International Proceedings of Computer Science and Information Technology

Displaying 1-13 of 13 results

  • White Papers // Jan 2013

    Evaluation of Routing Protocols in MANETs With Varying Network Scope

    Mobile Ad hoc NETworks (MANETs) consist of mobile wireless nodes connected in such a manner so that the communication between nodes is carried out without any centralized control. MANETs are self-organized and self-configurable network where mobile nodes move arbitrarily. Routing is a crucial issue in MANETs. Therefore, emphasis in this...

    Provided By International Proceedings of Computer Science and Information Technology

  • White Papers // Jan 2012

    A Novel Multi-Domain Hybrid Grooming Algorithm for Green IP Over WDM Network

    With the continuous expansion in scale and the growing Internet application, the sharply increasing electrical consumption of the network has become the bottleneck of the future networks development. Consequently, greening networks comes to the very important issue. Meanwhile, to ensure the scalability and robustness, the network is divided into multiple...

    Provided By International Proceedings of Computer Science and Information Technology

  • White Papers // Jan 2012

    Quantifying Software Reliability Attribute Through the Adoption of Weighting Approach to Functional Requirements

    High quality software can hardly to be assured. The Software project reports refer to failure rate of 71% due to exceeding budget or did not fulfill business requirements. Therefore, Quality attributes could not be achieved without certain requirements specified by project managers that should be exhibited within the system thus....

    Provided By International Proceedings of Computer Science and Information Technology

  • White Papers // Jan 2012

    Codeless Communication and the Shannon-Weaver Model

    Communication models based on the Shannon-Weaver communication model are the most commonly used, but efforts to transcend this model in other domains such as human communication are increasingly common. The semantic aspect of information remains an unsolved problem. This paper concentrates on a specific feature of the model: "Communication" between...

    Provided By International Proceedings of Computer Science and Information Technology

  • White Papers // Jan 2012

    Analysis of Monitoring Tools for Java Applications

    Runtime Monitoring is performed during the execution of software to detect anomalies in them. Currently several tools are available that help in developing the monitors. The authors analyze the prominent monitoring tools available for Java applications based on two features, the properties that can be monitored using these tools and...

    Provided By International Proceedings of Computer Science and Information Technology

  • White Papers // Jan 2012

    Using Architectural Patterns to Improve Modularity in Software Architectural Design

    Architecture plays an essential role to achieve software quality attributes. A wide variety of architectural patterns and tactics are introduced in the literature to design software architecture. Modularity relates to quality attributes such as maintainability, portability, reusability, interoperability and flexibility. Modularity also depends on complexity aspects such as coupling and...

    Provided By International Proceedings of Computer Science and Information Technology

  • White Papers // Jan 2012

    Integrating User Roles With Cloud Interfaces

    Cloud Computing is high on the agenda of the industry and research community from developer as well as from end-user perspective. The basic promise of cloud computing, that is, access to data anytime, anywhere, on any device is already a reality. However, for a successful user adoption of the cloud,...

    Provided By International Proceedings of Computer Science and Information Technology

  • White Papers // Jan 2012

    Automated Test Cases Generation From UML Sequence Diagram

    The most widely used class of automated testing tools leads senior software testers into software development blunders that a first year programming student shouldn't make. This paper proposed a novel approach to test the software at the initial stage itself so that it will be easy for software testers to...

    Provided By International Proceedings of Computer Science and Information Technology

  • White Papers // Jan 2012

    A Study on the Geo-Graphic Recognition for Handheld Computers and Smartphones in Location-Based Services

    This paper discusses the design and implementation of a geocomputing platform for the development of Location-Based Services(LBS) focusing mobile mapping. During the analysis, design, and implementation of the geocomputing platform, an effective method was identified for the real-time processing of geographic information acquired by a camera attached to a Handheld...

    Provided By International Proceedings of Computer Science and Information Technology

  • White Papers // Jan 2012

    Fusion of PCA and LDA Based Face Recognition System

    Face recognition is an important biometric because of its potential applications in many fields, such as access control, surveillance, and human-computer interface. In this paper, a system that fuses the output of a PCA and LDA based system is presented. The fusion is based on a set of rules. Both...

    Provided By International Proceedings of Computer Science and Information Technology

  • White Papers // Jan 2012

    Towards Scalability Issue in Ontology-Based Context-Aware Systems

    Ontology is a promising tool to organize and represent context information. It arguably is superior to other context models in formality of semantics and the ability to deduce new facts. However, further usage of ontology-based systems is hindered by the slow reasoning speed of ontology engines and the monolithism of...

    Provided By International Proceedings of Computer Science and Information Technology

  • White Papers // Jan 2011

    Performance Analysis on Energy Aware MAC Protocol for Wireless Sensor Network

    Wireless Sensor Network has been widely used in variety of fields. However, the energy problem has been a challenge in practical applications for WSN. The radio transmission consumes lots of energy in WSN as compare to other subsystems. The MAC protocol controls the radio transmission. Medium Access Control has a...

    Provided By International Proceedings of Computer Science and Information Technology

  • White Papers // Jan 2011

    A Greedy Routing Approach for Dense Mobile Ad Hoc Networks

    A Mobile Ad Hoc NETwork (MANET) is a self configuring network of mobile devices connected by a wireless link. In MANETs, because of node mobility and power limitations, the network topology changes, packet collision and bad channel condition, the data packet may fail to be delivered. Routing protocols therefore play...

