Journal of Computing

Displaying 1-40 of 236 results

  • White Papers // Mar 2015

    Data Confidentiality and Integrity in Mobile Cloud Computing

    Mobile Cloud Computing (MCC) is a technology that allows mobile users to access data and applications by using mobile devices. The major challenge that faces MCC is how to ensure the integrity and confidentiality of the user's files/data. This paper proposes a framework that consists of three components, including the...

    Provided By Journal of Computing

  • White Papers // Oct 2014

    Analysis of Server Performance with Different Techniques of Virtual Databases

    Database virtualization is understood by different people in different ways; either it is executing or storing databases on virtual machine or a full virtualization of database. It helps in masking the actual physical location of the databases from the programs and users using it. With the aid of virtualization, databases...

    Provided By Journal of Computing

  • White Papers // Aug 2014

    A Survey of Security Issues for Data Sharing over Untrusted Cloud Providers

    Interest in cloud computing market is growing rapidly in the recent years. It provides on-demand, high scalability computing resources with high availability and reliability. However, security is considered as one of the biggest obstacles for cloud computing. In this paper, the authors focus on the main security and privacy issues,...

    Provided By Journal of Computing

  • White Papers // Aug 2014

    Review and Analysis of Pothole Detection Methods

    As one type of pavement distresses, potholes are important clues indicating structural defects of the asphalt road, and accurately detecting these potholes is one of important tasks for determining proper strategies of asphalt-surfaced pavement maintenance and rehabilitation. However, manually detecting and evaluating methods are expensive and time-consuming. Thus, several efforts...

    Provided By Journal of Computing

  • White Papers // Aug 2014

    Automatic Learning Context Tool for Effective Personal Document Indexing and Retrieval

    Managing digital documents has become a time consuming process due to sheer scale. Most users manage their personal documents by creating logical hierarchical folder structures. This logical structure depends on the user's assessment of the context of the document. Basic file structuring has not been changed for decades and hierarchical...

    Provided By Journal of Computing

  • White Papers // Aug 2014

    A Novel Real-Time Road Information Management Technique for Traffic Congestion Mitigation

    Road transport is an inevitable requirement to the human civilization where it provides considerable economic and social benefits to the society. However, poor management of traffic flow imposes challenges such as traffic congestion. Problems arise when there is too much traffic for the available physical road capacity to handle. This...

    Provided By Journal of Computing

  • White Papers // Aug 2014

    Efficient Intrusion Detection using Weighted K-means Clustering and Na

    Intrusion Detection System (IDS) is becoming a vital component to secure the network. A successful intrusion detection system requires high accuracy and detection rate. In this paper a hybrid approach for intrusion detection system based on data mining techniques is proposed. The principal ingredients of the approach are weighted k-means...

    Provided By Journal of Computing

  • White Papers // Jun 2014

    Some Issues Pertinent to Now days Mobile Learning

    In this paper, the authors intended to touch on some issues related to the new direction of learning, mobility. This paper also will generally go over some issues pertinent to mobile learning and devices where the learners obviously are intending, intentionally or unintentionally, to utilize mobile devices for learning purposes....

    Provided By Journal of Computing

  • White Papers // Jun 2014

    Advanced Security Models for Cloud Infrastructures

    Cloud computing is the next-generation Internet paradigm that is offered to the business environment, educational domain and, generally, to individual users. While educational institutions and individuals quickly embraced this new technology, companies were reluctant, most of their doubts being related to the security problems. With that in mind, companies prefer...

    Provided By Journal of Computing

  • White Papers // Jun 2014

    Three Node Tandem Communication Network Model with Feedback Having Homogeneous Arrivals

    Communication network plays imperative role in evaluating the communication systems. These have separate deployment for each up-and-coming service like data networks and telephony networks. In communication systems it is usual to consider that the arrivals are characterized by passion process. In this paper, the authors developed and analyzed the three...

