Aqsa Afroz, Dr Mohsin Ali Memon, Salahuddin Saddar, Muhammad Haris Khan
{"title":"An algorithm for Prevention and Detection of Cross Site Scripting Attacks","authors":"Aqsa Afroz, Dr Mohsin Ali Memon, Salahuddin Saddar, Muhammad Haris Khan","doi":"10.14445/23488387/ijcse-v7i7p102","DOIUrl":"https://doi.org/10.14445/23488387/ijcse-v7i7p102","url":null,"abstract":"","PeriodicalId":186366,"journal":{"name":"International Journal of Computer Science and Engineering","volume":"5 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129254674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nishitha Sai Sree Koganti, Sravani Sribhashyam, Hema Lakshmi Garikipati
{"title":"Scheme Updates","authors":"Nishitha Sai Sree Koganti, Sravani Sribhashyam, Hema Lakshmi Garikipati","doi":"10.14445/23488387/ijcse-v7i7p103","DOIUrl":"https://doi.org/10.14445/23488387/ijcse-v7i7p103","url":null,"abstract":"This document defines how QUIC, Datagram Transport Layer Security (DTLS), Real-time Transport Protocol (RTP), RTP Control Protocol (RTCP), Session Traversal Utilities for NAT (STUN), Traversal Using Relays around NAT (TURN), and ZRTP packets are multiplexed on a single receiving socket. This document RFC 7983 and RFC 5764.","PeriodicalId":186366,"journal":{"name":"International Journal of Computer Science and Engineering","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121601842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Secured Deduplication of Encrypted Data Over an Attribute-Based Cloud Storage","authors":"Olu Olu Osaronwolu, Matthias Daniel, Anireh V I E","doi":"10.14445/23488387/ijcse-v7i7p113","DOIUrl":"https://doi.org/10.14445/23488387/ijcse-v7i7p113","url":null,"abstract":"","PeriodicalId":186366,"journal":{"name":"International Journal of Computer Science and Engineering","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131715390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Random Forest Regression Model For Estimation of Neonatal Levels In Nigeria","authors":"Managwu C, M. D, Nwaibu N","doi":"10.14445/23488387/ijcse-v7i7p107","DOIUrl":"https://doi.org/10.14445/23488387/ijcse-v7i7p107","url":null,"abstract":"","PeriodicalId":186366,"journal":{"name":"International Journal of Computer Science and Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130649291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy Preserving Framework For Smart Home Using Attribute-Based Encryption","authors":"Ekeji P U, B. E O, S. D. J. S.","doi":"10.14445/23488387/ijcse-v7i7p109","DOIUrl":"https://doi.org/10.14445/23488387/ijcse-v7i7p109","url":null,"abstract":"","PeriodicalId":186366,"journal":{"name":"International Journal of Computer Science and Engineering","volume":"71 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120994999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Meteb M. Altaf, A. Menshawi, Ruba Al-Skate, Taghreed Al-Musharraf, Wejdan Al-Sakaker
{"title":"New Gas Leakage Detection System using Internet of Things","authors":"Meteb M. Altaf, A. Menshawi, Ruba Al-Skate, Taghreed Al-Musharraf, Wejdan Al-Sakaker","doi":"10.14445/23488387/ijcse-v7i7p112","DOIUrl":"https://doi.org/10.14445/23488387/ijcse-v7i7p112","url":null,"abstract":"","PeriodicalId":186366,"journal":{"name":"International Journal of Computer Science and Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130642435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identity-based Signcryption for Big Data Using Forward Secrecy","authors":"Adoubara K, D. M., Anireh V I E","doi":"10.14445/23488387/ijcse-v7i7p110","DOIUrl":"https://doi.org/10.14445/23488387/ijcse-v7i7p110","url":null,"abstract":"","PeriodicalId":186366,"journal":{"name":"International Journal of Computer Science and Engineering","volume":"219 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128174563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smart Attendance System","authors":"Yashi Porwal, D. Rastogi","doi":"10.14445/23488387/ijcse-v7i6p104","DOIUrl":"https://doi.org/10.14445/23488387/ijcse-v7i6p104","url":null,"abstract":"","PeriodicalId":186366,"journal":{"name":"International Journal of Computer Science and Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128773593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shivam Singh, Anshuman Tiwari, S. Shukla, Sankalp Pateriya
{"title":"Currency Recognition System Using Image Processing","authors":"Shivam Singh, Anshuman Tiwari, S. Shukla, Sankalp Pateriya","doi":"10.14445/23488387/ijcse-v7i6p101","DOIUrl":"https://doi.org/10.14445/23488387/ijcse-v7i6p101","url":null,"abstract":"In this paper, we invented a system for currency identification using a technique called image processing. The suggested approach can be used for identifying the nation (country) or origin and the cost or the denomination of a given note as well. We have taken simplest paper currencies into consideration. This system works by first pointing the nation of origin using assured existing region of interest, and then extricating the cost value using attributes like color, text, or size of the currency, based on how much the notes in the same nation varies. We have examined some of the most popular currencies, along with their cost value or denominations. Our system is able to accurately and expeditiously classify sample notes. Keywords— Machine Learning, Currency detection, Feature extraction, Neural Network.","PeriodicalId":186366,"journal":{"name":"International Journal of Computer Science and Engineering","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131898335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure File Storage On Cloud Using Cryptography","authors":"Arun Singh, H. Pundir","doi":"10.14445/23488387/ijcse-v7i5p104","DOIUrl":"https://doi.org/10.14445/23488387/ijcse-v7i5p104","url":null,"abstract":"1,2,3 Student of Xavier’s Institute of Engineering, Mahim. Mumbai. 4Assiatant Professor of IT Dept. Of Xavier’s Institute Engineering, Mahim, Mumbai. -------------------------------------------------------------------------------***----------------------------------------------------------------------------Abstract – In this paper we aim to securely store information into the cloud, by splitting data into several chunks and storing parts of it on cloud in a manner that preserves data confidentiality, integrity and ensures availability. The rapidly increased use of cloud computing in the many organization and IT industries provides new software with low cost. Cloud computing is beneficial in terms of low cost and accessibility of data. Cloud computing gives lot of benefits with low cost and of data accessibility through Internet. Ensuring the security of cloud computing is a major factor in the cloud computing environment, as users often store sensitive information with cloud storage providers, but these providers may be untrusted. So sharing data in secure manner while preserving data from an untrusted cloud is still a challenging issue. Our approach ensures the security and privacy of client sensitive information by storing data across single cloud, using AES, DES and RC2 algorithm.","PeriodicalId":186366,"journal":{"name":"International Journal of Computer Science and Engineering","volume":"224 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133028511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}