Journal of Computing

Displaying 1-40 of 182 results

  • White Papers // Jan 2014

    Performance Analysis of Node Placement in Linear Wireless Sensor Networks

    Linear Wireless Sensor Networks (LWSNs) are captivating significant attention because of their suitability for wide-range of applications. These applications dictate the topology of the network (i.e., placement of nodes) and introduce unique challenges such as non-uniform energy consumption. Moreover, these applications require LWSNs to operate for decades. However, sensor nodes...

    Provided By Journal of Computing

  • White Papers // Dec 2013

    An Associative Classification Data Mining Approach for Detecting Phishing Websites

    Phishing websites are fake websites that are created by dishonest people to mimic web pages of real websites. Victims of phishing attacks may expose their financial sensitive information to the attacker whom might use this information for financial and criminal activities. Various approaches have been proposed to detect phishing websites,...

    Provided By Journal of Computing

  • White Papers // Dec 2013

    Design and Simulation of a Green Broker with Imprecise Computation Scheduling for Energy-efficient Large Scale Computing in Clusters

    Cluster computing has attracted attention for large scale computing using idle CPU cycles of personal computers connected in local area network. The authors propose a green broker with imprecise computation scheduling for large scale computing in clusters. Imprecise computation techniques provide scheduling flexibility by trading off result quality to meet...

    Provided By Journal of Computing

  • White Papers // Dec 2013

    Combinatoric Drag-Pattern-Graphical-Password (DPGP)

    Creating secure password has been limited attributable to password restriction and policy. Users tend to choose memorable passwords that are easy to guess. However, sophisticated systems assigned passwords that are difficult to remember. In this paper, the focus will be on the Drag - Pattern-Graphical-Password (DPGP). DPGP password is proposed...

    Provided By Journal of Computing

  • White Papers // Dec 2013

    Hidden Crimes: Freedom of Expression on the Internet

    Freedom of expression is a brave stand towards the prohibition of certain words, terms or expressions, particularly if mockery and offensive styles were avoided with various topics such as religion, politics, community issues, etc. At this particular time, the authors need to identify freedom of expression on the Internet in...

    Provided By Journal of Computing

  • White Papers // Nov 2013

    Systematic Review and Comparison of Anomaly Based Network Intrusion Detection Systems Based on Efficiency

    Currently, Anomaly based Network Intrusion Detection (ANID) is the solution for novel and sophisticated attacks. This paper focuses on the comparison of Anomaly based Network Intrusion Detection Systems (ANIDS) based on efficiency. A collection of ANIDS that were trained and tested using KDD cup 99 dataset in the period 2002...

    Provided By Journal of Computing

  • White Papers // Nov 2013

    Cloud Computing: The Level of Awareness Amongst Small & Medium-sized Enterprises (SMEs) in Developing Economies

    Cloud computing services are being touted as a major enabler for small businesses lately. This new paradigm is seen to offer unique opportunities to Small and Medium Enterprises (SMEs) worldwide and developing economies are no exception. It presents SMEs access to similar technologies available to their larger counterparts and those...

    Provided By Journal of Computing

  • White Papers // Oct 2013

    Implementing Cloud Computing in ERP

    Cloud computing is a new technology trend which changed how information systems operated and used, while ERP is one of the most used enterprise applications by the market, and considered the core of many corporations. The fact that ERP systems require high resources in term of cost, time and people...

    Provided By Journal of Computing

  • White Papers // Oct 2013

    The Assessment of Employing Computational Intellection in Intrusion Detection Systems

    Computer systems of today are subject to many attacks and it can be anticipated that these problems will increase in the future era. One way of protecting the systems is to use better authentication and other categories of preventive security mechanisms. These mechanisms do not offer good enough protection in...

