International Journal of Computer (IJC) <p>The <a title="International Journal of Computer (IJC) home page" href="/index.php/InternationalJournalOfComputer/index" target="_blank" rel="noopener"><strong>International Journal of Computer (IJC)</strong></a> is an open access International Journal for scientists and researchers to publish their scientific papers in Computer Science related fields. <a title="International Journal of Computer (IJC)" href="/index.php/InternationalJournalOfComputer/index" target="_blank" rel="noopener">IJC</a> plays its role as a refereed international journal to publish research results conducted by researchers.</p> <p>This journal accepts scientific papers for publication after passing the journal's double&nbsp;peer review process.&nbsp; For detailed information about the journal kindly check <a title="About the Journal" href="/index.php/InternationalJournalOfComputer/about">About the Journal</a>&nbsp;page.&nbsp;</p> <p>All <a title="International Journal of Computer (IJC)" href="/index.php/InternationalJournalOfComputer/index" target="_blank" rel="noopener">IJC</a> published papers in Computer Science will be available for scientific readers for free; no fees are required to download published papers in this international journal.</p> <p>&nbsp;</p> en-US <p style="text-align: justify;">Authors who submit papers&nbsp;with this journal agree to the following terms:</p> <ol start="1"> <li class="show" style="text-align: justify;">Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a&nbsp;<a href="" target="_new">Creative Commons Attribution License</a>&nbsp;that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.</li> <li class="show" style="text-align: justify;">Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.</li> <li class="show" style="text-align: justify;">Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See&nbsp;<a href="" target="_new">The Effect of Open Access</a>).</li> <li class="show" style="text-align: justify;">By submitting the processing fee, it is understood that the author has agreed to our terms and conditions which may change from time to time without any notice.</li> <li class="show" style="text-align: justify;">It should be clear for authors that the Editor In Chief is responsible for the final decision about the submitted papers; have the right to accept\reject any paper. &nbsp;The Editor In Chief will choose any option from the following to review the submitted papers:A. send the paper to two reviewers, if the results were negative by one reviewer and positive by the other one; then the editor may send the paper for third reviewer or he take immediately the final decision by accepting\rejecting the paper. The Editor In Chief will ask the selected reviewers to present the results within 7 working days, if they were unable to complete the review within the agreed period then the editor have the right to resend the papers for new reviewers using the same procedure. If the Editor In Chief was not able to find suitable reviewers for certain papers then he have the right to reject the paper.</li> <li class="show" style="text-align: justify;">Author will take the responsibility what so ever if any copyright infringement or any other violation of any law is done by publishing the research work by the author</li> <li class="show" style="text-align: justify;">Before publishing, author must check whether this journal is accepted by his employer, or any authority he intends to submit his research work. we will not be responsible in this matter.</li> <li class="show" style="text-align: justify;">If at any time, due to any legal reason, if the journal stops accepting manuscripts or could not publish already accepted manuscripts, we will have the right to cancel all or any one of the manuscripts without any compensation or returning back any kind of processing cost.</li> <li class="show" style="text-align: justify;">The cost covered in the publication fees is only for online publication of a single manuscript.</li> </ol> (Dr. Mohammad Nasar) (Rabindra Corat Kayastha.) Mon, 02 Sep 2019 18:17:18 +0000 OJS 60 To have an Idea on NoSQL Databases <p>NoSQL databases (initially non-SQL, then Not Only SQL) are specifically designed to handle large amounts of data. They have been developed since the 1970s, but they have gained the interest of academia and industry for about two decades. This is because of their powerful characteristics and lack of relational databases, which are the most widely used data sources around the world. Indeed, these databases are based on the relational model, which is materialized by a relational database management system (RDBMS). Although RDBMS efficiently manage data (tables), they have many drawbacks that make them unsuitable for managing current data, which come mainly from Internet applications. They are called Big Data and they are used for example by Twitter, FaceBook, LinkedIn, .... They are very numerous and tend to change quickly. In fact, among the disadvantages of relational databases, we can mention: non-flexibility, non-scalability, ... On the contrary, NoSQL databases evolve very well (scaling) and almost all NoSQL databases are schema-free (we can add or delete an entity or a relationship at any time during execution). In this article, we begin by giving an overview of relational databases and their characteristics. We then describe the NoSQL databases and their main characteristics, knowing that there are as many different characteristics as&nbsp; "NoSQL databases" products. We then give the taxonomy of NoSQL databases, which distinguishes four main types of NoSQL databases: key-value, wide-column, document and graphical databases. We will then give some elements of each type of database through the use of a product, an implementation of a kind of such a database.