international research journal in computer science

Top PDF international research journal in computer science:

Prototype Survey of Different Resource Provisioning Procedures in Cloud Computing

Prototype Survey of Different Resource Provisioning Procedures in Cloud Computing

International Journal of Scientific Research in Computer Science, Engineering and Information Technology International Journal of Scientific Research in Computer Science, Engineering and Information T[.]

8 Read more

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

Abstract— Today rapid development in Information Technology field and new applications being developed constantly to support critical businesses all over the world and also various key fields like environment studies, Medicine, Research and other sciences, making it an indispensable part of our lives. Computations across and over Internet has become order of day. Internet of things is an emerging topic of technical, social and economic significance. With IPV6 addressing in place, every possible consumer product, durable goods, cars and trucks, Industrial and utility components, sensors and other everyday object can become part of Internet. Data Analytics is the driving force running these applications and for mining useful knowledge. This document aims at bringing out the feasibility support that current data mining tools render IOT, against its possible data models.
Show more

8 Read more

International Journal of Computer Science and Mobile Computing

International Journal of Computer Science and Mobile Computing

devices. A crucial consider coming up with m-Commerce services and applications is that they would like for identification of the mobile users necessities, and therefore the classification of the services with their distinctive properties. Security remains a giant issue issue regarding web searching. in line with eBrain marketing research client physical science Association ( CEA ) conducted associate investigation on the customers‟ connotation of web searching therefore on understand the favorites of consumers and located that the lower cost of the merchandise remains one among the key issue and therefore the convenience, privacy and security are future. Therefore, the safety of web searching could be a matter of importance.
Show more

7 Read more

International Journal of Computer Science and Mobile Computing

International Journal of Computer Science and Mobile Computing

Attribute-based encryption is a type of encryption in which the secret key of a user and the cipher text are dependent upon attributes. As a result, a user can decrypt a cipher text if and only if there is a match between the attributes which are listed in the cipher text and the attributes which he holds. ABE schemes have been the primary focus in the research community nowadays as it allows flexible access control and can protect the confidentiality of sensitive data. This scheme requires the central authority. But with the advancement in the research, this need is removed because each user can join the system when he wants and can leave the system independent of the other users. This reduces the time that we require to change their secret keys and to reinitialize the system [20].
Show more

7 Read more

International Journal of Computer Science and Mobile Computing

International Journal of Computer Science and Mobile Computing

Jimoh E. Okoh is a post graduate student of the Changchun University of Science and Technology, China. He graduated from the University of Benin, Nigeria where he majored in Electrical/ Electronic engineering and thereafter went after his passion in Computer science. He has several published softwares and apps to his credit. Current research areas include software engineering, cloud computing and machine learning algorithm

12 Read more

International Journal of Computer Science and Mobile Computing

International Journal of Computer Science and Mobile Computing

Dr. Premila B. Maheshwari Pursued Bachelor of Homeopathic Medicine and Surgery from Smt. A.J. Savla Homoeopathic Medical College & Research Institute, Mehsana - Gujarat in 2013. Currently She is Working as a Medical Officer in Primary Health Center of Bhadreshwar - Kachchh Under The National Rural Health Mission Launched International Education Academy, Gandhidham - Kachchh,

6 Read more

International Journal of Computer Science and Mobile Computing

International Journal of Computer Science and Mobile Computing

Advances in technology and the growth of Reciprocative Training to provide educators and trainers with unique opportunities to enhance learning and teaching in corporate, government, healthcare, and higher education. This application serves as a forum to facilitate the exchange of information on the current research, development, and practice of Interactive Learning in the sectors. It includes the research, development, and practice of Interactive Learning related to the following multi-dimensional topics and sub- topics.

7 Read more

International Journal of Computer Science and Mobile Computing

International Journal of Computer Science and Mobile Computing

The existing system is purely manual system. Daily reports as well as transactions are maintained manually through ledgers. Calls and feedback and other report entries are entered manually in day books. Extensive amount of records has to be maintained to get a detailed vision on the reports. It takes lot of time for recording data. Paper work on the other hand is a cumbersome process. There are chances for errors and also updating of data is difficult. In order to overcome these problems, go for computerization. After carrying a small research, computer application voluminous data, multiple users and information requirements.
Show more

