Vol. 17 No. 7 JULY 2019

Vol. 17 No. 7 July 2019 International Journal of Computer Science and Information Security

Download Full Journal: [Academia.edu (Full Volume)¦ Scribd (Full Volume)¦ Archive (Full Volume) ¦ SlideShare PDF]

.

Copyright © IJCSIS. This is an open access journal distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

1. PaperID 30061901: Target Sentiment Analysis Model with Naïve Bayes and Support Vector Machine for Product Review Classification (pp. 1-17)

(1) Rhoda Viviane A. Ogutu, (2) Dr. Richard Rimiru, (3) Dr. Calvins Otieno

(1) School of Information Technology (IT) Jomo Kenyatta University of Agriculture andTechnology – JKUAT (Mombasa Campus), P. O. Box 94090–80107, Mombasa.

(2) School of Computing and Information Technology (SCIT), Jomo Kenyatta University of Agriculture and Technology – JKUAT (Main Campus), P. O. Box 62000- 00200, Nairobi. Kenya

(3) School of Information Technology (IT) Jomo Kenyatta University of Agriculture and Technology – JKUAT (Main Campus), P. O. Box 62000-00200, Nairobi. Kenya

Full Text: PDF [Academia.edu | Scopus | Scribd | Archive | ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

2. PaperID 30061903: Quality Model for E-Government Portal using Bayesian Belief Networks (pp. 18-32)

Ahlam Hussein Abduljalil, Information Systems Department, Faculty of Computers & Information, HELWAN UNIVERSITY, Cairo, Egypt

Marwa Salah Farhan, Information Systems Department, Faculty of Computers & Information, HELWAN UNIVERSITY, Cairo, Egypt

Mahmoud Abd Ellatif, Management Information Systems Department, College of Business, University of Jeddah, SA

Information Systems Department, Faculty of Computers & Information, HELWAN UNIVERSITY, Cairo, Egypt

Full Text: PDF [Academia.edu | Scopus | Scribd | Archive | ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

3. PaperID 30061904: Comparative Analysis of Malware Detection Techniques Using Signature, Behaviour and Heuristics (pp. 33-50)

Odii, J. N. & Hampo, J.A.C., Department of Computer Science, Federal University of Technology, Owerri Nigeria

Nwokoma F. O. & Onwuama T.U., Department of Computer Science, Federal University of Technology, Owerri, Nigeria.

Full Text: PDF [Academia.edu | Scopus | Scribd | Archive | ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

4. PaperID 30061912: A Novel Fault Tolerant Approach using Patterns for Private Cloud Environment (pp. 51-56)

(1) Sudha M., (2) Usha J.,

(1)Research Scholar, Department of MCA, R V College of Engineering, Visvesvaraya Technological University, India

(2)Professor, Department of MCA, R V College of Engineering, Visvesvaraya Technological University, India

Full Text: PDF [Academia.edu | Scopus | Scribd | Archive | ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

5. PaperID 30061913: Human Face Detection Based on Combination of Linear Regression, PCA and Fuzzy C-Means Clustering (pp. 57-62)

Momotaz Begum Panna, Department of Computer Science and Engineering, Jahangirnagar University, Savar, Dhaka

Md. Imdadul Islam, Department of Computer Science and Engineering, Jahangirnagar University, Savar, Dhaka

Full Text: PDF [Academia.edu | Scopus | Scribd | Archive | ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

6. PaperID 30061914: A System for Incremental Association Rule Mining without Candidate Generation (pp. 63-72)

Archana Gupta, Research Scholar, Madhav Institute of Technology & Science, Gwalior (M.P.), India.

Akhilesh Tiwari, Department of CSE & IT, Madhav Institute of Technology & Science, Gwalior (M.P.), India.

Sanjeev Jain, PDPM- Indian Institute of Information Technology, Design & Manufacturing, Jabalpur (M.P.), India.

Full Text: PDF [Academia.edu | Scopus | Scribd | Archive | ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

7. PaperID 30061915: An Analysis of Deep Learning Techniques for Plant Leaf Disease Detection (pp. 73-80)

Sunayana Arya, Dept. of Computer Engineering, GBPUAT, Pantnagar, Uttarakhand, India

Rajeev Singh, Dept. of Computer Engineering, GBPUAT, Pantnagar, Uttarakhand, India

Full Text: PDF [Academia.edu | Scopus | Scribd | Archive | ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

8. PaperID 30061917: Application of Role Based Technology in Database Intrusion Detection (pp. 81-92)

(1) Onwuama Theodora U.; (2) P. O. Asagba; (3) J. N. Odii

(1) Department of Computer Science, Federal University of Technology, Owerri, Nigeria.

