Academia.eduAcademia.edu

Outline

Journal of Computer Science IJCSIS March 2017 Full Volume.pdf

Abstract

It is our great pleasure to present the March 2017 issue (Volume 15 Number 3) of the International Journal of Computer Science and Information Security (IJCSIS). High quality research, survey & review articles are proposed from experts in the field, promoting insight and understanding of the state of the art, and trends in computer science and technology. It especially provides a platform for high-caliber academics, practitioners and PhD/Doctoral graduates to publish completed work and latest research outcomes. According to Google Scholar, up to now papers published in IJCSIS have been cited over 9800 times and this journal is experiencing steady and healthy growth. Google statistics shows that IJCSIS has established the first step to be an international and prestigious journal in the field of Computer Science and Information Security. There have been many improvements to the processing of papers; we have also witnessed a significant growth in interest through a higher number of submissions as well as through the breadth and quality of those submissions. IJCSIS is indexed in major academic/scientific databases and important repositories, such as: Google Scholar, Thomson Reuters, ArXiv, CiteSeerX, Cornell’s University Library, Ei Compendex, ISI Scopus, DBLP, DOAJ, ProQuest, ResearchGate, Academia.edu and EBSCO among others. A great journal cannot be made great without a dedicated editorial team of editors and reviewers. On behalf of IJCSIS community and the sponsors, we congratulate the authors and thank the reviewers for their outstanding efforts to review and recommend high quality papers for publication. In particular, we would like to thank the international academia and researchers for continued support by citing papers published in IJCSIS. Without their sustained and unselfish commitments, IJCSIS would not have achieved its current premier status, making sure we deliver high-quality content to our readers in a timely fashion. “We support researchers to succeed by providing high visibility & impact value, prestige and excellence in research publication.” We would like to thank you, the authors and readers, the content providers and consumers, who have made this journal the best possible. For further questions or other suggestions please do not hesitate to contact us at ijcsiseditor@gmail.com. A complete list of journals can be found at: http://sites.google.com/site/ijcsis/ IJCSIS Vol. 15, No. 3, March 2017 Edition ISSN 1947-5500 © IJCSIS, USA.

References (1,006)

  1. Charles Mozina, "Undervoltage Load Shedding", ISBN: 978-1-4244- 0855-9, IEEE, Page(s): 39-54.
  2. FarookhShokooh, GaryDonner, HerminioAbcede Keith Brown, "Interactive Simulation of Power Systems: ETAP applications and techniques", Page(s): 1930-1941, IEEE, 1990.
  3. Glenn W. Stagg and Ahmed H. El-Abiad, "Computer Methods in Power System Analysis", McGraw-Hill [1968].
  4. J. Arrillaga, N.R. Watson "Computer Modelling of ElectricalPower Systems", second edition, ISBN : 978-0-471-87249-8 , JohnWiley and Sons[2001].
  5. M.A.Pai, "Computer Techniques in Power System Analysis",second edition, ISBN: 0-07-059363-9, Tata McGraw Hill [2005].
  6. Report by "Punjab State Transmission Corporation Limited (PSTCL)" for 132 kV transmission substations.
  7. "Wsn architecture illustration: http://vlssit.iitkgp.ernet.in/ant/ant/8/theory/."
  8. I. Kamel and H. Juma, "A lightweight data integrity scheme for sensor networks," MDPI, 2011.
  9. M. H. Eldefrawy, M. K. Khan, and K. Alghathbar, "Broadcast authenti- cation for wireless sensor networks using nested hashing and the chinese remainder theorem," MDPI, 2010.
  10. H. M. Alzaid, "Secure data aggregation in wireless sensor networks," Ph.D. dissertation, Queensland University of Technology, 2011. [Online]. Available: http://eprints.qut.edu.au/41843/
  11. C. Kaufman, R. Perlman, and M. Speciner, Network Security: Private Communication in a Public World, 2nd Edition. Prentice Hall, 2002.
  12. M. A. Salam, "Detectability of man-in-the-middle attacker in mobile sensor networks," International Journal of Advanced Computer Science, Vol.3, No.2, Pp.99-103, Feb., 2013, 2013.
  13. S. Glass, V. Muthukkumurasamy, and M. Portmann, "Detecting man-in- the-middle and wormhole attacks in wireless mesh networks," Interna- tional Conference on Advanced Information Networking and Applica- tions, 2009.
  14. K.Venkatraman, J. Daniel, and G.Murugaboopathi, "Various attacks in wireless sensor network : Survey," International Journal of Soft Computing and Engineering (IJSCE), vol. 3, 2013.
  15. S. Marano, V. Matta, and L. Tong, "Distributed inference in the presence of byzantine sensors."
  16. L. Lamport, R. Shostak, and M. Pease, "The byzantine generals problem, acm transactions on programming languages and systems, vol. 4, no. 3, pp. 382-401, july 1982."
  17. N. Alajmi, "Wireless sensor networks attacks and solutions," (IJCSIS) International Journal of Computer Science and Information Security, Vol. 12, No. 7, July, 2014.
  18. R. Roman, C. Alcaraz, and J. Lopez, "A survey of cryptographic primitives and implementations for hardware-constrained sensor network nodes," October 2007.
  19. A. Bogdanov, L. R. Knudsen, G. Leander, C. Paar, A. Poschmann, M. J. B. Robshaw, Y. Seurin, and C. Vikkelsoe, "Present: An ultra- lightweight block cipher," in THE PROCEEDINGS OF CHES 2007. Springer, 2007.
  20. X. Zhang, H. M. Heys, and C. Li, "Energy efficiency of symmetric key cryptographic algorithms in wireless sensor networks."
  21. C. Manifavas, G. Hatzivasilis, K. Fysarakis, and K. Rantos, "Lightweight cryptography for embedded systems -a comparative analys," Springer.
  22. Arpit and A. Kumar, "Optimized elliptic curve cryptography as fine balance for wireless sensor network," International Journal of Modeling and Optimization, 2011.
  23. G. Becker, "Merkle signature schemes, merkle trees and their cryptanal- ysis," 2008.
  24. C. Cheng-Kang, L. J. K., Z. Jianying, B. Feng, and D. R. H., "Practical id-based encryption for wireless sensor network," in Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ser. ASIACCS '10. New York, NY, USA: ACM, 2010, pp. 337-340. [Online]. Available: http://doi.acm.org/10.1145/1755688.1755734
  25. H. K. Patil and S. A. Szygenda, Security for Wireless Sensor Networks using Identity-Based Cryptography. CRC Press, 2012.
  26. B. Andrey, L. Gregor, P. Christof, P. Axel, R. M. J. B., and S. Yannick, "Hash functions and rfid tags: Mind the gap." in CHES, ser. Lecture Notes in Computer Science, E. Oswald and P. Rohatgi, Eds., vol. 5154. Springer, 2008, pp. 283-299. [Online]. Available: http://dblp.uni-trier.de/db/conf/ches/ches2008.htmlBogdanovLPPRS08
  27. S. Adi, "Squash -a new mac with provable security properties for highly constrained devices such as rfid tags." in FSE, ser. Lecture Notes in Computer Science, K. Nyberg, Ed., vol. 5086.
  28. Springer, 2008, pp. 144-157. [Online]. Available: http://dblp.uni- trier.de/db/conf/fse/fse2008.htmlShamir08
  29. Z. Benenson, N. Gedicke, and O. Raivio, "Realizing robust user authen- tication in sensor networks," in Real-World Wireless Sensor Networks (REALWSN), 2005.
  30. A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar, "Spins: Security protocols for sensor networks," in Wireless Networks, 2001, pp. 189-199.
  31. Y. Zhou, Y. Zhang, and Y. Fang, "Access control in wireless sensor networks," Ad Hoc Networks, pp. 3-13, 2007.
  32. W. K. H. M., Z. Yuan, C. Jiannong, and W. Shengwei, "A dynamic user authentication scheme for wireless sensor networks." in SUTC (1). IEEE Computer Society, 2006, pp. 244-251. [Online]. Available: http://dblp.uni-trier.de/db/conf/sutc/sutc2006-1.htmlWongZCW06
  33. T. Huei-Ru, J. Rong-Hong, and Y. Wuu, "An improved dynamic user authentication scheme for wireless sensor networks." in GLOBECOM. IEEE, 2007, pp. 986-990. [Online]. Available: http://dblp.uni- trier.de/db/conf/globecom/globecom2007.htmlTsengJY07
  34. B. Vaidya, M. Chen, and J. J. P. C. Rodrigues, "Improved robust user authentication scheme for wireless sensor networks," in Wireless Com- munication and Sensor Networks (WCSN), 2009 Fifth IEEE Conference on, Dec 2009, pp. 1-6.
  35. F. Youssou, Guyennet, Hervé, and N. Ibrahima, "Authentification ," in CARI 2012, 11ème Colloque Africain sur la Recherche en Informatique et en Mathématiques Ap- pliquées, Alger, Algeria, Oct. 2012.
  36. D. Liu, P. Ning, S. Zhu, and S. Jajodia, "Practical broadcast authentication in sensor networks," in 2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), 17-21 July 2005, San Diego, CA, USA, 2005, pp. 118-132. [Online]. Available: http://dx.doi.org/10.1109/MOBIQUITOUS.2005.49
  37. M. Turkanović, B. Brumen, and M. Hölbl, "A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion," Ad Hoc Networks, vol. 20, pp. 96 -112, 2014. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S157087051400064X
  38. A. Ruhul and B. G.P., "A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks," Ad Hoc Netw., vol. 36, no. P1, pp. 58-80, Jan. 2016. [Online]. Available: http://dx.doi.org/10.1016/j.adhoc.2015.05.020
  39. Y. Lu, Li, Lixiang, Peng, Haipeng, and Y. Yang, "An energy efficient mutual authentication and key agreement scheme preserving anonymity for wireless sensor networks," Sensors, vol. 16, no. 6, p. 837, 2016. [Online]. Available: http://www.mdpi.com/1424-8220/16/6/837
  40. H. Hui-Feng, "A new design of access control in wireless sensor networks." IJDSN, vol. 2011, 2011. [Online]. Available: http://dblp.uni- trier.de/db/journals/ijdsn/ijdsn2011.htmlHuang11
  41. M. G. Otero and A. Poblacion-Hernandez, "Secure neighbor discovery in wireless sensor networks using range-free localization techniques," International Journal of Distributed Sensor Networks (IJDSN), 2012.
  42. S. Hariharan, N. B. Shroff, and S. Bagchi, "Secure neighbor discovery through overhearing in static multihop wireless networks," Computer Networks, 55(6):1229-1241, 2011.
  43. S. Bagchi, S. Hariharan, and N. B. Shroff, "Secure neighbor discovery in wireless networks," Electrical and Computer Ingineering, 2007.
  44. J. Deng, R. Han, and S. Mishra, "Insens: Intrusion-tolerant routing in wireless sensor networks," Published by Elsevier B.V, 2005.
  45. Y.-C. Hu, A. Perrig, , and D. B. Johnson, "Ariadne: A secure on-demand routing protocol for ad hoc networks," Wirel. Netw., 11(1-2) :21-38, January, 2005.
  46. P. J. Y. Zhang, B. Zheng, and J. Co, "A key management method based on dynamic clustering for sensor networks," International Journal of Distributed Sensor networks, 2015.
  47. X. Yu, "Security key management scheme in heterogeneous wireless sensor networks based on clustering strategy," JNW, 8(9) :2114-2120, 2013.
  48. C. Diallo, M. Marot, and M. Becker, "Efficiency benefits through load- balancing with link reliability based routing in wsns," In International Journal on Advances in Networks and Services, Vol 3 n34, Feb. 2011, 2011.
  49. M. T. Sow and C. Diallo, "Energy over-consumption induced by securing network operations," 2nd IEEE International Conference on Frontiers of Sensors Technologies, Shenzhen, China, (IEEE ICFST 2017)., April, 2017.
  50. G. Booch, J. Rumbaugh, and I. Jacobson. 'The Unified Modelling Language User Guide.' Addison Wesley, 1998.
  51. Jeffrey M. Bradshaw. 'An Introduction to software agents.' In Jeffrey M. Bradshaw, editor, Software Agents, pages 3-46. AAAI Press / The MIT Press, 1997.
  52. P. R. Cohen and H. J. Levesque. 'Teamwork.' Nous, 25(4):487-512, 1991.
  53. Jacques Ferber. 'Multi-agent Systems: An Introduction to Distributed Artificial Intelligence.' Addison-Wesley, 1999.
  54. Leonard N. Foner. 'What's an agent anyway? -a sociological case study.' FTP Report -MIT Media Lab, May 1993.
  55. S. Franklin and A. Graesser. 'Is it an Agent, or just a Program? A Taxonomy for Autonomous
  56. Agents.' In Intelligent Agents III. Agent Theories, Architectures and Languages (ATAL'96), volume 1193, Berlin, Germany, 1996. Springer-Verlag.
  57. N. R. Jennings and Michael Wooldridge. 'Agent- Oriented Software Engineering.' In Francisco
  58. J. Garijo and Magnus Boman, editors, Proceedings of the 9th European Workshop on Modeling Autonomous Agents in a Multi-Agent World: Multi-Agent System Engineering (MAAMAW-99), volume 1647, pages 1-7.
  59. Springer-Verlag: Heidelberg, Germany, 30-2 1999.
  60. T. Juan, A. Pearce, and L. Sterling. 'Roadmap: Extending the GAIA methodology for complex open systems.' In Proceedings of the First International Joint Conference on Autonomous Agents and Multi-Agent Systems (AAMAS 2002), Bologna, Italy, July 2002.
  61. Michael Luck, Peter McBurney, and Chris Preist. 'Agent technology: Enabling next generation computing: A roadmap for agent-based computing.' Agent Link report, available from www.agentlink.org/roadmap., 2003.
  62. H. S. Nwana. 'Software agents: An overview.' Knowledge Engineering Review, 11(2):205- 244, 1995.
  63. James Odell. 'Objects and agents compared.' Journal of Object Technology, 1(1):41-53, 2002.
  64. M. Wooldridge and N. R. Jennings. 'Intelligent agents: Theory and practice.' The Knowledge Engineering Review, 10(2):115-152, 1995.
  65. Wooldridge, M; N.R. Jennings, and D. Kinny. 'A methodology for agent-oriented analysis and design.' In Proceedings of the third international conference on Autonomous Agents (Agents-99), 1999.
  66. Wooldridge, M; Jennings, and D. Kinny. 'The GAIA methodology for agent-oriented analysis and design.' Autonomous Agents and Multi-Agent Systems, 3(3), 2000.
  67. M. J. W [17] Wooldridge, M; 'An Introduction to Multi-Agent Systems.' John Wiley & Sons, 2002.
  68. Mehdi Jafari , Abdolahi, Mohamad, Majid Mohamadi, . "Multimodal biometric system fusion using fingerprint and iris with fuzzy logic."International Journal of Soft Computing and Engineering 2.6 (2013): 504-510.
  69. and S.R. Ganorkar,"Fusion and P.U.Lahane of Iris & Fingerprint Biometric for Security Purpose", IJSER, vol.3, pp. 1-5,2012.
  70. Javier Ortega-Garcia, Fierrez-Aguilar, Julian, Joaquin Gonzalez-Rodriguez, and Josef Bigun. "Discriminative multimodal biometric authentication based on quality measures." Pattern Recognition 38, no. 5 (2005): 777-779.
  71. Anil K Arun Ross, Jain,., and Salil Prabhakar. "An introduction to biometric recognition." IEEE Transactions on circuits and systems for video technology 14, no. 1 (2004): 4-20.
  72. Arun, Ross, and Anil Jain. "Information fusion in Biometrics" Pattern recognition letters 24, no. 13 (2003): 2115-2125.
  73. Dr Davinder Kaur, Sangram, Bana, and "Fingerprint recognition using image segmentation" International Journal of Advanced Engineering Sciences and Technologies 5.0 (2011): 1.
  74. Surbhi Garg et.al," paper-Phase Based Iris Recognition"International Journals of Advanced Research in Computer Science and Software Engineering, April ,2014.
  75. Majid Mohamadi , Abdolahi, Mohamad, , and Mehdi Jafari. "Multimodal biometric fusion using iris and fingerprints with fuzzy logic". International Journal of Soft Computing and Engineering 2.6 (2013): 504-510.
  76. S.W.Lee, C.Y. Suen ,L.Lam, and, "Thinning methodologies-A comprehensive survey", IEEE Trans. on Pattern Analysis, vol 14,pp.879,1992.
  77. R. W. Schafer, L. R. Rabiner-Digital Processing of Speech Signals. New Jersey: Prentice-Hall, 1978.
  78. Vibha Tiwari, "MFCC and Its Applications in Speaker Recognition", International Journal on Emerging Technologies, Vol.1 Issue 1, pp. 19-22, 2010.
  79. Davis S., Merlmestein P. -Comparison of Parametric Representations for Monosyllabic Word Recognition in Continuously Spoken Sentencesǁ, IEEE Trans., Aug, 1980. pp. 357-366.
  80. Deb, Kalyanmoy, Amrit Pratap, Sameer Agarwal, and T. A. M. T. Meyarivan. "A fast and elitist multiobjective genetic algorithm: NSGA- II." IEEE transactions on evolutionary computation 6, no. 2 (2002): 182-197.
  81. Davidian, David. "Feed-forward neural network." U.S. Patent 5,438,646, issued August 1, 1995
  82. Jain, Anil K., Arun Ross, and Salil Prabhakar. "An Introduction to Biometric Recognition." IEEE Transactions on circuits and systems for video technology 14, no. 1 (2004): 4-20.
  83. A. A. Alkheir and M. Ibnkahla, "A selective decision-fusion rule for cooperative spectrum sensing using energy detection," Wireless Communications and Mobile Computing, John Wiley & Sons, Ltd, vol. 16, pp. 1603-1611, 2016
  84. S. Ekin, F. Yilmaz, H. Celebi, K. A. Qaraqe, M.-S. Alouini, and E. Serpedin, "Capacity limits of spectrum-sharing systems over hyper-fading channels," Wireless Communications and Mobile Computing, Wiley Online Library, pp. 1-10, 2011
  85. S. Tang, A. Trautman, and H. Nguyen, "On Energy-Based Quality of Detection (QoD) for Cognitive RadioSensor Networks," Int. J Wireless Inf. Networks, vol.23, pp. 214-221, 2016
  86. O. Altrad and S. Muhaidat, "A new mathematical analysis of the probability of detection in cognitive radio over fading channels," EURASIP Journal on Wireless Communications and Networking, vol. 2013:159, pp. 1-11, 2013
  87. L. Sboui, H. Ghazzai, Z. Rezki, and M.-S. Alouini, "Precoder Design and Power Allocation for MIMO Cognitive Radio Two- Way Relaying Systems," IEEE Transactions on Communications, vol. 64, no. 10, pp. 4111-4120, Oct' 2016
  88. G. Chen, Y. Gong, P. Xiao, and J. A. Chambers, "Dual Antenna Selection in Secure Cognitive Radio Networks," IEEE Transactions on Vehicular Technology, vol. 65, no. 10, pp. 7993 - 8002 , Oct' 2016
  89. C. Li and H. Dai, "Transport Throughput of Secondary Networks in Spectrum Sharing Systems," IEEE INFOCOM , (Shanghai, China, 2011), pp. 2732-2740, 2011
  90. T. Jing, W. Li, X. Chen, X. Cheng, X. Xing, Y. Huo, T. Chen, H.- A. Choi, and T. Znati, "Achievable transmission capacity of cognitive radio networks with cooperative relaying," EURASIP Journal on Wireless Communications and Networking, pp.1-15, (2015) 2, DOI: 10.1186/s13638-015-0311-8, Dec' 2015
  91. L. Wang, M. Elkashlan, J. Huang, R. Schober, and R. K. Mallik, "Secure Transmission with Antenna Selection in MIMO Nakagami-m Fading Channels," IEEE Communication on Wireless Communications, vo.13, no.11, pp. 6054-6067, Nov' 2014
  92. J. Akhter, M. I. Islam, A.S.M. M. Rahaman, and M. R. Amin, "The MIMO Performance of LTE Network under Rayleigh Fading Environment," International Journal of Computer Science and Information Security, vol. 14, no. 8, pp. 88-94, Aug' 2016
  93. R. T. Khan, M. I. Islam, S. Zaman, and M. R. Amin, "Optimum Access Analysis of Collaborative Spectrum Sensing in Cognitive Radio Network using MRC," (IJACSA) International Journal of Advanced Computer Science and Applications, pp. 367-373, vol.
  94. S. Jahan, M. I. Islam, and M. R. Amin, "Performance Evaluation of Two-Hop Wireless Network under Asymmetric Fading Environment," Journal of Computer and Communications, vol. 3, pp. 21-27, 2015
  95. L. Zheng, N. Lu, and L. Cai, "Reliable Wireless Communication Networks for Demand Response Control," IEEE Transactions on Smart Grid, vol. 4, no. 1, pp.133-140, March 2013 [14] S. Pathak and H. Katiyar, "Performance Analysis of Wireless link in Rician Fading Channel," International Journal of Advanced Research in Computer and Communication Engineering, vol. 5, no. 4, pp.101-105, April 2016.
  96. X. Chen, J. Chen, H. Zhang, Y. Zhang, and C. Yuen, "On Secrecy Performance of Multiantenna-Jammer-Aided Secure Communications with Imperfect CSI," IEEE Transactions on Vehicular Technology, vol. 65, no. 10, pp. 8014-8024, Oct' 2016 REFERENCES
  97. AUTHORS PROFILE Dieudonne Boupo is a PhD candidate student at Beijing University of Technology where he studies Computer Science & Technology
  98. William August Kotas, Brief History of Cryptography, International Journal of Dairy Science and Technology (IJDST), ISSN: 5800-5240, Vol. 10, No. 8, Pp.183-197, 2000.
  99. David Kahn, History of Cryptography, SANS Institute Infosec Reading Room, ISSN: 3478-3789, Vol.13, No.22, Pp.951- 961, 2001.
  100. Nicholas G.McDonald, Past and Present Methods of Cryptography and Data Encryption, University of UTAH, ISSN: 2378-2467, Vol 4, No.25, Pp.156-168, 2002.
  101. Garcy C.Kessler, An Overview of Cryptography, Handbook on Local Area Network, ISBN: 2200-2345, Vol.10, No.24, Pp-234-240, 2016.
  102. Roger A. Prichard, History of cryptography, Global Information Assurance Certification Paper (GIAC), ISSN: 3567-3678, Vol.18, No.22, Pp-356-367, 2002.
  103. S.J. Sharma, The Art of Cryptography: From Ancient Number System to Strange Number System, International Journal of Application or Innovation in Engineering and management (IJAIEM), ISSN 2319-4847, Vol.2, No.4, Pp:200-203,2013.
  104. Mohammed Abutaha, Mousa Farajallah, Radwan Tahboub, Mohammad Odeh, Survey Paper: Cryptography Is the Science of Information Security, International Journal of Computer Science and Security (IJCSS), ISSN: 4789-4890, Vol.5, No.3, Pp: 345-456, 2011.
  105. Kartalopoulos, Stamatios A Primer on Cryptography in Communications. Institute of Electrical and Electronics Engineers (IEEE) Communications Magazine, ISSN: 2378-2478, Vol.6, No.7, Pp. 146-51, 2006.
  106. Hassan Mathkour, Ghazy Assassa, Al- Muharib, A. Juma'h, A Secured Cryptographic Messaging System, International Conference on Machine Learning and Computing (ICMLC), ISSN:2367-2789,Vol.3,No.5,Pp-567- 587,2009.
  107. Simon Singh, Classical Encryption, Institute of Electrical and Electronics Engineers (IEEE), ISBN: 6780-6890, Vol.6, No.8,Pp- 789-10-234, 2010.
  108. Ahmed Al Vahed, Haddad Sahhavi, An Overview of Modern Cryptography, World Applied Programming (WAP) Journal, ISSN: 2222-2510, Vol.1, No.1, Pp-55-61, 2011.
  109. Rodriguez-Henriquez, F.Saqib, Cryptographic algorithms, Springer, ISBN: 978-10-387- 33883-5, Vol.5, No.10, Pp: 347-11-900, 2007.
  110. Jonathan Katz and Yehuda Lindell Chapman & Hall, Introduction to Modern Cryptography, International Association for Cryptologic Research (IACR), ISBN: 1- 58488-551-3, Vol, 9, No.12, Pp: 584-885- 511, 2011.
  111. Dr. Prerna mahajan and Abhishek Sachdeva, A Study of Encryption Algorithms AES,DES and RSA Security ,Global Journal of Computer Science and Technology Network, Web and Security, ISSN:0975-4172,Vol. 13,No.15, Pp:124-12-234,,2013.
  112. Douglas Selent, Advanced Encryption Standard, Rivier Academic Journal, ISBN: 456-678-345, Vol. 6, No. 2, Pp-908-987-02, 2010.
  113. M.Pitchaiah, Philemon Daniel, Praveen, Implementation of Advanced Encryption Standard Algorithm, International Journal of
  114. Danwei C ,Xiuli H,Xunyi R . Access Control of Cloud Service Based on UCON In the proceeding of Springer Berlin Heidelberg, ISBN:978-3-642-10664-4, 2009,3(4), pp 559-564.
  115. Munich M , Kaefer G G .Cloud Computing Architecture Corporate Research and Technologies ,4th Generation Datacenter IEEE Spectrum, 2000,pp.1-9.
  116. Bibin K ,Onankunju O .Access Control in Cloud Computing, In the proceedings of theIJSRR, ISSN: 2250-3153, 2013,3(9), pp 31-33 .
  117. Gitanjali G , Singh S , Singh J .Policy Specification in Role based Access Control on Clouds In the proceedings of IJCA,ISSN:0975-8887, 2013, 75(1),pp. p.p 39-43 .
  118. Rebensburg K ,Youman C ,Atluri V .Role based access control 2000 workshop In the proceedings of Symposium on Access Control Models and Technologies, Berlin, Germany, Association of Computer Machinary,USA, ,ISBN:1-58113-259-X, 2000, pp. 1-119.
  119. NingG, jiamaoL, xiaoluC . Theory and Practice R & D of Web Services. Published by Machinery Industry, 2006, p.p 1-10
  120. Foster I, ZhaoY .Cloud Computing and Grid Computing 360-Degree Compared In the proceeding of Grid Computing Environments Workshop through IEEE, ISBN: 2008, 1, pp.1-0.
  121. Chen D , zhao H . Data Security and Privacy Protection Issues in Cloud Computing In the proceeding of ICCSEE, ISBN:978-0-7695-9647-6, 2012, 1, pp 647-651 .
  122. Arshad Ahmad Khan Mohammad, Ali Mirza, Srikanth Vemuru,"Cluster Based Mutual authenticated key agreement based on Chaotic Maps for Mobile Ad Hoc Networks",Indian Journal of Science and Technology,2016 July, 9(26), Doi no: 10.17485/ijst/2016/v9i26/95137
  123. G. Usha Devi, E. Vishnu Balan, M. K. Priyan, C. Gokulnath,"Mutual Authentication Scheme for IoT Application",Indian Journal of Science and Technology,2015 Oct, 8(26), Doi no:10.17485/ijst/2015/v8i26/80996
  124. S. Radhika, Sivabalan Arumugam ,"Improved Non Mutual Information Based Multi-path Time Delay Estimation",Indian Journal of Science and Technology,2014 Jan, 7(8), Doi no:10.17485/ijst/2014/v7i8/50109
  125. Punithasurya K, Daniel N , Vasanthi A .A Novel Role Based Cross Domain Access Control Scheme for Cloud Storagein the proceedings of International Journal of ARCET , ISSN: 2278- 1323, 2013, 2(3),pp 942-946 .
  126. Abdunabi R , Ray I.Extensions to the Role Based Access Control Model for Newer Computing ParadigmsColorado State University, 2010.
  127. Sevak B . Security against Side Channel Attack in Cloud Computing IJEAT, ISSN:2249- 8958, 2012, 2(2),pp. 183-186 .
  128. Antonios G .Towards new access control models for Cloud computing systemsKaspersky-IT security for next generation, 2011 , 34(1), pp.1-11
  129. Barron C , Huimin Y U, Zhan J .Cloud Computing Security Case Studies and Research In the International Conference of Parallel and Distributed Computing, ISBN: 978-988-19252-8-2, London, U.K. 2013,2,pp.1-5.
  130. Khan A R . Access Control in Cloud Computing Environment In the proceedings of the IJEAS, ISSN:1819-6608, 2012, 7(5), pp 613-615.
  131. A. Santhanam, R. Arunchunai Annadurai, M. Balakrishnan,"The Effect of Mutual Interaction Anisotropy Parameter on the System of Collective Motion",Indian Journal of Science and Technology,2010 Feb, 3(2), Doi no:10.17485/ijst/2010/v3i2/29661
  132. Lt. Col Milind Gogate, Suruchi Pandey,"Impact of Structured Induction on Mutually Beneficial Deployment and Talent Retention",Indian Journal of Science and Technology,2015
  133. Mar, 8(S6), Doi no:10.17485/ijst/2015/v8iS6/67059
  134. T. T. S. Nguyen, H. Y. Lu, and J. Lu, "Web-page Recommendation based on Web Usage and Domain Knowledge," IEEE Transactions on Knowledge and Data Engineering, vol. 26, no. 10, pp. 2574-2587, 2014.
  135. B. Liu, Web Data Mining: Exploring Hyperlinks, Contents, and Usage Data. Springer Science & Business Media, 2007.
  136. Y.-F. Huang and J.-T. Jhang, "Recommendations of Personal Web Pages Based on User Navigational Patterns," International Journal of Machine Learning and Computing, vol. 4, no. 4, p. 307, 2014.
  137. C. I. Ezeife and Y. Lu, "Mining Web Log Sequential Patterns with Po- sition Coded Pre-order Linked Wap-tree," Data Mining and Knowledge Discovery, vol. 10, no. 1, pp. 5-38, 2005.
  138. J. Borges and M. Levene, "Generating Dynamic Higher-order Markov Models in Web Usage Mining," European Conference on Principles of Data Mining and Knowledge Discovery, pp. 34-45, 2005.
  139. G. Stumme, A. Hotho, and B. Berendt, "Usage Mining for and on the Semantic Web," National Science Foundation Workshop on Next Generation Data Mining, vol. 143, 2002.
  140. H. Dai and B. Mobasher, Integrating Semantic Knowledge with Web Usage Mining for Personalization, 2007.
  141. S. A. Rios and J. D. Velásquez, "Semantic Web Usage Mining by a Concept-based Approach for off-line Web Site Enhancements," IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, 2008. WI-IAT'08, vol. 1, pp. 234-241, 2008.
  142. S. Salin and P. Senkul, "Using Semantic Information for Web Usage Mining based Recommendation," 24th International Symposium on Computer and Information Sciences, 2009. ISCIS 2009., pp. 236-241, 2009.
  143. M. Göksedef and S ¸. Gündüz-Ögüdücü, "Combination of Web Page Recommender Systems," Expert Systems with Applications, vol. 37, no. 4, pp. 2911-2922, 2010.
  144. J.-Q. Li, Y. Zhao, and H. Garcia-Molina, "A Path-based Approach for Web Page Retrieval," World Wide Web, vol. 15, no. 3, pp. 257-283, 2012.
  145. N. R. Mabroukeh and C. I. Ezeife, "Semantic-rich Markov Models for Web Prefetching," vol. 2009 IEEE International Conference on Data Mining Workshops, pp. 465-470, 2009.
  146. Bose, Amit and Beemanapalli, Kalyan and Srivastava, Jaideep and Sahar, Sigal, "Incorporating Concept Hierarchies into Usage Mining based Recommendations," vol. International Workshop on Knowledge Discovery on the Web, pp. 110-126, 2006.
  147. H. Wen, L. Fang, and L. Guan, "A Hybrid Approach for Personalized Recommendation of News on the Web," Expert Systems with Applica- tions, vol. 39, no. 5, pp. 5806-5814, 2012.
  148. R. Forsati and M. R. Meybodi, "Effective Page Recommendation Algorithms based on Distributed Learning Automata and Weighted Association Rules," Expert Systems with Applications, vol. 37, no. 2, pp. 1316-1330, 2010.
  149. K. C. Srikantaiah, N. K. Kumar, K. R. Venugopal, and L. M. Patnaik, "Web Caching and Prefetching with Cyclic Model Analysis of Web Object Sequences," International Journal of Knowledge and Web Intel- ligence 2, vol. 5, no. 1, pp. 76-103, 2014.
  150. K. C. Srikantaiah, P. L. Srikanth, V. Tejaswi, K. Shaila, K. R. Venugopal, and L. M. Patnaik, "Ranking Search Engine Result Pages based on Trustworthiness of Websites," IJCSI International Journal of Computer Science Issues, vol. 9, no. 4, 2012.
  151. H.-Q. Li, F. Xia, D. Zeng, F.-Y. Wang, and W.-J. Mao, "Exploring Social Annotations with the Application to Web Page Recommendation," Journal of Computer Science and Technology, vol. 24, no. 6, pp. 1028- 1034, 2009.
  152. Q. Yang, J. Fan, J. Wang, and L. Zhou, "Personalizing Web Page Recommendation via Collaborative Filtering and Topic-aware Markov Model," vol. 2010 IEEE International Conference on Data Mining, pp. 1145-1150, 2010.
  153. B. Zhou, S. C. Hui, and A. C. M. Fong, "Efficient Sequential Access Pattern Mining for Web Recommendations," International Journal of Knowledge-based and Intelligent Engineering Systems, vol. 10, no. 2, pp. 155-168, 2006.
