Journal of Computer Science IJCSIS September 2017 Part II.pdf
Abstract
It is our great pleasure to present the September 2017 issue (Volume 15 Number 9 Part I & II) of the International Journal of Computer Science and Information Security (IJCSIS). On behalf of IJCSIS community and the sponsors, we congratulate the authors and thank the reviewers for their outstanding efforts to review and recommend high quality papers for publication. In particular, we would like to thank the international academia and researchers for continued support by citing papers published in IJCSIS. Without their sustained and unselfish commitments, IJCSIS would not have achieved its current premier status. “We support researchers to succeed by providing high visibility & impact value, prestige and excellence in research publication.” For further questions or other suggestions please do not hesitate to contact us at ijcsiseditor@gmail.com. A complete list of journals can be found at: http://sites.google.com/site/ijcsis/ IJCSIS Vol. 15, No. 9, September 2017 Edition ISSN 1947-5500 © IJCSIS, USA.
References (382)
- W. L. Chen, Y. C. Hu, K. Y. Liu, C. C. Lo and C. H. Wen, "Variable- Rate Quadtree-segmented Block Truncation Coding for Color Image Compression," International Journal of Signal Processing, Image Processing and Pattern Recognition, vol. VII, no. 1, pp. 65-76, 2014.
- G. K. Kharate and V. H. Patil, "Color Image Compression Based On Wavelet Packet Best Tree," IJCSI International Journal of Computer Science Issues, vol. III, no. 2, pp. 31-35, 2010.
- M. J. Nadenau, J. Reichel and M. Kunt, "Wavelet-Based Color Image Compression: Exploiting the Contrast Sensitivity Function," IEEE Transactions on Image Processing, vol. XII, no. 1, pp. 58-70, 2003.
- J. J. Garcia Aranda, M. G. Casquete, M. C. Cueto, J. N. Salmeron and F. G. Vidal, "Logarithmical Hopping Encoding: A Low Computational Complexity Algorithm for Image Compression," IET Image Processing, vol. IX, no. 8, pp. 643-651, 2014.
- C. San Jose, "Requirements for An Extension of HEVC for Coding of Screen Content, document N14174". USA Patent ISO/IEC JTC 1/SC
- /WG 11,, January 2014.
- A. Weinlich, P. Amon, A. Hutter and A. Kaup, "Probability Distribution Estimation for Autoregressive Pixel-Predictive Image Coding," IEEE Transactions on Image Processing, vol. XXV, no. 3, pp. 1382-1395, 2016.
- S. Kim and N. I. Cho, "Hierarchical Prediction and context Adaptive Coding for Lossless Color Image Compression," IEEE Transactions on Image Processing, vol. XXIII, no. 1, pp. 445-449, 2014.
- W. B. Pennebaker and J. L. Mitchell, "JPEG Still Image Data Compression Standard," Van Nostrand Reinhold, 1993.
- "ISO/IEC Standard 14495-1," Information Technology-Lossless and Near-Lossless Compression of Continuous-Tone Still Images (JPEG- LS), April 1999.
- M. Weinberger, . G. Seroussi and G. Sapiro, "The LOCO-I lossless image compression algorithm: Principles and standardization into JPEG-LS," IEEE Transactions on Image Processing, vol. IX, no. 8, p. 1309-1324, 2000.
- X. Wu and N. Memon, "Context-based, adaptive, lossless image coding," IEEE Transactions on Communications, vol. XLV, no. 4, p. 437-444, 1997.
- "Information Technology-JPEG 2000 Image Coding System-Part 1: Core Coding System," INCITS/ISO/IEC Standard 15444-1, 2000.
- "ITU-T and ISO/IEC, JPEG XR Image Coding System-Part 2: Image Coding Specification," ISO/IEC Standard 29199-2, 2011.
- M. M. Fouad and R. M. Dansereau, "Lossless Image Compression Using A Simplified MED Algorithm with Integer Wavelet Transform," I.J. Image, Graphics and Signal Processing, vol. 1, pp. 18-23, 2014.
- W. J. Weinberger, G. Seroussi and G. Sapiro, "The LOCO-I Lossless Image Compression Algorithm: Principles and standardization into JPEG-LS," IEEE Transactions on Image Processing, vol. IX, no. 8, pp. 1309-1324, 2000.
- S. Aggrawal and P. l. Srivastava, "Overview of Image Compression Techniques," Journal of Computer Programming and Multimedia, vol. 1, no. 2, 2016.
- R. C. Gonzalez and R. E. Woods, Digital Image Processing, Pearson Education, 2016, p. 27.
- R. C. Gonzalez and R. E. Woods, Digital Image Processing, Pearson India Education Services Pvt.Ltd, 2016, p. 454.
- M. T. Tsai, "Very Low Bit Rate Color Image Compression by Using Stack-Run-End-Coding," IEEE Transactions on Consumer Electronics, vol. XLVI, no. 2, pp. 368-374, 2000.
- J. W. Han, M. C. hwang, S. G. Kim, T. H. You and S. J. Ko, "Vector Quantizer based Block Truncation Coding for Color Image Compression in LCD Overdrive," IEEE Transactions on Consumer electronics, vol. LIV, no. 4, pp. 1839-1845, 2008.
- S. Benierbah and M. Khamadja, "Compression of Colour Images by Inter-band Compensated Prediction," IEE Proceedings -Vision, Image and Signal Processing, vol. CLIII, no. 2, pp. 237-243, 2006.
- O. Deforges, M. Babel, L. Bedat and J. Ronsin, "Color LAR Codec: A Color Image representation and Compression Scheme Based on Local Resolution Adjustment and self-Extracting Region representation," IEEE Transactions on Circuits and Systems for Video Technology, vol. XVII, no. 8, pp. 974-987, 2007.
- S. C. Pei and Y. S. Lo, "Color Image Compression and Limited Display Using Self-organization Kohonen Map," IEEE Transactions on Circuits and Systems for Video Technology, vol. VIII, no. 2, pp. 191-205, 1998.
- C. K. Yang, J. C. Lin and W. H. Tsai, "Color Image Compression by Moment-Preserving and Block Truncation Coding Techniques," IEEE Transactions On Communications, vol. XLV, no. 12, pp. 1513-1516, 1997.
- p. Nasiopoulos and R. K. Ward, "A High-Quality fixed-Length Compression Scheme for Color Images," IEEE Transactions on Communications, vol. XLIII, no. 11, pp. 2672-2677, 1995.
- J. Zhang, H. Li and C. W. Chen, "Distributed Lossless Coding Techniques for Hyperspectral Images," IEEE Journal of Selected Topics in Signal Processing, vol. IX, no. 6, pp. 977-989, 2015.
- A. Levin, D. Lischinski and Y. Weiss, "Colorization using Optimization," CM Transactions on Graphics, vol. XXIII, 2004.
- P. Peter, L. Kaufhold and J. Weickert, "Turning Diffusion-based Image Colorization into Efficient Color Compression," IEEE Transactions on Image Processing, vol. XXVI, no. 2, 2017.
- J. Kim, D. Han, Y. W. Tai and K. Junmo, "Salient Region Detection via High-Dimensional Color Transform and Local Spatial Support," IEEE Transactions on Image Processing, vol. XXV, no. 1, pp. 9-23, 2016.
- R. Lan, Y. Zhou and Y. Y. Tang, "Quaternionic Local Ranking Binary Pattern: A Local Descriptor of Color Images," IEEE Transactions on Image Processing, vol. XXV, no. 2, pp. 566-579, February 2016.
- Y. C. Fan, J. L. You, J. H. Shen and C. Hung, "Luminance and Color Correction of Multiview Image compression for 3-DTV System," IEEE Transactions on Magnetics, vol. L, no. 7, July 2014.
- D. Halverson, N. Griswold and G. Wise, "A Generalized Block truncation Coding Algorithm for Image Compression," IEEE Transactions on Acoustics Speech Signal Processing, vol. XXXII, no. 3, pp. 664-668, 1984.
- A. M. Raid, W. M. Khedr, M. A. El-dosuky and W. Ahmed, "JPEG Image Compression Using Discrete Cosine Transform -A Survey," International Journal of Computer Science & Engineering, vol. V, no. 2, pp. 39-47, 2014.
- Online]. Available: http://www.ni.com/white-paper/13306/en/. [Accessed 18 August 2017].
- R. C. Gonzalez and R. E. Woods, Digital Image Processing, Pearson India Education Pvt. Ltd, 2016, pp. 536-537.
- U. Bayazit, "Adaptive Spectral Transform for Wavelet-Based Color Image Compression," IEEE Transactions on Circuits and Systems for Video Technology, vol. XXI, no. 7, pp. 983-992, 2011.
- D. Shanmugapriya and G. Padmavathi, "A Survey of Biometric keystroke Dynamics: Approaches, Security and Challenges," International Jounal of Computer Science and Information Security, vol.
- V, no. 1, pp. 115-119, 2009.
- S. Singh and M. Sinha, "Pattern construction by extracting user specific features in keystroke authentication system", in 4th international conference on computer and communication technology (ICCCT), Uttar Pradesh, India,2013, pp. 181-184.
- A. Conclin, G. Dietrich and D. Walz, "Password-based Authentication: A System Perspective," in Proceedings of the 37th annual hawaii international conference on system sciences, Hawaii, 2004, p. 1-10.
- S. Bhatt and T. Santhanam, "Keystroke Dynamics for Biometric Authentication -A Survey", in International conference on pattern recognition, Tamil Nadu, India, 2013, p. 17-23.
- H. J. Lee and S. Cho, "Retraining a novelty detector with impostor patterns for keystroke dynamics-based authentication", Adavances in Biometrics, Berlin: Springer, 2005, pp. 633-639.
- T. Ord and S. M. Furnell, "User authentication for keypad-based devices using keystroke analysis", in International Network Conference, Plymouth, UK, 2000, p. 263-272.
- F. Monrose and A. D. Rubin, "Keystroke Dynamics as a Biometric for Authentication", Future Generation Computer Systems, vol. 16, no. 4, pp. 351-359, March 2000.
- C. R. Costa, "Biometric authentication through numerical keyboard based on keystroke dynamics: experiments and results", M.S. tesis, School of Electrical and Computer Engineering (Unicamp), Campinas, Brazil, 2006.
- D. Hosseinzadeh, S. Krishnan, "Gaussian Mixture Modeling of Keystroke Patterns for Biometric Applications", IEEE Transactions on Systems, Man, and Cybernetics -Part C: Applications and Reviews, vol. 38, no. 6, p. 816-826, November 2008.
- T. Scheidat, C. Vielhauer, J. Dittman, "Handwriting verification- comparison of a multi-algorithmic and a multi-semantic approach", Image and Vision Computing, vol. 27, p. 269-278, February 2009.
- E. A. Solami, C. Boyd, I. Ahmed, R. Nayak and A. Marrington, "User- independent threshold for continuous user authentication with keystroke dynamics", in The seventh international conference on internet monitoring and protection, Stuttgart, Germany, 2012, p. 1-9.
- REFERENCES
- Papadaki M. Anuar, N. B., Furnell S., and Clarke N. An investigation and survey of response options for intrusion response systems ( irss ). Information Security for South Africa (ISSA), pages 1-8, 2010.
- Jarman I. H. Bacciu, D., Etchells T. A., and Lisboa P. G. Patient stratifi- cation with competing risks by multivariate fisher distance. International Joint Conference on Neural Networks, pages pp 213-220, 2009.
- Liang J. Bai, L., Dang C., and Cao F. A cluster centers initialization method for clustering categorical data. Expert Systems with Applications, 39:80228029, 2012.
- Milani P. Bayer, U., Hlauschek C., Kruege C., and Kirda E. Scalable, behavior-based malware clustering. International Journal of Computer Applications, 28(8):26-35, 2013.
- Shapira B. Bekerman, D., Rokach L., and Bar A. Unknown malware detection using network traffic classification. IEEE Conference on Communications and Network Security, pages 134-142, 2015.
- J. L. Carbonera and Abel M. Categorical data clustering: A correlation- based approach for unsupervised attribute weighting. Journal In Pro- ceedings of ICTAI, 2014.
- B. Chaudhari and Parikh M. A comparative study of clustering algorithms using weka tools. International Journal of Application or Innovation in Engineering and Management (IJAIEM), 1:154-158, 2012.
- Vishwas S. Ciza, T. and Balakrishnan N. Usefulness of darpa dataset for intrusion detection system evaluation, 2014.
- Larson R. Daley, K. and Dawkins J. A structural framework for modeling multi-stage network attacks. Proceedings of the International Conference on Parallel Processing Workshops (ICPPW'02), 2002.
- Ragsdale D. J. Dodge, R. and Reynolds C. Organization and training of a cyber security team. Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, 2003.
- Holz T. Dornseif, M. and Klein C. Nosebreak: Attacking honeynets. Proceedings of the 5th IEEE Information Assurance Workshop, 2004.
- De Ocampo et al. Automated signature creator for a signature based intrusion detection system with network attack detection capabilities (pancakes). International Journal of Cyber-Security and Digital Foren- sics (IJCSDF), 2(013):25-35, 2013.
- Fortinet. Threat landscape report q2 2017. 2017.
- Labiche Y. Francois, G. and Massicotte F. Automatic evaluation of in- trusion detection systems. Computer Security Applications Conference, 06:361-370, 2006.
- Holz T. Freiling, F. C. and Wicherski G. Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks. In ESORICS, 2007.
- S. Gadhiya and Bhavsar K. Techniques for malware. International Journal of Advanced Research in Computer Science and Software Engineering, 3:972-975, 2013.
- Muhammad N. M. Hanieh, R. and Alireza M. A framework for automated malcode signatures generation. Proceedings of 2010 IEEE Student Conference on Research and Development (SCOReD 2010), pages 72-76, 2010.
- A. Hesham and Khalid S. (whasg) automatic snort signatures generation by using honeypot. Journal Of Computers, 8(12):3280-3286, 2013.
- L. Hun-Ya. Using ioc (indicators of compromise) in malware foren- sics, 2017. http://www.mandiant.com/news/release/mandiant-releases- openioc-standard-for-sharing-threatintelligence/.
- K. Jack. Intrusion Detection with Snort. Sams Publishing, United Ststes, America, 2003.
- P. Jaina and Krunal P. Effective intrusion detection system using data mining technique. Journal of Emerging Technologies and Innovative Research (JETIR), 2:1867-1878, 2015.
- Chang Y. Kao, C., Huang N., Liao I., Liu R., Hung H., and Lin C. Automatic nids rule generating system for detecting http-like malware communication. International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pages 199-202, 2015.
- K. Kelly. Indicators of compromise teslacrypt malware, Feb., 2017.
- C. R. Kothari. Research Methodology: Methods and Techniques. New Age International, 2004.
- Yuan K. Liao, X., Wang X., Li Z., Xing L., and Beyah R. Acing the ioc game: Toward automatic discovery and analysis of open-source cyber threat intelligence. In ACM Conference on Computer and Communications Security, pages 755-766, 2016.
- MIT Lincoln. Darpa: Intrusion detection system evaluation data set, 2014.
- Tixteco L. P. Mara, P. T., Prez G. S., and Medina L. K. T. Intrusion detection using indicators of compromise based on best practices and windows event logs. The Eleventh International Conference on Internet Monitoring and Protection, pages 29-37.
- Eisa A. Mohssen, M. Z. and Neco V. An automated signature generation method for zero-day polymorphic worms based on c4.5 algorithm. The Ninth International Conference on Software Engineering Advances, pages 215-220, 2014.
- Nirmal G. Neha, S. K-modes clustering algorithm for categorical data. International Journal of Computer Applications, 127:1-6, 2015.
- R. Padmini and Nitin J. Honeypot technique used for intrusion detection system. International Journal of Science Engineering and Technology Research (IJSETR), 2(12):2204-2212, 2013.
- R. R. Patel and Thaker C. S. Zero-day attack signatures detection using honey-pot. International Conference on Computer Communication and Networks CSI-COMNET, 1(1):427, 2011.
- Deshmukh S. Patil, R. and Rajeswari K. Analysis of simple k-means with multiple dimensions using weka. International Journal of Advanced Research in Computer Science and Software Engineering, 110:14-17, 2015.
- J. Postel. Rfc792: Networking group: Internet control message protocol: Darpa internet program protocol specification.
- M .Z Rafique and Caballero J. Firma: Malware clustering and network signature generation with mixed network behaviors. pages 144-163, 2013.
- K. Rajesh and Tajinder K. Machine learning based traffic classification using low level features and statistical analysis. International Journal of Computer Applications (0975 8887), 108(12):6-13, 2014.
- R. Ranjan and Sahoo G. A new clustering approach for anomaly intru- sion detection. International Journal of Data Mining and Knowledge Management Process (IJDKP), 4:29-38, 2014.
