Publisher: CCSE   (Total: 43 journals)   [Sort by number of followers]

Showing 1 - 43 of 43 Journals sorted alphabetically
Applied Physics Research     Open Access   (Followers: 7)
Asian Culture and History     Open Access   (Followers: 10)
Asian Social Science     Open Access   (Followers: 4)
Cancer and Clinical Oncology     Open Access   (Followers: 9)
Computer and Information Science     Open Access   (Followers: 16)
Earth Science Research     Open Access   (Followers: 10)
Energy and Environment Research     Open Access   (Followers: 13)
Engineering Management Research     Open Access   (Followers: 6)
English Language and Literature Studies     Open Access   (Followers: 17)
English Language Teaching     Open Access   (Followers: 33)
Environment and Natural Resources Research     Open Access   (Followers: 6)
Environment and Pollution     Open Access   (Followers: 10)
Global J. of Health Science     Open Access   (Followers: 5, SJR: 0.416, CiteScore: 1)
Higher Education Studies     Open Access   (Followers: 64)
Intl. Business Research     Open Access   (Followers: 6)
Intl. Education Studies     Open Access   (Followers: 8)
Intl. J. of Biology     Open Access   (Followers: 1)
Intl. J. of Business and Management     Open Access   (Followers: 15)
Intl. J. of Chemistry     Open Access   (Followers: 10)
Intl. J. of Economics and Finance     Open Access   (Followers: 13)
Intl. J. of English Linguistics     Open Access   (Followers: 9)
Intl. J. of Marketing Studies     Open Access   (Followers: 11)
Intl. J. of Psychological Studies     Open Access   (Followers: 4)
Intl. J. of Statistics and Probability     Open Access   (Followers: 3)
Intl. Law Research     Open Access  
J. of Agricultural Science     Open Access   (Followers: 4)
J. of Education and Learning     Open Access   (Followers: 2)
J. of Educational and Developmental Psychology     Open Access   (Followers: 15)
J. of Food Research     Open Access   (Followers: 3)
J. of Geography and Geology     Open Access   (Followers: 12)
J. of Management and Sustainability     Open Access   (Followers: 7)
J. of Materials Science Research     Open Access   (Followers: 8)
J. of Mathematics Research     Open Access  
J. of Molecular Biology Research     Open Access   (Followers: 4)
J. of Plant Studies     Open Access   (Followers: 1)
J. of Politics and Law     Open Access   (Followers: 9)
J. of Sustainable Development     Open Access   (Followers: 25)
Mechanical Engineering Research     Open Access   (Followers: 20)
Modern Applied Science     Open Access   (Followers: 1)
Network and Communication Technologies     Open Access   (Followers: 4)
Public Administration Research     Open Access   (Followers: 2)
Review of European Studies     Open Access   (Followers: 13)
Sustainable Agriculture Research     Open Access   (Followers: 3)
Similar Journals
Journal Cover
Network and Communication Technologies
Number of Followers: 4  

  This is an Open Access Journal Open Access journal
ISSN (Print) 1927-064X - ISSN (Online) 1927-0658
Published by CCSE Homepage  [43 journals]
  • Reviewer Acknowledgements for Network and Communication Technologies Vol.
           7, No. 1

    • Abstract: Reviewer Acknowledgements for Network and Communication Technologies Vol. 7, No. 1, 2022.
      PubDate: Sun, 31 Jul 2022 12:17:10 +000
       
  • An overview of Intrusion Detection within an Information System: The
           Improvment by Process Mining

    • Authors: Nkondock Mi Bahanag Nicolas
      Abstract: Information Systems handle big amount of data within enterprises by offering the possibility to collect, treat, keep and make information avail- able. To realize these tasks, it is important to secure data from intrusions that can affect confidentiality, availability and integrity of information. Un- fortunately, with the time, technologies are more used and various types of attacks act on it to create intrusion or misuses within Information Systems. Research in intrusion detection field is still looking for solutions of such relevant problems. The purpose of this paper is to present an overview of existing intrusion detection techniques compared to a new issue based on process mining used for event logs analysis to detect abnormal events that occurs on the system. events are classified accordingly to security policy etablished with fuzzy logic to build a set of fuzzy rules, for the definition of normal and abnormal events and then reduce the high level of false alerts.
      PubDate: Sun, 31 Jul 2022 12:02:42 +000
       
  • The Role of Network Technologies in the Enhancement of the Health,
           Education, and Energy Sectors

