International Journal of Advances in Computer Science and Technology最新文献

筛选
英文 中文
Proposed Methods for Prevention of SQL Injection Attacks 提出了防止SQL注入攻击的方法
International Journal of Advances in Computer Science and Technology Pub Date : 2019-03-25 DOI: 10.30534/ijacst/2019/01832019
Tarique Jamal
{"title":"Proposed Methods for Prevention of SQL Injection Attacks","authors":"Tarique Jamal","doi":"10.30534/ijacst/2019/01832019","DOIUrl":"https://doi.org/10.30534/ijacst/2019/01832019","url":null,"abstract":"SQL injection is that kind of strategy in which SQL code is inserted into web-based applications that uses server-side database. Such web applications settle for user input like form then place these user inputs in the database requests. SQL statements are executed in such a manner that wasn't supposed or anticipated by the applying developer that tries to subvert the link between a webpage and its supporting database, therefore the database is tricked into execution malicious code due to the poor design of application. The proposed system depends on protection site at run time, before inclusion of user input with database by validating, encoding, filtering the content, escaping single quotes, limiting the input character length, and filtering the exception messages. The proposed answer is effectiveness and measurability additionally it's simply adopted by application programmers. For empirical analysis, we offer a case study of our answer and implement in hypertext mark-up language, PHP, My Sql, Apache Server and Jmeter application.","PeriodicalId":294118,"journal":{"name":"International Journal of Advances in Computer Science and Technology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114136813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative Analysis of Image Denoising Algorithms using Reference Based Image Quality Measures 基于参考的图像质量度量图像去噪算法的比较分析
International Journal of Advances in Computer Science and Technology Pub Date : 2019-03-25 DOI: 10.30534/IJACST/2019/02832019
Peshawar, Pakistan.
{"title":"Comparative Analysis of Image Denoising Algorithms using Reference Based Image Quality Measures","authors":"Peshawar, Pakistan.","doi":"10.30534/IJACST/2019/02832019","DOIUrl":"https://doi.org/10.30534/IJACST/2019/02832019","url":null,"abstract":"Much research has been dedicated to find the best denoising method for the specific noise model present in an image. Various linear filters, such as mean filter, Arithmetic mean, Contra harmonic and Weiner filter are becoming increasingly common in removing Gaussian and salt and pepper noise in images. Nonlinear filters like median and Alpha Trimmed filters play avital role in eliminating impulsive noise. This paper demonstrate a comparative analysis of various popular noise suppression approaches to find the appropriate and consistent technique for denoising images. The experimental outcomes are discussed and analysed to find the overall benefits and drawbacks of each technique.","PeriodicalId":294118,"journal":{"name":"International Journal of Advances in Computer Science and Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123755315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Status of Working Women in the Middle East 中东地区职业妇女的地位
International Journal of Advances in Computer Science and Technology Pub Date : 2018-12-31 DOI: 10.30534/ijacst/2018/027122018
Saad Basaad, Mohammed Alshehri, Monir Natto
{"title":"The Status of Working Women in the Middle East","authors":"Saad Basaad, Mohammed Alshehri, Monir Natto","doi":"10.30534/ijacst/2018/027122018","DOIUrl":"https://doi.org/10.30534/ijacst/2018/027122018","url":null,"abstract":"The paper aims to find where we can achieve gender equivalence which is very important for workplaces not only because it is 'fair' and 'the right thing to do,' it is also imperative to the bottom line of a business and the productivity of our region. Women and men come into the workplace with equivalent levels of ambition. Besides, today more than ever, women are achieving their professional targets and delivering effective assistance to the accomplishments of individual businesses and the entire economy as well. They are embracing their careers sincerely and faithfully, as can be considered from the high levels of engagement that these women feel towards their jobs. Moreover, to get benefits of equality in the workplace with access to the entire talent gathering, that because women are gradually become educated as men. In this study, we found that “Get Your Facts Straight: Women in the Middle East Workplace” article has a proper research methodology as it must be in any academic study. This research investigates the current status of working women in the Middle East region, the Bayt.com Status of Working Women in the Middle East survey December 2014 has shown that 60% of women in the Middle East find that not easy to get appropriate job opportunities, whereas 51% of them believe that recruitment and selection opportunities have been processed, regardless of gender.","PeriodicalId":294118,"journal":{"name":"International Journal of Advances in Computer Science and Technology","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124697333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image Thresholding for Malay Ancient Manuscript (Terengganu Inscribed Stone) 马来古手稿(登嘉楼石刻)图像阈值分割
