Tag Archives: scam

www.ijorcs.org – White Globe Publications is BLACKLISTED BY MOST Universities WORLDWIDE

Avoid damaging your academic career. Do not associate in any way your name with: http://www.ijorcs.org

International Journal of Research in Computer Scienc – http://www.ijorcs.org

IJORCS.org is a low-quality journal with NO REVIEW at all.

OWNER is Mr Gursharan Singh, #1675, St.12, Dashmesh Nagar, Gill Road, Ludhiana – 141003, Punjab, India

Not sure? Simply send them him (that is, Mr Gursharan Singh) multiple “Scigen papers” (for those who don’t know what Scigen papers are just google it) and in a week or two, you will receive an acceptance email asking you to pay and publish.

We send them 1 Scigen paper (“The Effect of Modular Methodologies on Networking“) and 1 absolutely stupid paper (“Bridging the Gap between Network Protocol and Protocol Network in ASCII Mode“) and both were accepted for publications!!!

Paying for Open-Access publications is not wrong, since the journal needs to be profitable to be able to survive and continue to serve the scientific community, BUT where to pay is important.

Please STOP these people who just set up websites in minutes by copy and paste other websites and starts making money for non-reviewed research articles.

White Globe Publications is from Ludhiana, Punjab, India, telephone numbers of the owner of the website, reviewer and editor is +91-8054039690, +91-9780335152.

Email address: editor@ijorcs.org, queries@ijorcs.org

The website domain was registered on 16th September 2011, that is, is some 3 months old.

It is SAD that the following list of publications have no value and this will impact negatively the authors:

IEEE-754 compliant Algorithms for Fast Multiplication of Double Precision Floating Point Numbers

Author: Geetanjali Wasson                  Published Date: 2011-09-29

In image and signal processing applications floating-point multiplication is major concern in calculations. Performing multiplication on floating point data is a long course of action and requires huge quantity of processing time. By improving the speed of multiplication task overall speed of the system can be enhanced. The Bottleneck in the floating point multiplication process is the multiplication of mantissas which needs 53*53 bit integer multiplier for double precision floating point numbers. By improving the speed of multiplication task the overall speed of the system can be improved. In this paper a comparison on the existing trends in mantissa multiplication is made. Vedic and Canonic Signed digit algorithms were compared on parameters like speed, complexity of routing, pipelining, resource required on FPGA. The comparison showed that Canonic Signed Digit Algorithm is better than Vedic algorithm in terms of speed and resources required on spartan3 FPGA.

Efficiently Delivering Data Packets Using Distributed Protocol for Runtime Groups Formed In Peer-to-Peer Network

Author: Yasa Ramya, Bhagyalaxmi                  Published Date: 2011-09-29

Peer-to-Peer streaming has been widely used over the internet, where a streaming system usually has multiple channels and peers may form multiple groups for content distribution. In this paper, we propose a distributed overlay framework called SMesh (subset-mesh) for dynamic groups where users may frequently hop from one group to another. SMesh first builds a relatively stable mesh consisting of all hosts for control messaging. The mesh supports dynamic host joining and leaving, and construction of delivery trees. Using the Delaunay Triangulation protocol as an example, we show how to construct an efficient mesh with low maintenance cost. We also study about various tree constructions based on the mesh, including embedded, bypass, and intermediate trees.

Free Space Optics: Atmospheric Effects and Back Up

Author: Gurdeep Singh, Tanvir Singh                  Published Date: 2011-09-29

The Free space optical communication technology tries to fulfill rising need for high bandwidth transmission capability link along with security and ease in installation. Due to their high carrier frequency in the range of 300 THz, it provides highest data rates of 2.5 Gbps which can be increased to 10 Gbps using Wavelength Division Multiplexing (WDM). FSO link is license free, secure, and easily deployable and offers low bit error rate link. These features motivate to use FSO as a solution to last mile access. Along with these attractive features of FSO, a well-known disadvantage of (FSO) is its sensitivity on local weather conditions which results in loss of optical signal power. In this paper we will discuss performance analysis of FSO in different weather conditions.

Feature Based Method for Human Facial Emotion Detection using Optical Flow Based Analysis

Author: Pooja Sharma                  Published Date: 2011-09-29

Computer has been widely deployed to our daily lives, but human computer interaction still lacks intuition. Researchers intend to resolve these shortcomings by augmenting traditional systems with human like interaction mechanism. Today, dedicated hardware often infers the emotional state from human body measures. These have been a considerable amount of research done into the detection and implicit communication channels, including facial expressions. Most studies have extracted facial features for some specific emotions in specific situations. In this paper we uses a feature point tracking technique applied to five facial image regions to capture basic emotions. The used database contains 219 images, 10 Japanese female, six expressions and one neutral. We use grayscale images which are ethically not diverse. We use optical flow based analysis to detect emotions from human facial image data. Our proof of data demonstrates the feasibility of our approach and shows promising for integration into various applications.

