Subjects -> COMPUTER SCIENCE (Total: 2313 journals)
    - ANIMATION AND SIMULATION (33 journals)
    - ARTIFICIAL INTELLIGENCE (133 journals)
    - AUTOMATION AND ROBOTICS (116 journals)
    - CLOUD COMPUTING AND NETWORKS (75 journals)
    - COMPUTER ARCHITECTURE (11 journals)
    - COMPUTER ENGINEERING (12 journals)
    - COMPUTER GAMES (23 journals)
    - COMPUTER PROGRAMMING (25 journals)
    - COMPUTER SCIENCE (1305 journals)
    - COMPUTER SECURITY (59 journals)
    - DATA BASE MANAGEMENT (21 journals)
    - DATA MINING (50 journals)
    - E-BUSINESS (21 journals)
    - E-LEARNING (30 journals)
    - ELECTRONIC DATA PROCESSING (23 journals)
    - IMAGE AND VIDEO PROCESSING (42 journals)
    - INFORMATION SYSTEMS (109 journals)
    - INTERNET (111 journals)
    - SOCIAL WEB (61 journals)
    - SOFTWARE (43 journals)
    - THEORY OF COMPUTING (10 journals)

COMPUTER SCIENCE (1305 journals)

The end of the list has been reached or no journals were found for your choice.
Similar Journals
Journal Cover
Wireless Sensor Network
Number of Followers: 3  

  This is an Open Access Journal Open Access journal
ISSN (Print) 1945-3078 - ISSN (Online) 1945-3086
Published by Scientific Research Publishing Homepage  [243 journals]
  • Authentication Database Leakage Detection

    • Authors: ISRAA S. AHMED
      Abstract: Authentication is the first step for any important applications. Password verification is widely employed in the Internet. Some advanced mechanisms including bio features, such as fingerprints or retina. However, digital password authentication credential is commonly used in the public. In other words, traditional password verification is still an important authentication credential mechanism for today's online services. Password database may be compromised. Once if the database is stolen, it is dangerous and critical for any services. Consequently, password  database leakage becomes an important issue. Detection and countermeasure are essential for such a disaster. Our research proposing a scheme based on a authentication database storage mapping method to detect possible leakage of authentication database. By multiple mapping mechanism, if the authentication database is stolen, an attacker could not know any user's correct password. This method can reduce additional space of storing passwords with ability to detect security event for stolen authentication databases. Keywords:Application Security; System Security; Leakage Detection; Authentication database, Password
      DOI : 10.7176/NCS/12-01 Publication date: January 31st 2021
      Issue No: Vol. 12
       
  • Single Sink Repositioning Technique in Wireless Sensor Networks for
           Increasing Throughput and Decreasing Delay

    • Authors: Asrat Sime Bedada
      Abstract: Wireless sensor network (WSN) refers to a group of spatially spread and enthusiastic sensors for monitoring and recording the physical conditions of the environment and organizing the collected data at a central location. WSN becomes an energetic subject with the rapid development that is vulnerable to a varied high-quality of attacks due to deployment in the hostile environment. In WSN, throughput is defined as the amount of data transferred from one sensor node to another in a specified amount of time. Delay It refers to the total time taken for a single packet to be transmitted across a network from source to destination. The basic idea of sink relocation is to shorten the distance between sink node and sensor node. So, that significant power savings can be achieved. The problem of distant node energy consumption of wireless sensor node was solved by sink repositioning technique which has capability to move and communicate with all sensor node inside the region. The sink node and sensor node are randomly deployed within the geographic extent of the entire network. In order to test for the impact of repositioning the total power transmission of the sensors for the previous and next sink positions is evaluated and compared. This is result in increasing life time of sensor network by putting sink node at optimum location to decrease the distant node, increases throughput and decrease delay with sink node and analyze the difference. The main aim of the study was to increase throughput and decrease end to end delay. For this study we have used NS-2.35 environment for simulation. Our simulation results show that repositioning the sink achieves significant change on throughput and delay when compared to the static sink approach that have been presented by using network animator(NAM) and Xgraph. Keywords:- WSN, Sink node, sensor node, throughput, delay and  sink reposition.
      DOI : 10.7176/NCS/12-02 Publication date: January 31st 2021
      Issue No: Vol. 12
       
  • A Proposed Model for Maximizing Broadband Penetration with Submarine Cable
           in Nigeria