    Provided By Journal of Computing

  • White Papers // Jun 2014

    A Review of Big Data Management, Benefits and Challenges

    Big data is relatively a new concept which refers to datasets whose size is beyond the ability of typical database software tools to capture, store, manage and analyze. The accumulated huge amount of data that previously of no significant importance or value have been put into maximum use due to...

    Provided By Journal of Computing

  • White Papers // May 2014

    A Survey of Distributed Association Rule Mining Algorithms

    Association rule mining is a popular and well researched method for discovering interesting relations between variables in large databases. It is intended to identify strong rules discovered in databases using different measures of interestingness. Most ARM algorithms focus on a sequential or centralized environment where no external communication is required....

    Provided By Journal of Computing

  • White Papers // May 2014

    Compatibility Relation and its Application to Network Segmentation and Decentralization

    A relation on a set which is reflexive and symmetric is called a Compatibility Relation (CR). It is difficult to trace since when the profound mathematics of compatibility relation came into existence. In this paper, some new properties of compatibility classes of a finite set endowed with a suitable compatibility...

    Provided By Journal of Computing

  • White Papers // May 2014

    ERP Software Selection using IFS and GRA Methods

    Enterprise Resource Planning (ERP) is like a modular, generic software package integrating the flow of information between departments in all logistics company. Furthermore extended ERP applications provide web-based connections between interdependent organizations like supply chain partners. In order to meet ever-changing needs of the logistics companies competing in dynamic environments,...

    Provided By Journal of Computing

  • White Papers // May 2014

    Description of Consistency Rules in Software Design Models

    Software system is gaining hold on the peoples' daily activities. May it be a grocery store, building designing and architecture, vehicle manufacturing, communication technology, online commerce, local administration, defense or any other aspects of society software system is enhancing the functioning of all aspects of the society. The software systems...

    Provided By Journal of Computing

  • White Papers // May 2014

    Application of ANP in Evaluating Accounting Softwares based on Accounting Information Systems Characteristics

    In today's commercial world, accounting software's are of great importance for purposes of collecting, classifying and yielding financial reports; thus, it is an essential necessity for every firm to select appropriate and highly efficient software in order to reach their organizational goals. This paper applies Analytic Network Process (ANP) method...

    Provided By Journal of Computing

  • White Papers // Apr 2014

    A Cross Layer Protocol for Energy Aware and Critical Data Delivered Applications Using Wireless Sensor Networks

    Environment monitoring applications using Wireless Sensor Networks (WSNs) have had a lot of attention in recent years. In much of this research tasks like sensor data processing, environment states and events decision making and emergency message sending are done by a remote server. A proposed cross layer protocol for two...

    Provided By Journal of Computing

  • White Papers // Apr 2014

    Penetration Testing With Banner Grabbers and Packet Sniffers

    With looming threats from hackers, identity and corporate data thieves, it is impossible to avoid doing penetration testing at the corporate level so as to ascertain the security of the network. The more ubiquitous penetration testing becomes the more likely secure most organizations become. This paper demonstrates how to use...

    Provided By Journal of Computing

  • White Papers // Apr 2014

    Phishing, SMiShing & Vishing: An Assessment of Threats Against Mobile Devices

    In this paper, the authors proposed an exploratory assessment of phishing, SMiShing and vishing attacks against mobile devices. It examines the implications of end-user behavior towards mitigating the risks posed by using mobile devices for online services and facilities. Phishing is that socially engineered attack aimed at enticing unsuspecting users...

    Provided By Journal of Computing

  • White Papers // Apr 2014

    A Review of Algorithms for Determination of Attackability Metrics

    Attackability is a concept proposed recently in literature to measure the extent that a software system or service could be the target of a successful attack. A Holistic predictive attackability metrics model has been proposed in the authors' previous paper. Metrics derived from this model, their theoretical and empirical validation...

