International Journal of Computer (IJC) <p>The <a title="International Journal of Computer (IJC) home page" href="/index.php/InternationalJournalOfComputer/index" target="_blank" rel="noopener"><strong>International Journal of Computer (IJC)</strong></a> is an open access International Journal for scientists and researchers to publish their scientific papers in Computer Science related fields. <a title="International Journal of Computer (IJC)" href="/index.php/InternationalJournalOfComputer/index" target="_blank" rel="noopener">IJC</a> plays its role as a refereed international journal to publish research results conducted by researchers.</p> <p>This journal accepts scientific papers for publication after passing the journal's double&nbsp;peer review process.&nbsp; For detailed information about the journal kindly check <a title="About the Journal" href="/index.php/InternationalJournalOfComputer/about">About the Journal</a>&nbsp;page.&nbsp;</p> <p>All <a title="International Journal of Computer (IJC)" href="/index.php/InternationalJournalOfComputer/index" target="_blank" rel="noopener">IJC</a> published papers in Computer Science will be available for scientific readers for free; no fees are required to download published papers in this international journal.</p> <p>&nbsp;</p> en-US <p style="text-align: justify;">Authors who submit papers&nbsp;with this journal agree to the following terms:</p> <ol start="1"> <li class="show" style="text-align: justify;">Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a&nbsp;<a href="" target="_new">Creative Commons Attribution License</a>&nbsp;that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.</li> <li class="show" style="text-align: justify;">Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.</li> <li class="show" style="text-align: justify;">Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See&nbsp;<a href="" target="_new">The Effect of Open Access</a>).</li> <li class="show" style="text-align: justify;">By submitting the processing fee, it is understood that the author has agreed to our terms and conditions which may change from time to time without any notice.</li> <li class="show" style="text-align: justify;">It should be clear for authors that the Editor In Chief is responsible for the final decision about the submitted papers; have the right to accept\reject any paper. &nbsp;The Editor In Chief will choose any option from the following to review the submitted papers:A. send the paper to two reviewers, if the results were negative by one reviewer and positive by the other one; then the editor may send the paper for third reviewer or he take immediately the final decision by accepting\rejecting the paper. The Editor In Chief will ask the selected reviewers to present the results within 7 working days, if they were unable to complete the review within the agreed period then the editor have the right to resend the papers for new reviewers using the same procedure. If the Editor In Chief was not able to find suitable reviewers for certain papers then he have the right to reject the paper.</li> <li class="show" style="text-align: justify;">Author will take the responsibility what so ever if any copyright infringement or any other violation of any law is done by publishing the research work by the author</li> <li class="show" style="text-align: justify;">Before publishing, author must check whether this journal is accepted by his employer, or any authority he intends to submit his research work. we will not be responsible in this matter.</li> <li class="show" style="text-align: justify;">If at any time, due to any legal reason, if the journal stops accepting manuscripts or could not publish already accepted manuscripts, we will have the right to cancel all or any one of the manuscripts without any compensation or returning back any kind of processing cost.</li> <li class="show" style="text-align: justify;">The cost covered in the publication fees is only for online publication of a single manuscript.</li> </ol> (Dr. Mohammad Nasar) (Rabindra Corat Kayastha.) Mon, 09 Mar 2020 22:28:36 +0000 OJS 60 Forensics Based SDN in Data Centers <p>Recently, most data centers have adopted for Software-Defined Network (SDN) architecture to meet the demands for scalability and cost-efficient computer networks. SDN controller separates the data plane and control plane and implements instructions instead of protocols, which improves the Quality of Services (QoS) , enhances energy efficiency and protection mechanisms . However, such centralizations present an opportunity for attackers to utilize the controller of the network and master the entire network devices, which makes it vulnerable. Recent studies efforts have attempted to address the security issue with minimal consideration to the forensics aspects. Based on this, the research will focus on the forensic issue on the SDN network of data center environments. There are diverse approaches to accurately identify the various possible threats to protect the network. For this reason, deep learning approach will used to detect DDoS attacks, which is regarded as the most proper approach for detection of threat. Therefore, the proposed network consists of mobile nodes, head controller, detection engine, domain controller, source controller, Gateway and cloud center. The first stage of the attack is analyzed as serious, where the process includes recording the traffic as criminal evidence to track the criminal, add the IP source of the packet to blacklist and block all packets from this source and eliminate all packets. The second stage not-serious, which includes blocking all packets from the source node for this session, or the non-malicious packets are transmitted using the proposed protocol. This study is evaluated in OMNET ++ environment as a simulation and showed successful results than the existing approaches.</p> Oribe Zakareya Mohammed Copyright (c) 2020 International Journal of Computer (IJC) Mon, 09 Mar 2020 00:00:00 +0000 Overlapping Community Detection using Local Seed Expansion <p>Communities are usually groups of vertices which have higher probability of being connected to each other than to members of other groups. Community detection in complex networks is one of the most popular topics in social network analysis. While in real networks, a person can be overlapped in multiple communities such as family, friends and colleagues, so overlapping community detection attracts&nbsp;&nbsp; more and more attention.