7 Read more

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

ABSTRACT: We use computers for banking and investing to shopping and communicating with others through email or chat programs. Computer and network of computer become the very important part of companies, organization and government sector. A lot of important information is stored in computers and transferred across networks and the internet. Unauthorized users may try to break into systems to have access to private information. This brings the need of a system that can detect and prevent those harmful activities. Intrusion detection systems (IDSs) monitor networks and/or systems to detect malicious activities. That helps us to re-act and stop intruders. There are two types of IDSs, network- based IDSs and host-based IDSs. A network-based IDS monitor’s network traffic and activities to find attacks, and a host-based IDS monitors activities in a computer system to detect malicious actions. This thesis is a research on using Bayesian techniques in implementing a network-based IDS that can tell us a computer process is normal (harmless) or abnormal (harmful). We combine three techniques to build a IDS. In our system k2 algorithm is applied which main purpose is to incrementally add a node to a network, it means start with a single node than add another node to complete a network. Bayesian methods utilize a search-and-source procedure to search the space of DAGs, and use the posterior density as a scoring function and finally to construct a data structure called a junction tree which can be used to calculate any query through message passing on the tree. In a past a lot of research is done on a IDS but for a wireless network is little. We have combine three techniques to make sure that network is safe from unauthorized access and attacks.
Show more

8 Read more

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

We use computers for banking and investing to shopping and communicating with others through email or chat programs. Computer and network of computer become the very important part of companies, organization and government sector. A lot of important information is stored in computers and transferred across networks and the internet. Unauthorized users may try to break into systems to have access to private information. This brings the need of a system that can detect and prevent those harmful activities. Intrusion detection systems (IDSs) monitor networks and/or systems to detect malicious activities. That helps us to re-act and stop intruders. There are two types of IDSs, network-based IDSs and host-based IDSs. A network-based IDS monitor’s network traffic and activities to find attacks, and a host-based IDS monitors activities in a computer system to detect malicious actions. This thesis is a research on using Bayesian techniques in implementing a network-based IDS that can tell us a computer process is normal (harmless) or abnormal (harmful). We combine three techniques to build a IDS. In our system k2 algorithm is applied which main purpose is to incrementally add a node to a network, it means start with a single node than add another node to complete a network. Bayesian methods utilize a search-and-source procedure to search the space of DAGs, and use the posterior density as a scoring function and finally to construct a data structure called a junction tree which can be used to calculate any query through message passing on the tree. In a past a lot of research is done on a IDS but for a wireless network is little. We have combine three techniques to make sure that network is safe from unauthorized access and attacks.
Show more

9 Read more

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

Links between an entry page and an index page or between two index pages are referred as index URLs. Links between an index p age and a thread page are referred as thread URLs. Links connecting multiple pages of a board and multiple pages of a thread are referred as page- flipping URLs. A crawler starting from the entry URL only needs to follow index URL, thread URL, and page-flipping URL to traverse EIT paths that lead to all thread pages. The challenge of forum crawling is then reduced to a URL type recognition problem. In this paper, we show how to learn URL patterns, i.e., Index-Thread-page-Flipping (ITF) regexes, recognizing these three types of URLs from as few as five annotated forum packages and apply them to a large set of 160 unseen forums packages. Note that we specifically refer to “forum package” rather than “forum site.” last section, we draw conclusions and point out future directions of research.
Show more

16 Read more

International Journal of Computer Science and Mobile Computing

International Journal of Computer Science and Mobile Computing

ABSTRACT: The project entitled “Website for Agriculture” is developed by PHP as Front End and MY SQL Back End. Find articles on agriculture website, including for sales product, farm management, coconut details, Banana Details and more. Get agricultural website updates for your farm by interacting with experts and other farmers. Agricultural website package that tracks harvest data, crops, chemicals, fertilizer, planting, tillage, contracts, elevator inventory, expenses, net income and custom trucking for your farm. India has made impressive strides on the agricultural front during the last three decades. Much of the credit for this success should go to the several million small farming families that form the backbone of Indian agriculture and economy. Policy support, production strategies, public investment in infrastructure, research and extension for crop, livestock and farmer have significantly helped to increase food production and its availability. This farm website allows you to track important information on your farm such as the previous crop, condition of the field when planted, planting depth, planting population, rates, etc. Generate farm record keeping reports to use at your local office and insurance agency to prove your crop yields. This agricultural website package allows you to generate custom-made reports for a specific person, year, field, commodity, or elevator to send to your tenants or landlords. Management system website for the farming and commercial sectors produced by Plan-A-Head, a leading computer application software company. Website Farm's mission is to always develop software products of outstanding quality and deliver the best service and support to our dealers and clients.
Show more

6 Read more

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

According to the Research Program for International Student Assessment (PISA) on 2015, Indonesia is ranked 63th from countries in the world, it shows that the development of education is currently progressing significantly. But the development and growth must still be followed by a supervisory function [1]. Educational institutions are responsible for learning activities both academically and non-academically [2]. In terms of carrying out the duties and functions carried out only can be monitored by two parties, namely related institutions and parents. One of the factors as a reference for monitoring is attendance.
Show more

