Journal of Computing

Displaying 1-40 of 232 results

  • White Papers // Aug 2014

    A Survey of Security Issues for Data Sharing over Untrusted Cloud Providers

    Interest in cloud computing market is growing rapidly in the recent years. It provides on-demand, high scalability computing resources with high availability and reliability. However, security is considered as one of the biggest obstacles for cloud computing. In this paper, the authors focus on the main security and privacy issues,...

    Provided By Journal of Computing

  • White Papers // Aug 2014

    Review and Analysis of Pothole Detection Methods

    As one type of pavement distresses, potholes are important clues indicating structural defects of the asphalt road, and accurately detecting these potholes is one of important tasks for determining proper strategies of asphalt-surfaced pavement maintenance and rehabilitation. However, manually detecting and evaluating methods are expensive and time-consuming. Thus, several efforts...

    Provided By Journal of Computing

  • White Papers // Aug 2014

    Automatic Learning Context Tool for Effective Personal Document Indexing and Retrieval

    Managing digital documents has become a time consuming process due to sheer scale. Most users manage their personal documents by creating logical hierarchical folder structures. This logical structure depends on the user's assessment of the context of the document. Basic file structuring has not been changed for decades and hierarchical...

    Provided By Journal of Computing

  • White Papers // Aug 2014

    A Novel Real-Time Road Information Management Technique for Traffic Congestion Mitigation

    Road transport is an inevitable requirement to the human civilization where it provides considerable economic and social benefits to the society. However, poor management of traffic flow imposes challenges such as traffic congestion. Problems arise when there is too much traffic for the available physical road capacity to handle. This...

    Provided By Journal of Computing

  • White Papers // Aug 2014

    Efficient Intrusion Detection using Weighted K-means Clustering and Na

    Intrusion Detection System (IDS) is becoming a vital component to secure the network. A successful intrusion detection system requires high accuracy and detection rate. In this paper a hybrid approach for intrusion detection system based on data mining techniques is proposed. The principal ingredients of the approach are weighted k-means...

    Provided By Journal of Computing

  • White Papers // Jun 2014

    Some Issues Pertinent to Now days Mobile Learning

    In this paper, the authors intended to touch on some issues related to the new direction of learning, mobility. This paper also will generally go over some issues pertinent to mobile learning and devices where the learners obviously are intending, intentionally or unintentionally, to utilize mobile devices for learning purposes....

    Provided By Journal of Computing

  • White Papers // Jun 2014

    Advanced Security Models for Cloud Infrastructures

    Cloud computing is the next-generation Internet paradigm that is offered to the business environment, educational domain and, generally, to individual users. While educational institutions and individuals quickly embraced this new technology, companies were reluctant, most of their doubts being related to the security problems. With that in mind, companies prefer...

    Provided By Journal of Computing

  • White Papers // Jun 2014

    Three Node Tandem Communication Network Model with Feedback Having Homogeneous Arrivals

    Communication network plays imperative role in evaluating the communication systems. These have separate deployment for each up-and-coming service like data networks and telephony networks. In communication systems it is usual to consider that the arrivals are characterized by passion process. In this paper, the authors developed and analyzed the three...

    Provided By Journal of Computing

  • White Papers // Jun 2014

    A Review of Big Data Management, Benefits and Challenges

    Big data is relatively a new concept which refers to datasets whose size is beyond the ability of typical database software tools to capture, store, manage and analyze. The accumulated huge amount of data that previously of no significant importance or value have been put into maximum use due to...

    Provided By Journal of Computing

  • White Papers // May 2014

    A Survey of Distributed Association Rule Mining Algorithms

    Association rule mining is a popular and well researched method for discovering interesting relations between variables in large databases. It is intended to identify strong rules discovered in databases using different measures of interestingness. Most ARM algorithms focus on a sequential or centralized environment where no external communication is required....