(2) Department of Computer Science, University of Port Harcourt, Rivers State, Nigeria.

(3) Department of Computer Science, Federal University of Technology, Owerri, Nigeria

Full Text: PDF [Academia.edu | Scopus | Scribd | Archive | ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

9. PaperID 30061921: Vulnerabilities in Android Apps Permissions (pp. 93-98)

Frank Laud Boateng (1), Joseph Kobina Panford (2), James Ben Hayfron-Acquah (3)

(1) Kwame Nkrumah University of Science and Technology, Kumasi, Ghana

(2,3) Senior Lecturers, Kwame Nkrumah University of Science and Technology, Kumasi, Ghana

Full Text: PDF [Academia.edu | Scopus | Scribd | Archive | ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

10. PaperID 30061923: Good Bye for Random Functions in Equation PSO and Welcome for Chaotic Functions In Equation PSO (pp. 99-107)

Majed Ismael Sameer, AL-Mustansiriya University College of Educational - Computer Science Department Iraq-Baghdad

Full Text: PDF [Academia.edu | Scopus | Scribd | Archive | ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

11. PaperID 30061924: Emerging Trends in Software Testing Tools & Methodologies: A Review (pp. 108-112)

Jawwad Ibrahim, Department of CS & IT, University of Lahore, Gujrat Campus, Pakistan

Sundas Hanif, Department of CS & Software Engineering, APCOMS, Pakistan

Sobia Shafiq, Department of CS & Software Engineering, APCOMS, Pakistan

Saeed Faroom, University of Lahore, Gujrat Campus, Pakistan

Full Text: PDF [Academia.edu | Scopus | Scribd | Archive | ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

12. PaperID 30061926: TCM: Code Design and Improved Sequence Estimation on Channels subjected to ISI (pp. 113-119)

Vanaja Shivakumar, Dept. of Electronics and Communication Engineering, CMR Institute of Technology, Bangalore, India

Full Text: PDF [Academia.edu | Scopus | Scribd | Archive | ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

13. PaperID 30061927: Five Generic Processes for Behavior Description in Software Engineering (pp. 120-131)

Sabah Al-Fedaghi, Computer Engineering Department, Kuwait University, Kuwait

Full Text: PDF [Academia.edu | Scopus | Scribd | Archive | ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

14. PaperID 30061930: Ramification Analysis of SQL Injection Detection in Web Application (pp. 132-138)

Manjunatha K. M. & Dr. M. Kempanna

Reseach Scholar, Lecturer, Government Polytechnic, Channasandra,Bengaluru-560004

Assistant Professor, Department of Computer Science, Bangalore Institute of Technology, Bengaluru-560004

Full Text: PDF [Academia.edu | Scopus | Scribd | Archive | ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

15. PaperID 30061931: Toward a Secure ELK Stack (pp. 139-143)

Fatimetou Abdou VADHIL, Université de Nouakchott Alassriya, Nouakchott, Mauritanie

Mohamed Lemine SALIHI, Université de Nouakchott Alassriya, Nouakchott, Mauritanie

Mohamedade Farouk NANNE, Université de Nouakchott Alassriya Nouakchott, Mauritanie

Full Text: PDF [Academia.edu | Scopus | Scribd | Archive | ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

16. PaperID 30061937: On Cyber Security Auditing Awareness: Case of Information and Communication Technology Sector (pp. 144-150)

(1) Saher Manaseer, (2) Afnan Alawneh

(1) The University of Jordan, Dept. Of Computer Science, King Abdullah II School for Information Technology, The University of Jordan Amman, Jordan

(2) The University of Jordan Amman, Jordan

Full Text: PDF [Academia.edu | Scopus | Scribd | Archive | ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

17. PaperID 30061918: Application of Blended Learning at the SHS Level – Implications on Students’ Performance (pp. 151-157)

Grace Odoi, Najim Ussiph, Joseph Kobina Panford

Department of Computer Science, KNUST, Kumasi – Ghana

Full Text: PDF [Academia.edu | Scopus | Scribd | Archive | ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

The journal of Computer Science and Information Security is an Open Access journal since 2009 with high citations in Google Scholar. ESCI - IP & Science - Thomson Reuters - Web of Science (Indexing in process) & Scopus.

ISSN 1947 5500 Copyright © IJCSIS, USA.