American Journal of Computer Sciences and Applications

Generalization of Hadamard Matrices

Research article of American Journal of Computer Sciences and Applications Generalization of Hadamard Matrices Dr. Ahmad Hamza Al Cheikha Dep. of Mathematical Science, College of Arts-science and Education Ahlia Uni., Manama, Bahrain Hadamard’s matrices are used widely at the forward links of communication channels to mix the information on connecting to and at the backward links of these channels to sift through this information is transmitted to reach the receivers this information in correct form, specially in the pilot channels, the Sync channels, the traffic channel and so much applications in the fields; Modern communication and telecommunication systems, signal processing, optical multiplexing, error correction coding, and design and analysis of statistics. This research is useful to generate new sets of orthogonal matrices by generalization Hadamard matrices,with getting bigger lengths and bigger minimum distance by using binary representation of the matrices that assists to increase secrecy of these information, increase the possibility of correcting mistakes resulting in the channels of communication, giving idea to construct new coders and decoders by mod p with more complexity for using these matrices and derivation new orthogonal codes or sequences. Keywords: Hadamard matrix, Binary vector, Coefficient of Correlation, Walsh’s Sequences, Orthogonal sequences, Kronecker product, Code ...

Shoulder Surfing Resistant Graphical Authentication Scheme for Web Based Applications

Research article of American Journal of Computer Sciences and Applications Shoulder Surfing Resistant Graphical Authentication Scheme for Web Based Applications 1Prof. Awodele Oludele Ph.D., 2Kalesanwo Olamide, 3Kuyoro Afolashade PhD., 4Fowora Damilola, 5Ariweriokuma Excellence. 1,2,3,4,5 School of Computing and Engineering Sciences, Babcock University, Ilishan Remo, Ogun State, Nigeria. Since the design and development of the first graphical authentication pioneered by Blonder in 1996, numerous research has been conducted on this area to be used in different scenario especially on the Internet. One of the major motivators is the picture superiority which as studies have shown, states that image/pictures provides higher memorability as opposed to Text based authentication. However, graphical authentication is still faced with some challenges. In this paper, a shoulder surfing resistant graphical authentication scheme is proposed to tackle the major issues related to the graphical authentication schemes developed. In summary, the proposed scheme provides a high level of resistance to shoulder surfing attacks, mitigating the need to upload pictures and aids in finding chosen objects in the scheme. Finally, the schemes still have some vulnerabilities thus, concluding that there cannot be a perfect graphical authentication scheme; each scheme has its merits and demerits making it a suitable candidate for different environment and/or event based on its architecture. Keywords: Authentication, Text-based Authentication, Graphical based Authentication, Security, Shoulder surfing ...

A Quantitative Model of Smartphone Adoption Among Urban and Rural Nigerians: The Role of Social Context In Ensuring Continuous Usage

Research article of American Journal of Computer Sciences and Applications A Quantitative Model of Smartphone Adoption Among Urban and Rural Nigerians: The Role of Social Context In Ensuring Continuous Usage Iyanda O. A. PhD, MSc. MBA, FCA Tristate Healthcare System, Agodi GRA, Ibadan, Oyo State, Nigeria Rapid diffusion and adoption of smartphone technologies could accelerate development in developing nations like Nigeria. Much is known about the factors that influence technology adoption and continuous use in general, but these theories of socio-economic impact have rarely been tested in Nigeria. Additionally, there may be differences in technology adoption and use behaviors between urban and rural settings. Such differences could influence strategies for encouraging widespread smartphone adoption in Nigeria. Therefore, the present quantitative, survey study sought to test a theoretical model of smartphone adoption and continuous use based on the unified theory of acceptance and use of technologies as well as on expectation confirmation theory. Using factor analysis and partial least squares analysis, this research tested a set of hypotheses related to intention to use smartphones and continuous use, exploring the moderating role of urban versus rural locations. The study discovered that, among Nigerians with high performance expectancy, those who lives in urban areas are more likely to intend to use smartphones when compared with their rural counterparts. The study concluded that social, socio-economic, and infrastructure factors enable urban dwellers to utilize smartphones, whereas context factors make smartphone adoption more difficult in rural areas. That is social influence was positively correlated with intention to use smartphones. Additionally, there is a strong positive correlation between intent to use and continuous usage of mobile technologies, justifying intent to use as an important outcome variable in research on technology adoption in Africa. Based on the results of the finding, this work recommends amongst others, that adequate Information ...

