oalib

Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99

Submit

Any time

2013 ( 280 )

2012 ( 1261 )

2011 ( 862 )

2010 ( 300 )

Custom range...

Search Results: 1 - 10 of 2755 matches for " IJCSI "
All listed articles are free for downloading (OA Articles)
Page 1 /2755
Display every page Item
WiBro Mobility Simulation Model
Junaid Qayyum,Shahid Latif,Faheem Khan,Muhammad LaL
International Journal of Computer Science Issues , 2011,
Abstract: WiBro, or Wireless Broadband, is the newest variety of mobile wireless broadband access. WiBro technology is being developed by the Korean Telecoms industry. It is based on the IEEE 802.16e (Mobile WiMax) international standard. Korean based fixed-line operators KT, SK Telecom were the first to get the licenses by the South Korean government to provide WiBro Commercially. Samsung had a demonstration on WiBro Mobile Phones and Systems at the "APEC IT Exhibition 2006". WiBro is comprised of two phases namely WiBro Phase I and WiBro Phase II. Samsung Electronics has been extensively contributing to Koreas WiBro (Wireless Broadband) initiative as well as the IEEE 802.16 standards. The WiBro is a specific subset of the 802.16 standards, specially focusing on supporting full mobility of wireless access systems with OFDMA PHY interface. In this work, we have developed a simulation model of the WiBro system consisting of a set of Base Stations and Mobile Subscriber Stations by using the OPNET Modeler. The simulation model has been utilized to evaluate effective MAC layer throughput, resource usage efficiency, QoS class differentiation, and system capacity and performance under various simulation scenarios.
Internet Connectivity using Vehicular Ad-Hoc Networks
Hashim Ali,Aamir Saeed,Syed Rohullah Jan,Asadullah
International Journal of Computer Science Issues , 2012,
Abstract: Although a mobile Ad-Hoc network (MANET) can be used in many cases but the most preferable is a MANET connected to the internet. This is achieved by using gateways which act as bridges between a MANET and the internet. To communicate in-between, a mobile node needs to find a valid route to the gateway which requires gateway discovery mechanism. In this paper Ad hoc On-Demand Distance Vector (AODV) is altered to achieve the interconnection between a MANET and the Internet. Furthermore, the paper examines and compares three approaches for gateway discovery.
Microlearning of web fundamentals based on mobile learning
Aitchanov Bekmurza H.,Zhaparov Meirambek K,Nussipbekov Abai
International Journal of Computer Science Issues , 2012,
Abstract: In nowadays there are many kinds of problems in the system of higher education. One of them is: everyday students get very huge amount of information. In one day student may have 5 - 6 lessons. This means that student have to read at least one chapter for each lesson. This reading takes about 1 - 2 hour to read chapter and to understand it. All of them take very big amount of time for a student to understand all lessons and it is very hard for him/her to do everything in time. This paper explains a study of work microlearning application for mobile phone with Android OS. It consists of general introduction and purpose. There is an application at the end of paper.
Simple and secure Image Encryption
V.V.Divya,S.K.Sudha,V.R.Resmy
International Journal of Computer Science Issues , 2012,
Abstract: Image Encryption is a wide area of research. Encryption basically deals with converting data or information from its original form to some other form that hides the information in it. The protection of image data from unauthorized access is important. Encryption is employed to increase the data security. The Encrypted Image is secure from any kind cryptanalysis. In the proposed work, the image to be encrypted is decomposed into 8X8 blocks, these blocks are transformed from the spatial domain to frequency domain by the DCT , Then, only selected DCT coefficients i.e the DCT coefficients correlated to the higher frequencies of the image block are encrypted. For encryption the DCT coefficients are xored with pseudorandom bit, Pseudorandom bit is generated by Non-Linear Shift back Register. The bits generated by Non-Linear Shift back Register can not be predicted so cryptanalysis becomes difficult. To enhance the security further the unencrypted DCT coefficients are shuffled, since some information may also be stored in DCT coefficient correlating to lower frequency, While encrypting selected DCT coefficients alone will provide complete perceptual encryption, it would be possible for an attacker to gain information about the image from the other coefficients, especially in images that have a lot of edges.
Efficient Web Usage Mining With Clustering
K. Poongothai,M. Parimala,S. Sathiyabama
International Journal of Computer Science Issues , 2011,