    Provided By Journal of Computing

  • White Papers // May 2014

    Compatibility Relation and its Application to Network Segmentation and Decentralization

    A relation on a set which is reflexive and symmetric is called a Compatibility Relation (CR). It is difficult to trace since when the profound mathematics of compatibility relation came into existence. In this paper, some new properties of compatibility classes of a finite set endowed with a suitable compatibility...

    Provided By Journal of Computing

  • White Papers // May 2014

    ERP Software Selection using IFS and GRA Methods

    Enterprise Resource Planning (ERP) is like a modular, generic software package integrating the flow of information between departments in all logistics company. Furthermore extended ERP applications provide web-based connections between interdependent organizations like supply chain partners. In order to meet ever-changing needs of the logistics companies competing in dynamic environments,...

    Provided By Journal of Computing

  • White Papers // May 2014

    Description of Consistency Rules in Software Design Models

    Software system is gaining hold on the peoples' daily activities. May it be a grocery store, building designing and architecture, vehicle manufacturing, communication technology, online commerce, local administration, defense or any other aspects of society software system is enhancing the functioning of all aspects of the society. The software systems...

    Provided By Journal of Computing

  • White Papers // May 2014

    Application of ANP in Evaluating Accounting Softwares based on Accounting Information Systems Characteristics

    In today's commercial world, accounting software's are of great importance for purposes of collecting, classifying and yielding financial reports; thus, it is an essential necessity for every firm to select appropriate and highly efficient software in order to reach their organizational goals. This paper applies Analytic Network Process (ANP) method...

    Provided By Journal of Computing

  • White Papers // Apr 2014

    A Cross Layer Protocol for Energy Aware and Critical Data Delivered Applications Using Wireless Sensor Networks

    Environment monitoring applications using Wireless Sensor Networks (WSNs) have had a lot of attention in recent years. In much of this research tasks like sensor data processing, environment states and events decision making and emergency message sending are done by a remote server. A proposed cross layer protocol for two...

    Provided By Journal of Computing

  • White Papers // Apr 2014

    Penetration Testing With Banner Grabbers and Packet Sniffers

    With looming threats from hackers, identity and corporate data thieves, it is impossible to avoid doing penetration testing at the corporate level so as to ascertain the security of the network. The more ubiquitous penetration testing becomes the more likely secure most organizations become. This paper demonstrates how to use...

    Provided By Journal of Computing

  • White Papers // Apr 2014

    Phishing, SMiShing & Vishing: An Assessment of Threats Against Mobile Devices

    In this paper, the authors proposed an exploratory assessment of phishing, SMiShing and vishing attacks against mobile devices. It examines the implications of end-user behavior towards mitigating the risks posed by using mobile devices for online services and facilities. Phishing is that socially engineered attack aimed at enticing unsuspecting users...

    Provided By Journal of Computing

  • White Papers // Apr 2014

    A Review of Algorithms for Determination of Attackability Metrics

    Attackability is a concept proposed recently in literature to measure the extent that a software system or service could be the target of a successful attack. A Holistic predictive attackability metrics model has been proposed in the authors' previous paper. Metrics derived from this model, their theoretical and empirical validation...

    Provided By Journal of Computing

  • White Papers // Apr 2014

    Optimal Operating Performances of Wireless Protocols for Intelligent

    The systems based on intelligent sensors are currently expanding, due to theirs functions and theirs performances of intelligence: transmitting and receiving data in real-time, computation and processing algorithms, metrology remote, diagnostics, automation and storage measurements. The radio frequency wireless communication with its multitude offers a better solution for data traffic...

    Provided By Journal of Computing

  • White Papers // Mar 2014

    Cloud Computing and Associated Mitigation Techniques: A Security Perspective

    Cloud computing is the contemporary technology in the field of information technology. It is rapidly turning into one of the most prominent technologies due to its growing and revolutionary nature in recent times. It assures to delivers a wide range of resources like flexible IT architecture, scalability, availability, fault tolerance,...

