Journal of Computing

Displaying 1-40 of 186 results

  • White Papers // Apr 2014

    A Cross Layer Protocol for Energy Aware and Critical Data Delivered Applications Using Wireless Sensor Networks

    Environment monitoring applications using Wireless Sensor Networks (WSNs) have had a lot of attention in recent years. In much of this research tasks like sensor data processing, environment states and events decision making and emergency message sending are done by a remote server. A proposed cross layer protocol for two...

    Provided By Journal of Computing

  • White Papers // Mar 2014

    Cloud Computing and Associated Mitigation Techniques: A Security Perspective

    Cloud computing is the contemporary technology in the field of information technology. It is rapidly turning into one of the most prominent technologies due to its growing and revolutionary nature in recent times. It assures to delivers a wide range of resources like flexible IT architecture, scalability, availability, fault tolerance,...

    Provided By Journal of Computing

  • White Papers // Mar 2014

    CPU Utilization for a Multiple Video Streaming Over a Fiber Optic ATM-Network when Varying the Quality of Service

    The Asynchronous Transfer Protocol (ATM) gives the broadband services users a high quality demands with a good opportunity to operate their networks. One important feature of the ATM-network is the Quality of Service (QoS) attribute. In this paper, the authors are explaining the effect of varying the QoS on the...

    Provided By Journal of Computing

  • White Papers // Feb 2014

    Automatic Management of Wireless Sensor Networksthrough Cloud Computing

    With the faster adoption of Wireless Sensor Networks (WSNs), on the one hand sensor-derived data need to be accessed via various web-based social networks or virtual communities and on the other hand, limited processing ability of WSNs is a hurdle. To address this issue WSNs can be integrated with cloud....

    Provided By Journal of Computing

  • White Papers // Jan 2014

    Performance Analysis of Node Placement in Linear Wireless Sensor Networks

    Linear Wireless Sensor Networks (LWSNs) are captivating significant attention because of their suitability for wide-range of applications. These applications dictate the topology of the network (i.e., placement of nodes) and introduce unique challenges such as non-uniform energy consumption. Moreover, these applications require LWSNs to operate for decades. However, sensor nodes...

    Provided By Journal of Computing

  • White Papers // Dec 2013

    An Associative Classification Data Mining Approach for Detecting Phishing Websites

    Phishing websites are fake websites that are created by dishonest people to mimic web pages of real websites. Victims of phishing attacks may expose their financial sensitive information to the attacker whom might use this information for financial and criminal activities. Various approaches have been proposed to detect phishing websites,...

    Provided By Journal of Computing

  • White Papers // Dec 2013

    Design and Simulation of a Green Broker with Imprecise Computation Scheduling for Energy-efficient Large Scale Computing in Clusters

    Cluster computing has attracted attention for large scale computing using idle CPU cycles of personal computers connected in local area network. The authors propose a green broker with imprecise computation scheduling for large scale computing in clusters. Imprecise computation techniques provide scheduling flexibility by trading off result quality to meet...

    Provided By Journal of Computing

  • White Papers // Dec 2013

    Combinatoric Drag-Pattern-Graphical-Password (DPGP)

    Creating secure password has been limited attributable to password restriction and policy. Users tend to choose memorable passwords that are easy to guess. However, sophisticated systems assigned passwords that are difficult to remember. In this paper, the focus will be on the Drag - Pattern-Graphical-Password (DPGP). DPGP password is proposed...

    Provided By Journal of Computing

  • White Papers // Dec 2013

    Hidden Crimes: Freedom of Expression on the Internet

    Freedom of expression is a brave stand towards the prohibition of certain words, terms or expressions, particularly if mockery and offensive styles were avoided with various topics such as religion, politics, community issues, etc. At this particular time, the authors need to identify freedom of expression on the Internet in...

    Provided By Journal of Computing

  • White Papers // Nov 2013

    Systematic Review and Comparison of Anomaly Based Network Intrusion Detection Systems Based on Efficiency

    Currently, Anomaly based Network Intrusion Detection (ANID) is the solution for novel and sophisticated attacks. This paper focuses on the comparison of Anomaly based Network Intrusion Detection Systems (ANIDS) based on efficiency. A collection of ANIDS that were trained and tested using KDD cup 99 dataset in the period 2002...

