Vol. 13 No. 8 AUG 2015

Vol. 13 No. 8 AUGUST 2015 International Journal of Computer Science and Information Security

Download Full Journal: [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive]

.

Copyright © IJCSIS. This is an open access journal distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

1. Paper 31071522: Towards Creating a Digital Privacy Framework (pp. 1-4)

Jasmin Cosic, ICT Section of Police Administration, Ministry of the Interior of Una-sana canton, Bihac, Bosnia and Herzegovina

Zoran Cosic, Statheros, d.o.o., Kaštel Stari, Split, Croatia

Miroslav Baca, Faculty of Organization and Informatics, University of Zagreb, Varazdin, Croatia

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

2. Paper 31071529: On the Data Mining Process for Classification of Fetal Death Causes (pp. 5-8)

Luis Huerta, José Huesca, Nubia Cabrera, Juan Ruiz, Luis Hernandez

Informatics Department, University of Istmo, Ixtepec, México

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

3. Paper 31071530: Modelling and Design E-Commerce SMI Sector Using Zachman Framework (pp. 9-14)

Yana Hendriana, Informatics Department, Universitas Ahmad Dahlan, Yogyakarta, Indonesia

Rusydi Umar, Informatics Department, Universitas Ahmad Dahlan, Yogyakarta, Indonesia

Andri Pranolo, Informatics Department, Universitas Ahmad Dahlan, Yogyakarta, Indonesia

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

4. Paper 31071537: Microwave Imaging System’s New developments for Security Applications (pp. 15-26)

Sultan Almazroui, School of Engineering and Informatics University of Sussex Brighton, UK

Weiji Wang, School of Engineering and Informatics University of Sussex Brighton, UK

Guangfu Zhang, School of Electronic Science and Engineering, National University of Defense Technology, Changsha, Hunan, China

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

5. Paper 31071539: Overcoming Barriers to Client-Side Digital Certificate Adoption (pp. 27-34)

Karim Sultan, Faculty of Graduate & Postdoctoral Studies, University of Ottawa, Ottawa, ON, Canada

Umar Ruhi, Telfer School of Management, University of Ottawa, Ottawa, ON, Canada

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

6. Paper 31071548: Using Parallel Computing to Implement Security Attack (pp. 35-38)

Sedeeq Hassn Albana Ali Al-Khazraji, Computing and Information Sciences, Rochester Institute of Technology, New York, USA

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

7. Paper 31071508: Access Model with the checking of scenarios “AMWCS” (pp. 39-45)

Samir TAHIRI, Hassan II University, ESTC,RITM Lab, Casablanca Morocco

Nadia AFIFI, Hassan II University, ESTC,RITM Lab, Casablanca Morocco

Hicham BELHADAOUI, Hassan II University, ESTC,RITM Lab, Casablanca Morocco

Reda FILALI HILALI, Hassan II University, ESTC,RITM Lab, Casablanca Morocco

Mohammed Ouzzif, Hassan II University, ESTC,RITM Lab, Casablanca Morocco

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

8. Paper 31071524: Facial Expression Recognition Using Gabor Wavelet & Neural Networks (pp. 46-52)

Amira Elsir Tayfour, King Khalid University, Abha, Saudi Arabia

Dr. Altahir Mohammed, Sudan University of Science & Technology, Khartoum, Sudan

Dr. Moawia Yahia, King Faisal University, Saudi Arabia

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

9. Paper 31071502: Reduce Collision in Assigned Tree Slotted Aloha Anti-collision Protocol in the RFID Anti-collision Systems (pp. 53-56)

Akram Shangi ghahi, Mohammad Ali Pourmina

Electrical and Computer Engineering Department, Science and Research Branch, Islamic Azad University, Tehran, Iran

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

10. Paper 31071505: Enhanced Secure Hash based Client Puzzle approach to defend against Cyber Attacks (pp. 57-68)

M. Uma, Ph.D Research Scholar, Department of Computer Science, Avinashilingam Institute for Home Science and Higher Education for Women, Coimbatore -641043

Dr. G. Padmavathi, Professor and Head, Department of Computer Science, Avinashilingam Institute for Home Science and Higher Education for Women, Coimbatore -641043

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

11. Paper 31071514: fMRI Slice Registration using Hilbert-Huang Transform (pp. 69-79)

(1) P. Magesh Kumar, (2) S. Purushothaman and (3) P. Rajeswari

(1) Department of MCA, VELS University, Chennai

(2) Department of Electrical and Computer Science Engineering

(2,3) Institute of Technology, Haramaya University, DireDawa, Ethiopia

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

12. Paper 31071523: Data Security Protocol for Wireless Sensor Network using Chaotic Map (pp. 80-89)

Haider M. Al-Mashhadi, Hala B. Abdul-Wahab, Rehab F. Hassan

Computer Science Dept., University of Technology, Baghdad, Iraq

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

13. Paper 31071525: Reducing the Effects of Interference in Multi-user Multi-antenna Systems using Pre-coder in the Wireless System (pp. 90-94)

Ghodsie Ghalamkarian, Mohammad Ali Pourmina

Electrical and Computer Engineering Department, Science and Research Branch, Islamic Azad University, Tehran, Iran

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

14. Paper 31071527: An Improved Multiple-level Association Rule Mining Algorithm with Boolean Transposed Database (pp. 95-104)

Ruchika Yadav, Department of Computer Science and Application, Kurukshetra University, Kurukshetra, Haryana, India

Dr. Kanwal Garg, Department of Computer Science and Application, Kurukshetra University, Kurukshetra, Haryana, India

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

15. Paper 31071528: A Review on Development of GIS and m-Health Based Patient Registration System to Enhance Support for Epidemiological Analysis: A Case Study of Tanzania Hospitals (pp. 105-113)

Judith Leo, Kisangiri Michael, Khamisi Kalegele

School of Computational and Communication Science and Engineering, Nelson Mandela African Institution of Science and technology, P. O. Box 447, Arusha, Tanzania

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

16. Paper 31071536: Radio Frequency Identification based Drug Management and Monitoring System, Case of Public Hospitals in Tanzania (pp. 114-119)

Prisila Ishabakaki, Shubi Kaijage

Department of Communication Science and Engineering, Nelson Mandela AIST, Arusha, Tanzani

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

17. Paper 31071535: Cloud-Aware Web Service Security: Information Hiding in Cloud Computing (pp. 120-124)

Okal Christopher Otieno, Department of Information Technology, Mount Kenya University, Nairobi, Kenya

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

18. Paper 31071538: Managing & Analyzing Large Volumes of Dynamic & Diverse Data (pp. 125-130)

Okal Christopher Otieno, Department of Information Technology, Mount Kenya University, Nairobi, Kenya

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------