- R. Reshma and Chirag S. Zero-day attack signatures detection using honeypot. International Conference on Computer Communication and Networks, pages 66-71, 2011.
- O. P. Sangwan and Vinod K. Signature based intrusion detection system using snort. International Journal of Computer Applications and Information Technology, 1(3):35-41, 2012.
- Menahem E. Shabtai, A. and Elovici Y. F-sign: Automatic, function- based signature generation for malware. IEEE Transactions On Systems and Cybernetics, 41(03):494-508, 2011.
- Bajpai A. Sharma, N. and Litoriya R. Comparison the various clustering algorithms of weka tools. International Journal of Emerging Technology and Advanced Engineering, 2:73-80, 2012.
- R. Shirey. RFC 2828: Internet Security Glossary. The Internet Society, New York, 2000.
- sophos. 2014 sophos-security threat report, 2014.
- P. Sounak and Bimal K. M. Honeypot-based signature generation for polymorphic worms. International Journal of Security and Its Applications, 08(06):101-114, 2014.
- E. Stinson and Mitchell C. Characterizing bots remote control behavior. page 89108, 2007.
- A. S. Subaira and Anitha P. An efficient classification mechanism for network intrusion detection system based on data mining techniques:a survey. International Journal of Computer Science and Business Informatics, 6:1-12, 2013.
- R. Syal and Kumar V. V. Innovative modified k-mode clustering algorithm. 2:pp.390-398, 2012.
- Christoph F. Tillmann, W., Elmar G., and Peter M. Nebula generating syntactical network intrusion signatures.
- M. Toussain. Home field advantage -using indicators of compromise to hunt down the advanced persistent threat.
- Srivastava M. Verma, M., Chack N., Diswar A. K., and Gupta N. A comparative study of various clustering algorithms in data mining. In- ternational Journal of Engineering Research and Applications (IJERA), 2:1379-1384, 2012.
- E. Vindod and Om T. intrusion detection model. Sams Publishing, United Ststes, America, 2012.
- Vijaya P. Vipin, D., Sattvik S., Sreevathsan S., and Gireesh K. T. Net- work intrusion detection system based on machine learning algorithms. International Journal of Computer Science and Information Technology (IJCSIT), 2(6):138-151, 2010.
- J. White. Rfc2925: Distributed management working group (the internet society): Definitions of managed objects for remote ping, traceroute, and lookup operations. 2000.
- SecBI Whitepaper. Using cluster analysis for comprehensive threat detection, April, 2017.
- Qinghua Z. Younghee, P., Douglas R., and Vikram M. Antibot: Clustering common semantic patterns for bot detection. IEEE 34th Annual Computer Software and Applications Conference, pages 262- 272, 2010.
- M. Zalewski. Strange attractors and tcp/ip sequence number analysis, 2001. REFERENCES
- Patrick, C. J., & Iacono, W. G. (1989). Psychopathy, threat, and polygraph test accuracy. Journal of Applied Psychology, 74(2 ), 347-355. doi:10.1037/0021-9010.74.2.347
- Y. Ohmoto, K.Ueda, and T. Ohno "Real-time system for measuring gaze direction and facial features: towards automatic discrimination of lies using diverse nonverbal information", AI & SOCIETY, Vol.23 Issue 2, pp.187-200 (2009), issn=1435-5655 doi:10.1007/s00146-007-0138-x
- Charles V. Ford, "Lies! Lies!! Lies!!!: The Psychology of Deceit", Amer Psychiatric Pub ISBN-13: 978-0880487399 (1996)
- S. Hamaki, S. Nakano, and I. Nishihara, "A Study on Human Motion Detection Method with Range Camera", ITE Annual Convention 2011, 6-2 (2011) (written in japanese, 邦題" 距離カメラを用いた人物の行動検出法の検討") doi: 10.11485/iteac.2011.0_6_2 International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 9, September 2017 181 https://sites.google.com/site/ijcsis/ ISSN 1947-5500
- Whaiduzzaman, M., et al., Cloud service selection using multicriteria decision analysis. The Scientific World Journal, 2014. 2014.
- Whaiduzzaman, M., A. Gani, and A. Naveed, TOWARDS ENHANCING RESOURCE SCARCE CLOUDLET PERFORMANCE IN MOBILE CLOUD COMPUTING. Computer Science & Information Technology: p. 1.
- Ahmed, E., et al., Network-centric performance analysis of runtime application migration in mobile cloud computing. Simulation Modelling Practice and Theory, 2015. 50: p. 42-56.
- Whaiduzzaman, M., et al., A study on strategic provisioning of cloud computing services. The Scientific World Journal, 2014. 2014.
- Whaiduzzaman, M. and A. Gani. Measuring security for cloud service provider: A Third Party approach. in Electrical Information and Communication Technology (EICT), 2013 International Conference on. 2014. IEEE.
- Qi, H., et al., Sierpinski triangle based data center architecture in cloud computing. The Journal of Supercomputing, 2014. 69(2): p. 887-907.
- Shiraz, M., M. Whaiduzzaman, and A. Gani, A study on anatomy of smartphone. Computer Communication & Collaboration, 2013. 1(1): p. 24-31.
- Whaiduzzaman, M., A. Naveed, and A. Gani, MobiCoRE: Mobile device based cloudlet resource enhancement for optimal task response. IEEE Transactions on Services Computing, 2016.
- Whaiduzzaman, M., et al., A survey on vehicular cloud computing. Journal of Network and Computer Applications, 2014. 40: p. 325-344.
- Nasir, M.K. and M. Whaiduzzaman, Use of cell phone density for Intelligent Transportation System (ITS) in Bangladesh. Jahangirnagar University Journal of Information Technology, 2012. 1: p. 49-54. International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 9, September 2017 192 https://sites.google.com/site/ijcsis/ ISSN 1947-5500
- A.Clark, et al., "A correlation method for establishing Provenance of timestamps in digital evidence", 6th Annual Digital Forensic Research Workshop in Digital Investigation, volume 3, supplement 1, pages 98-107, 2006.
- S.A.Thanekar, et al., "A Study on Digital Forensics in Hadoop" International Journal of Control Theory and Applications. Published By: International Science Press, vol. 9, no. 18, pp. 8927-8933, 2016.,
- R. Rowlingson "A ten step process for forensic readiness". International Journal of Digital Evidence, 2(3), 1-28, 2004. International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 9, September 2017 202 https://sites.google.com/site/ijcsis/ ISSN 1947-5500
- A. Pichan, et al., "Cloud forensics: Technical challenges, solutions and comparative analysis," Digital Investigation, vol. 13, pp. 38-57, 2015.
- C.H.Cho et al., "Cyber Forensic for Hadoop Based Cloud System," International Journal of Security and its Applications, vol 6.3, pp.83-90, July, 2012.
- J.Guynes et al., "Digital forensics text string searching: Improving Information retrieval effectiveness by thematically clustering search results", In 6th Annual Digital Forensic Research Workshop, volume 4, pages 49-54, 2007.
- J. Tan, "Forensics readiness". Technical Cambridge USA, 2001.
- A. of Chief Police Officers, "Good practice guide for computer based electronic evidence," ACPO, Tech. Rep.
- S. V. President, "Hadoop/Big Data Market Size Worldwide 2015-2020 | Statistic," Statista, 2016. Available: https://www.statista.com/statistics/587051/worldwide-Hadoop-bigdata-market/. Accessed: Nov. 8, 2016.
- J.Galloway, et al., "Network data mining: methods and techniques for discovering deep linkage between attributes", In APCCM "06: Proceedings of the 3rd Asia-Pacific conference on Conceptual modelling, pages 21-32. Australian Computer Society, Inc., Darlinghurst, Australia, Australia, 2006. ISBN 1-920-68235-X.
- Hortonworks M. Gualtieri and N. Yuhanna, "The Forrester Wave: Big Data Hadoop Solutions, Q1 2014," Forrester, 2014.
- O.Alabi et al., "Toward a Data Spillage Prevention Process in Hadoop using Data Provenance," Proceedings of the 2015 Workshop on Changing Landscapes in HPC Security, pp.9-13, 2015.
- "Welcome to apache Hadoop," Available: http://hadoop.apache.org/. Accessed: Nov. 8, 2016.
- V. Chemitiganti, "What is Apache Hadoop?," in Business Values of Hadoop, Hortonworks, 2016. Available: http://hortonworks.com/apache/hadoop.
- L. De Marco, F. Ferrucci, M-T. Kechadi, "Reference Architecture for a Cloud Forensic Readiness System", EAI Endorsed Transactions on Security and Safety. International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 9, September 2017 203 https://sites.google.com/site/ijcsis/ ISSN 1947-5500
- Procedure: Class Labeling Job
- Output: k: preprocessed tweet & tweets_id, v: class label
- Parse the data (tweet, tweet_id) with JsonParser
- Perform data cleaning and preprocessing
- If (score > 1) then print "strongly_positive"
- Else if (score > 0 && score <= 1) then print "positive"
- Else if ( score <0 && score >-1) then print "negative"
- Else if (score <-1) then print "strongly_negative"
- Else if (score==0) then print "neutral"
- emit(tweet & tweet_id, class label)
- Function Reducer(key, values)
- emit(tweet & tweet_id, class label) International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 9, September 2017 214 https://sites.google.com/site/ijcsis/ ISSN 1947-5500
- Classify feature vector of the new instances by applying Model I 6. Print classified results("Pos", "Neu", "Neg")
- If (results= = "Pos")
- Classify feature vector of tweet(class category is "Pos") by applying Model II
- Print classified results("positive", "strongly_positive")
- End if 11. Else If (results= = "Neg")
- Classify feature vector of tweet(class category is "Neg") by applying Model III
- Print classified results("negative", "strongly_negative")
- End if 15. Else Print classified results("neutral")
- Emit(tweet & tweet_id, class category)
- Function Reducer(key, values)
- emit(tweet & tweet_id, class category) International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 9, September 2017 216 https://sites.google.com/site/ijcsis/ ISSN 1947-5500
- A.Tsakalidis, S.Papadopoulos,I.Kompatsiairs, " An Ensemble Model for Cross-Domain Polarity Classification on Twitter", 15 th Web Information System Engineering, Thessaloniki, Greece, 14 October 2014
- Abbreviation List. Available at "http://www.englishclub.com/eslchat/abbreviations.html." [Online; accessed 10-June-2016].
- Andrew C. Oliver. "Machine-learning-with-mahout". Available: http://www.infoworld.com/article/2608418/application- development/enjoy-machine-learning-with-mahout-on-hadoop.html" , May 29, 2014, [Online; accessed 3-December-2016].
- B.Liu, E.Blasch, Y.Chen, D.Shen, G.Chen, "Scalable Sentiment Classification for Big Data Analysis Using Naive Bayes Classifier", IEEE International Conference on Big Data, IEEE, (2013), pp. 99-104.
- G. Vaitheeswaran, Dr. L. Arockiam,"Combining Lexicon and Machine Learning Method to Enhance the Accuracy of Sentiment Analysis on Big Data", International Journal of Computer Science and Information Technologies, Vol.7(1) , 2016, 306-311.
- Hadoop Yarn. Available at "https://hadoop.apache.org/docs/r2.7.1/hadoop-yarn/hadoop-yarn-site/YARN.html." [Online; accessed 20- August-2016]
- Harsh Thakkar and Dhiren Patel, "Approaches for Sentiment Analysis on Twitter: A State of Art study", CoRR abs/1512.01043 (2015). 2014.
- Johan Bollen, Huina Mao, and Alberto Pepe. Modeling public mood and emotion:Twitter sentiment and socio-economic phenomena. In ICWSM, 2011.
- L.Sigler. "Text Analytics and Sentiment Analysis. Available: http://www.clarabridge.com/text-analytics-vs-sentiment-analysis/ ,July 27, 2015, [Online; accessed 12-October-2016].
- M.Bouazizi, T.Ohtsuki, "Sentiment Analysis: from Binary to Multi-Class Classfication", IEEE ICC 2016 SAC Social Networking, 2016.
- M.Moh, A.Gajjala, S.C.R.Gangireddy, T.S.Moh, "On Multi-Tier Sentiment Analysis using Supervised Machine Learning", IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, 2015.
- M.Skuza, A.Romanowski, " Sentiment Analysis of Twitter Data within Big Data Distributed Environment for Stock Prediction", Computer Science and Information Systems (FedCSIS), 13-16 Sept. 2015.
- N.M.Sharef, H.M.Zin and S.Nadali, "Overview and Future Opportunities of Sentiment Analysis", Journal of Computer Sciences , January 2016.
- S.Shaikh. "Flume Installation and Streaming twitter data using flume", Available: https://www.eduonix.com/blog/bigdata-and- hadoop/flume-installation-and-streaming-twitter-data-using-flume/, June 30, 2015, [Online; accessed 20-Oct-2016]
- " Twitter Statistics ", Available at: http://www.statisticbrain.con/twitter-statistics/, 2013, [Online; accessed 2-January-2016]
- V.K. Singh, R. Piryani, A. Uddin, P.Waila, "Sentiment Analysis of Movie Reviews. A new Feature-based Heuristic for Aspect-level Sentiment Classification.", International Multi-Conference on Automation, Computing, Communication, Control and Compressed Sensing (iMac4s), 22-23 March 2013.
- V.N.Khuc, C.Shivade, R.Ramnath, J.Ramanathan, "Towards Building Large-Scale Distributed Systems for Twitter Sentiment Analysis", 12 Proceedings of the 27th Annual ACM Symposium on Applied Computing, Pages 459-464, Trento, Italy, March 26-30, 2012 Wint Nyein Chan is a tutor of Computer University (Hpa-an). She received her M.C.Sc degree in computer science from Computer University (Dawei), Myanmar, in 2011. She is a Ph.D candidate of UCSY. Her research interests include big data, cloud computing, and machine learning. Dr. Thandar Thein received her M.Sc. (computer science) and Ph.D. degrees in 1996 and 2004, respectively from University of Computer Studies, Yangon (UCSY), Myanmar. She did post doctorate research in Korea Aerospace University. She is currently a Pro-Rector of University of Computer Studies, Maubin. Her research interests include cloud computing, mobile cloud computing, big data, digital forensic, security engineering, and network security.
- Authentication Using Graphical Passwords: Basic Results. Susan Wiedenbeck, Jim Waters. College of IST Drexel University Philadelphia, PA, 19104 USA. Susan.wiedenbeck@cis.drexel.edu jw65@drexel.edu
- R.N.Shepard, "Recognition memory for words, sentences, and pictures", Journal of Verbal Learning and Verbal Behavior, Vol. 6, pp. 156- 163, 1967.
- Stallings W. Cryptography and network security: principles and practices. Pearson Education India; 2006.
- Blonder, Greg E. "Graphical password." U.S. Patent No. 5,559,961. 24 Sep. 1996.
- Dhamija R, Perrig A. Deja Vu-A User Study: Using Images for Authentication. InUSENIX Security Symposium 2000 Aug 14 (Vol. 9, pp. 4-4).
- Suo X, Zhu Y, Owen GS. Graphical passwords: A survey. InComputer security applications conference, 21st annual 2005 Dec 5 (pp. 10- pp). IEEE.
- Wiedenbeck S, Waters J, Sobrado L, Birget JC. Design and evaluation of a shoulder-surfing resistant graphical password scheme. InProceedings of the working conference on Advanced visual interfaces 2006 May 23 (pp. 177-184). ACM.
- Jansen W. Authenticating mobile device users through image selection. WIT Transactions on Information and Communication Technologies. 2004 Apr 7;30.
- Takada T, Onuki T, Koike H. Awase-e: Recognition-based image authentication scheme using users' personal photographs. InInnovations in Information Technology, 2006 2006 Nov (pp. 1-5). IEEE.
- RealUser, "www.realuser.com," last accessed in June 2005.
- Eljetlawi AM. Graphical password: Usable graphical password prototype. J. Int'l Com. L. & Tech.. 2009;4:298.
- Rao KG, Vijayakumari R, Rao BB. 4-STAGE GRAPHICAL PASSWORD AUTHENTICATION SCHEME FOR CLOUD. Journal of Theoretical and Applied Information Technology. 2017;95(1):105.
- Vijayakumari Rodda, Gangadhar Rao Kancherla, Basaveswara Rao Bobba. Shoulder-Surfing Resistant Graphical Password System for Cloud. International Journal of Applied Engineering Research. 2017. Vol 12(16). Pp. 6091-6096.
- Shah, A., Ved, P., Deora, A., Jaiswal, A. and D'silva, M., 2015. Shoulder-surfing Resistant Graphical Password System. Procedia Computer Science, 45, pp.477-484.
- Danish, A., Sharma, L., Varshney, H. and Khan, A.M., 2016, March. Alignment based graphical password authentication system. In Computing for Sustainable Global Development (INDIACom), 2016 3rd International Conference on (pp. 2950-2954). IEEE.