    Provided By Journal of Computing

  • White Papers // Apr 2014

    Optimal Operating Performances of Wireless Protocols for Intelligent

    The systems based on intelligent sensors are currently expanding, due to theirs functions and theirs performances of intelligence: transmitting and receiving data in real-time, computation and processing algorithms, metrology remote, diagnostics, automation and storage measurements. The radio frequency wireless communication with its multitude offers a better solution for data traffic...

    Provided By Journal of Computing

  • White Papers // Mar 2014

    Application of Banach Space Ideal Properties in Image Transmission over Wireless Network

    In this paper, the authors develop the concept of nuclearity in functional analysis. The Banach space operator ideals and nuclear maps have a large class of morphisms which behave as if they were part of a compact closed category, that is, they allow one to transfer variables between the domain...

    Provided By Journal of Computing

  • White Papers // Mar 2014

    The Influence of Social Networks on Students' Performance

    Social networks are becoming an integral part of the peoples' lives. Students are spending much time on social media and are considered the largest category that uses such application. This paper tries to explore the influence of social media use, and especially Facebook, on high school students' performance. A proposed...

    Provided By Journal of Computing

  • White Papers // Mar 2014

    Cellular Mobile Signal Propagation; Effects of EIRP and Antenna Gain

    In this paper, the authors compare the cellular mobile network signals and transmission properties of two mobile service networks. The background theories for the propagation of cellular mobile signals were reviewed. A mobile signal analyzer capable of measuring power density was used to measure the received signal power density at...

    Provided By Journal of Computing

  • White Papers // Mar 2014

    An Enhanced Method for Generating Composite Candidate Keys Based on N

    In a relational database, a candidate key is defined as a set of attributes that is distinct the database rows. The determining process of a candidate key could affect the database performance and optimization. In this paper, an algorithm based on N

    Provided By Journal of Computing

  • White Papers // Mar 2014

    Cloud Computing and Associated Mitigation Techniques: A Security Perspective

    Cloud computing is the contemporary technology in the field of information technology. It is rapidly turning into one of the most prominent technologies due to its growing and revolutionary nature in recent times. It assures to delivers a wide range of resources like flexible IT architecture, scalability, availability, fault tolerance,...

    Provided By Journal of Computing

  • White Papers // Mar 2014

    CPU Utilization for a Multiple Video Streaming Over a Fiber Optic ATM-Network when Varying the Quality of Service

    The Asynchronous Transfer Protocol (ATM) gives the broadband services users a high quality demands with a good opportunity to operate their networks. One important feature of the ATM-network is the Quality of Service (QoS) attribute. In this paper, the authors are explaining the effect of varying the QoS on the...

    Provided By Journal of Computing

  • White Papers // Feb 2014

    Consumer Attitude towards M-Commerce: The Perceived Level of Security and the Role of Trust

    The emerging industry of Mobile commerce (M-commerce), while being a complex and with uncertain environment is influencing businesses and consumers engagement at both national and international levels. This paper are to: investigate the degree to which various trust and information security factors influence consumer to engage in mobile commerce, and...

    Provided By Journal of Computing

  • White Papers // Feb 2014

    Performance Analysis of Dynamic Source Routing Protocol

    Dynamic Source Routing (DSR) is an efficient on-demand routing protocol for Mobile Ad-hoc NETworks (MANETs). It depends on two main procedures: route discovery and route maintenance. Route discovery is the procedure used at the source of the packets to discover a route to the destination. Route maintenance is the procedure...

    Provided By Journal of Computing

  • White Papers // Feb 2014

    Developing a Human Machine Interface (HMI) for Industrial Automated Systems using Siemens Simatic WinCC Flexible Advanced Software

    Most industrial plants are automated without any operator-machine interaction. This makes it difficult for the operator to at a glance know the state of the machines and the immediate steps to undertake in order to clear any anomalies occurring in the plant. In this paper, consideration was given to the...