    • Abstract: The role of Network Technologies and Information Communication Technology (ICT) in the sustainable agenda is very germane, and as such, there has been a tremendous rise in the application of ICT towards realizing good health and well-being, quality education, attaining affordable and clean energy as indicated in the third, fourth and seventh development goals. Albeit information technology (IT) has enjoyed significant positive impacts across the globe, its adoption and utilization especially during the pandemic in various aspects of human needs has no doubt created positive influence. In examining the extent of Network Technology applications in the aforementioned sustainable development goals, this work highlights current state of the use of IT in the enhancement of the health sector, energy industry and the education system. The sustainability of its adoption both in the present and in the foreseeable future is also presented. The overview shows that during the COVID-19 pandemic the influence of ICT on the actualization of SDGs 3, 4 and 7 was at its peak.
      PubDate: Sat, 23 Jul 2022 02:20:51 +000
       
  • Hiding Secrets in Electrocardiogram Based on Integer Wavelet Transform
           with Coefficient Adjustment and LSB Substitution

    • Authors: Ching-Yu Yang
      Abstract: In this paper, we present an efficient data hiding for electrocardiogram (ECG) hosts to solve the issues of existing ECG steganographic methods, which have less hiding capacity and insufficient signal-to-noise ratio (SNR)/ peak SNR (PSNR). Based on the integer wavelet transform (IWT), private (or sensitive) data such as patients’ diagnosis and personal information can be embedded in an ECG host via the IWT coefficient adjustment and the least significant bit (LSB) technique. Simulations indicated that the SNR (or PSNR), and payload of the proposed method outperform those of existing techniques. In addition, the proposed method is capable of resisting attacks, such as cropping, Gaussian noise-addition inversion, scaling, translation, and truncation attacks from third parties (or adversaries). Since the proposed method has low computational complexity, our method can be employed in portable biometric devices or wearable electronics.
      PubDate: Tue, 19 Jul 2022 11:18:23 +000
       
  • Power Management of Base Transceiver Stations for Mobile Networks

    • Authors: Giuseppe Iazeolla
      Abstract: A Base Transceiver Station (BTS) is a piece of equipment consisting of telecommunication devices and the air interface of the mobile network. It is referred to as the BS in 3G networks, the eNB in the LTE standard, and the GNodeB for the 5G. Any wireless service provider operates a country-wide System of BTS. The System is the part of the wireless network responsible for the reception and transmission of radio signals from user equipments (UE), like mobile phones and computers with wireless internet wireless connectivity. All BTSs need to be electrically powered and system management may investigate methods to reduce power consumption. However, saving power may turn into a waste of performance (increased response time), in other words, into a waste of the BTS quality of service (QoS) This paper aim is to discuss the power management of BTS stations for the best compromise between energy-saving and response to incoming calls. The BTS management strategies that optimize the BTS power consumption (minimum absorbed Watt), the BTS performance (minimum response_time to incoming calls), and the BTS performance x Watt (minimum response_time x Watt) are identified. To compensate for the difficulties of using analytical approaches the paper uses simulation to evaluate the strategies.
      PubDate: Wed, 08 Jun 2022 21:10:36 +000
       
  • An Assessment of Employee Knowledge, Awareness, Attitude towards
           Organizational Cybersecurity in Cameroon

    • Authors: Austin Oguejiofor Amaechi
      Abstract: In our increasingly digitized and interconnected society, people are poorly protected against cyberthreats, with the main reason being user behavior. Human behavior and actions are unpredictable in nature and this make human an important element and enabler of cybersecurity. The objective of the study is promotion of adoption of non-technical countermeasures (such as user awareness) for a comprehensive and holistic way to manage cyber security in organizations in Cameroon. We conducted a subjective study to measure the level of employees’ knowledge and general awareness, risky behavior they engage in, and attitude toward various aspects of cybersecurity and cyberthreats to show the need for user education, training, and awareness. For the study described in this paper, a self-report questionnaire was developed and data were collected from 214 participants. The results of a descriptive statistic percentage indicated that less than 50% of respondents have completed or has regular training program. We find that over 61% of the participants do not have sufficient knowledge of their organization cyber security policies. Among other findings, the over 60% of employees’ mistakes or violations of security policy are not disciplined or penalized is a demonstration of lack of legal status of cyber-attacks. Cyber resilience in any organization is a responsibility shared by both management and employees. Proactive human management element that can actively hunt for malicious activity and indicators of compromise is recommended.
      PubDate: Mon, 21 Feb 2022 01:41:10 +000
       
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
 


Your IP address: 35.172.230.154
 
Home (Search)
API
About JournalTOCs
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-