Vol. 13 No. 12 DEC 2015

Vol. 13 No. 12 DECEMBER 2015 International Journal of Computer Science and Information Security

Download Full Journal: [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive]

.

Copyright © IJCSIS. This is an open access journal distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

1. Paper 30111508: Student Performance Analysis using Large-Scale Machine Learning (pp. 1-6)

Abdelmajid Chaffai, Abdeljalil El Abdouli, Houda Anoun, Larbi Hassouni, Khalid Rifi

RITM LAB ESTC , CED ENSEM, Hassan II University Casablanca, Morocco

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

2. Paper 30111513: Leveraging DEMF to Ensure and Represent 5ws&1h in Digital Forensic Domain (pp. 7-10)

Jasmin Cosic, ICT Section of Police Administration, Ministry of the Interior of Una-Sana canton Bihac, Bosnia and Herzegovina

Miroslav Baca, Faculty of Organization and Informatics, University of Zagreb, Varazdin, Croatia

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

3. Paper 30111525: GCTrie for Efficient Querying in Cheminformatics (pp. 11-16)

Yu Wai Hlaing, University of Computer Studies, Yangon, Myanmar

Kyaw May Oo, Faculty of Computing, University of Information Technology, Yangon, Myanmar

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

4. Paper 30111532: An Efficient Migration Scheduling Algorithm Based on Energy Consumption and Deadline in Cloud Computing (pp. 17-23)

Sogol Davati, Department of Computer Engineering, South Tehran Branch, Islamic Azad University, Tehran, Iran

Ahmad Khademzadeh, Education and National International Scientific Cooperation Department, Iran Telecommunication Research Center (ITRC), Tehran, Iran

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

5. Paper 30111533: EEG Discrimination of Rats under Different Architectural Environments using ANNs (pp. 24-31)

Mohamed.I.El-Gohary, Department of Physics, Al-Azhar University, Cairo, Egypt

Tamer.A.A.Al-Zohairy, Department of Computer science, Al-Azhar University, Cairo, Egypt

Amir. M.M. Eissa, Department of Physics ,Al-Azhar University, Cairo, Egypt

Sally .M. Eldeghaidy, Department of Physics ,Suez canal University, Cairo, Egypt

Hussein.M.H.Abd El-Hafez, Department of Physics , Al-Azhar University, Cairo, Egypt

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

6. Paper 30111534: Forward Error Correction for Storage Media: An Overview (pp. 32-40)

Kilavo Hassan, Nelson Mandela African Institution of Science and Technology, School of Computational and Communication Science and Engineering, P.O. Box 447 Arusha, Tanzania

Kisangiri Michael, Nelson Mandela African Institution of Science and Technology, School of Computational and communication Science and Engineering, P.O. Box 447 Arusha, Tanzania

Salehe I. Mrutu, The University of Dodoma, College of Informatics and Virtual Education, P.O. Box 490 Dodoma

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

7. Paper 30111535: Certificate based hybrid authentication for Bring Your Own Device (BYOD) in Wi-Fi enabled Environment (pp. 41-47)

Upasana Raj, Information Security and Cyber Forensics, Department of Information Technology, SRM University, Chennai, India

Monica Catherine S, Information Security and Cyber Forensics, Department of Information Technology, SRM University, Chennai, India

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

8. Paper 30111536: Impact of Spectrum Sensing and Primary User Activity on MAC Delay in Cognitive Radio Networks (pp. 48-52)

Elham Shahab, Department of Information Technology Engineering, Nooretouba Virtual University of Tehran, Tehran, Iran

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

9. Paper 30111542: A Survey of Receiver Designs for Cooperative Diversity In The Presence of Frequency Offset (pp. 53-58)

Sylvia Ong Ai Ling, Hushairi Zen, Al-Khalid b Hj Othman, Mahmood Adnan

Faculty of Engineering, University Malaysia Sarawak, Kota Samarahan, Kuching, Sarawak, Malaysia

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

10. Paper 30111544: Measuring and predicting the impacts of business rules using fuzzy logic (pp. 59-64)

Mohamed Osman Hegazi,

Department of Computer Science, College of Computer Engineering and Science, Prince Sattam University, Saudi Arabia

Department of Computer Science, College of Computer Science and IT , Alzaiem Alazhari University Sudan

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

11. Paper 30111549: Blind User Visualization and Interaction in Touch Screen: A Designer Perspective (pp. 65-72)

Abdelrahman H. Hussein, College of Computer and Engineering Science, University of Hail, Hail, Saudi Arabia