    Provided By Journal of Computing

  • White Papers // Nov 2013

    Cloud Computing: The Level of Awareness Amongst Small & Medium-sized Enterprises (SMEs) in Developing Economies

    Cloud computing services are being touted as a major enabler for small businesses lately. This new paradigm is seen to offer unique opportunities to Small and Medium Enterprises (SMEs) worldwide and developing economies are no exception. It presents SMEs access to similar technologies available to their larger counterparts and those...

    Provided By Journal of Computing

  • White Papers // Oct 2013

    Implementing Cloud Computing in ERP

    Cloud computing is a new technology trend which changed how information systems operated and used, while ERP is one of the most used enterprise applications by the market, and considered the core of many corporations. The fact that ERP systems require high resources in term of cost, time and people...

    Provided By Journal of Computing

  • White Papers // Oct 2013

    The Assessment of Employing Computational Intellection in Intrusion Detection Systems

    Computer systems of today are subject to many attacks and it can be anticipated that these problems will increase in the future era. One way of protecting the systems is to use better authentication and other categories of preventive security mechanisms. These mechanisms do not offer good enough protection in...

    Provided By Journal of Computing

  • White Papers // Oct 2013

    Enhancement of Missing Values Prediction and Estimation Using Data Mining Algorithms

    In real life, users of most of the database systems face problems related to missing values, whether these values are unknown to the users or inapplicable. The database is an image of the real life and life is always incomplete. For this reason many researchers tried to complete the database...

    Provided By Journal of Computing

  • White Papers // Oct 2013

    A Practical Approach for Evaluation of Security Methods of Wireless Network

    MAC filtering, WEP key encryption, WPA2 and firewalls are the security modes used for securing the users wireless network. These security methods are standardized by IEEE as well as by WECA alliance. IEEE 802.11-2007 standard for wireless network classifies security algorithms into: RSNA and Pre-RSNA. Pre-RSNA algorithms are the algorithms...

    Provided By Journal of Computing

  • White Papers // Sep 2013

    D-SPARQ: Distributed, Scalable and Efficient RDF Query Engine

    The authors present D-SPARQ, a distributed RDF query engine that combines the MapReduce processing framework with a NoSQL distributed data store, and MongoDB. The performance of processing SPARQL queries mainly depends on the efficiency of handling the join operations between the RDF triple patterns. Their system features two unique characteristics...

    Provided By Journal of Computing

  • White Papers // Sep 2013

    Full and Para-Virtualization with Xen: A Performance Comparison

    Xen is one of the most popular open-source virtualization software's. It supports the two leading virtualization approaches, Full-Virtualization (FV) and Para-Virtualization (PV). Searching the public resources for performance comparison between these two approaches shows that PV performs the best. But most of the answers are theoretical, based on the implementation...

    Provided By Journal of Computing

  • White Papers // Sep 2013

    A Review of Intrusion Detection System Schemes in Wireless Sensor Network

    Wireless Sensor Network (WSN) comprises of several tiny devices, low-cost, low-power and sensor nodes. This node has distinctive nature unlike from other networks. It includes a huge amount of small sensing devices with some limitation in energy, computation, and communication capabilities. These sensing devices are designed for specific applications, and...

    Provided By Journal of Computing

  • White Papers // Sep 2013

    A Survey of Sink Mobility Models for Wireless Sensor Networks

    Using mobile sinks to collect information in wireless sensor networks is an interesting area of research. As a result, a variety of mobility models were proposed by researchers over the years where each mobility model has its own properties that may affect the performance of the network in a way...

    Provided By Journal of Computing

  • White Papers // Sep 2013

    Analysis of Peer-to-Peer File Sharing Network Simulation

    Peer-To-Peer (P2P) applications have shown their popularity on the internet for file sharing. When a researcher proposes or enhances an algorithm for a peer to peer file sharing system, the user's needs to test and evaluate it so that it to be shown to be valid and verify. The ways...

    Provided By Journal of Computing

  • White Papers // Aug 2013

    Pattern Classification for Incomplete Data Using PPCA and KNN

    Pattern classification has been successfully applied in many problem domains, such as biometric recognition, document classification and medical diagnosis. Missing data or unknown data is a common problem in data quality of a pattern classification. Such missing data are generally ignored or simply imputed in pattern classification, which will affect...