    Provided By Journal of Computing

  • White Papers // Oct 2013

    Enhancement of Missing Values Prediction and Estimation Using Data Mining Algorithms

    In real life, users of most of the database systems face problems related to missing values, whether these values are unknown to the users or inapplicable. The database is an image of the real life and life is always incomplete. For this reason many researchers tried to complete the database...

    Provided By Journal of Computing

  • White Papers // Oct 2013

    A Practical Approach for Evaluation of Security Methods of Wireless Network

    MAC filtering, WEP key encryption, WPA2 and firewalls are the security modes used for securing the users wireless network. These security methods are standardized by IEEE as well as by WECA alliance. IEEE 802.11-2007 standard for wireless network classifies security algorithms into: RSNA and Pre-RSNA. Pre-RSNA algorithms are the algorithms...

    Provided By Journal of Computing

  • White Papers // Sep 2013

    D-SPARQ: Distributed, Scalable and Efficient RDF Query Engine

    The authors present D-SPARQ, a distributed RDF query engine that combines the MapReduce processing framework with a NoSQL distributed data store, and MongoDB. The performance of processing SPARQL queries mainly depends on the efficiency of handling the join operations between the RDF triple patterns. Their system features two unique characteristics...

    Provided By Journal of Computing

  • White Papers // Sep 2013

    A Review of Intrusion Detection System Schemes in Wireless Sensor Network

    Wireless Sensor Network (WSN) comprises of several tiny devices, low-cost, low-power and sensor nodes. This node has distinctive nature unlike from other networks. It includes a huge amount of small sensing devices with some limitation in energy, computation, and communication capabilities. These sensing devices are designed for specific applications, and...

    Provided By Journal of Computing

  • White Papers // Sep 2013

    Full and Para-Virtualization with Xen: A Performance Comparison

    Xen is one of the most popular open-source virtualization software's. It supports the two leading virtualization approaches, Full-Virtualization (FV) and Para-Virtualization (PV). Searching the public resources for performance comparison between these two approaches shows that PV performs the best. But most of the answers are theoretical, based on the implementation...

    Provided By Journal of Computing

  • White Papers // Sep 2013

    A Survey of Sink Mobility Models for Wireless Sensor Networks

    Using mobile sinks to collect information in wireless sensor networks is an interesting area of research. As a result, a variety of mobility models were proposed by researchers over the years where each mobility model has its own properties that may affect the performance of the network in a way...

    Provided By Journal of Computing

  • White Papers // Sep 2013

    Analysis of Peer-to-Peer File Sharing Network Simulation

    Peer-To-Peer (P2P) applications have shown their popularity on the internet for file sharing. When a researcher proposes or enhances an algorithm for a peer to peer file sharing system, the user's needs to test and evaluate it so that it to be shown to be valid and verify. The ways...

    Provided By Journal of Computing

  • White Papers // Aug 2013

    Pattern Classification for Incomplete Data Using PPCA and KNN

    Pattern classification has been successfully applied in many problem domains, such as biometric recognition, document classification and medical diagnosis. Missing data or unknown data is a common problem in data quality of a pattern classification. Such missing data are generally ignored or simply imputed in pattern classification, which will affect...

    Provided By Journal of Computing

  • White Papers // Jul 2013

    Comparison of Selection Methods and Crossover Operations using Steady State Genetic Based Intrusion Detection System

    Intrusion detection systems are systems built to detect the unwanted attacks. Genetic algorithm is a method that mimics the process of natural evolution; it was used to support the intrusion detection systems. Genetic algorithm contains several elements such as population size, evaluation, encoding, crossover, mutation, replacement and stopping criterion. Elements...

    Provided By Journal of Computing

  • White Papers // Jun 2013

    Network Data Restoration Technology

    Network data restoration technology includes five basic modules: network packet capture, packet unpack, IP fragment reassembly, TCP stream aggregation, and web business extraction. In a network data restoration process, it should first parse the key field information of packets according to TCP/IP standard protocol. Then effectively restructure the IP fragment...

