Publisher: CCSE   (Total: 43 journals)   [Sort by number of followers]

Showing 1 - 43 of 43 Journals sorted alphabetically
Applied Physics Research     Open Access   (Followers: 5)
Asian Culture and History     Open Access   (Followers: 9)
Asian Social Science     Open Access   (Followers: 4)
Cancer and Clinical Oncology     Open Access   (Followers: 9)
Computer and Information Science     Open Access   (Followers: 15)
Earth Science Research     Open Access   (Followers: 9)
Energy and Environment Research     Open Access   (Followers: 13)
Engineering Management Research     Open Access   (Followers: 6)
English Language and Literature Studies     Open Access   (Followers: 16)
English Language Teaching     Open Access   (Followers: 29)
Environment and Natural Resources Research     Open Access   (Followers: 5)
Environment and Pollution     Open Access   (Followers: 10)
Global J. of Health Science     Open Access   (Followers: 5, SJR: 0.416, CiteScore: 1)
Higher Education Studies     Open Access   (Followers: 58)
Intl. Business Research     Open Access   (Followers: 6)
Intl. Education Studies     Open Access   (Followers: 7)
Intl. J. of Biology     Open Access   (Followers: 1)
Intl. J. of Business and Management     Open Access   (Followers: 13)
Intl. J. of Chemistry     Open Access   (Followers: 10)
Intl. J. of Economics and Finance     Open Access   (Followers: 12)
Intl. J. of English Linguistics     Open Access   (Followers: 8)
Intl. J. of Marketing Studies     Open Access   (Followers: 12)
Intl. J. of Psychological Studies     Open Access   (Followers: 4)
Intl. J. of Statistics and Probability     Open Access   (Followers: 3)
Intl. Law Research     Open Access  
J. of Agricultural Science     Open Access   (Followers: 4)
J. of Education and Learning     Open Access   (Followers: 2)
J. of Educational and Developmental Psychology     Open Access   (Followers: 15)
J. of Food Research     Open Access   (Followers: 3)
J. of Geography and Geology     Open Access   (Followers: 12)
J. of Management and Sustainability     Open Access   (Followers: 7)
J. of Materials Science Research     Open Access   (Followers: 7)
J. of Mathematics Research     Open Access  
J. of Molecular Biology Research     Open Access   (Followers: 3)
J. of Plant Studies     Open Access   (Followers: 1)
J. of Politics and Law     Open Access   (Followers: 9)
J. of Sustainable Development     Open Access   (Followers: 24)
Mechanical Engineering Research     Open Access   (Followers: 17)
Modern Applied Science     Open Access   (Followers: 1)
Network and Communication Technologies     Open Access   (Followers: 4)
Public Administration Research     Open Access   (Followers: 1)
Review of European Studies     Open Access   (Followers: 12)
Sustainable Agriculture Research     Open Access   (Followers: 3)
Similar Journals
Journal Cover
Computer and Information Science
Number of Followers: 15  

  This is an Open Access Journal Open Access journal
ISSN (Print) 1913-8989 - ISSN (Online) 1913-8997
Published by CCSE Homepage  [43 journals]
  • A Brief Presentation of the Knowledge Paths for Semiotics (KPS) Project:
           Creating Digital Research Tools

    • Abstract: This paper provides an outline for a proposed project entitled ‘Knowledge Paths for Semiotics (KPS): Creating Digital Research Tools.’ The object of the paper is to show how a printed dictionary can be transformed into modular digital research tools. Although it is an ad hoc proposal on an analytical dictionary of semiotics it can be used as a model for creating related works. In general, it can be said that the proposed tools assist in the retrieval of information (linguistic and semantic), the acquisition of knowledge, and the extraction of new knowledge. In this context, three categories of tools are proposed: (i) terminology tools, (ii) learning tools, and (iii) tools for the discovery of new knowledge. In the conclusion of this paper, special emphasis is placed on the impact that will result from the implementation of this KPS project.
      PubDate: Fri, 29 Apr 2022 01:32:52 +000
  • Out of the Box Artificial Intelligence (OBAI): The Beginning of a New Era
           in Artificial Intelligence

