Vol. 13 No. 9 SEP 2015
Vol. 13 No. 9 SEPTEMBER 2015 International Journal of Computer Science and Information Security
Download Full Journal: [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive]
.
Copyright © IJCSIS. This is an open access journal distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
1. Paper 31081501: An Efficient Big Data Analytics Platform for Mobile Devices (pp. 1-5)
Ngu Wah Win, University of Computer Studies, Yangon, UCSY
Thandar Thein, University of Computer Studies, Yangon, UCSY
Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
2. Paper 31081519: Face Recognition based on Spatial and Transform domain techniques (pp. 6-14)
Jagadeesh H S, Dept. of Electronics and Communication Engineering, APSCE, Bangalore, India
Suresh Babu K, Dept. of Electronics and Communication Engineering, UVCE, Bangalore, India
K B Raja, Dept. of Electronics and Communication Engineering, UVCE, Bangalore, India
Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
3. Paper 31081526: Exchange Rates Forecasting Using Variable Length Moving Average - NARX (pp. 15-18)
Agus Sihabuddin, Subanar, Dedi Rosadi, Edi Winarko
Computer Science Graduate Program, Faculty of Mathematics and Natural Science, Gadjah Mada University, Yogyakarta – Indonesia
Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
4. Paper 31081527: Implementing the Database Users Privilege Model: Effects of possible successful SQL Injection attack in web applications (pp. 19-21)
Gem Ralph Caracol, Soomi Yang
Information Security Department, Suwon University, Hwaseong City, South Korea
Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
5. Paper 31081528: Security Issues and Solutions for Android-based Mobile Devices (pp. 22-27)
Klever R. P. Cavalcanti, Edejair Viana
Department of Statistics and Informatics, Federal Rural University of Pernambuco, Pernambuco, Brazil
Fernando A. A. Lins, Department of Statistics and Informatics, Federal Rural University of Pernambuco, Pernambuco, Brazil
Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
6. Paper 31081534: Intrusion Detection and Prevention Systems (IDPS) State of Art (pp. 28-35)
Homam Reda El-Taj, Community College Univesity of Tabuk, Tabuk, Saudi Arabia
Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
7. Paper 31081520: Improving the Quality of Composite Services Through Improvement of Cloud Infrastructure Management (pp. 36-44)
Olga Shpur, Department of Telecommunication, Lviv Polytechnic National University, Lviv, Ukraine
Mykhailo Klymash, Department of Telecommunication, Lviv Polytechnic National University, Lviv, Ukraine
Marian Seliuchenko, Department of Telecommunication, Lviv Polytechnic National University, Lviv, Ukraine
Bogdan Strykhaliuk, Department of Telecommunication, Lviv Polytechnic National University, Lviv, Ukraine
Orest Lavriv, Department of Telecommunication, Lviv Polytechnic National University, Lviv, Ukraine
Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
8. Paper 31081502: Service-Oriented Architecture for Secure Service Discovery and Selection in Specialized Mobile Networks (pp. 45-71)
M. Adel Serhani, College of Information Technology, UAE University, Al-Ain, UAE
Yasser Gadallah, The American University in Cairo, Egypt
Ezedin Barka, College of Information Technology, UAE University, Al-Ain, UAE
Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
9. Paper 31081511: Vehicle Segmentation Using K-Means with Fuzzy Logic (pp. 72-77)
(1) Shakila basher, (2) Purushothaman S., and (3) Rajeswari P.
(1) Department of MCA, VELS University, Chennai, India.
(3) Department of Electrical and Computer Science Engineering
(2,3) Institute of Technology, Haramaya University, DireDawa, Ethiopia
Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
10. Paper 31081513: Effective feature selection in multi-label classification problems using genetic algorithms (pp. 78-82)
Somayeh Fattahi Ferdowsi, Department of computer, Zanjan Branch, Islamic Azad University, Zanjan, Iran
Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
11. Paper 31081515: Vehicle Tracking Using Locally Weighted Projection Regression Method (pp. 83-89)
(1) Shakila basher, (2) Purushothaman S., and (3) Rajeswari P.
(1) Department of MCA, VELS University, Chennai, India.
(3) Department of Electrical and Computer Science Engineering
(2,3) Institute of Technology, Haramaya University, DireDawa, Ethiopia
Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
12. Paper 31081518: Multilevel Extensible and Dynamic of Mobile Establishment Concepts (pp. 90-91)
Ammar Es-Said, University Hassan II/ Faculty of Science Ben M'sik, Casablanca Morocco
Labriji El Houssine, University Hassan II/ Faculty of Science Ben M'sik, Casablanca Morocco
Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
13. Paper 31081530: Forensic Investigation of User’s Web Activity on Google Chrome using Open-source Forensic Tools (pp. 92-100)
Narmeen Shafqat, Baber Aslam
Dept of Information Security, MCS, National University of Science and Technology, Rawalpindi, Pakistan
Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
14. Paper 31081532: Natural Language Processing and Machine Learning: A Review (pp. 101-106)
Fateme Behzadi, Computer Engineering Department, Bahmanyar Institute of Higher Education, Kerman, IRAN
Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
15. Paper 31081533: A User-Aware Approach to Provide Context Aware Web Service Composition (pp. 107-120)
Sihem Cherif, MIRACL, ISIMS, Cité El Ons, Route de Tunis Km 10, Sakiet Ezziet 3021, Sfax, Tunisia
Raoudha Ben Djemaa, MIRACL, ISIMS, Cité El Ons, Route de Tunis Km 10, Sakiet Ezziet 3021, Sfax, Tunisia
Ikram Amous, MIRACL, ISIMS, Cité El Ons, Route de Tunis Km 10, Sakiet Ezziet 3021, Sfax, Tunisia
Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
16. Paper 31071533: Analysis and Detection of the Zeus Botnet Crimeware (pp. 121-135)
Laheeb Mohammed Ibrahim, Software Engineering, Mosul University, Collage of Computer Sc. & Math., Mosul, Iraq
Karam H. Thanon, Software Engineering, Mosul University, Collage of Computer Sc. & Math., Mosul, Iraq
Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
17. Paper 31081525: Security and Cryptography on World Wide Web (pp. 136-141)
Okal Christopher Otieno, Department of Information Technology, Mount Kenya University, Nairobi, Kenya
Magati Steve Biko, Department of Information Technology, Mount Kenya University, Nairobi Kenya
Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
18. Paper 31081521: LDA-PAFI: Linear Discriminate Analysis Based Personal Authentication using Finger Vein and Face Images (pp. 145-152)
Manjunathswamy B E, Dr Thriveni J, Dr Venugopal K R
Department of Computer Science and Engineering, University Visvesvaraya College of Engineering, Bangalore, India
Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
19. Paper 31081516: The Socio-Political Influences of the Globalization of the IT Industry (pp. 153-157)
Okal Christopher Otieno, Department of Information Technology, Mount Kenya University, Nairobi, Kenya
Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
20. Paper 300916167: Efficient Reverse Converter for the moduli set by using two-Part RNS (pp. 158-161)
Dr. Shiva TaghipourEivazi
Department of Computer Engineering, Tabriz Branch, Islamic Azad University, Tabriz, Iran
Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------