    Provided By Journal of Computing

  • White Papers // Jun 2013

    The S-Linked List - A Variant Of The Linked List Data Structure

    Using doubly linked list in embedded systems can be expensive. Although doubly linked is efficient in terms of time complexity and highly flexible in itself, enabling easy traversal and update, but it often demands more memory space compared to other list data structure - this is as a result of...

    Provided By Journal of Computing

  • White Papers // May 2013

    Android and Real-Time Applications: Take Care!

    Android is thought as being yet another operating system! In reality, it is a software platform rather than just an OS; in practical terms, it is an application framework on top of Linux, which facilitates its rapid deployment in many domains. Android was originally designed to be used in mobile...

    Provided By Journal of Computing

  • White Papers // May 2013

    Simple Routing Algorithm for Multi-hop Wireless Network

    Routing of data packets through wireless multi-hop networks is challenging, particularly when there are large number of nodes and objective is to optimize end to end throughput or delay. Simple route construction algorithm becomes attractive as it requires fewer computations and various routes are compared with less expenditure of computational...

    Provided By Journal of Computing

  • White Papers // May 2013

    Using the Multi-Agent System to Develop a Key Agreement Protocol

    The incremental growth of computer networks by new users joining the network results in a confidentiality problem with the transmission of data. To solve this problem, symmetric/asymmetric key cryptography is mostly used. However, this cipher suffers from the problem of secret key maintenance and distribution across the internet which is...

    Provided By Journal of Computing

  • White Papers // May 2013

    Analysis of P2P Traffic Identification Methods

    With the development of the P2P traffic, it brings the users various kinds of services, but it also take over a large amount of network resources. Because of this, it affects other services which make it become the hot topic of academic research. As research continues, more and more identification...

    Provided By Journal of Computing

  • White Papers // May 2013

    A Survey of Real-Time Fault-Detection Schemes in Mobile Computing

    The recent past two decades have witnessed a phenomenal technological and architectural evolution in wireless communication. However, the development has also created certain challenges under resolution, one of which is fault detection in mobile computing. Wireless protocols must have the ability to detect faults in the mobile computing environment and...

    Provided By Journal of Computing

  • White Papers // May 2013

    Networks Integration Between Wireless LAN and UMTS Networks- A Brief Study

    In this paper the authors present a brief study on issues associated with network integration between Wireless LAN (WLAN) and Universal Mobile Telecommunications System (UMTS) networks. Network integration of WLAN and UMTS networks is an area that requires continuous research attention. It gives service providers the opportunity to offer additional...

    Provided By Journal of Computing

  • White Papers // Apr 2013

    Automated Fingerprint Identification System Application For System's Equal Error Rate Evaluation

    Automated fingerprint identification system has an increasingly important role in modern times. This paper presents the steps of the automated fingerprint identification system and presents an application for fingerprint identification and system's equal error rate evaluation. The algorithm for fingerprint image enhancement is a key element of the system. A...

    Provided By Journal of Computing

  • White Papers // Apr 2013

    WP - A Tree Based Response Time Algorithm for Event Driven Wireless Sensor Networks

    Irrespective of the deployment strategy or the coverage constraints, the usual energy conservation inevitability remains. Among the many approaches that have come up so as to save energy, reducing the number of transmissions and an effective routing strategy accomplish consideration. In addition to the number of transmissions, the response time...

    Provided By Journal of Computing

  • White Papers // Apr 2013

    E-Government Based on Cloud Computing

    The concept of cloud computing becomes important for each government, facilitating its way of work, increasing its productivity and all that leading to cost savings. Different country chooses different strategy for adoption of cloud computing with a possibility to become better and more effective e-government. In this paper, the scope...

    Provided By Journal of Computing

  • White Papers // Feb 2013

    Fast and Secure Image Hiding Scheme Based on Cryptographic Techniques

    In this paper the authors present a simple but secure novel reversible scheme for hiding a whole encrypted image inside another cover image. A selected image to be hidden is first encrypted using logical bit operations. A circular bit rotation and XOR operations are applied on an image according to...

