International Journal of Computer Science and Information Security (IJCSIS – established in 2009), has been at the forefront of new knowledge dissemination in research areas of computer science and applications, and advances in... more
International Journal of Computer Science and Information Security (IJCSIS – established in 2009), has been at the forefront of new knowledge dissemination in research areas of computer science and applications, and advances in information security. The journal themes focus on innovative developments, research challenges/solutions in computer science and related technologies. IJCSIS aims to be a high quality publication platform and encourages young scholars and as well as senior academicians globally to share their research output and findings in the fields of computer science. IJCSIS archives all publications in major academic/scientific databases; abstracting/indexing, editorial board and other important information are available online on homepage. https://sites.google.com/site/ijcsis/Home
Research Interests: Information Systems, Computer Science, Computer Graphics, Software Engineering, Artificial Intelligence, and 26 moreHuman Computer Interaction, Information Technology, Computer Vision, Image Processing, Information Security, Computer Engineering, Web Design, Data Mining, Wireless Communications, Database Systems, Social Networking, Multimedia, Network Security, Mobile Technology, Computer Networks, Pervasive Computing, Wireless Sensor Networks, Computer Security, Wireless networks, Cloud Computing, Digital Image Processing, Web, Artificial Neural Networks, Cyber Security, Cloud Computing Security, and Geographic Information Systems (GIS)
Initially TCP was designed with the notion in mind that wired networks are generally reliable and any segment loss in a transmission is due to congestion in the network rather than an unreliable medium (The assumptions is that the packet... more
Initially TCP was designed with the notion in mind that wired networks are generally reliable and any segment loss in a transmission is due to congestion in the network rather than an unreliable medium (The assumptions is that the packet loss caused by damage is much less than 1 percent) . This notion doesnt hold in wireless parts of the
Research Interests:
We know that the CDMA (code division multiple access) technique can provide efficient multiple access to a large number of users but has the disadvantage that it requires a high bandwidth. It is also known that CDMA as a multiple access... more
We know that the CDMA (code division multiple access) technique can provide efficient multiple access to a large number of users but has the disadvantage that it requires a high bandwidth. It is also known that CDMA as a multiple access method could be combined with any desired modulation technique. An interesting question is what would be the result of
Research Interests:
... Sugam Sharma1, SB Goyal2, and Shamimul Qamar3 Department of Computer Science, Iowa State University1, USA Department of Computer Science, Manav Rachna International University2, INDIA Department of Information Technology, SRM... more
... Sugam Sharma1, SB Goyal2, and Shamimul Qamar3 Department of Computer Science, Iowa State University1, USA Department of Computer Science, Manav Rachna International University2, INDIA Department of Information Technology, SRM University3, INDIA sugam.k ...