Abstract: Web usage mining attempts to discover useful knowledge from the secondary data obtained from the interactions of the users with the Web. Web usage mining has become very critical for effective Web site management, creating adaptive Web sites, business and support services, personalization, network traffic flow analysis etc., Web site under study is part of a nonprofit organization that does not sell any products. It was crucial to understand who the users were, what they looked at, and how their interests changed with time. To achieve this, one of the promising approaches is web usage mining, which mines web logs for user models and recommendations. Web usage mining algorithms have been widely utilized for modeling user web navigation behavior. In this study we advance a model for mining of user's navigation pattern. The proposal of our work proceeds in the direction of building a robust web usage knowledge discovery system, which extracts the web user profiles at the web server, application server and core application level. The proposal optimizes the usage mining framework with fuzzy C means clustering algorithm (to discover web data clusters) and compare with Expected Maximization cluster system to analyze the Web site visitor trends. The evolutionary clustering algorithm is proposed to optimally segregate similar user interests. The clustered data is then used to analyze the trends using inference system. By linking the Web logs with cookies and forms, it is further possible to analyze the visitor behavior and profiles which could help an e-commerce site to address several business questions. Experimentation conducted with CFuzzy means and Expected Maximization clusters in Syskill Webert data set from UCI, shows that EM shows 5% to 8% better performance than CFuzzy means in terms of cluster number.
Conceptualizing of Social Networking Sites
J. S. Sodhi,Shilpi Sharma
International Journal of Computer Science Issues , 2012,
Abstract: People often move to their friends, families and colleagues when they feel urge and having doubts or queries to solve. Participation in social networking site has dramatically increased in recent years. Many social networking sites boost with million of members using their network on regular basis to communicate, share , create and collaborate with others. In this paper we explore the phenomenon of using social networking site to trace a link of the search from the community of users for better exploration of link. If a person wishes to visit a place that belongs to the community of his friend list. Similarly it will search upto nth level and filter to get best option by implementing the concept of deterministic agents.
E-learning in Higher Education-Design and Implementation
Ashit Kumar Dutta,Al-Adhaileh Mosley,Md Mobin Akhtar
International Journal of Computer Science Issues , 2011,
Abstract: New e-learning models are continually emerging as new e-learning technology tools and new research findings in the different areas of e-learning become available. In this paper proposed a six step model for e-learning adoption in higher education. We highlight important issues that have to be considered and evaluated and incorporated in strategic e-learning planning and implementation. We look in this model to a wider point of view within the learning theoretical perspectives.
Implementing and Managing framework for PaaS in Cloud Computing
Junaid Qayyum,Faheem Khan,Muhammad LaL,Fayyaz Gul
International Journal of Computer Science Issues , 2011,
Abstract: With the rapid development of Internet and Cloud computing, there are more and more network resources. Sharing, management and on-demand allocation of network resources are particularly important in Cloud computing. Platform as a Service (PaaS) is one of the key services in Cloud computing. PaaS is very attractive for schools, research institutions and enterprises which need reducing IT costs, improving computing platform sharing and meeting license constraints. However, nearly all current available cloud computing platforms are either proprietary or their software infrastructure is invisible to the research community except for a few open-source platforms. For universities and research institutes, more open and testable experimental platforms are needed in a lab-level with PCs. In this paper, a framework for managing PaaS in a virtual Cloud computing lab is developed. The framework implements the user management, resource management and access management. The system has good expandability and can improve resources sharing and utilization.
Performance Comparison of Adaptive Algorithms for Adaptive line Enhancer
Sanjeev Kumar Dhull,Sandeep K Arya,O P Sahu
International Journal of Computer Science Issues , 2011,
Abstract: We have designed and simulated an adaptive line enhancer system for conferencing. This system is based upon a least-mean-square (LMS) and recursive adaptive algorithm (RLS) Performance of ALE is compared for LMSandRLS algorithms.
Image Processing and Analysis for DTMRI
Kondapalli Srinivasa Vara Prasad,Manike Chiranjeevi,Kundan Kumar Mishra,Kdbs Tanuja
International Journal of Computer Science Issues , 2012,
Abstract: This paper describes image processing techniques for Diffusion Tensor Magnetic Resonance. In Diffusion Tensor MRI, a tensor describing local water diffusion is acquired for each voxel. The geometric nature of the diffusion tensors can quantitatively characterize the local structure in tissues such as bone, muscles, and white matter of the brain. The close relationship between local image structure and apparent diffusion makes this image modality very interesting for medical image analysis. We present a decomposition of the diffusion tensor based on its symmetry properties resulting in useful measures describing the geometry of the diffusion ellipsoid. A simple anisotropy measure follows naturally from this analysis. We describe how the geometry, or shape, of the tensor can be visualized using a coloring scheme based on the derived shape measures. We show how filtering of the tensor data of a human brain can provide a description of macro structural diffusion which can be used for measures of fiber-tract organization. We also describe how tracking of white matter tracts can be implemented using the introduced methods. These methods offers unique tools for the in vivo demonstration of neural connectivity in healthy and diseased brain tissue.
Page 1 /2755
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.