    Provided By Journal of Computing

  • White Papers // Feb 2013

    Teletraffic Analyses of Blocked Calls and Handoff Failures of LEO Mobile Satellite Systems

    Satellite communications have had a significant impact on wireless communication services owing to its versatility in comparison to its terrestrial cousins. In today's wireless mobile world, Mobile Satellite Services (MSS) are indispensable and are used side by side with the very popular cellular services the authors have all become so...

    Provided By Journal of Computing

  • White Papers // Feb 2013

    A New Scheme for Sealed Digital Signatures

    Now-a-days, people are looking for the easiest way to do things. The digital world has made that even more possible. One aspect is the way when the people sign documents and papers, how to present them self officially. When this aspect has been started to be a critical thing in...

    Provided By Journal of Computing

  • White Papers // Feb 2013

    Real Time Radio Frequency Identification Vehicles Data Logger Traffic Management System

    This paper presents a traffic management system that combines RFID and GSM technologies which they are considered to be two of the currently fastest growing technologies, RFID technology which provide a reliable data reading without the need for line-of-sight that other data detecting technologies depend on. While GSM is an...

    Provided By Journal of Computing

  • White Papers // Feb 2013

    A Hybrid Intrusion Detection System Using Hamming and MAXNET Neural Nets Using NDIS Dataset

    In this paper, the authors present a model to improve the security of network system. Intrusion Detection System (IDS) detects suspected patterns of network traffic through analysis of those traffic packets. The major problems of existing models are recognition of new attacks, low accuracy, and detection time and system adaptability....

    Provided By Journal of Computing

  • White Papers // Feb 2013

    A Dual-Band U-Slot PIFA Antenna With Ground Slit for RFID Applications

    In this paper, a Planar Inverted-F Antenna (PIFA) with U-Slot (U-PIFA) and slit in ground is introduced. The proposed PIFA is compact with single coaxial feed, single short strip, and single short pin. The main achievement of this research was the design of ISM Microwave bands 2.45/5.8 GHz dual band...

    Provided By Journal of Computing

  • White Papers // Jan 2013

    An Automatic Face Detection and Gender Classification from Color Images using Support Vector Machine

    In this paper the authors present combined face detection and gender classification method of discriminating between faces of men and women. This is done by detecting the human face area in image given and detecting facial features based on the measurements in pixels. The proposed algorithm converts the RGB image...

    Provided By Journal of Computing

  • White Papers // Jan 2013

    Neural Network Synchronization Protocol

    This paper deals with the design of secure communication protocol based on neural network synchronization. Protocol is built on the application-layer of the OSI upon TCP/IP. Server and each connected client must create special type of neural network called Tree Parity Machine then compute outputs of their neural networks and...

    Provided By Journal of Computing

  • White Papers // Jan 2013

    Research on the Traffic Behavior Characteristics of P2P Streaming Media

    With the development and popularization of Internet, P2P streaming media traffic has become the most important part of the variety kinds of network traffic. Therefore, the study of P2P streaming media traffic characteristics has important significance for the analysis and identification network traffic. In this paper, on the basis of...

    Provided By Journal of Computing

  • White Papers // Jan 2013

    Survey of Cloud Computing Issues at Implementation Level

    Cloud computing is a new way of integrating a set of old technologies to implement a new paradigm that creates an avenue for users to have access to shared and configurable resources through internet on-demand. Cloud users are expected to increase exponentially in the future. In order to prepare for...

    Provided By Journal of Computing

  • White Papers // Jan 2013

    An Approach for Preserving Privacy and Knowledge in Data Mining Applications

    To control data mining process for different users with different privileges, two approaches were designed to protect the database and data mining usage. The first approach, privacy protection of individuals by adding a white Gaussian noise to selected columns in a database to be mined for an unauthorized user. The...