    Provided By Journal of Computing

  • White Papers // Mar 2014

    CPU Utilization for a Multiple Video Streaming Over a Fiber Optic ATM-Network when Varying the Quality of Service

    The Asynchronous Transfer Protocol (ATM) gives the broadband services users a high quality demands with a good opportunity to operate their networks. One important feature of the ATM-network is the Quality of Service (QoS) attribute. In this paper, the authors are explaining the effect of varying the QoS on the...

    Provided By Journal of Computing

  • White Papers // Mar 2014

    Application of Banach Space Ideal Properties in Image Transmission over Wireless Network

    In this paper, the authors develop the concept of nuclearity in functional analysis. The Banach space operator ideals and nuclear maps have a large class of morphisms which behave as if they were part of a compact closed category, that is, they allow one to transfer variables between the domain...

    Provided By Journal of Computing

  • White Papers // Mar 2014

    The Influence of Social Networks on Students' Performance

    Social networks are becoming an integral part of the peoples' lives. Students are spending much time on social media and are considered the largest category that uses such application. This paper tries to explore the influence of social media use, and especially Facebook, on high school students' performance. A proposed...

    Provided By Journal of Computing

  • White Papers // Mar 2014

    Cellular Mobile Signal Propagation; Effects of EIRP and Antenna Gain

    In this paper, the authors compare the cellular mobile network signals and transmission properties of two mobile service networks. The background theories for the propagation of cellular mobile signals were reviewed. A mobile signal analyzer capable of measuring power density was used to measure the received signal power density at...

    Provided By Journal of Computing

  • White Papers // Mar 2014

    An Enhanced Method for Generating Composite Candidate Keys Based on N

    In a relational database, a candidate key is defined as a set of attributes that is distinct the database rows. The determining process of a candidate key could affect the database performance and optimization. In this paper, an algorithm based on N

    Provided By Journal of Computing

  • White Papers // Feb 2014

    Automatic Management of Wireless Sensor Networksthrough Cloud Computing

    With the faster adoption of Wireless Sensor Networks (WSNs), on the one hand sensor-derived data need to be accessed via various web-based social networks or virtual communities and on the other hand, limited processing ability of WSNs is a hurdle. To address this issue WSNs can be integrated with cloud....

    Provided By Journal of Computing

  • White Papers // Feb 2014

    Consumer Attitude towards M-Commerce: The Perceived Level of Security and the Role of Trust

    The emerging industry of Mobile commerce (M-commerce), while being a complex and with uncertain environment is influencing businesses and consumers engagement at both national and international levels. This paper are to: investigate the degree to which various trust and information security factors influence consumer to engage in mobile commerce, and...

    Provided By Journal of Computing

  • White Papers // Feb 2014

    Performance Analysis of Dynamic Source Routing Protocol

    Dynamic Source Routing (DSR) is an efficient on-demand routing protocol for Mobile Ad-hoc NETworks (MANETs). It depends on two main procedures: route discovery and route maintenance. Route discovery is the procedure used at the source of the packets to discover a route to the destination. Route maintenance is the procedure...

    Provided By Journal of Computing

  • White Papers // Feb 2014

    Developing a Human Machine Interface (HMI) for Industrial Automated Systems using Siemens Simatic WinCC Flexible Advanced Software

    Most industrial plants are automated without any operator-machine interaction. This makes it difficult for the operator to at a glance know the state of the machines and the immediate steps to undertake in order to clear any anomalies occurring in the plant. In this paper, consideration was given to the...

    Provided By Journal of Computing

  • White Papers // Feb 2014

    Compressed Spectrum Sensing in Cognitive Radio Network Based on Measurement Matrix

    Compressive Sampling (CS), or compressive sensing, has the ability for reconstructing a sparse signal with small number of measurements. There are some applications like spectrum sensing in cognitive radio which not necessarily need a perfect reconstruction. Consequently in this application, toward the decrement of high signal acquisition costs in wideband...

