Computer and Information Science

Journal Information
ISSN / EISSN : 19138989 / 19138997
Current Publisher: Canadian Center of Science and Education (10.5539)
Total articles ≅ 827
Current Coverage
Archived in

Latest articles in this journal

Abdullah Al Hayajneh, Zakirul Alam Bhuiyan, Ian McAndrew
Computer and Information Science, Volume 13; doi:10.5539/cis.v13n2p13

Wireless Body Area Network (WBAN) has become one of the fastest growing technologies nowadays. There are some characteristic limitations in WBAN, especially when it comes to health-related applications that are used to monitor human bodies. To overcome and mitigate theses limitations in WBAN, cloud computing technology can be combined with the WBAN as a solution. We can classify the WBAN sensors in the cloud-based WBAN into i) nodes that monitor the human body and ii) WBAN actuators that take action upon the order commands from the medical staff. The biggest concern is the security of the medical commands to the WBAN actuators because if they are altered or tampered with, there can be serious consequences. Therefore, authentication plays an important role in securing cloud-based WBANs. In this article, we explore the security and privacy issues of Wireless Body Area Network combined with Mobile Cloud Computing (wMCC) with 5G mobile networks and investigate public-key based security solutions. At first, the paper presents a detailed description of wMCC architecture, discussing its main advantages and limitations. The main features of 5G mobile network are then presented, focusing on the advancement it may provide if integrated with wMCC systems. We further investigate the security issues of wMCC with 5G mobile networks while emphasizing the challenges that face this system in healthcare applications. The authentication techniques in wMCC are then classified and discussed with the feasibility of deploying practical solutions. Finally, we outline the main challenges and metrics of an ideal authentication protocols to be used in wMCC with 5G. The metrics are helpful for researchers in this field to evaluate, analyze, and compare the authentication protocols to decide the suitable application for each protocol.
Majd Al-Hawamdeh, Shaker Alkshali, Chris Lee
Computer and Information Science, Volume 13; doi:10.5539/cis.v13n1p90

This study aimed to test the impact of information technology on Information systems effectiveness in Jordanian Telecom Companies. The study adopted a five-dimensional scale to measure information technology (people, hardware, software, databases, and networks), while the information systems' effectiveness was measured through four dimensions: end-user satisfaction, system usage, system security and suitability of the system for management levels. To achieve study aims, a descriptive-analytical method was used. The study was conducted on a sample of (152) managers working in these companies. This study found that there is a high-level average for information technology dimensions and Information Systems effectiveness dimensions. Also, the results showed a significant impact of information technology dimensions (people, software, databases, and networks) except hardware on effectiveness information systems. It was also evident that there a significant impact of information technology on Information systems effectiveness dimensions (end-user satisfaction, system usage, system security and suitability of the system for management levels).
Chris Lee
Computer and Information Science, Volume 13; doi:10.5539/cis.v13n1p99

Reviewer Acknowledgements for Computer and Information Science, Vol. 13, No. 1, 2020
Hastanto Sm Widodo, Suryadi Harmanto, Sarifuddin Madenda, Lingga Hermanto
Computer and Information Science, Volume 13; doi:10.5539/cis.v13n2p1

Motor control application, especially for medium to high power implementation, will benefit the most with the compactness and robustness of an Integrated Power Module of Insulated Gate Bipolar Transistor also known as IGBT IPM. Nevertheless, implementation motor control with a general purpose micro-processor without any advance timer functionality with IGBT IPM will be challenged by the Dead-Time switching requirement in its power switching implementation. Further, a combined sinusoidal and trapezoidal drive of a motor control is also believed will provides a better control performance in term of lower torque ripple and higher motor top speed. This paper proposed a low-cost alternative to address the requirement by implementing a software based dead time functionality using the low cost 16-bit micro controller board with capability of serving up sinusoidal drive as well as trapezoidal drive for motor control application.
Sergey Voronin
Computer and Information Science, Volume 13; doi:10.5539/cis.v13n1p80

Many situations arise where data is collected continuously across multiple channels or over multiple similar subjects. In many cases, transmission of the data across all channels is necessary, but the process can be made more efficient by making use of present similarity between data across different channels. We present here a combined compression approach which exploits approximate linear dependence and high correlation coefficient values between pairs of transformed and sorted channel data vectors. By exploiting this similarity, substantial compression gains can be achieved compared to compression of data per each individual channel.
Derek Hall, Timothy Sands
Computer and Information Science, Volume 13; doi:10.5539/cis.v13n1p72