    Provided By Journal of Computing

  • White Papers // Feb 2014

    Compressed Spectrum Sensing in Cognitive Radio Network Based on Measurement Matrix

    Compressive Sampling (CS), or compressive sensing, has the ability for reconstructing a sparse signal with small number of measurements. There are some applications like spectrum sensing in cognitive radio which not necessarily need a perfect reconstruction. Consequently in this application, toward the decrement of high signal acquisition costs in wideband...

    Provided By Journal of Computing

  • White Papers // Feb 2014

    Automatic Management of Wireless Sensor Networksthrough Cloud Computing

    With the faster adoption of Wireless Sensor Networks (WSNs), on the one hand sensor-derived data need to be accessed via various web-based social networks or virtual communities and on the other hand, limited processing ability of WSNs is a hurdle. To address this issue WSNs can be integrated with cloud....

    Provided By Journal of Computing

  • White Papers // Jan 2014

    Routing Protocols for Vehicular Adhoc Networks (VANETs): A Review

    Routing in vehicular ad hoc networks is a challenging task due to the unique characteristics of the network such as high mobility of nodes, dynamically changing topology and highly partitioned network. It is a challenge to ensure reliable, continuous and seamless communication in the presence of speeding vehicles. The performance...

    Provided By Journal of Computing

  • White Papers // Jan 2014

    Performance Analysis of Node Placement in Linear Wireless Sensor Networks

    Linear Wireless Sensor Networks (LWSNs) are captivating significant attention because of their suitability for wide-range of applications. These applications dictate the topology of the network (i.e., placement of nodes) and introduce unique challenges such as non-uniform energy consumption. Moreover, these applications require LWSNs to operate for decades. However, sensor nodes...

    Provided By Journal of Computing

  • White Papers // Dec 2013

    Providing Accurate Time Reference with the STM4F32Discovery Embedded System for Purposes of Crystal Calibrations

    Crystal oscillators are today present in almost every embedded system. They are usually used for precise frequency generation, which can then be used for generating driving processors, microcontrollers, radio transceivers, real time clock generators and other devices which rely on precise and stable frequency for proper operation. This paper presents...

    Provided By Journal of Computing

  • White Papers // Dec 2013

    Design and Simulation of a Green Broker with Imprecise Computation Scheduling for Energy-efficient Large Scale Computing in Clusters

    Cluster computing has attracted attention for large scale computing using idle CPU cycles of personal computers connected in local area network. The authors propose a green broker with imprecise computation scheduling for large scale computing in clusters. Imprecise computation techniques provide scheduling flexibility by trading off result quality to meet...

    Provided By Journal of Computing

  • White Papers // Dec 2013

    Combinatoric Drag-Pattern-Graphical-Password (DPGP)

    Creating secure password has been limited attributable to password restriction and policy. Users tend to choose memorable passwords that are easy to guess. However, sophisticated systems assigned passwords that are difficult to remember. In this paper, the focus will be on the Drag - Pattern-Graphical-Password (DPGP). DPGP password is proposed...

    Provided By Journal of Computing

  • White Papers // Dec 2013

    Hidden Crimes: Freedom of Expression on the Internet

    Freedom of expression is a brave stand towards the prohibition of certain words, terms or expressions, particularly if mockery and offensive styles were avoided with various topics such as religion, politics, community issues, etc. At this particular time, the authors need to identify freedom of expression on the Internet in...

    Provided By Journal of Computing

  • White Papers // Dec 2013

    An Associative Classification Data Mining Approach for Detecting Phishing Websites

    Phishing websites are fake websites that are created by dishonest people to mimic web pages of real websites. Victims of phishing attacks may expose their financial sensitive information to the attacker whom might use this information for financial and criminal activities. Various approaches have been proposed to detect phishing websites,...

    Provided By Journal of Computing

  • White Papers // Nov 2013

    Cloud Computing: The Level of Awareness Amongst Small & Medium-sized Enterprises (SMEs) in Developing Economies

    Cloud computing services are being touted as a major enabler for small businesses lately. This new paradigm is seen to offer unique opportunities to Small and Medium Enterprises (SMEs) worldwide and developing economies are no exception. It presents SMEs access to similar technologies available to their larger counterparts and those...