    Provided By Journal of Computing

  • White Papers // Jan 2014

    Performance Analysis of Node Placement in Linear Wireless Sensor Networks

    Linear Wireless Sensor Networks (LWSNs) are captivating significant attention because of their suitability for wide-range of applications. These applications dictate the topology of the network (i.e., placement of nodes) and introduce unique challenges such as non-uniform energy consumption. Moreover, these applications require LWSNs to operate for decades. However, sensor nodes...

    Provided By Journal of Computing

  • White Papers // Jan 2014

    Routing Protocols for Vehicular Adhoc Networks (VANETs): A Review

    Routing in vehicular ad hoc networks is a challenging task due to the unique characteristics of the network such as high mobility of nodes, dynamically changing topology and highly partitioned network. It is a challenge to ensure reliable, continuous and seamless communication in the presence of speeding vehicles. The performance...

    Provided By Journal of Computing

  • White Papers // Dec 2013

    An Associative Classification Data Mining Approach for Detecting Phishing Websites

    Phishing websites are fake websites that are created by dishonest people to mimic web pages of real websites. Victims of phishing attacks may expose their financial sensitive information to the attacker whom might use this information for financial and criminal activities. Various approaches have been proposed to detect phishing websites,...

    Provided By Journal of Computing

  • White Papers // Dec 2013

    Design and Simulation of a Green Broker with Imprecise Computation Scheduling for Energy-efficient Large Scale Computing in Clusters

    Cluster computing has attracted attention for large scale computing using idle CPU cycles of personal computers connected in local area network. The authors propose a green broker with imprecise computation scheduling for large scale computing in clusters. Imprecise computation techniques provide scheduling flexibility by trading off result quality to meet...

    Provided By Journal of Computing

  • White Papers // Dec 2013

    Combinatoric Drag-Pattern-Graphical-Password (DPGP)

    Creating secure password has been limited attributable to password restriction and policy. Users tend to choose memorable passwords that are easy to guess. However, sophisticated systems assigned passwords that are difficult to remember. In this paper, the focus will be on the Drag - Pattern-Graphical-Password (DPGP). DPGP password is proposed...

    Provided By Journal of Computing

  • White Papers // Dec 2013

    Hidden Crimes: Freedom of Expression on the Internet

    Freedom of expression is a brave stand towards the prohibition of certain words, terms or expressions, particularly if mockery and offensive styles were avoided with various topics such as religion, politics, community issues, etc. At this particular time, the authors need to identify freedom of expression on the Internet in...

    Provided By Journal of Computing

  • White Papers // Dec 2013

    Providing Accurate Time Reference with the STM4F32Discovery Embedded System for Purposes of Crystal Calibrations

    Crystal oscillators are today present in almost every embedded system. They are usually used for precise frequency generation, which can then be used for generating driving processors, microcontrollers, radio transceivers, real time clock generators and other devices which rely on precise and stable frequency for proper operation. This paper presents...

    Provided By Journal of Computing

  • White Papers // Nov 2013

    Cloud Computing: The Level of Awareness Amongst Small & Medium-sized Enterprises (SMEs) in Developing Economies

    Cloud computing services are being touted as a major enabler for small businesses lately. This new paradigm is seen to offer unique opportunities to Small and Medium Enterprises (SMEs) worldwide and developing economies are no exception. It presents SMEs access to similar technologies available to their larger counterparts and those...

    Provided By Journal of Computing

  • White Papers // Nov 2013

    Systematic Review and Comparison of Anomaly Based Network Intrusion Detection Systems Based on Efficiency

    Currently, Anomaly based Network Intrusion Detection (ANID) is the solution for novel and sophisticated attacks. This paper focuses on the comparison of Anomaly based Network Intrusion Detection Systems (ANIDS) based on efficiency. A collection of ANIDS that were trained and tested using KDD cup 99 dataset in the period 2002...

    Provided By Journal of Computing

  • White Papers // Oct 2013

    The Challenges of Global Village Software Engineering

    With the advent of electronic services the globe can be packed as a single village that is called global village. In Global Village (GV) all users would access to E-services regardless to geographical and political boundaries among countries. Therefore, software development corporations need to develop global systems and consider the...