    Provided By Journal of Computing

  • White Papers // Feb 2012

    A Distributed Shared Memory Cluster Architecture With Dynamic Load Balancing

    This paper proposes distributed shared memory cluster architecture with load balancing. The architecture is based on dynamic task scheduling approach for distribution and assignment. It enhances the performance of communication across clusters for data access. The proposed dynamic load balancing model uses the concept of work stealing, which intelligently balances...

    Provided By Journal of Computing

  • White Papers // Feb 2012

    AODV Extension Using Ant Colony Optimization for Scalable Routing in VANETs

    On demand set up, fault tolerance and unconstrained connectivity are the major advantages of mobile computing, that's why it continues to enjoy rapid growth. In last three decades, tremendous improvement is made in the area of wireless ad-hoc network. Now a days, one of the most attractive research topic is...

    Provided By Journal of Computing

  • White Papers // Jul 2012

    Generating a New Group Digital Signatures

    This paper presents a new method for generating group digital signatures. Because of the importance of digital signatures in electronic management of business's documents, it is important to develop strong methods to enhance and authenticate business's documents in electronic environment, especially in sensitive applications. Existing methods normally implement asynchronous encryption...

    Provided By Journal of Computing

  • White Papers // Jul 2012

    IEEE 802.11s Wireless Mesh Networks for Last-Mile Internet Access: An Up-Down Link Approach

    Being multi-hop wireless networks, Wireless Mesh Networks (WMNs) are witnessing limited network capacity, mainly due to the contention among nodes in multi-hop paths. Several techniques have been proposed to cope with the limitation, e.g., using multi-channels. These techniques, however, do not account for the very specificity of traffic flow in...

    Provided By Journal of Computing

  • White Papers // Jun 2012

    Data Mining and Wireless Sensor Network for Groundnut Pest Thrips Dynamics and Predictions

    With the advent of data generation, collection and storage technologies, world is overwhelmed with data everywhere. Following this trend, more and more agricultural data are nowadays are virtually being harvested along with the crops and are being collected/stored in databases. As the volume of the data increases, the gap between...

    Provided By Journal of Computing

  • White Papers // Jun 2012

    Architectural Analysis of Multi-Agents Educational Model in Web-Learning Environments

    The paper presents a structure for using intelligent multi-agents architecture for an educational system and internet teaching. In this architecture, a model of multi-agents learning environments consists of: the domain model, the communication model and the user model. They contain all the domain knowledge of the target application and the...

    Provided By Journal of Computing

  • White Papers // Jun 2012

    A Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems

    The reported recent success of cloud computing has attracted attention for cost effective IT services with many signs for continuing spread out if not dominating in the coming years. However, challenges are being faced by both research and professional communities including quality reliable services, optimized architectures and security. Meanwhile, IT...

    Provided By Journal of Computing

  • White Papers // Jun 2012

    A Secured and Semantically Addressed E-Mail Service

    This paper illustrates the use of semantic addresses to send emails in a corporate environment. Semantic Email Addressing (SEA) allows emails to be sent to a semantically specified recipient or group of recipients, which may be dynamically changing overtime. In order to describe the concept of SEA and its advantages,...

    Provided By Journal of Computing

  • White Papers // Jun 2012

    An Anomaly Detector for Keystroke Dynamics Based on Medians Vector Proximity

    This paper presents an anomaly detector for keystroke dynamics authentication, based on a statistical measure of proximity, evaluated through the empirical study of an independent benchmark of keystroke data. A password typing-rhythm classifier is presented, to be used as an anomaly detector in the authentication process of genuine users and...

    Provided By Journal of Computing

  • White Papers // May 2012

    LTE-Advanced: Requirements and Technical Challenges for 4G Cellular Network

    The higher peak data rates for mobile user are in demand. Audio/Video streaming, online conferences, and social media services are becoming the necessity of life. In order to fulfill the sheer amount of data need of users, robust and efficient wireless technology is needed. LTE-Advanced, which is based on Rel-10...