- Gokhale, M.A.S. and Waghmare, V.S., 2016. The shoulder surfing resistant graphical password authentication technique. Procedia Computer Science, 79, pp.490-498.
- Bhand, A., Desale, V., Shirke, S. and Shirke, S.P., 2015, December. Enhancement of password authentication system using graphical images. In Information Processing (ICIP), 2015 International Conference on (pp. 217-219). IEEE. REFERENCES
- F. Lakrami, N. Elkamoun, and M. El Kamili. "An enforced QoS shceme for high mobile adhoc networks." In Wireless Networks and Mobile Communications (WINCOM), 2015 International Conference on, pp. 1- 8. IEEE, 2015.
- Frodigh M, Johansson P, Larsson P. Wireless ad hoc networking: the art of networking without a network. Ericsson review. 2000 Jan;4(4):249.
- F. Lakrami, N. Elkamoun "Mobility support in OLSR routing protocol". In Network computing and information security. 2012 Jan 1;345:804-12.
- D. Halperin, B. Greenstein, A. Sheth, D. Wetherall "Demystifying 802.11 n power consumption". InProceedings of the 2010 international conference on Power aware computing and systems 2010 Oct 3 (p. 1).
- M. Lauer, M. Matthes, M. Elan: " An e-learning infrastructure for ad- hoc networks" . InProceedings of the eighth ACM International Conference on Mobile Computing and Networking 2002 Sep (Vol. 7, No. 1, pp. 53-55).
- Skafidas, Efstratios, et al. "Method and apparatus for coverage and throughput enhancement in a wireless communication system." U.S. Patent No. 7,136,655. 14 Nov. 2006.
- Modeler, O. P. N. E. T. "Riverbed Technology." Inc. http://www. riverbed. com (2016). International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 9, September 2017 235 https://sites.google.com/site/ijcsis/ ISSN 1947-5500
- IX. References
- X. Liu et al., "Intrinsic colorization," ACM Trans. Graph., vol. 27, no. 5,pp. 152:1-152:9, Dec. 2008.
- J. Sivic, O. Whyte, and A. Zisserman, "Get out of my picture! Internet based in painting," presented at the Brit. Mach. Vis. Conf., London, U.K.,2009.
- J. Hays and A. A. Efros, "Scene completion using millions of photographs,"ACM Trans. Graph., vol. 26, no. 3, Jul. 2007.
- T. Chen, M. M. Cheng, P. Tan, A. Shamir, and S. M. Hu, "Sketch2Photo:Internet image montage," ACM Trans. Graph., vol. 28, no. 5, pp. 124:1-124:10, Dec. 2009.
- M. K. Johnson et al., "CG2Real: Improving the realism of computer generated images using a large collection of photographs," IEEE Trans.Vis. Comput. Graph., vol. 17, no.
- S. Jakubczak and D. Katabi, "A cross -layer design for scalable mobile cideo," in Proc. ACM 17th Annu. Int. Conf. Mobile Comput. Netw., 2011,pp. 289-300.
- H. Cui et al., "Cactus: A hybrid digital-analog wireless video communication system," in Proc. 16th ACM Int. Conf. Mod., Anal. Simul. Wireless Mobile Syst., 2013, pp. 273-278.
- F. Wu, X. Peng, and J. Xu, "LineCast: Line-based distributed coding and transmission for broadcasting satellite images," IEEE Trans. Image Process., vol. 23, no. 3, pp. 1015 -1027, Mar. 2014.
- Huanjing Yue, Xiaoyan Sun, Jingyu Yang "Cloud based image coding for mobile devices-Towards thoudsands to one compression" IEEE Trans.Multimedia., vol. 15, no. 3, pp. 845-857, June 2013.
- Jong Hyuk Park,Yunsick Sung,Pradip Kumar Sharma "Novel assessment method for accessing private data in social network security services"The journal of supercomputing., vol. 73, no. 3, pp. 3307-3325, July 2017.
- Nadeem Akhtar "Social network analysis tool "Proceedings of Fourth International conference on Communication systems and network technologies IEEE, May 2014
- Ekta Sanjeev Dhawan, Kulvinder Singh,Pradip Kumar Sharma"Feature Extraction and Content Investigation of Facebook Users' using Netviz and Gephi" Advances in Computer Science and Information Technology (ACSIT)., vol. 3, no. 4, pp. 262-265, June 2016. International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 9, September 2017 239 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 VII. REFERENCES
- Ge Yifan, Holly Chiang, and Connie Wu. "Classification of Book Genres By Cover and Title.",2015.
- Kaur Darvinder, and Vishal Gupta. "A survey of named entity recognition in English and other Indian languages." IJCSI International Journal of Computer Science Issues 7.6 (2010): 1694-0814.
- Lee, Yong-Bae, and Sung Hyon Myaeng. "Text genre classification with genre-revealing and subject-revealing features." Proceedings of the 25th annual international ACM SIGIR conference on Research and development in information retrieval. ACM, 2002.
- Mu, Yong. "Using Keyword Features to Automatically Classify Genre of Song Ci Poem." Workshop on Chinese Lexical Semantics. Springer International `Publishing, 2015.
- Raulji, Jaideepsinh K., and Jatinder Kumar R. Saini. "Stop-Word Removal Algorithm and its Implementation for Sanskrit Language."
- Song, Jia, et al. "A bi-directional sampling based on K-means method for imbalance text classification." Computer and Information Science (ICIS), 2016 IEEE/ACIS 15th International Conference on. IEEE, 2016.
- Stamatatos, Efstathios, Nikos Fakotakis, and George Kokkinakis. "Text genre detection using common word frequencies." Proceedings of the 18th conference on Computational linguistics-Volume 2. Association for Computational Linguistics, 2000. International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 9, September 2017 245 https://sites.google.com/site/ijcsis/ ISSN 1947-5500
- A.Alkhalifah, Geoff D. Skinner "Enhanced Knowledge Based Authentication Using Iterative Session Parameters" World Academy of Science, Engineering and Technology Vol.71 ,No.7,2010.
- IAM: OVERCOMING THE AUTHENTICATION CHALLENG ,2016 , white paper
- M. Just, "Account Recovery Challenges: Secure and Usable Authentication," Information Security Summit. 2009.
- Gkarafli, S. & Economides, A. A,"Comparing the proof by knowledge authentication techniques" International Journal of Computer Science and Security.Vol. 4 ,2010,pp. 237-255
- S. Sangeeth Kumar, and R Venkatesan. "Ranking of Authentication Schemes Based on Critical Limiting Factors." International Journal of Computer Applications Vol.92,No.7,2014.
- S. Hamilton, C. Carlisle, and A. Hamilton, "A Global Look at Authentication." Proceedings of the 2007 IEEE Workshop on Information Assurance United States Military Academy, West Point, NY 20-22 June 2007.
- A. Rabkin Personal knowledge questions for fallback authentication: Security questions in the era of Facebook. July 2008.
- M. Jakobsson, E. Stolterman and S. Liu Yang. Love and Authentication. April 2008.
- Hevner, A.R., et al., Design Science in Information Systems Research. MIS Quarterly, Vol.28,No.1,2004,p.p. 75-105.
- Creswell, John W. Research Design : Qualitative, Quantitative, and Mixed Methods Approaches. 3rd ed. Los Angeles: SAGE, 2009.
- Data Backup (Db)
- Customization (Cu) Table.2 List of QoS parameters [8] From the above table, the nine quantifiable attributes are calculated as follows [8] [9],
- Bandwidth: Network bandwidth refers to the number of bits transferred (sent/ received) in a single workload per unit time (usually in seconds).
- Computational Capacity: Computational capacity corresponds to the ratio between the actual usage time and the expected usage time.
- Availability: Availability refers to the recovery level of the system in case of failure.
- Correctness: Correctness defines the degree of accuracy provided to the cloud customers.
- Usability: Usability refers to the ratio of successful workload operations exhibited by the system.
- Reliability: Reliability refers to the time taken for the system to recover and operate successfully after a failure.
- Variable computing load: It is the change in the load balance with respect to time. Calculating the variance of the workload can be used to identify this parameter.
- Serviceability: Serviceability is the probability of the service being up and running.
- Latency: Latency is the difference between the workload input and output times. workload International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 9, September 2017 252 https://sites.google.com/site/ijcsis/ ISSN 1947-5500
- Peter Mell (NIST), Tim Grance (NIST), "The NIST Definition of Cloud Computing", September 2011
- Sunilkumar S et.al, "Resource management for Infrastructure as a Service (IaaS) in cloud computing: A survey", Journal of Network and Computer Applications 41(2014) , PP. 424- 440.
- Saurabh Kumar Garg,Steve Versteeg and Rajkumar buyya, " SMICloud: A Framework for comparing and Ranking Cloud Services", 2011 Fourth IEEE International Conference on Utility and Cloud Computing, PP.210-218.
- C.Madhumathi, Gopinath Ganapathy, "Cloud Package Selection for Academic Requirements using Multi Criteria Decision Making based Modified Ant Colony Optimization Technique" , Vol 8 No 2 Apr-May 2016, pp.1205-1211.
- Nie G., E. X., Chen D. (2012) Research on Service Level Agreement in Cloud Computing. In: Hu W. (eds) Advances in Electric and Electronics. Lecture Notes in Electrical Engineering, vol 155. Springer, Berlin, Heidelberg.
- C.Madhumathi, Gopinath Ganapathy, " Effective User Requirements Identification and SMI Parameter based WorkLoad Recommendation for Academic Clouds based on Usage logs", International Journal of Applied Engineering Research ISSN 0973-4562 Volume 11, Number 6 (2016) pp 4091-4096. International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 9, September 2017 255 https://sites.google.com/site/ijcsis/ ISSN 1947-5500
- C.Madhumathi, Gopinath Ganapathy, "Requirement Intensity based Resource Provisioning for e-Learning in Multi-cloud to Avoid Vendor Lock-ins" , volume 11 No.17, September 2016, pp. 1-8.
- Mohamed Firdhous, Suhaidi Hassan, Osman Ghazali, "A Comprehensive Survey on Quality of Service Implementations in Cloud Computing", International Journal of Scientific & Engineering Research, Volume 4, Issue 5, May-2013, pp.118-123.
- Vignesh V, Sendhil Kumar KS, Jaisankar N, "Resource Management and Scheduling in Cloud Environment", International Journal of Scientific and Research Publications, Volume 3, Issue 6, June 2013, pp.1-6.
- Linlin Wu and Rajkumar Buyya, "Service Level Agreement (SLA) in Utility Computing Systems". International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 9, September 2017 256 https://sites.google.com/site/ijcsis/ ISSN 1947-5500
- Yiannis Kompatsiaris, (2013), "Social Networks Mining for Innovative Applications and Users Well-Being".
- Fortunato, Santo "Community detection in graphs." Physics Reports 486.3 (2010): 75-174.
- Nguyen, Nam P., et al. "Adaptive algorithms for detecting community structure in dynamic social networks." INFOCOM, 2011 Proceedings IEEE. IEEE, 2011.
- Sadi, Sercan, Şima Etaner-Uyar, and Şule Gündüz-Öğüdücü.( 2009) "Community detection using ant colony optimization techniques."
- Justine Eustace, Xingyuan Wang and Yaozu Cui "Community detection using local neighborhood in complex networks" in Faculty of Electronic Information and Electrical Engineering, Dalian University of Technology, Dalian 116024, China
- Ranjan Kumar Behera, S. K. Rath and Monalisa Jena "Spanning Tree Based Community Detection using Min-Max Modularity" in 6th International Conference On Advances In Computing & Communications, ICACC 2016, 6-8 September 2016, Cochin, India.
- Lancichinetti, Andrea, and Santo Fortunato. "Community detection algorithms: a comparative analysis." Physical review E 80.5 (2009): 056117.
- Ke Xu, Xinfang Zhang ,Mining Community in Mobile Social Network, Procedia Engineering 29 (2012) 3080 -3084 International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 9, September 2017
- Sadi, Sercan, Sima Etaner-Uyar, and Sule Gündüz-Öğüdücü.( 2009) "Community detection using ant colony optimization techniques." Proc. Int. Conf. Soft Computing (MENDEL'09).
- Michalis Vazirgiannis, Christos Giatsidis and Fragkiskos D. Malliaros "Graph Mining Tools for Community Detection and Evaluation in Social Networks and the Web" in 22nd International World Wide Web Conference (WWW), May 13-17, 2013 | Rio de Janeiro, Brazil
- Guy, I., Avraham, U., Carmel, D., Ur, S., Jacovi, M., & Ronen, I. (2013, May). Mining expertise and interests from social media. InProceedings of the 22nd international conference on World Wide Web (pp. 515-526). International World Wide Web Conferences Steering Committee. International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 9, September 2017 262 https://sites.google.com/site/ijcsis/ ISSN 1947-5500
- References Xuefeng Liu, Yuqing Zhang, Member, IEEE, Boyang Wang, and Jingbo Yan, "Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud", IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 24, NO. 6, JUNE 2013
- Zhifeng Xiao and Yang Xiao, "Security and Privacy in Cloud Computing", IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 15, NO. 2, SECOND QUARTER 2013
- Huang Lin, Jun Shao, Chi Zhang, and Yuguang Fang, "CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring", IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 8, NO. 6, JUNE 2013
- Cheng-Kang Chu, Sherman S. M. Chow, Wen-Guey Tzeng, Jianying Zhou, "Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage", IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013. PA: Public Auditing, PP: Privacy Preserving, SDS: Secure Data Sharing, SE: Scalability Evaluation, TP: Third Party, TPS: Third Party Scalability International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 9, September 2017 270 https://sites.google.com/site/ijcsis/ ISSN 1947-5500
- Kaitai Liang, Man Ho Au, Member, IEEE, Joseph K. Liu, Willy Susilo,"A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing", IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 9, NO. 10, OCTOBER 2014
- Seung-Hyun Seo, Mohamed Nabeel, Xiaoyu Ding, and Elisa Bertino, "An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds", IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2014
- JunJie Qiu, JungBok Jo and HoonJae Lee. Collusion-Resistant Identity-Based Proxy Re-Encryption without Random Oracles. International Journal of Security and Its Applications Vol.9, No.9 (2015), pp.337-344
- Baojiang Cui, Zheli Liu and Lingyu Wang, "Key- Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage", IEEE TRANSACTIONS ON COMPUTERS, VOL. 6, NO. 1, JANUARY 2015
- Xinyi Huang, Joseph K. Liu+, Shaohua Tang, Yang Xiang, Kaitai Liang, Li Xu, Jianying Zhou, "Cost-Effective Authentic and Anonymous Data Sharing with Forward Security", IEEE Transactions on Computers, 2015
- Ximeng Liu, Baodong Qin, Robert H. Deng, Yingjiu Li, "An Efficient Privacy-Preserving Outsourced Computation over Public Data", IEEE Transactions on Services Computing, 2015.
- Mi Wen, Kaoru Ota, He Li, Jingsheng Lei, Chunhua Gu, and Zhou Su, "Secure Data Deduplication With Reliable Key Management for Dynamic Updates in CPSS", IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2015.
- Shungan Zhou, Ruiying Du, Jing Chen, Hua Deng, Jian Shen, Huanguo Zhang, "SSEM: Secure, Scalable and Efficient Multi-Owner Data Sharing in Clouds", China Communications, August 2016. International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 9, September 2017 271 https://sites.google.com/site/ijcsis/ ISSN 1947-5500
- Hayashi, S., K. Ganno and Y. Ishii, 2002. Robotic harvesting system for eggplant. JARQ, 36(3): 163-168.
- Wen, Z. and Y. Tao, 2000. Dual-camera NIR/MIR imaging for calyx identification in apple defect sorting. Trans. ASAE, 43(2): 449-452.
- Ahmad, U., Kondo, N., Monta, M., and Murase H. (2000). Machine vision based quality evaluation of Iyokan orange fruit using neural networks. Computers and Electronics in Agriculture, 29, 135-147.
- Blasco, J., Aleixos, N. and Molto E. (2003). Machine Vision System for Automatic Quality Grading of Fruit. Biosystems Engineering, 85(4), 415-423.
- Dah-Jye Lee, Robert Schoenberger b, James Archibald a, Steve McCollum. (2008) Development of a machine vision system for automatic date grading using digital reflective near-infrared imaging. Journal of Food Engineering 86 388-398.
- Diaz, R., Faus, a, G., Blasco, a. M., Blasco, J. and Molto E. (2000). The application of a fast algorithm for the classification of olives by machine vision. Food Research International 33 305-309.
- Kanae Tanigaki, Tateshi Fujiura, Akira Akase, Junichi Imagawa. (2008). Cherry-harvesting robot. Computers and Electronics in Agriculture, 63, 65-72.
- Urena, R., Rodriguez, F., Berenguel, M. (2001). A machine vision system for seeds germination quality evaluation using fuzzy logic. Computers and Electronics in Agriculture, 32, 1-20.
