Journal of Computer Science Research

Journal Information
EISSN : 2630-5151
Published by: Bilingual Publishing Co. (10.30564)
Total articles ≅ 72
Filter:

Latest articles in this journal

Bahaa Hussein Taher, Muhammad Yasir, Abraham Isiaho, Judith N. Nyakanga
Journal of Computer Science Research, Volume 4; https://doi.org/10.30564/jcsr.v4i3.4258

Abstract:
Wireless sensor networks process and exchange mission-critical data relating to patients’ health status. Obviously, any leakages of the sensed data can have serious consequences which can endanger the lives of patients. As such, there is need for strong security and privacy protection of the data in storage as well as the data in transit. Over the recent past, researchers have developed numerous security protocols based on digital signatures, advanced encryption standard, digital certificates and elliptic curve cryptography among other approaches. However, previous studies have shown the existence of many security and privacy gaps that can be exploited by attackers to cause some harm in these networks. In addition, some techniques such as digital certificates have high storage and computation complexities occasioned by certificate and public key management issues. In this paper, a certificateless algorithm is developed for authenticating the body sensors and remote medical server units. Security analysis has shown that it offers data privacy, secure session key agreement, untraceability and anonymity. It can also withstand typical wireless sensor networks attacks such as impersonation, packet replay and man-in-the-middle. On the other hand, it is demonstrated to have the least execution time and bandwidth requirements.
Peter Sungu Nyakomitta, Solomon Ogara, Paul Abounji
Journal of Computer Science Research, Volume 4; https://doi.org/10.30564/jcsr.v4i3.4925

Abstract:
The Internet of Things devices and users exchange massive amount of data. Some of these exchanged messages are highly sensitive as they involve organizational, military or patient personally identifiable information. Therefore, many schemes and protocols have been put forward to protect the transmitted messages. The techniques deployed in these schemes may include blockchain, public key infrastructure, elliptic curve cryptography, physically unclonable function and radio frequency identification. In this paper, a review is provided of these schemes including their strengths and weaknesses. Based on the obtained results, it is clear that majority of these protocols have numerous security, performance and privacy issues.
Boniface Kayode Alese, Bamidele Moses Kuboye, Omolara Iyabode Alabede
Journal of Computer Science Research, Volume 4; https://doi.org/10.30564/jcsr.v4i3.4915

Abstract:
The growth in wireless technologies applications makes the necessity of providing a reliable communication over wireless networks become obvious. Guaranteeing real time communication in wireless medium poses a significant challenge due to its poor delivery reliability. In this study, a recovery and redundancy model based on sequential time division multiple access (S-TDMA) for wireless communication is developed. The media access control (MAC) layer of the S-TDMA determines which station should transmit at a given time slot based on channel state of the station. Simulations of the system models were carried out using MATLAB SIMULINK software. SIMULINK blocks from the signal processing and communication block sets were used to model the communication system. The S-TDMA performance is evaluated with total link reliability, system throughput, average probability of correct delivery before deadline and system latency. The evaluation results displayed in graphs when compared with instant retry and drop of frame were found to be reliable in recovering loss packets.
Hla Myo Tun
Journal of Computer Science Research, Volume 4; https://doi.org/10.30564/jcsr.v4i3.4963

Abstract:
The paper presents the distributed control system for rice mill using C# language. The real-time manufacturing system can be implemented by utilizing the signal from the real time control units that is more operative than other old-fashioned control systems in the extent of modern industrial days. The software-based Distributed Control System (DCS) is novel fashionable than any other conventional control systems in the state-ofthe-art manufacturing developments. This research study emphasizes on the implementation of the DCS-based rice mill using visual C#.net. The Industrial Ethernet (IE) is realized between the top level controller for the operator and the controlled station for the remote devices. The model of client-server approach is more appropriate for the automation and manufacturing research purposes. In this study, the computer graphical simulation of the complete control development is depicted in real-time status quo by visual C# language under Visual Studio 2008 software. The parallel ports in the computers of remote terminal level and the master terminal level controllers have been interconnected with port interface coding by visual C# program.
Kire Jakimoski, Zorica Stefanovska, Vekoslav Stefanovski
Journal of Computer Science Research, Volume 4; https://doi.org/10.30564/jcsr.v4i2.4048