    Provided By Journal of Computing

  • White Papers // May 2012

    An Evaluative Study of Automation Software Applications and Database Management Systems in Academic Libraries

    Library automation not only improves the image of the library services but also provides additional services to the users with the existing staff. It provides equal opportunities to all staff members for organizational learning, reengineering, and benchmarking. The present study demonstrates and elaborates the library automation software and it types...

    Provided By Journal of Computing

  • White Papers // May 2012

    The Research on the Analysis of the Redundant Data

    The data of port-80 is an important part of network data, which is also one of the data services that the authors study accurately at this stage. Through mining data packets of port-80 deeply, mining characteristics of data flow horizontally, and vertically mining the data business and behavioral characteristic of...

    Provided By Journal of Computing

  • White Papers // May 2012

    Software Models, Extensions and Independent Models in Cocomo Suite: A Review

    Different models over the years have been proposed to support the software cost estimation processes. Cocomo (Constructive Cost Model) is one of the successful models which enabled software engineers to reliably reason about the effort and schedule estimates. Since past few years different derivative models and extensions of Cocomo have...

    Provided By Journal of Computing

  • White Papers // May 2012

    Performance Analysis of Parallelizing Program Code for Multi-Core Architectures Using OPENMP

    Multi-core architectures have become more popular due to better performance, reduced heat dissipation, power consumption and more efficient simultaneous processing of multi tasks. If one wishes to run a single application faster, then that application must be divided into sub programs, or threads, that cooperate to deliver the desired functionality....

    Provided By Journal of Computing

  • White Papers // May 2012

    Role of Information and Communication Technologies in the Smart Grid

    In the smart grid operation and management, reliable and real-time information and communication networks play a very critical role. By integrating the appropriate Information and Communication Technologies (ICT) infrastructure, automated control, sensing and metering technologies, and energy management techniques, the smart grid has emerged as a solution that empowers utilities...

    Provided By Journal of Computing

  • White Papers // May 2012

    The Role of Requirement Engineering in Software Development Life Cycle

    The Requirement Engineering (RE) is the most important phase of the Software Development Life Cycle (SDLC). This phase is used to translate the imprecise, incomplete needs and wishes of the potential users of software into complete, precise and formal specifications. The specifications act as the contract between the software users...

    Provided By Journal of Computing

  • White Papers // May 2012

    Comparative Study of Gaussian and Nearest Mean Classifiers for Filtering Spam e-Mails

    The development of data-mining applications such as classification and clustering has shown the need for machine learning algorithms to be applied to large scale data. The paper gives an overview of some of the most popular machine learning methods (Gaussian and Nearest Mean) and of their applicability to the problem...

    Provided By Journal of Computing

  • White Papers // May 2012

    Analyses of Student Programming Errors in Java Programming Courses

    Computing students' difficulties in understanding Java programming provided a practical context for a critical investigation of why this continues to exist. An exploratory study was conducted by Computing department staff at the National University of Samoa to investigate what were the most common errors students made in Java programming classes....

    Provided By Journal of Computing

  • White Papers // Apr 2012

    Effective Pair Programming Practice-An Experimental Study

    Pair programming is a practice, where two programmers work on a single task. Long research has been carried out in industries, and efficient results were achieved. Research is also being done in implementing the pair programming techniques in academics and good results are seen. In this paper, the authors suggested...

    Provided By Journal of Computing

  • White Papers // Apr 2012

    Performance Analysis of Two-Layer Spreading Scheme Based FEC Encoded MC - CDMA Wireless Communication System Under Implementation of Various Signal Detection Schemes

    In this paper, a comprehensive study has been made on the performance evaluation of a two-layer spreading scheme based MC-CDMA wireless communication system. The 1/2-rated convolutionally encoded system under present study incorporates three linear signal detection techniques (Equalizers) such as Minimum Mean Square Error (MMSE), Zero Forcing (ZF) and Sphere...