    Provided By Journal of Computing

  • White Papers // Apr 2013

    WP - A Tree Based Response Time Algorithm for Event Driven Wireless Sensor Networks

    Irrespective of the deployment strategy or the coverage constraints, the usual energy conservation inevitability remains. Among the many approaches that have come up so as to save energy, reducing the number of transmissions and an effective routing strategy accomplish consideration. In addition to the number of transmissions, the response time...

    Provided By Journal of Computing

  • White Papers // Apr 2013

    E-Government Based on Cloud Computing

    The concept of cloud computing becomes important for each government, facilitating its way of work, increasing its productivity and all that leading to cost savings. Different country chooses different strategy for adoption of cloud computing with a possibility to become better and more effective e-government. In this paper, the scope...

    Provided By Journal of Computing

  • White Papers // Feb 2013

    A Hybrid Intrusion Detection System Using Hamming and MAXNET Neural Nets Using NDIS Dataset

    In this paper, the authors present a model to improve the security of network system. Intrusion Detection System (IDS) detects suspected patterns of network traffic through analysis of those traffic packets. The major problems of existing models are recognition of new attacks, low accuracy, and detection time and system adaptability....

    Provided By Journal of Computing

  • White Papers // Feb 2013

    A Dual-Band U-Slot PIFA Antenna With Ground Slit for RFID Applications

    In this paper, a Planar Inverted-F Antenna (PIFA) with U-Slot (U-PIFA) and slit in ground is introduced. The proposed PIFA is compact with single coaxial feed, single short strip, and single short pin. The main achievement of this research was the design of ISM Microwave bands 2.45/5.8 GHz dual band...

    Provided By Journal of Computing

  • White Papers // Feb 2013

    Teletraffic Analyses of Blocked Calls and Handoff Failures of LEO Mobile Satellite Systems

    Satellite communications have had a significant impact on wireless communication services owing to its versatility in comparison to its terrestrial cousins. In today's wireless mobile world, Mobile Satellite Services (MSS) are indispensable and are used side by side with the very popular cellular services the authors have all become so...

    Provided By Journal of Computing

  • White Papers // Feb 2013

    A New Scheme for Sealed Digital Signatures

    Now-a-days, people are looking for the easiest way to do things. The digital world has made that even more possible. One aspect is the way when the people sign documents and papers, how to present them self officially. When this aspect has been started to be a critical thing in...

    Provided By Journal of Computing

  • White Papers // Feb 2013

    Real Time Radio Frequency Identification Vehicles Data Logger Traffic Management System

    This paper presents a traffic management system that combines RFID and GSM technologies which they are considered to be two of the currently fastest growing technologies, RFID technology which provide a reliable data reading without the need for line-of-sight that other data detecting technologies depend on. While GSM is an...

    Provided By Journal of Computing

  • White Papers // Jan 2013

    Neural Network Synchronization Protocol

    This paper deals with the design of secure communication protocol based on neural network synchronization. Protocol is built on the application-layer of the OSI upon TCP/IP. Server and each connected client must create special type of neural network called Tree Parity Machine then compute outputs of their neural networks and...

    Provided By Journal of Computing

  • White Papers // Jan 2013

    Research on the Traffic Behavior Characteristics of P2P Streaming Media

    With the development and popularization of Internet, P2P streaming media traffic has become the most important part of the variety kinds of network traffic. Therefore, the study of P2P streaming media traffic characteristics has important significance for the analysis and identification network traffic. In this paper, on the basis of...

    Provided By Journal of Computing

  • White Papers // Jan 2013

    Survey of Cloud Computing Issues at Implementation Level

    Cloud computing is a new way of integrating a set of old technologies to implement a new paradigm that creates an avenue for users to have access to shared and configurable resources through internet on-demand. Cloud users are expected to increase exponentially in the future. In order to prepare for...

