首页期刊导航|International journal of computer science and network security: IJCSNS
期刊信息/Journal information
International journal of computer science and network security: IJCSNS
Dae-Sang Office
International journal of computer science and network security: IJCSNS

Dae-Sang Office

月刊

1738-7906

International journal of computer science and network security: IJCSNS/Journal International journal of computer science and network security: IJCSNSESCI
正式出版
收录年代

    Product Classification based on SVM and PHOG Descriptor

    He ZhangZijun Sha
    1-4页
    查看更多>>摘要:It is a great need to classify the numerous product into some categories automatically. In this paper, we adopt SVM classifier combined with PHOG (Pyramid of Histograms of Orientation Gradients) descriptors to implement product-image classification. The support vector machine maps the input vectors into a high-dimension space, in which a max margin supper hyper plane is set up to classify the samples and PHOG can flexibly represent the spatial layout of local image shape. Experimental results showed the effectiveness of the proposed algorithm.

    Securing Distributed Control of Software Defined Networks

    Othman OTHMAN M.MKoji OKAMURA
    5-14页
    查看更多>>摘要:This paper shows the method designed to secure and authenticate distributed behavior of the proposed hybrid control model of Software Defined Networks (SDNs) in [1]. Where, the SDN is an emerging topic that tracts attention due to its paradigm, that splits the control plane form data forwarding plane. According to [2], SDN defines OpenFlow [3] as "key enabler for software-defined networks". However, there have been some debates regarding the scalability of the OpenFlow's controller; this is due to the design of OpenFlow as it depends on a centralized controller to control flows. Manny efforts have been put to solve this issue, one of them is the hybrid control model proposed in [1]; where the original centralized model is preserved, while adding a distributed control model for some specific cases, in order to increase the network's efficiency. And based on the well-established fact, that all computer systems and networks should be secure; in this work, we propose a security method for such distributed control model of SDNs. In which, we aim to secure the flow installation using the distributed control, in addition to enabling safe usage of the distributed control without any chance of malicious use of the distributed control.

    Multi-Criteria Approach to Select Service Providers in Collaborative/Competitive Multi-provider Environments

    Adriano FioreseFernando MatosOmir Correa Alves JuniorRamon Michels Rupeenthal...
    15-22页
    查看更多>>摘要:This paper implements and evaluates a multi-criteria approach to select appropriate service providers in a large scale multi-provider environment. This approach uses the Analytic Hierarchy Process (AHP) method in a Peer-to-Peer Service Overlay Network (P2P SON) composed of several service providers in order to select the most suitable one to deliver the requested service. The AHP method takes into account several performance indicators to accomplish the task. The performed evaluation compares simulation results regarding the service providers' selection by using and not using the AHP method. The results show that the use of AHP as a method to select the best service providers is effective, thus resulting in better distributed selections.

    Energy Efficient Two Hop Clustering for Wireless Sensor Networks

    Babu N VPuttamadappa. CBore Gowda S B
    23-28页
    查看更多>>摘要:A wireless sensor network (WSN) can be described as a collection of sensor nodes which co-ordinate to perform some specific action. Unlike traditional mobile and ad-hoc networks, WSNs depend on battery, dense deployment of nodes in a given physical space and co-ordination to carry out their tasks. In the past few years, there has been lot of research work took place in the area of routing in WSNs and it is proved that the cluster based routing is the one of the best approach to improve the lifetime of the network. The proposed THC protocol makes some assumptions for efficient data routing and network lifetime longevity. The THC protocol transmits its aggregated data to the collecting base station using multipath communication compared to direct communication in LEACH. The results show that THC protocol performs very well and increases the network lifetime.

    Comparative Analysis between Centralized and P2P System Traffic in Terms of Providing VoD Service to Cable Television Network Subscribers

    Lidia JordanovaJordan NenkovDobri Dobrev
    29-35页
    查看更多>>摘要:The choice between a P2P and a conventional centralized realization of VoD service on cable television network can be made after a comparison of the traffic in different sections of the network. Until recently, the centralized architecture has been the most popular architecture for providing VoD service to subscribers of cable television network. With the growth of the network, however, this type of architecture has become inapplicable because of the need for a large number of outgoing video streams from the central VoD server, i.e. high bit rate through the central transmission network. The objective of this paper is to compare the necessary bit rates on different network sections of P2P and centralized VoD architecture and to study the influence of the more important parameters on these bit rates.