International Journal of Advances in Computer Science and Technology Pub Date : 2018-10-15 DOI: 10.30534/IJACST/2018/017102018
Jtmk
{"title":"Image Thresholding for Malay Ancient Manuscript (Terengganu Inscribed Stone)","authors":"Jtmk","doi":"10.30534/IJACST/2018/017102018","DOIUrl":"https://doi.org/10.30534/IJACST/2018/017102018","url":null,"abstract":"","PeriodicalId":294118,"journal":{"name":"International Journal of Advances in Computer Science and Technology","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131801769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Simple Object Access Protocol (SOAP) Messaging for Mobile Devices in Android Platform Android平台移动设备的高效简单对象访问协议(SOAP)消息传递
International Journal of Advances in Computer Science and Technology Pub Date : 2018-09-15 DOI: 10.30534/ijacst/2018/01792018
Talaam K. Obadiah, G. Okeyo, Michael W. Kimwele
{"title":"Efficient Simple Object Access Protocol (SOAP) Messaging for Mobile Devices in Android Platform","authors":"Talaam K. Obadiah, G. Okeyo, Michael W. Kimwele","doi":"10.30534/ijacst/2018/01792018","DOIUrl":"https://doi.org/10.30534/ijacst/2018/01792018","url":null,"abstract":" ABSTRACT Service Oriented Architecture, and its most common implementation method Web services, has not seen widespread use on wireless mobile systems and smart devices that are characterized by less computational resources such as small computing devices and limited power and wireless networks characteristics like low bandwidth which is often ad hoc and unreliable. Web services are commonly realized on computer systems where processing resources and network bandwidth are not a limitation. Android is one of the largest open-source operating systems for smart devices, but lacks native support for the SOAP protocol. Google has shown, to date, little interest in adding a SOAP library to Android. This could be because they would rather support the current trends in Web Services toward REST-based services, and using JSON as a data encapsulation format or using XMPP for messaging. However, this is a conjecture subject to future research. SOAP is the backbone protocol of Web services hence this thesis will focus in supporting SOAP on the android platform. We will explore and compare different transport protocols and compression techniques in order to achieve an efficient technique for SOAP messaging. The experiment will be done on mobile broadband (second, third and fourth generations) and Wi-Fi to examine the effects the different combinations has on CPU load and battery usage of the Android device, and the network","PeriodicalId":294118,"journal":{"name":"International Journal of Advances in Computer Science and Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129724036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Effective Bayes Based Anomaly Detection Mechanism in Cloud Environment 云环境下基于贝叶斯的有效异常检测机制
International Journal of Advances in Computer Science and Technology Pub Date : 2018-09-15 DOI: 10.30534/ijacst/2018/02792018
Dr. V. Umadevi
{"title":"An Effective Bayes Based Anomaly Detection Mechanism in Cloud Environment","authors":"Dr. V. Umadevi","doi":"10.30534/ijacst/2018/02792018","DOIUrl":"https://doi.org/10.30534/ijacst/2018/02792018","url":null,"abstract":"Now a days Cloud computing plays a vital role in the IT enterprise. Statistical Process Control cloud charts sense routine variances and their root causes are identified based on the differential profiling strategy. Most of the manual overhead incurred in detecting the software variances and the analysis time are reduced to a larger extent but detailed analysis of profiling data are not performed in most of the cases. At the same time, Trusted Computing Base (TCB) of a computing node does not achieve the scalability measure. This work, a Practical Bayes approach studies the problem of detecting software variances and ensures scalability by comparing information at the current time to historical data. GenProg uses an extensive structure of genetic programming to develop a program variant that retains essential functionality but it is not vulnerable to a known deficiency in cloud. The existing software testing suite identifies program defects in cloud environment. Delta debugging and Structural differencing algorithms minimize the dissimilarity among variant and the original program in terms of minimum repair. Subsequently, Defect Localization based on Band (DLB) mechanism is introduced to overcome the defects and rank the different acceptable patches.","PeriodicalId":294118,"journal":{"name":"International Journal of Advances in Computer Science and Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129403398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Analysis of Big Data Tools 大数据工具性能分析
International Journal of Advances in Computer Science and Technology Pub Date : 2018-07-17 DOI: 10.30534/ijacst/2018/05762018
I. Rai, Ksa Kau