    Provided By Journal of Computing

  • White Papers // Jan 2010

    Proposing a New Method for Query Processing Adaption in DataBase

    This paper proposes a multi agent system by compiling two technologies, query processing optimization and agents which contains features of personalized queries and adaption with changing of requirements. This system uses a new algorithm based on modeling of users' long-term requirements and also GA to gather users' query datas. Experimented...

    Provided By Journal of Computing

  • White Papers // Mar 2010

    A Security Based Data Mining Approach in Data Grid

    Grid computing is the next logical step to distributed computing. Main objective of grid computing is an innovative approach to share resources such as CPU usage; memory sharing and software sharing. Data Grids provide transparent access to semantically related data resources in a heterogeneous system. The system incorporates both data...

    Provided By Journal of Computing

  • White Papers // May 2010

    A Novel Method for Intrusion Detection System to Enhance Security in Ad Hoc Network

    The notion of an ad hoc network is a new paradigm that allows mobile hosts (nodes) to communicate without relying on a predefined infrastructure to keep the network connected. Most nodes are assumed to be mobile and communication is assumed to be wireless. The mobility of nodes in an ad-hoc...

    Provided By Journal of Computing

  • White Papers // Jun 2010

    Stronger Enforcement of Security Using AOP and Spring AOP

    An application security has two primary goals: first, it is intended to prevent unauthorized personnel from accessing information at higher classification than their authorization. Second, it is intended to prevent personnel from declassifying information. Using an object oriented approach to implementing application security results not only with the problem of...

    Provided By Journal of Computing

  • White Papers // May 2012

    Software Models, Extensions and Independent Models in Cocomo Suite: A Review

    Different models over the years have been proposed to support the software cost estimation processes. Cocomo (Constructive Cost Model) is one of the successful models which enabled software engineers to reliably reason about the effort and schedule estimates. Since past few years different derivative models and extensions of Cocomo have...

    Provided By Journal of Computing

  • White Papers // May 2012

    Performance Analysis of Parallelizing Program Code for Multi-Core Architectures Using OPENMP

    Multi-core architectures have become more popular due to better performance, reduced heat dissipation, power consumption and more efficient simultaneous processing of multi tasks. If one wishes to run a single application faster, then that application must be divided into sub programs, or threads, that cooperate to deliver the desired functionality....

    Provided By Journal of Computing

  • White Papers // May 2012

    Role of Information and Communication Technologies in the Smart Grid

    In the smart grid operation and management, reliable and real-time information and communication networks play a very critical role. By integrating the appropriate Information and Communication Technologies (ICT) infrastructure, automated control, sensing and metering technologies, and energy management techniques, the smart grid has emerged as a solution that empowers utilities...

    Provided By Journal of Computing

  • White Papers // May 2012

    The Role of Requirement Engineering in Software Development Life Cycle

    The Requirement Engineering (RE) is the most important phase of the Software Development Life Cycle (SDLC). This phase is used to translate the imprecise, incomplete needs and wishes of the potential users of software into complete, precise and formal specifications. The specifications act as the contract between the software users...

    Provided By Journal of Computing

  • White Papers // May 2012

    Comparative Study of Gaussian and Nearest Mean Classifiers for Filtering Spam e-Mails

    The development of data-mining applications such as classification and clustering has shown the need for machine learning algorithms to be applied to large scale data. The paper gives an overview of some of the most popular machine learning methods (Gaussian and Nearest Mean) and of their applicability to the problem...

    Provided By Journal of Computing

  • White Papers // May 2012

    Analyses of Student Programming Errors in Java Programming Courses

    Computing students' difficulties in understanding Java programming provided a practical context for a critical investigation of why this continues to exist. An exploratory study was conducted by Computing department staff at the National University of Samoa to investigate what were the most common errors students made in Java programming classes....

    Provided By Journal of Computing

  • White Papers // Apr 2012

    Effective Pair Programming Practice-An Experimental Study

    Pair programming is a practice, where two programmers work on a single task. Long research has been carried out in industries, and efficient results were achieved. Research is also being done in implementing the pair programming techniques in academics and good results are seen. In this paper, the authors suggested...

