scispace - formally typeset
Search or ask a question
JournalISSN: 2249-3123

Journal of Advanced Computer Science and Technology 

About: Journal of Advanced Computer Science and Technology is an academic journal. The journal publishes majorly in the area(s): Encryption & The Internet. Over the lifetime, 197 publications have been published receiving 781 citations.

Papers published on a yearly basis

Papers
More filters
Journal ArticleDOI
TL;DR: In this survey, SDN implementation approaches and different southbound interfaces, beside different version of OpenFlow, are introduced, and in addition to general architecture of SDN, different wireless architectures are discussed.
Abstract: Software Defined Networking (SDN) is an emerging architecture which decouples networks control plane and data plane physically. It makes control plane programmable trough a centralized controller, and builds intelligent and flexible networks. The OpenFlow is one of the most famous SDN protocols, which acts as a southbound interface between control plane and data plane. In this survey, SDN implementation approaches and different southbound interfaces, beside different version of OpenFlow, are introduced. In addition to general architecture of SDN, different wireless architectures are discussed. Here, also potential SDN’s applications and research areas including hot topics such as Information Centric Networks, Cloud and datacenters, multimedia, wireless and mobile networks over SDN are reviewed.

52 citations

Journal ArticleDOI
TL;DR: This paper focuses on denial of service (DoS) attacks, the elements to be taken into account in selecting a compatible IDS are determined and some solutions that are considered effective and valid for 6LoWPAN-RPL based networks are given.
Abstract: RPL (Routing Protocol for Low-power and lossy networks) is a specific routing protocol designed to optimize 6LoWPAN (IPv6 over Low power Wireless Personal Area Network) operation. As 6LoWPAN suffers from resource constraints on battery, processor, memory and bandwidth, it affects the performance of the RPL protocol. From security point of view, this will make RPL vulnerable to several threats directly or indirectly. Thus, cryptographic systems are not sufficient to protect the RPL from internal attacks; a compromised node from the network may cause undesired operation without being detected by these systems. An intrusion detection system (IDS) should be used, but it is not easy given the nature of 6LoWPAN; on a side its resource constraints, and on the other side its opening to the outside world through the Internet. In this paper we focus on denial of service (DoS) attacks, we determine the elements to be taken into account in selecting a compatible IDS and we give some solutions that we consider effective and valid for 6LoWPAN-RPL based networks Keywords: RPL, ROLL, 6LoWPAN, IDS, DoS, Network security.

37 citations

Journal ArticleDOI
TL;DR: Information is presented about the most current threats and attacks on cloud computing, as well as security measures that can be used to reduce or eliminate the risk of the threats discussed.
Abstract: This paper is aimed to present information about the most current threats and attacks on cloud computing, as well as security measures. The paper discusses threats and attacks that are most effective on cloud computing such as data breach, data loss, service traffic hijacking..etc. The severity and effect of these attacks are discussed along with real-life examples of these attacks. The paper also suggests mitigation techniques that can be used to reduce or eliminate the risk of the threats discussed. In addition, general cloud security recommendations are given. Keywords: cloud, cloud computing, security, threats, attacks, SaaS, PaaS, IaaS.

35 citations

Journal ArticleDOI
TL;DR: The results of the BHA are compared with the results of GA and PSO algorithms which indicate that the performance of BHA is better than the other two mentioned algorithms.
Abstract: Various meta-heuristic optimization approaches have been recently created and applied in different areas. Many of these approaches are inspired by swarm behaviors in the nature. This paper studies the solving optimization problems using Black Hole Algorithm (BHA) which is a population-based algorithm. Since the performance of this algorithm was not tested in mathematical functions, we have studied this issue using some standard functions. The results of the BHA are compared with the results of GA and PSO algorithms which indicate that the performance of BHA is better than the other two mentioned algorithms.

30 citations

Journal ArticleDOI
TL;DR: A novel Block-Based Discrete Cosine Transform (BBDCT) for feature extraction wherein each 8x8 DCT block is of adequate size to collect the information within that block without any compromise is proposed.
Abstract: Face recognition (FR) with reduced number of features is challenging and energy based feature extraction is an effective approach to solve this problem. However, existing methods are hard to extract only the required low frequency features, which is important for capturing the intrinsic features of a face image. This paper proposes a novel Block-Based Discrete Cosine Transform (BBDCT) for feature extraction wherein each 8x8 DCT block is of adequate size to collect the information within that block without any compromise. Individual stages of FR system are examined and an attempt is made to improve each stage. A Binary Particle Swarm Optimization (BPSO)-based feature selection algorithm is used to search the feature vector space for the optimal feature subset. Experimental results show the promising performance of BBDCT for face recognition on 4 benchmark face databases, namely, ORL, Cropped UMIST, Extended Yale B and Color FERET databases. A significant increase in the overall recognition rate and a substantial reduction in the number of features, are observed.

30 citations

Network Information
Related Journals (5)
International Journal of Computer Applications
26.6K papers, 157.4K citations
78% related
Arabian Journal for Science and Engineering
7K papers, 72K citations
77% related
Wireless Personal Communications
11.6K papers, 120.3K citations
76% related
Neural Computing and Applications
8.8K papers, 174.9K citations
76% related
Performance
Metrics
No. of papers from the Journal in previous years
YearPapers
20204
20197
20188
201713
201617
201544