The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
Clouds provide a powerful computing platform that enables individuals and organizations to perform variety levels of tasks such as: use of online storage space, adoption of business applications, development of customized computer software, and creation of a “realistic” network environment. In previous years, the number of people using cloud services has dramatically increased and lots of data has been stored in cloud computing environments. In the meantime, data breaches to cloud services are also increasing every year due to hackers who are always trying to exploit the security vulnerabilities of the architecture of cloud. In this paper, three cloud service models were compared; cloud security risks and threats were investigated based on the nature of the cloud service models. Real world cloud attacks were included to demonstrate the techniques that hackers used against cloud computing systems. In addition,countermeasures to cloud security breaches are presented.
Top cited Network Security Articles- Part 1IJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
January 2021 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
October 2020 - Top Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
The emergence of cloud computing has changed perception of all regarding software delivery, development models and infrastructure. Cloud computing has a potential of providing elastic, easily manageable, powerful and cost-effective solutions. The rapid transition to cloud computing has fueled concerns on the security issues. The migration of the user’s data and applications in a shared environment of a cloud, where there is a collocation of several users increases security related concerns. Several research efforts have been made in evaluating challenges related to security faced by the cloud computing environments, a number of solutions of such problems have also been proposed. Integrated security solutions should be devised to deal with the increasing security risks. In this paper, a detailed cloud computing survey, key services and concepts are being presented. This paper attempts to evaluate various security threats to cloud computing and a number of security solutions have also been discussed. Furthermore, a brief view of the cloud security regulatory bodies and compliance have also been presented. Despite the research efforts in cloud security field, there are still some open research problems and challenges which are discussed in this paper.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
Clouds provide a powerful computing platform that enables individuals and organizations to perform variety levels of tasks such as: use of online storage space, adoption of business applications, development of customized computer software, and creation of a “realistic” network environment. In previous years, the number of people using cloud services has dramatically increased and lots of data has been stored in cloud computing environments. In the meantime, data breaches to cloud services are also increasing every year due to hackers who are always trying to exploit the security vulnerabilities of the architecture of cloud. In this paper, three cloud service models were compared; cloud security risks and threats were investigated based on the nature of the cloud service models. Real world cloud attacks were included to demonstrate the techniques that hackers used against cloud computing systems. In addition,countermeasures to cloud security breaches are presented.
Top cited Network Security Articles- Part 1IJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
January 2021 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
October 2020 - Top Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
The emergence of cloud computing has changed perception of all regarding software delivery, development models and infrastructure. Cloud computing has a potential of providing elastic, easily manageable, powerful and cost-effective solutions. The rapid transition to cloud computing has fueled concerns on the security issues. The migration of the user’s data and applications in a shared environment of a cloud, where there is a collocation of several users increases security related concerns. Several research efforts have been made in evaluating challenges related to security faced by the cloud computing environments, a number of solutions of such problems have also been proposed. Integrated security solutions should be devised to deal with the increasing security risks. In this paper, a detailed cloud computing survey, key services and concepts are being presented. This paper attempts to evaluate various security threats to cloud computing and a number of security solutions have also been discussed. Furthermore, a brief view of the cloud security regulatory bodies and compliance have also been presented. Despite the research efforts in cloud security field, there are still some open research problems and challenges which are discussed in this paper.
Most Downloaded article for an year in academia - International Journal of Ne...IJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
Most cited articles in academia - International journal of network security &...IJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
December 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
November 2021 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
June 2020: Top Read Articles in Advanced Computingacijjournal
Advanced Computing: An International Journal (ACIJ) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the advanced computing. The journal focuses on all technical and practical aspects of high performance computing, green computing, pervasive computing, cloud computing etc. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding advances in computing and establishing new collaborations in these areas.
Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of computing.
June 2021 - Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
May 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
Virtualization has become a widely and attractive employed technology in cloud computing environments. Sharing of a single physical machine between multiple isolated virtual machines leading to a more optimized hardware usage, as well as make the migration and management of a virtual system more efficiently than its physical counterpart. Virtualization is a fundamental technology in a cloud environment. However, the presence of an additional abstraction layer among software and hardware causes new security issues. Security issues related to virtualization technology have become a significant concern for organizations due to arising some new security challenges.
July 2021 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
October 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
International Journal of Network Security & Its Applications (IJNSA) - Curren...IJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
December 2023 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
Most Downloaded article for an year in academia - International Journal of Ne...IJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
Most cited articles in academia - International journal of network security &...IJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
December 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
November 2021 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
June 2020: Top Read Articles in Advanced Computingacijjournal
Advanced Computing: An International Journal (ACIJ) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the advanced computing. The journal focuses on all technical and practical aspects of high performance computing, green computing, pervasive computing, cloud computing etc. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding advances in computing and establishing new collaborations in these areas.
Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of computing.
June 2021 - Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
May 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
Virtualization has become a widely and attractive employed technology in cloud computing environments. Sharing of a single physical machine between multiple isolated virtual machines leading to a more optimized hardware usage, as well as make the migration and management of a virtual system more efficiently than its physical counterpart. Virtualization is a fundamental technology in a cloud environment. However, the presence of an additional abstraction layer among software and hardware causes new security issues. Security issues related to virtualization technology have become a significant concern for organizations due to arising some new security challenges.
July 2021 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
October 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
International Journal of Network Security & Its Applications (IJNSA) - Curren...IJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
December 2023 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
January 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
October 2022: Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
December 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
April 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
April 2022 - Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
March 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
November 2023 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
April 2024 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdfIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
November 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
February 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
March 2024 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
May 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
Similar to TOP 5 Most View Article in Computer Science & Information Technology Research (20)
In the era of data-driven warfare, the integration of big data and machine learning (ML) techniques has
become paramount for enhancing defence capabilities. This research report delves into the applications of
big data and ML in the defence sector, exploring their potential to revolutionize intelligence gathering,
strategic decision-making, and operational efficiency. By leveraging vast amounts of data and advanced
algorithms, these technologies offer unprecedented opportunities for threat detection, predictive analysis,
and optimized resource allocation. However, their adoption also raises critical concerns regarding data
privacy, ethical implications, and the potential for misuse. This report aims to provide a comprehensive
understanding of the current state of big data and ML in defence, while examining the challenges and
ethical considerations that must be addressed to ensure responsible and effective implementation.
