Vol. 13 No. 9 SEP 2015

Vol. 13 No. 9 SEPTEMBER 2015 International Journal of Computer Science and Information Security

Download Full Journal: [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive]

.

Copyright © IJCSIS. This is an open access journal distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

1. Paper 31081501: An Efficient Big Data Analytics Platform for Mobile Devices (pp. 1-5)

Ngu Wah Win, University of Computer Studies, Yangon, UCSY

Thandar Thein, University of Computer Studies, Yangon, UCSY

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

2. Paper 31081519: Face Recognition based on Spatial and Transform domain techniques (pp. 6-14)

Jagadeesh H S, Dept. of Electronics and Communication Engineering, APSCE, Bangalore, India

Suresh Babu K, Dept. of Electronics and Communication Engineering, UVCE, Bangalore, India

K B Raja, Dept. of Electronics and Communication Engineering, UVCE, Bangalore, India

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

3. Paper 31081526: Exchange Rates Forecasting Using Variable Length Moving Average - NARX (pp. 15-18)

Agus Sihabuddin, Subanar, Dedi Rosadi, Edi Winarko

Computer Science Graduate Program, Faculty of Mathematics and Natural Science, Gadjah Mada University, Yogyakarta – Indonesia

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

4. Paper 31081527: Implementing the Database Users Privilege Model: Effects of possible successful SQL Injection attack in web applications (pp. 19-21)

Gem Ralph Caracol, Soomi Yang

Information Security Department, Suwon University, Hwaseong City, South Korea

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

5. Paper 31081528: Security Issues and Solutions for Android-based Mobile Devices (pp. 22-27)

Klever R. P. Cavalcanti, Edejair Viana

Department of Statistics and Informatics, Federal Rural University of Pernambuco, Pernambuco, Brazil

Fernando A. A. Lins, Department of Statistics and Informatics, Federal Rural University of Pernambuco, Pernambuco, Brazil

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

6. Paper 31081534: Intrusion Detection and Prevention Systems (IDPS) State of Art (pp. 28-35)

Homam Reda El-Taj, Community College Univesity of Tabuk, Tabuk, Saudi Arabia

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

7. Paper 31081520: Improving the Quality of Composite Services Through Improvement of Cloud Infrastructure Management (pp. 36-44)

Olga Shpur, Department of Telecommunication, Lviv Polytechnic National University, Lviv, Ukraine

Mykhailo Klymash, Department of Telecommunication, Lviv Polytechnic National University, Lviv, Ukraine

Marian Seliuchenko, Department of Telecommunication, Lviv Polytechnic National University, Lviv, Ukraine

Bogdan Strykhaliuk, Department of Telecommunication, Lviv Polytechnic National University, Lviv, Ukraine

Orest Lavriv, Department of Telecommunication, Lviv Polytechnic National University, Lviv, Ukraine

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

8. Paper 31081502: Service-Oriented Architecture for Secure Service Discovery and Selection in Specialized Mobile Networks (pp. 45-71)

M. Adel Serhani, College of Information Technology, UAE University, Al-Ain, UAE

Yasser Gadallah, The American University in Cairo, Egypt

Ezedin Barka, College of Information Technology, UAE University, Al-Ain, UAE

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

9. Paper 31081511: Vehicle Segmentation Using K-Means with Fuzzy Logic (pp. 72-77)

(1) Shakila basher, (2) Purushothaman S., and (3) Rajeswari P.

(1) Department of MCA, VELS University, Chennai, India.

(3) Department of Electrical and Computer Science Engineering

(2,3) Institute of Technology, Haramaya University, DireDawa, Ethiopia

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

10. Paper 31081513: Effective feature selection in multi-label classification problems using genetic algorithms (pp. 78-82)

Somayeh Fattahi Ferdowsi, Department of computer, Zanjan Branch, Islamic Azad University, Zanjan, Iran

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

11. Paper 31081515: Vehicle Tracking Using Locally Weighted Projection Regression Method (pp. 83-89)

(1) Shakila basher, (2) Purushothaman S., and (3) Rajeswari P.

(1) Department of MCA, VELS University, Chennai, India.

(3) Department of Electrical and Computer Science Engineering

(2,3) Institute of Technology, Haramaya University, DireDawa, Ethiopia

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

12. Paper 31081518: Multilevel Extensible and Dynamic of Mobile Establishment Concepts (pp. 90-91)

Ammar Es-Said, University Hassan II/ Faculty of Science Ben M'sik, Casablanca Morocco

Labriji El Houssine, University Hassan II/ Faculty of Science Ben M'sik, Casablanca Morocco

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

13. Paper 31081530: Forensic Investigation of User’s Web Activity on Google Chrome using Open-source Forensic Tools (pp. 92-100)

Narmeen Shafqat, Baber Aslam

Dept of Information Security, MCS, National University of Science and Technology, Rawalpindi, Pakistan

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

14. Paper 31081532: Natural Language Processing and Machine Learning: A Review (pp. 101-106)

Fateme Behzadi, Computer Engineering Department, Bahmanyar Institute of Higher Education, Kerman, IRAN

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

15. Paper 31081533: A User-Aware Approach to Provide Context Aware Web Service Composition (pp. 107-120)

Sihem Cherif, MIRACL, ISIMS, Cité El Ons, Route de Tunis Km 10, Sakiet Ezziet 3021, Sfax, Tunisia

Raoudha Ben Djemaa, MIRACL, ISIMS, Cité El Ons, Route de Tunis Km 10, Sakiet Ezziet 3021, Sfax, Tunisia

Ikram Amous, MIRACL, ISIMS, Cité El Ons, Route de Tunis Km 10, Sakiet Ezziet 3021, Sfax, Tunisia

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

16. Paper 31071533: Analysis and Detection of the Zeus Botnet Crimeware (pp. 121-135)

Laheeb Mohammed Ibrahim, Software Engineering, Mosul University, Collage of Computer Sc. & Math., Mosul, Iraq

Karam H. Thanon, Software Engineering, Mosul University, Collage of Computer Sc. & Math., Mosul, Iraq

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

17. Paper 31081525: Security and Cryptography on World Wide Web (pp. 136-141)

Okal Christopher Otieno, Department of Information Technology, Mount Kenya University, Nairobi, Kenya

Magati Steve Biko, Department of Information Technology, Mount Kenya University, Nairobi Kenya

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

18. Paper 31081521: LDA-PAFI: Linear Discriminate Analysis Based Personal Authentication using Finger Vein and Face Images (pp. 145-152)

Manjunathswamy B E, Dr Thriveni J, Dr Venugopal K R

Department of Computer Science and Engineering, University Visvesvaraya College of Engineering, Bangalore, India

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

19. Paper 31081516: The Socio-Political Influences of the Globalization of the IT Industry (pp. 153-157)

Okal Christopher Otieno, Department of Information Technology, Mount Kenya University, Nairobi, Kenya

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

20. Paper 300916167: Efficient Reverse Converter for the moduli set by using two-Part RNS (pp. 158-161)

Dr. Shiva TaghipourEivazi

Department of Computer Engineering, Tabriz Branch, Islamic Azad University, Tabriz, Iran

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------