  154. N. Cheung, P. Mitchell, and T. Y. Wong, "Diabetic retinopathy," The Lancet, vol. 376, no. 9735, pp. 124-136, 2010.
  155. Q. Mohamed, M. C. Gillies, and T. Y. Wong, "Management of diabetic retinopathy: a systematic review," Journal of the American Medical Association, vol. 298, no. 8, pp. 902-916,2007
  156. Mookiah. MRK., Acharya, UR., Chua, CK., Lim, CM., Ng, E., & Laude, A, "Computer-aided diagnosis of diabetic retinopathy: a review," Comput Biol Med. 43, 2136-55, 2013.
  157. Walter T, Klein J-C, Massin P, Erginay A, "A contribution of image processing to the diagnosis of diabetic retinopathy -detection of exudates in color fundus images of the human retina. Transactions on Medical Imaging", 21(10):1236-43.2010.
  158. Sopharak A, Uyyanonvara B, Barmanb S, Williamson TH, "Automatic detection of diabetic retinopathy exudates from non-dilated retinal images using mathematical morphology methods," Computerized Medical Imaging and Graphics. 32:720-7,2008.
  159. C. I. Sanchez, M. Garcia, A. Mayo, M. I. Lopez, R. Hornero, "Retinal image analysis based on mixture models to detect hard exudates," Medical Image Analysis 13 (4) 650 -658,2009.
  160. C. Sinthanayothin, J. F. Boyce, T. H. Williamson, H. L. Cook, E. Mensah, S. Lal, D. Usher, "Automated detection of diabetic retinopathy on digital fundus images," Diabetic Medicine 19 (2), 105-112, 2002.
  161. A. D. Fleming, S. Philip, K. A. Goatman, G. J. Williams, J. A. Olson, P. F. Sharp, "Automated detection of exudates for diabetic retinopathy screening", Physics in medicine and biology 52 (24), 7385, 2007.
  162. G. G. Gardner, D. Keating, T. H. Williamson, A. T. Elliott, Automatic detection of diabetic retinopathy using an artificial neural network: a screening tool, Br J Ophthalmol 80, 940-944, 1996.
  163. C. I. Sanchez, R. Hornero, M. I. Lopez, M. Aboy, J. Poza, D. Abasolo, A novel automatic image processing algorithm for detection of hard exudates based on retinal image analysis, Medical Engineering and amp; Physics 30 (3) ,350-357(2008).
  164. M. Niemeijer, B. van Ginneken, S. R. Russell, M. S. A. Suttorp-Schulton, M. D. Abramoff, Automated detection and differentiation of drusen, exudates, and cotton-wool spots in digital color fundus photographs for diabetic retinopathy diagnosis, Investigative ophthalmology & visual science 48 (5), 2260-2267,2008. International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 3, March 2017 119 https://sites.google.com/site/ijcsis/ ISSN 1947-5500
  165. J. C. Dunn, A fuzzy relative of the isodata process and its use in detecting compact well-separated clusters, Journal of Cybernetics 3 (3) , 32-57, 1993.
  166. W. Hsu, P. M. D. S. Pallawala, M. L. Lee, K.-G. A. Eong, The role of domain knowledge in the detection of retinal hard exudates, Computer Vision and Pattern Recognition, IEEE Computer Society Conference on 2, 246, 2001.
  167. A. Osareh, B. Shadgar, R. Markham, A computational-intelligence-based approach for detection of exudates in diabetic retinopathy images, Information Technology in Biomedicine, IEEE Transactions on 13 (4), 535 -545, 2009.
  168. M. Usman Akram, Anam Tariq, Shoab A Khan, M. Younus Javed, "Automated Detection of Exudates and Macula for Grading of Diabetic Macular Edema", Computer Methods and Programs in Biomedicines, Volume 114, Issue 2, pp. 141-152, April 2014.
  169. Anam Tariq, M. Usman Akram, Arslan Shaukat, Shoab A Khan, Automated Detection and Grading of Diabetic Maculopathy in Digital Retinal Images Springer Journal of Digital Imaging, Vol. 26, No. 4, pp. 803-812, 2013.
  170. Arici T, Dikbas S, Altunbasak Y. A histogram modification framework and its application for image contrast enhancement. IEEE Trans Image Process. 18:No. 9, 2009.
  171. Zuoyong Lia, Chuancai Liu, Guanghai Liu, Yong Cheng, Xibei Yang, Cairong Zhao," A novel statistical image thresholding method" Int. J. Electron. Commun. 64, 1137-1147, 2010
  172. J. C. Dunn, "A fuzzy relative of the ISODATA process and its use in detecting compact well-separated clusters," J. Cybernetics, vol. 3, no. 3,pp. 32-57, 1973.
  173. Giri Babu Kande, P.V.Subbaiah and T.Satya Savithri, "Feature Extraction in Fundus Images", Journal of Medical and Biological Engineering, Vol. 29, Issue 3, pp. 122 -130,. ISSN: 1609-0985, 2009. International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 3, March 2017 REFERENCES
  174. Dridi. (2015). Information Retrieval Framework Based On Social Document Profile, Conference on Advanced Information Systems Engineering.
  175. Ganesh. (2011). A Comparative Study of Stemming Algorithms. Anjali Ganesh Jivani et al, Int. J. Comp. Tech. Appl., 2 (6), pages 1930-1938.
  176. Passant, P. Laublet. (2008). Meaning Of A Tag : A Collaborate Approach To Bridge The Gap Between Tagging and Linked Data, Proceedings of the Linked Data on the Web (LDOW2008) workshop at WWW2008, LDOW.
  177. Sharif. (2009). Combining Ontology and Folksonomy an Integrated, In Emerging Trends In Technology: Libraries Between Web 2.0, Semantic Web and Search Technology, Italy, http://Eprints.Rclis.Org/15058/, Last Modified November 2014.
  178. Berlin Chen. (1999). Modern Information Retrieval, second edition, Chapter 2, Co., Inc. Boston, MA,ACM, USA.19-69.
  179. Christopher D. Manning, Prabhakar Raghavan, et al. (2009). An Introduction to Information Retrieval, online book edition, Cambridge University.
  180. D. Vallet, J. Jose, and et al. (2010). Personalizing Web Search With Folksonomy-Based User and Document Profiles, ECIR'2010 Proceeding Of European Conference On Advances In Information Retrieval, Springer-Verlag Berlin Heidelberg, 420-430.
  181. Vemula. (2014). Ontology Based Personalized Search Engine, Technical Library of Grand Valley State University .paper 182.
  182. D. Yong. (2011). Enhanced Web Information Retrieval By Topic Tag Mining, Enhanced Web Information Retrieval By Topic Tag Mining Ding Yong Journal Of Convergence Information Technology, 6(4), 191-196 .
  183. Zhou, J. Bian, et al. (2008). Exploring Social Annotation For Information Retrieval, The 17th International Conference On World Wide Web, ACM. 715-724.
  184. H. Ching.( 2013). Integrating ontology technology with folksonomies for personalized social tag recommendation, Elsevier B.V., 13(8), 3745-3750.
  185. J. Gemmell, Th. Schimoler, et al.( 2011). Recommendation By Example In Social Annotation Systems, Springer-Verlag Berlin Heidelberg, 209-220.
  186. M. Nickles , T. Froehner, G. Weiss. (2004). Social Annotation of Semantically Heterogonous Knowledge, The 4th International Workshop On Knowledge Markup and Semantic Annotation (Semannot).
  187. N. Sarkas , S. Das, et al. (2009). Improved Search For Socially Annotated Data, The VLDB Endowment Journal, ACM , 2(1), 778-789. International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 3, March 2017
  188. O. Medelyan, E. Frank, I. H. Witten. (2009). Human-competitive tagging using automatic key phrase extraction. To appear in Proc. of the Internet Conference of Empirical Methods in Natural Language Processing, EMNLP, Singapore.
  189. P. Gottgtory, N. Kasabov, et al. (2004). An Ontology Engineering Approach For Knowledge Discovery From Data In Evolving Domains, Data Mining IV, Journal Article, 7, 43-52,.
  190. Ph. Mylonas, D. Vallet, and et al. (2008). Personalized Information Retrieval Based On Context and Ontological Knowledge, The Knowledge Engineering Review, 23 (1).
  191. S. Kalarani. (2010). Integration Of Semantic Web & Knowledge Discovery for Enhanced Information Retrieval, International Journal Of Computer Applications, 1(1), 99-103,.
  192. S. Waghmar, et el. (2013). Implementation of Personalized User Model Base on Ontology: A Review Study, International Journal of Computer Science and Information Technology, 4(6), 787-790.
  193. T. Gruber. (1993). A Translation Approach To Portable Ontologies, Knowledge Acquisition, Special Issue: Current Issues In Knowledge Modeling, 5(2), 199 -220.
  194. Vladan Devedžić • Dragan Gaševic. (2009). Web2.0 & semantic web, Springer-Verlag Berlin Heidelberg, 6, 25-54.
  195. X. Wu, L. Zhang. (2006). Exploring Social Annotations for the Semantic Web, The 15th International World Wide Web Conference Committee (IW3C2), ACM,
  196. Z. Mezghani, I. Amous, et al. (2012). A User Profile Modeling Using Social Annotations, WWW 2012 -Multiapro'12 Workshop.
  197. Z. ZHOU. (2011). Social Information Retrieval Based On User Interesting mining, Journal of Computational Information Systems.7(4), 1373-1379.
  198. 2017. [Online]. Available: https://wordnet.princeton.edu/. [Accessed: 14-Jan-2017]. International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 3, March 2017
  199. References
  200. Bennett, C. H. (1973), "Logical reversibility of computation", IBM Journal of Research and Development, 17, 525-32.
  201. Landauer, R. (1961), "Irreversibility and heat generation in the computational process", IBM Journal of Research and Development, 5, 183-91
  202. Kim, J-Y, Kang, J-M, Kim, T-Y, and Han, S-K. (2006), "All-optical multiple logic gates with XOR, NOR, OR, and NAND functions using parallel SOA-MZI structures: theory and experiment", Journal of Light Wave Technology, IEEE, 24(9), 3392-9 .
  203. Mandal, S., Samanta, S., Maity, G.K. and Mukhopadhyay, S. (2016), "All-optical Reversible Logic Gate Implementation using TOAD" ,International Journal of Computer Science and Information Security ,Volume 14 No. 12.
  204. Ghosh, Amal K., Choudhury, P.Pal and Basuray, A. (2008), "Modified Trinary Optical Logic Gates and their Applications in Optical Computation", Innovations and Advanced Techniques in Systems, Computing Sciences and Software, Springer, ,87- 92.
  205. Sokoloff, S-K J. P., Glesk, I., Prucnal, P. R. and Boneck, R. K. (1994), "Performance of a 50 Gbit/s Optical Time Domain Multiplexed System Using a Terahertz Optical Asymmetric Demultiplexer", IEEE Photon. Techno. Lett.6 (1), 98-100. International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 3, March 2017
  206. Maity, G. K., Maity, S. P. and Roy, J. N.(2012), "Design of All-Optical reversible TOAD-based Feynman and Toffoli Gate", International Conference on Advanced Computing & Communication Technologies (ACCT12), Rohtak (India).
  207. Mandal,A.K., Samanta, S., Maity, G.K. and Manik, N.B. (2015), "Implementation of Reed Muller Expansion Technique Using Mach-Zehnder Interferometer Based All Optical Reversible Gate" Advances in Optical Science and Engineering, Springer Proceedings in Physics, pp. 497-505, Volume-166, DOI 10.1007/978-81-322-2367-2_61. International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 3, March 2017 153 https://sites.google.com/site/ijcsis/ ISSN 1947-5500
  208. The Ministry of Finance, Investments Division, E-AUCTION: THE eWAY OF BUSINESS PROCUREMENT, 3/5/2009.
  209. A Framework for Agent-Based Trust Management in Online Auctions ,Haiping Xu, Sol M. Shatz, and Chris Bates, National Science Foundation under grant number CNS-0715648 and CNS-0715657.
  210. Internet Crime Report.IC3.
  211. E-Negotiation System Based on Intelligent Agents in B2C E-Commerce,Kourosh Dadashtabar Ahmadi, Nasrollah Moghadam Char- kari, Neda Enami,Advances on Information Sciences and Service Sciences. Volume 3, Number 2, March 2011
  212. Sulin Ba a, Andrew B. Whinston b, Han Zhang, Building trust in online auction markets through an economic incentive mechanism, Decision Support Systems 35 (2003) 273-286
  213. Duen Horng Chau, Shashank Pandit, and Christos Faloutsos, Detecting Fraudulent Personalities in Networks of Online Auctioneers, Fürnkranz, T. Scheffer, and M. Spiliopoulou (Eds.): PKDD 2006, LNAI 4213, pp. 103 -114, 2006 © Springer-Verlag Berlin Heidel- berg 2006
  214. Ehsan Mokhtari, Zeinab Noorian, Behrouz Tork Ladani, Mohammad Ali Nematbakhsh, A Context-Aware Reputation-Based Model of Trust for Open Multi-agent Environments, Canadian AI'11 Proceedings of the 24th Canadian conference on Advances in artificial intelligence, Pages 301-312,Springer-Verlag Berlin, Heidelberg ©2011, ISBN: 978-3-642-21042-6.
  215. John O"Donovan , Vesile Evrim, Barry Smythand Dennis McLeod, Personalizing Trust in Online Auctions, Correspondence to: John O"Donovan, Adaptive Information Cluster, School of Computer Science and Informatics, University College Dublin, Belfield, Dublin 4, Ireland.
  216. Dawn G. Gregg, Judy E. Scott ,A typology of complaints about eBay sellers, Communications of the ACM, Vol. 51 No. 4, Pages 69-7410.1145/1330311.1330326.april 2008
  217. S. Scott Nadler, John F. Kros, An assessment of supply chain managers" trust in online auctions, Industrial Management & Data Sys- tems Vol. 110 No. 6, 2010 pp. 805-822.
  218. Fei Donga, Sol M. Shatza and Haiping Xu, Combating Online In-Auction Fraud: Clues, Techniques and Challenges, National Science Foundation under grant number CNS-0715648 and CNS-0715657.2010
  219. An Online Auction Trust Model Composed of Multi-Key-Factors Trust Path, International Journal of Engineering & Technology IJET-IJENS Vol: 12 No: 02, Wenjia Wang, Dingwei Wang. April 2012
  220. Fraud Detection in Electronic Auction, Duen Horng Chau1, Christos Faloutsos2,2010
  221. Trust, Reputation and Fairness in online auction , Adam Wierzbicki, Polish Institute of Information Technology 2006.
  222. Fan Wu⇑ , Hsiao-Hui Li, Yo-Hsin Kuo, Reputation evaluation for choosing a trustworthy counterparty in C2C e-commerce, Electron- ic Commerce Research and Applications 10 (2011) 428-436.
  223. Hany Abdelghaffar, Hussien Moustafa, INVISTEGATING THE CRITICAL SUCCESS FACTORS FOR ONLINE C2C AUCTIONS IN EGYPT, European, Mediterranean & Middle Eastern Conference on Information Systems 2012.
  224. A dynamic stage-based fraud monitoring framework of multiple live auctions, Samira Sadaoui, Sadaoui, S. & Wang, X. Appl Intell (2017).
  225. http://www.isc.senshu-u.ac.jp/~thc0456/EAHP/AHPweb.html. International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 3, March 2017 REFERENCES
  226. N. Naharudin, M. S. S. Ahamad , A. F. M. Sadullah, "GIS DATA COLLECTION FOR PEDESTRIAN FACILITIES AND FURNITURE USING MAPINR FOR ANDROID", International Conference on Geomatic and Geospatial Technology (GGT), 2016.
  227. EBRAHIM POORAZIZI, ALI A. ALESHEIKH, "Developing a Mobile GIS for Field Geospatial Data Acquisition", WSEAS International Conference on URBAN PLANNING and TRANSPORTATION (UPT'07), Heraklion, Crete Island, Greece, 2008.
  228. Eiman Kanjo, Steve Benford, Mark Paxton, Alan Chamberlain and etc, "MobGeoSen: facilitating personal geosensor data collection and visualization using mobile phones", Pers Ubiquit Comput (2008) 12:599-607
  229. Asmaa Ahmed Hussein, Elkhedr Hassan Eibrahim, Aziza Asem, " MOBILE GEOGRAPHIC INFORMATION SYSTEMS: A CASE STUDY ON MANSOURA UNIVERSITY, EGYPT ", International Journal of Computer Science & Information Technology (IJCSIT) Vol 3, No 6, 2011.
  230. Michael F. Goodchild, " CITIZENS AS SENSORS: THE WORLD OF VOLUNTEERED GEOGRAPHY ", National Center for Geographic Information and Analysis, and Department of Geography, University of California, Santa Barbara, 2007.
  231. Michael F. Goodchild, "The Role of Volunteered Geographic Information in a Postmodern GIS World", ArcUser Spring, 2010, www.esri.com.
  232. Ming-Hsiang Tsou, "Integrated Mobile GIS and Wireless Internet Map Servers for Environmental Monitoring and Management ", Cartography and Geographic Information Science, Vol. 31, No. 3, 2004.
  233. Ali Mansourian, Mahdi Farnaghi and Mohammad Taleai, "Development of New Generation of Mobile GIS System Using Web services Technologies: A Case Study for Emergency Management", Journal of Applied Sciences 8 (15): 2669-2677, 2008.
  234. Martin Hansen, Matti Nelleman Petersen, Thomas F. Kokfelt and Bo Møller Stensgaard, "aFieldWork -an Android app for offline recording of geological information and data display", © 2016 GEUS. Geological Survey of Denmark and Greenland Bulletin 35, 99- 102. Open access: www.geus.dk/publications/bull.
  235. MUHAMMAD JAHANGIR IKRAM and AGHA ALI AKRAM, "Air pollution monitoring through an Internet-based network of volunteers", International Institute for Environment and Development, 2007, http://eau.sagepub.com/content/19/1/225.
  236. Wagner Dias de Souza, Jugurta Lisboa-Filho, Jean Henrique de Sousa Camara, Jarbas Nunew Vidal Filho, and Alcione de Paiva Oliveira, "ClickOnMap: A Framework to Develop Volunteered Geographic Information Systems with Dynamic Metadata", B. Murgante et al.(Eds.): ICCSA 2014, Part II, LNCS 8580, pp. 532-546, 2014, © Springer International Publishing Switzerland.
  237. Maria Attard, Muki Haklay and Cristina Capineri, "The Potential of Volunteered Geographic Information (VGI) in Future Transport Systems", Urban Planning (ISSN: 2183-7635), Volume 1, Issue 4, Pages 6-19, 2016.
  238. Linda See, Peter Mooney, Giles Foody and etc, "Crowdsourcing, Citizen Science or Volunteered Geographic Information? The Current State of Crowdsourced Geographic Information", International Journal of Geo-Information, 2016, www.mdpi.com/journal/ijgi.
  239. Mohamed Eleiche and Béla Márkus, "STANDALONE FRAMEWORK FOR MOBILE GIS", Geomatikai Közlemények XII, 2009.
  240. Diego MAGNI, Maria A. BROVELLI and Fernando SANSÒ, " DESIGN AND IMPLEMENTATION OF A CONTEXT AWARE MOBILE GIS", PhD in Geodesy and Geomatics, Department of Environmental, Hydraulic, Infrastructures and Surveying Engineering, 2008, http://geomatica.como.polimi.it.
  241. Z. Fazli, M. R. Delavar and M. R. Malek, " Context-Aware Mobile GIS for Updating and Acquisition of Data Use Case: Urban Property Survey", Department of Surveying and Geomatic Eng., College of Eng., University of Tehran, 2011.
  242. Ramya Venkateswaran and Pia Bereuter, "The GenW2 Framework: An Architecture for Mobile GIS and Mapping Scenarios", 12 th AGILE International Conference, 2009.
  243. Yue Li, Zhong Xie, and Zhiyong Huang, "Design and Implementation of a WAP GIS Framework", Proceedings of the Third International Conference on Web Information Systems Engineering (Workshops) 0-7695-1754-3/02 $17.00 © 2002 IEEE. International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 3, March 2017
  244. T.S Rappaport, "Wireless Communications: Principles and Practice (2nd edition)", Chapter 3, Prentice Hall, Dec 2001
  245. Davide Anguita, Davide Brizzolara, "VHDL Modules and Circuits for Underwater Optical Wireless Communication Systems", Issue 9, Volume 9, September 2010, ISSN: 1109- 2742
  246. Dario Pompili, "EFFICIENT COMMUNICATION PROTOCOLS FOR UNDERWATER ACOUSTIC SENSOR NETWORKS" Georgia Institute of Technology August 2007
  247. MD. SHAMIM ANOWER "Estimation Using Cross- correlation in a Communications Network", Physical communication, 2014
  248. Mustafa YAĞIMLI, "DESIGN of LASER BASED UNDERWATER COMMUNICATION SYSTEM", Journal of Naval Science and Engineering 2011, Vol.7, No.2, pp. 1-10
  249. W. Stallings, Wireless Communication and Networking, Chapter 10, Pearson Education, 2006.
  250. Propagation Models, [Online]. Available: www.mht.bme.hu/~nagy/ea_gsm.ppt [Accessed: Nov.
  251. Md. Masud Hasan, Kishore Bhowmik , "Analysis of Cell Planning and Link Budgeting in WiMAX Communication" IJCSI Journal, Volume 9, Issue 3, No 1, May 2012
  252. Cell Planning, [Online]. Available: http://cellular-my- reveal.blogspot.com/2007/04/cell-planning.html.[Accessed: Nov. 12.2015].
  253. J. Hirsch, "An index to quantify an individual's scientific research output," Proceedings of the National Academy of Sciences, vol. 102, no. 46, pp. 16569- 16572, 2005.
  254. S. Marginson, "University Rankings and Social Science," European Journal of Education, Vol. 49, 2014.
  255. J. Salmi and A. Saroyan, "League tables as policy instruments: uses and misuses," in OECD/IMHE and Hochschulrektorenkonferenz, Germany, 2006.
  256. Y. Cheng, "To better measure social sciences performance. A review of existing ranking indicators," in IREG 2010, 2010.
  257. A. Rauhvargers, "Global University Rankings and their Impact. A report for the European Universities Association (EUA)," 2011.
  258. G. Prathap and B. M. Gupta, "Ranking of Indian engineering and technological institutes for their research performance during 1999-2008.," in Curr. Sci, 97(3), 2008.
  259. G. Prathap and G. BM, "Ranking of Indian universities for their research output and quality using a new performance index," in Curr. Sci, 97(6), 2009.
  260. R.Lukman, D. Krajnc and P. Glavič., "University ranking using research, educational and environmental indicators," Journal of Cleaner Production, pp. 619- 628, 2010.
  261. R. Ranjan, P. Chatterjee and a. S. Chakraborty, "Evaluating performance of engineering departments in Table 2: Combined list of scholars with the highest number of citation in all of the studied university International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 3, March 2017
  262. References
  263. A Freitas "Comprehensible classification models: a position paper", ACM-SIGKDD Explorations, Pp 27-35, 2014.
  264. B.Saini, V.Singh, S.Kumar, "Information Retrieval Models And Searching Methodologies: Survey", In International Journal of Advance Foundation and Research in Computer, Pp 57-62, 2014.
  265. Bruce Croft and D. Metzler and T. Strohman. Search Engines: Information Retrieval in Practice. Addison-Wesley, 2009.
  266. Been Kim, Cynthia Rudin and Julie Shah, "The Bayesian Case Model: A Generative Approach for Case Based Reasoning and Prototype Classification", Pp 467-498, 2014.
  267. B.Ustun and C.Rudin, "Methods and models for interpretable linear classification", Pp 49-61, 2014.
  268. B.Narendra, T.Kavitha, P.Surya Chandra, T.BalaKrishna, "A Self Learning Naive Bayes Multi Label Classifier for Analyzing Student Educational Interest", Vol.5 Issue 6, Pp 128-190, June 2015.
  269. Benjamin Letham Cynthia Rudin Katherine A.Heller, "Growing a List", Pp 32-97, June 2013.
  270. C.Ramasubramanian and R.Ramya, "Effective Pre-Processing Activities in Text Mining using Improved Porter"s Stemming Algorithm", International Journal of Advanced Research in Computer and Communication Engineering, Vol.2, Issue 12, December 2013.
  271. Cynthia Rudin, Benjamin Letham, David Madigan, "Learning Theory Analysis for Association Rules and Sequential Event Prediction", Journal of Machine Learning Research , Pp 3385-3436, November 2013.
  272. Cynthia Rudin, Benjamin Letham, Ansaf Salleb Aouissi, Eugene Kogan, David Madigan, "Sequential Event Prediction with Association Rules", Pp 3441-3492, 2013.
  273. D.S.Guru, Y.H.Sharath, S.Manjunath, "Texture Features and KNN in Classification of Flower Images", IJCA Special Issue on "Recent Trends in Image Processing and Pattern Recognition", Pp 34-47, 2010.
  274. H.Dong, F.K.Husain, E.Chang, "A Survey in Traditional Information Retrieval Models", IEEE International Conference on Digital Ecosystems and Technologies, Pp 397-402, 2008.
  275. Hassan Saif, Miriam Fernandez,Yulan He, Harith Alani , On Stopwords, Filtering and Data Sparsity for Sentiment Analysis of Twitter.
  276. J.Han, M.Kamber, "Data Mining:Concepts and Techniques," Elsevier, Second Edition, Pp 18-25, 2006.
  277. J. Xu and W. B. Croft. Improving the Effectiveness of Information Retrieval with Local Context Analysisn. ACM Transactions on Information Systemsl, 18(1):79-112, 2000.
  278. Mr.Rahul Patel, Mr.Gaurav Sharma, "A Survey on Text Mining Techniques", International Journal Of Engineering And Computer Science ISSN 2319-7242, Vol.3, Issue 5,Pp 5621-5625,May 2014.
  279. Mansi Goyal, Ankita Sharma "An Efficient Malicious Email Detection Using Multi Naive Bayes Classifier", Vol.5, Issue5, Pp39- 58, May 2015.
  280. M.Padmavathi, 2 T.V.N.Sudheer, "Clustering Sentence Level Text Using a Fuzzy Back Propagation Clustering Algorithm" International Journal of Computer Science and Mobile Computing, Vol.4, Issue.7, Pp 523-528, July 2015.
  281. N.Suguna 1, and Dr. K. Thanushkodi 2, "An Improvd K-Nearest Neighbor Classification Using Genetic Algorithm",IJCSI International Journal of Computer Science, Vol.7, Issue4, Pp 814- 1694, 18 July 2010.
  282. Priyanka Tayadel, Poorva Joshi2, Shraddha Golhar3, V.N.Dhawas 4 "Review on Fuzzy Relational Clustering Algorithm for Clustering Sentence Level Text", Ijournals:-International Journal of Software & Hardware Research in Engineering, Vol.3, Pp-2347- 4890, April, 2015.
  283. R.Sagayam, S.Srinivasan, S.Roshini, "A Survey of Text Mining: Retrieval, Extraction and Indexing Techniques", International 217 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 (IJCSIS) International Journal of Computer Science and Information Security, Volume 15 No. 3, March 2017 Journal of Computational Engineering Research (ijceronline.com)
  284. S.Raman, V.Kumar, S.Venkatesan, "Performance Comparison of Various Information Retrieval Models Used in Search Engines", IEEE Conference on Communication, Information and Computing Technology, Mumbai, India, Pp 78-89, 2012.
  285. Shalini Puri Sona Kaushik,"A Technical Study and Analysis on Fuzzy Similarity Based Model for Text Classification", International Journal of Data Mining & Knowledge Management Process (IJDKP) Vol.2, Pp 310-323, March 2012.
  286. Snehal Raundal, C.R.Barde "Sentence Level Clustering using Fuzzy Relational Algorithm" International Journal of Computer Applications ,Vol.7 Pp 8887-0975, June 2015.
  287. S. Jones and S. WalkervvKaren and S. E. Robertson. A probabilisticmodel of information retrieval: Development and comparative experiments. Information Processing & Management 36(6): 779-808, 2000.
  288. Vishal Gupta and Guruprit Lehal, "A Survey of Text Mining Techniques and Applications", Journal of Emerging Technologies In Web Intelligence, Vol.1, Pp 85-101, August 2009.
  289. Vishal Gupta, Gurpreet Singh Lehal, A Survey of Common Stemming Techniques and Existing Stemmers for Indian Languages, Journal of Emerging Techniloigies in Web Intelligence, VOL. 5, NO.
  290. Wu, Y. Li, and Y. Xu "Deploying Approaches for Pattern Refinement in Text Mining," IEEE Sixth Int"l Conf. Data Mining (ICDM "06) pp 1157-1161, 2006.
  291. Xue, X,Zhou, Z "Distributional Features for Text Categorization", IEEE Transactions on Knowledge and Data Engineering, Vol.21, Pp 428-442, 2009.
  292. Y.S.Kim, Comparison of the decision tree, artificial neural network, and linear regression methods based on the number and types of independent variables and sample size," Journal of Expert Systems with Application, Elsevier, Pp 1227-1234 ,2008. S.Brindha received B.Sc degree in Physics from Bharathiyar University. She done her Master Degree in Information Science and Management in Periyar University and she awarded M.Phil Computer Science from the Bharathiyar University. She has 3 years of teaching experience and 5 years of Technical Experience in Hash Prompt Softwares Pvt. Ltd. Currently She is doing her Ph.D computer Science in Erode Arts and Science College. Her Research area includes Data Mining and Text Mining. and M.Phil in Computer Science from the Bharathiar University. He received the Ph.D degree in Computer Science from the Bharathiar University. He has 28 years of teaching experience starting from Lecturer to Associate Professor. At present he is working as Associate Professor of Computer Science in Erode Arts and Science College, Erode, Tamilnadu, India. He has guided for more than 70
  293. M.Phil research Scholars in various fields. Currently he is Guiding 4
  294. M.Phil Scholars and 8 Ph.D Scholars. He is a member of Board studies of various Autonomous Colleges and Universities. He published around 69 research papers in national and international journals and conferences. His current research interests include Image processing and Data Mining.
  295. U. Hess and P. Thibault, "Darwin and Emotion Expression", American Psychological Association, 2009, vol. 64, no. 2, 120 128.
  296. S. M. Banu et. al., "A Novel Approach for Face Expressions Recognition", IEEE 10th Jubilee International Symposium on Intelligent Systems and Informatics, 2012.
  297. D. Drume and A. S. Jalal, "A Multi-level Classification Approach for Facial Emotion Recognition", IEEE International Conference on Computational Intelligence and Computing Research, 2012.
  298. M. Saaidia et. al., "Facial Expression Recognition Using Neural Network Trained with Zernike Moments", IEEE International Conference on Artificial Intelligence with Applications in Engineering and Technology, 2014.
  299. Zhiding Yu et. al., "Image based Static Facial Expression Recognition with Multiple Deep Network Learning", ACM, 2015.
  300. V. D. Bharate et. al., "Human Emotions Recognition using Adaptive Sublayer Compensation and various Feature Extraction Mechanism", IEEE WiSPNET, 2016
  301. M. Aziz et. al., "Facial Expression Recognition using Multiple Feature Sets", IEEE, 2015.
  302. D. Datcu, and J. M. Rothkrantz, "Facial Expression Recognition with Relevance Vector Machines", Interactive Collaborative Information Systems (ICIS).
  303. M. Naor and A. Shamir, "Visual Cryptography", Alfredo De Santis (Ed.), Advances in Cryptology Proceedings of Eurocypto 94, Lecture Notes in Computer Science, vol. 950, pp. 1-12, 1994.
  304. S. Arumugam, R. Lakshmanan and Atulya K. Nagar, "On (k, n) visual cryptography scheme", Journal of Designs, Codes and Cryptography, vol. 71, no. 1, pp. 153-162, July 2014.
  305. Cheng-Chi Lee, Hong-Hao Chen, Hung-Ting Liu and Guo-Wei Chen Chwei-Shyong Tsai, "A new visual cryptography with multi-level encoding", Journal of Visual Languages and Computing, vol. 25, no. 3, pp. 243-250, June 2014.
  306. Tsung-Lieh Lin, Shi-Jinn Horng, Kai-Hui Lee, Pei-Ling Chiu, Tzong-Wann Kao, Yuan-Hsin Chen, Ray-Shine Run, Jui-Lin Lai and Rong- Jian Chen, "Novel multiple secret sharing", Journal of Expert Systems with Applications, vol. 37, no. 12, pp. 7858-7869, March 2010.
  307. Daoshun Wang, Feng Yi and Xiaobo Li, "On general construction for extended visual cryptography schemes", vol. 42, no. 11, pp. 3071-3082, Journal of Pattern Recognition, November 2009.
  308. Ching-Nung Yang and Yao-Yu Yang, "New extended visual cryptography schemes with clearer shadow images", Journal of Information and Sciences, vol. 271, no. 4, pp. 246-263, July 2014.
  309. Askari, N, Heys, H. M and Moloney, C. R, "Extended Visual Cryptography without pixel expansion", IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), pg. 1-6, 2013.
  310. Tzung-Her Chen and Kai-Hsiang Tsao, "User-Friendly Random-Grid-Based Visual Secret Sharing", IEEE Transactions on Circuits and Systems for Video Technology, vol. 21, NO. 11, pp. 1693-1703, 2011.
  311. XuehuYana, ShenWanga, XiamuNiua, Ching-NungYang, "Halftone visual cryptography with minimum auxiliary black pixels and uniform image quality", Journal of Digital Signal Processing, vol. 38, pp. 53-65, 2015.
  312. Pei-Ling Chiu, Kai-Hui Lee, "User-friendly threshold visual cryptography with complementary cover images", Journal of Signal Processing, vol. 108, pp. 476-488, 2015.