Cloud Computing, being one of the most recent innovative developments of the IT world, has been
instrumental not just to the success of SMEs but, through their productivity and innovative contribution to
the economy, has even made a remarkable contribution to the economic growth of the United States. To
this end, the study focuses on how cloud computing technology has impacted economic growth through
SMEs in the United States. Relevant literature connected to the variables of interest in this study was
reviewed, and secondary data was generated and utilized in the analysis section of this paper. The findings
of this paper revealed that there have been meaningful contributions that the usage of virtualization has
made in the commercial dealings of small firms in the United States, and this has also been reflected in the
economic growth of the country. This paper further revealed that as important as cloud-based software is,
some SMEs are still skeptical about how it can help improve their business and increase their bottom line
and hence have failed to adopt it. Apart from the SMEs, some notable large firms in different industries,
including information and educational services, have adopted cloud computing technology and hence
contributed to the economic growth of the United States. Lastly, findings from our inferential statistics
revealed that no discernible change has occurred in innovation between small and big businesses in the
adoption of cloud computing. Both categories of businesses adopt cloud computing in the same way, and
their contribution to the American economy has no significant difference in the usage of virtualization.
Energy-constrained Wireless Sensor Networks (WSNs) have garnered significant research interest in
recent years. Multiple-Input Multiple-Output (MIMO), or Cooperative MIMO, represents a specialized
application of MIMO technology within WSNs. This approach operates effectively, especially in
challenging and resource-constrained environments. By facilitating collaboration among sensor nodes,
Cooperative MIMO enhances reliability, coverage, and energy efficiency in WSN deployments.
Consequently, MIMO finds application in diverse WSN scenarios, spanning environmental monitoring,
industrial automation, and healthcare applications.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication. IJCSIT publishes original research papers and review papers, as well as auxiliary material such as: research papers, case studies, technical reports etc.
With growing, Car parking increases with the number of car users. With the increased use of smartphones
and their applications, users prefer mobile phone-based solutions. This paper proposes the Smart Parking
Management System (SPMS) that depends on Arduino parts, Android applications, and based on IoT. This
gave the client the ability to check available parking spaces and reserve a parking spot. IR sensors are
utilized to know if a car park space is allowed. Its area data are transmitted using the WI-FI module to the
server and are recovered by the mobile application which offers many options attractively and with no cost
to users and lets the user check reservation details. With IoT technology, the smart parking system can be
connected wirelessly to easily track available locations.
Welcome to AIRCC's International Journal of Computer Science and Information Technology (IJCSIT), your gateway to the latest advancements in the dynamic fields of Computer Science and Information Systems.
Computer-Assisted Language Learning (CALL) are computer-based tutoring systems that deal with
linguistic skills. Adding intelligence in such systems is mainly based on using Natural Language
Processing (NLP) tools to diagnose student errors, especially in language grammar. However, most such
systems do not consider the modeling of student competence in linguistic skills, especially for the Arabic
language. In this paper, we will deal with basic grammar concepts of the Arabic language taught for the
fourth grade of the elementary school in Egypt. This is through Arabic Grammar Trainer (AGTrainer)
which is an Intelligent CALL. The implemented system (AGTrainer) trains the students through different
questions that deal with the different concepts and have different difficulty levels. Constraint-based student
modeling (CBSM) technique is used as a short-term student model. CBSM is used to define in small grain
level the different grammar skills through the defined skill structures. The main contribution of this paper
is the hierarchal representation of the system's basic grammar skills as domain knowledge. That
representation is used as a mechanism for efficiently checking constraints to model the student knowledge
and diagnose the student errors and identify their cause. In addition, satisfying constraints and the number
of trails the student takes for answering each question and fuzzy logic decision system are used to
determine the student learning level for each lesson as a long-term model. The results of the evaluation
showed the system's effectiveness in learning in addition to the satisfaction of students and teachers with its
features and abilities.
In the realm of computer security, the importance of efficient and reliable user authentication methods has
become increasingly critical. This paper examines the potential of mouse movement dynamics as a
consistent metric for continuous authentication. By analysing user mouse movement patterns in two
contrasting gaming scenarios, "Team Fortress" and "Poly Bridge," we investigate the distinctive
behavioral patterns inherent in high-intensity and low-intensity UI interactions. The study extends beyond
conventional methodologies by employing a range of machine learning models. These models are carefully
selected to assess their effectiveness in capturing and interpreting the subtleties of user behavior as
reflected in their mouse movements. This multifaceted approach allows for a more nuanced and
comprehensive understanding of user interaction patterns. Our findings reveal that mouse movement
dynamics can serve as a reliable indicator for continuous user authentication. The diverse machine
learning models employed in this study demonstrate competent performance in user verification, marking
an improvement over previous methods used in this field. This research contributes to the ongoing efforts to
enhance computer security and highlights the potential of leveraging user behavior, specifically mouse
dynamics, in developing robust authentication systems.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
Image segmentation and classification tasks in computer vision have proven to be highly effective using neural networks, specifically Convolutional Neural Networks (CNNs). These tasks have numerous
practical applications, such as in medical imaging, autonomous driving, and surveillance. CNNs are capable
of learning complex features directly from images and achieving outstanding performance across several
datasets. In this work, we have utilized three different datasets to investigate the efficacy of various preprocessing and classification techniques in accurssedately segmenting and classifying different structures
within the MRI and natural images. We have utilized both sample gradient and Canny Edge Detection
methods for pre-processing, and K-means clustering have been applied to segment the images. Image
augmentation improves the size and diversity of datasets for training the models for image classification
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
This research aims to further understanding in the field of continuous authentication using behavioural
biometrics. We are contributing a novel dataset that encompasses the gesture data of 15 users playing
Minecraft with a Samsung Tablet, each for a duration of 15 minutes. Utilizing this dataset, we employed
machine learning (ML) binary classifiers, being Random Forest (RF), K-Nearest Neighbors (KNN), and
Support Vector Classifier (SVC), to determine the authenticity of specific user actions. Our most robust
model was SVC, which achieved an average accuracy of approximately 90%, demonstrating that touch
dynamics can effectively distinguish users. However, further studies are needed to make it viable option
for authentication systems. You can access our dataset at the following
link:https://github.com/AuthenTech2023/authentech-repo
This paper discusses the capabilities and limitations of GPT-3 (0), a state-of-the-art language model, in the
context of text understanding. We begin by describing the architecture and training process of GPT-3, and
provide an overview of its impressive performance across a wide range of natural language processing
tasks, such as language translation, question-answering, and text completion. Throughout this research
project, a summarizing tool was also created to help us retrieve content from any types of document,
specifically IELTS (0) Reading Test data in this project. We also aimed to improve the accuracy of the
summarizing, as well as question-answering capabilities of GPT-3 (0) via long text
In the realm of computer security, the importance of efficient and reliable user authentication methods has
become increasingly critical. This paper examines the potential of mouse movement dynamics as a
consistent metric for continuous authentication. By analysing user mouse movement patterns in two
contrasting gaming scenarios, "Team Fortress" and "Poly Bridge," we investigate the distinctive
behavioral patterns inherent in high-intensity and low-intensity UI interactions. The study extends beyond
conventional methodologies by employing a range of machine learning models. These models are carefully
selected to assess their effectiveness in capturing and interpreting the subtleties of user behavior as
reflected in their mouse movements. This multifaceted approach allows for a more nuanced and
comprehensive understanding of user interaction patterns. Our findings reveal that mouse movement
dynamics can serve as a reliable indicator for continuous user authentication. The diverse machine
learning models employed in this study demonstrate competent performance in user verification, marking
an improvement over previous methods used in this field. This research contributes to the ongoing efforts to
enhance computer security and highlights the potential of leveraging user behavior, specifically mouse
dynamics, in developing robust authentication systems.
