INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY Interested in submitting to this journal? We recommend that you review the About the Journal page for the journal's section policies, as well as the Author Guidelines. Authors need to register with the journal prior to submitting or, if already registered, can simply log in and begin the five-step process. en-US <p>Authors retain the copyright of their manuscripts, and all Open Access articles are distributed under the terms of the&nbsp;<a href="">Creative Commons Attribution License</a>, which permits unrestricted use, distribution, and reproduction in any medium, provided that the original work is properly cited.</p> <p>&nbsp;</p> (Gurdev Singh) (Gurpreet Singh) Tue, 06 Nov 2018 00:00:00 +0000 OJS 60 Enhanced Cloud Security using Hybrid Mechanism of RSA, AES and Blowfish Data Encryption with Secure OTP <p>Cloud Computing has become one of the most talked about technologies in recent times and has got lots of attention from media as well as analysts because it is offering lots of opportunities. Enterprises have been determined to reduce computing costs and for that reason most of them started using it in IT technology then adapted virtualization technology. Cloud computing has revolutionized the way computing and software services are delivered to the clients on demand. It offers users the ability to connect to computing resources and access IT managed services with a previously unknown level of ease. Thus, security concerns among users of the cloud have become a major barrier to the widespread growth of cloud computing. In this research work, we have used the 3 step security mechanism for the keeping the data secure at the cloud. We have implemented the strong authentication mechanism using md5 encrypted OTP and enhanced the security of data using Cloud Broker and RSA, Blowfish and AES.&nbsp; When you log on to your machine and then try to access a resource, say a file server or database, something needs to assure that your username and password are valid. With sensitive data stored in the cloud of the different users, we need a strong authentication mechanism along with OTP. Data breaches because of no/weak authentication. Afterwards we have verified the integrity of data stored at cloud provider using SHA2. Multiple parameters like processing time, processing cost, AES,RSA and blowfish encryption time, OTP generation and encryption time have been calculated and analyzed. We have been able to enhance the security by optimizing the processing time as well as processing cost. After implementing the proposed methodology, it has been summarized that the cloud security can be enhanced by applying the proposed mechanism. The proposed system has reduced the complexity, processing cost which increases the overall efficiency of the system.</p> Gurjeet Singh, Dr. Mohita Garg ##submission.copyrightStatement## Tue, 06 Nov 2018 00:00:00 +0000 Face Detection & Recognition using Tensor Flow: A Review <p>Face recognition has become a popular topic of research recently due to increases in demand for security as well as the rapid development of mobile devices. There are many applications which face recognition can be applied to such as access control, identity verification, security systems, surveillance systems, and social media networks. Access control includes offices, computers, phones, ATMs, etc. Most of these forms currently do not use face recognition as the standard form of granting entry, but with advancing technologies in computers along with more refined algorithms, facial recognition is gaining some traction in replacing passwords and fingerprint scanners. Ever since the events of 9/11 there has been a more concerned emphasis on developing security systems to ensure the safety of innocent citizens. Namely in places such as airports and border crossings where identification verification is necessary, face recognition systems potentially have the ability to mitigate the risk and ultimately prevent future attacks from occurring. As for surveillance systems, the same point can be made if there are criminals on the loose. Surveillance cameras with face recognition abilities can aide in efforts of finding these individuals. Alternatively, these same surveillance systems can also help identify the whereabouts of missing persons, although this is dependent on robust facial recognition algorithms as well as a fully developed database of faces. And lastly, facial recognition has surfaced in social media applications on platforms such as Facebook which suggest users to tag friends who have been identified in pictures. It is clear that there are many applications the uses for facial recognition systems. In general, the steps to achieve this are the following: face detection, feature extraction, and lastly training a model.</p> Ishaan Chawla ##submission.copyrightStatement## Tue, 06 Nov 2018 00:00:00 +0000 Image Encryption Using Chaotic Cat Mapping in the Discrete Fourier Transform <p>The paper presents an secure image using the two dimensional chaotic cat mapping &nbsp;(2D-CCM) in the Discrete Fourier Transform domain (DFT). The ciphering phase begins by applying the DFT on the plainimage to be encrypted and the resulted Fourier transformed image are scrambled using the 2D-CCM and finally an inverse DFT is applied to obtain the final encrypted image. The decryption phase applies a reverse&nbsp; procedure to get the original plainimage. A set of encryption test experiments are employed to inspect the proposed DFT based 2D-CCM image cryptosystem. The experimental results verified and confirmed the superiority of the proposed DFT based 2D-CCM image cryptosystem.</p> Mohammed Alzain ##submission.copyrightStatement## Thu, 29 Nov 2018 04:48:24 +0000 CONTEXT AWARENESS FRAMEWORK FOR DEVELOPING MOBILE APPLICATIONS: A SURVEY OF SELECTED SMALL AND MEDIUM ENTERPRISES IN NAKURU TOWN, KENYA <p>Mobile applications act as valuable tools that can be used by entrepreneurs and small and <br>medium enterprises (SMEs) alike to market their products/services and considerably reduce costs of <br>doing business. The government of Kenya has invested billions of shillings in laying of fiber optic <br>cables in Kenya, improving Kenya‘s ICT sector and coming up with projects aimed at promoting the <br>use of technology among businesses and citizens alike. With all of these investments, there are <br>challenges that hinder the use of business mobile applications by SMEs. Although context <br>awareness in mobile applications is gaining recognition among mobile user and developer <br>communities, many design scenarios still do not incorporate required context awareness as one of <br>their primary goals. Although there are strong context awareness frameworks for mobile <br>applications, there is still potential to improve the usability of virtual learning systems. The study <br>established that the concept of context independence including the physical context independence <br>and the logical context independence from the applications and mobile devices provides a graceful <br>solution in the form of a methodological framework for the development of context-aware systems <br>for SMEs in Nakuru Town.