Walking Behavior Based Human Recognition System

Research article of American Journal of Computer Sciences and Applications Walking Behavior Based Human Recognition System Ali Mohammed mohaisun 1, Muayad Sadik Croock 2 1Ali Mohammed mohaisun 1 Informatics Institute for Postgraduate Studies, 2 University of Technology, Computer Engineering Department. In the recent period with the growing need for surveillance system, people looking for suitable method to identify person. Depending on the features of biometric that can specify human identity by using identification and verification functions. The verification process is done by compare the biometric features such as, fingerprint, iris, face recognition, etc., with a record stored previously. While the identification process is performed by find the best match between the biometric features and all records kept in a database. Walking behavior recognition is the only biometric that can specify an individual identity at distance that relying on walking behavior features such as step length, angle of hip and knee, etc. In this paper we propose a biometric based human identification system depending on walking behavior characteristic which is vertical hip angle, horizontal hip angle and slop of thigh that extract from captured picture of person. A database of numerous people has been used. A database has been constructed using SQL server software environment in which person identification performed with high efficiency. The outcome of the proposal system reflects flexibility in term of inserting, searching, updating, deleting and matching. Keywords: Gait, Gait Recognition,walking behavior recognition ...

Dr. Christo Ananth
Associate Professor, Electronics & Communication Engineering, Francis Xavier, Engineering College.

Dr. Debabrata Samanta
Associate professor, Dept. of Computer Applications,, Dayananda Sagar College of Arts, Science and Commerce, Bangalore, India.

Muhammad Zainuddin Lubis
Department of Informatics Engineering,Politeknik Negeri Batam

Dr. S. Sathish
Assistant Professor and Head, Dept. of Automobile Engineering, Vels University, Pallavaram, Chennai

Dr. Vaibhav Sundriyal
Research Scientist, Old Dominion University research Foundation, USA

Associate Professor, Duzce University Technology Faculty Computer Engineering Department

Dr. M. Ramesh Kumar
Associate Professor/Project Coordinator, Department of Computer Science and Engineering, VSB College of Engineering Technical Campus, Coimbatore, Tamilnadu, India

Dr. S. Krishna Murthy
Associate Professor, Department of Applied Mathematics, Defence Institute of Advanced Technology, Deemed University(DU), Girinagar, Pune

Dr. S. Arivoli
Assistant Professor/EEE, VSB College of Engineering Technical Campus, Coimbatore-642109

Dr. Mustafa SEVINDIK
Institute of Science and Technology, Akdeniz University

Dr. Yashar Hashemi
Coding and Diagram Expert, Tehran Regional Dispatching, Tehran Regional Electric

Dr. Pushpraj Pal
Assistant Professor, SRM IET Ambala

Manuscript Title: The title should be a brief phrase.

Author Information: List full names and affiliation of all authors, including Emails and phone numbers of corresponding author.

Abstract: The abstract should be less than 500 words. Following abstract, a list of keywords and abbreviations should be added. The keywords should be no more than 10. Abbreviation are only used for non standard and long terms.

Introduction: The introduction should included a clear statement of current problems.

Materials and Methods: This section should be clearly described.

Results and discussion: Authors may put results and discussion into a single section or show them separately.

Acknowledgement: This section includes a brief acknowledgment of people, grant details, funds

References: References should be listed in a numbered citation order at the end of the manuscript. DOIs and links to referenced articles should be added if available. Abstracts and talks for conferences or papers not yet accepted should not be cited. Examples Published Papers: 

1.Hussam Elbehiery and Ghada Abdelhady. Unified transportation authenticated reservation system using online QR-code. American Journal of Computer Sciences and Applications, 2018; 2:12. DOI: 10.28933/ajcsa-2018-08-0201. 
2. K. M. Al-soufy, F. S. Al-kamali and F. A. Al-fuhaidy. Performance Evaluation of SC-FDMA Systems Using Wireless Images. American Journal of Computer Sciences and Applications, 2017; 1:11. DOI: 10.28933/ajcsa-2017-11-1801 

Tables and figures: Tables should be used at a minimum with a short descriptive title. The preferred file formats for Figures/Graphics are GIF, TIFF, JPEG or PowerPoint.

Proofreading and Publication: A proof will be sent to the corresponding author before publication. Authors should carefully read the proof to avoid any errors and return the proof to the editorial office. Editorial office will publish the article shortly and send a notice to authors with the links of the paper.

Open Access

American Journal of Computer Sciences and Applications (ISSN:2575-775X; doi:10.28933/AJCSA) is a peer reviewed open access journal publishing research manuscripts, review articles, editorials, letters to the editor in the area of Computer Sciences and Applications (indexing details).

Peer Review

To ensure the quality of the publications, all submitted manuscripts will be peer-reviewed by invited experts in the field. The decisions of editors will be made based on the comments of the reviewers.

Rapid Publication

Time to first decision: within 2 days for initial decision without review, 18 days with review; Time to publication: Accepted articles will be published online within 2 days, and final corrected versions by authors will be accessible within 5 days.  More details....

Rapid Response Team

Please feel free to contact our rapid response team if you have any questions. Our customer representative will answer your questions soon.

American Journal of Computer Sciences and Applications