    Provided By International Proceedings of Computer Science and Information Technology

  • White Papers // Jan 2013

    Evaluation of Routing Protocols in MANETs With Varying Network Scope

    Mobile Ad hoc NETworks (MANETs) consist of mobile wireless nodes connected in such a manner so that the communication between nodes is carried out without any centralized control. MANETs are self-organized and self-configurable network where mobile nodes move arbitrarily. Routing is a crucial issue in MANETs. Therefore, emphasis in this...

    Provided By International Proceedings of Computer Science and Information Technology

  • White Papers // Jan 2011

    Performance Analysis on Energy Aware MAC Protocol for Wireless Sensor Network

    Wireless Sensor Network has been widely used in variety of fields. However, the energy problem has been a challenge in practical applications for WSN. The radio transmission consumes lots of energy in WSN as compare to other subsystems. The MAC protocol controls the radio transmission. Medium Access Control has a...

    Provided By International Proceedings of Computer Science and Information Technology

  • White Papers // Jan 2011

    A Greedy Routing Approach for Dense Mobile Ad Hoc Networks

    A Mobile Ad Hoc NETwork (MANET) is a self configuring network of mobile devices connected by a wireless link. In MANETs, because of node mobility and power limitations, the network topology changes, packet collision and bad channel condition, the data packet may fail to be delivered. Routing protocols therefore play...

    Provided By International Proceedings of Computer Science and Information Technology

  • White Papers // Jan 2012

    A Novel Multi-Domain Hybrid Grooming Algorithm for Green IP Over WDM Network

    With the continuous expansion in scale and the growing Internet application, the sharply increasing electrical consumption of the network has become the bottleneck of the future networks development. Consequently, greening networks comes to the very important issue. Meanwhile, to ensure the scalability and robustness, the network is divided into multiple...

    Provided By International Proceedings of Computer Science and Information Technology

  • White Papers // Jan 2012

    Quantifying Software Reliability Attribute Through the Adoption of Weighting Approach to Functional Requirements

    High quality software can hardly to be assured. The Software project reports refer to failure rate of 71% due to exceeding budget or did not fulfill business requirements. Therefore, Quality attributes could not be achieved without certain requirements specified by project managers that should be exhibited within the system thus....

    Provided By International Proceedings of Computer Science and Information Technology

  • White Papers // Jan 2012

    Codeless Communication and the Shannon-Weaver Model

    Communication models based on the Shannon-Weaver communication model are the most commonly used, but efforts to transcend this model in other domains such as human communication are increasingly common. The semantic aspect of information remains an unsolved problem. This paper concentrates on a specific feature of the model: "Communication" between...

    Provided By International Proceedings of Computer Science and Information Technology

  • White Papers // Jan 2012

    Analysis of Monitoring Tools for Java Applications

    Runtime Monitoring is performed during the execution of software to detect anomalies in them. Currently several tools are available that help in developing the monitors. The authors analyze the prominent monitoring tools available for Java applications based on two features, the properties that can be monitored using these tools and...

    Provided By International Proceedings of Computer Science and Information Technology

  • White Papers // Jan 2012

    Using Architectural Patterns to Improve Modularity in Software Architectural Design

    Architecture plays an essential role to achieve software quality attributes. A wide variety of architectural patterns and tactics are introduced in the literature to design software architecture. Modularity relates to quality attributes such as maintainability, portability, reusability, interoperability and flexibility. Modularity also depends on complexity aspects such as coupling and...

    Provided By International Proceedings of Computer Science and Information Technology

  • White Papers // Jan 2012

    Integrating User Roles With Cloud Interfaces

    Cloud Computing is high on the agenda of the industry and research community from developer as well as from end-user perspective. The basic promise of cloud computing, that is, access to data anytime, anywhere, on any device is already a reality. However, for a successful user adoption of the cloud,...

    Provided By International Proceedings of Computer Science and Information Technology

  • White Papers // Jan 2012

    Automated Test Cases Generation From UML Sequence Diagram

    The most widely used class of automated testing tools leads senior software testers into software development blunders that a first year programming student shouldn't make. This paper proposed a novel approach to test the software at the initial stage itself so that it will be easy for software testers to...

    Provided By International Proceedings of Computer Science and Information Technology

  • White Papers // Jan 2012

    A Study on the Geo-Graphic Recognition for Handheld Computers and Smartphones in Location-Based Services

    This paper discusses the design and implementation of a geocomputing platform for the development of Location-Based Services(LBS) focusing mobile mapping. During the analysis, design, and implementation of the geocomputing platform, an effective method was identified for the real-time processing of geographic information acquired by a camera attached to a Handheld...

    Provided By International Proceedings of Computer Science and Information Technology

  • White Papers // Jan 2012

    Fusion of PCA and LDA Based Face Recognition System

    Face recognition is an important biometric because of its potential applications in many fields, such as access control, surveillance, and human-computer interface. In this paper, a system that fuses the output of a PCA and LDA based system is presented. The fusion is based on a set of rules. Both...

    Provided By International Proceedings of Computer Science and Information Technology

  • White Papers // Jan 2012

    Towards Scalability Issue in Ontology-Based Context-Aware Systems

    Ontology is a promising tool to organize and represent context information. It arguably is superior to other context models in formality of semantics and the ability to deduce new facts. However, further usage of ontology-based systems is hindered by the slow reasoning speed of ontology engines and the monolithism of...

    Provided By International Proceedings of Computer Science and Information Technology