    Provided By Journal of Computing

  • White Papers // Mar 2015

    Data Confidentiality and Integrity in Mobile Cloud Computing

    Mobile Cloud Computing (MCC) is a technology that allows mobile users to access data and applications by using mobile devices. The major challenge that faces MCC is how to ensure the integrity and confidentiality of the user's files/data. This paper proposes a framework that consists of three components, including the...

    Provided By Journal of Computing

  • White Papers // May 2012

    Numerical and Chaotic Analysis of CHUA'S CIRCUT

    In this paper, the authors have Matlab algorithm for the implementation a numerical solutions "Runge-kutta method of order four and order five". The running time and maximum errors for both methods are found on Chua's circuit. They use ' 0-1' test for chaos due to the researchers that has been...

    Provided By Journal of Computing

  • White Papers // Oct 2014

    Analysis of Server Performance with Different Techniques of Virtual Databases

    Database virtualization is understood by different people in different ways; either it is executing or storing databases on virtual machine or a full virtualization of database. It helps in masking the actual physical location of the databases from the programs and users using it. With the aid of virtualization, databases...

    Provided By Journal of Computing

  • White Papers // Jul 2012

    A Flexible Hybrid Method for IT Project Management

    Project Management (PM) landscaping is continually changing in the IT industry. Working with the small teams and often with the limited budgets, while facing frequent changes in the business requirements, project managers are under continuous pressure to deliver fast turnarounds. Following the demands of the IT project management, leaders in...

    Provided By Journal of Computing

  • White Papers // Mar 2012

    Web Application Security of Money Transfer Systems

    Information security science started to play a vital role in their life and became an important issue used for judging on any system about either its success or failure. E-banking applications for transferring money are considered as one of the most important applications that banks nowadays are taking care about;...

    Provided By Journal of Computing

  • White Papers // Mar 2012

    New Bandwidth Guaranteed QoS Routing Algorithm for MPLS Networks

    Internet has become an integrated carrier gradually, which has multi business such as data, voice, video, multimedia and so on. New multimedia applications require the network to guarantee quality of service. MPLS network has the capability of routing with some specific constraints for supporting desired QoS, out of which bandwidth...

    Provided By Journal of Computing

  • White Papers // Mar 2012

    Security Framework for Cloud Computing Environment: A Review

    Cloud computing has become an important platform for companies to build their infrastructures upon. If companies are thinking to take advantage of cloud based systems, they will have to seriously reassess their current security strategies as well as the cloud-specific aspects to be a successful solution provider. The focus of...

    Provided By Journal of Computing

  • White Papers // Mar 2012

    Gait Based Personal Identification System Using Rotation Sensor

    Every individual has a unique walking pattern which may be used as a signature for identification. This paper describes the construction of a feasible human identification device using human gaits (Walking pattern). The authors have built a very low cost wearable suit mounted with eight rotation sensors, controller, software and...

    Provided By Journal of Computing

  • White Papers // Mar 2012

    Network Deployment and Routing Based on the Energy-Saving and Long-Lasting Life of Knots

    The minimization of energy as well as the elongation of the network life time cycle represent an important challenge for the conception of the wireless sensors networks routing protocols that are characterized by a dense deployment of knots because these later are characterized by limited capacity of batteries. Besides, to...

    Provided By Journal of Computing

  • White Papers // Feb 2012

    Effect of System Impairments on the Performance of QPSK Label-Based Photonic Router

    Photonic routing has been attracting much interest to overcome the bottleneck of routing function in the broadband networks. This paper investigates theoretically the performance of an integrated-optic circuit for recognition of optical Quadrature Phase Shift Keying (QPSK) coded labels in photonic router. The analysis takes into account the effect of...