    • Abstract: The main purpose of writing this article is to unify all the OUT OF THE BOX ideas (under Artificial Intelligence) invented by the corresponding author of this work during the period (2013-2022) under a single umbrella titled “Out of the BOX Artificial Intelligence Field (OBAI Field)”. All the OUT OF THE BOX ideas which are proposed under Artificial Intelligence will come under new field titled OBAI Field which is defined in this work. A new Artificial Intelligence field titled “Artificial Cartoon Algorithms (ACA)” is invented in this work. ACA is a sub-field of OBAI field as it is an OUT OF THE BOX idea. Four new algorithms titled “Artificial Cartoon Popeye Algorithm”, “Artificial Cartoon Chhota Bheem Algorithm”, “Artificial Cartoon Jerry Algorithm” and “Artificial Cartoon Happy Kid Algorithm” are designed in this work.
      PubDate: Fri, 29 Apr 2022 01:32:52 +000
  • Transcendental Logic-Based Formalism for Semantic Representation of
           Software Project Requirements Architecture

    • Abstract: This article is devoted to the analysis of the situation that has arisen in the practice of using artificial intelligence methods for software development. Nowadays there are many disparate approaches, models, and practices based on the use of narrow intelligence for decision-making at different stages of the life cycle of software products, and an almost complete lack of solutions brought to wide practical use. The article provides a comprehensive overview of the main reasons for the lack of the expected effect from the implementation of Agile and suggests a way to solve this problem based on the use of a self-organizing knowledge model. Based on the heuristic usage of transcendental logic in the terms of "ontological predicates", such a model makes it possible to create a formalism of the semantic representation of the requirements architecture of a software project, which could provide semantic interoperability and an executable semantic framework for automated ontology generation from unstructured informal software requirements text. The main benefit of this model is that it is flexible and ensures the accumulation of knowledge without the need to change the initial infrastructure as well as that the ontology inference engine is the part of the mechanism of collective interaction of active elements of knowledge and not some externally programmed system of rules that imitate the process of thinking.
      PubDate: Fri, 29 Apr 2022 01:32:50 +000
  • A Geometry Consisting of Singularities Containing Only Integers

    • Abstract: It is difficult for us to discriminate the sizes of space and time as finite and infinite. In this article, an axiom is defined in which one infinitely small and infinitely great must exist if the sizes of space and time can be compared and it is undividedly 0 (zero) point (singularity) for this infinitely small. This axiom has some new characters distinct from current calculus, such as extension only can be executed in the way of unit superposition in the system, the decimal point is meaningless and there are only integers to exist in the system, and any given interval is finite quantities and cannot be ‘included’ or ‘equal divided’ infinitely and randomly. The geometry space we see is the non-continuum being made of countless 0 points.   
      PubDate: Fri, 29 Apr 2022 01:32:49 +000
  • A Survey of Biometric Authentication Technologies Towards Secure And
           Robust Systems: A Case Study of Mount Kenya University

    • Abstract: In response to the increased demand for more effective authentication methods, the usage of biometric authentication to secure systems against unwanted access has grown. Because of the recent COVID-19 pandemic outbreak, any direct physical contact with the system should be avoided. Furthermore, current authentication systems lack the necessary security features, making them vulnerable to cyber risks such as forgery by unethical employees and unauthorized users. The goal of this paper is to investigate the existing biometric authentication systems and propose the best security models to overcome the weaknesses of existing technologies. The study employed mixed methodology, which was qualitative and quantitative in nature and relied on primary and secondary sources of data. The researcher collected the data from a population of 300 staff of Mount Kenya University with a sample size of 169 respondents. The R2 value on the relationship between the studied dependent and independent variables was R2 = 0.792 showing a good fit of the model since is greater than 50% of the test item used in the case study. Therefore the study recommends that institutions to implement a contactless biometric system to eliminate physical contact and use multimodal system that will help overcome the existing challenges associated with unimodal systems. There are still gaps for future researchers where they need to focus on the various decision algorithms that are best efficient in verifying users before they are authenticated in the system.
      PubDate: Fri, 29 Apr 2022 01:32:47 +000
  • Efficient and Traceable Anonymous Credentials on Smart Cards