Image segmentation and classification tasks in computer vision have proven to be highly effective using neural networks, specifically Convolutional Neural Networks (CNNs). These tasks have numerous
practical applications, such as in medical imaging, autonomous driving, and surveillance. CNNs are capable
of learning complex features directly from images and achieving outstanding performance across several
datasets. In this work, we have utilized three different datasets to investigate the efficacy of various preprocessing and classification techniques in accurssedately segmenting and classifying different structures
within the MRI and natural images. We have utilized both sample gradient and Canny Edge Detection
methods for pre-processing, and K-means clustering have been applied to segment the images. Image
augmentation improves the size and diversity of datasets for training the models for image classification.
This work highlights transfer learning’s effectiveness in image classification using CNNs and VGG 16 that
provides insights into the selection of pre-trained models and hyper parameters for optimal performance.
We have proposed a comprehensive approach for image segmentation and classification, incorporating preprocessing techniques, the K-means algorithm for segmentation, and employing deep learning models such
as CNN and VGG 16 for classification.
The security of Electric Vehicle (EV) charging has gained momentum after the increase in the EV adoption
in the past few years. Mobile applications have been integrated into EV charging systems that mainly use a
cloud-based platform to host their services and data. Like many complex systems, cloud systems are
susceptible to cyberattacks if proper measures are not taken by the organization to secure them. In this
paper, we explore the security of key components in the EV charging infrastructure, including the mobile
application and its cloud service. We conducted an experiment that initiated a Man in the Middle attack
between an EV app and its cloud services. Our results showed that it is possible to launch attacks against
the connected infrastructure by taking advantage of vulnerabilities that may have substantial economic and
operational ramifications on the EV charging ecosystem. We conclude by providing mitigation suggestions
and future research directions.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
This paper describes the outcome of an attempt to implement the same transitive closure (TC) algorithm
for Apache MapReduce running on different Apache Hadoop distributions. Apache MapReduce is a
software framework used with Apache Hadoop, which has become the de facto standard platform for
processing and storing large amounts of data in a distributed computing environment. The research
presented here focuses on the variations observed among the results of an efficient iterative transitive
closure algorithm when run against different distributed environments. The results from these comparisons
were validated against the benchmark results from OYSTER, an open source Entity Resolution system. The
experiment results highlighted the inconsistencies that can occur when using the same codebase with
different implementations of Map Reduce.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
How to Create Map Views in the Odoo 17 ERPCeline George
The map views are useful for providing a geographical representation of data. They allow users to visualize and analyze the data in a more intuitive manner.
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxEduSkills OECD
Andreas Schleicher presents at the OECD webinar ‘Digital devices in schools: detrimental distraction or secret to success?’ on 27 May 2024. The presentation was based on findings from PISA 2022 results and the webinar helped launch the PISA in Focus ‘Managing screen time: How to protect and equip students against distraction’ https://www.oecd-ilibrary.org/education/managing-screen-time_7c225af4-en and the OECD Education Policy Perspective ‘Students, digital devices and success’ can be found here - https://oe.cd/il/5yV
Ethnobotany and Ethnopharmacology:
Ethnobotany in herbal drug evaluation,
Impact of Ethnobotany in traditional medicine,
New development in herbals,
Bio-prospecting tools for drug discovery,
Role of Ethnopharmacology in drug evaluation,
Reverse Pharmacology.
This is a presentation by Dada Robert in a Your Skill Boost masterclass organised by the Excellence Foundation for South Sudan (EFSS) on Saturday, the 25th and Sunday, the 26th of May 2024.
He discussed the concept of quality improvement, emphasizing its applicability to various aspects of life, including personal, project, and program improvements. He defined quality as doing the right thing at the right time in the right way to achieve the best possible results and discussed the concept of the "gap" between what we know and what we do, and how this gap represents the areas we need to improve. He explained the scientific approach to quality improvement, which involves systematic performance analysis, testing and learning, and implementing change ideas. He also highlighted the importance of client focus and a team approach to quality improvement.
TOP 5 Most View Article in Computer Science & Information Technology Research
1. TTOOPP 5 MMoosstt VViieeww AArrttiiccllee iinn
CCoommppuutteerr SScciieennccee && IInnffoorrmmaattiioonn
TTeecchhnnoollooggyy RReesseeaarrcchh
International Journal of Computer Science and
Information Technology (IJCSIT)
Google Scholar Citation
ISSN: 0975-3826(online); 0975-4660 (Print)
http://airccse.org/journal/ijcsit.html
2. SECURITY THREATS ON CLOUD COMPUTING
VULNERABILITIES
Te-Shun Chou
Department of Technology Systems, East Carolina University, Greenville, NC,
U.S.A.