    Provided By Journal of Computing

  • White Papers // Jul 2013

    Comparison of Selection Methods and Crossover Operations using Steady State Genetic Based Intrusion Detection System

    Intrusion detection systems are systems built to detect the unwanted attacks. Genetic algorithm is a method that mimics the process of natural evolution; it was used to support the intrusion detection systems. Genetic algorithm contains several elements such as population size, evaluation, encoding, crossover, mutation, replacement and stopping criterion. Elements...

    Provided By Journal of Computing

  • White Papers // Jun 2013

    Network Data Restoration Technology

    Network data restoration technology includes five basic modules: network packet capture, packet unpack, IP fragment reassembly, TCP stream aggregation, and web business extraction. In a network data restoration process, it should first parse the key field information of packets according to TCP/IP standard protocol. Then effectively restructure the IP fragment...

    Provided By Journal of Computing

  • White Papers // Jun 2013

    The S-Linked List - A Variant Of The Linked List Data Structure

    Using doubly linked list in embedded systems can be expensive. Although doubly linked is efficient in terms of time complexity and highly flexible in itself, enabling easy traversal and update, but it often demands more memory space compared to other list data structure - this is as a result of...

    Provided By Journal of Computing

  • White Papers // May 2013

    Android and Real-Time Applications: Take Care!

    Android is thought as being yet another operating system! In reality, it is a software platform rather than just an OS; in practical terms, it is an application framework on top of Linux, which facilitates its rapid deployment in many domains. Android was originally designed to be used in mobile...

    Provided By Journal of Computing

  • White Papers // May 2013

    Simple Routing Algorithm for Multi-hop Wireless Network

    Routing of data packets through wireless multi-hop networks is challenging, particularly when there are large number of nodes and objective is to optimize end to end throughput or delay. Simple route construction algorithm becomes attractive as it requires fewer computations and various routes are compared with less expenditure of computational...

    Provided By Journal of Computing

  • White Papers // May 2013

    Using the Multi-Agent System to Develop a Key Agreement Protocol

    The incremental growth of computer networks by new users joining the network results in a confidentiality problem with the transmission of data. To solve this problem, symmetric/asymmetric key cryptography is mostly used. However, this cipher suffers from the problem of secret key maintenance and distribution across the internet which is...

    Provided By Journal of Computing

  • White Papers // May 2013

    Analysis of P2P Traffic Identification Methods

    With the development of the P2P traffic, it brings the users various kinds of services, but it also take over a large amount of network resources. Because of this, it affects other services which make it become the hot topic of academic research. As research continues, more and more identification...

    Provided By Journal of Computing

  • White Papers // May 2013

    A Survey of Real-Time Fault-Detection Schemes in Mobile Computing

    The recent past two decades have witnessed a phenomenal technological and architectural evolution in wireless communication. However, the development has also created certain challenges under resolution, one of which is fault detection in mobile computing. Wireless protocols must have the ability to detect faults in the mobile computing environment and...

    Provided By Journal of Computing

  • White Papers // May 2013

    Networks Integration Between Wireless LAN and UMTS Networks- A Brief Study

    In this paper the authors present a brief study on issues associated with network integration between Wireless LAN (WLAN) and Universal Mobile Telecommunications System (UMTS) networks. Network integration of WLAN and UMTS networks is an area that requires continuous research attention. It gives service providers the opportunity to offer additional...

    Provided By Journal of Computing

  • White Papers // Apr 2013

    WP - A Tree Based Response Time Algorithm for Event Driven Wireless Sensor Networks

    Irrespective of the deployment strategy or the coverage constraints, the usual energy conservation inevitability remains. Among the many approaches that have come up so as to save energy, reducing the number of transmissions and an effective routing strategy accomplish consideration. In addition to the number of transmissions, the response time...

    Provided By Journal of Computing

  • White Papers // Apr 2013

    E-Government Based on Cloud Computing

    The concept of cloud computing becomes important for each government, facilitating its way of work, increasing its productivity and all that leading to cost savings. Different country chooses different strategy for adoption of cloud computing with a possibility to become better and more effective e-government. In this paper, the scope...

    Provided By Journal of Computing

  • White Papers // Apr 2013

    Automated Fingerprint Identification System Application For System's Equal Error Rate Evaluation

    Automated fingerprint identification system has an increasingly important role in modern times. This paper presents the steps of the automated fingerprint identification system and presents an application for fingerprint identification and system's equal error rate evaluation. The algorithm for fingerprint image enhancement is a key element of the system. A...