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

12. Paper 30111554: An Implementation of Android-based Steganography Application (pp. 73-76)

Sultan Zavrak, Dept. of Computer Engineering, Duzce University, Duzce, Turkey

Seyhmus Yilmaz, Dept. of Computer Engineering, Duzce University, Duzce, Turkey

Huseyin Bodur, Dept. of Computer Engineering, Duzce University, Duzce, Turkey

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

13. Paper 30111558: Survey of the Adaptive QoS-aware discovery approaches for SOA (pp. 77-81)

Monika Sikri, Cisco Systems India Pvt. Ltd. SEZ, Embassy Tech Village, Panathur Devarabeesanahalli, Bangalore East Taluk Bangalore India

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

14. Paper 30111563: M-Learning for Blind Students Using Touch Screen Mobile Apps Case Study - Special Education in Hail (pp. 82-88)

Abdelrahman H. Hussein (1), Majed M. AlHaisoni (1), Ashraf A. Bany Mohammed (2), Mohammed Fakrudeen (3)

(1) College of Computer Sciences and Engineering, University of Hail, Hail, Kingdom of Saudi Arabia

(2) School of Business, The University of Jordan, Amman, Jordan

(3) Dept. of Computing and Technology, Anglia Ruskin University, Chelmsford, United Kingdom

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

15. Paper 30111506: A Fitness-Gossip Routing Protocol for Saving Energy in Wireless Sensor Networks (pp. 89-95)

Kareem Radi Hassan, Department Of Computer Science, University of Basrah, Basrah, Iraq

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

16. Paper 30111528: Computing the Dynamic Reconfiguration Time in Component Based Real-Time Software (pp. 96-104)

Asghar Farhadi, Computer depart, Islamic azad university Arak branch, Arak, Iran

Mehran sharafi, Computer depart, Islamic azad university Najaf abad Branch, Najafabad ,Iran

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

17. Paper 30111556: Intrusion Detection Systems: A Novel Multi-Agent Specification Method (pp. 105-110)

Eddahmani Said & Rahal ROMADI, University Mohammed V Rabat, Faculté des Sciences de Rabat, Morocco

Bouchaib BOUNABAT, University Mohammed V Rabat, ENSIAS, BP 713, Agdal Rabat, Morocco

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

18. Paper 30111517: A Brief Overview of Cooperative MAC Protocols in Wireless Networks (pp. 111-116)

Ferzia Firdousi, Department of Electrical Engineering, National University of Sciences and Technology, Rawalpindi, Pakistan

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

19. Paper 30111555: Architectural Framework for Inter-Agency Intelligence Information Sharing Knowledge Based System in Botswana (pp. 117-131)

Ezekiel U Okike, Computer Science Department, University of Botswana, Gaborone, 00000, Botswana

T. Leburu-Dingalo, Computer Science Department, University of Botswana, Gaborone, 00000, Botswana

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

20. Paper 30111518: A Comprehensive Review of Different types of Cooperative MAC Layer Protocols (pp. 132-141)

Ferzia Firdousi, Department of Electrical Engineering, National University of Sciences and Technology, Pakistan

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

21. Paper 30111562: Using Cohesion and Capability Maturity Model Integration (CMMI) as Software Product and Process Quality criteria: a case study in Software Engineering practice in Botswana (pp. 142-149)

Ezekiel U Okike & Motsomi Rapoo, Computer Science Department, University of Botswana, Gaborone, 00000, Botswana

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

22. Paper 30111553: Trust: Models and Architecture in Cloud Computing (pp. 150-153)

Usvir Kaur, I. K. Gujral Punjab Technical University, Jalandhar

Dheerendra Singh, Dept. of Computer Science & Engineering, Shaheed Udham Singh College of Engineering and Technology, Tangori, Mohali, Punjab, India

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

23. Paper 30111557: Towards a mobile payment market: A Comparative Analysis of Host Card Emulation and Secure Element (pp. 156-164)

Pardis Pourghomi, Department of Computer Science, American University of the Middle East, Kuwait

Pierre E. Abi-Char, Department of Computer Science, American University of the Middle East, Kuwait

Gheorghita Ghinea, Department of Computer Science, Brunel University, Kingston Lane, Uxbridge, Middlesex, UB8 3PH, United Kingdom

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

24. Paper 30111564: Performance Analysis of Sybil Decline: Attack Detection and Removal Mechanism in Social Network (pp. 165-171)

Deepti S. Sharma, Department of CSE, LKCT, Indore, M.P, India

Dr. Sanjay Thakur, Department of CSE, LKCT, Indore, M.P, India

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

25. Paper 30111561: Cost and Performance Based Comparative Study of Top Cloud Service Providers (pp. 172-177)

Irfan Bari (1), Salaser Babu (2), Muhammad Munwar Iqbal (3), Yasir Saleem (4), Zahid Ali Masood

(1), (2), (3) Department of Computer Science, University of Engineering and Technology, Taxila

(3), (4) Department of Computer Science & Engineering, University of Engineering and Technology, Lahore

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------