International Journal of Computer Science and Applications最新文献

筛选
英文 中文
Location Based Security and Message Authentication Services in Vehicular Ad Hoc Network (VANET) 车载自组织网络(VANET)中基于位置的安全和消息认证服务
International Journal of Computer Science and Applications Pub Date : 2014-05-01 DOI: 10.14355/IJCSA.2014.0302.04
P. Chandrasekar, A. Arul Lawrence Selvakumar
{"title":"Location Based Security and Message Authentication Services in Vehicular Ad Hoc Network (VANET)","authors":"P. Chandrasekar, A. Arul Lawrence Selvakumar","doi":"10.14355/IJCSA.2014.0302.04","DOIUrl":"https://doi.org/10.14355/IJCSA.2014.0302.04","url":null,"abstract":"This work presents an XML-based authoring methodology that facilitates the different tasks associated with the development of standards-compliant e-learning content development. The idea is to support a unified authoring process of adaptive e-learning content by adopting the manual writing metaphor. According to this metaphor, which is specially well-suited for technical domains, instructors are compelled to view e-learning material as the manuals normally written and used to teach a particular subject. The methodology is supported by the DocBook document model (an XML application) which has a number of tools associated that facilitate the implementation of the methodology. Other tasks such as the packaging of contents or publishing in the Learning Management System (LMS) can be automated from these manuals.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"50 1","pages":"91-108"},"PeriodicalIF":0.0,"publicationDate":"2014-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85731208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Theoretical Model for Detection of Advanced Persistent Threat in Networks and Systems Using a Finite Angular State Velocity Machine (FAST-VM) 利用有限角状态速度机(FAST-VM)检测网络和系统中高级持续威胁的理论模型
International Journal of Computer Science and Applications Pub Date : 2014-05-01 DOI: 10.14355/IJCSA.2014.0302.01
G. Vert, Bilal Gonen, J. Brown
{"title":"A Theoretical Model for Detection of Advanced Persistent Threat in Networks and Systems Using a Finite Angular State Velocity Machine (FAST-VM)","authors":"G. Vert, Bilal Gonen, J. Brown","doi":"10.14355/IJCSA.2014.0302.01","DOIUrl":"https://doi.org/10.14355/IJCSA.2014.0302.01","url":null,"abstract":"Intrusion detection systems have undergone numerous years of study and yet a great deal of problems remain; primarily a high percentage of false alarms and abysmal detection rates. A new type of threat has emerged that of Advanced Persistent Threat. This type of attack is known for being sophisticated and slow moving over a long period of time and is found in networked systems. Such threats may be detected by evaluation of large numbers of state variables describing complex system operation and state transitions over time. Analysis of such large numbers of variables is computationally inefficient especially if it is meant to be done in real time. The paper develops a completely new theoretical model that appears to be able to distill high order state variable data sets down to the essence of analytic changes in a system with APT operating. The model is based on the computationally efficient use of integer vectors. This approach has the capability to analyze threat over time, and has potential to detect, predict and classify new threat as being similar to threat already detected. The model presented is highly theoretical at this point with some initial prototype work demonstrated and some initial performance data.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"76 1","pages":"63"},"PeriodicalIF":0.0,"publicationDate":"2014-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76351542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Improving User Adherence to a Reminder: a Model and Methodology 提高用户对提醒的依从性:一个模型和方法
International Journal of Computer Science and Applications Pub Date : 2014-05-01 DOI: 10.14355/ijcsa.2014.0302.03
Lei Tang, Zongtao Duan, Hanbo Wang, Zhiwen Yu
{"title":"Improving User Adherence to a Reminder: a Model and Methodology","authors":"Lei Tang, Zongtao Duan, Hanbo Wang, Zhiwen Yu","doi":"10.14355/ijcsa.2014.0302.03","DOIUrl":"https://doi.org/10.14355/ijcsa.2014.0302.03","url":null,"abstract":"Various reminder systems have emerged to promote users’ health. However, it is hard to say such systems by which person is passively following the instructions can truly meet the goal. This means researchers are under pressure to find the ways of persuading a user to accept the instructions. Seeking the best time to provide the prompts is important to improve user adherence. A methodology is proposed by a following idea where the full benefit of the acceptable reminder will be achieved only if the user is open-minded to an interruption caused by it reasonably and closely. The time for prompting is thus evaluated before a decision on when a user is most receptive. We describe our experience in delivering the attention-sensitive reminders for elder adults to take their medication. Experimental results show that the approach can improve user adherence in an efficient and flexible way.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"1 1","pages":"79"},"PeriodicalIF":0.0,"publicationDate":"2014-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83107821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Segmentation, Tracking And Feature Extraction For Indian Sign Language Recognition 印度手语识别的分割、跟踪与特征提取
International Journal of Computer Science and Applications Pub Date : 2014-04-30 DOI: 10.5121/IJCSA.2014.4207