    Provided By Journal of Computing

  • White Papers // Feb 2013

    A Hybrid Intrusion Detection System Using Hamming and MAXNET Neural Nets Using NDIS Dataset

    In this paper, the authors present a model to improve the security of network system. Intrusion Detection System (IDS) detects suspected patterns of network traffic through analysis of those traffic packets. The major problems of existing models are recognition of new attacks, low accuracy, and detection time and system adaptability....

    Provided By Journal of Computing

  • White Papers // Feb 2013

    A Dual-Band U-Slot PIFA Antenna With Ground Slit for RFID Applications

    In this paper, a Planar Inverted-F Antenna (PIFA) with U-Slot (U-PIFA) and slit in ground is introduced. The proposed PIFA is compact with single coaxial feed, single short strip, and single short pin. The main achievement of this research was the design of ISM Microwave bands 2.45/5.8 GHz dual band...

    Provided By Journal of Computing

  • White Papers // Feb 2013

    Teletraffic Analyses of Blocked Calls and Handoff Failures of LEO Mobile Satellite Systems

    Satellite communications have had a significant impact on wireless communication services owing to its versatility in comparison to its terrestrial cousins. In today's wireless mobile world, Mobile Satellite Services (MSS) are indispensable and are used side by side with the very popular cellular services the authors have all become so...

    Provided By Journal of Computing

  • White Papers // Feb 2013

    A New Scheme for Sealed Digital Signatures

    Now-a-days, people are looking for the easiest way to do things. The digital world has made that even more possible. One aspect is the way when the people sign documents and papers, how to present them self officially. When this aspect has been started to be a critical thing in...

    Provided By Journal of Computing

  • White Papers // Feb 2013

    Real Time Radio Frequency Identification Vehicles Data Logger Traffic Management System

    This paper presents a traffic management system that combines RFID and GSM technologies which they are considered to be two of the currently fastest growing technologies, RFID technology which provide a reliable data reading without the need for line-of-sight that other data detecting technologies depend on. While GSM is an...

    Provided By Journal of Computing

  • White Papers // Feb 2013

    Fast and Secure Image Hiding Scheme Based on Cryptographic Techniques

    In this paper the authors present a simple but secure novel reversible scheme for hiding a whole encrypted image inside another cover image. A selected image to be hidden is first encrypted using logical bit operations. A circular bit rotation and XOR operations are applied on an image according to...

    Provided By Journal of Computing

  • White Papers // Jan 2013

    Neural Network Synchronization Protocol

    This paper deals with the design of secure communication protocol based on neural network synchronization. Protocol is built on the application-layer of the OSI upon TCP/IP. Server and each connected client must create special type of neural network called Tree Parity Machine then compute outputs of their neural networks and...

    Provided By Journal of Computing

  • White Papers // Feb 2012

    Development of a Dynamic Model for Data-Driven DSS

    Over the past decade, Business Intelligence (BI) has been adopted by major corporations around the world. A BI tool's function facilitates the process of taking decisions for managers. However, decision-making, especially strategic decisions, still remains an ill-defined process locked in the minds of managers. The maritime transport sector depends on...

    Provided By Journal of Computing

  • White Papers // Jul 2010

    Reliable Job Scheduler Using RFOH in Grid Computing

    Distributed and dynamic nature of grids causes the probability of failure is great in such systems. So fault tolerance has become a crucial area in computational grid. In this paper, the authors propose a new genetic algorithm that used RFOH for having reliable job scheduling in computational grid. This strategy...

    Provided By Journal of Computing

  • White Papers // Oct 2010

    Age Estimation based on Neural Networks Using Face Features

    In this paper, the authors propose a methodology based on neural networks to estimate human ages using face features. Due to the difficulty of estimating the exact age, they developed their system to estimate the age to be within certain ranges. In the first stage, the age is classified into...

    Provided By Journal of Computing

  • White Papers // Dec 2009

    Routing in Wireless Adhoc Networks: A New Horizon

    A lot of work has been done on routing protocols for mobile ad hoc networks, but still standardization of them requires some more issues less addressed by the existing routing protocols. In this paper, a new paradigm of maintaining multiple connections in adhoc routing protocols has been highlighted which may...

    Provided By Journal of Computing

  • White Papers // Dec 2009

    Modified Minimum Connected Dominating Set Formation for Wireless Adhoc Networks

    MANET is an infrastructure less multihop network. Routing in MANETs is a one of the challenging task to accomplish. To generate routes proactively or on-demand is extremely costly for energy constrained nodes in a limited bandwidth shared wireless channel. Most of the protocols of MANETs make use of blind broadcast...

