Publisher: Scientific Research Publishing   (Total: 243 journals)

 A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

  First | 1 2        [Sort by number of followers]   [Restore default list]

Showing 201 - 243 of 243 Journals sorted alphabetically
Open J. of Psychiatry     Open Access   (Followers: 5)
Open J. of Radiology     Open Access   (Followers: 4)
Open J. of Regenerative Medicine     Open Access   (Followers: 1)
Open J. of Respiratory Diseases     Open Access   (Followers: 2)
Open J. of Rheumatology and Autoimmune Diseases     Open Access   (Followers: 4)
Open J. of Safety Science and Technology     Open Access   (Followers: 19)
Open J. of Social Sciences     Open Access   (Followers: 5)
Open J. of Soil Science     Open Access   (Followers: 10)
Open J. of Statistics     Open Access   (Followers: 5)
Open J. of Stomatology     Open Access   (Followers: 1)
Open J. of Synthesis Theory and Applications     Open Access  
Open J. of Therapy and Rehabilitation     Open Access   (Followers: 4)
Open J. of Thoracic Surgery     Open Access  
Open J. of Urology     Open Access   (Followers: 6)
Open J. of Veterinary Medicine     Open Access   (Followers: 4)
Optics and Photonics J.     Open Access   (Followers: 17)
Pain Studies and Treatment     Open Access   (Followers: 3)
Pharmacology & Pharmacy     Open Access   (Followers: 5)
Positioning     Open Access   (Followers: 5)
Psychology     Open Access   (Followers: 7)
Smart Grid and Renewable Energy     Open Access   (Followers: 9)
Social Networking     Open Access   (Followers: 5)
Sociology Mind     Open Access   (Followers: 3)
Soft     Open Access  
Soft Nanoscience Letters     Open Access   (Followers: 1)
Spectral Analysis Review     Open Access  
Stem Cell Discovery     Open Access   (Followers: 5)
Surgical Science     Open Access   (Followers: 1)
Technology and Investment     Open Access   (Followers: 2)
Theoretical Economics Letters     Open Access   (Followers: 3)
Wireless Engineering and Technology     Open Access   (Followers: 5)
Wireless Sensor Network     Open Access   (Followers: 5)
World J. of AIDS     Open Access   (Followers: 2)
World J. of Cardiovascular Diseases     Open Access   (Followers: 2)
World J. of Cardiovascular Surgery     Open Access   (Followers: 4)
World J. of Condensed Matter Physics     Open Access   (Followers: 1)
World J. of Engineering and Technology     Open Access  
World J. of Mechanics     Open Access   (Followers: 2)
World J. of Nano Science and Engineering     Open Access   (Followers: 4)
World J. of Neuroscience     Open Access  
World J. of Nuclear Science and Technology     Open Access   (Followers: 5)
World J. of Vaccines     Open Access   (Followers: 3)
Yangtze Medicine     Open Access  

  First | 1 2        [Sort by number of followers]   [Restore default list]

Similar Journals
Journal Cover
Wireless Sensor Network
Number of Followers: 5  

  This is an Open Access Journal Open Access journal
ISSN (Print) 1945-3078 - ISSN (Online) 1945-3086
Published by Scientific Research Publishing Homepage  [243 journals]
  • Authentication Database Leakage Detection

    • Authors: ISRAA S. AHMED
      Abstract: Authentication is the first step for any important applications. Password verification is widely employed in the Internet. Some advanced mechanisms including bio features, such as fingerprints or retina. However, digital password authentication credential is commonly used in the public. In other words, traditional password verification is still an important authentication credential mechanism for today's online services. Password database may be compromised. Once if the database is stolen, it is dangerous and critical for any services. Consequently, password  database leakage becomes an important issue. Detection and countermeasure are essential for such a disaster. Our research proposing a scheme based on a authentication database storage mapping method to detect possible leakage of authentication database. By multiple mapping mechanism, if the authentication database is stolen, an attacker could not know any user's correct password. This method can reduce additional space of storing passwords with ability to detect security event for stolen authentication databases. Keywords:Application Security; System Security; Leakage Detection; Authentication database, Password
      DOI : 10.7176/NCS/12-01 Publication date: January 31st 2021
      Issue No: Vol. 12
       
  • Single Sink Repositioning Technique in Wireless Sensor Networks for
           Increasing Throughput and Decreasing Delay