- G. M. Atiqur Rahaman, Md. Mobarak Hossain (2009), Automatic Defect Detection and Classification technique from image: A Special Case using Ceramic Tiles, International Journal of Computer Science and Information Security, Vol. 1(1).
- López-García, F., et al.: Automatic detection of skin defects in citrus fruits using amultivariate image analysis approach. Comput. Electron. Agric. 71(2), 189-197 (2010)
- Barnes, M., et al.: Visual detection of blemishes in potatoes using minimalist boosted classifiers. J. Food Eng. 98(3), 339- 346 (2010)
- Xiao-bo, Z., et al.: In-line detection of apple defects using three color cameras system. Comput. Electron. Agric. 70(1), 129-134 (2010)
- Ho, S.-Y., Lee, K.-Z.: Design and analysis of an efficient evolutionary image segmentation Algorithm. J. VLSI Signal Process. Syst. Signal Image Video Technol. 35, 29-42 (2003)
- Mery, D., Pedreschi, F.: Segmentation of color food images using a robust algorithm. J. Food Eng. 66(3), 353-360 (2005)
- Riquelme, M.T., et al.: Olive classification according to external damage using image analysis. J. Food Eng. 87(3), 371-379 (2008)
- Rashmi Pandey, Sapan Naik and Roma Marfatia, "Image Processing and Machine Learning for Automated Fruit Grading System: A Technical Review", International Journal of Computer Applications (0975 -8887), Volume 81 -No 16, November 2013 International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 9, September 2017 276 https://sites.google.com/site/ijcsis/ ISSN 1947-5500
- T. Morimoto, T. Takeuchi, H. Miyata, Y. Hashimoto,"Pattern recognition of fruit shape based on the concept of chaos and neural networks",Computers and Electronics in Agriculture, vol. 26, pp. 171-186, 2000.
- Yousef Al Ohali, "Computer vision based date fruit grading system: Design and implementation," Journal of King Saud University -Computer and Information Sciences, vol. 23, no. 1, pp. 29-39, January 2011.
- Daniel Stanley Tan1, Robert Neil Leong, Ann Franchesca Laguna, Courtney Anne Ngo1 and Angelyn, "A Method for Detecting and Segmenting Infected Part of Cacao Pods", DLSU Research Congress 2016, De La Salle University, Manila, Philippines, March 7-9, 2016
- Sherlin Varughese , Nayana Shinde , Swapnali Yadav and Jignesh Sisodia, "Learning-Based Fruit Disease Detection Using Image Processing", International Journal of Innovative and Emerging Research in Engineering Volume 3, Issue 2, 2016.
- Jianwei Qin, Thomas F. Burks, Xuhui Zhao, Nikhil Niphadkar, Mark A. Ritenour, "Development of a two-band spectral imaging system for real-time citrus canker detection", Elsevier Journal of Food Engineering 108 (2012) 87-93.
- Giacomo Capizzi, Grazia Lo Sciuto, Christian Napoli And Emiliano Tramontana, "A Novel Neural Networks-based texture image processing algorithm for orange defects classification", International Journal of Computer Science and Applications,Technomathematics Research Foundation, Vol. 13, No. 2, pp. 45 -60, 2016
- M. Pawan Kumar, P.H.S. Torr, and A. Zisserman, "OBJCUT: Efficient Segmentation Using Top-Down and Bottom-Up Cues", IEEE transactions on pattern analysis and machine intelligence, vol. 32, no. 3, MARCH 2010.
- S.Loncaric, A survey of shape analysis techniques, Pattern Recognition 31(8) (1998) 983-1001.
- I.Dryden, K.Mardia, Statistical Shape Analysis, Wiley, London,1998. International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 9, September 2017 277 https://sites.google.com/site/ijcsis/ ISSN 1947-5500
- Pena, J.M., Lozano, J.A., Larranaga, P, "An empirical comparison of four initialization methods for the KMeans algorithm", Pattern Recognition Letters 20 (1999) pp. 1027-1040
- Chakrabarti,K., Mehrotra,S. "Local Dimensionality Reduction: A New Approach to Indexing High Dimensional Spaces" , In Proceedings of the 26 th International Conference on Very Large Databases, Cairo,Egypt,89- 100,2000
- Jiawei Han M. K, "Data Mining Concepts and Techniques", Morgan Kaufmann Publishers, An Imprint of Elsevier, 2006.
- Margaret H. Dunham, "Data Mining-Introductory and Advanced Concepts", Pearson Education, 2006
- Huang Z, "Extensions to the k-means algorithm for clustering large data sets with categorical values," Data Mining and Knowledge Discovery, (2):283-304, 1998.
- Chaturvedi J. C. A, Green P, "K-modes clustering," J. Classification, (18):35-55, 2001.
- Daxin Jiang, Chum Tong and Aidong Zhang, "Cluster Analysis for Gene Expression Data," IEEE Transactions on Data and Knowledge Engineering, 16(11): 1370-1386, 2004
- Yuan F, Meng Z. H, Zhang H. X and Dong C. R, "A New Algorithm to Get the Initial Centroids," Proc. of the 3rd International Conference on Machine Learning and Cybernetics, pages 26-29, August 2004
- Fahim A.M, Salem A. M, Torkey A and Ramadan M. A, "An Efficient enhanced k-means clustering algorithm," Journal of Zhejiang University, 10(7):1626-1633, 2006.
- Grigorios Tzortzis and Aristidis Likas , "The MinMax k-Means clustering algorithm", An Imprint of Elsevier, 2014
- Guojun Gan and Michael Kwok-Po Ng, "k-means clustering with outlier removal", Pattern Recognition Letters 90 (2017) 8-14
- Kun Niu, Zhipeng Gao, Haizhen Jiao, Nanjie Deng, "K-Means+: A Developed Clustering Algorithm for Big Data", Proceedings of CCIS 2016 International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 9, September 2017 281 https://sites.google.com/site/ijcsis/ ISSN 1947-5500
- Assoc. Prof. N. Jaisankar, VIT University, Vellore,Tamilnadu, India Dr. Amogh Kavimandan, The Mathworks Inc., USA Dr. Ramasamy Mariappan, Vinayaka Missions University, India Dr. Yong Li, School of Electronic and Information Engineering, Beijing Jiaotong University, P.R. China Assist. Prof. Sugam Sharma, NIET, India / Iowa State University, USA Dr.
- Jorge A. Ruiz-Vanoye, Universidad Autónoma del Estado de Morelos, Mexico Dr. Neeraj Kumar, SMVD University, Katra (J&K), India
- Dr Genge Bela, "Petru Maior" University of Targu Mures, Romania Dr. Junjie Peng, Shanghai University, P. R. China Dr. Ilhem LENGLIZ, HANA Group -CRISTAL Laboratory, Tunisia Prof. Dr. Durgesh Kumar Mishra, Acropolis Institute of Technology and Research, Indore, MP, India Dr. Jorge L. Hernández-Ardieta, University Carlos III of Madrid, Spain Prof. Dr.C.Suresh Gnana Dhas, Anna University, India Dr Li Fang, Nanyang Technological University, Singapore Prof. Pijush Biswas, RCC Institute of Information Technology, India Dr. Siddhivinayak Kulkarni, University of Ballarat, Ballarat, Victoria, Australia Dr. A. Arul Lawrence, Royal College of Engineering & Technology, India Dr. Wongyos Keardsri, Chulalongkorn University, Bangkok, Thailand Dr. Somesh Kumar Dewangan, CSVTU Bhilai (C.G.)/ Dimat Raipur, India Dr. Hayder N. Jasem, University Putra Malaysia, Malaysia Dr.
- A.V.Senthil Kumar, C. M. S. College of Science and Commerce, India Dr. R. S. Karthik, C. M. S. College of Science and Commerce, India Dr. P. Vasant, University Technology Petronas, Malaysia Dr. Wong Kok Seng, Soongsil University, Seoul, South Korea Dr. Praveen Ranjan Srivastava, BITS PILANI, India Dr. Kong Sang Kelvin, Leong, The Hong Kong Polytechnic University, Hong Kong Dr. Mohd Nazri Ismail, Universiti Kuala Lumpur, Malaysia Dr. Rami J. Matarneh, Al-isra Private University, Amman, Jordan Dr Ojesanmi Olusegun Ayodeji, Ajayi Crowther University, Oyo, Nigeria Dr. Riktesh Srivastava, Skyline University, UAE Dr. Oras F. Baker, UCSI University -Kuala Lumpur, Malaysia Dr.
- Ahmed S. Ghiduk, Faculty of Science, Beni-Suef University, Egypt and Department of Computer science, Taif University, Saudi Arabia Dr. Tirthankar Gayen, IIT Kharagpur, India Dr. Huei-Ru Tseng, National Chiao Tung University, Taiwan Prof. Ning Xu, Wuhan University of Technology, China Dr Mohammed Salem Binwahlan, Hadhramout University of Science and Technology, Yemen & Universiti Teknologi Malaysia, Malaysia.
- Dr. Aruna Ranganath, Bhoj Reddy Engineering College for Women, India Dr. Hafeezullah Amin, Institute of Information Technology, KUST, Kohat, Pakistan (IJCSIS) International Journal of Computer Science and Information Security, Vol. 15 No. 9, September 2017
- Prof. Syed S. Rizvi, University of Bridgeport, USA Dr. Shahbaz Pervez Chattha, University of Engineering and Technology Taxila, Pakistan Dr. Shishir Kumar, Jaypee University of Information Technology, Wakanaghat (HP), India Dr. Shahid Mumtaz, Portugal Telecommunication, Instituto de Telecomunicações (IT) , Aveiro, Portugal Dr. Rajesh K Shukla, Corporate Institute of Science & Technology Bhopal M P Dr. Poonam Garg, Institute of Management Technology, India Dr. S. Mehta, Inha University, Korea Dr. Dilip Kumar S.M, Bangalore University, Bangalore Prof. Malik Sikander Hayat Khiyal, Fatima Jinnah Women University, Rawalpindi, Pakistan Dr. Virendra Gomase , Department of Bioinformatics, Padmashree Dr. D.Y. Patil University Dr. Irraivan Elamvazuthi, University Technology PETRONAS, Malaysia Dr. Saqib Saeed, University of Siegen, Germany Dr. Pavan Kumar Gorakavi, IPMA-USA [YC] Dr. Ahmed Nabih Zaki Rashed, Menoufia University, Egypt Prof. Shishir K. Shandilya, Rukmani Devi Institute of Science & Technology, India Dr. J. Komala Lakshmi, SNR Sons College, Computer Science, India Dr. Muhammad Sohail, KUST, Pakistan Dr. Manjaiah D.H, Mangalore University, India Dr. S Santhosh Baboo, D.G.Vaishnav College, Chennai, India Prof. Dr. Mokhtar Beldjehem, Sainte-Anne University, Halifax, NS, Canada Dr. Deepak Laxmi Narasimha, University of Malaya, Malaysia Prof. Dr. Arunkumar Thangavelu, Vellore Institute Of Technology, India Dr. M. Azath, Anna University, India Dr. Md. Rabiul Islam, Rajshahi University of Engineering & Technology (RUET), Bangladesh Dr. Aos Alaa Zaidan Ansaef, Multimedia University, Malaysia Dr Suresh Jain, Devi Ahilya University, Indore (MP) India, Dr.
- Mohammed M. Kadhum, Universiti Utara Malaysia Dr. Hanumanthappa. J. University of Mysore, India Dr. Syed Ishtiaque Ahmed, Bangladesh University of Engineering and Technology (BUET)
- Dr Akinola Solomon Olalekan, University of Ibadan, Ibadan, Nigeria Dr. Santosh K. Pandey, The Institute of Chartered Accountants of India Dr. P. Vasant, Power Control Optimization, Malaysia Dr. Petr Ivankov, Automatika -S, Russian Federation Dr. Utkarsh Seetha, Data Infosys Limited, India Mrs. Priti Maheshwary, Maulana Azad National Institute of Technology, Bhopal Dr. (Mrs) Padmavathi Ganapathi, Avinashilingam University for Women, Coimbatore Assist. Prof. A. Neela madheswari, Anna university, India Prof. Ganesan Ramachandra Rao, PSG College of Arts and Science, India Mr. Kamanashis Biswas, Daffodil International University, Bangladesh Dr. Atul Gonsai, Saurashtra University, Gujarat, India Mr. Angkoon Phinyomark, Prince of Songkla University, Thailand Mrs. G. Nalini Priya, Anna University, Chennai Dr. P. Subashini, Avinashilingam University for Women, India Assoc. Prof. Vijay Kumar Chakka, Dhirubhai Ambani IICT, Gandhinagar ,Gujarat Mr Jitendra Agrawal, : Rajiv Gandhi Proudyogiki Vishwavidyalaya, Bhopal Mr. Vishal Goyal, Department of Computer Science, Punjabi University, India Dr. R. Baskaran, Department of Computer Science and Engineering, Anna University, Chennai (IJCSIS) International Journal of Computer Science and Information Security, Vol. 15 No. 9, September 2017
- Assist. Prof, Kanwalvir Singh Dhindsa, B.B.S.B.Engg.College, Fatehgarh Sahib (Punjab), India Dr. Jamal Ahmad Dargham, School of Engineering and Information Technology, Universiti Malaysia Sabah Mr. Nitin Bhatia, DAV College, India Dr. Dhavachelvan Ponnurangam, Pondicherry Central University, India Dr. Mohd Faizal Abdollah, University of Technical Malaysia, Malaysia Assist. Prof. Sonal Chawla, Panjab University, India Dr. Abdul Wahid, AKG Engg. College, Ghaziabad, India Mr. Arash Habibi Lashkari, University of Malaya (UM), Malaysia Mr. Md. Rajibul Islam, Ibnu Sina Institute, University Technology Malaysia Professor Dr. Sabu M. Thampi, .B.S Institute of Technology for Women, Kerala University, India Mr. Noor Muhammed Nayeem, Université Lumière Lyon 2, 69007 Lyon, France Dr. Himanshu Aggarwal, Department of Computer Engineering, Punjabi University, India
- Prof R. Naidoo, Dept of Mathematics/Center for Advanced Computer Modelling, Durban University of Technology, Durban,South Africa Prof. Mydhili K Nair, Visweswaraiah Technological University, Bangalore, India M. Prabu, Adhiyamaan College of Engineering/Anna University, India Mr. Swakkhar Shatabda, United International University, Bangladesh Dr. Abdur Rashid Khan, ICIT, Gomal University, Dera Ismail Khan, Pakistan Mr. H. Abdul Shabeer, I-Nautix Technologies,Chennai, India Dr.
- M. Aramudhan, Perunthalaivar Kamarajar Institute of Engineering and Technology, India Dr.
- M. P. Thapliyal, Department of Computer Science, HNB Garhwal University (Central University), India Dr. Shahaboddin Shamshirband, Islamic Azad University, Iran Mr. Zeashan Hameed Khan, Université de Grenoble, France Prof. Anil K Ahlawat, Ajay Kumar Garg Engineering College, Ghaziabad, UP Technical University, Lucknow Mr. Longe Olumide Babatope, University Of Ibadan, Nigeria Associate Prof. Raman Maini, University College of Engineering, Punjabi University, India Dr. Maslin Masrom, University Technology Malaysia, Malaysia Sudipta Chattopadhyay, Jadavpur University, Kolkata, India Dr. Dang Tuan NGUYEN, University of Information Technology, Vietnam National University -Ho Chi Minh City Dr. Mary Lourde R., BITS-PILANI Dubai , UAE Dr. Abdul Aziz, University of Central Punjab, Pakistan Mr. Karan Singh, Gautam Budtha University, India Mr. Avinash Pokhriyal, Uttar Pradesh Technical University, Lucknow, India Associate Prof Dr Zuraini Ismail, University Technology Malaysia, Malaysia Assistant Prof. Yasser M. Alginahi, Taibah University, Madinah Munawwarrah, KSA Mr. Dakshina Ranjan Kisku, West Bengal University of Technology, India Mr. Raman Kumar, Dr B R Ambedkar National Institute of Technology, Jalandhar, Punjab, India Associate Prof. Samir B. Patel, Institute of Technology, Nirma University, India Dr. M.Munir Ahamed Rabbani, B. S. Abdur Rahman University, India Asst. Prof. Koushik Majumder, West Bengal University of Technology, India Dr. Alex Pappachen James, Queensland Micro-nanotechnology center, Griffith University, Australia Assistant Prof. S. Hariharan, B.S. Abdur Rahman University, India Asst Prof. Jasmine. K. S, R.V.College of Engineering, India Mr Naushad Ali Mamode Khan, Ministry of Education and Human Resources, Mauritius Prof. Mahesh Goyani, G H Patel Collge of Engg. & Tech, V.V.N, Anand, Gujarat, India Dr. Mana Mohammed, University of Tlemcen, Algeria Prof. Jatinder Singh, Universal Institutiion of Engg. & Tech. CHD, India (IJCSIS) International Journal of Computer Science and Information Security, Vol. 15 No. 9, September 2017
- Mrs. M. Anandhavalli Gauthaman, Sikkim Manipal Institute of Technology, Majitar, East Sikkim Dr. Bin Guo, Institute Telecom SudParis, France Mrs. Maleika Mehr Nigar Mohamed Heenaye-Mamode Khan, University of Mauritius Prof. Pijush Biswas, RCC Institute of Information Technology, India Mr. V. Bala Dhandayuthapani, Mekelle University, Ethiopia Dr. Irfan Syamsuddin, State Polytechnic of Ujung Pandang, Indonesia Mr. Kavi Kumar Khedo, University of Mauritius, Mauritius Mr. Ravi Chandiran, Zagro Singapore Pte Ltd. Singapore Mr. Milindkumar V. Sarode, Jawaharlal Darda Institute of Engineering and Technology, India Dr. Shamimul Qamar, KSJ Institute of Engineering & Technology, India Dr. C. Arun, Anna University, India Assist. Prof. M.N.Birje, Basaveshwar Engineering College, India Prof. Hamid Reza Naji, Department of Computer Enigneering, Shahid Beheshti University, Tehran, Iran Assist. Prof. Debasis Giri, Department of Computer Science and Engineering, Haldia Institute of Technology Subhabrata Barman, Haldia Institute of Technology, West Bengal Mr.