Abstract:
Cybersecurity is a global goal that is central to national security planning in many countries. One of the most active research fields is design of practices for the development of so-called highly secure software as a kind of protection and reduction of the risks from cyber threats. The use of a secure software product in a real environment enables the reduction of the vulnerability of the system as a whole. It would be logical to find the most optimal solution for the integration of secure coding in the classic SDLC (software development life cycle). This paper aims to suggest practices and tips that should be followed for secure coding, in order to avoid cost and time overruns because of untimely identification of security issues. It presents the implementation of secure coding practices in software development, and showcases several real-world scenarios from different phases of the SDLC, as well as mitigation strategies. The paper covers techniques for SQL injection mitigation, authentication management for staging environments, and access control verification using JSON Web Tokens.
Fırat Bilgin, Musa Alci
Journal of Computer Science Research, Volume 4; https://doi.org/10.30564/jcsr.v4i2.4499

Abstract:
There are numerous studies about Z-numbers since its inception in 2011. Because Z-number concept reflects human ability to make rational decisions, Z-number based multi-criteria decision making problems are one of these studies. When the problem is translated from linguistic information into Z-number domain, the important question occurs that which Z-number should be selected. To answer this question, several ranking methods have been proposed. To compare the performances of these methods, benchmark set of fuzzy Z-numbers has been created in time. There are relatively new methods that their performances are not examined yet on this benchmark problem. In this paper, we worked on these studies which are relative entropy based Z-number ranking method and a method for ranking discrete Z-numbers. The authors tried to examine their performances on the benchmark problem and compared the results with the other ranking algorithms. The results are consistent with the literature, mostly. The advantages and the drawbacks of the methods are presented which can be useful for the researchers who are interested in this area.
Yu Qi, Chongyang Zhang, Hiroyuki Kameda
Journal of Computer Science Research, Volume 4; https://doi.org/10.30564/jcsr.v4i2.4759

Abstract:
At present, Animal Exercise courses rely too much on teachers’ subjective ideas in teaching methods and test scores, and there is no set of standards as a benchmark for reference. As a result, students guided by different teachers have an uneven understanding of the Animal Exercise and cannot achieve the expected effect of the course. In this regard, the authors propose a scoring system based on action similarity, which enables teachers to guide students more objectively. The authors created QMonkey, a data set based on the body keys of monkeys in the coco dataset format, which contains 1,428 consecutive images from eight videos. The authors use QMonkey to train a model that recognizes monkey body movements. And the authors propose a new non-standing posture normalization method for motion transfer between monkeys and humans. Finally, the authors utilize motion transfer and structural similarity contrast algorithms to provide a reliable evaluation method for animal exercise courses, eliminating the subjective influence of teachers on scoring and providing experience in the combination of artificial intelligence and drama education.
Correction
Sushil Shrestha, Manish Pokharel
Published: 13 January 2022
Journal of Computer Science Research, Volume 4; https://doi.org/10.30564/jcsr.v4i1.4400

Abstract:
The authors wish to correct Table 7, for which details are available in the PDF. The online version of the original article can be found at https://doi.org/10.30564/jcsr.v3i1.2761
Fatima Isiaka, Zainab Adamu, Muhammad A. Adamu
Published: 13 January 2022
Journal of Computer Science Research, Volume 4; https://doi.org/10.30564/jcsr.v4i1.4037

Abstract:
The paper seeks to demonstrates the likelihood of embedding a 3D gaze point on a 3D visual field, the visual field is inform of a game console where the user has to play from one level to the other by overcoming obstacles that will lead them to the next level. Complex game interface is sometimes difficult for the player to progress to next level of the game and the developers also find it difficult to regulate the game for an average player. The model serves as an analytical tool for game adaptations and also players can track their response to the game. Custom eye tracking and 3D object tracking algorithms were developed to enhance the analysis of the procedure. This is a part of the contributions to user interface design in the aspect of visual transparency. The development and testing of human computer interaction uses and application is more easily investigated than ever, part of the contribution to this is the embedding of 3-D gaze point on a 3-D visual field. This could be used in a number of applications, for instance in medical applications that includes long and short sightedness diagnosis and treatment. Experiments and Test were conducted on five different episodes of user attributes, result show that fixation points and pupil changes are the two most likely user attributes that contributes most significantly in the performance of the custom eye tracking algorithm the study. As the advancement in development of eye movement algorithm continues user attributes that showed the least likely appearance will prove to be redundant.
Back to Top Top