University of Computer Studies

Displaying 1-10 of 10 results

  • White Papers // Nov 2011

    Pc-Cluster Based Storage System Architecture for Cloud Storage

    Design and architecture of cloud storage system plays a vital role in cloud computing infrastructure in order to improve the storage capacity as well as cost effectiveness. Usually cloud storage system provides users to efficient storage space with elasticity feature. One of the challenges of cloud storage system is difficult...

    Provided By University of Computer Studies

  • White Papers // Nov 2011

    Stochastic Markov Model Approach for Efficient Virtual Machines Scheduling on Private Cloud

    Cloud computing is deployed a large set of virtualized computing resources in different infrastructures and various development platforms. One of the significant issues in cloud computing system is the scheduling and allocation of virtual resources and Virtual Machines (VMs). To address this issue, this paper proposed an efficient approach for...

    Provided By University of Computer Studies

  • White Papers // Nov 2011

    Management of Data Replication for PC Cluster Based Cloud Storage System

    Storage systems are essential building blocks for cloud computing infrastructures. Although high performance storage servers are the ultimate solution for cloud storage, the implementation of inexpensive storage system remains an open issue. To address this problem, the efficient cloud storage system is implemented with inexpensive and commodity computer nodes that...

    Provided By University of Computer Studies

  • White Papers // Aug 2011

    Implementation of User Interface for Microprocessor Trainer

    This paper aims to design and construct the microcontroller-based user interface system and to study input, computation, and output for microprocessor trainer. The other two activities beyond computation: input and output or I/O. This paper also aims to do high quality research in the area of file systems, as well...

    Provided By University of Computer Studies

  • White Papers // Apr 2011

    Facial Extraction and Lip Tracking Using Facial Points

    Automatic facial feature extraction is one of the most important and attempted problems in computer vision. It is a necessary step in face recognition, facial image compression. There are many methods have been proposed in the literature for the facial feature extraction task. However, all of them have still disadvantage...

    Provided By University of Computer Studies

  • White Papers // Nov 2009

    High Availability Cluster System for Local Disaster Recovery With Markov Modeling Approach

    The need for High Availability (HA) and Disaster Recovery (DR) in IT environment is more stringent than most of the other sectors of enterprises. Many businesses require the availability of business-critical applications 24 hours a day, seven days a week, and can afford no data loss in the event of...

    Provided By University of Computer Studies

  • White Papers // Jun 2009

    Increasing Lifetime of Target Tracking Wireless Sensor Networks

    A model to identify the lifetime of target tracking wireless sensor network is proposed. The model is a static cluster-based architecture and aims to provide two factors. First, it is to increase the lifetime of target tracking wireless sensor network. Secondly, it is to enable good localization result with low...

    Provided By University of Computer Studies

  • White Papers // Jun 2009

    Wormhole Attack Detection in Wireless Sensor Networks

    The nature of wireless ad hoc and sensor networks make them very attractive to attackers. One of the most popular and serious attacks in wireless ad hoc networks is wormhole attack and most proposed protocols to defend against this attack used positioning devices, synchronized clocks, or directional antennas. This paper...

    Provided By University of Computer Studies

  • White Papers // Jun 2009

    Optimum Neural Network Architecture for Precipitation Prediction of Myanmar

    Nowadays, precipitation prediction is required for proper planning and management of water resources. Prediction with neural network models has received increasing interest in various research and application domains. However, it is difficult to determine the best neural network architecture for prediction since it is not immediately obvious how many input...

    Provided By University of Computer Studies

  • White Papers // Jun 2009

    Design and Implementation of Secure Electronic Payment System (Client)

    Secure electronic payment system is presented in this paper. This electronic payment system is to be secure for clients such as customers and shop owners. The security architecture of the system is designed by RC5 encryption / decryption algorithm. This eliminates the fraud that occurs today with stolen credit card...

    Provided By University of Computer Studies

  • White Papers // Jun 2009

    Optimum Neural Network Architecture for Precipitation Prediction of Myanmar

    Nowadays, precipitation prediction is required for proper planning and management of water resources. Prediction with neural network models has received increasing interest in various research and application domains. However, it is difficult to determine the best neural network architecture for prediction since it is not immediately obvious how many input...

    Provided By University of Computer Studies

  • White Papers // Jun 2009

    Design and Implementation of Secure Electronic Payment System (Client)

    Secure electronic payment system is presented in this paper. This electronic payment system is to be secure for clients such as customers and shop owners. The security architecture of the system is designed by RC5 encryption / decryption algorithm. This eliminates the fraud that occurs today with stolen credit card...

    Provided By University of Computer Studies

  • White Papers // Nov 2009

    High Availability Cluster System for Local Disaster Recovery With Markov Modeling Approach

    The need for High Availability (HA) and Disaster Recovery (DR) in IT environment is more stringent than most of the other sectors of enterprises. Many businesses require the availability of business-critical applications 24 hours a day, seven days a week, and can afford no data loss in the event of...

    Provided By University of Computer Studies

  • White Papers // Jun 2009

    Increasing Lifetime of Target Tracking Wireless Sensor Networks

    A model to identify the lifetime of target tracking wireless sensor network is proposed. The model is a static cluster-based architecture and aims to provide two factors. First, it is to increase the lifetime of target tracking wireless sensor network. Secondly, it is to enable good localization result with low...

    Provided By University of Computer Studies

  • White Papers // Jun 2009

    Wormhole Attack Detection in Wireless Sensor Networks

    The nature of wireless ad hoc and sensor networks make them very attractive to attackers. One of the most popular and serious attacks in wireless ad hoc networks is wormhole attack and most proposed protocols to defend against this attack used positioning devices, synchronized clocks, or directional antennas. This paper...

    Provided By University of Computer Studies

  • White Papers // Aug 2011

    Implementation of User Interface for Microprocessor Trainer

    This paper aims to design and construct the microcontroller-based user interface system and to study input, computation, and output for microprocessor trainer. The other two activities beyond computation: input and output or I/O. This paper also aims to do high quality research in the area of file systems, as well...

    Provided By University of Computer Studies

  • White Papers // Apr 2011

    Facial Extraction and Lip Tracking Using Facial Points

    Automatic facial feature extraction is one of the most important and attempted problems in computer vision. It is a necessary step in face recognition, facial image compression. There are many methods have been proposed in the literature for the facial feature extraction task. However, all of them have still disadvantage...

    Provided By University of Computer Studies

  • White Papers // Nov 2011

    Pc-Cluster Based Storage System Architecture for Cloud Storage

    Design and architecture of cloud storage system plays a vital role in cloud computing infrastructure in order to improve the storage capacity as well as cost effectiveness. Usually cloud storage system provides users to efficient storage space with elasticity feature. One of the challenges of cloud storage system is difficult...

    Provided By University of Computer Studies

  • White Papers // Nov 2011

    Stochastic Markov Model Approach for Efficient Virtual Machines Scheduling on Private Cloud

    Cloud computing is deployed a large set of virtualized computing resources in different infrastructures and various development platforms. One of the significant issues in cloud computing system is the scheduling and allocation of virtual resources and Virtual Machines (VMs). To address this issue, this paper proposed an efficient approach for...

    Provided By University of Computer Studies

  • White Papers // Nov 2011

    Management of Data Replication for PC Cluster Based Cloud Storage System

    Storage systems are essential building blocks for cloud computing infrastructures. Although high performance storage servers are the ultimate solution for cloud storage, the implementation of inexpensive storage system remains an open issue. To address this problem, the efficient cloud storage system is implemented with inexpensive and commodity computer nodes that...

    Provided By University of Computer Studies