ABSTRACT
Clouds provide a powerful computing platform that enables individuals and organizations to
perform variety levels of tasks such as: use of online storage space, adoption of business
applications, development of customized computer software, and creation of a “realistic” network
environment. In previous years, the number of people using cloud services has dramatically
increased and lots of data has been stored in cloud computing environments. In the meantime,
data breaches to cloud services are also increasing every year due to hackers who are always
trying to exploit the security vulnerabilities of the architecture of cloud. In this paper, three cloud
service models were compared; cloud security risks and threats were investigated based on the
nature of the cloud service models. Real world cloud attacks were included to demonstrate the
techniques that hackers used against cloud computing systems. In addition,countermeasures to
cloud security breaches are presented.
KEYWORDS
Cloud computing, cloud security threats and countermeasures, cloud service models
For More Details : http://airccse.org/journal/jcsit/5313ijcsit06.pdf
Volume Link : http://airccse.org/journal/ijcsit2013_curr.html
3. REFERENCES
1. DataLossDB Open Security Foundation. http://datalossdb.org/statistics
2. Sophos Security Threat Report 2012. http://www.sophos.com/
3. Amazon.com Server Said to Have Been Used in Sony Attack,
May 2011.http://www.bloomberg.com/news/2011-05-13/sony-network-said-to-
have-been- invaded-by-hackersusing-amazon-com-server.html
4. D. Jamil and H. Zaki, “Security Issues in Cloud Computing and Countermeasures,”
International Journal of Engineering Science and Technology, Vol. 3 No. 4, pp.
2672- 2676, April 2011.
5. K. Zunnurhain and S. Vrbsky, “Security Attacks and Solutions in Clouds,” 2nd IEEE
International Conference on Cloud Computing Technology and Science,
Indianapolis, December 2010.
6. W. A. Jansen, “Cloud Hooks: Security and Privacy Issues in Cloud Computing,” 44th
Hawaii International Conference on System Sciences, pp. 1–10, Koloa, Hawaii,
January 2011.
7. T. Roth, “Breaking Encryptions Using GPU Accelerated Cloud Instances,” Black Hat
Technical Security Conference, 2011.
8. CERT Coordination Center, Denial
of
Service.http://www.packetstormsecurity.org/distributed/denial_of_service.html
9. M. Jensen, J. Schwenk, N. Gruschka, and L. L. Iacono, “On Technical Security
Issues in Cloud Computing,” IEEE International Conference in Cloud Computing,
pp. 109-116, Bangalore, 2009.
10. Thunder in the Cloud: $6 Cloud-Based Denial-of-Service Attack, August
2010.http://blogs.computerworld.com/16708/thunder_in_the_cloud_6_cloud_based_
deni al_of_service_attack
11. DDoS Attack Rains Down on Amazon Cloud, October
2009.http://www.theregister.co.uk/2009/10/05/amazon_bitbucket_outage/
12. 2011 CyberSecurity Watch Survey, CERT Coordination Center at Carnegie Mellon
University.
13. D. Catteddu and G. Hogben, “Cloud Computing Benefits, Risks and
Recommendations for Information Security,” The European Network and
Information Security Agency (ENISA), November 2009.
4. 14. Insider Threats Related to Cloud Computing, CERT, July 2012. http://www.cert.org/
15. Data Breach Trends & Stats, Symantec, 2012. http://www.indefenseofdata.com/data-
breach-trendsstats/
16. 2012 Has Delivered Her First Giant Data Breach, January
2012.http://www.infosecisland.com/blogview/19432-2012-Has-Delivered-Her-First-
Giant-DataBreach.html
17. A Few Wrinkles Are Etching Facebook, Other Social Sites, USA Today,
2011.http://www.usatoday.com/printedition/life/20090115/socialnetworking15_st.art.h
tm l
18. An Update on LinkedIn Member Passwords Compromised, LinkedIn Blog, June,
2012.http://blog.linkedin.com/2012/06/06/linkedin-member-passwords-compromised/
19. Dropbox: Yes, We Were Hacked, August 2012. http://gigaom.com/cloud/dropbox-
yes-we-werehacked/
20. Web Based Attacks, Symantec White Paper, February 2009.
21. Symantec Internet Security Threat Report, 2011 Trends, Vol. 17, April 2012.
22. P. P. Ramgonda and R. R. Mudholkar, “Cloud Market Cogitation and Techniques to
Averting SQL Injection for University Cloud,” International Journal of Computer
Technology and Applications, Vol. 3, No. 3, pp. 1217-1224, January, 2012.
23. A. S. Choudhary and M. L. Dhore, “CIDT: Detection of Malicious Code Injection
Attacks on Web Application,” International Journal of Computer Applications, Vol.
52, No. 2, pp. 19-26, August 2012.
24. Web Application Attack Report For The Second Quarter of
2012.http://www.firehost.com/company/newsroom/web-application-attack-report-
second-quarter-2012
25. Visitors to Sony PlayStation Website at Risk of Malware Infection, July
2008.http://www.sophos.com/en-us/press-office/press-
releases/2008/07/playstation.aspx
26. N. Provos, M. A. Rajab, and P. Mavrommatis, “Cybercrime 2.0: When the Cloud
Turns Dark,” ACM Communications, Vol. 52, No. 4, pp. 42–47, 2009.
27. S. S. Rajan, Cloud Security Series | SQL Injection and SaaS, Cloud Computing
Journal, November 2010.
5. 28. Researchers Demo Cloud Security Issue With Amazon AWS Attack, October 2011.
http://www.pcworld.idg.com.au/article/405419/researchers_demo_cloud_security_is
sue_ amazon_aws_attack/
29. M. McIntosh and P. Austel, “XML Signature Element Wrapping Attacks and
Countermeasures,” 2005 workshop on Secure web services, ACM Press, New York,
NY, pp. 20–27, 2005.
30. N. Gruschka and L. L. Iacono, “Vulnerable Cloud: SOAP Message Security
Validation Revisited,” IEEE International Conference on Web Services, Los
Angeles, 2009.
31. A. Tripathi and A. Mishra, “Cloud Computing Security Considerations Interface,”
2011 IEEE International Conference on Signal Processing, Communications and
Computing, Xi'an, China, September 2011.
