International Journal of Advanced Studies in Computer Science and Engineering (IJASCSE)

                                                                                                                                                                                                   ISSN : 2278 7917 

Call For Papers

January 2019

  Submission         January 10

  Acceptance         January 20

  Publication          January 30

Bookmark and Share

International Journal of advanced studies in Computer Science and Engineering (IJASCSE) is here to provide a timely and broad coverage of research in ever-challenging field of Computer Science and Computer Science Engineering. IJASCSE is an interdisciplinary, peer reviewed, fully refereed, monthly, Open Access journal for research scholars with a mix of regular and theme based issues to share their new and advanced research in Computer Science and Engineering. 


The papers published at IJASCSE are currently Abstracted & Indexed by some world famous databases.

 Call For Papers

December  2018

     Submission            December 10

      Notification            December 20

      Publication            December 31

Bookmark and Share

Open Access Database


IJASCSE is an online peer reviewed quality publication, which publishes research papers from diverse fields in computers, sciences, engineering and technologies that emphasizes new research, development and their applications. It provides an open access database for all who are interested to exchange their research work, technical notes & surveying results among professionals through out the world.

 

 IJASCSE volume 6 issue 12                           


An Acknowledgment Approach for Detection and Prevention of Packet Dropping
Misbehavior in MANETs

Rajveer Kaur, Shaveta Rani, Paramjeet Singh,

Abstract- Mobile Ad-hoc NETwork (MANET) is a network of mobile devices communicating via wireless links. It relies on the cooperation of participating nodes for packet forwarding and other network functions. But this cooperation consumes energy, CPU cycle, and memory of a participating node. A Selfish node may refuse to cooperate and drop the packets of other nodes, to save its own resources or a malicious node may drop the packets to disrupt the network function.  

 

Critical success factors in the implementation of (ERP) in Moroccan companies

Omar KHADROUF,Mohamed TALEA, Assia BAKALI

AbstractThe ERP system has been the subject of a largenumber of academic discussions in recent times. A successful implementation of an ERP can have a very important impact on the performance of the company. The factors that are crucial for a successful implementation of an ERP system are commonly known as Critical Success Factors (hereinafter CSF). This article analyzed the CSF that has the most important role in the implementation process in Moroccan organizations in order to identify the most important CSF for the successful implementation of the ERP system.

Ensure and Secure Data Confidentiality in Cloud Computing Environment using Data Obfuscation Technique

Ramalingam Sugumar, K.ARUL MARIE JOYCEE

Abstract—Cloud computing background is a computing model for managing and accessing services over the internet. It provides variety of services to the beneficiary
for on-demand. The very important service of the cloud environment is data storage. All over the world the data center are placed in many different locations to maintain
and monitor the user data. It is more reliable storage but it has many security related problems and different kinds issues.


On the Development of Testing Tool for a Satellite Gyro Sensor

Harry Septanto, Desti Ika Suryanti

Abstract— Attitude determination and control system (ADCS) in a satellite takes an important role to make sure that the satellite mission will be achieved. In the development phase, the ADCS is required to pass whole testing levels, including component level verification. As an important component in the ADCS, the gyro
sensors must meet in that requirement. However, the testing tool for the component level test often rely on another satellite component. Since the testing line is not directly connected to the gyro, some failures between those components will be hard to be identified. This paper proposes a testing tool that operates without involves any other satellite components. The proposed testing tool consists of software and hardware part.


Workflow Scheduling on Cloud using Particle Swarm Optimization with Fractional Time Deadlines

Kezia Rani.B, Dr. A.Vinaya Babu

Abstract Allocation and Scheduling of Cloud resources is an important area in Cloud Computing with minimum execution cost and time. As the cloud is a collection of software and hardware resources and the resources in the cloud are allocated by the cloud service providers, to several users simultaneously based on the user’s requests, scheduling and optimization play an important role in better resource utilization, faster execution and minimizing the cost incurred in executing these applications.


Keywords-Dynamic Source Routing, Packet dropping, Mobile Ad hoc Networks, Misbehavior, Malicious, Selfish.

Keywordscomponent; ERP, Implementation, Critical Success
Factors

KeywordsCloud Computing, Cloud Storage, Security, obfuscation.

Keywords—gyro sensor; testing; software application; serial communication; satellite

Keywords— Cloud computing, resource provisioning, workflow scheduling, scientific workflow, Particle Swarm Optimization

packet-dropping.pdf
To download Click on PDF logo
erp-implementation.pdf
To download Click on PDF logo
data-obfuscation-technique.pdf
To download Click on PDF logo
gyro-sensor.pdf
To download Click on PDF logo
particle_swarm_optimization.pdf
To download Click on PDF logo