&nbsp; Detecting communities from the local structural information of a small number of seed nodes is the successful methods for overlapping community detection. In this work, we propose an overlapping community detection algorithm using local seed expansion approach. Our local seed expansion algorithm selects the nodes with the highest degree as seed nodes and then locally expand these seeds with their entire vertex neighborhood into overlapping communities using Personalized PageRank algorithm. We use F1_score( node&nbsp; level detection )&nbsp; and NMI( community level detection ) measures to assess the performances of the proposed algorithm by comparing the proposed algorithm’s detected communities with ground_truth communities on many real_world networks. Experimental results show that our algorithm outperforms over other overlapping community detection methods in terms of accuracy and quality of overlapped communities.</p> Nyunt Nyunt Sein Copyright (c) 2020 International Journal of Computer (IJC) Sat, 14 Mar 2020 19:55:43 +0000 +MRT: Centralized Web Based Application for Managing Repetitive Tasks <p>Abstract—Task management is broadly classified as a process of managing and assigning different tasks to co-workers, employees or subordinates throughout the life cycle of a project via project managers. Tasks can be of various natures but more specifically we are referring here tasks that are used in the software industry. In this modern world, why a project manager has to assign a repetitive task to its team members repeatedly when a new project arrives. This research paper particularly addresses this issue of automatic task management. In this research we have investigated the problems regarding task management, that can occur during the life cycle of a project and presented a web application MRT which can be effectively served as a solution to those problems. Existing applications like Jira and Trello etc. are helping project managers to automate this process. However, we argue that they are still lacking in few aspects. After examining the existing tools, we felt that there are some problems in automatic task management which are not solved yet. We have solved the problems of task management via MRT. We claim that project managers can use MRT for automatic tasks assignments. MRT novel features, therefore, eliminates the need for human effort for repetitive tasks management. Another aspect of Task management is to provide global access to information regarding tasks status to different levels of employees in hierarchy such as manager, CEO, that helps them regarding taking strategic decisions about employees and further projects. MRT can be used as a safeguard against delays and missed deadlines. More precisely our contributions are i) An algorithm for assigning automatic tasks to employees based on their skill set. ii) Tracking of task dependencies that leads to successful project completion iii) Sub Tasks dependencies tracking that are essential to consider, for declaring a task as completed, pending or not completed. iv) Notification management for timely review of tasks. v). Task Tracking at various levels. vi) Priority-based task assignment vii) Additional feature of document storage viii) Creation of Executive Dashboard of the project to visualize the important metrics. ix) Usage of state of the art ASP.Net Web APIs which ensure the use of mobile apps for MRT x) Fresh API Tokens are sent on each call to enhance the security of MRT. xi) The creation of web services that allows integration of MRT data into various devices such as mobiles, tablets etc.</p> Naveed Ullah, Rizwan Mehmood Copyright (c) 2020 International Journal of Computer (IJC) Tue, 17 Mar 2020 00:00:00 +0000 Using Interactive Charts in a Demonstration Lesson to Help Learners of Colleges of Education Teach Measurement of Angle Properties of Parallel Lines in Basic Schools <p>The main objective of the study was to examine the efficacy of using interactive charts in a demonstration lesson to equip second year learners of both Foso College of Education and Accra College of Education with practical ways of teaching aspects of mathematics to learners in their placement schools. The topic chosen for the demonstration was measuring angle properties of parallel lines. All second year mathematics major learners in both schools were used for the study. The sample was made up of 4 ladies representing11% and 32 gentlemen representing 89% in Foso College of Education and 12 girls representing 23% and 40 gentlemen representing 77% in Accra College of Education. The data was presented using descriptive statistics. The authors, meeting at a subject based workshop seemed to have the same challenges with their elective mathematics learners in their respective schools and decided to pair and work out strategies to unearth their learners’ creative potentials to teach mathematics in an interactive way. The study identified the causes of the learners’ lack of creative potentials at the pre-intervention stage which was done through observation and interview as inadequate teaching learning resources at the colleges and tutors’ continuous use of lecture method with little or no hands-on activities.&nbsp;</p> <p>Then the interactive charts designed by Benjamin Tettey were introduced as a suitable option to address the problem. The intervention procedure was carried out by the authors in each other’s college, that is, Miss Mary Acquah in Accra College of Education and Mr. Benjamin Ayerkain Tettey in Foso College of Education. The new pre-tertiary lesson plan template was modified and prepared by Miss Ruby Jecty, a Teacher Professional Learning Coordinator (TPLC) in Foso College of Education, who we engaged in the preparation stage, acted as a critical friend for the observation of the enactments in both colleges and a reflective practitioner who took both tutors through a professional digital reflection to discuss the strengths and areas of improvements of the enactments.&nbsp;&nbsp; &nbsp;A post intervention result established that when learners are exposed to the use of interactive chart intervention activities, they became very imaginative and innovative as they can suggest other innovative ways of teaching other topics in mathematics and develop positive interest towards the teaching mathematics. The results of the study were collated by Miss Mary Acquah. Based on the pre-during and post enactment discussion with the TPLC, the recommendations were made by both tutors. &nbsp;The template is used to format your paper and style the text. All margins, column widths, line spaces, and text fonts are prescribed; please do not alter them.</p> Benjamin Ayerkain Tettey, Mary Acquah, Ruby Jecty Copyright (c) 2020 International Journal of Computer (IJC) Fri, 20 Mar 2020 10:12:29 +0000