    Provided By Journal of Computing

  • White Papers // Apr 2012

    Performance Analysis of Two-Layer Spreading Scheme Based FEC Encoded MC - CDMA Wireless Communication System Under Implementation of Various Signal Detection Schemes

    In this paper, a comprehensive study has been made on the performance evaluation of a two-layer spreading scheme based MC-CDMA wireless communication system. The 1/2-rated convolutionally encoded system under present study incorporates three linear signal detection techniques (Equalizers) such as Minimum Mean Square Error (MMSE), Zero Forcing (ZF) and Sphere...

    Provided By Journal of Computing

  • White Papers // Apr 2012

    Performance Enhancement of WiMAX System Using Adaptive Equalizer

    Mobile WiMAX is a wireless networking system which provides wireless broadband to fixed and mobile terminals. In this paper, firstly performance evaluation of WiMAX system with channel estimation is discussed. Performance evaluation with channel estimation is used because amplitude and phase shift causes error in wireless channel. Finally, Performance evaluation...

    Provided By Journal of Computing

  • White Papers // Apr 2012

    Wireless Sensor Networks: A Solution for Smart Transportation

    Wireless sensor networks recently have come into importance due to the fact that they have the prospective to revolutionize many segments of the people financial system and life - from automation in shipping, environmental monitoring, transportation and healthcare industries. Transportation information collection and communication plays a key role in Intelligent...

    Provided By Journal of Computing

  • White Papers // Apr 2012

    A Comparative Analysis and Application of the Compression Properties of Two 7-Bit Subsets of Unicode

    Data compression is important in the computing process because it helps to reduce the space occupied by a file, which normally leads to the reduction in the time taken to access the file. Files which may be compressed include text, images, video/speech and sound. Data compression algorithms have been developed...

    Provided By Journal of Computing

  • White Papers // Apr 2012

    Modeling of Orthogonal Frequency Division Multiplexing (OFDM) for Transmission in Broadband Wireless Communications

    Orthogonal Frequency Division Multiplexing (OFDM) is a multi carrier modulation technique that provides high bandwidth efficiency because the carriers are orthogonal to each other and multiple carriers share the data among themselves. The main advantage of this transmission technique is its robustness to channel fading in wireless communication environment. This...

    Provided By Journal of Computing

  • White Papers // Apr 2012

    Exploring Factors That Influence Knowledge Sharing Behavior Via Computer

    Technology and globalization make available new chances for network members to share their possessed experience and knowledge across national boundaries. Owing increasing global competition, organizations require suitable technologies to make easier and expedite communication among group members and exploit of shared knowledge in this way. Inasmuch communication among distributed members...

    Provided By Journal of Computing

  • White Papers // Jul 2012

    Generating a New Group Digital Signatures

    This paper presents a new method for generating group digital signatures. Because of the importance of digital signatures in electronic management of business's documents, it is important to develop strong methods to enhance and authenticate business's documents in electronic environment, especially in sensitive applications. Existing methods normally implement asynchronous encryption...

    Provided By Journal of Computing

  • White Papers // Jul 2012

    IEEE 802.11s Wireless Mesh Networks for Last-Mile Internet Access: An Up-Down Link Approach

    Being multi-hop wireless networks, Wireless Mesh Networks (WMNs) are witnessing limited network capacity, mainly due to the contention among nodes in multi-hop paths. Several techniques have been proposed to cope with the limitation, e.g., using multi-channels. These techniques, however, do not account for the very specificity of traffic flow in...

    Provided By Journal of Computing

  • White Papers // Jun 2012

    Data Mining and Wireless Sensor Network for Groundnut Pest Thrips Dynamics and Predictions

    With the advent of data generation, collection and storage technologies, world is overwhelmed with data everywhere. Following this trend, more and more agricultural data are nowadays are virtually being harvested along with the crops and are being collected/stored in databases. As the volume of the data increases, the gap between...