    • Abstract: Anonymous credential (AC) systems allow users, obtaining a credential on a set of attributes, to anonymously prove ownership of the credential and then to selectively disclose a subset of attributes without leaking any other attributes. Recently, a new type of AC, called keyed-verification anonymous credential (KVAC), has been proposed, which indicates that the credential issuer is also the verifier. Conceptually, the KVAC system is suitable for being used as employee cards, library access cards or eIDs (electronic ID cards). However, since the limited process power of smart cards, most of the existing KVAC systems are hard to be implemented on them. In addition, none of the existing KVAC systems provide traceability to obtain the user’s identity if anyone tries to misbehave with KVAC. In this paper, we present the first efficient and traceable KVAC system designated for smart cards. Our scheme provides the following security properties: unforgeability, anonymity, traceability and unlinkability. To demonstrate the efficiency and feasibility, we present an implementation of our scheme on standard Multos smart cards. The implementation results show that our scheme is efficient enough for practical use.
      PubDate: Fri, 29 Apr 2022 01:32:45 +000
  • Multi-Issuer Attribute-based Anonymous Credential with Traceability and

    • Abstract: Attribute-based anonymous credential schemes allow users to obtain credentials from the issuer and prove the possession of their attributes interactively and anonymously with service providers. So far, most existing schemes only consider single-issuer, where some of them are extended to be traceable or revocable. In the reality, anonymous credential schemes under multi-issuer are more practical, since users could query for credentials from different issuers and use some of them simultaneously, which is more efficient than showing them individually. Although there are also multi-issuer schemes where users obtain credentials from different issuers and show an aggregated credential to service providers, however, these schemes lack practical properties, for example, revocation of invalid users. In this paper, we propose a multi-issuer attribute-based anonymous credential with traceability and revocation, which provides traceability of invalid users, and revocation of the specific users. Users receive credentials from multiple issuers and show an aggregated credential of selective disclosures of attributes. We provide the security model of our scheme of anonymity and unforgeability. Finally, we discuss the computational complexity, which shows the practicality and efficiency of our scheme.
      PubDate: Fri, 29 Apr 2022 01:32:43 +000
  • Anomaly Detection Methodology of In-vehicle Network Based on Graph Pattern

    • Abstract: Vehicles are becoming more and more connected today, with many direct interfaces and infotainment units widely deployed in in-vehicle networks. However, the increase in interfaces and units can also lead to an increase in cyberattacks surfaces. As the de facto standard for the in-vehicle network protocol, the Controller Area Network (CAN) protocol provides an efficient, stable, and cost-effective communication channel between electric control units (ECUs). Nonetheless, it is increasingly threatened by cyberattack due to the lack of security mechanisms by design. This paper proposes a novel anomaly detection methodology based on graph pattern matching, which expresses CAN traffic in terms of graph structures. Given a base graph and window graph, we determine whether the window graph represents normal or anomaly by using the distance measure on the base graph. We have validated this anomaly detection methodology on public datasets and in an actual vehicle environment. Experimental results show that this methodology significantly improved the detection of unknown attacks and outperforms other CAN traffic-based approaches.
      PubDate: Fri, 29 Apr 2022 01:32:41 +000
  • Reviewer Acknowledgements for Computer and Information Science, Vol. 15,
           No. 2

    • Abstract: Reviewer Acknowledgements for Computer and Information Science, Vol. 15, No. 2, 2022
      PubDate: Fri, 29 Apr 2022 01:32:38 +000
  • Darwinism & Other Crumbling Theories in Science

    • Abstract: In this editorial, I decided to publish a review of mine regarding the scientific book Entropy and Information Optics - Connecting Information and Time, Yu F.T.S. The review is given in the following text. The scope of the book at hand is the mutual presentation of Information and Entropy through the prism of Optics; in other words, the transaction of Info­rmation and Information Processing Systems by the inherent characterizing identity of Entropy and by specific means of information processing, i.e. Optics. It is of course a resampling or re-exposition of scientific knowledge regarding the field of information and entropy, as well as optics. The aforementioned knowledge has already been exposed and written in essays, in excess.
      PubDate: Fri, 29 Apr 2022 01:22:49 +000
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Tel: +00 44 (0)131 4513762

Your IP address:
Home (Search)
About JournalTOCs
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-