32. H. C. Li, P. H. Liang, J. M. Yang, and S. J. Chen, “Analysis on Cloud-Based
Security Vulnerability Assessment,” IEEE International Conference on E-Business
Engineering, pp.490-494, November 2010.
33. Amazon:Hey Spammers, Get Off My
Cloud!http://voices.washingtonpost.com/securityfix/2008/07/amazon_hey_spammer
s_get_off_my.html
34. W. Jansen and T. Grance, “Guidelines on Security and Privacy in Public Cloud
Computing,” Computer Security Division, Information Technology Laboratory,
National Institute of Standards and Technology, Special Publication 800-144,
December 2011.
35. Tackling the Insider Threat http://www.bankinfosecurity.com/blogs.php?postID=140
36. “Cloud Security Risks and Solutions,” White Paper, BalaBit IT Security, July 2010.
37. S. J. Stolfo, M. B. Salem, and A. D. Keromytis, “Fog computing: Mitigating Insider
Data Theft Attacks in the Cloud,” IEEE Symposium on Security and Privacy
Workshops, pp. 125-128, San Francisco, CA, 2012.
38. M. Jensen, C. Meyer, J. Somorovsky, and J. Schwenk, “On the Effectiveness of
XML Schema Validation for Countering XML Signature Wrapping Attacks,” First
International Workshop on Securing Services on the Cloud, Milan, Italy, September
2011.
39. S. Gajek, M. Jensen, L. Liao, and J. Schwenk, “Analysis of Signature Wrapping
Attacks and Countermeasures,” IEEE International Conference on Web Services, pp.
575–582, Miami, Florida, July 2009.
6. BIG DATA IN CLOUD COMPUTING REVIEW AND
OPPORTUNITIES
Manoj Muniswamaiah, Tilak Agerwala and Charles Tappert
Seidenberg School of CSIS, Pace University, White Plains, New York
ABSTRACT
Big Data is used in decision making process to gain useful insights hidden in the data for
business and engineering. At the same time it presents challenges in processing, cloud
computing has helped in advancement of big data by providing computational, networking
and storage capacity. This paper presents the review, opportunities and challenges of
transforming big data using cloud computing resources.
KEYWORDS
Big data; cloud computing; analytics; database; data warehouse
For More Details: http://aircconline.com/ijcsit/V11N4/11419ijcsit04.pdf
Volume Link: http://airccse.org/journal/ijcsit2019_curr.html
7. REFERENCES
[1] Konstantinou, I., Angelou, E., Boumpouka, C., Tsoumakos, D., & Koziris, N. (2011, October).
On the elasticity of nosql databases over cloud management platforms. In Proceedings of the
20th ACM international conference on Information and knowledge management (pp. 2385-
2388). ACM.
[2] Labrinidis, Alexandros, and Hosagrahar V. Jagadish. "Challenges and opportunities with big
data." Proceedings of the VLDB Endowment 5.12 (2012): 2032-2033.
[3] Abadi, D. J. (2009). Data management in the cloud: Limitations and opportunities. IEEE Data
Eng. Bull, 32(1), 3-12.
[4] Luhn, H. P. (1958). A business intelligence system. IBM Journal of Research and Development,
2(4), 314-319 International Journal of Computer Science & Information Technology (IJCSIT)
Vol 11, No 4, August 2019 57
[5] Sivarajah, Uthayasankar, et al. "Critical analysis of Big Data challenges and analytical
methods." Journal of Business Research 70 (2017): 263-286.
[6] https://www.bmc.com/blogs/saas-vs-paas-vs-iaas-whats-the-difference-and-how-to-choose/
[7] Kavis, Michael J. Architecting the cloud: design decisions for cloud computing service models
(SaaS, PaaS, and IaaS). John Wiley & Sons, 2014.
[8] https://www.ripublication.com/ijaer17/ijaerv12n17_89.pdf
[9] Sakr, S. & Gaber, M.M., 2014. Large Scale and big data: Processing and Management
Auerbach, ed.
[10] Ji, Changqing, et al. "Big data processing in cloud computing environments." 2012 12th
international symposium on pervasive systems, algorithms and networks. IEEE, 2012.
[11] Han, J., Haihong, E., Le, G., & Du, J. (2011, October). Survey on nosql database. In Pervasive
Computing and Applications (ICPCA), 2011 6th International Conference on (pp. 363-366).
IEEE.
[12] Zhang, L. et al., 2013. Moving big data to the cloud. INFOCOM, 2013 Proceedings IEEE,
pp.405–409
[13] Fernández, Alberto, et al. "Big Data with Cloud Computing: an insight on the computing
environment, MapReduce, and programming frameworks." Wiley Interdisciplinary Reviews:
Data Mining and Knowledge Discovery 4.5 (2014): 380-409.
[14] http://acme.able.cs.cmu.edu/pubs/uploads/pdf/IoTBD_2016_10.pdf
[15] Xiaofeng, Meng, and Chi Xiang. "Big data management: concepts, techniques and challenges
[J]." Journal of computer research and development 1.98 (2013): 146-169.
[16] Muniswamaiah, Manoj & Agerwala, Tilak & Tappert, Charles. (2019). Challenges of Big Data
Applications in Cloud Computing. 221-232. 10.5121/csit.2019.90918.
8. AN ALGORITHM FOR PREDICTIVE DATA MINING APPROACH IN
MEDICAL DIAGNOSIS
Shakuntala Jatav1
and Vivek Sharma2
1
M.Tech Scholar, Department of CSE, TIT College, Bhopal 2
Professor,
Department of CSE, TIT College, Bhopal
ABSTRACT
The Healthcare industry contains big and complex data that may be required in order to
discover fascinating pattern of diseases & makes effective decisions with the help of
different machine learning techniques. Advanced data mining techniques are used to
discover knowledge in database and for medical research. This paper has analyzed
prediction systems for Diabetes, Kidney and Liver disease using more number of input
attributes. The data mining classification techniques, namely Support Vector
Machine(SVM) and Random Forest (RF) are analyzed on Diabetes, Kidney and Liver
disease database. The performance of these techniques is compared, based on precision,
recall, accuracy, f_measure as well as time. As a result of study the proposed algorithm is
designed using SVM and RF algorithm and the experimental result shows the accuracy of
99.35%, 99.37 and 99.14 on diabetes, kidney and liver disease respectively.