- M. I. Lali, COMSATS Institute of Information Technology, Islamabad, Pakistan Dr. Feroz Khan, Central Institute of Medicinal and Aromatic Plants, Lucknow, India Mr. R. Nagendran, Institute of Technology, Coimbatore, Tamilnadu, India Mr. Amnach Khawne, King Mongkut's Institute of Technology Ladkrabang, Ladkrabang, Bangkok, Thailand Dr. P. Chakrabarti, Sir Padampat Singhania University, Udaipur, India Mr. Nafiz Imtiaz Bin Hamid, Islamic University of Technology (IUT), Bangladesh.
- Shahab-A. Shamshirband, Islamic Azad University, Chalous, Iran Prof. B. Priestly Shan, Anna Univeristy, Tamilnadu, India Venkatramreddy Velma, Dept. of Bioinformatics, University of Mississippi Medical Center, Jackson MS USA Akshi Kumar, Dept. of Computer Engineering, Delhi Technological University, India Dr. Umesh Kumar Singh, Vikram University, Ujjain, India Mr. Serguei A. Mokhov, Concordia University, Canada Mr. Lai Khin Wee, Universiti Teknologi Malaysia, Malaysia Dr. Awadhesh Kumar Sharma, Madan Mohan Malviya Engineering College, India Mr. Syed R. Rizvi, Analytical Services & Materials, Inc., USA Dr. S. Karthik, SNS Collegeof Technology, India Mr. Syed Qasim Bukhari, CIMET (Universidad de Granada), Spain Mr. A.D.Potgantwar, Pune University, India Dr. Himanshu Aggarwal, Punjabi University, India Mr. Rajesh Ramachandran, Naipunya Institute of Management and Information Technology, India Dr. K.L. Shunmuganathan, R.M.K Engg College , Kavaraipettai ,Chennai Dr. Prasant Kumar Pattnaik, KIST, India.
- Dr. Ch. Aswani Kumar, VIT University, India Mr. Ijaz Ali Shoukat, King Saud University, Riyadh KSA Mr. Arun Kumar, Sir Padam Pat Singhania University, Udaipur, Rajasthan Mr. Muhammad Imran Khan, Universiti Teknologi PETRONAS, Malaysia Dr. Natarajan Meghanathan, Jackson State University, Jackson, MS, USA Mr. Mohd Zaki Bin Mas'ud, Universiti Teknikal Malaysia Melaka (UTeM), Malaysia
- Prof. Dr. R. Geetharamani, Dept. of Computer Science and Eng., Rajalakshmi Engineering College, India Dr. Smita Rajpal, Institute of Technology and Management, Gurgaon, India Dr. S. Abdul Khader Jilani, University of Tabuk, Tabuk, Saudi Arabia Mr. Syed Jamal Haider Zaidi, Bahria University, Pakistan (IJCSIS) International Journal of Computer Science and Information Security, Vol. 15 No. 9, September 2017
- Dr. N. Devarajan, Government College of Technology,Coimbatore, Tamilnadu, INDIA Mr. R. Jagadeesh Kannan, RMK Engineering College, India Mr. Deo Prakash, Shri Mata Vaishno Devi University, India Mr. Mohammad Abu Naser, Dept. of EEE, IUT, Gazipur, Bangladesh Assist. Prof. Prasun Ghosal, Bengal Engineering and Science University, India Mr. Md. Golam Kaosar, School of Engineering and Science, Victoria University, Melbourne City, Australia Mr. R. Mahammad Shafi, Madanapalle Institute of Technology & Science, India Dr. F.Sagayaraj Francis, Pondicherry Engineering College,India Dr. Ajay Goel, HIET , Kaithal, India Mr. Nayak Sunil Kashibarao, Bahirji Smarak Mahavidyalaya, India Mr. Suhas J Manangi, Microsoft India Dr.
- Kalyankar N. V., Yeshwant Mahavidyalaya, Nanded , India Dr. K.D. Verma, S.V. College of Post graduate studies & Research, India Dr. Amjad Rehman, University Technology Malaysia, Malaysia Mr. Rachit Garg, L K College, Jalandhar, Punjab Mr. J. William, M.A.M college of Engineering, Trichy, Tamilnadu,India Prof. Jue-Sam Chou, Nanhua University, College of Science and Technology, Taiwan Dr. Thorat S.B., Institute of Technology and Management, India Mr. Ajay Prasad, Sir Padampat Singhania University, Udaipur, India Dr. Kamaljit I. Lakhtaria, Atmiya Institute of Technology & Science, India Mr. Syed Rafiul Hussain, Ahsanullah University of Science and Technology, Bangladesh Mrs Fazeela Tunnisa, Najran University, Kingdom of Saudi Arabia Mrs Kavita Taneja, Maharishi Markandeshwar University, Haryana, India Mr. Maniyar Shiraz Ahmed, Najran University, Najran, KSA Mr. Anand Kumar, AMC Engineering College, Bangalore Dr. Rakesh Chandra Gangwar, Beant College of Engg. & Tech., Gurdaspur (Punjab) India Dr.
- V V Rama Prasad, Sree Vidyanikethan Engineering College, India Assist. Prof. Neetesh Kumar Gupta, Technocrats Institute of Technology, Bhopal (M.P.), India Mr.
- Ashish Seth, Uttar Pradesh Technical University, Lucknow ,UP India Dr.
- V V S S S Balaram, Sreenidhi Institute of Science and Technology, India Mr Rahul Bhatia, Lingaya's Institute of Management and Technology, India Prof. Niranjan Reddy. P, KITS , Warangal, India Prof. Rakesh. Lingappa, Vijetha Institute of Technology, Bangalore, India Dr. Mohammed Ali Hussain, Nimra College of Engineering & Technology, Vijayawada, A.P., India Dr.
- A.Srinivasan, MNM Jain Engineering College, Rajiv Gandhi Salai, Thorapakkam, Chennai Mr. Rakesh Kumar, M.M. University, Mullana, Ambala, India Dr. Lena Khaled, Zarqa Private University, Aman, Jordon Ms. Supriya Kapoor, Patni/Lingaya's Institute of Management and Tech., India Dr. Tossapon Boongoen , Aberystwyth University, UK Dr . Bilal Alatas, Firat University, Turkey Assist. Prof. Jyoti Praaksh Singh , Academy of Technology, India Dr. Ritu Soni, GNG College, India Dr . Mahendra Kumar , Sagar Institute of Research & Technology, Bhopal, India.
- Dr. Binod Kumar, Lakshmi Narayan College of Tech.(LNCT)Bhopal India Dr. Muzhir Shaban Al-Ani, Amman Arab University Amman -Jordan Dr. T.C. Manjunath , ATRIA Institute of Tech, India Mr. Muhammad Zakarya, COMSATS Institute of Information Technology (CIIT), Pakistan (IJCSIS) International Journal of Computer Science and Information Security, Vol. 15 No. 9, September 2017
- Assist. Prof. Harmunish Taneja, M. M. University, India Dr. Chitra Dhawale , SICSR, Model Colony, Pune, India Mrs Sankari Muthukaruppan, Nehru Institute of Engineering and Technology, Anna University, India Mr. Aaqif Afzaal Abbasi, National University Of Sciences And Technology, Islamabad Prof. Ashutosh Kumar Dubey, Trinity Institute of Technology and Research Bhopal, India Mr. G. Appasami, Dr. Pauls Engineering College, India Mr. M Yasin, National University of Science and Tech, karachi (NUST), Pakistan Mr. Yaser Miaji, University Utara Malaysia, Malaysia Mr. Shah Ahsanul Haque, International Islamic University Chittagong (IIUC), Bangladesh Prof. (Dr) Syed Abdul Sattar, Royal Institute of Technology & Science, India Dr. S. Sasikumar, Roever Engineering College Assist. Prof. Monit Kapoor, Maharishi Markandeshwar University, India Mr. Nwaocha Vivian O, National Open University of Nigeria Dr.
- M. S. Vijaya, GR Govindarajulu School of Applied Computer Technology, India Assist. Prof. Chakresh Kumar, Manav Rachna International University, India Mr. Kunal Chadha , R&D Software Engineer, Gemalto, Singapore Mr. Mueen Uddin, Universiti Teknologi Malaysia, UTM , Malaysia Dr. Dhuha Basheer abdullah, Mosul university, Iraq Mr. S. Audithan, Annamalai University, India Prof. Vijay K Chaudhari, Technocrats Institute of Technology , India Associate Prof. Mohd Ilyas Khan, Technocrats Institute of Technology , India Dr. Vu Thanh Nguyen, University of Information Technology, HoChiMinh City, VietNam Assist. Prof. Anand Sharma, MITS, Lakshmangarh, Sikar, Rajasthan, India Prof.
- T V Narayana Rao, HITAM Engineering college, Hyderabad Mr. Deepak Gour, Sir Padampat Singhania University, India Assist. Prof. Amutharaj Joyson, Kalasalingam University, India Mr. Ali Balador, Islamic Azad University, Iran Mr. Mohit Jain, Maharaja Surajmal Institute of Technology, India Mr. Dilip Kumar Sharma, GLA Institute of Technology & Management, India Dr. Debojyoti Mitra, Sir padampat Singhania University, India Dr. Ali Dehghantanha, Asia-Pacific University College of Technology and Innovation, Malaysia Mr. Zhao Zhang, City University of Hong Kong, China Prof.
- S.P. Setty, A.U. College of Engineering, India Prof. Patel Rakeshkumar Kantilal, Sankalchand Patel College of Engineering, India Mr. Biswajit Bhowmik, Bengal College of Engineering & Technology, India Mr. Manoj Gupta, Apex Institute of Engineering & Technology, India Assist. Prof. Ajay Sharma, Raj Kumar Goel Institute Of Technology, India Assist. Prof. Ramveer Singh, Raj Kumar Goel Institute of Technology, India Dr. Hanan Elazhary, Electronics Research Institute, Egypt Dr. Hosam I. Faiq, USM, Malaysia Prof. Dipti D. Patil, MAEER's MIT College of Engg. & Tech, Pune, India Assist. Prof. Devendra Chack, BCT Kumaon engineering College Dwarahat Almora, India Prof. Manpreet Singh, M. M. Engg. College, M. M. University, India Assist. Prof. M. Sadiq ali Khan, University of Karachi, Pakistan Mr. Prasad S. Halgaonkar, MIT -College of Engineering, Pune, India Dr. Imran Ghani, Universiti Teknologi Malaysia, Malaysia Prof. Varun Kumar Kakar, Kumaon Engineering College, Dwarahat, India (IJCSIS) International Journal of Computer Science and Information Security, Vol. 15 No. 9, September 2017
- Assist. Prof. Nisheeth Joshi, Apaji Institute, Banasthali University, Rajasthan, India Associate Prof. Kunwar S. Vaisla, VCT Kumaon Engineering College, India Prof Anupam Choudhary, Bhilai School Of Engg.,Bhilai (C.G.),India Mr. Divya Prakash Shrivastava, Al Jabal Al garbi University, Zawya, Libya Associate Prof. Dr. V. Radha, Avinashilingam Deemed university for women, Coimbatore. Dr. Kasarapu Ramani, JNT University, Anantapur, India Dr. Anuraag Awasthi, Jayoti Vidyapeeth Womens University, India Dr.
- C G Ravichandran, R V S College of Engineering and Technology, India Dr.
- Mohamed A. Deriche, King Fahd University of Petroleum and Minerals, Saudi Arabia Mr. Abbas Karimi, Universiti Putra Malaysia, Malaysia Mr. Amit Kumar, Jaypee University of Engg. and Tech., India Dr. Nikolai Stoianov, Defense Institute, Bulgaria Assist. Prof. S. Ranichandra, KSR College of Arts and Science, Tiruchencode Mr.
- T.K.P. Rajagopal, Diamond Horse International Pvt Ltd, India Dr. Md. Ekramul Hamid, Rajshahi University, Bangladesh Mr. Hemanta Kumar Kalita , TATA Consultancy Services (TCS), India Dr. Messaouda Azzouzi, Ziane Achour University of Djelfa, Algeria Prof. (Dr.) Juan Jose Martinez Castillo, "Gran Mariscal de Ayacucho" University and Acantelys research Group, Venezuela Dr. Jatinderkumar R. Saini, Narmada College of Computer Application, India Dr. Babak Bashari Rad, University Technology of Malaysia, Malaysia Dr. Nighat Mir, Effat University, Saudi Arabia Prof. (Dr.) G.M.Nasira, Sasurie College of Engineering, India Mr. Varun Mittal, Gemalto Pte Ltd, Singapore Assist. Prof. Mrs P. Banumathi, Kathir College Of Engineering, Coimbatore Assist. Prof. Quan Yuan, University of Wisconsin-Stevens Point, US Dr. Pranam Paul, Narula Institute of Technology, Agarpara, West Bengal, India Assist. Prof. J. Ramkumar, V.L.B Janakiammal college of Arts & Science, India Mr. P. Sivakumar, Anna university, Chennai, India Mr. Md. Humayun Kabir Biswas, King Khalid University, Kingdom of Saudi Arabia Mr. Mayank Singh, J.P. Institute of Engg & Technology, Meerut, India HJ. Kamaruzaman Jusoff, Universiti Putra Malaysia Mr. Nikhil Patrick Lobo, CADES, India Dr. Amit Wason, Rayat-Bahra Institute of Engineering & Boi-Technology, India Dr. Rajesh Shrivastava, Govt. Benazir Science & Commerce College, Bhopal, India Assist. Prof. Vishal Bharti, DCE, Gurgaon Mrs. Sunita Bansal, Birla Institute of Technology & Science, India Dr. R. Sudhakar, Dr.Mahalingam college of Engineering and Technology, India Dr. Amit Kumar Garg, Shri Mata Vaishno Devi University, Katra(J&K), India
- Assist. Prof. Raj Gaurang Tiwari, AZAD Institute of Engineering and Technology, India Mr. Hamed Taherdoost, Tehran, Iran Mr. Amin Daneshmand Malayeri, YRC, IAU, Malayer Branch, Iran Mr. Shantanu Pal, University of Calcutta, India Dr. Terry H. Walcott, E-Promag Consultancy Group, United Kingdom Dr. Ezekiel U OKIKE, University of Ibadan, Nigeria Mr. P. Mahalingam, Caledonian College of Engineering, Oman Dr. Mahmoud M. A. Abd Ellatif, Mansoura University, Egypt (IJCSIS) International Journal of Computer Science and Information Security, Vol. 15 No. 9, September 2017
- Prof. Kunwar S. Vaisla, BCT Kumaon Engineering College, India Prof. Mahesh H. Panchal, Kalol Institute of Technology & Research Centre, India Mr. Muhammad Asad, Technical University of Munich, Germany Mr. AliReza Shams Shafigh, Azad Islamic university, Iran Prof. S. V. Nagaraj, RMK Engineering College, India Mr.
- Ashikali M Hasan, Senior Researcher, CelNet security, India Dr. Adnan Shahid Khan, University Technology Malaysia, Malaysia Mr. Prakash Gajanan Burade, Nagpur University/ITM college of engg, Nagpur, India Dr. Jagdish B.Helonde, University/ITM college of engg, Nagpur, India Professor, Doctor BOUHORMA Mohammed, Univertsity Abdelmalek Essaadi, Morocco Mr. K. Thirumalaivasan, Pondicherry Engg. College, India Mr. Umbarkar Anantkumar Janardan, Walchand College of Engineering, India Mr.