  313. Der-Chyuan Lou, Hong-Hao Chen, Hsien-Chu Wu, Chwei-Shyong Tsai, "A novel authenticatable color visual secret sharing scheme using non-expanded meaningful shares", Journal of Displays, Elsevier, vol. 32, pp. 118-134, 2011.
  314. Chih-Ching Thien and Ja-Chen Lin, "Secret image sharing", Journal of Computers & Graphics, vol. 26, no. 5, pp. 765-770, October 2002.
  315. Feng Liu, WeiQ.Yan, PengLi, and Chuankun Wu, "ESSVCS: An Enriched Secret Sharing Visual Cryptography", Transactions on Data Hiding and Multimedia Security IX, vol.8363, pp.1-24, 2014.
  316. Sian-Jheng Lin and Ja-Chen Lin, "VCPSS: A two-in-one two-decoding options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches", Journal of Pattern Recognition Letters, vol. 40, no. 12, pp. 3652-3666, April 2007.
  317. Ching-Nung Yang and Chuei-Bang Ciou, "Image secret sharing method with two-decoding-options: Lossless recovery and previewing capability", Journal of Image and Vision Computing, vol. 28, no. 12, pp. 1600-1610, April 2010.
  318. Peng Lia, Pei-Jun Maa, Xiao-Hong Sua and Ching-Nung Yang, "Improvements of a two-in-one image secret sharing scheme based on gray mixing model", Journal of Visual Communication and Image Representation, vol. 23, no. 3, pp. 441-453, January 2012.
  319. Srividhya Sridhar, R. Sathishkumar, Gnanou Florence Sudha, "Adaptive halftoned visual cryptography with improved quality and security", Journal of Multimedia Tools and Applications, pp.1-20, November 2015.
  320. S.Srividhya, R. Sathishkumar, Gnanou Florence Sudha, "Implementation of TiOISSS with meaningful shadows and with an additional authentication Image", Journal of Visual Communication and Image Representation, vol.38, pp.284-296, July 2016. REFERENCES
  321. Hamzah, Andi, Marsita and Boedi, "Criminal Aspects in the Field of Computers," Sinar Grafika, 2012.
  322. M.Firman and A. N. Ngazis, "Cyberbullying Threat to Children on the Internet," January 2012. [online: access october 2016].
  323. Yurnalita, "Cyberbullying on Social Networking Twitter (Trending Topic Semiotics Analysis)," Faculty of social and political sciences, University of Syiah Kuala, Banda Aceh Darussalam, 2016.
  324. Y. G. Sucahyo, "Data Mining: Dig Out Hidden Information," wsilfi.staff.gunadarma.ac.id, 2013.
  325. S. Susanto and D. Suryadi, "Introduction to Data Mining, Digging Up Data Chunks Of Knowledge," C.V. Andi Offset, Yogyakarta, 2010. International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 3, March 2017
  326. N. W. S. Saraswati. Tagawa. "Text Mining with Naïve Bayes Method and Support Vector Machines for Sentiment Analysis" Thesis, Udayana Univesity Denpasar, 2011.
  327. R. Machsun. "The Phenomenon Of Cyberbullying In Adolescence," Journal Of The Science Of Library, Information, Archival Khizanah Al- Hikmah, 35-44, 2016.
  328. P. Singhal and A. Bansal. "Improved Textual Cyberbullying Detection Using Data Mining," International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 6, pp. 569-576, 2013.
  329. Satalina and Dina. "Cyberbullying Behavior Tendency Of Extrovert And Introvert Personality Type". Ejournal UMM, Vol. 02, No. 02, ISSN: 2301- 8267, 2014.
  330. V. P. Kayarkar, R. P. Nirt and A. Motwani. "Mining Frequent Sequences for Email in Cyber Forensics Investigation," International Journal of Computer Application (0975-8887), Volume 85-No 17, 2014.
  331. M. Zulfadhilah, Y. Prayudi, I. Riadi. "Cyber Profiling Using Log Analysis and K-Means Clustering, International Journal of Advanced Computer Science and Applications Vol. 7 No.7, 2016.
  332. I. Riadi, J. E. Istiyanto, A. Ashari, Subanar. Internet Forensics Framework Based-on Clustering, International Journal of Advanced Computer Science and Applications Vol. 4 No. 12. 2013
  333. P. Aliandu. "Indonesian Language Tweet Sentiment Analysis On Twitter," thesis, Graduate Courses in Computer Science, Faculty of Mathematics and Natural Sciences, University of Gajah Mada. Yogyakarta, 2012.
  334. F. R. Sandi. "Classification Of Posts Twitter Traffic Jams Of Bandung Using Naïve Bayesian Classification" Thesis, Master of Study Program Computer Science, University Of Gajah Mada, 2012.
  335. Auvil, Loretta, Searsmith, and Duane. "IJsing Text Mining for Spam Filtering," Automated Learned Group National Center for Supercomputing Applications University of Illinois, 2010.
  336. N. Saputra. "Sentiment analysis-based Lexicon and emoticons," Thesis. Graduate School Of The Faculty Of Engineering University Of Gajah Mada, Yogyakarta, 2015.
  337. C. Darujati and B.A Gumelar. "Utilization Technique Of Supervised Classification For Indonesian Language Text," Jurnal Link Vol. 16 No.1. 2012.
  338. I. Nuraini, B. Susanto and U. Proboyekti. "Implementation of Naïve Bayes Classifier On The Aids Program is The Determination Of The Reference Book Subjects" access ti.ukdw.ac.id, 2011.
  339. H. Sanchesz and S. Kumar. "Twitter Bullying Detection," Dept of Computer Science UC Santa Cruz, 2011.
  340. A. G. Buntoro. "Sentiment analysis Hatespeech On Twitter using Naïve Bayes Classifier Method and Support Vector Machine Dynamics," Journal of Informatics, volume 5, No 2, 2016.
  341. D. Yin, Z. Xue and L. Hong. "Detection of Harassment on Web 2.0," Departement of Computer Science and Engineering Lehigh University, 2009.
  342. H. Margono, X. Yi and G. K. Raikundalia. "Mining Indonesia Cyber Bullying Patterns in Social Media," Proceedings of the Thirty-Seventh Australasian Computer Science Conference (ACSC), Auckland, New Zealand, 2014. International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 3, March 2017
  343. M. Atef Elnabwy,M. ahmoud Marai and A. Ali Hamouda 2016: Clustering of Arabic text in Social Networks, Al-Azhar University , A Thesis submitted for the degree of Master in Systems and Computers Engineering.
  344. Froud, H., Sahmoudi, I., Lachkar, A., 2013. An Efficient Approach To Improve Arabic Documents Clustering Based On A New Keyphrases Extraction Algorithm. Comput. Sci. 243-256.
  345. Farra, N., Challita, E., Assi, R.A., Hajj, H., 2010. Sentence-Level and Document-Level Sentiment Mining for Arabic Texts, in: IEEE International Conference on Data Mining Workshops. IEEE Computer Society, pp. 1114-1119.
  346. Meichieh Chen, Toshizumi Ohta "Using Blog Content Depth and Breadth To Access and Classify Blogs." in: International Journal of Business and Information, Volume 5, Number 1, June 2010
  347. Alghamdi, H.M., Selamat, A., Shahriza Abdul Karim, N., Arabic web page clustering and annotation using semantic class features, Journal of King Saud University -Computer and Information Sciences (2014), doi: http://dx.doi.org/10.1016/j.jksuci.2014.06.002
  348. Faria, L., Akbik, A., Sierman, B., Ras, M., 2013. Automatic preservation watch using information extraction on the Web: a case study on semantic extraction of natural language for digital preservation, in: 10th International Conference onPreservation of Digital Objects. Lisbon, Portugal.
  349. Lahsen Abouenour1, Karim Bouzoubaa1, Paolo Rosso, "IMPROVING Q/A USING ARABIC WORDNET" in Conference: Arabic Conference on Information Technology, Tunisia, 2008
  350. Elarnaoty M., Abdelrahman S., And Fahmy A., "A Machine Learning Approach For Opinion Holder Extraction In Arabic Language" In International Journal Of Artificial Intelligence & Applications (Ijaia), Vol.3, No.2, March 2012.
  351. Rushdi-Salem M, Martin-Valdivia MT, Urena-Lopez LA and Perea- Ortega JM. OCA: Opinion Corpus for Arabia. Journal American Society for Information Science and Technology (JASIST) 2011; 62(10):2045- 2054.
  352. Abdelmalek Amine, Zakaria Elberrichi, and Michel Simonet, " Evaluation of Text Clustering Methods Using WordNet" in: The International Arab Journal of Information Technology, Vol. 7, No. 4, October 2010
  353. Zakaria Elberrichi and Abdellatif Rahmoun "Using WordNet for Text Categorization" The International Arab Journal of Information Technology, Vol. 5, No. 1, January 2008
  354. Riyad Al-Shalabi, Al-sarrayrih Haytham S. Clustering Arabic documents using frequent itemset-based hierarchical clustering with an N-grams, 2009.
  355. El-Khair Ibrahim Abu. Effects of stop words elimination for Arabic information retrieval: a comparative study. Int J Comput Inf Sci 2006;4(3), December, On-Line.
  356. A JAVA Arabic stemmer that is based on Shereen Khoja algorithm. https://sourceforge.net/projects/arabicstemmer/
  357. RDI stands for "Research & Development International". http://www.rdi-eg.com/
  358. X.Zhu ," Clustering ", CS769 Spring 2010 Advanced Natural Language Processing.(2010) International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 3, March 2017
  359. REFERENCES [1] Compliant system definition on line available wikipedia.org last accessed 1/12/2015
  360. Albina Shapiro. "Service-oriented architecture for mobile applications", Proceedings of the 1st international workshop on Software architectures and mobility -SAM 08 SAM 08,2008
  361. Yi Zheng. "Service-Oriented Mobile Applications for Ad-Hoc networks", 2008 IEEE International Conference on Services Computing, 07/2008
  362. The Differences Between Thick, Thin & Smart Client By Vangie Beal online available http://www.webopedia.com/DidYouKnow/Hardware_Software/thin_client_applications.asp lastaccessed27-jan-2016.
  363. V.lee and et.al, "Mobile-application Architecture Design and Development" online available www.informit.com last accessed 1-Feb-2016
  364. José María," SOA and its usage in mobile services" online available athttps://www.snet.tu- berlin.de/fileadmin/fg220/courses/SS12/osn-project/soa-in-mobile-services_toro.pdflast accessed 1-Jul.-2016
  365. Farhan Shafiq et.al ," Solving Real-Life Problems: Future Mobile Technology " Mehran University Research Journal of Engineering & Technology, Volume 35, No. 3, July, 2016 International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 3, March 2017
  366. Zhang Hao-Ran, Li Chang-Gang, and, Han Zheng-Zhi, "Image Encryption Techniques: A Survey", Journal of Computer Research and Development, Oct. 2002.
  367. Wei-qi Yan, Dong-xu Qi, and Wei Ding, "A Novel Digital Hiding Technology Based on Tangram and Conways Game", proceeding of 2000 International Conference on Image Processing, Sept. 2000.
  368. Zhao Xue-feng, "Digital Image Scrambling Based on the Baker's Transformation", Journal of Northwest Normal University, Feb. 2003.
  369. Ji Shi-ming, ShenJian-bin and Bao Guan-jun, "Magic Cube Transformation and Its Application in Digital Image Encryption", Computer Applications, Nov. 2002.
  370. Cao Changxiu, Hu Zhongyu, Zhu Guibin, et al., "An Image Scrambling and Encryption Algorithm Based on Affine Transformation", Journal of Computer-Aided Design & Computer Graphics, June. 2003.
  371. Zhang Xin, Chen Wei-bin "Image encryption algorithm based on Henon chaotic system". International Conference onImage Analysis and Signal Processing, 2009, IASP.
  372. Md Jan Nordin, Elankovan Sundararajan and Ali Soleymani, "A Chaotic Cryptosystem for Images Based on Henon and Arnold Cat Map" The Scientific World Journal, Volume 2014.
  373. Ammasai Gounden, Nanjappa Gounder and Brindha Murugan, "Image encryption scheme based on block based confusion and multiple levels of diffusion", the institution of engineering and Technology, computer vision 2016 Vol. 10, Issue. 6, pp. 593-602.
  374. Xingyuan Wang and Chuanming Liu, "A novel and effective image encryption algorithm based on chaos and DNA encoding", Multimedia Tools and Applications 2016, pp. 1-17.
  375. Yannick Abanda, Alain Tiedeu, "Image encryption by chaos mixing", the institution of engineering and Technology, image processing 2016, ISSN 1751-9659.
  376. Ritesh Bansal, Shailender Gupta and Gaurav Sharma, "An innovative image encryption scheme based on chaotic map and Vigenère scheme" Springer Science and Business Media. New York ,2016.
  377. Ritesh Bansal, Shailender Gupta and Gaurav Sharma, "An innovative image encryption scheme based on chaotic map and Vigenère scheme", Springer Science and Business Media. New York, 2016.
  378. Wang Yujing, Yang Fei, Kang Shouqiang, Jiang Yicheng,, Lan Chaofeng, "An image encryption scheme using mixed high dimensional chaotic system combined with fast fourier transform", IEEE 12th International Conference on Electronic Measurement & Instruments, 2015.
  379. Fadia TALEB, "A New Chaos Based Image Encryption Scheme Using Chaotic Logistic Maps" IEEE on Multimedia.
  380. Guoji Zhang., Qing Liu.: 'A novel image encryption method based on total shuffling scheme', Optics Communication, Volume 284, Issue 12, 1 June 2011, Pages 2775-2780
  381. Lin Teng., Xingyuan Wang.: 'A bit-level image encryption algorithm based on spatio temporal chaotic system and self-adaptive', Optics Communication., Volume 285, Issue 20, 15 September 2012, Pages 4048-4054.
  382. Xingyuan Wang, Canqi Jin.: 'Image encryption using game of life permutation and PWLCM chaotic system', Optics Communication., 2012, pp. 412-417.
  383. Xingyuan Wang.,Lintao Liu., Yingqian Zhang, 'A novel chaotic block image encryption algorithm based on dynamic random growth technique', Optics and Lasers in Engineering.,Volume 66, March 2015, Pages 10-18.
  384. Jun-xin Chen, Zhi-liang Zhu, Chong Fu, Hai Yu, Li- bo Zhang: 'A fast chaos-based image encryption scheme with a dynamic state variables selection mechanism', Communications in Nonlinear Science and Numerical Simulation. Volume 20, Issue 3, March 2015, Pages 846-860.
  385. Radu Eugen BORIG, Ana Cristina, Adrian Viorel: 'A new hyper chaotic map and its application in an image encryption scheme', Signal Processing. Image Communication. 2014, pp. 887-901.
  386. Yifeng Zheng, Jianxiu Jin, 'A novel image encryption scheme based on Hénon map and compound spatiotemporal chaoses, Multimedia Tools Applications., Volume 74 Issue 18, September 2015, pp. 1-18.
  387. Gelli M.B.S.S. Kumar, Chandrasekaran, V. 'A novel image encryption scheme using Lorenz attractor'. IEEE Conference. on Industrial Electronics and Applications (ICIEA), 2009, pp. 3662-3666. International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 3, March 2017 REFERENCES
  388. Javier Gracia Castro, Óscar Pérez Domínguez, A Presentation on "Zigbee: IEEE 802.15.4", Tampere University of Technology, Institute of Production Engineering, 2007.
  389. ZigBee Alliance, Zigbee Specifications, version 1.0, April 2005.
  390. Paolo Baronti, Prashant Pillai, Vince W.C.Chook, Stefano Chess, Alberto Gotta and Y. Fun Hu, "Wireless sensor networks: A survey on the state of the art and the 802.15.4 and Zigbee standards", published in Computer Communications, volume 30 in 2007.
  391. IEEE 802 Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-rate Wireless Personal Area Networks, IEEE Computer Society.
  392. Bhavneet Sidhu, Hardeep Singh, and Amit Chhabra,"Emerging Wireless Standards -WiFi, ZigBee and WiMAX", World Academy of Science, Engineering and Technology 25 2007.
  393. Jin-Shyan Lee, Yu-Wei Su, and Chung-Chou Shen, "Comparative Study of Wireless Protocols: Bluetooth, UWB, Zigbee, and Wi-Fi", published in the 33rd Annual Conference of the IEEE Industrial Electronics Society (IECON) Nov. 5-8, 2007, Taipei, Taiwan.
  394. ZigBee Technology Overview Available at: http://www.senanetworks.com/products/industrial_zigbee/ZigBee_Tech nology_Overview_for_SENA_Web_Page.V1.pdf .
  395. Aderemi A. Atayero, and Matthew K. Luka "Applications of Soft Computing in Mobile and Wireless Communications" published in International Journal of Computer Applications (0975 -8887), Volume 45-No.22, May 2012.
  396. R.Nagarajan, Member, IEEE and R.Dhanasekaran, Senior Member, "Optimization of Power in Wireless Industrial Automation Networks" presented in IEEE ICCSP conference, 2015.
  397. Dhirendra Pratap Singh, Yash Agrawal and Surender Kumar Soni, "Energy Optimization in Zigbee using Prediction based Shortest Path Routing Algorithm ", 3rd National Conference on Emerging Trends and Applications in Computer Science, 2012.
  398. Mohamed KASRAOUI, Adnane CABANI, Joseph MOUZNA, IEEE International Conference on Green Computing and Communications, Conference on Internet of Things, and Conference on Cyber, Physical and Social Computing, 2012.
  399. Antonio M. Ortiz, Fernando Royo, Teresa Olivares and Luis Orozco- Barbosa, "Intelligent Route Discovery for Zigbee Mesh Networks", published in IEEE, 978-1-4577-0351-5/11/ 2011.
  400. Ata Elahi and Adam Gschwender, "Introduction to the ZigBee Wireless Sensor and Control Network" first edition, ISBN-13: 978-0137134854.
  401. Chia-Hung Tsai, Meng-Shiuan Pan, Yi-Chen Lu, and Yu-Chee Tseng , "Self-Learning Routing for ZigBee Wireless Mesh networks", National Chiao-Tung University, Hsin-Chu, 300, Taiwan.
  402. Prativa Saraswala, "A Survey on Routing Protocols in Zigbee Network", published in International Journal of Engineering Science and Innovative Technology (IJESIT), Volume 2, Issue 1, January 2013.
  403. Taehong Kim ,Seong Hoon Kim, Jinyoung Yang , Seong-eun Yoo and Daeyoung Kim, "Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless Networks", Published in: IEEE Transactions on Parallel and Distributed Systems ( Volume: 25, Issue: 3, March 2014 ). International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 3, March 2017
  404. Antonio M. Ortiz, Teresa Olivares and Luis Orozco-Barbosa, "Smart Routing Mechanism for Green ZigBee-based Wireless Sensor Networks", Albacete Research Institute of Informatics.
  405. Jianpo Li, Xuning Zhu, Ning Tang, "Study on Zigbee Network Architecture and Routing Algorithm", published in 2010 2nd International Conference on Signal Processing Systems (ICSPS).
  406. Yi Gong Peng, Ying Li Li, Zhong Cheng Lu, Jin Shou Yu, "Method for Saving Energy in Zigbee Network", published in IEEE, 978-1-4244- 3693-4/09/2009.
  407. Renu Kachhoria, "An Implementation in AODV based on Active Route Timeout between sensor nodes in Wireless Sensor Networks", published in International Journal on Computer Science and engineering (IJCSE), Vol. 3 No. 3 Mar 2011.
  408. Zheng Sun, Xiao-guang Zhang, Dianxu Ruan, "A Routing Protocol based on Flooding and AODV in ZigBee network", published in IEEE, 978-1-4244-3894-5/09/2009.
  409. Jun Xiao and Xiaojun Liu, "The Research of E-AOMDVjr Routing Algorithm in ZigBee Network", published in IEEE, Chinese Control and Decision Conference (CCDC 2011), 978-1-4244-8738-7/11/26.00, pp. 2360-2365.
  410. Maged Salah Eldin Soliman , Sherine Mohamed Abd El-kader, Hussein Sherif Eissa, Hoda Anis Baraka, "NEW ADAPTIVE ROUTING PROTOCOL FOR MANET", published in Ubiquitous Computing and Communication Journal Volume 2,Number 3, pp-16-22.
  411. C. Perkins and E. Royer, "Ad Hoc On-demand Distance Vector (AODV) Routing" , Internet Draft, MANET working group, draft-ietf-manetaodv- 05.txt, March 2000.
  412. C. E. Perkins, E. M. Royer, and S. R. Das, "Ad hoc on demand distance vector (AODV) routing," IETF Internet draft, draft-ietf-manetaodv- 13.txt, Feb. 2003.
  413. "Ad hoc On Demand Distance Vector (AODV) Routing Protocol", Chapter 6 from Book titled 'Ad Hoc Networking', published by Perkins, Addison Wesley, 2001.
  414. M. Ohlin, D. Henriksson, and A. Cervin, "TrueTime 2.1 Reference Manual," Department of Automatic Control, Lund University, Sweden, 2007. [Online] Available: http://www.control.lth.se/truetime.
  415. Anderson, Martin, Dan Henriksson, Anton Cervin and Karl-Erik arzen (2005). "Simulation of wireless networked control systems", Proceedings of the 44th IEEE Conference on Decision and Control and European Control Conference, Seville, Spain, 2005.
  416. Tsukamoto Y. "An approach to fuzzy reasoning method", gupta MM,Radade RK, Yager RR,eds Advances in fuzzy sets theory and applications, 1st edition new York, 1979. P. 137-149.
  417. Lambert Torres G, Mukhedkar D. "On line fuzzy rule set generator". Advance Information Processing in Automatic Control Congress of IFAC, Nancy, France 1989.
  418. Kwang Y. Lee, Mohamed A.EI-Sharkawi, "modern heuristic optimization techniques, theory and applications to power system".
  419. Prativa P. Saraswala, Dr.Dharmistha D. Vishwakarma and Prof. Satish K .Shah," Evaluation of Routing Protocol Performance for ZigBee Network Using Fuzzy Logic in MATLAB/TRUETIME", published in international Journal of Application or Innovation in Engineering & Management (IJAIEM), Volume 2, Issue 10, and October 2013.
  420. Mark Hudson Beale, Martin T. Hagan and Howard B. Demuth , User's Guide on Neural Network Toolbox™ 7.
  421. Yizheng Xu, Graduate Student Member, IEEE, and Jovica V. Milanovic, Fellow, IEEE, "Artificial-intelligence-Based Methodology for Load Disaggregation at Bulk Supply Point", published in IEEE transactions on power systems, Vol. 30, MARCH 2015
  422. Saduf, Mohd Arif Wani, "Comparative Study of Back Propagation Learning Algorithms for Neural Networks", pp. 1151-1156, Volume 3, Issue 12, December 2013.
  423. M. Riedmiller, H. Braun, "A direct adaptive method for faster back- propagation learning: the RPROP algorithm, ", Proc. of the International Conference on Neural Networks, pp. 586-591, 1993.
  424. Prativa P. Saraswala, Jaymin Bhalani and Sandhya Sharma, "Comparative Performance Analysis of AODV Parameter for Zigbee Network using Artificial Neural Network", published in International Journal of Computer Applications (0975 -8887), Volume 140 -No.6, April 2016.
  425. Pejman Tahmasebi, Ardeshir Hezarkhani, "Application of Adaptive Neuro-Fuzzy Inference System for Grade Estimation; Case Study, Sarcheshmeh Porphyry Copper Deposit, Kerman, Iran", published in Australian Journal of Basic and Applied Sciences, ISSN 1991-8178, pp. 408-420, 2010.
  426. Yevgeniy, Gershteyn Larisa Perman, "Matlab: ANFIS Toolbox", presented on 04/22/2003.
  427. Jyh-Shing Roger Jang, "ANFIS: Adaptive-Network-Based Fuzzy Inference System", IEEE transactions on systems, man and cybernetics, vol. 23, may-june 1993.
  428. Dr. Bob John, "ANFISnote" [Online]. Available www.scribd.com/doc/134927592/ANFISnote.
  429. The Fuzzy Logic Toolbox for use with MATLAB, J.S.R. Jang and N. Gulley, Natick, MA: The Math Works Inc., 1995.
  430. Expert System, Neural, Fuzzy system by Jamil Al Agha. Available online: http://www.slideshare.net/JamiLALagha/expert-system-neural- fuzzy-system.
  431. Presentation on "Neuro- Fuzzy System", available at: https://www.slideshare.net/sagahire/neurofuzzy-systems, 2012. AUTHORS PROFILE
  432. Prativa P. Sraswala: She is a research scholar in V.T Patel Dept. of Electronics and Communication Charusat, Changa, Gujarat, India. She is working in the field of wireless communication.She is working as a Assistant Professor in the department of Electrical Engg., Faculty of Tech. and Engg., Maharaja Sayajirao University of Baroda, Gujarat, India. Dr Jaymin Bhalani: Professor, EC Dept., Babaria Institute of Technology, Vadodara, Gujarat, India. International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 3, March 2017
  433. G. Horsman, "Unmanned aerial vehicles: A preliminary analysis of forensic challenges," Digit. Investig., vol. 16, pp. 1-11, 2016.
  434. H. Shao, "Drone Overlord Frank Wang On DJI's Milestones, Miscarried GoPro Partnership & Corporate Espionage," Forbes
  435. Asia, 2015.
  436. A. Nishar, S. Richards, D. Breen, J. Robertson, and B. Breen, "Thermal infrared imaging of geothermal environments and by an unmanned aerial vehicle (UAV): A case study of the Wairakei - Tauhara geothermal field, Taupo, New Zealand," Renew. Energy, vol. 86, pp. 1256-1264, 2016.
  437. J. D. Barton, "Fundamentals of Small Unmanned Aircraft Flight," Johns Hopkins Apl Tech. Dig., vol. 31, no. 2, pp. 132-149, 2012.
  438. A. J. Kerns, D. P. Shepard, J. A. Bhatti, and T. E. Humphreys, "Unmanned Aircraft Capture and Control Via GPS Spoofing," J. F. Robot., vol. 31, no. 4, pp. 617-636, 2014.
  439. A. Arbelet, "Garmin satnavs forensic methods and artifacts : An exploratory study School of Computing," no. August, 2014.
  440. Sukriadi and Y. Prayudi, "Analysis of Digital Evidence of Global Positioning System (GPS) On Android Smartphone," Kns&I Stikom, no. 11, 2014.
  441. D. Huang, "Evidential Problems with GPS Accuracy : Device Testing," 2013.
  442. J. Valdman, "Log File Analysis," 2001.
  443. A. Iswardani and I. Riadi, "Denial Of Service Log Analysis Using Density K-Means Method," vol. 83, no. 2, pp. 299-302, 2016.
  444. M. Zulfadhilah, "Cyber Profiling using Log Analysis and K-Means Clustering A Case Study Higher Education in Indonesia," vol. 7, no. 7, pp. 430-435, 2016.
  445. Y. Lou and W. Wang, "Map-Matching for Low-Sampling-Rate GPS Trajectories," no. c, 2009.
  446. M. A. Lukmana and H. Nurhadi, "Design of Unmanned Aerial Vehicle (UAV)," pp. 1-5.
  447. K. Hartmann and C. Steup, "The vulnerability of UAVs to cyber attacks -An approach to the risk assessment," Cyber Confl. (CyCon), 2013 5th Int. Conf., pp. 1-23, 2013.
  448. T. Jiang, J. Li, and K. Huang, "Longitudinal parameter identification of a small unmanned aerial vehicle based on modified particle swarm optimization," Chinese J. Aeronaut., vol. 28, no. 3, pp. 865-873, 2015. International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 3, March 2017
  449. O. Svatoš, Conceptual process modeling language: Regulative approach. In Proceedings of the 9th Undergraduate and Graduate Students eConf. and 14th Business & Government Executive Meeting on Innovative Cross-border eRegion, Univ. of Maribor, 2007
  450. A. Chapman, Business process modelling, 2016. http://www.businessballs.com/business-process-modelling.htm
  451. J. King, N. Chidambaram, P. Lee, P., Schume, and D. Teran, Process Discovery Best Practices Using IBM Blueworks Live, IBM Redpaper REDP-5111-00, International Technical Support Organization, Sept., 2014.
  452. IBM, Process modeling at enterprise scale using BlueworksLive and IBM BPM, WebSphere User Group, IBM Corporation, 2014. http://www.google.com.kw/url?sa=t&rct=j&q=&esrc=s&source=web&c d=1&cad=rja&uact=8&ved=0ahUKEwitm- OXmp_RAhUXN1AKHQEXDroQFgglMAA&url=http%3A%2F%2Fw ww.websphereusergroup.co.uk%2Fwug%2Ffiles%2Fpresentations%2F3 8%2FWUG2014_Blueworks_Live_at_Enterprise_Scale.pdf&usg=AFQj CNEqmhhuqyhb7lTzONwEJA1OKhPQ_A
  453. N. Ward-Dutton, Vendor Insight: IBM breaks new ground with Blueworks Live, Premium Advisory Report, Nov. 2010. https://www.google.com.kw/url?sa=t&rct=j&q=&esrc=s&source=web& cd=2&ved=0ahUKEwjT- IPOnJ_RAhVWeFAKHSb1CukQFggeMAE&url=https%3A%2F%2Fw ww.blueworkslive.com%2Fdownload%2Fbpm_vi_IBM_Blueworks_Liv e_1110.pdf%3FpostId%3Da93c1a523f%26fileItemId%3Da93c1a3981& usg=AFQjCNGgXSERpJmBmb28kwHIU95VWQ6U9Q&bvm=bv.1420
  454. R. Peisl, Have fun with collaborative business process modeling in the Cloud with IBM Blueworks Live (BPM), Learnquest Conference, IBM Cloud Technical University, 25-28 October 2016, Madrid, Spain.
  455. S. Al-Fedaghi, "Conceptual modeling in simulation: a representation that assimilates events," Int. J. Adv. Comput. Sci. Appl, Vol. 7, No. 10, 2016, pp. 281-289.
  456. S. Al-Fedaghi, "Toward a philosophy of data for database systems design," Int. J. Database Theory Appl, Vol. 9, No. 10, 2016.
  457. S. Al-Fedaghi, "Diagrammatic modeling language for conceptual design of technical systems: a way to achieve creativity," Int. Rev. Autom. Control, Vol. 9, No. 4, 2016.
  458. S. Al-Fedaghi, 2016. "Flowcharting the meaning of logic formulas," Int. J. Adv. Res. Artif. Intell. (IJARAI), Vol. 5, No. 10, Oct, 2016.
  459. L. Baekgaard, and P. B. Andersen, Using Interaction Scenarios to Model Information Systems, Working Paper I-2008-04, Department of Information and Media Studies, University of Aarhus, 2008. http://www.google.com.kw/url?sa=t&rct=j&q=&esrc=s&source=web&c d=4&cad=rja&uact=8&ved=0ahUKEwj- kfrFop3RAhULIsAKHW5WDusQFggtMAM&url=http%3A%2F%2Fpu re.au.dk%2Fportal%2Ffiles%2F2570%2FI_2008_04.PDF&usg=AFQjC NFqJFyjBumdKkIu5ZR5YHiCEN90Eg
  460. Science Learning Hub, The phosphorus cycle, University of Waikato, 2007, http://sciencelearn.org.nz/Contexts/Soil-Farming-and-Science/Sci- Media/Images/The-phosphorus-cycle REFERENCES
  461. James F. Kurose and Keith W. Ross "A Top-down Approach Featuring the Internet", Third Edition, 2005. New York: Pearson Higher Education.
  462. Jin Zhu, "Development of an Application-Oriented Wireless Communication", Technology Interface Journal, Volume 10, Number 3, 2010.
  463. Makoto Miyake, "A Survey on Progress and Standardization Trends in Wireless Communications", Journal of Communications, 2009, Volume 4, Number 7, 2009.
  464. David J. Nagel, "Wireless Sensor Systems and Networks: Technologies, Applications, Implications and impacts", Centre of Strategic and International studies, 2005, ISBN 0892064625.
  465. Nisha Ashok Somani, Yask Patel, "ZigBee: A Low Power Wireless Technology for Industrial Applications", International Journal of Control Theory and Computer Modelling (IJCTCM) Volume 2, Number 3, 2012.
  466. P.Rohitha, ,P. Ranjeet Kumar, N. Adinarayana, T. Venkat Narayana Rao, "Wireless Networking Through ZigBee Technology", International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 7, 2012 .
  467. Dharmistha D. Vishwakarma, "IEEE 802.15.4 and ZigBee: A Conceptual Study", International Journal of Advanced Research in Computer and Communication Engineering, Volume 1, Issue 7, 2012.
  468. Soyoung Hwang, Donghui Yu, "Remote Monitoring and Controlling System Based on ZigBee Networks", International Journal of Software Engineering and Its Applications, Volume 6, Number 3, 2012.
  469. Tulin Mangir, Lelass Sarakbi, and Harvy Younan, "Analysing the Impact of Wi-Fi Interference on ZigBee Network Based on Real Time Experiments", International Journal of Distributed and Parallel Systems (IJDPS) Volume 2, Number 4, 2011.
  470. Wail Mardini, Yaser Khamayseh, Reem Jaradat, and Rana Hijjawi, "Interference Problem between ZigBee and WiFi", Proceeding of International Scientific Association of Computer Science and Information Technology. Volume 30, Singapore, Hong Kong, September 2012.
  471. Tomas Lennvall, Stefan Svensson , Fredrik Hekland, "A Comparison of Wireless HART and ZigBee for Industrial Applications", IEEE International Workshop on Factory Communication Systems, 2008. WFCS 2008.
