Related papers
Machine Learning - Algorithms, Models and Applications [Working Title]
Jaydip Sen
Artificial Intelligence, 2021
Jaydip Sen is associated with Praxis Business School, Kolkata, India, as a professor in the Department of Data Science. His research areas include security and privacy issues in computing and communication, intrusion detection systems, machine learning, deep learning, and artificial intelligence in the financial domain. He has more than 200 publications in reputed international journals, refereed conference proceedings, and 18 book chapters in books published by internationally renowned publishing houses, such as Springer, CRC press, IGI Global, etc. Currently, he is serving on the editorial board of the prestigious journal Frontiers in Communications and Networks and in the technical program committees of a number of high-ranked international conferences organized by the IEEE, USA, and the ACM, USA. He has been listed among the top 2% of scientists in the world for both the years 2020 and 2021 as of August 2021.
View PDFchevron_right
Machine Learning, Image Processing, Network Security and Data Sciences
badal soni
Communications in Computer and Information Science, 2020
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use.
View PDFchevron_right
IRJET- REVIEW ON MACHINE LEARNING
IRJET Journal
IRJET, 2020
Machine learning is generally a field of computer science which gives the ability to learn without the use of programmer. Machine learning is also said to be artificial intelligence. In this algorithms can be easily understand and need number of raw data to work according to the set of algorithms. It can be easily organized and automatically solve more complex data in the problems. It helps in delivering faster and more accurate results. Some of the programs are based on internet oriented for example Google maps, amazon and other online applications. Mainly machine learning is used in internet of things. There are three different stages in machine learning so that it can execute according to that stages and learns from trainer. There are some of the challenges in Machine learning which can be solved, but few things can't be solved. So machine learning is important in day today's life. In this paper you will come to know about what is machine learning, stages, applications and challenges faced in it.
View PDFchevron_right
Selected Computing Research Papers Volume 8 June 2019
Edith Gabotshajwe
2019
Critical Evaluation of Machine Learning Research Aimed at Improving Lie Detection Accuracy (Lynette Gabonthone) 1 A Critical Evaluation of Current Published Face Recognition Systems Research Aimed at Improving Security for ATM transactions (Edith Gabotshajwe) 7 An Evaluation of Current Research Aimed at Improving Network Security in Internet of Things (IoT) (Tumisang Mogotsi) 13 Evaluating the currently proposed techniques to secure Software Defined Networks from Denial of Service (DDoS/DoS) attacks (Mohammad Fakhar Iqbal) 21 Evaluation of Current Load Balancing Techniques in a Software Defined Network Aimed at Improving Quality of Service (Mohammad Falaq Iqbal) 29 An Analytical Review of Published Face Recognition Research Aimed at Improving Accuracy in Identification (Botlhe T Moitho) 35 Evaluation Of Current Security Measures Used In Automated Teller Machines (ATM) (Khumo Setlalekgosi) 43 An In-Depth Evaluation of Current Limitations in Autonomous Vehicle Object Detection Systems...
View PDFchevron_right
Journal of Computer Science IJCSIS August 2021 Full Volume
Journal of Computer Science IJCSIS
Journal of Computer Science IJCSIS August 2021 Full Volume, 2021
The International Journal of Computer Science and Information Security (IJCSIS) is one of the leading open access publisher, with hundreds of papers published each year related to different areas ranging from computer science, mobile & wireless computing, networking and information security. The core vision of IJCSIS is to promote knowledge and technology advancement for the benefit of academia, professional research communities and industry practitioners. The aim is to support you to achieve success in your research and scholarly experience. Researchers, PhD scholars and professionals from academia and industry are solicited to submit completed research and developments in the listed areas below. With a large research community of authors, readers, editors and reviewers bounded together by their talent and integrity, IJCSIS publications are available online freely for everyone worldwide. All published papers undergo high-quality peer review and rigorous editorial processes. The journal of Computer Science and Information Security is an Open Access journal since 2009 with high citations in Google Scholar.