    Governing Web 2.0 Adoption in Public Sector in Emirates of Abu Dhabi, UAE

    Noha Ramadan
    36-50页
    查看更多>>摘要:Enterprise Information Technology (IT) has become critical in supporting business sustainability and growth. Emerging Web 2.0 technologies contribute significantly to the fulfillment of key organizational goals and objectives in the public sector. Web 2.0 assist organizations improve employee's productivity, increase communications, information sharing, and improve business processes. The pervasive use of Web 2.0 has created a critical need for effective IT governance procedures. Therefore, investigating Web 2.0 adoption decisions in public organizations is important. Adoption of Web 2.0 entails specifying a framework for Web 2.0 adoption decision accountability, identifying implementation factors and portraying the governance framework of Web 2.0 adoption in the lights of organizational policies, procedures, guidelines and existing organizational IT governance framework.

    An Efficient Sorting Algorithm by Computing Randomized Sorted Sub-Sequences Based on Dynamic Programming

    Toqeer EhsanM. Usman AliMeer Qaisar Javed
    51-57页
    查看更多>>摘要:A lot of sorting algorithms exist today which are based on different problem solving techniques and with different performance behaviors. Algorithms are judged by the running time and space complexity which they take to solve any specific problem. In this papers an efficient sorting algorithm has been introduced, this algorithm is based on dynamic programming technique which is used to solve the optimization problems and here to sort arrays with optimal merges. Algorithm uses a bottom-up approach to compute the pre-sorted sub-sequences of random lengths in a given array of numbers and then sorts the whole array after efficiently combining the identified subsequences by using dynamic programming technique. Overlapping sub-problems are identified while sorting the given array and dynamic programming keeps the track of all the overlapping sub-problems by memorizing the data in a tabular form which is the main theme of the mentioned technique. Running time of the algorithm is compared with the standard merge sort and the results are satisfying.

    Novel Artificial Neural Networks and Logistic Approach for Detecting Credit Card Deceit

    Ganesh Kumar.NuneP.Vasanth Sena
    58-65页
    查看更多>>摘要:By the rise and rapid growth of E-Commerce, use of credit cards for online purchases has more increased and it caused an explosion in the credit card fraud. The most accepted payment mode is credit card for both online as well as regular purchase, pay bills etc. So frauds associated with it are also rising. In real life, fraudulent transactions are scattered with genuine transactions and simple pattern matching techniques are not often sufficient to detect those frauds accurately. Implementation of efficient fraud detection systems has thus become imperative for all credit card issuing banks to minimize their losses. Many modern mechanisms are developed such as CHIP & PIN the mechanism do not prevent the most common fraud type such as fraudulent credit card usages over virtual POS terminals through internet or mail orders. Finally fraud detection is the essential for stop such type of frauds. In this study, classification model based on Artificial Neural Networks (ANN) and Logistic Regression (LR) are developed and applied on credit card fraud detection problem.

    Digital Video Watermarking Using Discrete Cosine Transform and Perceptual Analysis

    B.R.DARSHANS.A.K.JILANI
    66-69页
    查看更多>>摘要:Due to the extensive use of digital media applications, multimedia security and copyright protection has gained tremendous importance. Digital Watermarking is a technology used for the copyright protection of digital applications. In this paper, a comprehensive approach for watermarking digital video is introduced. We propose a hybrid digital video watermarking scheme based on Discrete Cosine Transform (DCT) The video frames are first decomposed using DCT and the binary watermark is embedded In this paper, we describe a visible watermarking scheme that is applied into the host video in the DCT domain. A mathematical model has been developed for that purpose. We have also proposed a modification of the algorithm to make the watermark more robust.

    Solar Cell Powering with Integrated Global Positioning System for SWARM Robot System

    S.N.SinghHirak MazumdarRakesh Kumar
    70-73页
    查看更多>>摘要:A new concept of a Solar Cell powering with integrated Global Positioning System (GPS) for SWARM (Small World Autonomous Robots for Micro-manipulation) is proposed. The main idea is to use a projector to transfer energy and to provide global positioning information to the robots that are equipped with photodiodes on their top. We project a white image showed a scavenged power of 100 to 200 watts normally tungsten bulbs commercially available in market. Based on the global positioning system, the projector sends regularly a sequence 17 images and the robots decodes them using two photodiodes in order to calculate its own position and orientation inside a defined arena.