{"title":"Performance Analysis of Big Data Tools","authors":"I. Rai, Ksa Kau","doi":"10.30534/ijacst/2018/05762018","DOIUrl":"https://doi.org/10.30534/ijacst/2018/05762018","url":null,"abstract":"The limitation in traditional Database Management Systems to process and analysis the growing data from various sources has led to emergence of Big Data. A lot of tools have been developed under Hadoop architecture to utilize the powerful functionality provide by Hadoop. In this paper, we have evaluated the performance of Big Data tools, Pig and Hive. We have shown that Hive is 2.82 faster than Pig with respect to data size ranging from one hundred thousand to one million rows. Moreover, Hive achieved 3.95 faster performance over Pig when more complex query is performed. However, the learning curve of Pig is higher than Hive, but the last required preparing the data warehouse before starting processing them.","PeriodicalId":294118,"journal":{"name":"International Journal of Advances in Computer Science and Technology","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116549932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Impact of Total Quality Management on Customer Satisfaction (E-Services) 全面品质管理对顾客满意的影响(电子服务)
International Journal of Advances in Computer Science and Technology Pub Date : 2018-06-30 DOI: 10.30534/ijacst/2018/02762018
Raya Muslim Sadik
{"title":"Impact of Total Quality Management on Customer Satisfaction (E-Services)","authors":"Raya Muslim Sadik","doi":"10.30534/ijacst/2018/02762018","DOIUrl":"https://doi.org/10.30534/ijacst/2018/02762018","url":null,"abstract":"Total quality management is a management system that is based on that every person who is working in the organization should be committed to achieve organization goals and meet company’s high standards. The main aim of organization is customer satisfaction. Quality management is the basic tool that leads to quality assurance and will ultimately result in customer satisfaction. The total quality management is the part of the business in modern age. Everyone use it and in eservices, it has more importance because most of the services are virtual i.e. performed using the tools of information technology. When we talk about quality, it means that the product of service, which we are making or offering to the consumer or users, should be fit for the purpose, free from errors and mistakes, fit for the use and meets the need of the customer. In addition to the above the quality in e-business is crucial as it involves the three important dimensions i.e. quality management, quality control and quality assurance. In order the manage, control and assure quality in the e-services environment the avoidance of conformance costs i.e. detection and prevention costs and non-conformance costs i.e. internal failure and external failure costs are essential. The implementation of Total Quality Management (TQM) in e-services environment includes the empowerment of team, systematic problem solving, data derivers’ decision, statistical process and selection and use of appropriate problem solving tools and techniques. The organizations who are able to perform the above in their e-services can do the fast communication, implementation and decision-making and achieve the simplicity and flexibility in their processes. In this way, they are not only able to get the faster response from their customers but they can provide better satisfaction to their customer, which is essential for their growth and development and to achieve their financial and non-financial objectives effectively and efficiently.","PeriodicalId":294118,"journal":{"name":"International Journal of Advances in Computer Science and Technology","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128257107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
About the algorithm of data encryption BTS 关于数据加密BTS的算法
International Journal of Advances in Computer Science and Technology Pub Date : 2018-06-30 DOI: 10.30534/ijacst/2018/03762018
Sattarov Alijon Bozorboyevich
{"title":"About the algorithm of data encryption BTS","authors":"Sattarov Alijon Bozorboyevich","doi":"10.30534/ijacst/2018/03762018","DOIUrl":"https://doi.org/10.30534/ijacst/2018/03762018","url":null,"abstract":"Information systems need to use cryptographic encryption algorithms to ensure confidentiality of processed data. According to Shannon’s work, the following requirements are for modern block-symmetric encryption algorithm (BSEA). • diffusion – changing of one character open text leads to change in the almost all ciphertext; • confusion – mixing information is used to complicate the relation between ciphertext and key.","PeriodicalId":294118,"journal":{"name":"International Journal of Advances in Computer Science and Technology","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126573903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Algorithm of without key hash–function based on Sponge-scheme 基于海绵方案的无键哈希函数算法
International Journal of Advances in Computer Science and Technology Pub Date : 2018-06-30 DOI: 10.30534/ijacst/2018/04762018
M. Aripov, D. M. Kuryazov
{"title":"Algorithm of without key hash–function based on Sponge-scheme","authors":"M. Aripov, D. M. Kuryazov","doi":"10.30534/ijacst/2018/04762018","DOIUrl":"https://doi.org/10.30534/ijacst/2018/04762018","url":null,"abstract":"In given article is offered a new algorithm of without key hash-function, founded on cryptographic Sponge scheme.","PeriodicalId":294118,"journal":{"name":"International Journal of Advances in Computer Science and Technology","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124948749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信