurate Practical Positioning Method Using Enhanced-Lateration Technique and Adaptive Propagation Model in GSM Mode

    In this paper, the authors consider problem of positioning of mobile phones, different approaches were produced for these targets using GPS, WiFi, GSM, UMTS and other sensors, which exist in today smart phone sensors. Location awareness in general is emerging a tremendous interest in different fields and scopes. Position is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Fortification of Transport Layer Security Protocol With Hashed Fingerprint Identity Parameter

    Identity over the public links becomes quiet complex as Client and Server needs proper access rights with authentication. For determining clients identity with password Secured Shell Protocol or Public Key Infrastructure is deployed by various organizations. For end to end transport security SSL (Secured Socket Layer) is the de facto...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Traceability Method for Software Engineering Documentation

    Traceability has been widely discussed in research area. It has been one of interest topic to be research in software engineering. Traceability in software documentation is one of the interesting topics to be research further. It is important in software documentation to trace out the flow or process in all...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Performance Analysis of Receivers in WDM for Extended Reach Passive Optical Networks

    In this paper, the authors have investigated and analyzed the performance of receivers for different classes of WDM PON system for next generation Passive Optical Networks. The performance is analyzed using Manchester coding for different receivers using various data rates and various fibre distances at the optical network unit in...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Recycling RF Energy in the GSM-1800 Band

    In this paper, the authors present a study about the recuperation and the wireless transfer of the RF micro-energy in the waveband 1800 MHz -1900MHz. The extension of the telecommunication systems increasingly generates the electromagnetic waves in their environment at various frequencies and powers. This existing energy RF can be...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    A Survey Paper on Ant Colony Optimization Routing Algorithm for Selecting Multiple Feasible Paths for Packet Switched Networks

    ACO algorithms for datagram networks was given by Di Caro & Dorigo, in year 1996. Basic mechanisms in typical ACO routing algorithms is Ant-like agents are proactively generated at the nodes to find/check paths toward assigned destinations Ants move hop-by-hop according to a exploratory routing policy based on the local...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Transmitting Cryptographic Data Through Steganography

    Computers are being used worldwide. The internet connects the world as one. Cybercrime is a huge issue which can be resolved by some approaches. In this paper an approach is introduced to ensure the security of data. Steganography and cryptography are merged together in order to obtain a secure and...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    An Approach of Digital Image Copyright Protection by Using Watermarking Technology

    Digital watermarking system is a paramount for safeguarding valuable resources and information. Digital watermarks are generally imperceptible to the human eye and ear. Digital watermark can be used in video, audio and digital images for a wide variety of applications such as copy prevention right management, authentication and filtering of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Cloud Infrastructure Service Management - A Review

    The new era of computing called Cloud Computing allows the user to access the cloud services dynamically over the Internet wherever and whenever needed. Cloud consists of data and resources; and the cloud services include the delivery of software, infrastructure, applications, and storage over the Internet based on user demand...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    SNMP Based Network Optimization Technique Using Genetic Algorithms

    Genetic Algorithms (GAs) has innumerable applications through the optimization techniques and network optimization is one of them. SNMP (Simple Network Management Protocol) is used as the basic network protocol for monitoring the network activities & health of the systems. This paper deals with adding "Intelligence" to the various aspects of...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Energy Efficient Routing Protocol for MANET

    In recent years, many energy-efficient routing protocols have been proposed. However, very little efforts have been taken in studying the energy consumption of individual node, overhead and route maintaining issues. While not considering the design of energy efficient routing protocol, it may perform very worst than the normal routing protocol....

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Cognitive Approach Based User Node Activity Monitoring for Intrusion Detection in Wireless Networks

    Cognitive networks are the solution for the problems existing on the current networks. Users maintain integrity of the networks and user node activity monitoring is required for provision of security. Cognitive Networks discussed in this paper not only monitor user node activity but also take preventive measures if user node...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    RGB Technique of Intrusion Detection in IEEE 802.11 Wireless Mesh Networks

    According to the growth rate of wireless technology, Wireless Mesh Network (WMN) usage is significantly increased according to its advantages like inexpensive, fast and easy deployment. WMN have ability, easy to create mesh and provide internet access in a cost efficient manner in any type of area which is unable...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    An Optical/Wireless Integrated Approach to Provide Multiple Gateways in Wireless Mesh Networks

    Wireless Mesh Network is an application technology different from the traditional peer-to-peer wireless bridge; it provides the multi-hop and multi-path connection to form a wireless environment of MESH framework so that the occurrence of single point failure can be prevented. WMNs are to provide high bandwidth broadband service to a...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    A New Efficient Approach for Peer-To-Peer File Searching in Mobile Ad-Hoc Network

    The file searching efficiency and scalable property based on P2P (Peer-To-Peer) can be increased by reduction of message overhead. A single hop cluster based P2P file searching protocol for MANET (Mobile Ad-hoc Networks) focusing mainly over the reduction of message overhead. The searching processes are maintained by intra and inter...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    Maximising Wireless Sensor Network Life Time Through Cluster Head Selection Using Hit Sets

    The main aim of this paper is to propose a solution to improve the life time of the network by reducing the no of active nodes that participate in communication. Life time of a WSN is improved through optimizing communication and minimizing energy usage. One way of optimizing communication is...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    A Power Efficient, Oblivious, Path-Diverse, Minimal Routing for Mesh-Based Networks-on-Chip

    One of the most trade-off aspects in the design of NoCs is the improvement of the network performance, in terms of throughput and latency, while minimizing power consumption. 2D-mesh has become the preferred topology, since it offers low and constant link delay. This paper proposes a Power efficient, Oblivious, Path-diverse,...

    Provided By International Journal of Computer Science Issues

  • White Papers // Mar 2012

    PCLA: A New Public-Key Cryptosystem Based on Logarithmic Approach

    A public key cryptosystem is an asymmetric cryptosystem where the key consist of a public key and a private key. As the public key is public (known to all), can be used to encrypt the messages. The private key, kept as secret, can be used to decrypt the messages by...

    Provided By International Journal of Computer Science Issues