8 Read more

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

After the subject matter has been determined by literature studies it will become a reference or reference which is used as a theoretical basis in finding solutions that can solve a problem. In this step journals from existing research or books are supporting research that is currently or will be running. 3) Data Collection

14 Read more

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

As an effort made to this research, to identify the methods that have been done. In order to know the application of methods created by others approaching this research. So here are some studies that are close to the research that will be discussed. The results of M. A. Sudarsono and Krisnawati showed that to design and build Android Based Applications required some software and hardware, starting from system analysis to design the process of this application [5]. Research A. Putranto explained based on the SWOT matrix, Regina Pacis High School Bogor can use the strengths to obtain opportunities. The way that can be done by SMU Regina Pacis Bogor, among others: make improving the competence of students and teachers by using existing facilities and technology; developing innovative learning methods by utilizing existing information technology channels (e- learning) and improving the quality of learning for students and teachers obtained from the technology channel [6]. Other research Y. Astuti and D. I. Fahmasari Pinter Java website provides feature article posting for member Pinter Java website that can be used to exchange information about Java Culture, and So people who will learn Javanese culture do not need to come directly to the island of Java [7]. From the previous research that has been described then it is necessary to develop to design sales applications in the analysis with SWOT, that is by adding feature product ranking into application design.
Show more

13 Read more

Document Analysis using Similarity Measures : A Case Study on Text Retrieval System

Document Analysis using Similarity Measures : A Case Study on Text Retrieval System

A document is an information container that contains information either in printed format or in handwritten format and document is a medium for transferring knowledge. Human vision is the most accurate language identification system in the world. Within a few seconds of looking at a document, one can determine the language even without deskewing and segmenting the image, while computer vision is not able to match human capability. Today there is an increasing need for automatic language identification with the support of computers. As the world moves from paper to paperless office, more and more communication and storage of documents is performed digitally which facilitates quicker additions, searches and modifications and increases the life of such records.
Show more

6 Read more

A Survey on Load Management Techniques In Cloud Computing

A Survey on Load Management Techniques In Cloud Computing

Cloud computing is emerging as a new standard model for enabling ubiquitous network access, computing resources, deploying, organizing, and accessing vast distributed computing applications over the network. It is an awesome platform in next stage of evolution of internet that leverages various opportunities to improve the way in which we think about and implement the practices and technology needed to secure the things that matters us the most. In cloud computing, Load balancing is one of the main challenges which are required to distribute the workload equally across all the nodes. Load balancing uses services offered by many computer network service provider corporations. The load can be CPU load, memory, capacity, delay or network load. Load balancing ensures that all the processor in the system or every node in the network distributes equal amount of work at any instant of time. This paper is a brief discussion on different load balancing techniques on the bases of different load balancing metrics.
Show more

7 Read more

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

[30] Bilal Zahran Belal Ayyoub, Jihad Nader, Ziad Al-Qadi, Suggested Method to Create Color Image Features Victor, Journal of Engineering and Applied Sciences, v. 14, issue 1, pp. 2203-2207, 2019. [31] A Waheeb, Ziad AlQadi, Gray image reconstruction, Eur. J. Sci. Res, v. 17, pp. 167-173, 2009. [32] Ziad Alqadi, Bilal Zahran, Qazem Jaber, Belal Ayyoub, Jamil Al-Azzeh, Enhancing the Capacity of LSB Method by Introducing LSB2Z Method, IJCSMC, v. 8. Issue 3, pp. 76 – 90, 2019.

9 Read more

International Journal of Computer Science and Mobile Computing

International Journal of Computer Science and Mobile Computing

There is scope for future development of this project. The world of computer fields is not static; it is always subject to be dynamic. The technology which is famous today becomes outdated the very next day. To keep abstract of technical improvements, the system may be further refined. So, it is not concluded. Yet it will improve with further enhancements. Enhancements can be done in an efficient manner. We can even update the same with further modification establishment and can be integrated with minimal modification. Thus the project is flexible and can be enhanced at anytime with more advanced features.
Show more

8 Read more

International Journal of Computer Science and Mobile Computing

International Journal of Computer Science and Mobile Computing

There is scope for future development of this project. The world of computer fields is not static; it is always subject to be dynamic. The technology which is famous today becomes outdated the very next day. To keep abstract of technical improvements, the system may be further refined. So, it is not concluded. Yet it will improve with further enhancements.

12 Read more

Show all 10000 documents...