View PDFchevron_right
Journal of Computer Science IJCSIS September 2015
Homam El-Taj
The International Journal of Computer Science and Information Security (IJCSIS) a monthly, peer reviewed, online open access journal that publishes articles which contribute new results and theoretical ideas in all areas of Computer Science & Information Security. The editorial board is pleased to present the September 2015 issue. The core of the vision is to publish and disseminate new knowledge and technology for the benefit of all, ranging from academic research and professional communities to industry professionals in a range of topics in computer science and information security in general. It also provides a publication place for high-caliber researchers, practitioners and PhD students to present ongoing research and development in these areas. We are glad to see variety of articles focusing on the major topics of innovation and computer science; big data analytics; Biometric security; mobile computing; network security and IT applications. This scholarly resource endeavors to provide international audiences with the highest quality research manuscripts and accounts of the constant evolution of information science and technology in whole. Researchers, academicians, practitioners and doctoral students will find this journal as a critical source of reference. Over the last years, we have revised and expanded the journal scope to recruit papers from emerging areas of green & sustainable computing, cloud computing security, forensics, mobile computing and big data analytics. IJCSIS archives all publications in major academic/scientific databases and is indexed by the following International agencies and institutions: Google Scholar,
View PDFchevron_right
Journal of Computer Science IJCSIS March 2021 Full Volume
Journal of Computer Science IJCSIS
Journal of Computer Science IJCSIS March 2021 Full Volume, 2021
1. PaperID 01032103: Impact of Elicitation Techniques on Requirement Validation in Software Industry in Pakistan (pp. 1-9) Samiullah Hunzai, Department of Computer Software Engineering University of Engineering Peshawar, Pakistan. Ibrar Ali Shah, Department of Computer Software Engineering University of Engineering Peshawar, Pakistan. Full Text: PDF [Academia.edu | Scopus | Archive | DOI | Google Scholar] 2. PaperID 01032112: Training an Intelligent Tutoring System Using Reinforcement Learning (pp. 10-18) Jezuina Koroveshi, University of Tirana, Faculty of Natural Sciences, Albania. Ana Ktona, University of Tirana, Faculty of Natural Sciences, Albania, Full Text: PDF [Academia.edu | Scopus | Archive | DOI | Google Scholar] 3. PaperID 01032115: Clustering Massive Packets using a Lock-Free Algorithm of Tree-Based Reduction on GPGPU (pp. 19-24) Ruo Ando, National Institute of Informatics, Center for Cybersecurity Research and Development, 2-1-2 Hitotsubashi, Chiyoda-ku, Tokyo 101-8430 Japan Youki Kadobayashi, Nara Institute of Science and Technology, Graduate School of Science and Technology 8916-5 Takayama, Ikoma, Nara 630-0192, Japan Hiroki Takakura, National Institute of Informatics, 2-1-2 Hitotsubashi, Chiyoda-ku, Tokyo 101-8430 Japan Full Text: PDF [Academia.edu | Scopus | Archive | DOI | Google Scholar] 4. PaperID 01032120: Node Mobility Optimization in Multi-hop WBAN Using Genetic Algorithm (pp. 25-31) Md. Taslim Arefin, Dept. of CSE, Jahangirnagar University, Department of ETE, Daffodil International University Mohammad Hanif Ali, Department of CSE, Jahangirnagar University, Dhaka, Bangladesh A.K.M. Fazlul Haque, Department of ETE, Daffodil International University, Dhaka, Bangladesh Full Text: PDF [Academia.edu | Scopus | Archive | DOI | Google Scholar] 5. PaperID 01032101: IP Camera: A Tool For Effective Surveillance System (pp. 32-37) Osodeke, Efe Charles & Okoro Ugochukwu Bethel Department of computer Science, Michael Okpara University of Agriculture, Umudike Full Text: PDF [Academia.edu | Scopus | Archive | DOI | Google Scholar] 6. PaperID 01032122: Case Based Reasoning Approach for Market Basket Analysis on the Performance of Issuers in the Home Appliances Industry Sector (pp. 38-46) Natania Frislya Nanulaitta, Kristoko Dwi Hartomo, Irwan Sembiring, Faculty of Information, Satya Wacana Christian University, Diponegoro Street,52-60, Salatiga, 50711, Indonesia Full Text: PDF [Academia.edu | Scopus | Archive | DOI | Google Scholar] 7. PaperID 01032123: A Novel Study for Spatio-Temporal Query Processing using Privacy Preservation (pp. 47-51) Dileep