    Provided By Journal of Computing

  • White Papers // Apr 2013

    WP - A Tree Based Response Time Algorithm for Event Driven Wireless Sensor Networks

    Irrespective of the deployment strategy or the coverage constraints, the usual energy conservation inevitability remains. Among the many approaches that have come up so as to save energy, reducing the number of transmissions and an effective routing strategy accomplish consideration. In addition to the number of transmissions, the response time...

    Provided By Journal of Computing

  • White Papers // Apr 2013

    E-Government Based on Cloud Computing

    The concept of cloud computing becomes important for each government, facilitating its way of work, increasing its productivity and all that leading to cost savings. Different country chooses different strategy for adoption of cloud computing with a possibility to become better and more effective e-government. In this paper, the scope...

    Provided By Journal of Computing

  • White Papers // Feb 2013

    A Hybrid Intrusion Detection System Using Hamming and MAXNET Neural Nets Using NDIS Dataset

    In this paper, the authors present a model to improve the security of network system. Intrusion Detection System (IDS) detects suspected patterns of network traffic through analysis of those traffic packets. The major problems of existing models are recognition of new attacks, low accuracy, and detection time and system adaptability....

    Provided By Journal of Computing

  • White Papers // Feb 2013

    A Dual-Band U-Slot PIFA Antenna With Ground Slit for RFID Applications

    In this paper, a Planar Inverted-F Antenna (PIFA) with U-Slot (U-PIFA) and slit in ground is introduced. The proposed PIFA is compact with single coaxial feed, single short strip, and single short pin. The main achievement of this research was the design of ISM Microwave bands 2.45/5.8 GHz dual band...

    Provided By Journal of Computing

  • White Papers // Feb 2013

    Teletraffic Analyses of Blocked Calls and Handoff Failures of LEO Mobile Satellite Systems

    Satellite communications have had a significant impact on wireless communication services owing to its versatility in comparison to its terrestrial cousins. In today's wireless mobile world, Mobile Satellite Services (MSS) are indispensable and are used side by side with the very popular cellular services the authors have all become so...

    Provided By Journal of Computing

  • White Papers // Feb 2013

    A New Scheme for Sealed Digital Signatures

    Now-a-days, people are looking for the easiest way to do things. The digital world has made that even more possible. One aspect is the way when the people sign documents and papers, how to present them self officially. When this aspect has been started to be a critical thing in...

    Provided By Journal of Computing

  • White Papers // Feb 2013

    Real Time Radio Frequency Identification Vehicles Data Logger Traffic Management System

    This paper presents a traffic management system that combines RFID and GSM technologies which they are considered to be two of the currently fastest growing technologies, RFID technology which provide a reliable data reading without the need for line-of-sight that other data detecting technologies depend on. While GSM is an...

    Provided By Journal of Computing

  • White Papers // Jan 2013

    Neural Network Synchronization Protocol

    This paper deals with the design of secure communication protocol based on neural network synchronization. Protocol is built on the application-layer of the OSI upon TCP/IP. Server and each connected client must create special type of neural network called Tree Parity Machine then compute outputs of their neural networks and...

    Provided By Journal of Computing

  • White Papers // Jan 2013

    Research on the Traffic Behavior Characteristics of P2P Streaming Media

    With the development and popularization of Internet, P2P streaming media traffic has become the most important part of the variety kinds of network traffic. Therefore, the study of P2P streaming media traffic characteristics has important significance for the analysis and identification network traffic. In this paper, on the basis of...

    Provided By Journal of Computing

  • White Papers // Jan 2013

    Survey of Cloud Computing Issues at Implementation Level

    Cloud computing is a new way of integrating a set of old technologies to implement a new paradigm that creates an avenue for users to have access to shared and configurable resources through internet on-demand. Cloud users are expected to increase exponentially in the future. In order to prepare for...

    Provided By Journal of Computing

  • White Papers // Sep 2013

    Full and Para-Virtualization with Xen: A Performance Comparison

    Xen is one of the most popular open-source virtualization software's. It supports the two leading virtualization approaches, Full-Virtualization (FV) and Para-Virtualization (PV). Searching the public resources for performance comparison between these two approaches shows that PV performs the best. But most of the answers are theoretical, based on the implementation...

