American Journal of Computer Sciences and Applications


Generalization of Hadamard Matrices

Research article of American Journal of Computer Sciences and Applications Generalization of Hadamard Matrices Dr. Ahmad Hamza Al Cheikha Dep. of Mathematical Science, College of Arts-science and Education Ahlia Uni., Manama, Bahrain Hadamard’s matrices are used widely at the forward links of communication channels to mix the information on connecting to and at the backward links of these channels to sift through this information is transmitted to reach the receivers this information in correct form, specially in the pilot channels, the Sync channels, the traffic channel and so much applications in the fields; Modern communication and telecommunication systems, signal processing, optical multiplexing, error correction coding, and design and analysis of statistics. This research is useful to generate new sets of orthogonal matrices by generalization Hadamard matrices,with getting bigger lengths and bigger minimum distance by using binary representation of the matrices that assists to increase secrecy of these information, increase the possibility of correcting mistakes resulting in the channels of communication, giving idea to construct new coders and decoders by mod p with more complexity for using these matrices and derivation new orthogonal codes or sequences. Keywords: Hadamard matrix, Binary vector, Coefficient of Correlation, Walsh’s Sequences, Orthogonal sequences, Kronecker product, Code ...

Shoulder Surfing Resistant Graphical Authentication Scheme for Web Based Applications

Research article of American Journal of Computer Sciences and Applications Shoulder Surfing Resistant Graphical Authentication Scheme for Web Based Applications 1Prof. Awodele Oludele Ph.D., 2Kalesanwo Olamide, 3Kuyoro Afolashade PhD., 4Fowora Damilola, 5Ariweriokuma Excellence. 1,2,3,4,5 School of Computing and Engineering Sciences, Babcock University, Ilishan Remo, Ogun State, Nigeria. Since the design and development of the first graphical authentication pioneered by Blonder in 1996, numerous research has been conducted on this area to be used in different scenario especially on the Internet. One of the major motivators is the picture superiority which as studies have shown, states that image/pictures provides higher memorability as opposed to Text based authentication. However, graphical authentication is still faced with some challenges. In this paper, a shoulder surfing resistant graphical authentication scheme is proposed to tackle the major issues related to the graphical authentication schemes developed. In summary, the proposed scheme provides a high level of resistance to shoulder surfing attacks, mitigating the need to upload pictures and aids in finding chosen objects in the scheme. Finally, the schemes still have some vulnerabilities thus, concluding that there cannot be a perfect graphical authentication scheme; each scheme has its merits and demerits making it a suitable candidate for different environment and/or event based on its architecture. Keywords: Authentication, Text-based Authentication, Graphical based Authentication, Security, Shoulder surfing ...

A Quantitative Model of Smartphone Adoption Among Urban and Rural Nigerians: The Role of Social Context In Ensuring Continuous Usage

Research article of American Journal of Computer Sciences and Applications A Quantitative Model of Smartphone Adoption Among Urban and Rural Nigerians: The Role of Social Context In Ensuring Continuous Usage Iyanda O. A. PhD, MSc. MBA, FCA Tristate Healthcare System, Agodi GRA, Ibadan, Oyo State, Nigeria Rapid diffusion and adoption of smartphone technologies could accelerate development in developing nations like Nigeria. Much is known about the factors that influence technology adoption and continuous use in general, but these theories of socio-economic impact have rarely been tested in Nigeria. Additionally, there may be differences in technology adoption and use behaviors between urban and rural settings. Such differences could influence strategies for encouraging widespread smartphone adoption in Nigeria. Therefore, the present quantitative, survey study sought to test a theoretical model of smartphone adoption and continuous use based on the unified theory of acceptance and use of technologies as well as on expectation confirmation theory. Using factor analysis and partial least squares analysis, this research tested a set of hypotheses related to intention to use smartphones and continuous use, exploring the moderating role of urban versus rural locations. The study discovered that, among Nigerians with high performance expectancy, those who lives in urban areas are more likely to intend to use smartphones when compared with their rural counterparts. The study concluded that social, socio-economic, and infrastructure factors enable urban dwellers to utilize smartphones, whereas context factors make smartphone adoption more difficult in rural areas. That is social influence was positively correlated with intention to use smartphones. Additionally, there is a strong positive correlation between intent to use and continuous usage of mobile technologies, justifying intent to use as an important outcome variable in research on technology adoption in Africa. Based on the results of the finding, this work recommends amongst others, that adequate Information ...