</p> Peter Siele ##submission.copyrightStatement## Wed, 02 Jan 2019 06:30:41 +0000 Improvement of Multimodal Images Classification Based on DSMT Using Visual Saliency Model Fusion With SVM <p>Multimodal images carry available information that can be complementary, redundant information, and overcomes the various problems attached to the unimodal classification task, by modeling and combining these information together. Although, this classification gives acceptable classification results, it still does not reach the level of the visual perception model that has a great ability to classify easily observed scene thanks to the powerful mechanism of the human brain.</p> <p>&nbsp;In order to improve the classification task in multimodal image area, we propose a methodology based on Dezert-Smarandache formalism (DSmT), allowing fusing the combined spectral and dense SURF features extracted from each modality and pre-classified by the SVM classifier. Then we integrate the visual perception model in the fusion process.</p> <p>To prove the efficiency of the use of salient features in a fusion process with DSmT, the proposed methodology is tested and validated on a large datasets extracted from acquisitions on cultural heritage wall paintings. Each set implements four imaging modalities covering UV, IR, Visible and fluorescence, and the results are promising.</p> Hanan Anzid, Gaetan le Goic, Aissam bekkari, Alamin Mansouri, Driss Mammass ##submission.copyrightStatement## Wed, 09 Jan 2019 05:16:06 +0000 Optimal Electric-Power Distribution and Load-Sharing on Smart-Grids: Analysis by Artificial Neural Network <p>This study refers to developing an electric-power distribution system &nbsp;with optimal/suboptimal load-sharing in the complex and expanding metro power-grid infrastructure.&nbsp; That is, the relevant exercise is to indicate a smart forecasting strategy on optimal/suboptimal power-distribution to consumers served by a smart-grid utility.&nbsp; An artificial neural network (ANN) is employed to model the said optimal power-distribution between generating sources and distribution centers.&nbsp; A compatible architecture of the test ANN with <em>ad hoc</em> suites of training/prediction schedules is indicated thereof. Pertinent exercise is to determine smartly the power supported on each transmission-line &nbsp;between generating to distribution-nodes.&nbsp; Further, a “smart” decision protocol prescribing &nbsp;the constraint that no transmission-line carries in excess of a desired load.&nbsp; An algorithm is developed to implement the prescribed constraint via the test ANN; and, each value of the load&nbsp; shared by each distribution-line &nbsp;(meeting the power-demand of the consumers) is elucidated from the ANN output. The test ANN includes the use of a traditional multilayer architecture with feed-forward and backpropagation techniques; and, &nbsp;a fast convergence algorithm (deduced in terms of eigenvalues of a Hessian matrix associated with the input data) is adopted. Further, a novel method based on information-theoretic heuristics (in Shannon’s sense) is invoked towards model specifications. Lastly, the study results are discussed with exemplified computations using appropriate field data.&nbsp; &nbsp;&nbsp;</p> Dolores De Groff, Roxana Melendez, Perambur Neelakanta, Hajar Akif ##submission.copyrightStatement## Thu, 24 Jan 2019 09:00:15 +0000 How Agile Development and Its Tools Support Digital Transformation <p>Digital transformation is the enabler for new reform of businesses, socialites and governments. It is also the platform to the 2030 Vision in Saudi Arabia and in many other countries. Agile Manifesto succeeded to manage software development in a rapid and reliable fashion. Furthermore, incremental delivery of software release ensure that software audiences are engaged while delivering the product, their comments are considered in every function and any changes in requirements are based on imperial use of the software. This ensure the delivery of functionalities matching customer demands as well as reduce project failure risk. For this reason, Agility has been adopted in most software companies as a guaranteed and easy way to implement the digital solutions for their companies. This paper examines the characteristics of agile frameworks, such as Scrum and XP, and Agile tools, such as Jira, Agilo, and others, that facilitate digital transformation. Then compare productivity and efficacy of agile frameworks with traditional SDLC methods. The paper is concluded with the features of agile framework that enable digital transformation such as incremental development, flexible requirements and customer engagement.&nbsp; &nbsp;</p> kawther Saeedi ##submission.copyrightStatement## Fri, 01 Feb 2019 04:52:37 +0000 A Review on Ontology Learning Approaches of Creating a Topic Map of Cybercrime Research <p>Conducting an academic research requires getting a firm grasp of ongoing research issues as well as locating research materials effectively. Often research in different fields on a similar topic can assume diverse approaches due to different objectives and research goals in their own fields. Especially in an interdisciplinary research field like cybercrime, many research topics overlap with those of other research fields. Researchers in such a field, therefore, can benefit from understanding the related domains of one’s own research.&nbsp; Topic maps provide methods for understanding research domain and managing relevant information resources at the same time. In this paper, we review a topic map solution to acquire knowledge structure and to locate information resources effectively. We address current problems of cybercrime research, review previous studies that use automated methods for topic map creation, and examine existing sets of methods for automatically extracting topic map components. Especially, the methods we discuss here are text mining techniques for extracting ontology components, denoted as ontology learning.</p> Kijung Lee ##submission.copyrightStatement## Fri, 01 Feb 2019 05:12:58 +0000