  472. Emanuele Toscano and Lucia Lo Bello, "Comparative Assessments of IEEE 802.15.4/ZigBee and 6LoWPAN for low-power industrial WSNs in realistic scenarios", 9th IEEE International Workshop on Factory Communication Systems (WFCS), 2012.
  473. Sofie Pollin, Mustafa Ergen, Sinem Coleri Ergen, Bruno Bougard, Liesbet Van Der Perre
  474. Ingrid Moerman, Ahmad Bahai, Pravin Varaiya, Francky Catthoor. "Performance Analysis of Slotted Carrier Sense IEEE 802.15.4 Medium Access Layer", IEEE Transactions on Wireless Communications. Volume 7, Number. 9, pp. 3359-3371, 2008.
  475. Yue Tao, Xiang-Yang Li, and rd Cheng Bo. 2013. Performance of Coexisted WiFi and ZigBee Networks. IEEE 33rd International Conference on Distributed Computing Systems Workshops (ICDCSW), 8 th -11 th of July, Philadelphia, PA, USA
  476. Elmustafa S.Ali Ahmed , Bakhita El.Sheikh Ali, Eman Omer Osman and Tagwa Amin M. Ahmed. Performance Evaluation and Comparison of IEEE 802.11 and IEEE 802.15.4 ZigBee MAC Protocols Based on Different Mobility Models. International Journal of Future Generation Communication and Networking Vol. 9, No. 2 (2016), pp. 9-18.
  477. Kuruvilla Mathew and Mujahid Tabassum. Analysis of Bluetooth and Zigbee Signal Penetration and Interference in Foliage. Proceedings of the International MultiConference of Engineers and Computer Scientists, IMECS, March 16 -18, 2016, Hong Kong
  478. Junyu Hu, Zhenquan Qin, Yingxiao Sun, Lei Shu, Bingxian Lu, and Lei Wang. A Light-Weight Mechanism for ZigBee Performance Assurance under WiFi Interference. Proceeding of 25th International Conference on Computer Communication and Networks (ICCCN). August 1 -4, 2016, Hawaii, USA.
  479. Afshari, Hamid, and Qingjin Peng. "Modeling and quantifying uncertainty in the product design phase for effects of user preference changes." Industrial Management & Data Systems 115.9: pp. 1637-1665, 2015.
  480. Ali, Sikandar, and SiffatUllah Khan. "Software outsourcing partnership model: An evaluation framework for vendor organizations." Journal of Systems and Software 117: pp.402-425, 2016.
  481. Akın, Melda. "A novel approach to model selection in tourism demand modeling." Tourism Management 48 Tourism demand modeling: pp. 64- 72, 2015.
  482. Babiceanu, Radu F., and RemziSeker. "Big Data and virtualization for manufacturing cyber-physical systems: A survey of the current status and future outlook." Computers in Industry 81: pp. 128-137, 2016.
  483. Bae, Jae Kwon, and Jinhwa Kim. "Integration of heterogeneous models to predict consumer behavior." Expert Systems with Applications 37.3: pp. 1821-1826, 2010.
  484. Berland, Matthew, Ryan S. Baker, and Paulo Blikstein. "Educational data mining and learning analytics: Applications to constructionist research." Technology, Knowledge and Learning 19.1-2: pp. 205-220, 2014.
  485. Cato, Patrick, Philipp Gölzer, and Walter Demmelhuber. "An investigation into the implementation factors affecting the success of big data systems." Innovations in Information Technology (IIT), 2015 11th International Conference on. IEEE, 2015.
  486. Chai, Junyi, James NK Liu, and Eric WTNgai. "Application of decision- making techniques in supplier selection: A systematic review of literature." Expert Systems with Applications 40.10:pp. 3872-3885.
  487. Deng, S., et al. "Integrated product line design and supplier selection: A multi-objective optimization paradigm." Computers & Industrial Engineering70: pp. 150-158, 2014.
  488. Deswal M. and S. K. Garg. "Application of Topsis: A Multiple Criteria Decision Making Approach in Supplier Selection." 2 nd International Conference on recent Innovation in Science, Engineering and Management, JNU Convention Centre, Jawaharlal Nehru University, New Delhi,22 nd Nov. India, 2015.
  489. Dutta, Debprotim, and Indranil Bose. "Managing a big data project: The case of Ramco Cements limited." International Journal of Production Economics, 2015.
  490. Delen, Dursun, and Demirkan, Haluk. "Data, information and analytics as services", Decision Support Systems 55:pp. 359-363, 2013.
  491. Edwards, Richard E., Joshua New, and Lynne E. Parker. "Predicting future hourly residential electrical consumption: A machine learning case study." Energy and Buildings 49: 591-603, 2012.
  492. Fu, Xiaoyong, Qinghua Zhu, and Joseph Sarkis. "Evaluating green supplier development programs at a telecommunications systems provider." International Journal of Production Economics 140.1: pp. 357-367, 2012.
  493. Gold, Stefan, and Stefan Seuring. "Supply chain and logistics issues of bio-energy production." Journal of Cleaner Production 19.1: pp. 32-42, 2011.
  494. Govindan, Kannan, et al. "Multi criteria decision making approaches for green supplier evaluation and selection: a literature review." Journal of Cleaner Production, 2013.
  495. Gretzel, Ulrike. "Intelligent systems in tourism: A social science perspective." Annals of Tourism Research 38.3: pp. 757-779, 2011.
  496. Hallstedt, Sophie, et al. "An approach to assessing sustainability integration in strategic decision systems for product development." Journal of Cleaner Production 18.8: pp. 703-712, 2010.
  497. Huang, Shaobo, and Ning Fang. "Predicting student academic performance in an engineering dynamics course: A comparison of four types of predictive mathematical models." Computers & Education 61: pp. 133-145, 2013.
  498. Igoulalene, Idris, LyesBenyoucef, and Manoj Kumar Tiwari. "Novel fuzzy hybrid multi-criteria group decision making approaches for the strategic supplier selection problem." Expert Systems with Applications 42.7: pp. 3342-3356, 2015.
  499. Kar, Arpan Kumar. "Revisiting the supplier selection problem: An integrated approach for group decision support." Expert systems with applications 41.6: pp. 2762-2771, 2014.
  500. Lee, Carmen Ka Man, and Jasmine Siu Lee Lam. "Managing reverse logistics to enhance sustainability of industrial marketing." Industrial Marketing Management 41.4: pp.589-598, 2012.
  501. Levy, Sharona T., and Uri Wilensky. "Mining students' inquiry actions for understanding of complex systems." Computers & Education 56.3: pp. 556-573, 2011.
  502. Li, Kam Cheong, Hoi Kuan Lam, and Sylvia SY Lam. "A Review of Learning Analytics in Educational Research." Technology in Education. Technology-Mediated Proactive Learning. Springer Berlin Heidelberg: pp. 173-184, 2015.
  503. Lin, Ru-Jen, Kim-Hua Tan, and Yong Geng. "Market demand, green product innovation, and firm performance: evidence from Vietnam motorcycle industry." Journal of Cleaner Production 40: pp. 101-107, 2013.
  504. Lin, Chinho, et al. "Developing an assessment framework for managing sustainability programs: A Analytic Network Process approach." Expert Systems with Applications 42.5: pp. 2488-2501, 2015.
  505. Murugananthan, V., and B. L. ShivaKumar. "An adaptive educational data mining technique for mining educational data models in elearning systems." Indian Journal of Science and Technology 9.3, 2016.
  506. Ofoghi, Bahadorreza, et al. "Supporting athlete selection and strategic planning in track cycling omnium: A statistical and machine learning approach." Information Sciences 233 (2013): pp. 200-213, 2013.
  507. Piety, Philip J., Daniel T. Hickey, and M. J. Bishop. "Educational data sciences: framing emergent practices for analytics of learning, organizations, and systems." Proceedings of the Fourth International Conference on Learning Analytics and Knowledge. ACM, 2014.
  508. Rezaei, Jafar, Patrick BM Fahim, and Lori Tavasszy. "Supplier selection in the airline retail industry using a funnel methodology: Conjunctive screening method and fuzzy AHP." Expert Systems with Applications 41.18: pp. 8165-8179, 2014.
  509. Romero, Cristobal, and Sebastian Ventura. "Educational data mining: A survey from 1995 to 2005." Expert systems with applications 33.1 : pp. 135-146, 2007.
  510. Romero, Cristóbal, and Sebastián Ventura. "Educational data mining: a review of the state of the art." IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews) 40.6: pp. 601-618, 2014.
  511. Siemens, George, and Ryan SJ d Baker. "Learning analytics and educational data mining: towards communication and collaboration." Proceedings of the 2nd international conference on learning analytics and knowledge. ACM, 2012.
  512. Siemens, George. "Learning analytics: envisioning a research discipline and a domain of practice." Proceedings of the 2nd International Conference on Learning Analytics and Knowledge. ACM, 2012.
  513. Suma, V., T. P. Pushphavathi, and V. Ramaswamy. "An Approach to Predict Software Project Success Based on Random Forest Classifier." ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India-Vol II. Springer International Publishing, 2014.
  514. Xing, Wanli, et al. "Participation-based student final performance prediction model through interpretable Genetic Programming: Integrating learning analytics, educational data mining and theory." Computers in Human Behavior 47: pp. 168-181, 2014.
  515. Yao, Xifan, and Yingzi Lin. "Emerging manufacturing paradigm shifts for the incoming industrial revolution." The International Journal of Advanced Manufacturing Technology: pp. 1-12, 2015.
  516. Ma, Ying, et al. "Transfer learning for cross-company software defect prediction." Information and Software Technology 54.3: pp. 248-256, 2012. AUTHORS PROFILES
  517. Biography.com Editors. (2015, October 15). Jack Dorsey Biography. Retrieved from bio: http://www.biography.com/people/jack-dorsey- 578280#billionaire-businessman
  518. Elliot, R. (n.d.). Where on earth identifiers. Retrieved from woeid lookup: http://woeid.rosselliot.co.nz/
  519. Fried, I. (2011, June 1). Twitter Chairman Jack Dorsey Still Can't Define What Twitter Is. Retrieved from All Things D: http://allthingsd.com/20110601/twitter- chairman-jack-dorsey-still-cant-define-what-twitter-is/
  520. Ghode, D. R. (n.d.). Understanding Facebook Popularity though it's Semiotic Analysis. Pune. Retrieved from Academia.
  521. Langley, M. (2016). Retrieved from http://michael.langley.id.au/blog/posts/37.
  522. Manning, C. D., Raghavan, P., & Schutze, H. (2009). An Introduction to Information Retrieval. Retrieved from Standford: http://nlp.stanford.edu/IR- book/pdf/irbookonlinereading.pdf
  523. Patterson, M. (2014, August 15). How to Use Hashtags on Every Social Media Network. Retrieved from sprout social: http://sproutsocial.com/insights/how-to-use- hashtags/
  524. Peirce, C. S. (1932). Collected Papers of Charles Sanders Peirce. United States of America: Vol. II of Elements of Logic at Harvard University Press, 1932.
  525. Popper, B., & Erlick, N. (2017, February 1). Facebook is closing in on 2 billion monthly users. Retrieved from The Verge: http://www.theverge.com/2017/2/1/14474534/facebook -earnings-q4-fourth-quarter-2016
  526. Quartz. (2017, February 16). Mark Zuckerberg doesn't need to be US president; he can be president of the global world society. Retrieved from Quartz: https://qz.com/913176/mark-zuckerbergs-manifesto- reads-like-a-state-of-the-union-address/
  527. Russell, M. A. (2013). Mining the Social Web. United States of America: O'Reilly Media, Inc., 1005
  528. Swisher, K., & Wagner, K. (2017, February 16). Facebook's Mark Zuckerberg wrote 6,000-word letter addressing fake news and saving world. Retrieved from recode: http://www.recode.net/2017/2/16/14632726/mark- zuckerberg-facebook-manifesto-fake-news-terrorism
  529. TechTerms. (2008, January 14). Facebook. Retrieved from TechTerms: https://techterms.com/definition/facebook REFERENCES
  530. Zhongzhi Shi. Advanced artificial intelligence, volume 1. World Scientific, 2011.
  531. Arthur G Tansley. The use and abuse of vegetational concepts and terms. Ecology, 16(3):284-307, 1935.
  532. Marcel Holyoak, Renato Casagrandi, Ran Nathan, Eloy Revilla, and Orr Spiegel. Trends and missing parts in the study of movement ecology. Proceedings of the National Academy of Sciences, 105(49):19060- 19065, 2008.
  533. Craig W Reynolds. Flocks, herds and schools: A distributed behavioral model. ACM SIGGRAPH computer graphics, 21(4):25-34, 1987.
  534. Gavin SP Miller. The motion dynamics of snakes and worms. ACM Siggraph Computer Graphics, 22(4):169-173, 1988.
  535. Michael McKenna, Steve Pieper, and David Zeltzer. Control of a virtual actor: The roach. ACM SIGGRAPH Computer Graphics, 24(2):165-174, 1990.
  536. Alexis Drogoul and Jacques Ferber. Multi-agent simulation as a tool for modeling societies: Application to social differentiation in ant colonies. In European Workshop on Modelling Autonomous Agents in a Multi- Agent World, pages 2-23. Springer, 1992.
  537. Karl Sims. Evolving 3d morphology and behavior by competition. Artificial life, 1(4):353-372, 1994.
  538. Karl Sims. Evolving virtual creatures. In Proceedings of the 21st annual conference on Computer graphics and interactive techniques, pages 15- 22. ACM, 1994.
  539. Yoon-Sik Shim and Chang-Hun Kim. Generating flying creatures using body-brain co-evolution. In Proceedings of the 2003 ACM SIGGRAPH/Eurographics symposium on Computer animation, pages 276-285. Eurographics Association, 2003.
  540. Keita Nakamura, Ikuo Suzuki, Masahito Yamamoto, and Masashi Fu- rukawa. Acquisition of swimming behavior on artificial creature in virtual water environment. In European Conference on Artificial Life, pages 99-106. Springer, 2009.
  541. Kenji Iwadate, Ikuo Suzuki, Masahito Yamamoto, and Masashi Fu- rukawa. Evolving amphibian behavior in complex environment. In European Conference on Artificial Life, pages 107-114. Springer, 2009.
  542. Dave Cliff and Geoffrey F Miller. Co-evolution of pursuit and evasion ii: Simulation methods and results. 1995.
  543. Tiago Francisco and Gustavo Miguel Jorge dos Reis. Evolving predator and prey behaviours with co-evolution using genetic programming and decision trees. In Proceedings of the 10th annual conference companion on Genetic and evolutionary computation, pages 1893-1900. ACM, 2008.
  544. Michal Joachimczak and Borys Wróbel. Evolving gene regulatory networks for real time control of foraging behaviours. In ALIFE, pages 348-358, 2010.
  545. Nesrine Ouannes, Noureddine Djedi, Yves Duthen, and Hervé Luga. Toward the construction of a virtual ecosystem by evolving virtual creature's behaviours. In Multimedia Computing and Systems (ICMCS), 2012 International Conference on, pages 350-355. IEEE, 2012.
  546. Nesrine Ouannes, Noureddine Djedi, Yves Duthen, and Hervé Luga. Following food sources by artificial creature in a virtual ecosystem. VIRTUAL WORLDS-Artificial Ecosystems and Digital Art Exploration, pages 99-116, 2012.
  547. Michael E Palmer and Andrew K Chou. An artificial visual cortex drives behavioral evolution in co-evolved predator and prey robots. In Proceedings of the 14th annual conference companion on Genetic and evolutionary computation, pages 361-364. ACM, 2012.
  548. Xiaoyuan Tu and Demetri Terzopoulos. Artificial fishes: Physics, locomotion, perception, behavior. In Proceedings of the 21st annual conference on Computer graphics and interactive techniques, pages 43- 50. ACM, 1994.
  549. Julie A Dickerson and Bart Kosko. Virtual worlds as fuzzy cognitive maps. Presence: Teleoperators & Virtual Environments, 3(2):173-189, 1994.
  550. Jaap A Kaandorp. Simulation of growth and form of sponges and corals and the influence of the physical environment. In Modeling Complex Data for Creating Information, pages 199-208. Springer, 1996.
  551. Bruce M Blumberg and Tinsley A Galyean. Multi-level direction of autonomous creatures for real-time virtual environments. In Proceedings of the 22nd annual conference on Computer graphics and interactive techniques, pages 47-54. ACM, 1995.
  552. Takashi Ito, Marcin L Pilat, Reiji Suzuki, and Takaya Arita. Population and evolutionary dynamics based on predator-prey relationships in a 3d physical simulation. Artificial life, 2016.
  553. Biogenesis. http://biogenesis.sourceforge.net/, 2006. Online; acessed 18-February-2016.
  554. Biogenesis x mod. https://sourceforge.net/projects/biogenesisxmod/, 2015. Online; acessed 13-June-2016.
  555. Biogenesis color mod. https://sourceforge.net/projects/biogenesiscolor/, 2014. Online; acessed 25-July-2016.
  556. Mahbub Hassan, Alfandika Nayandoro, Mohammed Atiquzzaman, (2000), "Internet Telephony: Services, Technical Challenges, and Products", in Proceedings of IEEE Communications Magazine
  557. Mahdi, O.A.; Mohammed, M.A.; Mohamed, A.J. (November 2012). "Implementing a Novel Approach an Convert Audio Compression to Text Coding via Hybrid Technique" (PDF). International Journal of Computer Science Issues. 9 (6, No. 3): 53-59.
  558. Alexander Benjamin (2010), "Music Compression Algorithms and Why You Should Care"
  559. History.com Staff (2009), "Morse Code and the Telegraph", A+E Networks, Retrieved fromhttp://www.history.com/topics/inventions/telegraph, Access Date: March 6, 2017
  560. Robert Pepper (2014), "The History of VoIP and Internet Telephones", Retrieved from https://getvoip.com/blog/2014/01/27/history-of-voip- and-internet-telephones/
  561. Shannon, Claude Elwood, "A mathematical theory of communication." ACM SIGMOBILE Mobile Computing and Communications Review 5.1 (2001): 3-55.
  562. Shannon, Claude Elwood, "A mathematical theory of communication.", Reprinted with corrections from The Bell System Technical Journal, Vol. 27, pp. 379-423, 623-656, July, October 1948.
  563. D.A. Huffman+, Associate IRE, "A Method for the Construction of Minimum-Redundancy Codes", Retrieved fromhttp://compression.ru/download/articles/huff/huffman_1952_minim um-redundancy-codes.pdf
  564. digitalpreservation.gov (2014), "A-Law Compressed Sound Format", Retrieved fromhttp://www.digitalpreservation.gov/formats/fdd/fdd000038.shtml
  565. Wikipedia, "a-law algorithm", Retrieved fromhttps://en.wikipedia.org/wiki/A-law_algorithm
  566. Cisco.com (2006), "Waveform Coding Techniques", Retrieved from: http://www.cisco.com/c/en/us/support/docs/voice/h323/8123-waveform- coding.html
  567. Wikipedia, "Warped linear predictive coding", Retrieved fromhttps://en.wikipedia.org/wiki/Warped_linear_predictive_coding
  568. Aki Härmä and Unto K. Laine, "A comparison of warped and conventional linear predictive coding", Retrieved from http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.99.1455&rep= rep1&type=pdf
  569. Atal, Bishnu S(2006), "The history of linear prediction." IEEE Signal Processing Magazine 23.2, 154-161
  570. Speex Codec Manual, https://speex.org/docs/manual/speex- manual/node9.html
  571. Schroeder, M., and B. S. Atal. "Code-excited linear prediction (CELP): High-quality speech at very low bit rates." Acoustics, Speech, and Signal Processing, IEEE International Conference on ICASSP'85. Vol. 10.
  572. International Telecommunications Union, Standardization Sector (ITU- T), Study Group 15 (1993-1996), Recommendation G.729, March 1996.
  573. ITU-T G.728, Retrieved from: http://www.itu.int/rec/recommendation.asp?type=folders&lang=e&paren t=T-REC-G.728
  574. ITU-T G.718 Recommendation, Retrieved from: http://www.itu.int/rec/T-REC-G.718/en
  575. MTT Company, "Comparative analysis of popular Internet instant messengers and the technology used", Retrieved from: http://webcache.googleusercontent.com/search?q=cache:1UY0E1p0IpM J:www.mttgroup.ch/upload/Comparison%2520Stealthphone,%2520Vibe r,%2520Skype,%2520WhatsApp.doc+&cd=1&hl=en&ct=clnk&gl=ph
  576. Robert M. Gray, IEEE Signal Processing Society, Distinguished Lecturer Program, Retrieved from:http://www- ee.stanford.edu/~gray/dl.html
  577. SILK, Retrieved from: https://en.wikipedia.org/wiki/SILK#cite_note- IETF79-2
  578. H. S. Malvar, "Lapped transforms for efficient transform/subband coding," IEEE Trans. Acoust., Speech, Signal Processing, ASSP-38, pp. 969-978, June 1990.
  579. H.S. Malvar, "A modulated Complex Lapped Transform and its Application to Audio processing", Retrieved from:http://www.mirlab.org/conference_papers/International_Conferenc e/ICASSP%201999/PDF/SCAN/IC992457.PDF
  580. Jeff Rodman (2009), "Polycom® Siren14 -Information for Prospective Licensees", Polycom, Inc, Retrieved from: http://docs.polycom.com/global/documents/company/about_us/technolo gy/siren14_g7221c/info_for_prospective_licensees.pdf
  581. Business Wire (2001-03-26). "PictureTel Announces New Siren Wideband Audio Technology Licensing Program". thefreelibrary.com. Retrieved from http://www.thefreelibrary.com/PictureTel+Announces+New+Siren+Wid eband+Audio+Technology+Licensing...-a072261882
  582. Wikipedia.org, "Packet (Computing), Retrieved from: https://simple.wikipedia.org/wiki/Packet_(computing)
  583. Wikipedia.org, "Packet Loss", Retrieved from: https://en.wikipedia.org/wiki/Packet_loss
  584. Bolot, Jean-Chrysotome. "End-to-end packet delay and loss behavior in the Internet." ACM SIGCOMM Computer Communication Review. Vol. 23. No. 4. ACM, 1993.
  585. Measuring network throughput, Retrieved from: https://en.wikipedia.org/wiki/Measuring_network_throughput
  586. Jitter, Retrieved from: https://en.wikipedia.org/wiki/Jitter
  587. ITU-T Rec. G.107 (March 2005), "The E-model, a computational model for use in transmission planning", Retrieved from: https://www.itu.int/rec/T-REC-G.107
  588. Startrinity.com (2014), "SIP Tester Tutorial", Retrieved from: http://startrinity.com/VoIP/SipTester/SipTesterTutorial.aspx References:
  589. S. Berger, H. Schulzrinne, S. Sidiroglou, X. Wu, Ubiquitous Computing Using SIP. In: Proc. of NOSSDAV'03, Monterey, California,USA, June 1-3, 2003.
  590. Marcel C. Castro and Andreas J. Kassler, Optimizing SIP Service Provisioning in Internet Connected MANETs
  591. K. Pandey and A. Swaroop, "A Comprehensive Performance Analysis of Proactive, Reactive and Hybrid MANETs Routing Protocols," IJCSI International Journal of Computer Science Issues, Vol. 8, No. 3, 2011.
  592. Mazin Alshamrani, Haitham Cruickshank, Zhili Sun, Vahid Fami, and Basil Elmasri, Evaluation of SIP Signalling and QoS for VoIP Over MANETs Reactive Routing Protocols
  593. P. CHOCHOL, "Qualitative factors that impact real implementing voip in private networks," ACTA ELECTROTECHNICA ET INFORMATICA, vol. 9, p. 61, 2009.
  594. J. Fitzpatrick, S. Murphy, and J. Murphy, "An approach to transport layer handover of voip over wlan," Consumer Communications and Networking Conference, 2006.
  595. U. Iqbal, Y. Javed, S. Rehman, and A. Khanum, "Sip-based qos management framework for ims multimedia," IJCSNS International Journal of Computer Science and Network Security, May 2010.
  596. Bayrem TRIKI, Slim REKHIS, and Noureddine BOUDRIGA, Secure and QoS-aware SIP Handover for VoIP Communication in Vehicular Adhoc Networks
  597. H. kaur and E. J. Singh, "Performance comparison of OLSR, GRP and TORA using OPNET," International Journal of Advanced Research in Computer Science and Software Engineering, 2 (10), Oct-2012, pp. 1-6.
  598. P. Palta and S. Goyal, "Comparison of OLSR and TORA routing protocols using OPNET Modeler" in International Journal of Engineering Research and technology Vol. 1 Issue 5, July - 2012.
  599. A. Shrestha and F. Tekiner, "On MANET Routing Protocols for Mobility and Scalability," In International Conference on Parallel and Distributed Computing, Applications and Technologies, p.p. 451-456, November 2009. IEEE Computer Society.
  600. S. Gandhi, N. Chaubey, P. Shah, and M. Sadhwani, "Performance evaluation of DSR, OLSR and ZRP protocols in MANETs," Computer Communication and Informatics (ICCCI), 2012 International Conference on, pp. 1-5, 2012.
  601. K. Jain, K. Somasundaram, B. Wang, J. Baras, and A. RoyChowdhury, "Study of OLSR for Real-time Media Streaming over 802.11 Wireless Network in Software Emulation Environment," 2010.
  602. A. B. Johnston, "SIP Understanding the Session Initiation Protocol," third Edition, Artech House Publishers, 2009.
  603. S. Ganguly and S. Bhatnagar, "VoIP: Wireless, P2P and New Enterprise Voice Over IP," Chichester, England: Wiley, 2008. Print. International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 3, March 2017 REFERENCES
  604. DANIEL DOMINIC SLEATOR AND ROBERT ENDRE TARJAN naming systems. Self-Adjusting Binary Search Trees http://dl.acm.org/citation.cfm?id=3835.
  605. J. K. Liu, M. H. Au, X. Huang, R. Lu and J. Li, "Fine- Grained Two-Factor Access Control for Web-Based Cloud Computing Services", in IEEE Transactions on Information Forensics and Security, vol. 11, no. 3, pp. 484-497, March 2016.
  606. Wang, K. Ren and J. Wang, "Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming", in IEEE Transactions on Computers, vol. 65, no. 1, pp. 216-229, Jan. 2016.
  607. Ranabahu, E. M. Maximilien, A. Sheth and K. Thirunarayan, "Application Portability in Cloud Computing: An Abstraction-Driven Perspective", in IEEE Transactions on Services Computing, vol. 8, no. 6, pp. 945-957, 2013.
  608. John Footen and Mohan Ananthanarayanan, "Service- Oriented Architecture and Cloud Computing in the Media Industry," SMPTE Motion Imaging Journal, pp.22-30,2012.
  609. J. Mei, K. Li, A. Ouyang and K. Li, "A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing", in IEEE Transactions on Computers, vol. 64, no. 11, pp. 3064-3078, Nov. 1 2015.
  610. Xinyu Lei, Xiaofeng Liao, Tingwen Huang, and Huaqing Li, "Cloud Computing Service: the Case of Large Matrix Determinant Computation", IEEE Transactions On Services Computing, pp1-14,vol. 10, no. 10, 2014.
  611. Jungwoo Shin, Manseok Jo, Jongsu Lee, and Daeho Lee, "Strategic Management of Cloud Computing Services: Focusing on Consumer Adoption Behavior," IEEE transactions on engineering management, pp.1-9, 2013.
  612. Srdan Dzombeta, Vladimir Stantchev, Ricardo Colomo- Palacios, Knud Brandis and Knut Haufe, "Governance of cloud computing services for the life sciences," IEEE Computer Societ y,pp.30-37,2014.
  613. Jia-Lun Tsai and Nai-Wei Lo, "A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services," IEEE systems journal, vol. 9, no. 3, pp.805-815, 2015.
  614. Zhen Xiao, Qi Chen, and Haipeng Luo, "Automatic Scaling of Internet Applications for Cloud Computing Services," IEEE transactions on computers, vol. 10, no. 10, pp.1-14, 2010.
  615. Alexandru Iosup, Simon Ostermann, M. Nezih Yigitbasi, Radu Prodan, Thomas Fahringer, and Dick H.J. Epema, "Performance Analysis of Cloud Computing Services for Many-Tasks Scientific Computing," IEEE transactions on parallel and distributed systems, vol. 22, no. 6, pp.931-945, 2011.
  616. Zhaomeng Zhu, Gongxuan Zhang, Miqing Li, Xiaohui Liu, "Evolutionary Multi-Objective Workflow Scheduling in Cloud," transactions on parallel and distributed systems, 2014.
  617. Kassian Plankensteiner, Radu Prodan, "Meeting Soft Deadlines in Scientific workflows using resubmission impact," IEEE transactions on parallel and distributed systems, vol. 23, no. 5, pp.890-901, 2012.
  618. Abhishek Verma, Ludmila Cherkasova, Roy H. Campbell, "Orchestrating an Ensemble of MapReduce Jobs for Minimizing Their Makespan," IEEE Transactions On Dependable And Secure Computing, vol. 10, no. 5, pp. 314-327, 2013
  619. Hongyan Cui, Xiaofei Liu, Nirwan Ansari and Yunjie Liu, "Cloud Service Reliability Modeling and Optimal Task Scheduling," IET Communications,pp.1-12,2014.
  620. Sandeep Kapur, Dinesh Kumar, "Resource Utilization in Cloud Computing using Hybrid Algorithm", Indian Journal of Science and Technology, vol 9, issue. 43, 2016.
  621. E. Walsh, G. Tesauro, J. O. Kephart, and R. Das, "Utility Functions in Autonomic Systems," in Proceedings of the First International Conference on Autonomic Computing. IEEE Computer Society, pp. 70-77, 2004.
  622. Jiayin Li, Meikang Qiu, Jian-Wei Niu, Yu Chen, Zhong Ming, "Adaptive Resource Allocation for Preempt able Jobs in Cloud Systems," in 10th International Conference on Intelligent System Design and Application, pp. 31-36, 2011.
  623. Shi J.Y., Taifi M., Khreishah A., "Resource Planning for Parallel Processing in the Cloud," in IEEE 13th International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 3, March 2017 International Conference on High Performance and Computing, pp. 828-833, 2011.
  624. Goudarzi H., Pedram M., "Multi-dimensional SLA- based Resource Allocation for Multi-tier Cloud Computing Systems," in IEEE International Conference on Cloud Computing, pp. 324-331, 2011.
  625. A. A. Patel, J. N. Rathod, "Reducing Power Consumption & Delay Aware Resource Allocation in Cloud Data centers", Journal of Information, Knowledge and Research in Computer Engineering, vol.2, pp.337-339, 2010.
  626. B.Wei, C.Lin, X.Kong, "Energy Optimized Modeling for Live Migration in Virtual Data Center", IEEE 4th International Conference on Cloud Computing, pp.736- 737, 2011.
  627. D.Jayasinghe, C.Pu, T. Eilam, M.Steinder, I.Whalley, E.Snible, "Improving Performance and Availability of Services Hosted on IaaS Clouds with Structural Constraint-aware Virtual Machine Placement", IEEE International Conference on Services Computing, pp.72-79, 2011.
  628. K.Ye, D.Huang, X.Jiang, H.Chen, S.Wu, "Virtual Machine Based Energy-Efficient Data Center Architecture for Cloud Computing: A Performance Perspective", IEEE/ACM International Conference on Green Computing and Communications, pp.171-178, 2010.
  629. Chuang, I-Hsun, "An effective privacy protection scheme for cloud computing", Advanced Communication Technology (ICACT), 13th International Conference on. IEEE, 2011.
  630. Do Chung, Byung, Hangoo Jeon, and Kwang-Kyu Seo, "A Framework of Cloud service Quality Evaluation System-Focusing on Security Quality Evaluation", International Journal of Software Engineering and Its Applications, pp. 41-46,2014
  631. http://study.com/academy/lesson/reliability-coefficient- formula-definition-quiz.html International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 3, March 2017 REFERENCES
  632. Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Proceedings of EUROCRYPT,pp. 457-473 (2005)
  633. J. Bethencourt, A. Sahai, and B. Waters. Ciphertext-policy attribute based encryption. Proceed-ings of IEEE Symp. on Security and Privacy, 2007, pp: 321- 334.
  634. Song, D., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: IEEE Symposium on Security and Privacy, pp. 44-55 (2000)
  635. Boneh, D., Crescenzo, G.D., Ostrovskyand, R., Persiano, G.: Public key encryption with keyword search. In: International Conference on the Theory and Applications of Cryptographic Tech-niques, pp. 506-522 (2004)
  636. Google, Britney spears spelling correction. Referenced online at http://mooglemb.com/threads/googlecache/64.233.187.104 /jobs/britney.html, June 2016.