The nuclear inventory of Russia and the USA currently comprises 12,685 warheads in a large network of vehicles; and the interconnected network is managed by a command and control communication system. This command and control communication system (C3) must also relay information from numerous airborne, space-born, and ground sensors throughout the network in potentially degraded environments and are nonetheless meant to securely hold transmissions that must be held to the highest standards of encryption. C3 systems are also arguably one of the most challenging systems to develop, since they require far more security, reliability, and hardening compared to typical communication systems, because they typically must (absolutely) work while other systems fail. Systems used for C3 are not always cutting-edge technology, but they must be upgraded at crucial junctures to keep them at peak performance. This manuscript outlines a blueprint of a way to embed current and future systems with revolutionary encryption technology. This will transform the security of the information we pass to our C3 assets adding redundancy, flexibility, and enhanced speed and insure vehicles and personnel in the system receive network message traffic. Quantum key distribution (QKD) has the potential to provide nearly impregnable secure transmissions, increased bandwidth, and additional redundancy for command and control communication (C3). While QKD is still in its adolescence, how QKD should be used or C3 must be charted out before it can be engineered, tested, and implemented for operations. Following a description QKD functionality, its pros and cons, we theorize the best implementation of a QKD system for C3.
Yijie Han, Hemasree Koganti, Nikita Goyal
Computer and Information Science, Volume 13; doi:10.5539/cis.v13n1p51

We show that n integers in {0, 1, …, m-1} can be sorted into a linked list in constant time using nlogm processors on the Priority CRCW PRAM model, and they can be sorted into a linked list in O(loglogm/logt) time using nt processors on the Priority CRCW PRAM model.
Saloua Bennani, Iliass Ait El Kouch, Mahmoud El Hamlaoui, Sophie Ebersold, Bernard Coulette, Mahmoud Nassar
Computer and Information Science, Volume 13; doi:10.5539/cis.v13n1p58

Complex systems are typically designed collaboratively by stakeholders from different domains. This multi viewpoints paradigm promotes the separation of concerns since separate teams, from different business viewpoints, build partial models describing the system. These partial models are naturally heterogeneous. So, it is difficult to ensure their intermodel consistency if kept separately. For that, we propose a collaborative approach that combines Group Decision Making (GDM) and Model-Based Engineering (MBE). This paper highlights the GDM part of our approach and especially the concept of decision policy that enables coming up with collective decisions in group decision-making contexts.
Satish Gajawada, Hassan M. H. Mustafa
Computer and Information Science, Volume 13; doi:10.5539/cis.v13n1p41

Nature Inspired Optimization Algorithms have become popular for solving complex Optimization problems. Two most popular Global Optimization Algorithms are Genetic Algorithms (GA) and Particle Swarm Optimization (PSO). Of the two, PSO is very simple and many Research Scientists have used PSO to solve complex Optimization Problems. Hence PSO is chosen in this work. The primary focus of this paper is on imitating God who created the nature. Hence, the term "Artificial God Optimization (AGO)" is coined in this paper. AGO is a new field, which is invented in this work. A new Algorithm titled "God Particle Swarm Optimization (GoPSO)" is created and applied on various benchmark functions. The World's first Hybrid PSO Algorithm based on Artificial Gods is created in this work. GoPSO is a hybrid Algorithm, which comes under AGO Field as well as PSO Field. Results obtained by PSO are compared with created GoPSO algorithm. A list of opportunities that are available in AGO field for Artificial Intelligence field experts are shown in this work.
Fahad Omar Alomary
Computer and Information Science, Volume 13; doi:10.5539/cis.v13n1p34

Several years ago Key Performance Indicators (KPIs) becoming a best measurement practiced by the government sectors. The Ministry of Higher Education in Saudi Arabia opens up to new technology, opportunities, and improved ways to acquire and disseminate scientific teaching and research to bring quality at par with the international standards. KPIs provide quality assurance to the scientific research and higher education. The KPIs are variable and designed specifically for a particular entity such as education, research, finance, operation management etc. Scientific research in Saudi Arabia needs special attention from governing bodies and those who are already involved in scientific research. In case of Al-Imam Muhammad Ibn Saud Islamic University (IMAMU), performance indicators are implemented but with skepticism. In future research, the Ministry of Higher Education, Saudi Arabia should provide the best indicators to measure the performance of Saudi universities by putting some value added in implementation of KPIs. Furthermore, third parties such as government servant and stakeholders should togetherness in performing their jobs to make sure everybody is complying with KPIs sets by its agencies.