Thursday 29 November 2018

Comparison between the Second Zagreb Eccentricity Index and Eccentric Connectivity Index of Graphs (CTCSA)-Lupinepublishers






For a graph G, the second Zagreb eccentricity index E2(G) and eccentric connectivity index ∈c (G) are two eccentricity-based invariants of graph G. In this paper we prove some results on the comparison between 2E (G) m and c (G) n ΞΎ of connected graphs G of order n and with m edges.  The authors demonstrated how a combination of both techniques and human interventions enhances control, decision-making and data analysis systems.


For more LupinePublishers Open Access Journals Please visit our website
For more Computer Science articles Please Click 



Wednesday 28 November 2018

Mini View on Current Trends in Computer Sciences & Applications (CTCSA)-Lupine Publishers





Mini View on Current Trends in Computer Sciences & Applications by Ajay Rana in Current Trends in Computer Sciences& Applications in Lupine Publishers

Computer science has contributed a lot for making the life of human being smooth. The recent developments in the field of computer science are proven to be more smarter and more applicable structures result from marrying the learning capability of the applications with the transparency and accuracy. Foundations of computer science applications highlights the advantages of integration making it a valuable resource for the students and researchers in engineering, computer science and applied mathematics. The authors’ tried to lime light various applications that are an asset to industrial practitioners, corporates, academicians and professionals for control systems, data analysis and optimization tasks. With the continuous improvisation in the computer science applications the need of the young generation is fulfilled, and they can achieve their targets with the help of updated and enhanced support system. Authors are highlighting on current trends in computer sciences & applications and further illustrate how these various technologies integrate with social and economic factors to provide a thorough solution to the real-world problems of the human being in every domain of life.

http://www.lupinepublishers.com/computer-science-journal/abstracts/mini-view-on-current-trends-in-computer-sciences-applications.ID.000104.php
http://www.lupinepublishers.com/computer-science-journal/pdf/CTCSA.MS.ID.000104.pdf
http://www.lupinepublishers.com/computer-science-journal/fulltext/mini-view-on-current-trends-in-computer-sciences-applications.ID.000104.php

Wednesday 21 November 2018

An Image Secret Sharing Method Based on Shamir Secret Sharing (CTCSA)-LupinePublishers






This paper presents an image secret sharing method based on Shamir secret sharing method. We use the matrix projection to construct secret sharing scheme. A secret image to be divided as n image shares such that:

i) Any k image shares (k ≤n) can be used to reconstruct the secret image in lossless manner and
ii)Any (k-1) or fewer image shares cannot get sufficient information too reveal the secret image.
It is an effective, reliable and secure method to prevent the secret image from being lost, stolen and corrupted. In comparison
with other image secret sharing method this approach’s advantages are its strong protection of the secret image and its ability for real time processing.



In Pursuit of Privacy: An Introduction to Anonymization Technologies (CTCSA)-Lupine Publishers




Privacy in the age of pervasive computing and networking is a very hard topic to fully grasp. Any serious attempt at discussing it must take many different angles into account. User interactions grow richer month after month, and due to Big Data techniques, more information about each individual is known to third parties than to the person in question themselves; this is illustrated in the concept of inverse privacy [4]. What is a user to do to keep at least a basic expectation of privacy? Due to the pervasive analysis, a user can only expect their actions to remain private by becoming anonymous-By incorporating into their everyday activities Privacy Enhancement Technologies (PETs) that avoid each of their actions to be linked into a wide-encompassing profile.



Friday 16 November 2018

Self-Payment Fraud Detection on Automated Teller Machine (CTCSA)-Lupinepublishers






Over the past decade the amount of transactions and reported frauds on Automated Teller Machines (ATM) has significantly increased. Various types of frauds have been reported around misusing ATM cards and many methods have been deployed to detect and prevent them. In some countries, banks sell ATMs to investors under predefined circumstances and pay them in commission in order to increase the availability of the service but some ATM owners have been found to create fake transactions to obtain extra commissions. This paper attempts to detect such frauds using a two-stage method. In the first stage fraudulent customers are detected by certain rules and in the second stage their accomplices are identified using transaction loop and cycle detection algorithm. Transactions of an Iranian bank have been used to evaluate the proposed method and all detected fraudsters by system were confirmed by bank fraud detection office.


Friday 2 November 2018

Internet of Things and Privacy (CTCSA)-Lupine Publishers



The Internet of Things is a concept that has been heard quite a lot in recent years, a concept that slowly emerged, but over time it has experienced a booming growth that was then adopted not only by giant IT companies, offering according to the directions of each company that adopts the corresponding services and applications to the end user. Undoubtedly this technology has come to stay for a long time, it has come to improve our living conditions and to simplify habits and functions that required time and many times difficulties. The Internet of Things is almost everywhere around us from the super market to the cars we drive, our everyday life is going easy and we are happy to live with, but there are two important points.

Wishing you a Magical and Blissful Holiday

 Take a leap of faith and begin this wondrous new year by believing. Happy New Year!