  637. Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy preserving multi-keyword search over encncrypted cloud data. J. IEEE Trans. Parallel Distrib. Syst. 25, 222-233 (2014)
  638. Sharon. E, N. Saravanan, A Survey on Keyword Based Search over Outsourced Encrypted Data. International Journal of Engineering and Technology (IJET), Volume 5,pp: 905-909(2013)
  639. Xu, Z., Kang, W., Li, R., Yow, K., Xu, C.: Efficient multi-keyword rank query on encrypted cloud data. In: 18th IEEE International Conference on Parallel and Distributed Systems, Singa-pore, pp. 244-251(2012)
  640. Moh, T.S., Ho, K.H.: Efficient semantic search over encrypted data in cloud computing. In:International Conference on High Performance Computing and Simulation, pp: 382-390.Bologna (2014)
  641. Khan Neelam, S., Challa, R.K.: Secure ranked fuzzy multi-keyword search over outsourced en-crypted cloud data. In: 5th IEEE International Conference on Computer and Communication Technology (ICCCT), Allahabad (2014)
  642. Saini V., Challa R.K., Khan N.S. : An Efficient Multi-keyword Synonym-Based Fuzzy Ranked Search Over Outsourced Encrypted Cloud Data. In: Advanced Computing and Communication Technologies. Advances in Intelligent Systems and Computing, vol 452. Springer, Singapore (2016)
  643. Li, J., Wang, Q., Wang, C., Cao, N., Ren, K., Lou, W.: Fuzzy keyword search over encrypted data in cloud computing. In: 29th IEEE International Conference on Computer Communications, pp. 1-5, San Diego (2010)
  644. H. T. Poon, A. Miri, "Computation and Search over Encrypted XML Documents," BigDataCongress,pp.1-4,(2015).
  645. C. Wang, N. Cao, K. Ren, and W. J. Lou.: Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data.In: IEEE Transaction on Parallel Distribributed System, vol. 23, no.8, pp. 1467-1479, (2012). International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 3, March 2017 REFERENCES
  646. B. K. Joshi and M. Selot, "Design and Implementation of a Bilingual Dictionary using Hypertext Techniques", Proceedings of the National Seminar on Computer Processing of Hindi Language (COMPHIL'93), Allahabad, April 10-11, 1993, pp TS1-3.1-TS1-3.4.
  647. B. K. Joshi, "On the Design and Implementation of Computer Software and Software Development Tools in Hindi", PhD Thesis, Rani Durgavati University, Jabalpur, 1998.
  648. K. K. Kushwah and B. K. Joshi, "Hindi Modifier Recognition based on Pixel Relationship", International Conference on ICT Business Industry Government, Indore, Nov 18-19, 2016.
  649. B. K. Joshi and K. K. Kushwah, "Micro-Parsing of Hindi Words", International Journal of Computer Science and Information Security, Vol-14, No 11, November 2016, pp 261-265.
  650. B. K. Joshi and K. K. Kushwah, "Sandhi: The Rule Based Word Formation In Hindi", International Journal of Computer Science and Information Security, Vol-14, No 12, December 2016, pp 781-785.
  651. P. Pandye, "Manak Samanya Hindi", Arihant Publicationes (India) Ltd., Ed.-1, 2015, pp 28-36.
  652. V. N. Prasad, "Adunik Hindi Vyakran aur Rachana", 23 rd Edition, Bharti Bhavan Pablication,1993, pp 28-35.
  653. H. Bahari, "Hindi: Shabda -Artha -Prayog", Abhivyakti Publication, 2015, pp 98-108.
  654. J. Prashad, "Chhand Prabhakar", Uttar Pradesh Hindi Sansthan, Luckhnow, 2008, pp 101-102.
  655. References 1. ArifSamehArif, RajasvaranLogeswaran, SarinaMansor and Hezerul Abdul Karim, "Segmentation and Compression of Pharynx and Esophagus Fluoroscopic Images", In 2013 IEEE International Conference on Signal and Image Processing Applications (ICSIPA), pp. 220-225.
  656. Asaad Hakeem, KhurramShafique, and Mubarak Shah. "An Object-based Video Coding Framework for Video", MM'05, November 6-11, 2005, Singapore. Pages 608-617
  657. BahadirGunturk, K., YucelAltunbasak, and Russell Mersereau. "Bayesian resolution- enhancement framework for transform- coded video." In Proceedings the IEEE International Conference on Image Processing, October-2001, vol. 2, pp. 41-44.
  658. B. K. Gunturk, YucelAltunbasak, and R. M. Mersereau, "Multi-frame Resolution- Enhancement Methods for Compressed Video", IEEE Signal Processing Letter, Vol.
  659. Christoph H. Lampert, "Machine Learning for Video Compression: Macroblock Mode Decision", In the 18th International Conference on Pattern Recognition (ICPR), 2006, Vol. 1, pp. 936-940.
  660. Chung-Ming Kuo*'. Chaur-Heh Hsieh*, Yue-Dar Jou*, Hsieh-Cheng Lin, Po-Chiang Lu, "Motion Estimation for Video Compression Using Kalman Filtering", IEEE Transactions on Broadcasting 42, no. 2, 1996, pp. 110-116.
  661. Gary J. Sullivan and Thomas Wiegand, "Video Compression-From Concepts to the H.264/AVC Standard", In the Proceedings of the IEEE, 2005, Vol. 93, No.
  662. Jeffrey Ho, Kuang-Chih Lee, Ming-Hsuan Yang, David Kriegman. "Visual Tracking Using Learned Linear Subspaces". Proc of the 2004 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'04
  663. Ke Shen, "Video Preprocessing Techniques for Real-time Video Compression -Noise Level Estimation Techniques", In IEEE 42nd Midwest Symposium on Circuits and Systems, 1999, Vol. 2, pp. 778-781.
  664. Mamta Sharma, "Compression Using Huffman Coding" In (IJCSNS) - International Journal of Computer Science and Network Security, Vol. 10, No. 5, May 2010, pp. 133-141.
  665. M. Atheeshwari, "Video Compression Techniques -A Comprehensive Survey", International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 4, No. 1, January 2014, ISSN: 2277 128X.
  666. Neha Goel, Vinith Chauhan, Krishna Mohan Rai, "Study of 5 Level DWT and Comparative Performance Analysis of Digital Video Watermarking Techniques Using 3-L-DWT and 5-L-DWT", In International Journal of Engineering and Technical Research (IJETR), ISSN: 2321- 0869 (O) 2454-4698 (P), Volume-3, Issue-7, July 2015, pp. 331-338.
  667. Soumaya ghobrel, "Object-based Video compression using neural networks", IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 4, No 1, July 2011 ISSN (Online): 1694-0814.
  668. Rajeshwar Dass, Lalit Singh, Sandeep Kaushik, "Video Compression Technique", In the International Journal of Technology Enhancements and Emerging Engineering Research Vol. 1, No. 10, 2012, pp.114-119.
  669. Santanu Chaudhury, Subarna Tripathi, Sumantra Dutta Roy, "Parametric Video Compression using Appearance Space", In IEEE 19th International Conference on Pattern Recognition (ICPR), 2008, pp. 1- 4.
  670. S. Bhattacharya, T. Chattopadhyay, and A. Pal, "A survey on different video watermarking techniques and comparative analysis with reference to h. 264/AVC," in IEEE Tenth International Symposium on Consumer Electronics, ISCE'06. IEEE, 2006, pp. 1-6.
  671. T. Bernatin and G. Sundari, "Video Compression Based on Hybrid Transform and Quantization with Huffman Coding for Video Codec", In IEEE International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT), 2014, pp. 452- 456.
  672. T. Hu and J. Wei, "A digital video watermarking scheme based on 1d-dwt," in International Conference on Biomedical Engineering and Computer Science, april 2010, pp. 1 -3.
  673. Vinayak K Bairagi and Ashok M Sapkal, "ROI-based DICOM image compression for telemedicine" In 2011, Digital Image Processing, Vol. 3, No. 11, pp.662-666.
  674. W. Lu, H. Lu, and F. Chung, "Robust digital image watermarking based on subsampling," Applied mathematics and computation, vol. 181, no. 2, pp. 886-893, 2006.
  675. X. Xia, C. Boncelet, and G. Arce, "A multiresolution watermark for digital images," in International Conference on Image Processing, vol. 1. IEEE, 1997, pp. 548-551.
  676. ZhinoosRazaviHesabi, Mohsen Sardari, Ahmad Beirami, FaramarzFekri, Mohamed Deriche, and Antonio Navarro, "A memory- assisted lossless compression algorithm for medical images" 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2030-2034 AUTHORS PROFILE
  677. Kamupriya, student of M.tech in Chandigarh University.
  678. Silky Narang, Assistant Professor at Chandigah University. International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 3, March 2017
  679. P. Panchal ,and M. Shroff, International Journal of Students' Research in Technology & Management Vol 2 (05), August-September 2014, ISSN 2321-2543, pg 183187.
  680. K. C. Lee, U. Lee, and M. Gerla, "Survey of Routing Protocols in Vehicular Ad Hoc Networks," in Advances in Vehicular Ad-Hoc Networks: Developments and Challenges, M. Watfa. IGI Global, 2010, ch. 8, pp. 149-170.
  681. F. Li, and W. Yu, "Routing in Vehicular Ad Hoc Networks: A Survey," Vehicular Technology Magazine, I EEE, vol. 2, no. 2, pp. 12-22, 2007.
  682. A. Indras, R. Murali, and Venkatesh, "Routing Protocols for Vehicular Adhoc Networks (MANETs): A Review ", Journal of Emerging Trends in Computing and
  683. M. Erritall, and B. EL Ouahidi, "Performance Evaluation of Ad hoc Routing Protocols in MANET",
  684. K. Bala, and M. Sachdeva, "ENHANCEMENT OF OLSR ROUTING PROTOCOL IN MANET" CSE Department, SBSCET Ferozepur, Punjab (INDIA), January 23-24, 2016.
  685. M. B. Yassein, and A. Y. Al-Dubai, "Inspired Counter Based Broadcasting for Dynamic Source Routing in Mobile Networks" Department of Computer Science, Jordan University of Science and Technology, Irbid,Jordan, School of Computing Edinburgh Napier,University Edinburgh EH10 5DT, UK, 27 October 2015.
  686. A. Chandra, and S. Thakur, "Qualitative Analysis of Hybrid Routing Protocols Against Network Layer Attacks in MANET "Apoorva Chandra et al, International Journal of Computer Science and Mobile Computing, Vol.4 Issue.6, June-2015, pg. 538-543.
  687. N. Kumar, K. Vashishtha, and K. Babu, "A Comparative Study of AODV, DSR, and DYMO routing rotocols using OMNeT++ "International Journal on Recent and Innovation Trends in Computing and Communication, September 2013. Third International Symposium on Automatic Amazigh processing, Vol. 3, Issue 2, pp: 33-40, 2013.
  688. R. Kumar, and M. Dave, "A Comparative Study of Various Routing Protocols in MANET" IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 4, No 1, July 2011.
  689. I. Khan, and A. Qayyum, "Performance Evaluation of AODV and OLSR in Highly Fading Vehicular Ad hoc Network Environments", IEEE, Proceedings of the 13th international Multitopic conference, Islamabad, Pakistan,pp:1-5, 2009.
  690. J. Ferreior-Lage, C. Gestoso, O. Rubino, and A. Agelet, "Analysis of Unicast Routing Protocols for MANET", Fifth International Conference on Networking and Services, Valencia, Spain, 2009.
  691. P. Singh, K. Lego, and T. Tuithung, "Simulation based Analysis of Adhoc Routing Protocol in Urban and Highway Scenario of MANET", International Journal of Computer Application, Vol. 12, Issue 10, pp: 42 -49,2011.
  692. M. Prokop, "Routing Protocol Evaluation Development of a Fully Functional Simulation Environment for Vehicular Ad Hoc Networks", M.Sc. Thesis, Rochester Institute of Technology Kate Gleason College o Engineering, New York, USA, 2011.
  693. J. Kumar," Comparative Performance Analysis of AODV, DSR, DYMO, OLSR and ZRP Routing Protocols in MANET Using Varying Pause Time", (IJCCN),2(3), pp 43-51 ,2012.
  694. E. Spaho, and M. Ikeda, "Performance Comparison of DSDV and DYMO Protocols for Vehicular Ad hoc Networks"2012 26th IEEE International Conference on Advanced Information Networking and Applications.
  695. U. Nagaraj, and P. P. Dhamal, "Performance Evaluation of Proactive and Reactive Protocols in VANET", International Journal of Information and Education Technology, Vol. 2, No. 5, October 2012.
  696. A. Moravejosharieh, H. Modares, R. Salleh, and E.Mostajeran, "Performance Analysis of AODV, AOMDV, DSR, DSDV Routing Protocols in Vehicular Ad hoc Network", Research Journal of Recent Science, Vol. 2, Issue 7, pp: 66-73, 2013.
  697. David A. Maltz, Josh Broch, Jorjeta Jetcheva, and David B. Johnson, Member, IEEE, "The Effects of On-Demand Behavior in Routing Protocols for Multihop Wireless Ad Hoc Networks," Ieee Journal On Selected Areas In Communications, VOL. 17, NO. 8, AUGUST 1999, pp-1439-1453, doi: 10.1109/49.779925.
  698. Charles E. Perkins, Elizabeth M. Royer, Samir R. Das and Mahesh K. Marina, "Performance Comparison of Two On-Demand Routing Protocols for Ad Hoc Networks," IEEE Personal Communications • February 2001.
  699. Anupam Baliyan & Sanjeev Gupta, "Proposed Smart DSR(S-DSR) Protocol for Ad Hoc Network," Global Journal of Computer Science and Technology Network, Web & Security Volume 12 Issue 10 Version 1.0
  700. Sesha Bhargavi Velagaleti, Dr.M.Seetha, Dr.S.Viswanadha Raju, "A Simulation And Analysis Of Secured S-DSR Protocol In Mobile Ad Hoc Networks," International Journal of Computer & Organization Trends - Volume 3 Issue 9 -Oct 2013, pp-425-430.
  701. Ahmed Al-Maashri, A. and Mohamed Ould-Khaoua, M. (2006) "Performance analysis of MANET routing protocols in the presence of self-similar traffic," In, Proceedings of the 31st IEEE Conference on Local Computer Networks, 2006, 14-16 November 2006, pages pp. 801- 807, doi: 10.1109/LCN.2006.322040.
  702. Matthias Grossglauser, Member, IEEE, and Martin Vetterli, Fellow, IEEE." Locating Mobile Nodes With EASE: Learning Efficient Routes From Encounter Histories Alone", IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 14, NO. 3, JUNE 2006, pp-457-469, doi: 10.1109/TNET.2006.876204.
  703. S.Mohapatra, P.Kanungo , "Performance analysis of AODV, DSR, OLSR and DSDV Routing Protocols using NS2 Simulator," International Conference on Communication Technology and System Design 2011 ,SciVerse Science Direct, Procedia Engineering 30 (2012), pp69-76, doi:10.1016/j.proeng.2012.01.835.
  704. Lakhan Dev Sharma, Nirmal Roberts, "Effects of Velocity on Performance of DYMO, AODV and DSR Routing Protocols in Mobile Ad-hoc Networks," C3IT-2012, SciVerse Science Direct, Procedia Engineering 4 , pp727-731, (2012), doi:10.1016/j.protcy.2012.05.118.
  705. Yih-Chun Hu, Adrian Perrig, David B. Johnson, "Aridane: A Secure On-Demand Routing Protocol for Adhoc Network," Springer Science + Business media, Inc., Wireless Networks 11, pp 21-38,(2005), doi: 10.1007/s11276-004-4744-y.
  706. G. Booch, J. Rumbaugh, and I. Jacobson. 'The Unified Modelling Language User Guide.' Addison Wesley, 1998.
  707. Jeffrey M. Bradshaw. 'An Introduction to software agents.' In Jeffrey M. Bradshaw, editor, Software Agents, pages 3-46. AAAI Press / The MIT Press, 1997.
  708. P. R. Cohen and H. J. Levesque. 'Teamwork.' Nous, 25(4):487-512, 1991.
  709. Jacques Ferber. 'Multi-agent Systems: An Introduction to Distributed Artificial Intelligence.' Addison-Wesley, 1999.
  710. Leonard N. Foner. 'What's an agent anyway? -a sociological case study.' FTP Report -MIT Media Lab, May 1993.
  711. S. Franklin and A. Graesser. 'Is it an Agent, or just a Program? A Taxonomy for Autonomous
  712. Agents.' In Intelligent Agents III. Agent Theories, Architectures and Languages (ATAL'96), volume 1193, Berlin, Germany, 1996. Springer-Verlag.
  713. N. R. Jennings and Michael Wooldridge. 'Agent- Oriented Software Engineering.' In Francisco
  714. J. Garijo and Magnus Boman, editors, Proceedings of the 9th European Workshop on Modeling Autonomous Agents in a Multi-Agent World: Multi-Agent System Engineering (MAAMAW-99), volume 1647, pages 1-7.
  715. Springer-Verlag: Heidelberg, Germany, 30-2 1999.
  716. T. Juan, A. Pearce, and L. Sterling. 'Roadmap: Extending the GAIA methodology for complex open systems.' In Proceedings of the First International Joint Conference on Autonomous Agents and Multi-Agent Systems (AAMAS 2002), Bologna, Italy, July 2002.
  717. Michael Luck, Peter McBurney, and Chris Preist. ' Agent technology: Enabling next generation computing: A roadmap for agent-based computing.' Agent Link report, available from www.agentlink.org/roadmap., 2003.
  718. H. S. Nwana. 'Software agents: An overview.' Knowledge Engineering Review, 11(2):205- 244, 1995.
  719. James Odell. 'Objects and agents compared.' Journal of Object Technology, 1(1):41-53, 2002.
  720. M. Wooldridge and N. R. Jennings. 'Intelligent agents: Theory and practice.' The Knowledge Engineering Review, 10(2):115-152, 1995.
  721. Wooldridge, M; N.R. Jennings, and D. Kinny. 'A methodology for agent-oriented analysis and design.' In Proceedings of the third international conference on Autonomous Agents (Agents-99), 1999.
  722. Wooldridge, M; Jennings, and D. Kinny. 'The GAIA methodology for agent-oriented analysis and design.' Autonomous Agents and Multi-Agent Systems, 3(3), 2000.
  723. M. J. W [17] Wooldridge, M; 'An Introduction to Multi-Agent Systems.' John Wiley & Sons, 2002.
  724. Subaira, A.S and Anitha, P. (2014) Efficient Classification Mechanism for Network Intrusion Detection System Based on Data Mining Techniques: a Survey. In Proceedings of 8thInternational Conference on Intelligent Systems and Control (ISCO), Coimbatore, 2014(Coimbatore: IEEE), pp. 274-280.
  725. Sandeep, D. and M.S.Chadhari. (2014) Review on Data Mining Techniques for Intrusion Detection System. International Journal of Innovative Research in Computer and Communication Engineering. Vol.2 (no.1):pp. 2587-2592.
  726. Mohammadreza, E., Sara, M., Fatimah, S. and Lilly, S.A. (2010) Intrusion Detection Using Data Mining Techniques. IEEE: pp. 200-203.
  727. Nannan, L., Shingo, M., Tuo, W. and Kotaro, H.(2012) Integrated Fuzzy GNP Rule Mining with Distance-based Classification for Intrusion Detection System. In Proceedings of 2012 IEEE International Conference on Systems, Man, and Cybernetics, Seoul, Korea, October 14-17, 2012(Korea: IEEE), pp. 1569- 1574.
  728. Karen, S. And Peter, M. (2007) Guide to Intrusion Detection and Prevention Systems (U.S Department of Commerce: Gaithersburg).
  729. Shubhangi, S., Gujar and B.M.patil. (2014)Intrusion detection using Naive Bayes for real time data. International Journal of Advances in Engineering and Technology, vol. 7(no. 2): pp. 568-574.
  730. Vaishali, K. and Sangita, S .C.(2014) Improved Intrusion Detection System using C4.5 Decision Tree and Support Vector Machine.(IJCSIT) International Journal of Computer Science and Information Technologies, vol. 5(no. 2): pp. 1464.
  731. Ahmed, Y. and Ahmed, E. (2011) Network Intrusion Detection using Data mining techniques and network Behaviour Analysis. International Journal of Computer Science & Information Technology (IJCSIT), vol. 3(no. 6): pp. 87-98.
  732. Praveen, K. and Nitin, G. (2014) A Hybrid Intrusion Detection System Using Genetic-Neural Network. In Proceedings of 29thNational Conference on Advances in Engineering and Technology, Maharishi, March 2014(Maharishi: International Journal of Engineering Research and Applications), pp. 59-63.
  733. Deepthy, K. D. and Anita, J. (2012) Survey on data mining techniques to enhance intrusion detection. In Proceedings of International Conference on Computer Communication and Informatics (ICCCI), Coimbatore, January 10-12, 2012(India: IEEE),
  734. Kalpana ,J.,Praveen, K. and Seema, R.(2015) Design and Development of a Prototype Application for Intrusion Detection using Data mining. In proceedings of 4th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions), India,September 2-4. 2015(India: IEEE).
  735. Amit, D. S. and Swati, G. K. (2014) Combining Naive Bayesian and Support Vector Machine for Intrusion Detection System. International Journal of Computing and Technology, vol. 1(no. 3):pp. 64.
  736. Sandhya, P., Ajith, A., Crina, G. and Johnson, T. (2007) Modelling intrusion detection system using hybrid intelligent systems. Journal of Network and Computer Applications, vol. 30:pp. 144-152.
  737. Mrutyunjaya, P. and Manas, R. P.(2007) Network Intrusion Detection using naive bayes.(IJCSNS )International Journal of Computer Science and Network Security, vol. 7(no. 1): pp. 258-263.
  738. Anikt, p. S. and S.S.Dhande. (2014) Malicious Code Detection using Naive bayes classifier .International journal of application or innovation in engineering, vol. 3(no. 4): pp. 401-405.
  739. Dagne, T. (2012) Constructing a Network Intrusion Detection System. Thesis, Addis Ababa University, Addis Ababa, Ethiopia.
  740. Krzysztof, J. C., Witold, P., Roman W. S. and Lukasz, A. K. (2007) Data Mining: Knowledge Discovery Approach.(New York, USA: Springer).
  741. International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 3, March 2017
  742. Stolfo, S. J., Fan, W., Lee, W., Prodromidis, A. and Chan, P. K. (2000) Cost-based modelling for fraud and intrusion detection: Results from the jam project. Discex, vol. 2: p. 1130.
  743. D. T. Larose. (2005) Discovering Knowledge in Data: An Introduction to Data Mining.(New Jersey,USA: John Wiley & Sons Inc).
  744. Yetian, C. (2009) Learning classifiers from imbalanced, only positive and unlabeled data sets. Available via dialog.http://web.cs.iastate.edu/~yetianc/cs573/files/C S573_ProjectReport_YetianChen.pdf. Accessed 15
  745. Jan 2016. REFERENCES
  746. Ruy de Oliveira, Torsten Braun ,TCP in Wireless Mobile Ad Hoc Networks, Institute of Computer Science and Applied Mathematics, University of Berne, Switzerland, July 2002. International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 3, March 2017
  747. Internet Engineering Task Force (IETF) Mobile AdHoc Networks (MANET) Networking Group Charter. https://www.ietf.org/html.charters/manetcharter.html.
  748. G. Holland and N. H. Vaidya, "Analysis of TCP performance over mobile ad hoc networks," in Proc. of the Fifth Annual ACM / lEEE Conference on Mobile Computing and Networking (MOBICOM). August 1999.
  749. D. Comer, Interworking with TCP/II', vol.1, 3rd edition, Englewood Cliffs.
  750. N. I., Prentice Hall, 1995.
  751. B. Postel, "Transmission Control Protocol," Internet Engineering Task Force, September 1981, RFC 793.
  752. W. Stevens, "TCP slow start congestion avoidance, fast retransmit, and cut recovery algorithm," Internet Engineering Task Force, January 1997, RFC 2001.
  753. W Richard Stevens, TCP/IP Illustrated, Volume 1. The. Protocol. .Addison Wesley, 1994.
  754. S.W. 0' Malley and L. Peterson, "TCP Vegas: End-to-End Congestion Avoidance on a Global Internet" lEEE Journal of Selected A;-ens iu Coin~n.. 13(8): 1465-1480, Oct.'95.
  755. E. Royer and C. Perkins, "Ad Hoc on demand distance vector routing" - IETF Internet Draft
  756. David B. Johnson aud David A. Maltz, "Dynamic source routing in ad hoc wireless networks" T.Imielinski and H. Korth. Editors, Mobile Computing, Kluwer Academic, 1996.
  757. M. Gerla, K. Tang and R. Bagrodia, "TCP Performance in wireless multi- hop networks," in Proc. Of IEEE IVMCSA '99, New Orleans, LA, February 1999.
  758. R Sliorey et al, "Performance of TCP over different routing protocols in mobile ad hoc networks." Proc. Of IEEE Vehicular Technology Conference, 2000. Tokyo.
  759. K. Cliandran et.al, "A Feedback-based Scheme for Improving TCP Performance in Ad Hoc Wireless Networks". Proc. Of CDCS '98. Amsterdam. Mav '98.
  760. Jain Liu and Suresli Singli, " ATCP: TCP for Mobile Ad Hoc Networks", IEEE Journal of Selected Areas in Communications, July 2001.
  761. M. Mathias, J. Mahdavi, S. Floyd and A. Romanow, TCP Selective Acknowledgement Options, IETF RFC 2018, October 1996.
  762. M. Allman, V. Paxson and W. Stevens, TCP Congestion Control, IETF RFC 2681, April 1999.
  763. L. Brakmo and L. Peterson. TCP Vegas: End to End Congestion Avoidance on Global Internet. IEEE Journal on Selective Areas of Communication, October 1995.
  764. D. Johnson and D. Maltz. Dynamic source routing in ad hoc wireless networks, In T. Imielinski and H. Korth, editors, Mobile computing, Kluwer Academic. 1996.
  765. S. Liu, Y. Yang and W. Wang, "Research of AODV Routing Protocol for Ad Hoc Networks, ELSEVIER, and AASRI Conference on Parallel and Distributed Computing and Systems, 2013.
  766. H. Balakrishnan and V. N. Padmanabhan. How Network Asymmetry affects TCP. IEEE Communication Magazine, pages 2-9, April 2001. International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 3, March 2017 REFERENCES
  767. B. Sanou, "ICT Facts & Figures. The world in 2015.," Itu 150 Años (1865 -2015), p. 6, 2015.
  768. M. Jason, "80% of internet users own a smartphone," (IJCSIS) International Journal of Computer Science and Information Security, Vol. 15, No. 3, March 2017
  769. Statista, "Number of mobile app downloads worldwide from 2009 to 2017 (in millions)," 2015. [Online]. Available: http://www.statista.com/statistics/266488/forecast-of- mobile-app-downloads/.
  770. SocialCubix, "Scope of Mobile Apps in Developing Countries -A Bright Future," 2015. [Online]. Available: http://www.socialcubix.com/blog/scope-of- mobile-apps-in-developing-countries-a-bright-future. [Accessed: 19-Mar-2016].
  771. P. K. Mona Erfani Joorabchi, Ali Mesbah, "Real Challenges in Mobile App Development," 2013 ACM/IEEE International Symposium, 2013. [Online].
  772. M. Katz, "Top Three Challenges in Enterprise Mobile App Development in 2015 -DZone Mobile," 2015. [Online]. Available: https://dzone.com/articles/top- three-challenges. [Accessed: 19-Sep-2015].
  773. L. Shevchik, "Top 3 Challenges Facing Mobile Development -New Relic blog," 2012. [Online]. Available: https://blog.newrelic.com/2012/11/15/top- 3-challenges-facing-mobile-development/. [Accessed: 22-Sep-2015].
  774. IFAD, "Facts & Figures," Rural Povert Report 2011, 2011. [Online]. Available: https://www.ifad.org/documents/10180/c1bbf5fa- bdc3-4ea6-9366-d163b95b1180. [Accessed: 12-Apr- 2016].
  775. WHO, "WHO | E-Health," 2015. [Online]. Available: http://www.who.int/trade/glossary/story021/en/. [Accessed: 14-Dec-2015].
  776. M. Jennifer, "E-Health: Navigating the Internet for Health Information Healthcare," Healthc. Inf. Manag. Syst. Soc., 2002.
  777. G. Eysenbach, "What is e-health?," J. Med. Internet Res., vol. 3, no. 2, p. E20, Jan. 2001.
  778. S. Modi, "Mobile health technology in developing countries: The case of Tanzania," Pepperdine Policy Rev., vol. 6, no. 5, 2013.
  779. J. M. Deluca and R. Enmark, "E-Health: The Changing Model of Healthcare," Front. Health Serv. Manage., vol. 17, no. 1, p. 3, Oct. 2000.
  780. R. Foster, "Review of Developing Country Health Information Systems," 2012.
  781. E. Afarikumah, "Electronic health in ghana: current status and future prospects.," Online J. Public Health Inform., vol. 5, no. 3, p. 230, 2014.
  782. L. Busagala and G. Kawono, "Underlying Challenges of E-Health Adoption in Tanzania," Int. J. Inf. Commun. Technol. Res., vol. 2, no. 1, pp. 34-41, 2013.
  783. GSMA, "Mobile for Development," 2014.
  784. Novartis, "Novartis Malaria Initiative: SMS for Life," 2014. [Online]. Available: http://malaria.novartis.com/innovation/sms-for- life/index.shtml. [Accessed: 11-Dec-2015].
  785. UNICEF, "Tanzania rolls out birth registration by mobile phone -Stories of UNICEF Innovation," 2015. [Online]. Available: http://www.unicefstories.org/2015/10/16/tanzania- rolls-out-birth-registration-by-mobile-phone/. [Accessed: 11-Dec-2015].
  786. FHI 360, "PROGRESS: Mobile for Reproductive Health (m4RH) | FHI 360," 2015. [Online]. Available: http://www.fhi360.org/projects/progress-mobile- reproductive-health-m4rh. [Accessed: 11-Dec-2015].
  787. Swiss TPF, "Swiss TPH : Project Details," 2015. [Online]. Available: http://www.swisstph.ch/resources/projects/project- details.html?tx_x4euniprojectsgeneral_pi1%5BshowU id%5D=514. [Accessed: 14-Dec-2015].
  788. M. Rouse, "What is mobile experience ? -Definition from WhatIs.com," 2014. [Online]. Available: http://searchcio.techtarget.com/definition/mobile- experience. [Accessed: 19-Sep-2015].
  789. A. I. Wasserman, "Software Engineering Issues for Mobile Application Development," 2010. [Online]. Available: http://www.cmu.edu/silicon- valley/wmse/wasserman-foser2010.pdf. [Accessed: 04-Sep-2015].
  790. Propelics, "Avoid These 6 Mobile App Development Challenges," 2014. [Online]. Available: http://www.slideshare.net/propelics/propelicssix- challengesformobileappdevelopmentwebinar032014. [Accessed: 22-Sep-2015].
  791. Apache, "HttpClient," 2011. [Online]. Available: http://hc.apache.org/httpclient-3.x/. [Accessed: 10- Aug-2016].
  792. Oracle, "JAR File Overview," 2016. [Online].
  793. B. Hopwood, M. Mellor, and G. O'Brien, "Sustainable development: Mapping different approaches," Sustain. Dev., vol. 13, no. 1, pp. 38-52, 2005.
  794. J. Stine, "Mobile application Development Platforms," pp. 23-25, 2013.
  795. F. Andry, L. Wan, and D. Nicholson, "A Mobile Application Accessing PatientsHealth Records Through a REST API," … Conf. Heal. …, 2011.
  796. F. Carl, "RAPIDSMS.," Jembi Project, 2014. [Online]. Available: https://jembiprojects.jira.com/wiki/display/RHEAPIL OT/RapidSMS. [Accessed: 16-Oct-2014].
  797. J. Ryan, C., Deshendran, M., Anban, P., & Christopher, "An Interoperability Architecture for the Health Information Exchange in Rwanda.," Cape Town, South Africa, 2014.
  798. J. Poyzner, "Risebird Blog -The end of back-end as we know it!!! (AKA...," 2014. [Online]. Available: http://risebird.tumblr.com/post/98293128515/the-end- of-back-end-as-we-know-it-aka. [Accessed: 16-May- 2015].
  799. D. Chen and N. Daclin, "Framework for enterprise interoperability 1," Proc. IFAC Work. EI2N, no. August 2016, pp. 77-88, 2006.
  800. W. Guedria and E. Lamine, "HEALTH SYSTEMS INTEROPERABILITY : ANALYSIS AND COMPARISON Wided Guedria , Elyes Lamine , Herv ´ e Pingaud To cite this version :," 2015.
  801. Google, "Firebase Realtime Database | Firebase," 2016. [Online]. Available: https://firebase.google.com/docs/database/. [Accessed: 09-Sep-2016].
  802. S. Joseph , D Aideen , M John, S & Ian, "Building a Mobile Application Development Framework.," IT Best Practices Cloud Computing and Compute Continuum., 2012.
  803. D. Asuman, N. Tuncay, O. Alper, L. Gokce, K. Yildiray, and E. Marco, "Key Issues of Technical Interoperability Solutions in eHealth and the RIDE Project," Softw. Res. Dev., pp. 1-11, 2006.
  804. A. Kajirunga and K. Kalegele, "International Journal of Computer Science & Information Security," October, vol. 9, no. 10, pp. 49-52, 2015.
  805. O. Iroju, A. Soriyan, I. Gambo, and J. Olaleke, "Interoperability in Healthcare: Benefits, Challenges and Resolutions," Int. J. Innov. Appl. Stud., vol. 3, no. 1, pp. 262-270, 2013.
  806. URT-MOHSW., "Tanzania National eHealth Strategy.," Dar es Salaam, 2013.
  807. R. Wortley and L. Mazerolle, "Environmental Criminology and Crime Analysis," Willan Publishing, UK, 2008.
  808. T, Abraham and O. De Vel, "Investigative Profiling with Computer Forensic Log Data and Association Rules," In Proceedings of the IEEE International Conference on Data Mining (ICDM'02), 2002, 11-18.
  809. L.A. Buczak and C.M. Gifford, "Fuzzy Association Rule Mining for Community Crime Pattern Discovery," In ACM SIGKDD Workshop on Intelligence and Security Informatics (ISIKDD '10), 2012.
  810. A. Malathi and S. Baboo, "Enhanced Algorithms to Identify Change in Crime Patterns" International Journal of Combinatorial Optimization Problems and Informatics, Aztec Dragon Academic Publishing, 2011, 2(3), 32-38.