- Ashish Chaurasia, Gyan Ganga Institute of Technology & Sciences, India Mr. Sunil Taneja, Kurukshetra University, India Mr. Fauzi Adi Rafrastara, Dian Nuswantoro University, Indonesia Dr. Yaduvir Singh, Thapar University, India Dr. Ioannis V. Koskosas, University of Western Macedonia, Greece Dr. Vasantha Kalyani David, Avinashilingam University for women, Coimbatore Dr. Ahmed Mansour Manasrah, Universiti Sains Malaysia, Malaysia Miss. Nazanin Sadat Kazazi, University Technology Malaysia, Malaysia Mr. Saeed Rasouli Heikalabad, Islamic Azad University -Tabriz Branch, Iran Assoc. Prof. Dhirendra Mishra, SVKM's NMIMS University, India Prof. Shapoor Zarei, UAE Inventors Association, UAE Prof. B.Raja Sarath Kumar, Lenora College of Engineering, India Dr. Bashir Alam, Jamia millia Islamia, Delhi, India Prof. Anant J Umbarkar, Walchand College of Engg., India Assist. Prof. B. Bharathi, Sathyabama University, India Dr. Fokrul Alom Mazarbhuiya, King Khalid University, Saudi Arabia Prof.
- T.S.Jeyali Laseeth, Anna University of Technology, Tirunelveli, India Dr.
- M. Balraju, Jawahar Lal Nehru Technological University Hyderabad, India Dr. Vijayalakshmi M. N., R.V.College of Engineering, Bangalore Prof. Walid Moudani, Lebanese University, Lebanon Dr. Saurabh Pal, VBS Purvanchal University, Jaunpur, India Associate Prof. Suneet Chaudhary, Dehradun Institute of Technology, India Associate Prof. Dr. Manuj Darbari, BBD University, India Ms. Prema Selvaraj, K.S.R College of Arts and Science, India Assist. Prof. Ms.S.Sasikala, KSR College of Arts & Science, India Mr. Sukhvinder Singh Deora, NC Institute of Computer Sciences, India Dr. Abhay Bansal, Amity School of Engineering & Technology, India Ms. Sumita Mishra, Amity School of Engineering and Technology, India Professor S. Viswanadha Raju, JNT University Hyderabad, India Mr. Asghar Shahrzad Khashandarag, Islamic Azad University Tabriz Branch, India Mr. Manoj Sharma, Panipat Institute of Engg. & Technology, India Mr. Shakeel Ahmed, King Faisal University, Saudi Arabia Dr. Mohamed Ali Mahjoub, Institute of Engineer of Monastir, Tunisia Mr. Adri Jovin J.J., SriGuru Institute of Technology, India Dr. Sukumar Senthilkumar, Universiti Sains Malaysia, Malaysia (IJCSIS) International Journal of Computer Science and Information Security, Vol. 15 No. 9, September 2017
- Mr. Rakesh Bharati, Dehradun Institute of Technology Dehradun, India Mr. Shervan Fekri Ershad, Shiraz International University, Iran Mr. Md. Safiqul Islam, Daffodil International University, Bangladesh Mr. Mahmudul Hasan, Daffodil International University, Prof. Mandakini Tayade, UIT, RGTU, Bhopal, India Ms. Sarla More, UIT, RGTU, Bhopal, India Mr. Tushar Hrishikesh Jaware, R.C. Patel Institute of Technology, Shirpur, India Ms.
- C. Divya, Dr G R Damodaran College of Science, Coimbatore, India Mr. Fahimuddin Shaik, Annamacharya Institute of Technology & Sciences, India Dr. M. N. Giri Prasad, JNTUCE,Pulivendula, A.P., India Assist. Prof. Chintan M Bhatt, Charotar University of Science And Technology, India Prof. Sahista Machchhar, Marwadi Education Foundation's Group of institutions, India Assist. Prof. Navnish Goel, S. D. College Of Enginnering & Technology, India Mr. Khaja Kamaluddin, Sirt University, Sirt, Libya Mr. Mohammad Zaidul Karim, Daffodil International, Bangladesh Mr.
- M. Vijayakumar, KSR College of Engineering, Tiruchengode, India Mr. S. A. Ahsan Rajon, Khulna University, Bangladesh Dr. Muhammad Mohsin Nazir, LCW University Lahore, Pakistan Mr. Mohammad Asadul Hoque, University of Alabama, USA Mr. P.V.Sarathchand, Indur Institute of Engineering and Technology, India Mr. Durgesh Samadhiya, Chung Hua University, Taiwan Dr Venu Kuthadi, University of Johannesburg, Johannesburg, RSA Dr. (Er) Jasvir Singh, Guru Nanak Dev University, Amritsar, Punjab, India Mr. Jasmin Cosic, Min. of the Interior of Una-sana canton, B&H, Bosnia and Herzegovina Dr S. Rajalakshmi, Botho College, South Africa Dr. Mohamed Sarrab, De Montfort University, UK Mr. Basappa B. Kodada, Canara Engineering College, India Assist. Prof. K. Ramana, Annamacharya Institute of Technology and Sciences, India Dr.
- Ashu Gupta, Apeejay Institute of Management, Jalandhar, India Assist. Prof. Shaik Rasool, Shadan College of Engineering & Technology, India Assist. Prof. K. Suresh, Annamacharya Institute of Tech & Sci. Rajampet, AP, India Dr . G. Singaravel, K.S.R. College of Engineering, India Dr B. G. Geetha, K.S.R. College of Engineering, India Assist. Prof. Kavita Choudhary, ITM University, Gurgaon Dr. Mehrdad Jalali, Azad University, Mashhad, Iran Megha Goel, Shamli Institute of Engineering and Technology, Shamli, India Mr. Chi-Hua Chen, Institute of Information Management, National Chiao-Tung University, Taiwan (R.O.C.)
- Assoc. Prof. A. Rajendran, RVS College of Engineering and Technology, India Assist. Prof. S. Jaganathan, RVS College of Engineering and Technology, India Assoc. Prof. (Dr.) A S N Chakravarthy, JNTUK University College of Engineering Vizianagaram (State University)
- Assist. Prof. Deepshikha Patel, Technocrat Institute of Technology, India Assist. Prof. Maram Balajee, GMRIT, India Assist. Prof. Monika Bhatnagar, TIT, India Prof. Gaurang Panchal, Charotar University of Science & Technology, India Prof. Anand K. Tripathi, Computer Society of India Prof. Jyoti Chaudhary, High Performance Computing Research Lab, India Assist. Prof. Supriya Raheja, ITM University, India (IJCSIS) International Journal of Computer Science and Information Security, Vol. 15 No. 9, September 2017
- Dr. Pankaj Gupta, Microsoft Corporation, U.S.A. Assist. Prof. Panchamukesh Chandaka, Hyderabad Institute of Tech. & Management, India Prof. Mohan H.S, SJB Institute Of Technology, India Mr. Hossein Malekinezhad, Islamic Azad University, Iran Mr. Zatin Gupta, Universti Malaysia, Malaysia Assist. Prof. Amit Chauhan, Phonics Group of Institutions, India Assist. Prof. Ajal A. J., METS School Of Engineering, India Mrs. Omowunmi Omobola Adeyemo, University of Ibadan, Nigeria Dr. Bharat Bhushan Agarwal, I.F.T.M. University, India Md. Nazrul Islam, University of Western Ontario, Canada Tushar Kanti, L.N.C.T, Bhopal, India Er. Aumreesh Kumar Saxena, SIRTs College Bhopal, India Mr. Mohammad Monirul Islam, Daffodil International University, Bangladesh Dr. Kashif Nisar, University Utara Malaysia, Malaysia Dr. Wei Zheng, Rutgers Univ/ A10 Networks, USA Associate Prof. Rituraj Jain, Vyas Institute of Engg & Tech, Jodhpur -Rajasthan Assist. Prof. Apoorvi Sood, I.T.M. University, India Dr. Kayhan Zrar Ghafoor, University Technology Malaysia, Malaysia Mr. Swapnil Soner, Truba Institute College of Engineering & Technology, Indore, India Ms. Yogita Gigras, I.T.M. University, India
- Asoke Nath, St. Xavier's College, India Mr. Masoud Rafighi, Islamic Azad University, Iran Assist. Prof. RamBabu Pemula, NIMRA College of Engineering & Technology, India Assist. Prof. Ms Rita Chhikara, ITM University, Gurgaon, India Mr. Sandeep Maan, Government Post Graduate College, India Prof. Dr. S. Muralidharan, Mepco Schlenk Engineering College, India Associate Prof. T.V.Sai Krishna, QIS College of Engineering and Technology, India Mr. R. Balu, Bharathiar University, Coimbatore, India Assist. Prof. Shekhar. R, Dr.SM College of Engineering, India
- Prof. P. Senthilkumar, Vivekanandha Institue of Engineering and Techology for Woman, India Mr.
- M. Kamarajan, PSNA College of Engineering & Technology, India Dr. Angajala Srinivasa Rao, Jawaharlal Nehru Technical University, India Assist. Prof. C. Venkatesh, A.I.T.S, Rajampet, India Mr. Afshin Rezakhani Roozbahani, Ayatollah Boroujerdi University, Iran Mr. Laxmi chand, SCTL, Noida, India Dr. Dr. Abdul Hannan, Vivekanand College, Aurangabad Prof. Mahesh Panchal, KITRC, Gujarat Dr.
- A. Subramani, K.S.R. College of Engineering, Tiruchengode (IJCSIS) International Journal of Computer Science and Information Security, Vol. 15 No. 9, September 2017
- Assist. Prof. Prakash M, Rajalakshmi Engineering College, Chennai, India Assist. Prof. Akhilesh K Sharma, Sir Padampat Singhania University, India Ms. Varsha Sahni, Guru Nanak Dev Engineering College, Ludhiana, India Associate Prof. Trilochan Rout, NM Institute of Engineering and Technlogy, India Mr. Srikanta Kumar Mohapatra, NMIET, Orissa, India Mr. Waqas Haider Bangyal, Iqra University Islamabad, Pakistan Dr. S. Vijayaragavan, Christ College of Engineering and Technology, Pondicherry, India Prof. Elboukhari Mohamed, University Mohammed First, Oujda, Morocco Dr. Muhammad Asif Khan, King Faisal University, Saudi Arabia Dr. Nagy Ramadan Darwish Omran, Cairo University, Egypt.
- Assistant Prof. Anand Nayyar, KCL Institute of Management and Technology, India Mr. G. Premsankar, Ericcson, India Assist. Prof. T. Hemalatha, VELS University, India Prof. Tejaswini Apte, University of Pune, India Dr. Edmund Ng Giap Weng, Universiti Malaysia Sarawak, Malaysia Mr. Mahdi Nouri, Iran University of Science and Technology, Iran Associate Prof. S. Asif Hussain, Annamacharya Institute of technology & Sciences, India Mrs. Kavita Pabreja, Maharaja Surajmal Institute (an affiliate of GGSIP University), India Mr. Vorugunti Chandra Sekhar, DA-IICT, India Mr. Muhammad Najmi Ahmad Zabidi, Universiti Teknologi Malaysia, Malaysia Dr. Aderemi A. Atayero, Covenant University, Nigeria Assist. Prof. Osama Sohaib, Balochistan University of Information Technology, Pakistan Assist. Prof. K. Suresh, Annamacharya Institute of Technology and Sciences, India Mr. Hassen Mohammed Abduallah Alsafi, International Islamic University Malaysia (IIUM) Malaysia Mr. Robail Yasrab, Virtual University of Pakistan, Pakistan Mr. R. Balu, Bharathiar University, Coimbatore, India Prof. Anand Nayyar, KCL Institute of Management and Technology, Jalandhar Assoc. Prof. Vivek S Deshpande, MIT College of Engineering, India Prof. K. Saravanan, Anna university Coimbatore, India Dr. Ravendra Singh, MJP Rohilkhand University, Bareilly, India Mr.
- V. Mathivanan, IBRA College of Technology, Sultanate of OMAN Assoc. Prof. S. Asif Hussain, AITS, India Assist. Prof. C. Venkatesh, AITS, India Mr. Sami Ulhaq, SZABIST Islamabad, Pakistan Dr. B. Justus Rabi, Institute of Science & Technology, India Mr. Anuj Kumar Yadav, Dehradun Institute of technology, India Mr. Alejandro Mosquera, University of Alicante, Spain Assist. Prof. Arjun Singh, Sir Padampat Singhania University (SPSU), Udaipur, India Dr. Smriti Agrawal, JB Institute of Engineering and Technology, Hyderabad Assist. Prof. Swathi Sambangi, Visakha Institute of Engineering and Technology, India Ms. Prabhjot Kaur, Guru Gobind Singh Indraprastha University, India Mrs. Samaher AL-Hothali, Yanbu University College, Saudi Arabia Prof. Rajneeshkaur Bedi, MIT College of Engineering, Pune, India Mr. Hassen Mohammed Abduallah Alsafi, International Islamic University Malaysia (IIUM) Dr.
- Wei Zhang, Amazon.com, Seattle, WA, USA Mr. B. Santhosh Kumar, C S I College of Engineering, Tamil Nadu Dr. K. Reji Kumar, , N S S College, Pandalam, India (IJCSIS) International Journal of Computer Science and Information Security, Vol. 15 No. 9, September 2017
- Assoc. Prof. K. Seshadri Sastry, EIILM University, India Mr. Kai Pan, UNC Charlotte, USA Mr. Ruikar Sachin, SGGSIET, India Prof. (Dr.) Vinodani Katiyar, Sri Ramswaroop Memorial University, India Assoc. Prof., M. Giri, Sreenivasa Institute of Technology and Management Studies, India Assoc. Prof. Labib Francis Gergis, Misr Academy for Engineering and Technology (MET), Egypt Assist. Prof. Amanpreet Kaur, ITM University, India Assist. Prof. Anand Singh Rajawat, Shri Vaishnav Institute of Technology & Science, Indore Mrs. Hadeel Saleh Haj Aliwi, Universiti Sains Malaysia (USM), Malaysia Dr. Abhay Bansal, Amity University, India Dr. Mohammad A. Mezher, Fahad Bin Sultan University, KSA Assist. Prof. Nidhi Arora, M.C.A. Institute, India Prof. Dr. P. Suresh, Karpagam College of Engineering, Coimbatore, India Dr. Kannan Balasubramanian, Mepco Schlenk Engineering College, India Dr. S. Sankara Gomathi, Panimalar Engineering college, India Prof. Anil kumar Suthar, Gujarat Technological University, L.C. Institute of Technology, India Assist. Prof. R. Hubert Rajan, NOORUL ISLAM UNIVERSITY, India Assist. Prof. Dr. Jyoti Mahajan, College of Engineering & Technology Assist. Prof. Homam Reda El-Taj, College of Network Engineering, Saudi Arabia & Malaysia Mr. Bijan Paul, Shahjalal University of Science & Technology, Bangladesh Assoc. Prof. Dr. Ch V Phani Krishna, KL University, India Dr. Vishal Bhatnagar, Ambedkar Institute of Advanced Communication Technologies & Research, India Dr. Lamri LAOUAMER, Al Qassim University, Dept. Info. Systems & European University of Brittany, Dept. Computer Science, UBO, Brest, France Prof. Ashish Babanrao Sasankar, G.H.Raisoni Institute Of Information Technology, India Prof. Pawan Kumar Goel, Shamli Institute of Engineering and Technology, India Mr. Ram Kumar Singh, S.V Subharti University, India Assistant Prof. Sunish Kumar O S, Amaljyothi College of Engineering, India Dr Sanjay Bhargava, Banasthali University, India Mr. Pankaj S. Kulkarni, AVEW's Shatabdi Institute of Technology, India Mr. Roohollah Etemadi, Islamic Azad University, Iran Mr. Oloruntoyin Sefiu Taiwo, Emmanuel Alayande College Of Education, Nigeria Mr. Sumit Goyal, National Dairy Research Institute, India Mr Jaswinder Singh Dilawari, Geeta Engineering College, India Prof. Raghuraj Singh, Harcourt Butler Technological Institute, Kanpur Dr. S.K. Mahendran, Anna University, Chennai, India Dr. Amit Wason, Hindustan Institute of Technology & Management, Punjab Dr. Ashu Gupta, Apeejay Institute of Management, India Assist. Prof. D. Asir Antony Gnana Singh, M.I.E.T Engineering College, India Mrs Mina Farmanbar, Eastern Mediterranean University, Famagusta, North Cyprus Mr. Maram Balajee, GMR Institute of Technology, India Mr. Moiz S. Ansari, Isra University, Hyderabad, Pakistan Mr. Adebayo, Olawale Surajudeen, Federal University of Technology Minna, Nigeria Mr. Jasvir Singh, University College Of Engg., India Mr. Vivek Tiwari, MANIT, Bhopal, India
- Assoc. Prof. R. Navaneethakrishnan, Bharathiyar College of Engineering and Technology, India Mr. Somdip Dey, St. Xavier's College, Kolkata, India (IJCSIS) International Journal of Computer Science and Information Security, Vol. 15 No. 9, September 2017
- Mr. Souleymane Balla-Arabé, Xi'an University of Electronic Science and Technology, China Mr. Mahabub Alam, Rajshahi University of Engineering and Technology, Bangladesh Mr.