    Provided By Journal of Computing

  • White Papers // Dec 2011

    Comparative Study of Scalability and Availability in Cloud and Utility Computing

    Cloud computing and Utility computing paradigms are two resource sharing architectures. The vivid and multi-institutional natures of these environments instigate different challenges in context of availability and scalability. In this paper, the authors discuss the normal architecture of Cloud and Utility computing followed by crucial areas which are availability and...

    Provided By Journal of Computing

  • White Papers // Dec 2011

    Efficient Method for Multiple-Level Association Rules in Large Databases

    The problems of developing models and algorithms for multilevel association mining pose for new challenges for mathematics and computer science. These problems become more challenging when some form of uncertainty in data or relationships in data exists. In this paper, the authors present a partition technique for the multilevel association...

    Provided By Journal of Computing

  • White Papers // Dec 2011

    Design Considerations for Developing Disk File System

    File system design has never been a straight forward task. Moreover, designing and developing a disk file system is a complex case of file system development. From time to time, since the inception of first magnetic disk in 1956, many disk file systems were drafted and implemented to fit the...

    Provided By Journal of Computing

  • White Papers // Dec 2011

    Evaluating Effectiveness of Software Testing Techniques With Emphasis on Enhancing Software Reliability

    The authors have a great number of software testing techniques at their disposal for testing a software product. Although, the utilization of these techniques is growing, they do have a very inadequate knowledge about their relative quantitative and qualitative statistics. The choice of a software testing technique in software testing...

    Provided By Journal of Computing

  • White Papers // Oct 2011

    Satellite Communications: Impact on Developing Economies

    Access to information and communication infrastructure greatly enhances economic growth. When a reliable and affordable medium for information exchange is available, previously unanticipated developments ensue. Most areas in developing countries are sparsely populated and highly rural. Satellite communication is an excellent option for meeting this and many other pressing communication...

    Provided By Journal of Computing

  • White Papers // Oct 2011

    A Study of Mining Software Engineering Data and Software Testing

    The primary goal of software development is to deliver Optimal Software, i.e., software produced at low cost, high quality & productivity and scheduled with in time. In order to achieve this optimal software, programmers generally reuse the existing libraries, rather than developing similar code products right from the scratch. While...

    Provided By Journal of Computing

  • White Papers // Oct 2011

    Influence Number of Antennas on the Total Sensing Time in Cognitive Radio Systems

    In the Cognitive Radio (CR) systems the total scanning time that is the time taken by the receiver to sense the spectrum is one of the issues in perspective of the overall system performance. This paper proposes architecture for a dedicated receiver capable to reduce sensing time with using dual...

    Provided By Journal of Computing

  • White Papers // Oct 2011

    Proffering a Brand New Method for Mapping of Tasks to Resource in Grid Computing With the Aims of Load Balancing Based on P2P Model Uses Ant Colony Algorithm

    Computational Grid is a new paradigm in distributed computing which aims to realize a large-scale high performance computing environment over geographically distributed resources. Resource management and load balancing are key concerns when implementing grid middleware and improving resource utilization. The main goal of load balancing is to provide a distributed,...

    Provided By Journal of Computing

  • White Papers // Oct 2011

    Detection and Control of DDOS Attacks Over Reputation and Score Based MANET

    MANET is quickly spreading for the property of its capability in forming rapidly changing topologies network without the aid of any established infrastructure or centralized administration. The security challenges in MANET have become a primary concern to provide secure communication. The Attacks on MANET disrupts network performance and reliability. The...

    Provided By Journal of Computing

  • White Papers // Oct 2011

    Impact of Agile Software Development on Quality Within Information Technology Organizations

    Quality and an emphasis on quality are must have ingredients for an organization to be successful. Therefore, in the present environment of fast pace software development, quality plays an essential role when it comes to the long term viability of IT organizations. As a result of continuous quality improvement, IT...