    • Authors: Asrat Sime Bedada
      Abstract: Wireless sensor network (WSN) refers to a group of spatially spread and enthusiastic sensors for monitoring and recording the physical conditions of the environment and organizing the collected data at a central location. WSN becomes an energetic subject with the rapid development that is vulnerable to a varied high-quality of attacks due to deployment in the hostile environment. In WSN, throughput is defined as the amount of data transferred from one sensor node to another in a specified amount of time. Delay It refers to the total time taken for a single packet to be transmitted across a network from source to destination. The basic idea of sink relocation is to shorten the distance between sink node and sensor node. So, that significant power savings can be achieved. The problem of distant node energy consumption of wireless sensor node was solved by sink repositioning technique which has capability to move and communicate with all sensor node inside the region. The sink node and sensor node are randomly deployed within the geographic extent of the entire network. In order to test for the impact of repositioning the total power transmission of the sensors for the previous and next sink positions is evaluated and compared. This is result in increasing life time of sensor network by putting sink node at optimum location to decrease the distant node, increases throughput and decrease delay with sink node and analyze the difference. The main aim of the study was to increase throughput and decrease end to end delay. For this study we have used NS-2.35 environment for simulation. Our simulation results show that repositioning the sink achieves significant change on throughput and delay when compared to the static sink approach that have been presented by using network animator(NAM) and Xgraph. Keywords:- WSN, Sink node, sensor node, throughput, delay and  sink reposition.
      DOI : 10.7176/NCS/12-02 Publication date: January 31st 2021
      Issue No: Vol. 12
       
  • A Proposed Model for Maximizing Broadband Penetration with Submarine Cable
           in Nigeria

    • Authors: Bourdillon Omijeh
      Abstract: This publication is purely research and accumulated intellect based. The bottom up approach adopted in this research was focused on the Bandwidth Implications of Submarine Cable to Broadband Development in Nigeria. The study tried to pinpoint some underlying fundamental issues limiting the development of Fibre Broadband in Nigeria. The various sources of undersea cables and there various capacities were well evaluated as well as the socio economic importance of broadband and its numerous applications. Other sources of broadband were also highlighted, with strategies on how to increase broadband penetration in Nigeria. The economic implication of bandwidth and its relationship with national development, was well introduced using the 2016 human development report by United Nations Development Program.  Analytical presentation of a proposed model for an interconnected long haul national backbone was also presented with the immerse benefits listed out. The study came to a conclusion with strong summarized recommendations followed by references. Keywords: Backbone, Penetration, Undersea Cable, Broadband.
      DOI : 10.7176/NCS/12-03 Publication date: January 31st 2021
      Issue No: Vol. 12
       
  • Adaptive Network Based Fuzzy Inference System and the Future of
           Employability

    • Authors: Saada Abdel Gawad Khadragy, Sherief Abdallah
      Abstract: Educational data is considered by researchers and data scientists as an indicator for the future predictions. The current research study aims for classifying IT alumni students into employed and unemployed. The data collected from two universities in Jordan. 781 of IT alumni students in two universities in Jordan participate in the current study. Three classifiers are compared to determine the most suitable one for predicting the future of IT students’ employability. The results show that Adaptive Network Based Fuzzy Inference System came as a suitable classifier for predicting IT students’ employment in Jordan. As gender, programming skills, and communication skills came as the most effective factors affecting IT recruitment field, a set of recommendations is presented to the ministry of higher education based on the significant factors affecting IT graduates employment. Keywords: employability, ANFIS, classification, data mining
      DOI : 10.7176/NCS/12-04 Publication date: January 31st 2021
      Issue No: Vol. 12
       
  • Intrusion Detection System in Cloud Computing: A Literature Review

    • Authors: Kezang Dema, Naghmeh Moradpoor, Thinley Jamtsho
      Abstract: Cloud computing provide users a convenient, ubiquitous and on-demand network access to a shared pool of computing resources over an Internet. On the other aspect, due to its distributed and complex architectures, it possess many security risks and become one of the attractive targets for the cyber-attacks by the intruders. With the growing popularity of cloud computing, the importance to provide reliable and secure services assurance remains one of the major issues. Intrusion Detection Systems (IDS) have been widely used as one of the mechanism to detect attacks on cloud. Different authors have proposed various IDS that can be used in cloud computing in an attempt to provide secure services. This paper surveys different methods and approaches applied in intrusions detection systems (IDS) of cloud environment by various authors. The paper is organized as follows. Section 1 discusses about the different kinds of attacks or intrusions found in cloud. Section 2 discusses and demonstrates different IDS used in cloud that have been proposed by various authors in their research. Section 3 concludes the review with references at the end. Keywords: Cloud computing, IDS, NIDS, HIDS, DIDS
      DOI : 10.7176/NCS/12-05 Publication date: January 31st 2021
      Issue No: Vol. 12
       
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
 


Your IP address: 54.198.139.112
 
Home (Search)
API
About JournalTOCs
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-