  811. S. Shojaee, A. Mustapha, F. Sidi, and M.A. Jabar, "A Study on Classification Learning Algorithms to Predict Crime Status," International Journal of Digital Content Technology and its Applications (JDCTA), 2013, 7(9), 361-369.
  812. H. Chen, W. Chung, J. Xu, G. Wang, Y. Qin, and M. Chau, "Crime Data Mining: A General Framework and Some Examples. Computer," Los Alamitos, CA, IEEE Computer Society Press, 2004, 37(4), 50-56.
  813. J. De Bruin, T. Cocx, W. Kosters, J. Laros, and J. Kok, "Data Mining Approaches to Criminal Career Analysis," In Proceedings of the International Conference on Data Mining, Washington, D.C., IEEE Computer Society Press, 2006, 171-177.
  814. M. Chau, J. Xu, and H. Chen, "Extracting Meaningful Entities from Police Narrative Reports," In Proceedings of the National Conference on Digital Government Research, 2002, 1-5.
  815. C. Ku, A. Iriberri, and G. Leroy, "Crime Information Extraction from Police and Witness Narrative Reports," In Proceedings of the IEEE International Conference on Technologies for Homeland Security, Boston, MA, 2008, 193-198.
  816. S. Bagui, "An Approach to Mining Crime Patterns," International Journal of Data Warehousing and Mining, 2006, 2(1), 50-80.
  817. C. Yu, M.W. Ward, M. Morabito, and W. Ding, "Crime Forecasting Using Data Mining Techniques," In Proceedings of the 2011 IEEE 11th International Conference on Data Mining Workshops (ICDMW '11), 2011, 779-786.
  818. S. Nath, "Crime Pattern Detection Using Data Mining," In Proceedings of the International Conference on Web Intelligence and Intelligent Agent Technology, Washington, D.C., IEEE Computer Society Press, 2006, 41- 44, .
  819. P. Phillips and I. Lee, "Mining Top-k and Bottom-k Correlative Crime Patterns through Graph Representations," In Proceedings of the IEEE International Conference on Intelligence and Security Informatics, Dallas, TX, 2009, 25-30.
  820. P. Phillips and I. Lee (2011). "Crime Analysis through Spatial Areal Aggregated Density Patterns," GeoInformatica, Springer, 2011, 15(1): 49- 74.
  821. D.E. Brown, "The Regional Crime Analysis Program (RECAP): A Framework for Mining Data to Catch Criminals," In Proceedings of the International Conference on Systems, Man, and Cybernetics, 1998, 2848- 2853.
  822. V. Ng, S. Chan, D. Lau, and C. Ying, "Incremental Mining for Temporal Association Rules for Crime Pattern Discoveries," In Proceedings of the Australasian Database Conference, 2007, 123-132, Ballarat, Victoria, Australia.
  823. M. Redmond and A. Baveja, "A Data-driven Software Tool for Enabling Cooperative Information Sharing Among Police Departments," European Journal of Operational Research, Science Direct, 2002, 141(3), 660-678.
  824. D. Pyle, "Data Preparation for Data Mining," Morgan Kaufmann Publishers, Los Altos, California, 1999.
  825. L. Al Shalabi Z. Shaaban and B. Kasasbeh, "Data mining: A Preprocessing Engine," Journal of Computer Science, 2006, 2(9), 735- 739.
  826. M.R. Berthold, and K.P. Huber "Missing values and learning of fuzzy rules," Int J Uncertain, Fuzziness Knowl-Based Syst, 1998, 6(2), 171- 178.
  827. A. Agrawal and R. Srikant, "Privacy Preserving Data Mining," In Proceedings of ACM SIGMOD conference, Dallas, Texas, 2000, 439-450.
  828. A.P. Dempster, N.M. Larid, and D.B. Rubin, "Maximum likelihood from imcomplete data via the Em Algorithm (with discussion)," Journal of Royal Statistical Society, 1977, B39, 1-38.
  829. L. Al-Shalabi, R. Mahmod, A.A. Abd Ghani, and Y.M. Saman, "A New Model for Extracting a Classifactory Knowledge from Large Datasets Using Rough Set Approach," In World Engineering Congress (WEC'99), Kuala Lumpur, Malaysia, 1999, 105-108.
  830. Z. Pawlak and A. Skowron, "Rudiments of rough sets," Information Sciences, 2007, 177, 3-27.
  831. J. Han and M. Kamber, "Data Mining: Concepts and Techniques," Morgan Kaufmann, USA, 2001.
  832. E.W.T.Ngai, L. Xiu, and D.C.K. Chau, "Application of Data Mining Techniques in Customer Relationship Management: A Literature Review and Classification," Expert Systems with Applications, Elsevier, 2009, 36(2), 2592-2602.
  833. J. Han, M. Kamber, and J. Pei, "Data Mining: Concepts and Techniques," Morgan Kaufmann Publishers, USA, vol. 5, 2012.
  834. H. Zhang, "The Optimality of Naive Bayes," American Association for Artificial Intelligence, 2004.
  835. P. Bhargavi and S. Jyothi, "Applying Naive Bayes Data Mining Technique for Classification of Agricultural Land Soils," IJCSNS International Journal of Computer Science and Network Security, 2009, 9(8), 117-122.
  836. M.J. Aitkenhead, "A co-evolving decision tree classification method," Expert Systems with Applications, 2008, 34(1), 18-25.
  837. O. Ivanciuc, "Applications of Support Vector Machines in Chemistry," Reviews in Computational Chemistry, 2007, 23, 291-400.
  838. Y. Wang, F. Chen, and X. Qu, "Research and Application of Large-Scale Data Set Processing Based on SVM," Journal of Convergence Information Technology (JCIT), AICIT, 2012, 7(16), 195-200.
  839. C. Zhenzhou, "Local Support Vector Machines with Clustering for Multimodal Data," Advances in information Sciences and Service Sciences (AISS), AICIT, 2012, 4(17), 266-275.
  840. G.P. Zhang, "Neural Networks for Classification: A Survey, Systems, Man, and Cybernetics," Part C: Applications and Reviews. IEEE Transactions, 2000, 30(4), 451-462.
  841. I.H. Witten and E. Frank, "Data mining: practical machine learning tools and techniques,"2005, 233-237.
  842. JS. De. Bruin, TK. Ccocs, WA. Kosters, JF. J. Laros, and JN. Kok, "Data mining approaches to criminal career analysis," In the sixth International Conference on Data Minin (ICDM'06), 2006, 171-177.
  843. K.L. Priddy and P.E. Keller, "Artificial Neural Networks: An Introduction," SPIE Press, USA, 2005.
  844. Z. Xu, Z. Liu, B. Yang, and W. Song, "A Quick Attibute Reduction Algorithm with Complexity of Max(O(|C||U|), O(|C|2|U/C|))," Chinese Journal of Computers, 2006, 29: 391-399
  845. References
  846. J. K. Prasad and B. A. Kumar, "Analysis of SIP and realization of advanced IP-PBX features," in Electronics Computer Technology (ICECT), 2011 3rd International Conference on, 2011, pp. 218-222.
  847. L. Liu, "Uncovering SIP vulnerabilities to DoS attacks using coloured petri nets," in Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference on, 2011, pp. 29-36.
  848. R. Dantu, S. Fahmy, H. Schulzrinne and J. Cangussu, "Issues and challenges in securing VoIP," Comput. Secur., vol. 28, pp. 743-753, 2009.
  849. Y. M. Li and S. W. Chiu, "VoIP Pricing in Competitive Telephony Markets," .
  850. M. Garuba, J. Li and Z. Yi, "Security in the new era of telecommunication: Threats, risks and controls of VoIP," in Information Technology: New Generations, 2008. ITNG 2008. Fifth International Conference on, 2008, pp. 587-591.
  851. A. D. Keromytis, "Voice-over-IP security: Research and practice," Security & Privacy, IEEE, vol. 8, pp. 76-78, 2010.
  852. W. Chou, "Strategies to keep your VoIP network secure," IT Professional, vol. 9, pp. 42-46, 2007.
  853. Y. Zhang and H. Huang, "VOIP voice network technology security strategies," in Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC), 2011 2nd International Conference on, 2011, pp. 3591-3594.
  854. T. Porter, Practical VoIP Security. Syngress Publishing, 2006.
  855. H. Abdelnur, I. Chrisment and C. Popi, "Assessing the security of VoIP services," in Integrated Network Management, 2007. IM'07. 10th IFIP/IEEE International Symposium on, 2007, pp. 373-382.
  856. H. Dwivedi, Hacking VoIP: Protocols, Attacks, and Countermeasures. No Starch Press, 2008.
  857. F. Palmieri and U. Fiore, "Providing true end-to-end security in converged voice over IP infrastructures," Comput. Secur., vol. 28, pp. 433-449, 2009.
  858. V. Iossifov, T. Totev and A. Tochatschek, "Experiences in VoIP telephone network security policy at the university of applied sciences (FHTW) berlin," in Proceedings of the 2007 International Conference on Computer Systems and Technologies, 2007, pp. 3.
  859. A. Keromytis, "A survey of Voice over IP security research," Information Systems Security, pp. 1-17, 2009.
  860. E. A. Blake, "Network security: VoIP security on data network--a guide," in Proceedings of the 4th Annual Conference on Information Security Curriculum Development, 2007, pp. 27.
  861. A. Bodhani, "Voicing concerns," Engineering & Technology, vol. 6, pp. 76-79, 2011.
  862. D. Butcher, X. Li and J. Guo, "Security challenge and defense in VoIP infrastructures," Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on, vol. 37, pp. 1152-1162, 2007.
  863. S. E. Griffin and C. C. Rackley, "Vishing," in Proceedings of the 5th Annual Conference on Information Security Curriculum Development, 2008, pp. 33-35.
  864. M. A. Akbar and M. Farooq, "Application of evolutionary algorithms in detection of SIP based flooding attacks," in Proceedings of the 11th Annual Conference on Genetic and Evolutionary Computation, 2009, pp. 1419-1426.
  865. B. Materna, "VoIP insecurity," Communications Engineer, vol. 4, pp. 39-42, 2006.
  866. Z. Chen, S. Guo, K. Zheng and H. Li, "Research on man- in-the-middle denial of service attack in SIP VoIP," in Networks Security, Wireless Communications and Trusted Computing, 2009. NSWCTC'09. International Conference on, 2009, pp. 263-266.
  867. T. Wulff and R. Hunt, "New Approaches to Mitigation of Malicious Traffic in VoIP Networks," 2010.
  868. D. Pérez-Botero and Y. Donoso, "VoIP eavesdropping: A comprehensive evaluation of cryptographic countermeasures," in Networking and Distributed Computing (ICNDC), 2011
  869. Second International Conference on, 2011, pp. 192-196.
  870. P. Thermos and A. Takanen, Securing VoIP Networks. Addison-Wesley Professional, 2007. International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 3, March 2017
  871. Soufiane Farrah, Hanane El Manssouri, El Houssaine Ziyati. « Proposition of improvement areas in most heavy an light stemmer algorithms novel stemmer: EST.Stemmer». In Information Science and Technology (CIST), 4th IEEE CiSt'16 Program. IEEE, 2016.
  872. Buckwalter,T.Qamus: Arabic lexicography http://members.aol.com/ArabicLexicons/
  873. Khoja, S.and Garside, R. Stemming Arabic Text. Computing Department, Lancaster University, Lancaster. Internet Home Page, 1-7 (1999). [Available at:http://www.comp.lancs.
  874. H. AlSerhan, R. A. Shalabi, and G. Kannan, "New approach for extracting arabic roots," in Proceedings of The 2003 Arab conference on Information Technology (ACIT 2003), Alexandria, Egypt, Dec. 2003, pp. 42-59
  875. Nehar, Attia, Djelloul Ziadi, Hadda Cherroun, and Younes Guellouma. "An Efficient Stemming for Arabic Text Classification." In Innovations in Information Technology (IIT), 2012 International Conference on, 328-32. IEEE, 2012.
  876. Larkey, Leah S., et Margaret E. Connell. « Arabic Information Retrieval at UMass in TREC-10. » In TREC, 2001.
  877. Taghva, Kazem, Rania Elkhoury, et Jeffrey S. Coombs. « Arabic Stemming Without A Root Dictionary. » In ITCC (1), 152-157, 2005.
  878. Hadni, Meryeme, Abdelmonaime Lachkar, et S. Alaoui Ouatik. « A new and efficient stemming technique for Arabic Text Categorization ». In Multimedia Computing and Systems (ICMCS), 2012 International Conference on, 791-796. IEEE, 2012.
  879. Saudagar, Abdul Khader Jilani, Habeeb Vulla Mohammed, Kamran Iqbal, et Yasir Javed Gyani. « Efficient Arabic text extraction and recognition using thinning and dataset comparison technique ». In Communication, Information & Computing Technology (ICCICT), 2015
  880. International Conference on, 1-5. IEEE, 2015.
  881. M. A. H. Omer and S. Ma, Stemming Algorithm to Classify Arabic Documents , Journal of Communication and Computer, Vol. 7, No. 9, Sep. 2010
  882. Elrajubi, Osama Mohamed. « An improved Arabic light stemmer ». In Research and Innovation in Information Systems (ICRIIS), 2013
  883. International Conference on, 33-38. IEEE, 2013.
  884. The Five Nouns In Arabic : https://fr.scribd.com/doc/93320581/The- Five-Nouns-In-Arabic
  885. Mohammed N. Al-Kabi, Saif A. Kazakzeh, Bilal M. Abu Ata, Saif A. Al-Rababahc, Izzat M. Alsmadi« A novel root based Arabic stemmer ». In Journal of King Saud University -Computer and Information Science, 94-103, Elsevier, April 2015.
  886. Ghwanmeh, S., Kanaan, G., Al-Shalabi, R., Rabab'ah, 2009. "Enhanced Algorithm for Extracting the Root of Arabic Words". In: the Sixth International Conference on Computer Graphics, Imaging and Visualization, (CGIV '09). pp. 388-391.
  887. Chen, A., Gey, F., 2002. "Building an Arabic stemmer for information retrieval". In: Proceedings of the Eleventh Text REtrieval Conference (TREC 2002). National Institute of Standards and Technology, pp. 631- 639.
  888. A.F.A. Nwesri, S.M.M. Tahaghoghi, F. Scholer "Stemming Arabic Conjunctions and Prepositions". Lect. Notes Comput. Sc., 3772 (2005), pp. 206-217 http://dx.doi.org/10.1007/11575832_23
  889. Taghva, K., Elkhoury, R., Coombs, J., 2005. "Arabic stemming without a root dictionary". In: International Conference on Information Technology: Coding and Computing (ITCC 2005), pp. 152-157.
  890. Dr. Wanjau K., Macharia R. and Ayodo E (2012). Factors Affecting Adoption of Electronic Commerce among Small Medium Enterprises in Kenya: Survey of Tour and Travel Firms in Nairobi: International Journal of Business, Humanities and Technology.
  891. Molla, A., Taylor, R. & Licker, S., (2006). Ecommerce Diffusion in Small Island Countries: the Influence of Institution in Barbados. The Electronic Journal of Information Systems in Developing Countries, 28(2),pp. 1- 15.
  892. Sheth, J. N., & Sharma, A., (2005). International emarketing: Opportunities and issues. International Marketing Review, 22(6), pp. 611-622.
  893. A. Molla and P.S. Licker, (2005). Perceived EReadiness factors in E-Commerce adoption: An empirical investigation in a developing country, International Journal of Electronic Commerce 10 (1) ,pp. 83-110.
  894. Travica, B., (2002). "Diffusion of electronic commerce in developing countries: The case of Costa Rica, Journal of Global Information Technology Management, 5(1), pp. 4-24.
  895. Kaetzel L.J E-commerce and IP on the Internet 1996 page 186
  896. Curie Wendy (2000). "The Global Information Society". Chichester, John Wiley & Sons, Ltd.
  897. R. jamieson and N. Cerpa (2001) "A Research Framework for Risk, Security, Trust and Assurance within an Electronic Commerce Domain" CACS Conference September 2001
  898. V. Hassler. Security Fundamentals for E-commerce. Artech House Publishers, 2001.
  899. D. O'Mahony, M. Peirce, and H. Tewari. Electronic Payment System for E-Commerce. Artech House Publishers, 2001.
  900. E. Maiwald, Network Security; A beginner's guide, 3rd Edition, Dreamtech press, 2008.
  901. Taghavi Zargar, Saman (November 2013). "A Survey of Defense Mechanisms against Distributed Denial of Service (DDoS) Flooding Attacks" (PDF). IEEE communications surveys & tutorials. pp. 2046-2069. Retrieved 2016-02-07
  902. Boudriga, Noureddine (2010). Security of mobile communications. Boca Raton: CRC Press. pp. 32- 33. ISBN 0849379423
  903. K. Mlelwa, B. Chachage and Y. Zaipuna. Article: E- Commerce Trend in Developing Countries: A Case Study of Tanzania. International Journal of Computer Applications 125(1):27-33, September 2015. Published by Foundation of Computer Science (FCS), NY, USA. BibTeX International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 3, March 2017
  904. Reference list
  905. C. D. Onal, X. Chen, G. M. Whitesides, and D. Rus, "Soft mobile robots with on-board chemical pressure generation," in Robotics Research, ed: Springer, 2017, pp. 525-540.
  906. J. Gregory and M. N. Tomac, "A review of fluidic oscillator development," in 43rd AIAA Fluid Dynamics Conference, 2013, p. 2474.
  907. E. Creaco and M. Franchini, "A new algorithm for real-time pressure control in water distribution networks," Water Science and Technology: Water Supply, vol. 13, pp. 875- 882, 2013.
  908. A. F. Falcão and J. C. Henriques, "Oscillating-water-column wave energy converters and air turbines: A review," Renewable Energy, vol. 85, pp. 1391-1424, 2016.
  909. C. M. Shanks, J.-B. Sérodes, and M. J. Rodriguez, "Spatio-temporal variability of non- regulated disinfection by-products within a drinking water distribution network," Water research, vol. 47, pp. 3231-3243, 2013.
  910. P. van Thienen, "A method for quantitative discrimination in flow pattern evolution of water distribution supply areas with interpretation in terms of demand and leakage," Journal of Hydroinformatics, vol. 15, pp. 86-102, 2013.
  911. A. Pham, M. Barisik, and B. Kim, "Pressure dependence of Kapitza resistance at gold/water and silicon/water interfaces," The Journal of chemical physics, vol. 139, p. 244702, 2013.
  912. A. Ghaffari and L. Azari, "Proposing a novel method based on network-coding for optimizing error recovery in wireless sensor networks," Indian Journal of Science and Technology, vol. 8, p. 859, 2015.
  913. A. Ghaffari, "Designing a Wireless Sensor Network for ocean status notification system," Indian Journal of Science and Technology, vol. 7, pp. 809-814, 2014.
  914. R. Mohammadi and A. Ghaffari, "Optimizing reliability through network coding in wireless multimedia sensor networks," Indian Journal of Science and Technology, vol. 8, p. 834, 2015.
  915. Z. Mottaghinia and A. Ghaffari, "A Unicast Tree-Based Data Gathering Protocol for Delay Tolerant Mobile Sensor Networks," Information Systems & Telecommunication, vol. 59, pp. 1-12, 2016.
  916. A. Ghaffari, "An energy efficient routing protocol for wireless sensor networks using A- star algorithm," Journal of applied research and technology, vol. 12, pp. 815-822, 2014.
  917. A. Ghaffari, "Congestion control mechanisms in wireless sensor networks: A survey," Journal of network and computer applications, vol. 52, pp. 101-115, 2015.
  918. G. Freni, M. De Marchis, and E. Napoli, "Implementation of pressure reduction valves in a dynamic water distribution numerical model to control the inequality in water supply," Journal of Hydroinformatics, vol. 16, pp. 207-217, 2014.
  919. E. M. Chiapero, M. Fernandino, and C. Dorao, "Experimental study of pressure drop oscillations in parallel horizontal channels," International Journal of Heat and Fluid Flow, vol. 50, pp. 126-133, 2014.
  920. R. López-Roldán, S. Platikanov, J. Martín-Alonso, R. Tauler, S. González, and J. L. Cortina, "Integration of Ultraviolet-Visible spectral and physicochemical data in chemometrics analysis for improved discrimination of water sources and blends for International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 3, March 2017 application to the complex drinking water distribution network of Barcelona," Journal of Cleaner Production, vol. 112, pp. 4789-4798, 2016.
  921. P. Sivakumar and R. Prasad, "Simulation of water distribution network under pressure- deficient condition," Water resources management, vol. 28, pp. 3271-3290, 2014.
  922. J. El-Chakhtoura, E. Prest, P. Saikaly, M. van Loosdrecht, F. Hammes, and H. Vrouwenvelder, "Dynamics of bacterial communities before and after distribution in a full-scale drinking water network," water research, vol. 74, pp. 180-190, 2015.
  923. M. Mair, W. Rauch, and R. Sitzenfrei, "Spanning Tree-Based Algorithm for Generating Water Distribution Network Sets by Using Street Network Data Sets," in World Environmental and Water Resources Congress 2014, 2014, pp. 465-474.
  924. F. Zheng, A. Simpson, and A. Zecchin, "Improving the efficiency of multi-objective evolutionary algorithms through decomposition: An application to water distribution network design," Environmental Modelling & Software, vol. 69, pp. 240-252, 2015.
  925. A. De Corte and K. Sörensen, "HydroGen: an artificial water distribution network generator," Water resources management, vol. 28, pp. 333-350, 2014.
  926. F. De Paola, N. Fontana, E. Galdiero, M. Giugni, D. Savic, and G. S. Degli Uberti, "Automatic multi-objective sectorization of a water distribution network," Procedia Engineering, vol. 89, pp. 1200-1207, 2014.
  927. A. Campisano and C. Modica, "Two-Step Numerical Method for Improved Calculation of Water Leakage by Water Distribution Network Solvers," Journal of Water Resources Planning and Management, vol. 142, p. 04015060, 2015.
  928. S. Jafari and A. Ghaffari, "Designing Intelligent Device to Control Pressure in Water Distribution Networks," International Journal of Computer Science and Information Security, vol. 14, p. 35, 2016.
  929. F. R. Da Fonseca, W. S. Silva, C. F. Fontana, and E. M. Dias, "Division in sectors technique applied to hydric supplying systems," in Proceedings of the 2nd international conference on Circuits, Systems, Communications & Computers, 2011, pp. 51-61.
  930. J. Machell, S. Mounce, B. Farley, and J. Boxall, "Online data processing for proactive UK water distribution network operation," Drinking Water Engineering and Science, vol. 7, pp. 23-33, 2014.
  931. M. Emre Celebi, Louisiana State University in Shreveport, USA Dr. Lam Hong Lee, Universiti Tunku Abdul Rahman, Malaysia Dr. Shimon K. Modi, Director of Research BSPA Labs, Purdue University, USA Dr. Jianguo Ding, Norwegian University of Science and Technology (NTNU), Norway
  932. Assoc. Prof. N. Jaisankar, VIT University, Vellore,Tamilnadu, India Dr. Amogh Kavimandan, The Mathworks Inc., USA Dr. Ramasamy Mariappan, Vinayaka Missions University, India Dr. Yong Li, School of Electronic and Information Engineering, Beijing Jiaotong University, P.R. China Assist. Prof. Sugam Sharma, NIET, India / Iowa State University, USA Dr.
  933. Jorge A. Ruiz-Vanoye, Universidad Autónoma del Estado de Morelos, Mexico Dr. Neeraj Kumar, SMVD University, Katra (J&K), India
  934. Dr Genge Bela, "Petru Maior" University of Targu Mures, Romania Dr. Junjie Peng, Shanghai University, P. R. China Dr. Ilhem LENGLIZ, HANA Group -CRISTAL Laboratory, Tunisia Prof. Dr. Durgesh Kumar Mishra, Acropolis Institute of Technology and Research, Indore, MP, India Dr. Jorge L. Hernández-Ardieta, University Carlos III of Madrid, Spain Prof. Dr.C.Suresh Gnana Dhas, Anna University, India Dr Li Fang, Nanyang Technological University, Singapore Prof. Pijush Biswas, RCC Institute of Information Technology, India Dr. Siddhivinayak Kulkarni, University of Ballarat, Ballarat, Victoria, Australia Dr. A. Arul Lawrence, Royal College of Engineering & Technology, India Dr. Wongyos Keardsri, Chulalongkorn University, Bangkok, Thailand Dr. Somesh Kumar Dewangan, CSVTU Bhilai (C.G.)/ Dimat Raipur, India Dr. Hayder N. Jasem, University Putra Malaysia, Malaysia Dr.
  935. A.V.Senthil Kumar, C. M. S. College of Science and Commerce, India Dr. R. S. Karthik, C. M. S. College of Science and Commerce, India Dr. P. Vasant, University Technology Petronas, Malaysia Dr. Wong Kok Seng, Soongsil University, Seoul, South Korea Dr. Praveen Ranjan Srivastava, BITS PILANI, India Dr. Kong Sang Kelvin, Leong, The Hong Kong Polytechnic University, Hong Kong Dr. Mohd Nazri Ismail, Universiti Kuala Lumpur, Malaysia Dr. Rami J. Matarneh, Al-isra Private University, Amman, Jordan Dr Ojesanmi Olusegun Ayodeji, Ajayi Crowther University, Oyo, Nigeria Dr. Riktesh Srivastava, Skyline University, UAE Dr. Oras F. Baker, UCSI University -Kuala Lumpur, Malaysia Dr.
  936. Ahmed S. Ghiduk, Faculty of Science, Beni-Suef University, Egypt and Department of Computer science, Taif University, Saudi Arabia Dr. Tirthankar Gayen, IIT Kharagpur, India Dr. Huei-Ru Tseng, National Chiao Tung University, Taiwan Prof. Ning Xu, Wuhan University of Technology, China Dr Mohammed Salem Binwahlan, Hadhramout University of Science and Technology, Yemen & Universiti Teknologi Malaysia, Malaysia.
  937. Dr. Aruna Ranganath, Bhoj Reddy Engineering College for Women, India Dr. Hafeezullah Amin, Institute of Information Technology, KUST, Kohat, Pakistan (IJCSIS) International Journal of Computer Science and Information Security, Vol. 15 No. 3, March 2017
  938. Prof. Syed S. Rizvi, University of Bridgeport, USA Dr. Shahbaz Pervez Chattha, University of Engineering and Technology Taxila, Pakistan Dr. Shishir Kumar, Jaypee University of Information Technology, Wakanaghat (HP), India Dr. Shahid Mumtaz, Portugal Telecommunication, Instituto de Telecomunicações (IT) , Aveiro, Portugal Dr. Rajesh K Shukla, Corporate Institute of Science & Technology Bhopal M P Dr. Poonam Garg, Institute of Management Technology, India Dr. S. Mehta, Inha University, Korea Dr. Dilip Kumar S.M, Bangalore University, Bangalore Prof. Malik Sikander Hayat Khiyal, Fatima Jinnah Women University, Rawalpindi, Pakistan Dr. Virendra Gomase , Department of Bioinformatics, Padmashree Dr. D.Y. Patil University Dr. Irraivan Elamvazuthi, University Technology PETRONAS, Malaysia Dr. Saqib Saeed, University of Siegen, Germany Dr. Pavan Kumar Gorakavi, IPMA-USA [YC] Dr. Ahmed Nabih Zaki Rashed, Menoufia University, Egypt Prof. Shishir K. Shandilya, Rukmani Devi Institute of Science & Technology, India Dr. J. Komala Lakshmi, SNR Sons College, Computer Science, India Dr. Muhammad Sohail, KUST, Pakistan Dr. Manjaiah D.H, Mangalore University, India Dr. S Santhosh Baboo, D.G.Vaishnav College, Chennai, India Prof. Dr. Mokhtar Beldjehem, Sainte-Anne University, Halifax, NS, Canada Dr. Deepak Laxmi Narasimha, University of Malaya, Malaysia Prof. Dr. Arunkumar Thangavelu, Vellore Institute Of Technology, India Dr. M. Azath, Anna University, India Dr. Md. Rabiul Islam, Rajshahi University of Engineering & Technology (RUET), Bangladesh Dr. Aos Alaa Zaidan Ansaef, Multimedia University, Malaysia Dr Suresh Jain, Devi Ahilya University, Indore (MP) India, Dr.
  939. Mohammed M. Kadhum, Universiti Utara Malaysia Dr. Hanumanthappa. J. University of Mysore, India Dr. Syed Ishtiaque Ahmed, Bangladesh University of Engineering and Technology (BUET)
  940. Dr Akinola Solomon Olalekan, University of Ibadan, Ibadan, Nigeria Dr. Santosh K. Pandey, The Institute of Chartered Accountants of India Dr. P. Vasant, Power Control Optimization, Malaysia Dr. Petr Ivankov, Automatika -S, Russian Federation Dr. Utkarsh Seetha, Data Infosys Limited, India Mrs. Priti Maheshwary, Maulana Azad National Institute of Technology, Bhopal Dr. (Mrs) Padmavathi Ganapathi, Avinashilingam University for Women, Coimbatore Assist. Prof. A. Neela madheswari, Anna university, India Prof. Ganesan Ramachandra Rao, PSG College of Arts and Science, India Mr. Kamanashis Biswas, Daffodil International University, Bangladesh Dr. Atul Gonsai, Saurashtra University, Gujarat, India Mr. Angkoon Phinyomark, Prince of Songkla University, Thailand Mrs. G. Nalini Priya, Anna University, Chennai Dr. P. Subashini, Avinashilingam University for Women, India Assoc. Prof. Vijay Kumar Chakka, Dhirubhai Ambani IICT, Gandhinagar ,Gujarat Mr Jitendra Agrawal, : Rajiv Gandhi Proudyogiki Vishwavidyalaya, Bhopal Mr. Vishal Goyal, Department of Computer Science, Punjabi University, India Dr. R. Baskaran, Department of Computer Science and Engineering, Anna University, Chennai (IJCSIS) International Journal of Computer Science and Information Security, Vol. 15 No. 3, March 2017
  941. Assist. Prof, Kanwalvir Singh Dhindsa, B.B.S.B.Engg.College, Fatehgarh Sahib (Punjab), India Dr. Jamal Ahmad Dargham, School of Engineering and Information Technology, Universiti Malaysia Sabah Mr. Nitin Bhatia, DAV College, India Dr. Dhavachelvan Ponnurangam, Pondicherry Central University, India Dr. Mohd Faizal Abdollah, University of Technical Malaysia, Malaysia Assist. Prof. Sonal Chawla, Panjab University, India Dr. Abdul Wahid, AKG Engg. College, Ghaziabad, India Mr. Arash Habibi Lashkari, University of Malaya (UM), Malaysia Mr. Md. Rajibul Islam, Ibnu Sina Institute, University Technology Malaysia Professor Dr. Sabu M. Thampi, .B.S Institute of Technology for Women, Kerala University, India Mr. Noor Muhammed Nayeem, Université Lumière Lyon 2, 69007 Lyon, France Dr. Himanshu Aggarwal, Department of Computer Engineering, Punjabi University, India
  942. Prof R. Naidoo, Dept of Mathematics/Center for Advanced Computer Modelling, Durban University of Technology, Durban,South Africa Prof. Mydhili K Nair, Visweswaraiah Technological University, Bangalore, India M. Prabu, Adhiyamaan College of Engineering/Anna University, India Mr. Swakkhar Shatabda, United International University, Bangladesh Dr. Abdur Rashid Khan, ICIT, Gomal University, Dera Ismail Khan, Pakistan Mr. H. Abdul Shabeer, I-Nautix Technologies,Chennai, India Dr.
  943. M. Aramudhan, Perunthalaivar Kamarajar Institute of Engineering and Technology, India Dr.
  944. M. P. Thapliyal, Department of Computer Science, HNB Garhwal University (Central University), India Dr. Shahaboddin Shamshirband, Islamic Azad University, Iran Mr. Zeashan Hameed Khan, Université de Grenoble, France Prof. Anil K Ahlawat, Ajay Kumar Garg Engineering College, Ghaziabad, UP Technical University, Lucknow Mr. Longe Olumide Babatope, University Of Ibadan, Nigeria Associate Prof. Raman Maini, University College of Engineering, Punjabi University, India Dr. Maslin Masrom, University Technology Malaysia, Malaysia Sudipta Chattopadhyay, Jadavpur University, Kolkata, India Dr. Dang Tuan NGUYEN, University of Information Technology, Vietnam National University -Ho Chi Minh City Dr. Mary Lourde R., BITS-PILANI Dubai , UAE Dr. Abdul Aziz, University of Central Punjab, Pakistan Mr. Karan Singh, Gautam Budtha University, India Mr. Avinash Pokhriyal, Uttar Pradesh Technical University, Lucknow, India Associate Prof Dr Zuraini Ismail, University Technology Malaysia, Malaysia Assistant Prof. Yasser M. Alginahi, Taibah University, Madinah Munawwarrah, KSA Mr. Dakshina Ranjan Kisku, West Bengal University of Technology, India Mr. Raman Kumar, Dr B R Ambedkar National Institute of Technology, Jalandhar, Punjab, India Associate Prof. Samir B. Patel, Institute of Technology, Nirma University, India Dr. M.Munir Ahamed Rabbani, B. S. Abdur Rahman University, India Asst. Prof. Koushik Majumder, West Bengal University of Technology, India Dr. Alex Pappachen James, Queensland Micro-nanotechnology center, Griffith University, Australia Assistant Prof. S. Hariharan, B.S. Abdur Rahman University, India Asst Prof. Jasmine. K. S, R.V.College of Engineering, India Mr Naushad Ali Mamode Khan, Ministry of Education and Human Resources, Mauritius Prof. Mahesh Goyani, G H Patel Collge of Engg. & Tech, V.V.N, Anand, Gujarat, India Dr. Mana Mohammed, University of Tlemcen, Algeria Prof. Jatinder Singh, Universal Institutiion of Engg. & Tech. CHD, India (IJCSIS) International Journal of Computer Science and Information Security, Vol. 15 No. 3, March 2017
  945. Mrs. M. Anandhavalli Gauthaman, Sikkim Manipal Institute of Technology, Majitar, East Sikkim Dr. Bin Guo, Institute Telecom SudParis, France Mrs. Maleika Mehr Nigar Mohamed Heenaye-Mamode Khan, University of Mauritius Prof. Pijush Biswas, RCC Institute of Information Technology, India Mr. V. Bala Dhandayuthapani, Mekelle University, Ethiopia Dr. Irfan Syamsuddin, State Polytechnic of Ujung Pandang, Indonesia Mr. Kavi Kumar Khedo, University of Mauritius, Mauritius Mr. Ravi Chandiran, Zagro Singapore Pte Ltd. Singapore Mr. Milindkumar V. Sarode, Jawaharlal Darda Institute of Engineering and Technology, India Dr. Shamimul Qamar, KSJ Institute of Engineering & Technology, India Dr. C. Arun, Anna University, India Assist. Prof. M.N.Birje, Basaveshwar Engineering College, India Prof. Hamid Reza Naji, Department of Computer Enigneering, Shahid Beheshti University, Tehran, Iran Assist. Prof. Debasis Giri, Department of Computer Science and Engineering, Haldia Institute of Technology Subhabrata Barman, Haldia Institute of Technology, West Bengal Mr.