    Provided By Journal of Computing

  • White Papers // Oct 2011

    A CBR-based Approach to ITIL-Based Service Desk

    During the last 20 years ITIL (IT Infrastructure Library) has been evolving with the latest version published in 2007. Incident Management and Problem Management are two main activities of ITIL service operation framework which handles incidents and their root causes respectively. Service Desk systems are software tools that help IT...

    Provided By Journal of Computing

  • White Papers // Oct 2011

    A Novel Metric for Measuring the Readability of Software Source Code

    Software metrics gives developers and their client and users of Software information about the quality of their Software products. They are employed in taking decisions at various levels of Software Life Cycle (SLC). This paper presents a novel metric for measuring the readability of Software Source Code (SC). Maintenance changes...

    Provided By Journal of Computing

  • White Papers // Oct 2011

    Performance Comparison of Two Dynamic Routing Protocols: RIP and OSPF

    There are two main classes of adaptive routing protocols in the internet: distance vector and link state. This paper presents the comparison between distance vector and link state. It also outlines the pros and cons of RIP and OSPF protocols and a performance analysis with some possible enhancement is presented....

    Provided By Journal of Computing

  • White Papers // Oct 2011

    Investigation and Addressing Unfairness in Wireless Mesh Networks

    Unfairness is one of the major problems in WMN as each node operates not only as a host but also as a router, forwarding packets on behalf of other nodes that may not be within the direct wireless transmission range of their destinations and thereby adding delay and affecting the...

    Provided By Journal of Computing

  • White Papers // Oct 2011

    Classification of Artificial Intelligence IDS

    Many methods have been developed to secure the network infrastructure and communication over the Internet. Intrusion detection is relatively new addition to such techniques. Intrusion Detection Systems (IDSs) are used to find out if someone has intrusion into or is trying to get in the network. One big problem is...

    Provided By Journal of Computing

  • White Papers // Oct 2011

    Security Issues in Cloud Computing: The Potentials of Homomorphic Encryption

    The prominence of the place of cloud computing in future converged networks is incontestable. This is due to the obvious advantages of the cloud as a medium of storage with ubiquity of access platforms and minimal hardware requirements on the user end. Secure delivery of data to and from the...

    Provided By Journal of Computing

  • White Papers // Sep 2011

    Intelligent Widget Reconfiguration for Mobile Phones

    A significant amount of research work in user interface design exists with a proportion of this extendable platforms. Some investigate the effect of user ability on interface generation for mobile applications. Other works analyzed how different contexts and mobile platforms affect the generation of these interfaces. However, most of these...

    Provided By Journal of Computing

  • White Papers // Sep 2011

    Imparting Tutorials Using Online e-Commerce Application and Virtualization Concept of Standalone PC Environment

    The authors have acquired knowledge about virtualization through various sources and tutorial materials, which overcomes network resources investment for communication purpose. Accordingly, using this virtualization communication perception, people in corporate world have developed Desktop Virtualization sharing and learning respectively online from their desktop system. Their research area also concentrates on...

    Provided By Journal of Computing

  • White Papers // Sep 2011

    Rough Set Adaptive in the Model Based of Cellular Automata and Multi-Agents

    The need for intelligent systems has grown in the past decade because of the increasing demand on humans and machines for better performance. The researchers of AI have responded to these needs with the development of intelligent hybrid systems. This paper describes the modeling language for interacting hybrid systems in...

    Provided By Journal of Computing

  • White Papers // Sep 2011

    File Systems in Linux and FreeBSD: A Comparative Study

    This paper compares file systems in Ubuntu Linux and FreeBSD and then analyzes the best utilization. The generic file systems, EXTended File System (EXT2) of Linux and Fast File System (FFS) of FreeBSD operating systems, are evaluated using benchmark tests. It is proposed that a better file system could be...

    Provided By Journal of Computing