- Sathyapraksh P., S.K.P Engineering College, India Dr.
- N. Karthikeyan, SNS College of Engineering, Anna University, India Dr. Binod Kumar, JSPM's, Jayawant Technical Campus, Pune, India Assoc. Prof. Dinesh Goyal, Suresh Gyan Vihar University, India Mr. Md. Abdul Ahad, K L University, India Mr. Vikas Bajpai, The LNM IIT, India Dr. Manish Kumar Anand, Salesforce (R & D Analytics), San Francisco, USA Assist. Prof. Dheeraj Murari, Kumaon Engineering College, India Assoc. Prof. Dr. A. Muthukumaravel, VELS University, Chennai Mr. A. Siles Balasingh, St.Joseph University in Tanzania, Tanzania Mr. Ravindra Daga Badgujar, R C Patel Institute of Technology, India Dr. Preeti Khanna, SVKM's NMIMS, School of Business Management, India Mr. Kumar Dayanand, Cambridge Institute of Technology, India Dr. Syed Asif Ali, SMI University Karachi, Pakistan Prof. Pallvi Pandit, Himachal Pradeh University, India Mr. Ricardo Verschueren, University of Gloucestershire, UK
- Assist. Prof. Mamta Juneja, University Institute of Engineering and Technology, Panjab University, India Assoc. Prof. P. Surendra Varma, NRI Institute of Technology, JNTU Kakinada, India Assist. Prof. Gaurav Shrivastava, RGPV / SVITS Indore, India Dr. S. Sumathi, Anna University, India Assist. Prof. Ankita M. Kapadia, Charotar University of Science and Technology, India Mr. Deepak Kumar, Indian Institute of Technology (BHU), India Dr. Dr. Rajan Gupta, GGSIP University, New Delhi, India Assist. Prof M. Anand Kumar, Karpagam University, Coimbatore, India Mr. Mr Arshad Mansoor, Pakistan Aeronautical Complex Mr. Kapil Kumar Gupta, Ansal Institute of Technology and Management, India Dr. Neeraj Tomer, SINE International Institute of Technology, Jaipur, India Assist. Prof. Trunal J. Patel, C.G.Patel Institute of Technology, Uka Tarsadia University, Bardoli, Surat Mr. Sivakumar, Codework solutions, India Mr. Mohammad Sadegh Mirzaei, PGNR Company, Iran Dr. Gerard G. Dumancas, Oklahoma Medical Research Foundation, USA Mr. Varadala Sridhar, Varadhaman College Engineering College, Affiliated To JNTU, Hyderabad Assist. Prof. Manoj Dhawan, SVITS, Indore Assoc. Prof. Chitreshh Banerjee, Suresh Gyan Vihar University, Jaipur, India Dr. S. Santhi, SCSVMV University, India Mr. Davood Mohammadi Souran, Ministry of Energy of Iran, Iran Mr. Shamim Ahmed, Bangladesh University of Business and Technology, Bangladesh Mr. Sandeep Reddivari, Mississippi State University, USA Assoc. Prof. Ousmane Thiare, Gaston Berger University, Senegal Dr. Hazra Imran, Athabasca University, Canada Dr. Setu Kumar Chaturvedi, Technocrats Institute of Technology, Bhopal, India Mr. Mohd Dilshad Ansari, Jaypee University of Information Technology, India Ms. Jaspreet Kaur, Distance Education LPU, India Dr. D. Nagarajan, Salalah College of Technology, Sultanate of Oman Dr. K.V.N.R.Sai Krishna, S.V.R.M. College, India (IJCSIS) International Journal of Computer Science and Information Security, Vol. 15 No. 9, September 2017
- Mr. Himanshu Pareek, Center for Development of Advanced Computing (CDAC), India Mr. Khaldi Amine, Badji Mokhtar University, Algeria Mr. Mohammad Sadegh Mirzaei, Scientific Applied University, Iran Assist. Prof. Khyati Chaudhary, Ram-eesh Institute of Engg. & Technology, India Mr. Sanjay Agal, Pacific College of Engineering Udaipur, India Mr. Abdul Mateen Ansari, King Khalid University, Saudi Arabia Dr. H.S. Behera, Veer Surendra Sai University of Technology (VSSUT), India Dr. Shrikant Tiwari, Shri Shankaracharya Group of Institutions (SSGI), India Prof. Ganesh B. Regulwar, Shri Shankarprasad Agnihotri College of Engg, India Prof. Pinnamaneni Bhanu Prasad, Matrix vision GmbH, Germany Dr. Shrikant Tiwari, Shri Shankaracharya Technical Campus (SSTC), India Dr. Siddesh G.K., : Dayananada Sagar College of Engineering, Bangalore, India Dr. Nadir Bouchama, CERIST Research Center, Algeria Dr. R. Sathishkumar, Sri Venkateswara College of Engineering, India Assistant Prof (Dr.) Mohamed Moussaoui, Abdelmalek Essaadi University, Morocco Dr. S. Malathi, Panimalar Engineering College, Chennai, India Dr.
- V. Subedha, Panimalar Institute of Technology, Chennai, India Dr. Prashant Panse, Swami Vivekanand College of Engineering, Indore, India Dr. Hamza Aldabbas, Al-Balqa'a Applied University, Jordan Dr. G. Rasitha Banu, Vel's University, Chennai Dr.
- V. D. Ambeth Kumar, Panimalar Engineering College, Chennai Prof. Anuranjan Misra, Bhagwant Institute of Technology, Ghaziabad, India Ms. U. Sinthuja, PSG college of arts &science, India Dr. Ehsan Saradar Torshizi, Urmia University, Iran Dr. Shamneesh Sharma, APG Shimla University, Shimla (H.P.), India
- Assistant Prof. A. S. Syed Navaz, Muthayammal College of Arts & Science, India Assistant Prof. Ranjit Panigrahi, Sikkim Manipal Institute of Technology, Majitar, Sikkim Dr. Khaled Eskaf, Arab Academy for Science ,Technology & Maritime Transportation, Egypt Dr. Nishant Gupta, University of Jammu, India Assistant Prof. Nagarajan Sankaran, Annamalai University, Chidambaram, Tamilnadu, India Assistant Prof.Tribikram Pradhan, Manipal Institute of Technology, India Dr. Nasser Lotfi, Eastern Mediterranean University, Northern Cyprus Dr. R. Manavalan, K S Rangasamy college of Arts and Science, Tamilnadu, India Assistant Prof. P. Krishna Sankar, K S Rangasamy college of Arts and Science, Tamilnadu, India Dr. Rahul Malik, Cisco Systems, USA Dr. S. C. Lingareddy, ALPHA College of Engineering, India Assistant Prof. Mohammed Shuaib, Interal University, Lucknow, India Dr. Sachin Yele, Sanghvi Institute of Management & Science, India Dr. T. Thambidurai, Sun Univercell, Singapore Prof. Anandkumar Telang, BKIT, India Assistant Prof. R. Poorvadevi, SCSVMV University, India Dr Uttam Mande, Gitam University, India Dr. Poornima Girish Naik, Shahu Institute of Business Education and Research (SIBER), India Prof. Md. Abu Kausar, Jaipur National University, Jaipur, India Dr. Mohammed Zuber, AISECT University, India Prof. Kalum Priyanath Udagepola, King Abdulaziz University, Saudi Arabia Dr. K. R. Ananth, Velalar College of Engineering and Technology, India (IJCSIS) International Journal of Computer Science and Information Security, Vol. 15 No. 9, September 2017
- Assistant Prof. Sanjay Sharma, Roorkee Engineering & Management Institute Shamli (U.P), India Assistant Prof. Panem Charan Arur, Priyadarshini Institute of Technology, India Dr. Ashwak Mahmood muhsen alabaichi, Karbala University / College of Science, Iraq Dr. Urmila Shrawankar, G H Raisoni College of Engineering, Nagpur (MS), India Dr. Krishan Kumar Paliwal, Panipat Institute of Engineering & Technology, India Dr. Mukesh Negi, Tech Mahindra, India Dr. Anuj Kumar Singh, Amity University Gurgaon, India Dr. Babar Shah, Gyeongsang National University, South Korea Assistant Prof. Jayprakash Upadhyay, SRI-TECH Jabalpur, India Assistant Prof. Varadala Sridhar, Vidya Jyothi Institute of Technology, India Assistant Prof. Parameshachari B D, KSIT, Bangalore, India Assistant Prof. Ankit Garg, Amity University, Haryana, India Assistant Prof. Rajashe Karappa, SDMCET, Karnataka, India Assistant Prof. Varun Jasuja, GNIT, India Assistant Prof. Sonal Honale, Abha Gaikwad Patil College of Engineering Nagpur, India Dr. Pooja Choudhary, CT Group of Institutions, NIT Jalandhar, India Dr. Faouzi Hidoussi, UHL Batna, Algeria Dr. Naseer Ali Husieen, Wasit University, Iraq Assistant Prof. Vinod Kumar Shukla, Amity University, Dubai Dr. Ahmed Farouk Metwaly, K L University Mr. Mohammed Noaman Murad, Cihan University, Iraq Dr. Suxing Liu, Arkansas State University, USA Dr.
- M. Gomathi, Velalar College of Engineering and Technology, India Assistant Prof. Sumardiono, College PGRI Blitar, Indonesia Dr. Latika Kharb, Jagan Institute of Management Studies (JIMS), Delhi, India Associate Prof. S. Raja, Pauls College of Engineering and Technology, Tamilnadu, India Assistant Prof. Seyed Reza Pakize, Shahid Sani High School, Iran Dr. Thiyagu Nagaraj, University-INOU, India Assistant Prof. Noreen Sarai, Harare Institute of Technology, Zimbabwe Assistant Prof. Gajanand Sharma, Suresh Gyan Vihar University Jaipur, Rajasthan, India Assistant Prof. Mapari Vikas Prakash, Siddhant COE, Sudumbare, Pune, India Dr. Devesh Katiyar, Shri Ramswaroop Memorial University, India Dr. Shenshen Liang, University of California, Santa Cruz, US Assistant Prof. Mohammad Abu Omar, Limkokwing University of Creative Technology-Malaysia Mr. Snehasis Banerjee, Tata Consultancy Services, India Assistant Prof. Kibona Lusekelo, Ruaha Catholic University (RUCU), Tanzania
- Assistant Prof. Adib Kabir Chowdhury, University College Technology Sarawak, Malaysia Dr. Ying Yang, Computer Science Department, Yale University, USA Dr. Vinay Shukla, Institute Of Technology & Management, India Dr. Liviu Octavian Mafteiu-Scai, West University of Timisoara, Romania Assistant Prof. Rana Khudhair Abbas Ahmed, Al-Rafidain University College, Iraq Assistant Prof. Nitin A. Naik, S.R.T.M. University, India Dr. Timothy Powers, University of Hertfordshire, UK Dr. S. Prasath, Bharathiar University, Erode, India Dr. Ritu Shrivastava, SIRTS Bhopal, India Prof. Rohit Shrivastava, Mittal Institute of Technology, Bhopal, India Dr. Gianina Mihai, Dunarea de Jos" University of Galati, Romania (IJCSIS) International Journal of Computer Science and Information Security, Vol. 15 No. 9, September 2017
- Assistant Prof. Ms. T. Kalai Selvi, Erode Sengunthar Engineering College, India Assistant Prof. Ms. C. Kavitha, Erode Sengunthar Engineering College, India Assistant Prof. K. Sinivasamoorthi, Erode Sengunthar Engineering College, India Assistant Prof. Mallikarjun C Sarsamba Bheemnna Khandre Institute Technology, Bhalki, India Assistant Prof. Vishwanath Chikaraddi, Veermata Jijabai technological Institute (Central Technological Institute), India Assistant Prof. Dr. Ikvinderpal Singh, Trai Shatabdi GGS Khalsa College, India Assistant Prof. Mohammed Noaman Murad, Cihan University, Iraq Professor Yousef Farhaoui, Moulay Ismail University, Errachidia, Morocco Dr. Parul Verma, Amity University, India Professor Yousef Farhaoui, Moulay Ismail University, Errachidia, Morocco Assistant Prof. Madhavi Dhingra, Amity University, Madhya Pradesh, India Assistant Prof.. G. Selvavinayagam, SNS College of Technology, Coimbatore, India Assistant Prof. Madhavi Dhingra, Amity University, MP, India Professor Kartheesan Log, Anna University, Chennai Professor Vasudeva Acharya, Shri Madhwa vadiraja Institute of Technology, India Dr. Asif Iqbal Hajamydeen, Management & Science University, Malaysia Assistant Prof., Mahendra Singh Meena, Amity University Haryana Assistant Professor Manjeet Kaur, Amity University Haryana Dr. Mohamed Abd El-Basset Matwalli, Zagazig University, Egypt Dr. Ramani Kannan, Universiti Teknologi PETRONAS, Malaysia Assistant Prof. S. Jagadeesan Subramaniam, Anna University, India Assistant Prof. Dharmendra Choudhary, Tripura University, India Assistant Prof. Deepika Vodnala, SR Engineering College, India Dr. Kai Cong, Intel Corporation & Computer Science Department, Portland State University, USA Dr. Kailas R Patil, Vishwakarma Institute of Information Technology (VIIT), India Dr.
- Omar A. Alzubi, Faculty of IT / Al-Balqa Applied University, Jordan Assistant Prof. Kareemullah Shaik, Nimra Institute of Science and Technology, India Assistant Prof. Chirag Modi, NIT Goa Dr. R. Ramkumar, Nandha Arts And Science College, India Dr. Priyadharshini Vydhialingam, Harathiar University, India Dr. P. S. Jagadeesh Kumar, DBIT, Bangalore, Karnataka Dr. Vikas Thada, AMITY University, Pachgaon Dr. T. A. Ashok Kumar, Institute of Management, Christ University, Bangalore Dr. Shaheera Rashwan, Informatics Research Institute Dr. S. Preetha Gunasekar, Bharathiyar University, India Asst Professor Sameer Dev Sharma, Uttaranchal University, Dehradun Dr. Zhihan lv, Chinese Academy of Science, China Dr. Ikvinderpal Singh, Trai Shatabdi GGS Khalsa College, Amritsar Dr. Umar Ruhi, University of Ottawa, Canada Dr. Jasmin Cosic, University of Bihac, Bosnia and Herzegovina Dr. Homam Reda El-Taj, University of Tabuk, Kingdom of Saudi Arabia Dr. Mostafa Ghobaei Arani, Islamic Azad University, Iran Dr. Ayyasamy Ayyanar, Annamalai University, India Dr. Selvakumar Manickam, Universiti Sains Malaysia, Malaysia Dr. Murali Krishna Namana, GITAM University, India Dr. Smriti Agrawal, Chaitanya Bharathi Institute of Technology, Hyderabad, India Professor Vimalathithan Rathinasabapathy, Karpagam College Of Engineering, India (IJCSIS) International Journal of Computer Science and Information Security, Vol. 15 No. 9, September 2017
- Dr. Sushil Chandra Dimri, Graphic Era University, India Dr. Dinh-Sinh Mai, Le Quy Don Technical University, Vietnam Dr. S. Rama Sree, Aditya Engg. College, India Dr. Ehab T. Alnfrawy, Sadat Academy, Egypt Dr. Patrick D. Cerna, Haramaya University, Ethiopia Dr. Vishal Jain, Bharati Vidyapeeth's Institute of Computer Applications and Management (BVICAM), India Associate Prof. Dr. Jiliang Zhang, North Eastern University, China Dr. Sharefa Murad, Middle East University, Jordan Dr. Ajeet Singh Poonia, Govt. College of Engineering & technology, Rajasthan, India Dr. Vahid Esmaeelzadeh, University of Science and Technology, Iran Dr. Jacek M. Czerniak, Casimir the Great University in Bydgoszcz, Institute of Technology, Poland Associate Prof. Anisur Rehman Nasir, Jamia Millia Islamia University Assistant Prof. Imran Ahmad, COMSATS Institute of Information Technology, Pakistan Professor Ghulam Qasim, Preston University, Islamabad, Pakistan Dr. Parameshachari B D, GSSS Institute of Engineering and Technology for Women Dr. Wencan Luo, University of Pittsburgh, US Dr. Musa PEKER, Faculty of Technology, Mugla Sitki Kocman University, Turkey Dr. Gunasekaran Shanmugam, Anna University, India Dr.