    • Authors: Bourdillon Omijeh
      Abstract: This publication is purely research and accumulated intellect based. The bottom up approach adopted in this research was focused on the Bandwidth Implications of Submarine Cable to Broadband Development in Nigeria. The study tried to pinpoint some underlying fundamental issues limiting the development of Fibre Broadband in Nigeria. The various sources of undersea cables and there various capacities were well evaluated as well as the socio economic importance of broadband and its numerous applications. Other sources of broadband were also highlighted, with strategies on how to increase broadband penetration in Nigeria. The economic implication of bandwidth and its relationship with national development, was well introduced using the 2016 human development report by United Nations Development Program.  Analytical presentation of a proposed model for an interconnected long haul national backbone was also presented with the immerse benefits listed out. The study came to a conclusion with strong summarized recommendations followed by references. Keywords: Backbone, Penetration, Undersea Cable, Broadband.
      DOI : 10.7176/NCS/12-03 Publication date: January 31st 2021
      Issue No: Vol. 12
       
  • Adaptive Network Based Fuzzy Inference System and the Future of
           Employability

    • Authors: Saada Abdel Gawad Khadragy, Sherief Abdallah
      Abstract: Educational data is considered by researchers and data scientists as an indicator for the future predictions. The current research study aims for classifying IT alumni students into employed and unemployed. The data collected from two universities in Jordan. 781 of IT alumni students in two universities in Jordan participate in the current study. Three classifiers are compared to determine the most suitable one for predicting the future of IT students’ employability. The results show that Adaptive Network Based Fuzzy Inference System came as a suitable classifier for predicting IT students’ employment in Jordan. As gender, programming skills, and communication skills came as the most effective factors affecting IT recruitment field, a set of recommendations is presented to the ministry of higher education based on the significant factors affecting IT graduates employment. Keywords: employability, ANFIS, classification, data mining
      DOI : 10.7176/NCS/12-04 Publication date: January 31st 2021
      Issue No: Vol. 12
       
  • Intrusion Detection System in Cloud Computing: A Literature Review

    • Authors: Kezang Dema, Naghmeh Moradpoor, Thinley Jamtsho
      Abstract: Cloud computing provide users a convenient, ubiquitous and on-demand network access to a shared pool of computing resources over an Internet. On the other aspect, due to its distributed and complex architectures, it possess many security risks and become one of the attractive targets for the cyber-attacks by the intruders. With the growing popularity of cloud computing, the importance to provide reliable and secure services assurance remains one of the major issues. Intrusion Detection Systems (IDS) have been widely used as one of the mechanism to detect attacks on cloud. Different authors have proposed various IDS that can be used in cloud computing in an attempt to provide secure services. This paper surveys different methods and approaches applied in intrusions detection systems (IDS) of cloud environment by various authors. The paper is organized as follows. Section 1 discusses about the different kinds of attacks or intrusions found in cloud. Section 2 discusses and demonstrates different IDS used in cloud that have been proposed by various authors in their research. Section 3 concludes the review with references at the end. Keywords: Cloud computing, IDS, NIDS, HIDS, DIDS
      DOI : 10.7176/NCS/12-05 Publication date: January 31st 2021
      Issue No: Vol. 12
       
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
 


Your IP address: 35.171.45.182
 
Home (Search)
API
About JournalTOCs
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-
JournalTOCs
 
 
  Subjects -> COMPUTER SCIENCE (Total: 2313 journals)
    - ANIMATION AND SIMULATION (33 journals)
    - ARTIFICIAL INTELLIGENCE (133 journals)
    - AUTOMATION AND ROBOTICS (116 journals)
    - CLOUD COMPUTING AND NETWORKS (75 journals)
    - COMPUTER ARCHITECTURE (11 journals)
    - COMPUTER ENGINEERING (12 journals)
    - COMPUTER GAMES (23 journals)
    - COMPUTER PROGRAMMING (25 journals)
    - COMPUTER SCIENCE (1305 journals)
    - COMPUTER SECURITY (59 journals)
    - DATA BASE MANAGEMENT (21 journals)
    - DATA MINING (50 journals)
    - E-BUSINESS (21 journals)
    - E-LEARNING (30 journals)
    - ELECTRONIC DATA PROCESSING (23 journals)
    - IMAGE AND VIDEO PROCESSING (42 journals)
    - INFORMATION SYSTEMS (109 journals)
    - INTERNET (111 journals)
    - SOCIAL WEB (61 journals)
    - SOFTWARE (43 journals)
    - THEORY OF COMPUTING (10 journals)

COMPUTER SCIENCE (1305 journals)

The end of the list has been reached or no journals were found for your choice.
Similar Journals
Similar Journals
HOME > Browse the 73 Subjects covered by JournalTOCs  
SubjectTotal Journals
 
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
 


Your IP address: 35.171.45.182
 
Home (Search)
API
About JournalTOCs
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-