    Provided By Journal of Computing

  • White Papers // Mar 2012

    Fuzzy Logic Based Channel Estimation and Performance Analysis of WiMAX Systems

    Worldwide Interoperability for Microwave Access (WiMAX) provides wireless broadband to fixed and mobile terminals. In this paper, firstly performance evaluation of WiMAX system without channel estimation is carried out. Then a fuzzy logic based channel estimation technique is proposed. Channel estimation is used because amplitude and phase shift causes error...

    Provided By Journal of Computing

  • White Papers // Mar 2012

    Impact of Technological Devices on Information and Communication Technology Acceptance for Construction Site Management in Nigeria

    The success of Information and Communication Technology (ICT) adoption depends on the impact of the technological devices. Many construction companies have been using ICT devices without assessing whether it makes any effect to its activities or not. The main aim of this paper is to assess the effect of technological...

    Provided By Journal of Computing

  • White Papers // Mar 2012

    Performance Evaluation of an OFDM System Under Rayleigh Fading Environment

    The performance of an OFDM system is affected by parameters such as carrier frequency offset and phase noise. In the presence of such parameters the performance of OFDM system degrades. Under Rayleigh fading environment the performance fluctuates depending on the signal strength. In this paper, the performance of an OFDM...

    Provided By Journal of Computing

  • White Papers // Feb 2012

    A Proposal Setting Solution for Subscriber Profile of Mobile Internet Applications in Home Location Register (HLR)

    This paper gives an overview for the mobile internet technology and proposal setting solutions for Subscriber profile in Home Location Register (HLR) based on Global System for Mobile communications (GSM) to harmonize with different applications. The objectives of this paper are two fields: the first field is to present the...

    Provided By Journal of Computing

  • White Papers // Feb 2012

    A Distributed Shared Memory Cluster Architecture With Dynamic Load Balancing

    This paper proposes distributed shared memory cluster architecture with load balancing. The architecture is based on dynamic task scheduling approach for distribution and assignment. It enhances the performance of communication across clusters for data access. The proposed dynamic load balancing model uses the concept of work stealing, which intelligently balances...

    Provided By Journal of Computing

  • White Papers // Feb 2012

    AODV Extension Using Ant Colony Optimization for Scalable Routing in VANETs

    On demand set up, fault tolerance and unconstrained connectivity are the major advantages of mobile computing, that's why it continues to enjoy rapid growth. In last three decades, tremendous improvement is made in the area of wireless ad-hoc network. Now a days, one of the most attractive research topic is...

    Provided By Journal of Computing

  • White Papers // Dec 2011

    Comparative Study of Scalability and Availability in Cloud and Utility Computing

    Cloud computing and Utility computing paradigms are two resource sharing architectures. The vivid and multi-institutional natures of these environments instigate different challenges in context of availability and scalability. In this paper, the authors discuss the normal architecture of Cloud and Utility computing followed by crucial areas which are availability and...

    Provided By Journal of Computing

  • White Papers // Dec 2011

    Efficient Method for Multiple-Level Association Rules in Large Databases

    The problems of developing models and algorithms for multilevel association mining pose for new challenges for mathematics and computer science. These problems become more challenging when some form of uncertainty in data or relationships in data exists. In this paper, the authors present a partition technique for the multilevel association...

    Provided By Journal of Computing

  • White Papers // Dec 2011

    Design Considerations for Developing Disk File System

    File system design has never been a straight forward task. Moreover, designing and developing a disk file system is a complex case of file system development. From time to time, since the inception of first magnetic disk in 1956, many disk file systems were drafted and implemented to fit the...

    Provided By Journal of Computing

  • White Papers // Dec 2011

    Evaluating Effectiveness of Software Testing Techniques With Emphasis on Enhancing Software Reliability

    The authors have a great number of software testing techniques at their disposal for testing a software product. Although, the utilization of these techniques is growing, they do have a very inadequate knowledge about their relative quantitative and qualitative statistics. The choice of a software testing technique in software testing...