Walking Behavior Based Human Recognition System

Research article of American Journal of Computer Sciences and Applications Walking Behavior Based Human Recognition System Ali Mohammed mohaisun 1, Muayad Sadik Croock 2 1Ali Mohammed mohaisun 1 Informatics Institute for Postgraduate Studies, 2 University of Technology, Computer Engineering Department. In the recent period with the growing need for surveillance system, people looking for suitable method to identify person. Depending on the features of biometric that can specify human identity by using identification and verification functions. The verification process is done by compare the biometric features such as, fingerprint, iris, face recognition, etc., with a record stored previously. While the identification process is performed by find the best match between the biometric features and all records kept in a database. Walking behavior recognition is the only biometric that can specify an individual identity at distance that relying on walking behavior features such as step length, angle of hip and knee, etc. In this paper we propose a biometric based human identification system depending on walking behavior characteristic which is vertical hip angle, horizontal hip angle and slop of thigh that extract from captured picture of person. A database of numerous people has been used. A database has been constructed using SQL server software environment in which person identification performed with high efficiency. The outcome of the proposal system reflects flexibility in term of inserting, searching, updating, deleting and matching. Keywords: Gait, Gait Recognition,walking behavior recognition ...

Manuscript Title: The title should be a brief phrase.

Author Information: List full names and affiliation of all authors, including Emails and phone numbers of corresponding author.

Abstract: The abstract should be less than 500 words. Following abstract, a list of keywords and abbreviations should be added. The keywords should be no more than 10. Abbreviation are only used for non standard and long terms.

Introduction: The introduction should included a clear statement of current problems.

Materials and Methods: This section should be clearly described.

Results and discussion: Authors may put results and discussion into a single section or show them separately.

Acknowledgement: This section includes a brief acknowledgment of people, grant details, funds

References: References should be listed in a numbered citation order at the end of the manuscript. DOIs and links to referenced articles should be added if available. Abstracts and talks for conferences or papers not yet accepted should not be cited.

Tables and figures: Tables should be used at a minimum with a short descriptive title. The preferred file formats for Figures/Graphics are GIF, TIFF, JPEG or PowerPoint.

Publication fees: We do not charge any submission charges, but authors are required to pay publication fees after their manuscripts are accepted for publication. For authors who receive our invitations, please send us the invitation code.

Proofreading and Publication: A proof will be sent to the corresponding author. Authors should carefully read it to avoid any errors and return any comments. We will update and publish it shortly. One of our goals is to minimize our publication time. For authors who do not return comments of proofreading on time, we may put the proof onlinefirst and replace it later with the final version. 

Withdrawal/retraction Policy: When you want to withdraw/retract a published article, please send us your written request by email. We will withdraw/retract it from our system after reviewing the request. Please allow us enough time to process it. 

Terms of Use/Privacy Policy/Disclaimer/Other Policies: eSciPub LLC is a publisher to support Open Access initiative located in Houston, Texas, USA. We are a member of the largest community of professional publishers in the United States: the Independent Book Publishers Association. All journals are solely owned by eSciPub LLC and have no affiliation/relationship with any other(s). You agree that by using or receiving our services, you have read, understood, and agreed to be bound by all of our terms of use/privacy policy/ disclaimer/ other policies(Click here for details).


About the journal
The journal is solely owned and hosted by eSciPub LLC and has no affiliation/relationship with any other(s). Our aim is to provide a platform that encourages publications of the most recent research/reviews for authors of all countries.


About the publisher
eSciPub LLC is a publisher to support Open Access initiative located in Houston, Texas, USA. It is a member of the largest community of professional publishers in the United States: the Independent Book Publishers Association. It hosts more than 100 Open Access journals in Medicine, Business, Economics, Agriculture, Biological Sciences, Chemistry, Education, Physical Sciences, Sociology, Engineering.


Rapid Response Team
Please feel free to contact our rapid response team if you have any questions. Our customer representative will answer your questions shortly.

American Journal of Computer Sciences and Applications

Loading