  946. M. I. Lali, COMSATS Institute of Information Technology, Islamabad, Pakistan Dr. Feroz Khan, Central Institute of Medicinal and Aromatic Plants, Lucknow, India Mr. R. Nagendran, Institute of Technology, Coimbatore, Tamilnadu, India Mr. Amnach Khawne, King Mongkut's Institute of Technology Ladkrabang, Ladkrabang, Bangkok, Thailand Dr. P. Chakrabarti, Sir Padampat Singhania University, Udaipur, India Mr. Nafiz Imtiaz Bin Hamid, Islamic University of Technology (IUT), Bangladesh.
  947. Shahab-A. Shamshirband, Islamic Azad University, Chalous, Iran Prof. B. Priestly Shan, Anna Univeristy, Tamilnadu, India Venkatramreddy Velma, Dept. of Bioinformatics, University of Mississippi Medical Center, Jackson MS USA Akshi Kumar, Dept. of Computer Engineering, Delhi Technological University, India Dr. Umesh Kumar Singh, Vikram University, Ujjain, India Mr. Serguei A. Mokhov, Concordia University, Canada Mr. Lai Khin Wee, Universiti Teknologi Malaysia, Malaysia Dr. Awadhesh Kumar Sharma, Madan Mohan Malviya Engineering College, India Mr. Syed R. Rizvi, Analytical Services & Materials, Inc., USA Dr. S. Karthik, SNS Collegeof Technology, India Mr. Syed Qasim Bukhari, CIMET (Universidad de Granada), Spain Mr. A.D.Potgantwar, Pune University, India Dr. Himanshu Aggarwal, Punjabi University, India Mr. Rajesh Ramachandran, Naipunya Institute of Management and Information Technology, India Dr. K.L. Shunmuganathan, R.M.K Engg College , Kavaraipettai ,Chennai Dr. Prasant Kumar Pattnaik, KIST, India.
  948. Dr. Ch. Aswani Kumar, VIT University, India Mr. Ijaz Ali Shoukat, King Saud University, Riyadh KSA Mr. Arun Kumar, Sir Padam Pat Singhania University, Udaipur, Rajasthan Mr. Muhammad Imran Khan, Universiti Teknologi PETRONAS, Malaysia Dr. Natarajan Meghanathan, Jackson State University, Jackson, MS, USA Mr. Mohd Zaki Bin Mas'ud, Universiti Teknikal Malaysia Melaka (UTeM), Malaysia
  949. Prof. Dr. R. Geetharamani, Dept. of Computer Science and Eng., Rajalakshmi Engineering College, India Dr. Smita Rajpal, Institute of Technology and Management, Gurgaon, India Dr. S. Abdul Khader Jilani, University of Tabuk, Tabuk, Saudi Arabia Mr. Syed Jamal Haider Zaidi, Bahria University, Pakistan (IJCSIS) International Journal of Computer Science and Information Security, Vol. 15 No. 3, March 2017
  950. Dr.
  951. N. Devarajan, Government College of Technology,Coimbatore, Tamilnadu, INDIA Mr. R. Jagadeesh Kannan, RMK Engineering College, India Mr. Deo Prakash, Shri Mata Vaishno Devi University, India Mr. Mohammad Abu Naser, Dept. of EEE, IUT, Gazipur, Bangladesh Assist. Prof. Prasun Ghosal, Bengal Engineering and Science University, India Mr. Md. Golam Kaosar, School of Engineering and Science, Victoria University, Melbourne City, Australia Mr. R. Mahammad Shafi, Madanapalle Institute of Technology & Science, India Dr. F.Sagayaraj Francis, Pondicherry Engineering College,India Dr. Ajay Goel, HIET , Kaithal, India Mr. Nayak Sunil Kashibarao, Bahirji Smarak Mahavidyalaya, India Mr. Suhas J Manangi, Microsoft India Dr.
  952. Kalyankar N. V., Yeshwant Mahavidyalaya, Nanded , India Dr. K.D. Verma, S.V. College of Post graduate studies & Research, India Dr. Amjad Rehman, University Technology Malaysia, Malaysia Mr. Rachit Garg, L K College, Jalandhar, Punjab Mr. J. William, M.A.M college of Engineering, Trichy, Tamilnadu,India Prof. Jue-Sam Chou, Nanhua University, College of Science and Technology, Taiwan Dr. Thorat S.B., Institute of Technology and Management, India Mr. Ajay Prasad, Sir Padampat Singhania University, Udaipur, India Dr. Kamaljit I. Lakhtaria, Atmiya Institute of Technology & Science, India Mr. Syed Rafiul Hussain, Ahsanullah University of Science and Technology, Bangladesh Mrs Fazeela Tunnisa, Najran University, Kingdom of Saudi Arabia Mrs Kavita Taneja, Maharishi Markandeshwar University, Haryana, India Mr. Maniyar Shiraz Ahmed, Najran University, Najran, KSA Mr. Anand Kumar, AMC Engineering College, Bangalore Dr. Rakesh Chandra Gangwar, Beant College of Engg. & Tech., Gurdaspur (Punjab) India Dr.
  953. V V Rama Prasad, Sree Vidyanikethan Engineering College, India Assist. Prof. Neetesh Kumar Gupta, Technocrats Institute of Technology, Bhopal (M.P.), India Mr.
  954. Ashish Seth, Uttar Pradesh Technical University, Lucknow ,UP India Dr.
  955. V V S S S Balaram, Sreenidhi Institute of Science and Technology, India Mr Rahul Bhatia, Lingaya's Institute of Management and Technology, India Prof. Niranjan Reddy. P, KITS , Warangal, India Prof. Rakesh. Lingappa, Vijetha Institute of Technology, Bangalore, India Dr. Mohammed Ali Hussain, Nimra College of Engineering & Technology, Vijayawada, A.P., India Dr.
  956. A.Srinivasan, MNM Jain Engineering College, Rajiv Gandhi Salai, Thorapakkam, Chennai Mr. Rakesh Kumar, M.M. University, Mullana, Ambala, India Dr. Lena Khaled, Zarqa Private University, Aman, Jordon Ms. Supriya Kapoor, Patni/Lingaya's Institute of Management and Tech., India Dr. Tossapon Boongoen , Aberystwyth University, UK Dr . Bilal Alatas, Firat University, Turkey Assist. Prof. Jyoti Praaksh Singh , Academy of Technology, India Dr. Ritu Soni, GNG College, India Dr . Mahendra Kumar , Sagar Institute of Research & Technology, Bhopal, India.
  957. Dr. Binod Kumar, Lakshmi Narayan College of Tech.(LNCT)Bhopal India Dr. Muzhir Shaban Al-Ani, Amman Arab University Amman -Jordan Dr. T.C. Manjunath , ATRIA Institute of Tech, India Mr. Muhammad Zakarya, COMSATS Institute of Information Technology (CIIT), Pakistan (IJCSIS) International Journal of Computer Science and Information Security, Vol. 15 No. 3, March 2017
  958. M Yasin, National University of Science and Tech, karachi (NUST), Pakistan Mr. Yaser Miaji, University Utara Malaysia, Malaysia Mr. Shah Ahsanul Haque, International Islamic University Chittagong (IIUC), Bangladesh Prof. (Dr) Syed Abdul Sattar, Royal Institute of Technology & Science, India Dr. S. Sasikumar, Roever Engineering College Assist. Prof. Monit Kapoor, Maharishi Markandeshwar University, India Mr. Nwaocha Vivian O, National Open University of Nigeria Dr.
  959. M. S. Vijaya, GR Govindarajulu School of Applied Computer Technology, India Assist. Prof. Chakresh Kumar, Manav Rachna International University, India Mr. Kunal Chadha , R&D Software Engineer, Gemalto, Singapore Mr. Mueen Uddin, Universiti Teknologi Malaysia, UTM , Malaysia Dr. Dhuha Basheer abdullah, Mosul university, Iraq Mr. S. Audithan, Annamalai University, India Prof. Vijay K Chaudhari, Technocrats Institute of Technology , India Associate Prof. Mohd Ilyas Khan, Technocrats Institute of Technology , India Dr. Vu Thanh Nguyen, University of Information Technology, HoChiMinh City, VietNam Assist. Prof. Anand Sharma, MITS, Lakshmangarh, Sikar, Rajasthan, India Prof.
  960. T V Narayana Rao, HITAM Engineering college, Hyderabad Mr. Deepak Gour, Sir Padampat Singhania University, India Assist. Prof. Amutharaj Joyson, Kalasalingam University, India Mr. Ali Balador, Islamic Azad University, Iran Mr. Mohit Jain, Maharaja Surajmal Institute of Technology, India Mr. Dilip Kumar Sharma, GLA Institute of Technology & Management, India Dr. Debojyoti Mitra, Sir padampat Singhania University, India Dr. Ali Dehghantanha, Asia-Pacific University College of Technology and Innovation, Malaysia Mr. Zhao Zhang, City University of Hong Kong, China Prof.
  961. S.P. Setty, A.U. College of Engineering, India Prof. Patel Rakeshkumar Kantilal, Sankalchand Patel College of Engineering, India Mr. Biswajit Bhowmik, Bengal College of Engineering & Technology, India Mr. Manoj Gupta, Apex Institute of Engineering & Technology, India Assist. Prof. Ajay Sharma, Raj Kumar Goel Institute Of Technology, India Assist. Prof. Ramveer Singh, Raj Kumar Goel Institute of Technology, India Dr. Hanan Elazhary, Electronics Research Institute, Egypt Dr. Hosam I. Faiq, USM, Malaysia Prof. Dipti D. Patil, MAEER's MIT College of Engg. & Tech, Pune, India Assist. Prof. Devendra Chack, BCT Kumaon engineering College Dwarahat Almora, India Prof. Manpreet Singh, M. M. Engg. College, M. M. University, India Assist. Prof. M. Sadiq ali Khan, University of Karachi, Pakistan Mr. Prasad S. Halgaonkar, MIT -College of Engineering, Pune, India Dr. Imran Ghani, Universiti Teknologi Malaysia, Malaysia Prof. Varun Kumar Kakar, Kumaon Engineering College, Dwarahat, India (IJCSIS) International Journal of Computer Science and Information Security, Vol. 15 No. 3, March 2017
  962. Assist. Prof. Nisheeth Joshi, Apaji Institute, Banasthali University, Rajasthan, India Associate Prof. Kunwar S. Vaisla, VCT Kumaon Engineering College, India Prof Anupam Choudhary, Bhilai School Of Engg.,Bhilai (C.G.),India Mr. Divya Prakash Shrivastava, Al Jabal Al garbi University, Zawya, Libya Associate Prof. Dr. V. Radha, Avinashilingam Deemed university for women, Coimbatore. Dr. Kasarapu Ramani, JNT University, Anantapur, India Dr. Anuraag Awasthi, Jayoti Vidyapeeth Womens University, India Dr.
  963. C G Ravichandran, R V S College of Engineering and Technology, India Dr.
  964. Mohamed A. Deriche, King Fahd University of Petroleum and Minerals, Saudi Arabia Mr. Abbas Karimi, Universiti Putra Malaysia, Malaysia Mr. Amit Kumar, Jaypee University of Engg. and Tech., India Dr. Nikolai Stoianov, Defense Institute, Bulgaria Assist. Prof. S. Ranichandra, KSR College of Arts and Science, Tiruchencode Mr.
  965. T.K.P. Rajagopal, Diamond Horse International Pvt Ltd, India Dr. Md. Ekramul Hamid, Rajshahi University, Bangladesh Mr. Hemanta Kumar Kalita , TATA Consultancy Services (TCS), India Dr. Messaouda Azzouzi, Ziane Achour University of Djelfa, Algeria Prof. (Dr.) Juan Jose Martinez Castillo, "Gran Mariscal de Ayacucho" University and Acantelys research Group, Venezuela Dr. Jatinderkumar R. Saini, Narmada College of Computer Application, India Dr. Babak Bashari Rad, University Technology of Malaysia, Malaysia Dr. Nighat Mir, Effat University, Saudi Arabia Prof. (Dr.) G.M.Nasira, Sasurie College of Engineering, India Mr. Varun Mittal, Gemalto Pte Ltd, Singapore Assist. Prof. Mrs P. Banumathi, Kathir College Of Engineering, Coimbatore Assist. Prof. Quan Yuan, University of Wisconsin-Stevens Point, US Dr. Pranam Paul, Narula Institute of Technology, Agarpara, West Bengal, India Assist. Prof. J. Ramkumar, V.L.B Janakiammal college of Arts & Science, India Mr. P. Sivakumar, Anna university, Chennai, India Mr. Md. Humayun Kabir Biswas, King Khalid University, Kingdom of Saudi Arabia Mr. Mayank Singh, J.P. Institute of Engg & Technology, Meerut, India HJ. Kamaruzaman Jusoff, Universiti Putra Malaysia Mr. Nikhil Patrick Lobo, CADES, India Dr. Amit Wason, Rayat-Bahra Institute of Engineering & Boi-Technology, India Dr. Rajesh Shrivastava, Govt. Benazir Science & Commerce College, Bhopal, India Assist. Prof. Vishal Bharti, DCE, Gurgaon Mrs. Sunita Bansal, Birla Institute of Technology & Science, India Dr. R. Sudhakar, Dr.Mahalingam college of Engineering and Technology, India Dr. Amit Kumar Garg, Shri Mata Vaishno Devi University, Katra(J&K), India
  966. Assist. Prof. Raj Gaurang Tiwari, AZAD Institute of Engineering and Technology, India Mr. Hamed Taherdoost, Tehran, Iran Mr. Amin Daneshmand Malayeri, YRC, IAU, Malayer Branch, Iran Mr. Shantanu Pal, University of Calcutta, India Dr. Terry H. Walcott, E-Promag Consultancy Group, United Kingdom Dr. Ezekiel U OKIKE, University of Ibadan, Nigeria Mr. P. Mahalingam, Caledonian College of Engineering, Oman Dr. Mahmoud M. A. Abd Ellatif, Mansoura University, Egypt (IJCSIS) International Journal of Computer Science and Information Security, Vol. 15 No. 3, March 2017
  967. Prof. Kunwar S. Vaisla, BCT Kumaon Engineering College, India Prof.
  968. Mahesh H. Panchal, Kalol Institute of Technology & Research Centre, India Mr. Muhammad Asad, Technical University of Munich, Germany Mr. AliReza Shams Shafigh, Azad Islamic university, Iran Prof. S. V. Nagaraj, RMK Engineering College, India Mr.
  969. Ashikali M Hasan, Senior Researcher, CelNet security, India Dr. Adnan Shahid Khan, University Technology Malaysia, Malaysia Mr. Prakash Gajanan Burade, Nagpur University/ITM college of engg, Nagpur, India Dr. Jagdish B.Helonde, Nagpur University/ITM college of engg, Nagpur, India Professor, Doctor BOUHORMA Mohammed, Univertsity Abdelmalek Essaadi, Morocco Mr. K. Thirumalaivasan, Pondicherry Engg. College, India Mr. Umbarkar Anantkumar Janardan, Walchand College of Engineering, India Mr.
  970. Ashish Chaurasia, Gyan Ganga Institute of Technology & Sciences, India Mr. Sunil Taneja, Kurukshetra University, India Mr. Fauzi Adi Rafrastara, Dian Nuswantoro University, Indonesia Dr. Yaduvir Singh, Thapar University, India Dr. Ioannis V. Koskosas, University of Western Macedonia, Greece Dr. Vasantha Kalyani David, Avinashilingam University for women, Coimbatore Dr. Ahmed Mansour Manasrah, Universiti Sains Malaysia, Malaysia Miss. Nazanin Sadat Kazazi, University Technology Malaysia, Malaysia Mr. Saeed Rasouli Heikalabad, Islamic Azad University -Tabriz Branch, Iran Assoc. Prof. Dhirendra Mishra, SVKM's NMIMS University, India Prof. Shapoor Zarei, UAE Inventors Association, UAE Prof. B.Raja Sarath Kumar, Lenora College of Engineering, India Dr. Bashir Alam, Jamia millia Islamia, Delhi, India Prof. Anant J Umbarkar, Walchand College of Engg., India Assist. Prof. B. Bharathi, Sathyabama University, India Dr. Fokrul Alom Mazarbhuiya, King Khalid University, Saudi Arabia Prof.
  971. T.S.Jeyali Laseeth, Anna University of Technology, Tirunelveli, India Dr.
  972. M. Balraju, Jawahar Lal Nehru Technological University Hyderabad, India Dr. Vijayalakshmi M. N., R.V.College of Engineering, Bangalore Prof. Walid Moudani, Lebanese University, Lebanon Dr. Saurabh Pal, VBS Purvanchal University, Jaunpur, India Associate Prof. Suneet Chaudhary, Dehradun Institute of Technology, India Associate Prof. Dr. Manuj Darbari, BBD University, India Ms. Prema Selvaraj, K.S.R College of Arts and Science, India Assist. Prof. Ms.S.Sasikala, KSR College of Arts & Science, India Mr. Sukhvinder Singh Deora, NC Institute of Computer Sciences, India Dr. Abhay Bansal, Amity School of Engineering & Technology, India Ms. Sumita Mishra, Amity School of Engineering and Technology, India Professor S. Viswanadha Raju, JNT University Hyderabad, India Mr. Asghar Shahrzad Khashandarag, Islamic Azad University Tabriz Branch, India Mr. Manoj Sharma, Panipat Institute of Engg. & Technology, India Mr. Shakeel Ahmed, King Faisal University, Saudi Arabia Dr. Mohamed Ali Mahjoub, Institute of Engineer of Monastir, Tunisia Mr. Adri Jovin J.J., SriGuru Institute of Technology, India Dr. Sukumar Senthilkumar, Universiti Sains Malaysia, Malaysia (IJCSIS) International Journal of Computer Science and Information Security, Vol. 15 No. 3, March 2017
  973. Mr. Rakesh Bharati, Dehradun Institute of Technology Dehradun, India Mr. Shervan Fekri Ershad, Shiraz International University, Iran Mr. Md. Safiqul Islam, Daffodil International University, Bangladesh Mr. Mahmudul Hasan, Daffodil International University, Bangladesh Prof. Mandakini Tayade, UIT, RGTU, Bhopal, India Ms. Sarla More, UIT, RGTU, Bhopal, India Mr. Tushar Hrishikesh Jaware, R.C. Patel Institute of Technology, Shirpur, India Ms.
  974. C. Divya, Dr G R Damodaran College of Science, Coimbatore, India Mr. Fahimuddin Shaik, Annamacharya Institute of Technology & Sciences, India Dr. M. N. Giri Prasad, JNTUCE,Pulivendula, A.P., India Assist. Prof. Chintan M Bhatt, Charotar University of Science And Technology, India Prof. Sahista Machchhar, Marwadi Education Foundation's Group of institutions, India Assist. Prof. Navnish Goel, S. D. College Of Enginnering & Technology, India Mr. Khaja Kamaluddin, Sirt University, Sirt, Libya Mr. Mohammad Zaidul Karim, Daffodil International, Bangladesh Mr.
  975. M. Vijayakumar, KSR College of Engineering, Tiruchengode, India Mr. S. A. Ahsan Rajon, Khulna University, Bangladesh Dr. Muhammad Mohsin Nazir, LCW University Lahore, Pakistan Mr. Mohammad Asadul Hoque, University of Alabama, USA Mr. P.V.Sarathchand, Indur Institute of Engineering and Technology, India Mr. Durgesh Samadhiya, Chung Hua University, Taiwan Dr Venu Kuthadi, University of Johannesburg, Johannesburg, RSA Dr. (Er) Jasvir Singh, Guru Nanak Dev University, Amritsar, Punjab, India Mr. Jasmin Cosic, Min. of the Interior of Una-sana canton, B&H, Bosnia and Herzegovina Dr S. Rajalakshmi, Botho College, South Africa Dr. Mohamed Sarrab, De Montfort University, UK Mr. Basappa B. Kodada, Canara Engineering College, India Assist. Prof. K. Ramana, Annamacharya Institute of Technology and Sciences, India Dr.
  976. Ashu Gupta, Apeejay Institute of Management, Jalandhar, India Assist. Prof. Shaik Rasool, Shadan College of Engineering & Technology, India Assist. Prof. K. Suresh, Annamacharya Institute of Tech & Sci. Rajampet, AP, India Dr . G. Singaravel, K.S.R. College of Engineering, India Dr B. G. Geetha, K.S.R. College of Engineering, India Assist. Prof. Kavita Choudhary, ITM University, Gurgaon Dr. Mehrdad Jalali, Azad University, Mashhad, Iran Megha Goel, Shamli Institute of Engineering and Technology, Shamli, India Mr. Chi-Hua Chen, Institute of Information Management, National Chiao-Tung University, Taiwan (R.O.C.)
  977. Assoc. Prof. A. Rajendran, RVS College of Engineering and Technology, India Assist. Prof. S. Jaganathan, RVS College of Engineering and Technology, India
  978. Assoc. Prof. (Dr.) A S N Chakravarthy, JNTUK University College of Engineering Vizianagaram (State University)
  979. Assist. Prof. Deepshikha Patel, Technocrat Institute of Technology, India Assist. Prof. Maram Balajee, GMRIT, India Assist. Prof. Monika Bhatnagar, TIT, India Prof. Gaurang Panchal, Charotar University of Science & Technology, India Prof. Anand K. Tripathi, Computer Society of India Prof. Jyoti Chaudhary, High Performance Computing Research Lab, India Assist. Prof. Supriya Raheja, ITM University, India (IJCSIS) International Journal of Computer Science and Information Security, Vol. 15 No. 3, March 2017
  980. Dr. Pankaj Gupta, Microsoft Corporation, U.S.A. Assist. Prof. Panchamukesh Chandaka, Hyderabad Institute of Tech. & Management, India Prof. Mohan H.S, SJB Institute Of Technology, India Mr. Hossein Malekinezhad, Islamic Azad University, Iran Mr. Zatin Gupta, Universti Malaysia, Malaysia Assist. Prof. Amit Chauhan, Phonics Group of Institutions, India Assist. Prof. Ajal A. J., METS School Of Engineering, India Mrs. Omowunmi Omobola Adeyemo, University of Ibadan, Nigeria Dr. Bharat Bhushan Agarwal, I.F.T.M. University, India Md. Nazrul Islam, University of Western Ontario, Canada Tushar Kanti, L.N.C.T, Bhopal, India Er. Aumreesh Kumar Saxena, SIRTs College Bhopal, India Mr. Mohammad Monirul Islam, Daffodil International University, Bangladesh Dr. Kashif Nisar, University Utara Malaysia, Malaysia Dr. Wei Zheng, Rutgers Univ/ A10 Networks, USA Associate Prof. Rituraj Jain, Vyas Institute of Engg & Tech, Jodhpur -Rajasthan Assist. Prof. Apoorvi Sood, I.T.M. University, India Dr. Kayhan Zrar Ghafoor, University Technology Malaysia, Malaysia Mr. Swapnil Soner, Truba Institute College of Engineering & Technology, Indore, India Ms. Yogita Gigras, I.T.M. University, India Associate Prof. Neelima Sadineni, Pydha Engineering College, India Pydha Engineering College Assist. Prof. K. Deepika Rani, HITAM, Hyderabad Ms. Shikha Maheshwari, Jaipur Engineering College & Research Centre, India Prof. Dr V S Giridhar Akula, Avanthi's Scientific Tech. & Research Academy, Hyderabad Prof. Dr.S.Saravanan, Muthayammal Engineering College, India Mr. Mehdi Golsorkhatabar Amiri, Islamic Azad University, Iran Prof. Amit Sadanand Savyanavar, MITCOE, Pune, India Assist. Prof. P.Oliver Jayaprakash, Anna University,Chennai Assist. Prof. Ms. Sujata, ITM University, Gurgaon, India Dr.
  981. Asoke Nath, St. Xavier's College, India Mr. Masoud Rafighi, Islamic Azad University, Iran Assist. Prof. RamBabu Pemula, NIMRA College of Engineering & Technology, India Assist. Prof. Ms Rita Chhikara, ITM University, Gurgaon, India Mr. Sandeep Maan, Government Post Graduate College, India Prof. Dr. S. Muralidharan, Mepco Schlenk Engineering College, India Associate Prof. T.V.Sai Krishna, QIS College of Engineering and Technology, India Mr. R. Balu, Bharathiar University, Coimbatore, India Assist. Prof. Shekhar. R, Dr.SM College of Engineering, India Prof. P. Senthilkumar, Vivekanandha Institue of Engineering and Techology for Woman, India Mr.
  982. M. Kamarajan, PSNA College of Engineering & Technology, India Dr. Angajala Srinivasa Rao, Jawaharlal Nehru Technical University, India Assist. Prof. C. Venkatesh, A.I.T.S, Rajampet, India Mr. Afshin Rezakhani Roozbahani, Ayatollah Boroujerdi University, Iran Mr. Laxmi chand, SCTL, Noida, India Dr. Dr. Abdul Hannan, Vivekanand College, Aurangabad Prof. Mahesh Panchal, KITRC, Gujarat Dr. A. Subramani, K.S.R. College of Engineering, Tiruchengode (IJCSIS) International Journal of Computer Science and Information Security, Vol. 15 No. 3, March 2017
  983. Assist. Prof. Prakash M, Rajalakshmi Engineering College, Chennai, India Assist. Prof. Akhilesh K Sharma, Sir Padampat Singhania University, India Ms. Varsha Sahni, Guru Nanak Dev Engineering College, Ludhiana, India Associate Prof. Trilochan Rout, NM Institute of Engineering and Technlogy, India Mr. Srikanta Kumar Mohapatra, NMIET, Orissa, India Mr. Waqas Haider Bangyal, Iqra University Islamabad, Pakistan Dr. S. Vijayaragavan, Christ College of Engineering and Technology, Pondicherry, India Prof. Elboukhari Mohamed, University Mohammed First, Oujda, Morocco Dr. Muhammad Asif Khan, King Faisal University, Saudi Arabia Dr. Nagy Ramadan Darwish Omran, Cairo University, Egypt.
  984. Assistant Prof. Anand Nayyar, KCL Institute of Management and Technology, India Mr. G. Premsankar, Ericcson, India Assist. Prof. T. Hemalatha, VELS University, India Prof. Tejaswini Apte, University of Pune, India Dr. Edmund Ng Giap Weng, Universiti Malaysia Sarawak, Malaysia Mr. Mahdi Nouri, Iran University of Science and Technology, Iran Associate Prof. S. Asif Hussain, Annamacharya Institute of technology & Sciences, India Mrs. Kavita Pabreja, Maharaja Surajmal Institute (an affiliate of GGSIP University), India Mr. Vorugunti Chandra Sekhar, DA-IICT, India Mr. Muhammad Najmi Ahmad Zabidi, Universiti Teknologi Malaysia, Malaysia Dr. Aderemi A. Atayero, Covenant University, Nigeria Assist. Prof. Osama Sohaib, Balochistan University of Information Technology, Pakistan Assist. Prof. K. Suresh, Annamacharya Institute of Technology and Sciences, India Mr. Hassen Mohammed Abduallah Alsafi, International Islamic University Malaysia (IIUM) Malaysia Mr. Robail Yasrab, Virtual University of Pakistan, Pakistan Mr. R. Balu, Bharathiar University, Coimbatore, India Prof. Anand Nayyar, KCL Institute of Management and Technology, Jalandhar Assoc. Prof. Vivek S Deshpande, MIT College of Engineering, India Prof. K. Saravanan, Anna university Coimbatore, India Dr. Ravendra Singh, MJP Rohilkhand University, Bareilly, India Mr.
  985. V. Mathivanan, IBRA College of Technology, Sultanate of OMAN Assoc. Prof. S. Asif Hussain, AITS, India Assist. Prof. C. Venkatesh, AITS, India Mr. Sami Ulhaq, SZABIST Islamabad, Pakistan Dr. B. Justus Rabi, Institute of Science & Technology, India Mr. Anuj Kumar Yadav, Dehradun Institute of technology, India Mr. Alejandro Mosquera, University of Alicante, Spain Assist. Prof. Arjun Singh, Sir Padampat Singhania University (SPSU), Udaipur, India Dr. Smriti Agrawal, JB Institute of Engineering and Technology, Hyderabad Assist. Prof. Swathi Sambangi, Visakha Institute of Engineering and Technology, India Ms. Prabhjot Kaur, Guru Gobind Singh Indraprastha University, India Mrs. Samaher AL-Hothali, Yanbu University College, Saudi Arabia Prof. Rajneeshkaur Bedi, MIT College of Engineering, Pune, India Mr. Hassen Mohammed Abduallah Alsafi, International Islamic University Malaysia (IIUM) Dr.
  986. Wei Zhang, Amazon.com, Seattle, WA, USA Mr. B. Santhosh Kumar, C S I College of Engineering, Tamil Nadu Dr. K. Reji Kumar, , N S S College, Pandalam, India (IJCSIS) International Journal of Computer Science and Information Security, Vol. 15 No. 3, March 2017
  987. Assoc. Prof. K. Seshadri Sastry, EIILM University, India Mr. Kai Pan, UNC Charlotte, USA Mr. Ruikar Sachin, SGGSIET, India Prof. (Dr.) Vinodani Katiyar, Sri Ramswaroop Memorial University, India Assoc. Prof., M. Giri, Sreenivasa Institute of Technology and Management Studies, India Assoc. Prof. Labib Francis Gergis, Misr Academy for Engineering and Technology (MET), Egypt
  988. Assist. Prof. Amanpreet Kaur, ITM University, India Assist. Prof. Anand Singh Rajawat, Shri Vaishnav Institute of Technology & Science, Indore Mrs. Hadeel Saleh Haj Aliwi, Universiti Sains Malaysia (USM), Malaysia Dr. Abhay Bansal, Amity University, India Dr. Mohammad A. Mezher, Fahad Bin Sultan University, KSA Assist. Prof. Nidhi Arora, M.C.A. Institute, India Prof. Dr. P. Suresh, Karpagam College of Engineering, Coimbatore, India Dr. Kannan Balasubramanian, Mepco Schlenk Engineering College, India Dr. S. Sankara Gomathi, Panimalar Engineering college, India Prof. Anil kumar Suthar, Gujarat Technological University, L.C. Institute of Technology, India Assist. Prof. R. Hubert Rajan, NOORUL ISLAM UNIVERSITY, India Assist. Prof. Dr. Jyoti Mahajan, College of Engineering & Technology Assist. Prof. Homam Reda El-Taj, College of Network Engineering, Saudi Arabia & Malaysia Mr. Bijan Paul, Shahjalal University of Science & Technology, Bangladesh Assoc. Prof. Dr. Ch V Phani Krishna, KL University, India Dr. Vishal Bhatnagar, Ambedkar Institute of Advanced Communication Technologies & Research, India Dr. Lamri LAOUAMER, Al Qassim University, Dept. Info. Systems & European University of Brittany, Dept. Computer Science, UBO, Brest, France Prof. Ashish Babanrao Sasankar, G.H.Raisoni Institute Of Information Technology, India Prof. Pawan Kumar Goel, Shamli Institute of Engineering and Technology, India Mr. Ram Kumar Singh, S.V Subharti University, India Assistant Prof. Sunish Kumar O S, Amaljyothi College of Engineering, India Dr Sanjay Bhargava, Banasthali University, India Mr. Pankaj S. Kulkarni, AVEW's Shatabdi Institute of Technology, India Mr. Roohollah Etemadi, Islamic Azad University, Iran Mr. Oloruntoyin Sefiu Taiwo, Emmanuel Alayande College Of Education, Nigeria Mr. Sumit Goyal, National Dairy Research Institute, India Mr Jaswinder Singh Dilawari, Geeta Engineering College, India Prof. Raghuraj Singh, Harcourt Butler Technological Institute, Kanpur Dr. S.K. Mahendran, Anna University, Chennai, India Dr. Amit Wason, Hindustan Institute of Technology & Management, Punjab Dr. Ashu Gupta, Apeejay Institute of Management, India Assist. Prof. D. Asir Antony Gnana Singh, M.I.E.T Engineering College, India Mrs Mina Farmanbar, Eastern Mediterranean University, Famagusta, North Cyprus Mr. Maram Balajee, GMR Institute of Technology, India Mr. Moiz S. Ansari, Isra University, Hyderabad, Pakistan Mr. Adebayo, Olawale Surajudeen, Federal University of Technology Minna, Nigeria Mr. Jasvir Singh, University College Of Engg., India Mr. Vivek Tiwari, MANIT, Bhopal, India Assoc. Prof. R. Navaneethakrishnan, Bharathiyar College of Engineering and Technology, India Mr. Somdip Dey, St. Xavier's College, Kolkata, India (IJCSIS) International Journal of Computer Science and Information Security, Vol. 15 No. 3, March 2017
  989. Mr. Souleymane Balla-Arabé, Xi'an University of Electronic Science and Technology, China Mr. Mahabub Alam, Rajshahi University of Engineering and Technology, Bangladesh Mr.