    Provided By Journal of Computing

  • White Papers // Feb 2012

    The State of High Performance Computing in the Cloud

    HPC applications have been gaining lot of attention in the cloud computing world. Most of these applications are scientific applications that require large CPU capabilities and are also data intensive requiring large data storage. Traditionally, they have always required large number of computers inter-connected in a network such as clusters...

    Provided By Journal of Computing

  • White Papers // Feb 2012

    Role of Cognitive Radio on 4G Communications a Review

    There is a rapid advancement in wireless communication technology providing the network services anywhere and anytime. 4G communication systems are being developed to solve the various problems the current communication systems (3G, 2.5G) are facing.4G will be an intelligent technology that will reduce the number of different technologies to a...

    Provided By Journal of Computing

  • White Papers // Feb 2012

    Success and Failure of e-Learning Projects: Alignment of Vision and Reality, Change and Culture

    Online education is fast developing in the education system and is widely used in many universities and research areas. Jordan is a developing country with limited natural resources, a fact that has led the country to depend heavily on its human resources. This has encouraged the Jordanian government to implement...

    Provided By Journal of Computing

  • White Papers // Feb 2012

    Handling Security Issues for Smart Grid Applications Using Cloud Computing Framework

    Smart grid is a form of electrical grid which tries to forecast and intelligently return of actions which give to the behavior of all electric power consumers associated to it. Smart grid basically enables active participation by clients. It provides power excellence for the sort of requirements in digital and...

    Provided By Journal of Computing

  • White Papers // Feb 2012

    Enhancement of XP for Cloud Application Development

    The objective of this paper is to suggest some new concepts into the existing models of cloud software development and developing a suitable methodology for customer satisfaction. The objective is to make every team member familiar about the various features of the system to be developed using processes from extreme...

    Provided By Journal of Computing

  • White Papers // Jan 2012

    Ant Colony Based Routing for Mobile Ad-Hoc Networks Towards Improved Quality of Services

    Mobile Ad Hoc NETwork (MANET) is a dynamic multihop wireless network which is established by a set of mobile nodes on a shared wireless channel. One of the major issues in MANET is routing due to the mobility of the nodes. Routing means the act of moving information across an...

    Provided By Journal of Computing

  • White Papers // Jan 2012

    Incorporation of IDS in Real World Applications

    Intrusion detection can be defined as the analysis of suspicious activities so that intrusions can be easily identified in a short interval of time. Previously, implementation of intrusion detection system is limited only to the large networking organizations but from few years it has just become integral component for organizations...

    Provided By Journal of Computing

  • White Papers // Jan 2012

    Impact of IT on Process Improvement

    There has been a lack of empirical research related to the role of IT in process improvement in a multidimensional way. The purpose of this paper is to investigate the extent that IT could be used (from low tech to high tech and constraint to proactive), type of process re-engineering...

    Provided By Journal of Computing

  • White Papers // Dec 2011

    Reaching Activities by Places in the Context-Aware Environments Using Software Sensors

    Context-aware systems sense the user's situation and provide an interaction that adapts and behave accordingly. To reach a level of user's satisfaction the systems need to be aware of activity context (i.e., what user is doing?). To sense the activity context the popular methods are hardware sensors for example tracking...

    Provided By Journal of Computing

  • White Papers // Dec 2011

    Design of Coaxial fed Microstrip Patch Antenna for 2.4GHz Bluetooth Applications

    The Bluetooth technology provides short range of wireless connections between electronic devices like computers, mobile phones and many others thereby exchanging voice, data and video. The rapid increase in communication standards has led to great demand for antennas with low real estate, low profile and size, low cost of fabrication...