KEYWORDS
Data Mining, Clinical Decision Support System, Disease Prediction, Classification,
SVM, RF.
For More Details : http://aircconline.com/ijcsit/V10N1/10118ijcsit02.pdf
Volume Link: http://airccse.org/journal/ijcsit2018_curr.html
9. REFERENCES
[1] Nidhi Bhatla, Kiran Jyoti, “An Analysis of Heart Disease Prediction using Different Data
Mining Techniques”,IJERT,Vol 1, Issue 8, 2012.
[2] Syed Umar Amin, Kavita Agarwal, Rizwan Beg, “Genetic Neural Network based Data
Mining in Prediction of Heart Disease using Risk Factors”, IEEE, 2013.
[3] A H Chen, S Y Huang, P S Hong, C H Cheng, E J Lin, “HDPS: Heart Disease Prediction
System”, IEEE, 2011.
[4] M. Akhil Jabbar, B. L Deekshatulu, Priti Chandra, “Heart Disease Prediction using Lazy
Associative Classification”, IEEE, 2013.
[5] Chaitrali S. Dangare, Sulabha S. Apte, “Improved Study of Heart Disease Prediction System
using Data Mining Classification Techniques”, IJCA, Volume 47– No.10, June 2012.
[6] P. Bhandari, S. Yadav, S. Mote, D.Rankhambe, “Predictive System for Medical Diagnosis
with Expertise Analysis”, IJESC, Vol. 6, pp. 4652-4656, 2016.
[7] Nishara Banu, Gomathy, “Disease Forecasting System using Data Mining Methods”, IEEE
Transaction on Intelligent Computing Applications, 2014.
[8] A. Iyer, S. Jeyalatha and R. Sumbaly, “Diagnosis of Diabetes using Classification Mining
Techniques”, IJDKP, Vol. 5, pp. 1-14, 2015.
[9] Sadiyah Noor Novita Alfisahrin and Teddy Mantoro, “Data Mining Techniques for
Optimatization of Liver Disease Classification”, International Conference on Advanced
Computer Science Applications and Technologies, IEEE, pp. 379-384, 2013.
[10] A. Naik and L. Samant, “Correlation Review of Classification Algorithm using Data Mining
Tool: WEKA, Rapidminer , Tanagra ,Orange and Knime”, ELSEVIER, Vol. 85, pp. 662-
668, 2016.
[11] Uma Ojha and Savita Goel, “A study on prediction of breast cancer recurrence using data
mining techniques”, International Conference on Cloud Computing, Data Science &
Engineering, IEEE, 2017.
[12] Naganna Chetty, Kunwar Singh Vaisla, Nagamma Patil, “An Improved Method for Disease
Prediction using Fuzzy Approach”, International Conference on Advances in Computing
and Communication Engineering, IEEE, pp. 568-572, 2015.
[13] Kumari Deepika and Dr. S. Seema, “Predictive Analytics to Prevent and Control Chronic
Diseases”, International Conference on Applied and Theoretical Computing and
Communication Technology, IEEE, pp. 381-386, 2016.
[14] Emrana Kabir Hashi, Md. Shahid Uz Zaman and Md. Rokibul Hasan, “An Expert Clinical
Decision Support System to Predict Disease Using Classification Techniques”, IEEE,2017
10. CONVOLUTIONAL NEURAL NETWORK BASED FEATURE
EXTRACTION FOR IRIS RECOGNITION
Maram.G Alaslani1
and Lamiaa A. Elrefaei1,2
1
Computer Science Department, Faculty of Computing and Information
Technology, King Abdulaziz University, Jeddah, Saudi Arabia
2
Electrical Engineering Department, Faculty of Engineering at Shoubra, Benha
University, Cairo, Egypt
ABSTRACT
Iris is a powerful tool for reliable human identification. It has the potential to identify individuals
with a high degree of assurance. Extracting good features is the most significant step in the iris
recognition system. In the past, different features have been used to implement iris recognition
system. Most of them are depend on hand-crafted features designed by biometrics specialists.
Due to the success of deep learning in computer vision problems, the features learned by the
Convolutional Neural Network (CNN) have gained much attention to be applied for iris
recognition system. In this paper, we evaluate the extracted learned features from a pre-trained
Convolutional Neural Network (Alex-Net Model) followed by a multi-class Support Vector
Machine (SVM) algorithm to perform classification. The performance of the proposed system is
investigated when extracting features from the segmented iris image and from the normalized iris
image. The proposed iris recognition system is tested on four public datasets IITD, iris databases
CASIAIris-V1, CASIA-Iris-thousand and, CASIA-Iris- V3 Interval. The system achieved
excellent results with the very high accuracy rate.
KEYWORDS
Biometrics, Iris, Recognition, Deep learning, Convolutional Neural Network (CNN), Feature
extraction (FE).
For More Details : http://aircconline.com/ijcsit/V10N2/10218ijcsit06.pdf
Volume Link: http://airccse.org/journal/ijcsit2018_curr.html
11. REFERENCES
[1] M. Haghighat, S. Zonouz, and M. Abdel-Mottaleb, "CloudID: Trustworthy cloud-based and
crossenterprise biometric identification," Expert Systems with Applications, vol. 42, pp.
7905-7916, 2015.
[2] D. Kesavaraja, D. Sasireka, and D. Jeyabharathi, "Cloud software as a service with iris
authentication," Journal of Global Research in Computer Science, vol. 1, pp. 16-22, 2010.
[3] N. Shah and P. Shrinath, "Iris Recognition System–A Review," International Journal of
Computer and Information Technology, vol. 3, 2014.
[4] A. B. Dehkordi and S. A. Abu-Bakar, "A review of iris recognition system," Jurnal
Teknologi, vol. 77, 2015.
[5] S. Minaee, A. Abdolrashidiy, and Y. Wang, "An experimental study of deep convolutional
features for iris recognition," in Signal Processing in Medicine and Biology Symposium
(SPMB), 2016 IEEE, 2016, pp. 1-6. International Journal of Computer Science &
Information Technology (IJCSIT) Vol 10, No 2, April 2018 77
[6] S. Minaee, A. Abdolrashidi, and Y. Wang, "Iris recognition using scattering transform and
textural features," in Signal Processing and Signal Processing Education Workshop
(SP/SPE), 2015 IEEE, 2015, pp. 37-42.