  990. Sathyapraksh P., S.K.P Engineering College, India Dr.
  991. N. Karthikeyan, SNS College of Engineering, Anna University, India Dr. Binod Kumar, JSPM's, Jayawant Technical Campus, Pune, India Assoc. Prof. Dinesh Goyal, Suresh Gyan Vihar University, India Mr. Md. Abdul Ahad, K L University, India Mr. Vikas Bajpai, The LNM IIT, India Dr. Manish Kumar Anand, Salesforce (R & D Analytics), San Francisco, USA Assist. Prof. Dheeraj Murari, Kumaon Engineering College, India Assoc. Prof. Dr. A. Muthukumaravel, VELS University, Chennai Mr. A. Siles Balasingh, St.Joseph University in Tanzania, Tanzania Mr. Ravindra Daga Badgujar, R C Patel Institute of Technology, India Dr. Preeti Khanna, SVKM's NMIMS, School of Business Management, India Mr. Kumar Dayanand, Cambridge Institute of Technology, India Dr. Syed Asif Ali, SMI University Karachi, Pakistan Prof. Pallvi Pandit, Himachal Pradeh University, India Mr. Ricardo Verschueren, University of Gloucestershire, UK
  992. Assist. Prof. Mamta Juneja, University Institute of Engineering and Technology, Panjab University, India Assoc. Prof. P. Surendra Varma, NRI Institute of Technology, JNTU Kakinada, India Assist. Prof. Gaurav Shrivastava, RGPV / SVITS Indore, India Dr. S. Sumathi, Anna University, India Assist. Prof. Ankita M. Kapadia, Charotar University of Science and Technology, India Mr. Deepak Kumar, Indian Institute of Technology (BHU), India Dr. Dr. Rajan Gupta, GGSIP University, New Delhi, India Assist. Prof M. Anand Kumar, Karpagam University, Coimbatore, India Mr. Mr Arshad Mansoor, Pakistan Aeronautical Complex Mr. Kapil Kumar Gupta, Ansal Institute of Technology and Management, India Dr. Neeraj Tomer, SINE International Institute of Technology, Jaipur, India Assist. Prof. Trunal J. Patel, C.G.Patel Institute of Technology, Uka Tarsadia University, Bardoli, Surat Mr. Sivakumar, Codework solutions, India Mr. Mohammad Sadegh Mirzaei, PGNR Company, Iran Dr. Gerard G. Dumancas, Oklahoma Medical Research Foundation, USA Mr. Varadala Sridhar, Varadhaman College Engineering College, Affiliated To JNTU, Hyderabad Assist. Prof. Manoj Dhawan, SVITS, Indore Assoc. Prof. Chitreshh Banerjee, Suresh Gyan Vihar University, Jaipur, India Dr. S. Santhi, SCSVMV University, India Mr. Davood Mohammadi Souran, Ministry of Energy of Iran, Iran Mr. Shamim Ahmed, Bangladesh University of Business and Technology, Bangladesh Mr. Sandeep Reddivari, Mississippi State University, USA Assoc. Prof. Ousmane Thiare, Gaston Berger University, Senegal Dr. Hazra Imran, Athabasca University, Canada Dr. Setu Kumar Chaturvedi, Technocrats Institute of Technology, Bhopal, India Mr. Mohd Dilshad Ansari, Jaypee University of Information Technology, India Ms. Jaspreet Kaur, Distance Education LPU, India Dr. D. Nagarajan, Salalah College of Technology, Sultanate of Oman Dr. K.V.N.R.Sai Krishna, S.V.R.M. College, India (IJCSIS) International Journal of Computer Science and Information Security, Vol. 15 No. 3, March 2017
  993. Mr. Himanshu Pareek, Center for Development of Advanced Computing (CDAC), India Mr. Khaldi Amine, Badji Mokhtar University, Algeria Mr. Mohammad Sadegh Mirzaei, Scientific Applied University, Iran Assist. Prof. Khyati Chaudhary, Ram-eesh Institute of Engg. & Technology, India Mr. Sanjay Agal, Pacific College of Engineering Udaipur, India Mr. Abdul Mateen Ansari, King Khalid University, Saudi Arabia Dr.
  994. H.S. Behera, Veer Surendra Sai University of Technology (VSSUT), India Dr. Shrikant Tiwari, Shri Shankaracharya Group of Institutions (SSGI), India Prof. Ganesh B. Regulwar, Shri Shankarprasad Agnihotri College of Engg, India Prof. Pinnamaneni Bhanu Prasad, Matrix vision GmbH, Germany Dr. Shrikant Tiwari, Shri Shankaracharya Technical Campus (SSTC), India Dr. Siddesh G.K., : Dayananada Sagar College of Engineering, Bangalore, India Dr. Nadir Bouchama, CERIST Research Center, Algeria Dr. R. Sathishkumar, Sri Venkateswara College of Engineering, India Assistant Prof (Dr.) Mohamed Moussaoui, Abdelmalek Essaadi University, Morocco Dr. S. Malathi, Panimalar Engineering College, Chennai, India Dr.
  995. V. Subedha, Panimalar Institute of Technology, Chennai, India Dr. Prashant Panse, Swami Vivekanand College of Engineering, Indore, India Dr. Hamza Aldabbas, Al-Balqa'a Applied University, Jordan Dr. G. Rasitha Banu, Vel's University, Chennai Dr.
  996. V. D. Ambeth Kumar, Panimalar Engineering College, Chennai Prof. Anuranjan Misra, Bhagwant Institute of Technology, Ghaziabad, India Ms. U. Sinthuja, PSG college of arts &science, India Dr. Ehsan Saradar Torshizi, Urmia University, Iran Dr. Shamneesh Sharma, APG Shimla University, Shimla (H.P.), India
  997. Assistant Prof. A. S. Syed Navaz, Muthayammal College of Arts & Science, India Assistant Prof. Ranjit Panigrahi, Sikkim Manipal Institute of Technology, Majitar, Sikkim Dr. Khaled Eskaf, Arab Academy for Science ,Technology & Maritime Transportation, Egypt Dr. Nishant Gupta, University of Jammu, India Assistant Prof. Nagarajan Sankaran, Annamalai University, Chidambaram, Tamilnadu, India Assistant Prof.Tribikram Pradhan, Manipal Institute of Technology, India Dr. Nasser Lotfi, Eastern Mediterranean University, Northern Cyprus Dr. R. Manavalan, K S Rangasamy college of Arts and Science, Tamilnadu, India Assistant Prof. P. Krishna Sankar, K S Rangasamy college of Arts and Science, Tamilnadu, India Dr. Rahul Malik, Cisco Systems, USA Dr. S. C. Lingareddy, ALPHA College of Engineering, India Assistant Prof. Mohammed Shuaib, Interal University, Lucknow, India Dr. Sachin Yele, Sanghvi Institute of Management & Science, India Dr. T. Thambidurai, Sun Univercell, Singapore Prof. Anandkumar Telang, BKIT, India Assistant Prof. R. Poorvadevi, SCSVMV University, India Dr Uttam Mande, Gitam University, India Dr. Poornima Girish Naik, Shahu Institute of Business Education and Research (SIBER), India Prof. Md. Abu Kausar, Jaipur National University, Jaipur, India Dr. Mohammed Zuber, AISECT University, India Prof. Kalum Priyanath Udagepola, King Abdulaziz University, Saudi Arabia Dr. K. R. Ananth, Velalar College of Engineering and Technology, India (IJCSIS) International Journal of Computer Science and Information Security, Vol. 15 No. 3, March 2017
  998. Assistant Prof. Panem Charan Arur, Priyadarshini Institute of Technology, India Dr. Ashwak Mahmood muhsen alabaichi, Karbala University / College of Science, Iraq Dr. Urmila Shrawankar, G H Raisoni College of Engineering, Nagpur (MS), India Dr. Krishan Kumar Paliwal, Panipat Institute of Engineering & Technology, India Dr. Mukesh Negi, Tech Mahindra, India Dr. Anuj Kumar Singh, Amity University Gurgaon, India Dr. Babar Shah, Gyeongsang National University, South Korea Assistant Prof. Jayprakash Upadhyay, SRI-TECH Jabalpur, India Assistant Prof. Varadala Sridhar, Vidya Jyothi Institute of Technology, India Assistant Prof. Parameshachari B D, KSIT, Bangalore, India Assistant Prof. Ankit Garg, Amity University, Haryana, India Assistant Prof. Rajashe Karappa, SDMCET, Karnataka, India Assistant Prof. Varun Jasuja, GNIT, India Assistant Prof. Sonal Honale, Abha Gaikwad Patil College of Engineering Nagpur, India Dr. Pooja Choudhary, CT Group of Institutions, NIT Jalandhar, India Dr. Faouzi Hidoussi, UHL Batna, Algeria Dr. Naseer Ali Husieen, Wasit University, Iraq Assistant Prof. Vinod Kumar Shukla, Amity University, Dubai Dr. Ahmed Farouk Metwaly, K L University Mr. Mohammed Noaman Murad, Cihan University, Iraq Dr. Suxing Liu, Arkansas State University, USA Dr.
  999. M. Gomathi, Velalar College of Engineering and Technology, India Assistant Prof. Sumardiono, College PGRI Blitar, Indonesia Dr. Latika Kharb, Jagan Institute of Management Studies (JIMS), Delhi, India Associate Prof. S. Raja, Pauls College of Engineering and Technology, Tamilnadu, India Assistant Prof. Seyed Reza Pakize, Shahid Sani High School, Iran Dr. Thiyagu Nagaraj, University-INOU, India Assistant Prof. Noreen Sarai, Harare Institute of Technology, Zimbabwe Assistant Prof. Gajanand Sharma, Suresh Gyan Vihar University Jaipur, Rajasthan, India Assistant Prof. Mapari Vikas Prakash, Siddhant COE, Sudumbare, Pune, India Dr. Devesh Katiyar, Shri Ramswaroop Memorial University, India Dr. Shenshen Liang, University of California, Santa Cruz, US Assistant Prof. Mohammad Abu Omar, Limkokwing University of Creative Technology-Malaysia Mr. Snehasis Banerjee, Tata Consultancy Services, India Assistant Prof. Kibona Lusekelo, Ruaha Catholic University (RUCU), Tanzania
  1000. Assistant Prof. Adib Kabir Chowdhury, University College Technology Sarawak, Malaysia Dr. Ying Yang, Computer Science Department, Yale University, USA Dr. Vinay Shukla, Institute Of Technology & Management, India Dr. Liviu Octavian Mafteiu-Scai, West University of Timisoara, Romania Assistant Prof. Rana Khudhair Abbas Ahmed, Al-Rafidain University College, Iraq Assistant Prof. Nitin A. Naik, S.R.T.M. University, India Dr. Timothy Powers, University of Hertfordshire, UK Dr. S. Prasath, Bharathiar University, Erode, India Dr. Ritu Shrivastava, SIRTS Bhopal, India Prof. Rohit Shrivastava, Mittal Institute of Technology, Bhopal, India Dr. Gianina Mihai, Dunarea de Jos" University of Galati, Romania (IJCSIS) International Journal of Computer Science and Information Security, Vol. 15 No. 3, March 2017
  1001. Assistant Prof. Ms. T. Kalai Selvi, Erode Sengunthar Engineering College, India Assistant Prof. Ms. C. Kavitha, Erode Sengunthar Engineering College, India Assistant Prof. K. Sinivasamoorthi, Erode Sengunthar Engineering College, India Assistant Prof. Mallikarjun C Sarsamba Bheemnna Khandre Institute Technology, Bhalki, India Assistant Prof. Vishwanath Chikaraddi, Veermata Jijabai technological Institute (Central Technological Institute), India Assistant Prof. Dr. Ikvinderpal Singh, Trai Shatabdi GGS Khalsa College, India Assistant Prof. Mohammed Noaman Murad, Cihan University, Iraq Professor Yousef Farhaoui, Moulay Ismail University, Errachidia, Morocco Dr. Parul Verma, Amity University, India Professor Yousef Farhaoui, Moulay Ismail University, Errachidia, Morocco Assistant Prof. Madhavi Dhingra, Amity University, Madhya Pradesh, India Assistant Prof.. G. Selvavinayagam, SNS College of Technology, Coimbatore, India Assistant Prof. Madhavi Dhingra, Amity University, MP, India Professor Kartheesan Log, Anna University, Chennai Professor Vasudeva Acharya, Shri Madhwa vadiraja Institute of Technology, India Dr. Asif Iqbal Hajamydeen, Management & Science University, Malaysia Assistant Prof., Mahendra Singh Meena, Amity University Haryana Assistant Professor Manjeet Kaur, Amity University Haryana Dr. Mohamed Abd El-Basset Matwalli, Zagazig University, Egypt Dr. Ramani Kannan, Universiti Teknologi PETRONAS, Malaysia Assistant Prof. S. Jagadeesan Subramaniam, Anna University, India Assistant Prof. Dharmendra Choudhary, Tripura University, India Assistant Prof. Deepika Vodnala, SR Engineering College, India Dr. Kai Cong, Intel Corporation & Computer Science Department, Portland State University, USA Dr. Kailas R Patil, Vishwakarma Institute of Information Technology (VIIT), India Dr.
  1002. Omar A. Alzubi, Faculty of IT / Al-Balqa Applied University, Jordan Assistant Prof. Kareemullah Shaik, Nimra Institute of Science and Technology, India Assistant Prof. Chirag Modi, NIT Goa Dr. R. Ramkumar, Nandha Arts And Science College, India Dr. Priyadharshini Vydhialingam, Harathiar University, India Dr. P. S. Jagadeesh Kumar, DBIT, Bangalore, Karnataka Dr. Vikas Thada, AMITY University, Pachgaon Dr.
  1003. T. A. Ashok Kumar, Institute of Management, Christ University, Bangalore Dr. Shaheera Rashwan, Informatics Research Institute Dr. S. Preetha Gunasekar, Bharathiyar University, India Asst Professor Sameer Dev Sharma, Uttaranchal University, Dehradun Dr. Zhihan lv, Chinese Academy of Science, China Dr. Ikvinderpal Singh, Trai Shatabdi GGS Khalsa College, Amritsar Dr. Umar Ruhi, University of Ottawa, Canada Dr. Jasmin Cosic, University of Bihac, Bosnia and Herzegovina Dr. Homam Reda El-Taj, University of Tabuk, Kingdom of Saudi Arabia Dr. Mostafa Ghobaei Arani, Islamic Azad University, Iran Dr. Ayyasamy Ayyanar, Annamalai University, India Dr. Selvakumar Manickam, Universiti Sains Malaysia, Malaysia Dr. Murali Krishna Namana, GITAM University, India Dr. Smriti Agrawal, Chaitanya Bharathi Institute of Technology, Hyderabad, India Professor Vimalathithan Rathinasabapathy, Karpagam College Of Engineering, India (IJCSIS) International Journal of Computer Science and Information Security, Vol. 15 No. 3, March 2017
  1004. Dr. Sushil Chandra Dimri, Graphic Era University, India Dr. Dinh-Sinh Mai, Le Quy Don Technical University, Vietnam Dr. S. Rama Sree, Aditya Engg. College, India Dr. Ehab T. Alnfrawy, Sadat Academy, Egypt Dr. Patrick D. Cerna, Haramaya University, Ethiopia Dr. Vishal Jain, Bharati Vidyapeeth's Institute of Computer Applications and Management (BVICAM), India Associate Prof. Dr. Jiliang Zhang, North Eastern University, China Dr. Sharefa Murad, Middle East University, Jordan Dr. Ajeet Singh Poonia, Govt. College of Engineering & technology, Rajasthan, India Dr. Vahid Esmaeelzadeh, University of Science and Technology, Iran Dr. Jacek M. Czerniak, Casimir the Great University in Bydgoszcz, Institute of Technology, Poland Associate Prof. Anisur Rehman Nasir, Jamia Millia Islamia University Assistant Prof. Imran Ahmad, COMSATS Institute of Information Technology, Pakistan Professor Ghulam Qasim, Preston University, Islamabad, Pakistan Dr. Parameshachari B D, GSSS Institute of Engineering and Technology for Women Dr. Wencan Luo, University of Pittsburgh, US Dr. Musa PEKER, Faculty of Technology, Mugla Sitki Kocman University, Turkey Dr. Gunasekaran Shanmugam, Anna University, India Dr. Binh P. Nguyen, National University of Singapore, Singapore Dr. Rajkumar Jain, Indian Institute of Technology Indore, India Dr. Imtiaz Ali Halepoto, QUEST Nawabshah, Pakistan Dr. Shaligram Prajapat, Devi Ahilya University Indore India Dr. Sunita Singhal, Birla Institute of Technologyand Science, Pilani, India Dr. Ijaz Ali Shoukat, King Saud University, Saudi Arabia Dr. Anuj Gupta, IKG Punjab Technical University, India Dr. Sonali Saini, IES-IPS Academy, India Dr. Krishan Kumar, MotiLal Nehru National Institute of Technology, Allahabad, India Dr. Z. Faizal Khan, College of Engineering, Shaqra University, Kingdom of Saudi Arabia Prof. M. Padmavathamma, S.V. University Tirupati, India Prof. A. Velayudham, Cape Institute of Technology, India Prof. Seifeidne Kadry, American University of the Middle East Dr. J. Durga Prasad Rao, Pt. Ravishankar Shukla University, Raipur Assistant Prof. Najam Hasan, Dhofar University Dr. G. Suseendran, Vels University, Pallavaram, Chennai Prof. Ankit Faldu, Gujarat Technological Universiry-Atmiya Institute of Technology and Science Dr. Ali Habiboghli, Islamic Azad University Dr. Deepak Dembla, JECRC University, Jaipur, India Dr. Pankaj Rajan, Walmart Labs, USA Assistant Prof. Radoslava Kraleva, South-West University "Neofit Rilski", Bulgaria Assistant Prof. Medhavi Shriwas, Shri vaishnav institute of Technology, India Associate Prof. Sedat Akleylek, Ondokuz Mayis University, Turkey Dr. U.V. Arivazhagu, Kingston Engineering College Affiliated To Anna University, India Dr. Touseef Ali, University of Engineering and Technology, Taxila, Pakistan Assistant Prof. Naren Jeeva, SASTRA University, India Dr. Riccardo Colella, University of Salento, Italy Dr. Enache Maria Cristina, University of Galati, Romania Dr.
  1005. Senthil P, Kurinji College of Arts & Science, India (IJCSIS) International Journal of Computer Science and Information Security, Vol. 15 No. 3, March 2017
  1006. Dr. Hasan Ashrafi-rizi, Isfahan University of Medical Sciences, Isfahan, Iran Dr. Mazhar Malik, Institute of Southern Punjab, Pakistan Dr. Yajie Miao, Carnegie Mellon University, USA Dr. Kamran Shaukat, University of the Punjab, Pakistan Dr. Sasikaladevi N., SASTRA University, India Dr. Ali Asghar Rahmani Hosseinabadi, Islamic Azad University Ayatollah Amoli Branch, Amol, Iran Dr. Velin Kralev, South-West University "Neofit Rilski", Blagoevgrad, Bulgaria Dr. Marius Iulian Mihailescu, LUMINA -The University of South-East Europe Dr. Sriramula Nagaprasad, S.R.R.Govt.Arts & Science College, Karimnagar, India Prof (Dr.) Namrata Dhanda, Dr. APJ Abdul Kalam Technical University, Lucknow, India Dr. Javed Ahmed Mahar, Shah Abdul Latif University, Khairpur Mir's, Pakistan Dr. B. Narendra Kumar Rao, Sree Vidyanikethan Engineering College, India Dr. Shahzad Anwar, University of Engineering & Technology Peshawar, Pakistan Dr. Basit Shahzad, King Saud University, Riyadh -Saudi Arabia Dr. Nilamadhab Mishra, Chang Gung University Dr. Sachin Kumar, Indian Institute of Technology Roorkee Dr. Santosh Nanda, Biju-Pattnaik University of Technology Dr. Sherzod Turaev, International Islamic University Malaysia Dr. Yilun Shang, Tongji University, Department of Mathematics, Shanghai, China Dr. Nuzhat Shaikh, Modern Education society's College of Engineering, Pune, India Dr. Parul Verma, Amity University, Lucknow campus, India Dr. Rachid Alaoui, Agadir Ibn Zohr University, Agadir, Morocco Dr. Dharmendra Patel, Charotar University of Science and Technology, India Dr. Dong Zhang, University of Central Florida, USA Dr. Kennedy Chinedu Okafor, Federal University of Technology Owerri, Nigeria Prof. C Ram Kumar, Dr NGP Institute of Technology, India Dr. Sandeep Gupta, GGS IP University, New Delhi, India Dr. Shahanawaj Ahamad, University of Ha'il, Ha'il City, Ministry of Higher Education, Kingdom of Saudi Arabia Dr. Najeed Ahmed Khan, NED University of Engineering & Technology, India Dr. Sajid Ullah Khan, Universiti Malaysia Sarawak, Malaysia Dr. Muhammad Asif, National Textile University Faisalabad, Pakistan Dr. Yu BI, University of Central Florida, Orlando, FL, USA Dr. Brijendra Kumar Joshi, Research Center, Military College of Telecommunication Engineering, India Prof. Dr. Nak Eun Cho, Pukyong National University, Korea Prof. Wasim Ul-Haq, Mathematics Department Faculty of Science, Majmaah University, Saudi Arabia CALL FOR PAPERS International Journal of Computer Science and Information Security IJCSIS 2017-2018 ISSN: 1947-5500 http://sites.google.com/site/ijcsis/ International Journal Computer Science and Information Security, IJCSIS, is the premier scholarly venue in the areas of computer science and security issues. IJCSIS 2011 will provide a high profile, leading edge platform for researchers and engineers alike to publish state-of-the-art research in the respective fields of information technology and communication security. The journal will feature a diverse mixture of publication articles including core and applied computer science related topics. Authors are solicited to contribute to the special issue by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to. Submissions may span a broad range of topics, e.g.: Track A: Security Access control, Anonymity, Audit and audit reduction & Authentication and authorization, Applied cryptography, Cryptanalysis, Digital Signatures, Biometric security, Boundary control devices, Certification and accreditation, Cross-layer design for security, Security & Network Management, Data and system integrity, Database security, Defensive information warfare, Denial of service protection, Intrusion Detection, Anti-malware, Distributed systems security, Electronic commerce, E-mail security, Spam, Phishing, E-mail fraud, Virus, worms, Trojan Protection, Grid security, Information hiding and watermarking & Information survivability, Insider threat protection, Integrity Intellectual property protection, Internet/Intranet Security, Key management and key recovery, Language- based security, Mobile and wireless security, Mobile, Ad Hoc and Sensor Network Security, Monitoring and surveillance, Multimedia security ,Operating system security, Peer-to-peer security, Performance Evaluations of Protocols & Security Application, Privacy and data protection, Product evaluation criteria and compliance, Risk evaluation and security certification, Risk/vulnerability assessment, Security & Network Management, Security Models & protocols, Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,), Trusted computing, Ubiquitous Computing Security, Virtualization security, VoIP security, Web 2.0 security, Submission Procedures, Active Defense Systems, Adaptive Defense Systems, Benchmark, Analysis and Evaluation of Security Systems, Distributed Access Control and Trust Management, Distributed Attack Systems and Mechanisms, Distributed Intrusion Detection/Prevention Systems, Denial-of-Service Attacks and Countermeasures, High Performance Security Systems, Identity Management and Authentication, Implementation, Deployment and Management of Security Systems, Intelligent Defense Systems, Internet and Network Forensics, Large- scale Attacks and Defense, RFID Security and Privacy, Security Architectures in Distributed Network Systems, Security for Critical Infrastructures, Security for P2P systems and Grid Systems, Security in E- Commerce, Security and Privacy in Wireless Networks, Secure Mobile Agents and Mobile Code, Security Protocols, Security Simulation and Tools, Security Theory and Tools, Standards and Assurance Methods, Trusted Computing, Viruses, Worms, and Other Malicious Code, World Wide Web Security, Novel and emerging secure architecture, Study of attack strategies, attack modeling, Case studies and analysis of actual attacks, Continuity of Operations during an attack, Key management, Trust management, Intrusion detection techniques, Intrusion response, alarm management, and correlation analysis, Study of tradeoffs between security and system performance, Intrusion tolerance systems, Secure protocols, Security in wireless networks (e.g. mesh networks, sensor networks, etc.), Cryptography and Secure Communications, Computer Forensics, Recovery and Healing, Security Visualization, Formal Methods in Security, Principles for Designing a Secure Computing System, Autonomic Security, Internet Security, Security in Health Care Systems, Security Solutions Using Reconfigurable Computing, Adaptive and Intelligent Defense Systems, Authentication and Access control, Denial of service attacks and countermeasures, Identity, Route and Location Anonymity schemes, Intrusion detection and prevention techniques, Cryptography, encryption algorithms and Key management schemes, Secure routing schemes, Secure neighbor discovery and localization, Trust establishment and maintenance, Confidentiality and data integrity, Security architectures, deployments and solutions, Emerging threats to cloud-based services, Security model for new services, Cloud-aware web service security, Information hiding in Cloud Computing, Securing distributed data storage in cloud, Security, privacy and trust in mobile computing systems and applications, Middleware security & Security features: middleware software is an asset on its own and has to be protected, interaction between security-specific and other middleware features, e.g., context-awareness, Middleware-level security monitoring and measurement: metrics and mechanisms for quantification and evaluation of security enforced by the middleware, Security co-design: trade-off and co-design between application-based and middleware-based security, Policy-based management: innovative support for policy-based definition and enforcement of security concerns, Identification and authentication mechanisms: Means to capture application specific constraints in defining and enforcing access control rules, Middleware-oriented security patterns: identification of patterns for sound, reusable security, Security in aspect-based middleware: mechanisms for isolating and enforcing security aspects, Security in agent-based platforms: protection for mobile code and platforms, Smart Devices: Biometrics, National ID cards, Embedded Systems Security and TPMs, RFID Systems Security, Smart Card Security, Pervasive Systems: Digital Rights Management (DRM) in pervasive environments, Intrusion Detection and Information Filtering, Localization Systems Security (Tracking of People and Goods), Mobile Commerce Security, Privacy Enhancing Technologies, Security Protocols (for Identification and Authentication, Confidentiality and Privacy, and Integrity), Ubiquitous Networks: Ad Hoc Networks Security, Delay- Tolerant Network Security, Domestic Network Security, Peer-to-Peer Networks Security, Security Issues in Mobile and Ubiquitous Networks, Security of GSM/GPRS/UMTS Systems, Sensor Networks Security, Vehicular Network Security, Wireless Communication Security: Bluetooth, NFC, WiFi, WiMAX, WiMedia, others This Track will emphasize the design, implementation, management and applications of computer communications, networks and services. Topics of mostly theoretical nature are also welcome, provided there is clear practical potential in applying the results of such work. Track B: Computer Science Broadband wireless technologies: LTE, WiMAX, WiRAN, HSDPA, HSUPA, Resource allocation and interference management, Quality of service and scheduling methods, Capacity planning and dimensioning, Cross-layer design and Physical layer based issue, Interworking architecture and interoperability, Relay assisted and cooperative communications, Location and provisioning and mobility management, Call admission and flow/congestion control, Performance optimization, Channel capacity modeling and analysis, Middleware Issues: Event-based, publish/subscribe, and message-oriented middleware, Reconfigurable, adaptable, and reflective middleware approaches, Middleware solutions for reliability, fault tolerance, and quality-of-service, Scalability of middleware, Context-aware middleware, Autonomic and self-managing middleware, Evaluation techniques for middleware solutions, Formal methods and tools for designing, verifying, and evaluating, middleware, Software engineering techniques for middleware, Service oriented middleware, Agent-based middleware, Security middleware, Network Applications: Network-based automation, Cloud applications, Ubiquitous and pervasive applications, Collaborative applications, RFID and sensor network applications, Mobile applications, Smart home applications, Infrastructure monitoring and control applications, Remote health monitoring, GPS and location-based applications, Networked vehicles applications, Alert applications, Embeded Computer System, Advanced Control Systems, and Intelligent Control : Advanced control and measurement, computer and microprocessor-based control, signal processing, estimation and identification techniques, application specific IC's, nonlinear and adaptive control, optimal and robot control, intelligent control, evolutionary computing, and intelligent systems, instrumentation subject to critical conditions, automotive, marine and aero-space control and all other control applications, Intelligent Control System, Wiring/Wireless Sensor, Signal Control System. Sensors, Actuators and Systems Integration : Intelligent sensors and actuators, multisensor fusion, sensor array and multi-channel processing, micro/nano technology, microsensors and microactuators, instrumentation electronics, MEMS and system integration, wireless sensor, Network Sensor, Hybrid Sensor, Distributed Sensor Networks. Signal and Image Processing : Digital signal processing theory, methods, DSP implementation, speech processing, image and multidimensional signal processing, Image analysis and processing, Image and Multimedia applications, Real-time multimedia signal processing, Computer vision, Emerging signal processing areas, Remote Sensing, Signal processing in education. Industrial Informatics: Industrial applications of neural networks, fuzzy algorithms, Neuro-Fuzzy application, bioInformatics, real-time computer control, real-time information systems, human-machine interfaces, CAD/CAM/CAT/CIM, virtual reality, industrial communications, flexible manufacturing systems, industrial automated process, Data Storage Management, Harddisk control, Supply Chain Management, Logistics applications, Power plant automation, Drives automation. Information Technology, Management of Information System : Management information systems, Information Management, Nursing information management, Information System, Information Technology and their application, Data retrieval, Data Base Management, Decision analysis methods, Information processing, Operations research, E-Business, E-Commerce, E-Government, Computer Business, Security and risk management, Medical imaging, Biotechnology, Bio-Medicine, Computer-based information systems in health care, Changing Access to Patient Information, Healthcare Management Information Technology. Communication/Computer Network, Transportation Application : On-board diagnostics, Active safety systems, Communication systems, Wireless technology, Communication application, Navigation and Guidance, Vision-based applications, Speech interface, Sensor fusion, Networking theory and technologies, Transportation information, Autonomous vehicle, Vehicle application of affective computing, Advance Computing technology and their application : Broadband and intelligent networks, Data Mining, Data fusion, Computational intelligence, Information and data security, Information indexing and retrieval, Information processing, Information systems and applications, Internet applications and performances, Knowledge based systems, Knowledge management, Software Engineering, Decision making, Mobile networks and services, Network management and services, Neural Network, Fuzzy logics, Neuro-Fuzzy, Expert approaches, Innovation Technology and Management : Innovation and product development, Emerging advances in business and its applications, Creativity in Internet management and retailing, B2B and B2C management, Electronic transceiver device for Retail Marketing Industries, Facilities planning and management, Innovative pervasive computing applications, Programming paradigms for pervasive systems, Software evolution and maintenance in pervasive systems, Middleware services and agent technologies, Adaptive, autonomic and context-aware computing, Mobile/Wireless computing systems and services in pervasive computing, Energy-efficient and green pervasive computing, Communication architectures for pervasive computing, Ad hoc networks for pervasive communications, Pervasive opportunistic communications and applications, Enabling technologies for pervasive systems (e.g., wireless BAN, PAN), Positioning and tracking technologies, Sensors and RFID in pervasive systems, Multimodal sensing and context for pervasive applications, Pervasive sensing, perception and semantic interpretation, Smart devices and intelligent environments, Trust, security and privacy issues in pervasive systems, User interfaces and interaction models, Virtual immersive communications, Wearable computers, Standards and interfaces for pervasive computing environments, Social and economic models for pervasive systems, Active and Programmable Networks, Ad Hoc & Sensor Network, Congestion and/or Flow Control, Content Distribution, Grid Networking, High-speed Network Architectures, Internet Services and Applications, Optical Networks, Mobile and Wireless Networks, Network Modeling and Simulation, Multicast, Multimedia Communications, Network Control and Management, Network Protocols, Network Performance, Network Measurement, Peer to Peer and Overlay Networks, Quality of Service and Quality of Experience, Ubiquitous Networks, Crosscutting Themes -Internet Technologies, Infrastructure, Services and Applications; Open Source Tools, Open Models and Architectures; Security, Privacy and Trust; Navigation Systems, Location Based Services; Social Networks and Online Communities; ICT Convergence, Digital Economy and Digital Divide, Neural Networks, Pattern Recognition, Computer Vision, Advanced Computing Architectures and New Programming Models, Visualization and Virtual Reality as Applied to Computational Science, Computer Architecture and Embedded Systems, Technology in Education, Theoretical Computer Science, Computing Ethics, Computing Practices & Applications Authors are invited to submit papers through e-mail ijcsiseditor@gmail.com. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated by IJCSIS. Before submission authors should carefully read over the journal's Author Guidelines, which are located at http://sites.google.com/site/ijcsis/authors-notes .