    Provided By Journal of Computing

  • White Papers // Jun 2013

    Network Data Restoration Technology

    Network data restoration technology includes five basic modules: network packet capture, packet unpack, IP fragment reassembly, TCP stream aggregation, and web business extraction. In a network data restoration process, it should first parse the key field information of packets according to TCP/IP standard protocol. Then effectively restructure the IP fragment...

    Provided By Journal of Computing

  • White Papers // Jan 2013

    An Approach for Preserving Privacy and Knowledge in Data Mining Applications

    To control data mining process for different users with different privileges, two approaches were designed to protect the database and data mining usage. The first approach, privacy protection of individuals by adding a white Gaussian noise to selected columns in a database to be mined for an unauthorized user. The...

    Provided By Journal of Computing

  • White Papers // Aug 2013

    Pattern Classification for Incomplete Data Using PPCA and KNN

    Pattern classification has been successfully applied in many problem domains, such as biometric recognition, document classification and medical diagnosis. Missing data or unknown data is a common problem in data quality of a pattern classification. Such missing data are generally ignored or simply imputed in pattern classification, which will affect...

    Provided By Journal of Computing

  • White Papers // May 2013

    Using the Multi-Agent System to Develop a Key Agreement Protocol

    The incremental growth of computer networks by new users joining the network results in a confidentiality problem with the transmission of data. To solve this problem, symmetric/asymmetric key cryptography is mostly used. However, this cipher suffers from the problem of secret key maintenance and distribution across the internet which is...

    Provided By Journal of Computing

  • White Papers // Oct 2013

    Implementing Cloud Computing in ERP

    Cloud computing is a new technology trend which changed how information systems operated and used, while ERP is one of the most used enterprise applications by the market, and considered the core of many corporations. The fact that ERP systems require high resources in term of cost, time and people...

    Provided By Journal of Computing

  • White Papers // Oct 2013

    The Assessment of Employing Computational Intellection in Intrusion Detection Systems

    Computer systems of today are subject to many attacks and it can be anticipated that these problems will increase in the future era. One way of protecting the systems is to use better authentication and other categories of preventive security mechanisms. These mechanisms do not offer good enough protection in...

    Provided By Journal of Computing

  • White Papers // Oct 2013

    Enhancement of Missing Values Prediction and Estimation Using Data Mining Algorithms

    In real life, users of most of the database systems face problems related to missing values, whether these values are unknown to the users or inapplicable. The database is an image of the real life and life is always incomplete. For this reason many researchers tried to complete the database...

    Provided By Journal of Computing

  • White Papers // Sep 2013

    A Review of Intrusion Detection System Schemes in Wireless Sensor Network

    Wireless Sensor Network (WSN) comprises of several tiny devices, low-cost, low-power and sensor nodes. This node has distinctive nature unlike from other networks. It includes a huge amount of small sensing devices with some limitation in energy, computation, and communication capabilities. These sensing devices are designed for specific applications, and...

    Provided By Journal of Computing

  • White Papers // Feb 2013

    Fast and Secure Image Hiding Scheme Based on Cryptographic Techniques

    In this paper the authors present a simple but secure novel reversible scheme for hiding a whole encrypted image inside another cover image. A selected image to be hidden is first encrypted using logical bit operations. A circular bit rotation and XOR operations are applied on an image according to...

    Provided By Journal of Computing

  • White Papers // Apr 2013

    Automated Fingerprint Identification System Application For System's Equal Error Rate Evaluation

    Automated fingerprint identification system has an increasingly important role in modern times. This paper presents the steps of the automated fingerprint identification system and presents an application for fingerprint identification and system's equal error rate evaluation. The algorithm for fingerprint image enhancement is a key element of the system. A...

    Provided By Journal of Computing

  • White Papers // May 2013

    Analysis of P2P Traffic Identification Methods

    With the development of the P2P traffic, it brings the users various kinds of services, but it also take over a large amount of network resources. Because of this, it affects other services which make it become the hot topic of academic research. As research continues, more and more identification...

    Provided By Journal of Computing

  • White Papers // May 2013

    A Survey of Real-Time Fault-Detection Schemes in Mobile Computing

    The recent past two decades have witnessed a phenomenal technological and architectural evolution in wireless communication. However, the development has also created certain challenges under resolution, one of which is fault detection in mobile computing. Wireless protocols must have the ability to detect faults in the mobile computing environment and...