</p> Bruno SADEG, Claude DUVALLET Copyright (c) 2019 International Journal of Computer (IJC) Tue, 03 Sep 2019 00:00:00 +0000 Bilinear Pairing Based Encryption for Sensor Network <p>In this letter, we review some research efforts in the area of Pairing based encryption for data transmission and storage taking note of the computational overhead and consequently present a simple encryption scheme to buttress our initiative further.</p> Kelechi Emerole, Maurice Anyaehie, Stanley Nwadike Copyright (c) 2019 International Journal of Computer (IJC) Tue, 03 Sep 2019 06:39:59 +0000 Detection of Android Malware based on Sequence Alignment of Permissions <p>Permissions control accesses to critical resources on Android. Any weaknesses from their exploitation can be of great interest to attackers. Investigation about associations of permissions can reveal some patterns against attacks. In this regards, this paper proposes an approach based on sequence alignment between requested permissions to identify similarities between applications. Permission patterns for malicious and normal samples are determined and exploited to evaluate a similarity score. The nature of an application is obtained based on a threshold, judiciously computed. Experiments have been realized with a dataset of 534 malicious samples (300 training and 234 testing) and 534 normal samples (300 training and 234 testing). Our approach has been able to recognize testing samples (either malware or normal) with an accuracy of 79%, an average precision of 76% and an average recall of 75%. This research reveals that sequence alignment can improve malware detection research.</p> Franklin Tchakounté, Albert Djakene Wandala, Yélémou Tiguiane Copyright (c) 2019 International Journal of Computer (IJC) Tue, 17 Sep 2019 08:27:42 +0000 An Architecture for Misconfiguration Patching of Web Services: A Case Study of Apache Server <p>Services are usually left configured by default and therefore subjects to vulnerabilities because they are not security enforced. Web services are so popular that they are targets of attacks to intrusions related to vulnerabilities discovered by attackers. This work proposes an architecture for patching Web service misconfigurations related to existing vulnerabilities. The approach underlying this architecture first retrieves and structures anti-vulnerability measures published by the official service manufacturers. Second, it evaluates the risk level using Common Vulnerability Scoring System (CVSS) on the current state of configurations. The proposed approach has been applied on Apache server on four vulnerabilities: version discovery, XSS, SQL injection and deny of service. Experimental results on a vulnerable environment demonstrate that the proposed approach considerably reduces vulnerabilities compared to similar solutions.</p> Franklin Tchakounté, Jean Marie Kuate Fotso, Vivient Corneille Kamla Copyright (c) 2019 International Journal of Computer (IJC) Tue, 17 Sep 2019 08:44:12 +0000 Burst Loss Reduction Using Fuzzy-Based Adaptive Burst Length Assembly Technique for Optical Burst Switched Networks <p>The optical burst switching (OBS) paradigm is perceived as an intermediate switching technology prior to the realization of an all-optical network. Burst assembly is the first process that takes place at the edge of an OBS network.&nbsp; It is crucial to the performance of an OBS network because it greatly influences loss and delay on such networks.&nbsp; Burst assembly is an important process while&nbsp; burst loss ratio (BLR) and delay are important issues in OBS.&nbsp; In this paper, an intelligent burst assembly algorithm called a Fuzzy-based Adaptive Length Burst Assembly (FALBA) algorithm that is based on fuzzy logic and tuning of fuzzy logic parameters is proposed for OBS network. FALBA was evaluated against itself and the fuzzy adaptive threshold (FAT) burst assembly algorithm using 12 configurations via simulation. The 12 configurations were derived from three rule sets (denoted 0,1,2), two defuzzification techniques (Centroid [C]and Largest of Maximum[L]) and two aggregation methods (Max[M] and Sum[S]) of fuzzy logic. &nbsp;Simulation results have shown that FALBA<sub>0LM</sub> has the best BLR performance when compared to its other configurations and the FAT. However, with respect to delay, FAT only outperforms all configurations of FALBA at low loads (0.0-0.4) but the performance of FAT also decreases as the load (0.4-1.0) increases. Therefore, at high loads (0.4-1.0)&nbsp; FALBA<sub>2CS</sub> has the best delay performance. Our results deduce that FALBA<sub>0LM </sub>can be used</p> Abubakar Muhammad Umaru Copyright (c) 2019 International Journal of Computer (IJC) Sat, 28 Sep 2019 02:21:12 +0000