    Provided By Journal of Computing

  • White Papers // Dec 2011

    Time-Variant Captcha: Generating Strong Captcha Security by Reducing Time to Automated Computer Programs

    Today, approximately all the Internet users have login accounts for Internet sites and these sites require only the registration by human users, but unfortunately some automated computer programs to enter these sites and use their resources through false registration. This paper introduces a new Time-Variant Captcha. In this paper, the...

    Provided By Journal of Computing

  • White Papers // Jun 2011

    A Proposed Anti-Viruses Strategy for a Complex Environment With a Huge Number of Viruses Attacks

    This paper presents a proposed anti-viruses strategy, the last intended to be reliable and adaptive tool to deal with complex environment suffer from huge no. of viruses attacks, where these viruses may be known, unknown, predictable or even non predictable. By using association rules for analyzing proposed database which its...

    Provided By Journal of Computing

  • White Papers // May 2011

    A Comparative Study of Available Protocols During Privacy Preservation in Secure Multiparty Computation

    In this paper, comparative study of different available Secure Multiparty Computation (SMC) protocols have been addressed. In SMC, a set of parties wishes to jointly compute some function on their inputs. This computation must preserve certain security properties, like privacy and correctness. The general approach for such kind of computation...

    Provided By Journal of Computing

  • White Papers // Apr 2011

    Employing CORBA in the Mobile Telecommunications Sector and the Application of Component Oriented Programming Techniques

    This paper focuses on the implications of employing CORBA Middleware in today's wireless telecommunications services and applications developments. It seeks to understand what current opportunities exist to support the use of this technology and assesses some of the performance implications that might be encountered. Discussion also revolves around the use...

    Provided By Journal of Computing

  • White Papers // Apr 2011

    Detecting Auto Insurance Fraud by Data Mining Techniques

    The paper presents fraud detection method to predict and analyze fraud patterns from data. To generate classifiers, the authors apply the Na?ve Bayesian Classification, and Decision Tree-Based algorithms. A brief description of the algorithm is provided along with its application in detecting fraud. The same data is used for both...

    Provided By Journal of Computing

  • White Papers // Apr 2011

    Eye Detection and Tracking in Image With Complex Background

    To detect and track eye images with complex background, distinctive features of user eye are used. Generally, an eye-tracking and detection system can be divided into four steps: face detection, eye region detection, pupil detection and eye tracking. To find the position of pupil, first, face region must be separated...

    Provided By Journal of Computing

  • White Papers // Apr 2011

    Self-Stabilizing Leader Election Algorithm in Highly Dynamic Ad-Hoc Mobile Networks

    The authors propose a self-stabilizing leader election algorithm that can tolerate multiple concurrent topological changes. By introducing the time interval based computation concept, the algorithm ensures that a network partition within a finite time converge to a legitimate state even if topological changes occur during the convergence time. An ad...

    Provided By Journal of Computing

  • White Papers // Apr 2011

    Investigate the Result of Object Oriented Design Software Metrics on Fault-Proneness in Object Oriented Systems: A Case Study

    In the last decade, empirical studies on object-oriented design metrics have shown some of them to be useful for predicting the faults-proneness of classes in object-oriented software systems. It would be valuable to know how object-oriented design metrics and class fault-proneness are related when fault severity is taken into account....

    Provided By Journal of Computing

  • White Papers // May 2011

    An Empirically Base Path Loss Model for GSM Fixed Wireless Access

    This paper aim at developing model for Gombi town with the view to address the complain of the GSM telephone subscribers. A measurement campaign was accomplished along the major road that divides Gombi into almost two equal parts. The empirical data measured were analyzed using significant statistical functions, the mean...

    Provided By Journal of Computing

  • White Papers // Apr 2011

    A Multiple Fault Tolerant Approach With Improved Performance in Cluster Computing

    In case of multiple node failures performance is very low as compare to single node failure. Failures of nodes in cluster computing can be tolerated by multiple fault tolerant computing. In this paper, the authors propose a multiple fault tolerant technique with improved failure detection and performance. Failure detection is...

    Provided By Journal of Computing