[7] S. Minaee, A. Abdolrashidi, and Y. Wang, "Face Recognition Using Scattering
Convolutional Network," arXiv preprint arXiv:1608.00059, 2016.
[8] IIT Delhi Database. Available:
http://www4.comp.polyu.edu.hk/~csajaykr/IITD/Database_Iris.htm. Accessed 14 April
2017.
[9] ( 2 April2017). CASIA Iris Image Database Version 1.0. Available:
http://www.idealtest.org/findDownloadDbByMode.do?mode=Iris. Accessed 12 April 2017.
[10] CASIA Iris Image Database Version 4.0 (CAS IA-Iris-Thousand). Available:
http://biometrics.idealtest.org/dbDetailForUser.do?id=4. Accessed 17 April 2017.
[11] CASIA Iris Image Database Version 3.0 (CASIA-Iris-Interval). Available:
http://biometrics.idealtest.org/dbDetailForUser.do?id=3. Accessed 17April2017.
[12] K. Nguyen, C. Fookes, A. Ross, and S. Sridharan, "Iris Recognition with Off-the-Shelf CNN
Features: A Deep Learning Perspective," IEEE Access, 2017.
[13] A. Romero, C. Gatta, and G. Camps-Valls, "Unsupervised deep feature extraction for remote
sensing image classification," IEEE Transactions on Geoscience and Remote Sensing, vol.
54, pp. 1349-1362, 2016.
12. [14] O. Oyedotun and A. Khashman, "Iris nevus diagnosis: convolutional neural network and
deep belief network," Turkish Journal of Electrical Engineering & Computer Sciences, vol.
25, pp. 1106-1115, 2017.
[15] A. S. Al-Waisy, R. Qahwaji, S. Ipson, S. Al-Fahdawi, and T. A. Nagem, "A multi-biometric
iris recognition system based on a deep learning approach," Pattern Analysis and
Applications, pp. 1-20, 2017.
[16] J. Nagi, F. Ducatelle, G. A. Di Caro, D. Cireşan, U. Meier, A. Giusti, F. Nagi, J.
Schmidhuber, and L. M. Gambardella, "Max-pooling convolutional neural networks for
vision-based hand gesture recognition," in Signal and Image Processing Applications
(ICSIPA), 2011 IEEE International Conference on, 2011, pp. 342-347.
[17] D. Scherer, A. Müller, and S. Behnke, "Evaluation of pooling operations in convolutional
architectures for object recognition," Artificial Neural Networks–ICANN 2010, pp. 92-101,
2010.
[18] J. van Doorn, "Analysis of deep convolutional neural network architectures," 2014.
[19] C. L. Lam and M. Eizenman, "Convolutional neural networks for eye detection in remote
gaze estimation systems," 2008.
[20] S. Ahmad Radzi, K.-H. Mohamad, S. S. Liew, and R. Bakhteri, "Convolutional neural
network for face recognition with pose and illumination variation," International Journal of
Engineering and Technology (IJET), vol. 6, pp. 44-57, 2014.
[21] K. Itqan, A. Syafeeza, F. Gong, N. Mustafa, Y. Wong, and M. Ibrahim, "User identification
system based on finger-vein patterns using Convolutional Neural Network," ARPN Journal
of Engineering and Applied Sciences, vol. 11, pp. 3316-3319, 2016.
[22] S. Sangwan and R. Rani, "A Review on: Iris Recognition," (IJCSIT) International Journal of
Computer Science and Information Technologies, vol. 6, pp. 3871-3873, 2015
[23] C. Jayachandra and H. V. Reddy, "Iris Recognition based on Pupil using Canny edge
detection and KMeans Algorithm," Int. J. Eng. Comput. Sci., vol. 2, pp. 221-225, 2013.
[24] L. A. Elrefaei, D. H. Hamid, A. A. Bayazed, S. S. Bushnak, and S. Y. Maasher, "Developing
Iris Recognition System for Smartphone Security," Multimedia Tools and Applications, pp.
1-25, 2017.
[25] A. Krizhevsky, I. Sutskever, and G. E. Hinton, "Imagenet classification with deep
convolutional neural networks," in Advances in neural information processing systems,
2012, pp. 1097-1105.
[26] S. Minaee and Y. Wang, "Palmprint Recognition Using Deep Scattering Convolutional
Network," arXiv preprint arXiv:1603.09027, 2016.
13. [27] J. Weston and C. Watkins, "Multi-class support vector machines," Technical Report CSD-
TR-98-04, Department of Computer Science, Royal Holloway, University of London,
May1998.
[28] G. Xu, Z. Zhang, and Y. Ma, "A novel method for iris feature extraction based on
intersecting cortical model network," Journal of Applied Mathematics and Computing, vol.
26, pp. 341-352, 2008.
[29] M. Abhiram, C. Sadhu, K. Manikantan, and S. Ramachandran, "Novel DCT based feature
extraction for enhanced iris recognition," in Communication, Information & Computing
Technology (ICCICT), 2012 International Conference on, 2012, pp. 1-6.
[30] M. Elgamal and N. Al-Biqami, "An efficient feature extraction method for iris recognition
based on wavelet transformation," Int. J. Comput. Inf. Technol, vol. 2, pp. 521-527, 2013.
[31] B. Bharath, A. Vilas, K. Manikantan, and S. Ramachandran, "Iris recognition using radon
transform thresholding based feature extraction with Gradient-based Isolation as a pre-
processing technique," in Industrial and Information Systems (ICIIS), 2014 9th International
Conference on, 2014, pp. 1-8.
[32] S. S. Dhage, S. S. Hegde, K. Manikantan, and S. Ramachandran, "DWT-based feature
extraction and radon transform based contrast enhancement for improved iris recognition,"
Procedia Computer Science, vol. 45, pp. 256-265, 2015.
AUTHORS
Maram G. Alaslani Received her B.Sc. degree in Computer Science with Honors from King
Abdulaziz University in 2010. She works as Teaching Assistant from 2011 to date at Faculty of
Computers and Information Technology at King Abdulaziz University, Rabigh, Saudi Arabia.