D. S, K. S., Nivin Anton A L, P. S.
{"title":"Segmentation, Tracking And Feature Extraction For Indian Sign Language Recognition","authors":"D. S, K. S., Nivin Anton A L, P. S.","doi":"10.5121/IJCSA.2014.4207","DOIUrl":"https://doi.org/10.5121/IJCSA.2014.4207","url":null,"abstract":"Sign Language is a meansof communication between audibly challenged people. To provide an interface between the audibly challenged community and the rest of the world we need Sign Language translators. A sign language recognition system computerizes the work of a sign language trEvery Sign Language Recognition (SLR) System is trained to recognizespecific sets of signs and they correspondingly output the sign in the required format. These SLR systems are built with powerful image processing techniques. The sign language recognition systems are capable of recognizing a specific set of signing gestures and output the corresponding text/audio. Most of these systems involve the techniques of detection, segmentation, tracking, gesture recognition and classification. This paperproposes a design for a SLR System.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"38 1","pages":"57-72"},"PeriodicalIF":0.0,"publicationDate":"2014-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73605080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Decreasing of Quantity of Radiation De-Fects in Implanted-Junction Heterorec-Tifiers by Using Overlayers 用覆盖层降低植入结异质二极管中辐射缺陷的数量
International Journal of Computer Science and Applications Pub Date : 2014-04-30 DOI: 10.5121/IJCSA.2014.4203
E. Pankratov, E. Bulaeva
{"title":"Decreasing of Quantity of Radiation De-Fects in Implanted-Junction Heterorec-Tifiers by Using Overlayers","authors":"E. Pankratov, E. Bulaeva","doi":"10.5121/IJCSA.2014.4203","DOIUrl":"https://doi.org/10.5121/IJCSA.2014.4203","url":null,"abstract":"Recently we introduced an approach to increase sharpness of diffusion-junction and implanted-junction heterorectifiers. The heterorectifiers could by single and as a part of heterobipolar transistors. However manufacturing p-n-junctions by ion implantation leads to generation of radiation defects in materials of heterostructure. In this paper we introduce an approach to use an overlayer and optimization of annealing of radiation defects to decrease quantity of radiation defects.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"141 1","pages":"21-29"},"PeriodicalIF":0.0,"publicationDate":"2014-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80130552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Feed Forward Neural Network For Sine Function With Symmetric Table Addition Method Using Labview And Matlab Code 用Labview和Matlab编写的正弦函数对称表加法前馈神经网络
International Journal of Computer Science and Applications Pub Date : 2014-04-30 DOI: 10.5121/IJCSA.2014.4201
Fadhil A. Ali
{"title":"Feed Forward Neural Network For Sine Function With Symmetric Table Addition Method Using Labview And Matlab Code","authors":"Fadhil A. Ali","doi":"10.5121/IJCSA.2014.4201","DOIUrl":"https://doi.org/10.5121/IJCSA.2014.4201","url":null,"abstract":"This work is proposed thefeed forward neural network with symmetric table addition methodto design the neuron synapses algorithm of the sine function approximations, and according to theTaylor series expansion. Matlab code and LabVIEW are used to build and create the neural network , which has been designed and traineddatabase set to improve its performance, and gets the besta global convergence with small value of MSE errors and 97.22% accuracy.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"75 1","pages":"1-12"},"PeriodicalIF":0.0,"publicationDate":"2014-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84172016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security Issues in Grid Computing 网格计算中的安全问题