- Binh P. Nguyen, National University of Singapore, Singapore Dr. Rajkumar Jain, Indian Institute of Technology Indore, India Dr. Imtiaz Ali Halepoto, QUEST Nawabshah, Pakistan Dr. Shaligram Prajapat, Devi Ahilya University Indore India Dr. Sunita Singhal, Birla Institute of Technologyand Science, Pilani, India Dr. Ijaz Ali Shoukat, King Saud University, Saudi Arabia Dr. Anuj Gupta, IKG Punjab Technical University, India Dr. Sonali Saini, IES-IPS Academy, India Dr. Krishan Kumar, MotiLal Nehru National Institute of Technology, Allahabad, India Dr. Z. Faizal Khan, College of Engineering, Shaqra University, Kingdom of Saudi Arabia Prof. M. Padmavathamma, S.V. University Tirupati, India Prof. A. Velayudham, Cape Institute of Technology, India Prof. Seifeidne Kadry, American University of the Middle East Dr. J. Durga Prasad Rao, Pt. Ravishankar Shukla University, Raipur Assistant Prof. Najam Hasan, Dhofar University Dr. G. Suseendran, Vels University, Pallavaram, Chennai Prof. Ankit Faldu, Gujarat Technological Universiry-Atmiya Institute of Technology and Science Dr. Ali Habiboghli, Islamic Azad University Dr. Deepak Dembla, JECRC University, Jaipur, India Dr. Pankaj Rajan, Walmart Labs, USA Assistant Prof. Radoslava Kraleva, South-West University "Neofit Rilski", Bulgaria Assistant Prof. Medhavi Shriwas, Shri vaishnav institute of Technology, India Associate Prof. Sedat Akleylek, Ondokuz Mayis University, Turkey Dr. U.V. Arivazhagu, Kingston Engineering College Affiliated To Anna University, India Dr. Touseef Ali, University of Engineering and Technology, Taxila, Pakistan Assistant Prof. Naren Jeeva, SASTRA University, India Dr. Riccardo Colella, University of Salento, Italy Dr. Enache Maria Cristina, University of Galati, Romania Dr.
- Senthil P, Kurinji College of Arts & Science, India (IJCSIS) International Journal of Computer Science and Information Security, Vol. 15 No. 9, September 2017
- Dr. Hasan Ashrafi-rizi, Isfahan University of Medical Sciences, Isfahan, Iran Dr. Mazhar Malik, Institute of Southern Punjab, Pakistan Dr. Yajie Miao, Carnegie Mellon University, USA Dr. Kamran Shaukat, University of the Punjab, Pakistan Dr. Sasikaladevi N., SASTRA University, India Dr. Ali Asghar Rahmani Hosseinabadi, Islamic Azad University Ayatollah Amoli Branch, Amol, Iran Dr. Velin Kralev, South-West University "Neofit Rilski", Blagoevgrad, Bulgaria Dr. Marius Iulian Mihailescu, LUMINA -The University South-East Europe Dr. Sriramula Nagaprasad, S.R.R.Govt.Arts & Science College, Karimnagar, India Prof (Dr.) Namrata Dhanda, Dr. APJ Abdul Kalam Technical University, Lucknow, India Dr. Javed Ahmed Mahar, Shah Abdul Latif University, Khairpur Mir's, Pakistan Dr. B. Narendra Kumar Rao, Sree Vidyanikethan Engineering College, India Dr. Shahzad Anwar, University of Engineering & Technology Peshawar, Pakistan Dr. Basit Shahzad, King Saud University, Riyadh -Saudi Arabia Dr. Nilamadhab Mishra, Chang Gung University Dr. Sachin Kumar, Indian Institute of Technology Roorkee Dr. Santosh Nanda, Biju-Pattnaik University of Technology Dr. Sherzod Turaev, International Islamic University Malaysia Dr. Yilun Shang, Tongji University, Department of Mathematics, Shanghai, China Dr. Nuzhat Shaikh, Modern Education society's College of Engineering, Pune, India Dr. Parul Verma, Amity University, Lucknow campus, India Dr. Rachid Alaoui, Agadir Ibn Zohr University, Agadir, Morocco Dr. Dharmendra Patel, Charotar University of Science and Technology, India Dr. Dong Zhang, University of Central Florida, USA Dr. Kennedy Chinedu Okafor, Federal University of Technology Owerri, Nigeria Prof. C Ram Kumar, Dr NGP Institute of Technology, India Dr. Sandeep Gupta, GGS IP University, New Delhi, India Dr. Shahanawaj Ahamad, University of Ha'il, Ha'il City, Ministry of Higher Education, Kingdom of Saudi Arabia Dr. Najeed Ahmed Khan, NED University of Engineering & Technology, India Dr. Sajid Ullah Khan, Universiti Malaysia Sarawak, Malaysia Dr. Muhammad Asif, National Textile University Faisalabad, Pakistan Dr. Yu BI, University of Central Florida, Orlando, FL, USA Dr. Brijendra Kumar Joshi, Research Center, Military College of Telecommunication Engineering, India Prof. Dr. Nak Eun Cho, Pukyong National University, Korea Prof. Wasim Ul-Haq, Mathematics Department Faculty of Science, Majmaah University, Saudi Arabia CALL FOR PAPERS International Journal of Computer Science and Information Security IJCSIS 2017-2018 ISSN: 1947-5500 http://sites.google.com/site/ijcsis/ International Journal Computer Science and Information Security, IJCSIS, is the premier scholarly venue in the areas of computer science and security issues. IJCSIS 2011 will provide a high profile, leading edge platform for researchers and engineers alike to publish state-of-the-art research in the respective fields of information technology and communication security. The journal will feature a diverse mixture of publication articles including core and applied computer science related topics. Authors are solicited to contribute to the special issue by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to. Submissions may span a broad range of topics, e.g.: Track A: Security Access control, Anonymity, Audit and audit reduction & Authentication and authorization, Applied cryptography, Cryptanalysis, Digital Signatures, Biometric security, Boundary control devices, Certification and accreditation, Cross-layer design for security, Security & Network Management, Data and system integrity, Database security, Defensive information warfare, Denial of service protection, Intrusion Detection, Anti-malware, Distributed systems security, Electronic commerce, E-mail security, Spam, Phishing, E-mail fraud, Virus, worms, Trojan Protection, Grid security, Information hiding and watermarking & Information survivability, Insider threat protection, Integrity Intellectual property protection, Internet/Intranet Security, Key management and key recovery, Language- based security, Mobile and wireless security, Mobile, Ad Hoc and Sensor Network Security, Monitoring and surveillance, Multimedia security ,Operating system security, Peer-to-peer security, Performance Evaluations of Protocols & Security Application, Privacy and data protection, Product evaluation criteria and compliance, Risk evaluation and security certification, Risk/vulnerability assessment, Security & Network Management, Security Models & protocols, Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,), Trusted computing, Ubiquitous Computing Security, Virtualization security, VoIP security, Web 2.0 security, Submission Procedures, Active Defense Systems, Adaptive Defense Systems, Benchmark, Analysis and Evaluation of Security Systems, Distributed Access Control and Trust Management, Distributed Attack Systems and Mechanisms, Distributed Intrusion Detection/Prevention Systems, Denial-of-Service Attacks and Countermeasures, High Performance Security Systems, Identity Management and Authentication, Implementation, Deployment and Management of Security Systems, Intelligent Defense Systems, Internet and Network Forensics, Large- scale Attacks and Defense, RFID Security and Privacy, Security Architectures in Distributed Network Systems, Security for Critical Infrastructures, Security for P2P systems and Grid Systems, Security in E- Commerce, Security and Privacy in Wireless Networks, Secure Mobile Agents and Mobile Code, Security Protocols, Security Simulation and Tools, Security Theory and Tools, Standards and Assurance Methods, Trusted Computing, Viruses, Worms, and Other Malicious Code, World Wide Web Security, Novel and emerging secure architecture, Study of attack strategies, attack modeling, Case studies and analysis of actual attacks, Continuity of Operations during an attack, Key management, Trust management, Intrusion detection techniques, Intrusion response, alarm management, and correlation analysis, Study of tradeoffs between security and system performance, Intrusion tolerance systems, Secure protocols, Security in wireless networks (e.g. mesh networks, sensor networks, etc.), Cryptography and Secure Communications, Computer Forensics, Recovery and Healing, Security Visualization, Formal Methods in Security, Principles for Designing a Secure Computing System, Autonomic Security, Internet Security, Security in Health Care Systems, Security Solutions Using Reconfigurable Computing, Adaptive and Intelligent Defense Systems, Authentication and Access control, Denial of service attacks and countermeasures, Identity, Route and Location Anonymity schemes, Intrusion detection and prevention techniques, Cryptography, encryption algorithms and Key management schemes, Secure routing schemes, Secure neighbor discovery and localization, Trust establishment and maintenance, Confidentiality and data integrity, Security architectures, deployments and solutions, Emerging threats to cloud-based services, Security model for new services, Cloud-aware web service security, Information hiding in Cloud Computing, Securing distributed data storage in cloud, Security, privacy and trust in mobile computing systems and applications, Middleware security & Security features: middleware software is an asset on its own and has to be protected, interaction between security-specific and other middleware features, e.g., context-awareness, Middleware-level security monitoring and measurement: metrics and mechanisms for quantification and evaluation of security enforced by the middleware, Security co-design: trade-off and co-design between application-based and middleware-based security, Policy-based management: innovative support for policy-based definition and enforcement of security concerns, Identification and authentication mechanisms: Means to capture application specific constraints in defining and enforcing access control rules, Middleware-oriented security patterns: identification of patterns for sound, reusable security, Security in aspect-based middleware: mechanisms for isolating and enforcing security aspects, Security in agent-based platforms: protection for mobile code and platforms, Smart Devices: Biometrics, National ID cards, Embedded Systems Security and TPMs, RFID Systems Security, Smart Card Security, Pervasive Systems: Digital Rights Management (DRM) in pervasive environments, Intrusion Detection and Information Filtering, Localization Systems Security (Tracking of People and Goods), Mobile Commerce Security, Privacy Enhancing Technologies, Security Protocols (for Identification and Authentication, Confidentiality and Privacy, and Integrity), Ubiquitous Networks: Ad Hoc Networks Security, Delay- Tolerant Network Security, Domestic Network Security, Peer-to-Peer Networks Security, Security Issues in Mobile and Ubiquitous Networks, Security of GSM/GPRS/UMTS Systems, Sensor Networks Security, Vehicular Network Security, Wireless Communication Security: Bluetooth, NFC, WiFi, WiMAX, WiMedia, others This Track will emphasize the design, implementation, management and applications of computer communications, networks and services. Topics of mostly theoretical nature are also welcome, provided there is clear practical potential in applying the results of such work. Track B: Computer Science Broadband wireless technologies: LTE, WiMAX, WiRAN, HSDPA, HSUPA, Resource allocation and interference management, Quality of service and scheduling methods, Capacity planning and dimensioning, Cross-layer design and Physical layer based issue, Interworking architecture and interoperability, Relay assisted and cooperative communications, Location and provisioning and mobility management, Call admission and flow/congestion control, Performance optimization, Channel capacity modeling and analysis, Middleware Issues: Event-based, publish/subscribe, and message-oriented middleware, Reconfigurable, adaptable, and reflective middleware approaches, Middleware solutions for reliability, fault tolerance, and quality-of-service, Scalability of middleware, Context-aware middleware, Autonomic and self-managing middleware, Evaluation techniques for middleware solutions, Formal methods and tools for designing, verifying, and evaluating, middleware, Software engineering techniques for middleware, Service oriented middleware, Agent-based middleware, Security middleware, Network Applications: Network-based automation, Cloud applications, Ubiquitous and pervasive applications, Collaborative applications, RFID and sensor network applications, Mobile applications, Smart home applications, Infrastructure monitoring and control applications, Remote health monitoring, GPS and location-based applications, Networked vehicles applications, Alert applications, Embeded Computer System, Advanced Control Systems, and Intelligent Control : Advanced control and measurement, computer and microprocessor-based control, signal processing, estimation and identification techniques, application specific IC's, nonlinear and adaptive control, optimal and robot control, intelligent control, evolutionary computing, and intelligent systems, instrumentation subject to critical conditions, automotive, marine and aero-space control and all other control applications, Intelligent Control System, Wiring/Wireless Sensor, Signal Control System. Sensors, Actuators and Systems Integration : Intelligent sensors and actuators, multisensor fusion, sensor array and multi-channel processing, micro/nano technology, microsensors and microactuators, instrumentation electronics, MEMS and system integration, wireless sensor, Network Sensor, Hybrid Sensor, Distributed Sensor Networks. Signal and Image Processing : Digital signal processing theory, methods, DSP implementation, speech processing, image and multidimensional signal processing, Image analysis and processing, Image and Multimedia applications, Real-time multimedia signal processing, Computer vision, Emerging signal processing areas, Remote Sensing, Signal processing in education. Industrial Informatics: Industrial applications of neural networks, fuzzy algorithms, Neuro-Fuzzy application, bioInformatics, real-time computer control, real-time information systems, human-machine interfaces, CAD/CAM/CAT/CIM, virtual reality, industrial communications, flexible manufacturing systems, industrial automated process, Data Storage Management, Harddisk control, Supply Chain Management, Logistics applications, Power plant automation, Drives automation. Information Technology, Management of Information System : Management information systems, Information Management, Nursing information management, Information System, Information Technology and their application, Data retrieval, Data Base Management, Decision analysis methods, Information processing, Operations research, E-Business, E-Commerce, E-Government, Computer Business, Security and risk management, Medical imaging, Biotechnology, Bio-Medicine, Computer-based information systems in health care, Changing Access to Patient Information, Healthcare Management Information Technology. Communication/Computer Network, Transportation Application : On-board diagnostics, Active safety systems, Communication systems, Wireless technology, Communication application, Navigation and Guidance, Vision-based applications, Speech interface, Sensor fusion, Networking theory and technologies, Transportation information, Autonomous vehicle, Vehicle application of affective computing, Advance Computing technology and their application : Broadband and intelligent networks, Data Mining, Data fusion, Computational intelligence, Information and data security, Information indexing and retrieval, Information processing, Information systems and applications, Internet applications and performances, Knowledge based systems, Knowledge management, Software Engineering, Decision making, Mobile networks and services, Network management and services, Neural Network, Fuzzy logics, Neuro-Fuzzy, Expert approaches, Innovation Technology and Management : Innovation and product development, Emerging advances in business and its applications, Creativity in Internet management and retailing, B2B and B2C management, Electronic transceiver device for Retail Marketing Industries, Facilities planning and management, Innovative pervasive computing applications, Programming paradigms for pervasive systems, Software evolution and maintenance in pervasive systems, Middleware services and agent technologies, Adaptive, autonomic and context-aware computing, Mobile/Wireless computing systems and services in pervasive computing, Energy-efficient and green pervasive computing, Communication architectures for pervasive computing, Ad hoc networks for pervasive communications, Pervasive opportunistic communications and applications, Enabling technologies for pervasive systems (e.g., wireless BAN, PAN), Positioning and tracking technologies, Sensors and RFID in pervasive systems, Multimodal sensing and context for pervasive applications, Pervasive sensing, perception and semantic interpretation, Smart devices and intelligent environments, Trust, security and privacy issues in pervasive systems, User interfaces and interaction models, Virtual immersive communications, Wearable computers, Standards and interfaces for pervasive computing environments, Social and economic models for pervasive systems, Active and Programmable Networks, Ad Hoc & Sensor Network, Congestion and/or Flow Control, Content Distribution, Grid Networking, High-speed Network Architectures, Internet Services and Applications, Optical Networks, Mobile and Wireless Networks, Network Modeling and Simulation, Multicast, Multimedia Communications, Network Control and Management, Network Protocols, Network Performance, Network Measurement, Peer to Peer and Overlay Networks, Quality of Service and Quality of Experience, Ubiquitous Networks, Crosscutting Themes -Internet Technologies, Infrastructure, Services and Applications; Open Source Tools, Open Models and Architectures; Security, Privacy and Trust; Navigation Systems, Location Based Services; Social Networks and Online Communities; ICT Convergence, Digital Economy and Digital Divide, Neural Networks, Pattern Recognition, Computer Vision, Advanced Computing Architectures and New Programming Models, Visualization and Virtual Reality as Applied to Computational Science, Computer Architecture and Embedded Systems, Technology in Education, Theoretical Computer Science, Computing Ethics, Computing Practices & Applications Authors are invited to submit papers through e-mail ijcsiseditor@gmail.com. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated by IJCSIS. Before submission authors should carefully read over the journal's Author Guidelines, which are located at http://sites.google.com/site/ijcsis/authors-notes .