    Provided By Journal of Computing

  • White Papers // Jun 2012

    Architectural Analysis of Multi-Agents Educational Model in Web-Learning Environments

    The paper presents a structure for using intelligent multi-agents architecture for an educational system and internet teaching. In this architecture, a model of multi-agents learning environments consists of: the domain model, the communication model and the user model. They contain all the domain knowledge of the target application and the...

    Provided By Journal of Computing

  • White Papers // Jun 2012

    A Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems

    The reported recent success of cloud computing has attracted attention for cost effective IT services with many signs for continuing spread out if not dominating in the coming years. However, challenges are being faced by both research and professional communities including quality reliable services, optimized architectures and security. Meanwhile, IT...

    Provided By Journal of Computing

  • White Papers // Jun 2012

    A Secured and Semantically Addressed E-Mail Service

    This paper illustrates the use of semantic addresses to send emails in a corporate environment. Semantic Email Addressing (SEA) allows emails to be sent to a semantically specified recipient or group of recipients, which may be dynamically changing overtime. In order to describe the concept of SEA and its advantages,...

    Provided By Journal of Computing

  • White Papers // Jun 2012

    An Anomaly Detector for Keystroke Dynamics Based on Medians Vector Proximity

    This paper presents an anomaly detector for keystroke dynamics authentication, based on a statistical measure of proximity, evaluated through the empirical study of an independent benchmark of keystroke data. A password typing-rhythm classifier is presented, to be used as an anomaly detector in the authentication process of genuine users and...

    Provided By Journal of Computing

  • White Papers // May 2012

    LTE-Advanced: Requirements and Technical Challenges for 4G Cellular Network

    The higher peak data rates for mobile user are in demand. Audio/Video streaming, online conferences, and social media services are becoming the necessity of life. In order to fulfill the sheer amount of data need of users, robust and efficient wireless technology is needed. LTE-Advanced, which is based on Rel-10...

    Provided By Journal of Computing

  • White Papers // May 2012

    An Evaluative Study of Automation Software Applications and Database Management Systems in Academic Libraries

    Library automation not only improves the image of the library services but also provides additional services to the users with the existing staff. It provides equal opportunities to all staff members for organizational learning, reengineering, and benchmarking. The present study demonstrates and elaborates the library automation software and it types...

    Provided By Journal of Computing

  • White Papers // May 2012

    The Research on the Analysis of the Redundant Data

    The data of port-80 is an important part of network data, which is also one of the data services that the authors study accurately at this stage. Through mining data packets of port-80 deeply, mining characteristics of data flow horizontally, and vertically mining the data business and behavioral characteristic of...

    Provided By Journal of Computing

  • White Papers // Jun 2011

    A Proposed Anti-Viruses Strategy for a Complex Environment With a Huge Number of Viruses Attacks

    This paper presents a proposed anti-viruses strategy, the last intended to be reliable and adaptive tool to deal with complex environment suffer from huge no. of viruses attacks, where these viruses may be known, unknown, predictable or even non predictable. By using association rules for analyzing proposed database which its...

    Provided By Journal of Computing

  • White Papers // May 2011

    A Comparative Study of Available Protocols During Privacy Preservation in Secure Multiparty Computation

    In this paper, comparative study of different available Secure Multiparty Computation (SMC) protocols have been addressed. In SMC, a set of parties wishes to jointly compute some function on their inputs. This computation must preserve certain security properties, like privacy and correctness. The general approach for such kind of computation...

    Provided By Journal of Computing

  • White Papers // Apr 2011

    Employing CORBA in the Mobile Telecommunications Sector and the Application of Component Oriented Programming Techniques

    This paper focuses on the implications of employing CORBA Middleware in today's wireless telecommunications services and applications developments. It seeks to understand what current opportunities exist to support the use of this technology and assesses some of the performance implications that might be encountered. Discussion also revolves around the use...

    Provided By Journal of Computing