Kumar, The University of Suwon, Hwaseong-Si Korea Full Text: PDF [Academia.edu | Scopus | Archive | DOI | Google Scholar] 8. PaperID 01032124: The Future of E-Government: From One Stop Shop to No Stop Shop solution (pp. 52-57) Ina Hyseni & Endri Xhina, Department of Informatics, Faculty of Natural Sciences, University of Tirana Full Text: PDF [Academia.edu | Scopus | Archive | DOI | Google Scholar] 9. PaperID 01032127: Intelligent Software Defined Energy Management System for IoT networks (pp. 58-67) Salma El-Shaarawi, Department of Network, Faculty of computer Science, Ahram Canadian University, Cairo, Egypt Samy Ghoniemy, Faculty of Informatics and Computer Science, The British University in Egypt, Cairo, Egypt Full Text: PDF [Academia.edu | Scopus | Archive | DOI | Google Scholar] 10. PaperID 01032114: Improved Discriminatory Ability using Hybrid Feature Selection via Approach Inspired by Grey Wolf Search and Ensemble Classifier for Medical Datasets (pp. 68-80) Waheeda Almayyan, Computer Information Department, College of Business Studies, PAAET, Kuwait Full Text: PDF [Academia.edu | Scopus | Archive | DOI | Google Scholar] 11. PaperID 01032119: Bi-Temporal Implementation In Relational Database Management Systems: MS SQL Server (pp. 81-92) Lyn Kurian, Rajagiri School of Engineering and Technology (Autonomous), Kakkanad, Ernakulam, India Jyotsna A., Rajagiri School of Engineering and Technology (Autonomous), Kakkanad, Ernakulam, India Full Text: PDF [Academia.edu | Scopus | Archive | DOI | Google Scholar]
View PDFchevron_right
Journal of Computer Science IJCSIS July 2021 Full Volume
Journal of Computer Science IJCSIS
International Journal of Computer Science and Information Security (IJCSIS) Vol 19 No. 7 July 2021, 2021
It is our great pleasure to present the July 2021 issue (Volume 19 Number 7) of the International Journal of Computer Science and Information Security (IJCSIS). High quality research, survey & review articles are proposed from experts in the field, promoting insight and understanding of the state of the art, and trends in computer science and technology. It especially provides a platform for high-caliber academics, practitioners and PhD/Doctoral graduates to publish completed work and latest research outcomes. According to Google Scholar, up to now papers published in IJCSIS have been cited over 19939 times and this journal is experiencing steady and healthy growth. Google statistics shows that IJCSIS has established the first step to be an international and prestigious journal in the field of Computer Science and Information Security. There have been many improvements to the processing of papers; we have also witnessed a significant growth in interest through a higher number of submissions as well as through the breadth and quality of those submissions.
View PDFchevron_right
Journal of Computer Science IJCSIS May 2019 Full Volume
Journal of Computer Science IJCSIS
IJCSIS Vol 17 No. 5 May 2019 Issue, 2019
It is our great pleasure to present the May 2019 issue (Volume 17 Number 5) of the International Journal of Computer Science and Information Security (IJCSIS). High quality research, survey & review articles are proposed from experts in the field, promoting insight and understanding of the state of the art, and trends in computer science and technology. It especially provides a platform for high-caliber academics, practitioners and PhD/Doctoral graduates to publish completed work and latest research outcomes. According to Google Scholar, up to now papers published in IJCSIS have been cited over 13299 times and this journal is experiencing steady and healthy growth. Google statistics shows that IJCSIS has established the first step to be an international and prestigious journal in the field of Computer Science and Information Security. There have been many improvements to the processing of papers; we have also witnessed a significant growth in interest through a higher number of submissions as well as through the breadth and quality of those submissions. IJCSIS is indexed in major academic/scientific databases and important repositories, such as: Google Scholar, Thomson Reuters, ArXiv, CiteSeerX, Cornell’s University Library, Ei Compendex, ISI Scopus, DBLP, DOAJ, ProQuest, ResearchGate, LinkedIn, Academia.edu and EBSCO among others.
View PDFchevron_right
Special issue on machine learning for security and privacy: advancing the state-of-the-art applications
janmenjoy nayak
Neural Computing and Applications
View PDFchevron_right