    Provided By Journal of Computing

  • White Papers // Oct 2013

    A Practical Approach for Evaluation of Security Methods of Wireless Network

    MAC filtering, WEP key encryption, WPA2 and firewalls are the security modes used for securing the users wireless network. These security methods are standardized by IEEE as well as by WECA alliance. IEEE 802.11-2007 standard for wireless network classifies security algorithms into: RSNA and Pre-RSNA. Pre-RSNA algorithms are the algorithms...

    Provided By Journal of Computing

  • White Papers // Jan 2013

    An Automatic Face Detection and Gender Classification from Color Images using Support Vector Machine

    In this paper the authors present combined face detection and gender classification method of discriminating between faces of men and women. This is done by detecting the human face area in image given and detecting facial features based on the measurements in pixels. The proposed algorithm converts the RGB image...

    Provided By Journal of Computing

  • White Papers // Oct 2012

    Java and C/C++ Interoperability: Java Integration to Windows Event Log

    SUN Java provides a mechanism for integration with functions coded in C/C++ or assembler, and basically offers two frameworks: Java Native Interface (JNI), and Java Native Access (JNA). In this paper, each of these two frameworks are first described, and then JNI is demonstrated with an example code, which uses...

    Provided By Journal of Computing

  • White Papers // Oct 2012

    Acute Leukemia Classification Using Bayesian Networks

    In this paper, two models for constructing acute leukemia classifiers using the Signal-to-Noise Ratio (SNR) gene selection method in conjunction with the Bayesian Networks (BNs) have been proposed. In the first model, genes of the acute leukemia training dataset are ranked using the SNR method and then top ranked genes...

    Provided By Journal of Computing

  • White Papers // Sep 2012

    A Secure Email System Based on IBE, DNS and Proxy Service

    Now a days, email has become the most widely used communication system in daily life. The main reason for using email is probably because of the convenience and speed in which it can be transmitted irrespective of geographical distances. To improve security and efficiency of email system, most of the...

    Provided By Journal of Computing

  • White Papers // Aug 2012

    An Audio Haptic Tool for Visually Impaired Web Users

    An application that functions as a browser has been created for visually impaired web users. It is distinctive from popular browsers such as Internet Explorer, Firefox and Google Chrome as it is designed specifically for partially sighted and blind web users. The custom browser provides the feel of website elements...

    Provided By Journal of Computing

  • White Papers // Aug 2012

    Broadband Internet and Czech Competitive Advantage

    The rapid evolution of telecommunication, World Wide Web, and computing technologies continues to shape the businesses around the globe. In this rapidly changing technological environment, a country's broadband internet readiness has become a significant factor of the global competitiveness of a nation. Using a modified porter's diamond model, this paper...

    Provided By Journal of Computing

  • White Papers // Aug 2012

    Management Strategies for Integrating Cloud Computing into VoIP

    This paper is to present significant elements that can influence the voice quality in a VoIP network and to find methods of improving them. After analyzing the impact of QoS, solutions are proposed in order to minimize its effect as well as strategies for management. Since, service level agreement requires...

    Provided By Journal of Computing

  • White Papers // Aug 2012

    Software Quality Management System

    Software process quality management systems are the core data and knowledge repository for making any decision regarding process improvement. Such systems if exists in the software house can dramatic improve decision analysis and resolution for process improvement. Many software quality management tools are available some academic research tools and some...

    Provided By Journal of Computing

  • White Papers // Aug 2012

    The Topology of P2P Network

    The P2P network is a logical overlay network built up by the application software on the basis of IP network. The topology of P2P network refers to the physical or logical interconnection between computing units in distributed system, the topology between the nodes has been an important basis for determining...

    Provided By Journal of Computing

  • White Papers // Aug 2012

    Understanding the Factors that Effect Information Overload and Miscommunication within the Workplace

    This paper explores and creates a model that shows the relationship between email interaction and the negative effects of e-mail use. The authors focus on the process of personalization, a learning process in which users adapt e-mail to their own specific individual needs. This process is used to explain two...

    Provided By Journal of Computing

  • White Papers // Aug 2012

    A Composite Scheduling Approach for Burst Loss Minimization in Optical Burst Switched Networks

    In Optical Burst Switched (OBS) networks, burst scheduling is one of the key issue, which affects the performance of networks. Several, scheduling algorithms have been used, such as horizon and void filling based algorithms. Void filling algorithms reduces burst loss, but it has more execution time as compared to horizon...

    Provided By Journal of Computing