International Journal of Computer Science and Applications Pub Date : 2014-02-28 DOI: 10.5121/IJCSA.2014.4118
N. Mishra, Ritu Yadav, S. Maheshwari
{"title":"Security Issues in Grid Computing","authors":"N. Mishra, Ritu Yadav, S. Maheshwari","doi":"10.5121/IJCSA.2014.4118","DOIUrl":"https://doi.org/10.5121/IJCSA.2014.4118","url":null,"abstract":"","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"5 1","pages":"179-187"},"PeriodicalIF":0.0,"publicationDate":"2014-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90262531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Model Based Testing of Website 基于模型的网站测试
International Journal of Computer Science and Applications Pub Date : 2014-02-28 DOI: 10.5121/IJCSA.2014.4114
Sumit Machra, Narendra Khatri
{"title":"Model Based Testing of Website","authors":"Sumit Machra, Narendra Khatri","doi":"10.5121/IJCSA.2014.4114","DOIUrl":"https://doi.org/10.5121/IJCSA.2014.4114","url":null,"abstract":"","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"11 1","pages":"143-152"},"PeriodicalIF":0.0,"publicationDate":"2014-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84309326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Augmented Split –protocol; An Ultimate DDoS Defender 增强型分割协议;终极DDoS防御器
International Journal of Computer Science and Applications Pub Date : 2014-02-28 DOI: 10.5121/IJCSA.2014.4107
B. Rawal, H. Ramcharan, Anthony K. Tsetse
{"title":"Augmented Split –protocol; An Ultimate DDoS Defender","authors":"B. Rawal, H. Ramcharan, Anthony K. Tsetse","doi":"10.5121/IJCSA.2014.4107","DOIUrl":"https://doi.org/10.5121/IJCSA.2014.4107","url":null,"abstract":"","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"43 1","pages":"65-81"},"PeriodicalIF":0.0,"publicationDate":"2014-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88481777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SOME ALTERNATIVE WAYS TO FIND M -AMBIGUOUS BINARY WORDS CORRESP ONDING TO A PARIKH MATRIX 寻找与parikh矩阵相对应的m -二义性二进制词的一些替代方法
International Journal of Computer Science and Applications Pub Date : 2014-02-28 DOI: 10.5121/IJCSA.2014.4106
Amrita Bhattacharjee, B. S. Purkayastha
{"title":"SOME ALTERNATIVE WAYS TO FIND M -AMBIGUOUS BINARY WORDS CORRESP ONDING TO A PARIKH MATRIX","authors":"Amrita Bhattacharjee, B. S. Purkayastha","doi":"10.5121/IJCSA.2014.4106","DOIUrl":"https://doi.org/10.5121/IJCSA.2014.4106","url":null,"abstract":"Parikh matrix of a word gives numerical information of the word in terms of its subwords.In this Paper an algorithm for finding Parikh matrix of a binary wordis introduced. With the help of this algorithm Parikh matrix of a binary word, however large it may be can be found out. M-ambiguous words are the problem of Parikh matrix. In this paper an algorithm is shown to find the M - ambiguous words of a binary ordered word instantly. We have introduced a system to represent binary words in a two dimensional field. We see that there are some relations among the representations of M -ambiguous words in the two dimensional field. We have also introduced a set of equations which will help us to calculate the M - ambiguous words.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"41 1","pages":"53-64"},"PeriodicalIF":0.0,"publicationDate":"2014-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72688130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信