Now she is working in her Master Degree at King Abdulaziz University, Jeddah, Saudi Arabia.
She has a research interest in image processing, pattern recognition, and neural network..
Lamiaa A. Elrefaei received her B.Sc. degree with honors in Electrical Engineering (Electronics
and Telecommunications) in 1997, her M.Sc. in 2003 and Ph.D. in 2008 in Electrical Engineering
(Electronics) from faculty of Engineering at Shoubra, Benha University, Egypt. She held a
number of faculty positions at Benha University, as Teaching Assistant from 1998 to 2003, as an
Assistant Lecturer from 2003 to 2008, and has been a lecturer from 2008 to date. She is currently
an Associate Professor at the faculty of Computing and Information Technology, King Abdulaziz
University, Jeddah, Saudi Arabia. Her research interests include computational intelligence,
biometrics, multimedia security, wireless networks, and Nano networks. She is a senior member
of IEEE..
14. DIAGONAL BASED FEATURE EXTRACTION FOR
HANDWRITTEN ALPHABETS RECOGNITION SYSTEM
USING NEURAL NETWORK
J.Pradeep1
, E.Srinivasan2
and S.Himavathi3
1,2
Department of ECE, Pondicherry College Engineering, Pondicherry, India.
3
Department of EEE, Pondicherry College Engineering, Pondicherry, India.
ABSTRACT
An off-line handwritten alphabetical character recognition system using multilayer feed forward
neural network is described in the paper. A new method, called, diagonal based feature extraction
is introduced for extracting the features of the handwritten alphabets. Fifty data sets, each
containing 26 alphabets written by various people, are used for training the neural network and
570 different handwritten alphabetical characters are used for testing. The proposed recognition
system performs quite well yielding higher levels of recognition accuracy compared to the
systems employing the conventional horizontal and vertical methods of feature extraction. This
system will be suitable for converting handwritten documents into structural text form and
recognizing handwritten names
KEYWORDS
Handwritten character recognition, Image processing, Feature extraction, feed forward neural
networks.
.
For More Details : http://airccse.org/journal/jcsit/0211ijcsit03.pdf
Volume Link : http://airccse.org/journal/ijcsit2011_curr.html
15. REFERENCES
[1] S. Mori, C.Y. Suen and K. Kamamoto, “Historical review of OCR research and
development,” Proc. of IEEE, vol. 80, pp. 1029-1058, July 1992.
[2] S. Impedovo, L. Ottaviano and S. Occhinegro, “Optical character recognition”,
International Journal Pattern Recognition and Artificial Intelligence, Vol. 5(1-2),
pp. 1-24, 1991.
[3] V.K. Govindan and A.P. Shivaprasad, “Character Recognition – A review,”Pattern
Recognition, vol. 23, no. 7, pp. 671- 683,
[4] R. Plamondon and S. N. Srihari, “On-line and off- line handwritten character
recognition: A comprehensive survey,”IEEE. Transactions on Pattern Analysis
and Machine Intelligence, vol. 22, no. 1, pp. 63-84, 2000.
[5] N. Arica and F. Yarman-Vural, “An Overview of Character Recognition Focused on
Off-line Handwriting”, IEEE Transactions on Systems, Man, and Cybernetics, Part
C: Applications and Reviews, 2001, 31(2), pp. 216 - 233.
[6] U. Bhattacharya, and B. B. Chaudhuri, “Handwritten numeral databases of Indian
Scripts and multistage recognition of mixed numerals,” IEEE Transaction on Pattern
analysis and machine intelligence, vol.31, No.3, pp.444-457, 2009.
[7] U. Pal, T. Wakabayashi and F. Kimura, “Handwritten numeral recognition of six
popular scripts,” Ninth International conference on Document Analysis and
Recognition ICDAR 07, Vol.2, pp.749-753, 2007.
[8] R.G. Casey and E.Lecolinet, “A Survey of Methods and Strategies in Character
Segmentation,” IEEE Transactions on Pattern Analysis and Machine Intelligence,
Vol. 18, No.7, July 1996, pp. 690-706.
[9] Anil.K.Jain and Torfinn Taxt, “Feature extraction methods for character recognitionA
Survey,” Pattern Recognition, vol. 29, no. 4, pp. 641-662, 1996.
[10] R.G. Casey and E.Lecolinet, “A Survey of Methods and Strategies in Character
Segmentation,” IEEE Transactions on Pattern Analysis and Machine Intelligence,
Vol. 18, No.7, July 1996, pp. 690-706.
[11] C. L. Liu, H. Fujisawa, “Classification and Learning for Character
Recognition:Comparison of Methods and Remaining Problems”, Int. Workshop on
Neural Networks and Learning in Document Analysis and Recognition, Seoul, 2005.
16. [12] F. Bortolozzi, A. S. Brito, Luiz S. Oliveira and M. Morita, “Recent Advances in
Handwritten Recognition”, Document Analysis, Umapada Pal, Swapan K. Parui,
Bidyut B. Chaudhuri, pp 1-30.
[13] Anita Pal & Dayashankar Singh, “Handwritten English Character Recognition Using
Neural,” Network International Journal of Computer Science & Communication.vol.
1,No. 2, July-December 2010, pp. 141-144.
[14] Dinesh Acharya U, N V Subba Reddy and Krishnamurthy, “Isolated handwritten
Kannada numeral recognition using structural feature and K-means cluster,” IISN-
2007, pp-125 -129.
[15] N. Sharma, U. Pal, F. Kimura, "Recognition of Handwritten Kannada Numerals",
9thInternational Conference on Information Technology (ICIT'06), ICIT, pp. 133-
136.
[16] Rafael C. Gonzalez, Richard E. woods and Steven L.Eddins, Digital Image
Processing using MATLAB, Pearson Education, Dorling Kindersley, South Asia,
2004.
[17] S.V.Rajashekararadhya, and P.VanajaRanjan, “Efficient zone based feature
extraction algorithm for handwritten numeral recognition of four popular south-
Indian scripts,” Journal of Theoretical and Applied Information Technology, JATIT
vol.4, no.12, pp.1171-1181, 2008.