Prostate Boundary Detection from Ultrasound Images using Ant Colony Optimization

Author: Vikas Wasson                  Published Date: 2011-09-29

Prostate Cancer & diseases is quite common in elderly men. Early detection of prostate cancer is very essential for the success of treatment. In the diagnosis & treatment of prostate diseases, prostate boundary detection from sonography images plays a key role. However, because of the poor image quality of ultra sonograms, prostate boundary detection is still difficult & challenging task & no efficient & consistent solution has yet been found. For improving the efficiency, they need is to automate the boundary detection process for which number of methods has been proposed. In this paper, a new method based on Ant Colony Optimization is proposed, which will increase efficiency & minimize user involvement in prostate boundary detection from ultrasound images.

Digital Watermarking Trends

Author: Sarabjeet Singh                  Published Date: 2011-09-29

Digital Watermarking is the technique used by researchers to hide user defined information along with important information that may be visible or invisible depending upon the requirements of the user. Now Digital Watermarking is concerned with the ownership of the information. Absence of Digital Watermark in the information results in loss of revenue. The Digital Watermark packed with the information should be inseparable. This paper will present here the different tr ends that are followed in the digital watermarking.

Secure Data Storage In Cloud Computing

Author: B. Shwetha Bindu                  Published Date: 2011-09-29

Cloud computing has gained a lot of hype in the current world of I.T. Cloud computing is said to be the next big thing in the computer world after the internet. Cloud computing is the use of the Internet for the tasks performed on the computer and it is visualized as the next- generation architecture of IT Enterprise. The ‘Cloud’ represents the internet. Cloud computing is related to several technologies and the convergence of various technologies has emerged to be called cloud computing. In comparison to conventional ways Cloud Computing moves application software and databases to the large data centers, where the data and services will not be fully trustworthy. In this article, I focus on secure data storage in cloud; it is an important aspect of Quality of Service. To ensure the correctness of users’ data in the cloud, I propose an effectual and adaptable scheme with salient qualities. This scheme achieves the data storage correctness, allow the authenticated user to access the data and data error localization, i.e., the identification of misbehaving servers.

Fast IP Network Recovery using MRC

Author: T.K Rajesh                  Published Date: 2011-09-29

Internet takes vital role in our communications infrastructure, due to slow convergence of routing protocols after network failure become a budding problem. To assure fast recovery scheme from link and node failure in networks, we present a new recovery scheme called Multiple Routing Configuration (MRC). Our anticipated scheme guarantees recovery in all single failure scenarios, using a mechanism to handle both link and node failures, and without knowing the root cause of the failure. MRC is strictly connectionless, and assumes only destination based hop-by-hop forwarding. MRC is based on keeping additional routing information in the routers, and allows packet forwarding to continue on an alternative output link immediately after the detection of a failure. In this paper we present MRC, and analyze its performance with respect to load distribution after a failure. We also show how an estimate of the traffic demands in the network can be used to improve the distribution of the recovered traffic, and thus reduce the chances of congestion when MRC is used.

UPDATE: Science Academy Publisher – A curse for academics http://sciacademypublisher.com

Following our recent coverage of Science Academy Publisher (1st coverage), we were flooded with emails, both for and against.

We conducted further investigation and came up with the following.

At this point, the following should be cleared for any one interested about this publisher:

1. The domain name, sciacademypublisher.com, was bought on 17th January 2011.

2. Science Academy Publisher was registered as a company in the UK on 18th January 2011.

3. Being registered as a company and having a domain name does not in any way differentiate from being a good journal and low-quality journal.

4. The commercial publisher Science Academy Publisher deadline to submit a paper is on, for example, 22nd September and authors get notifications on 30th September (for example, visit the International Journal of Research and Reviews in Computer Science (IJRRCS), http://www.sciacademypublisher.com/journals.html). Just in case they change the information after reading this post, we took a snapshot below.


5. Reviewing journal articles in simply 8 days and sometimes less (as reported by several people who send us emails) is clearly an indication of the level of the journal. Quality has been TOTALLY ignored.

6. If you are asking yourself, can I publish my hard written paper and associate my research findings in their repository? The short answer is NO.

It would be absolutely silly, childish, out-of-sense to publish your papers in any of their journals for a few bucks. If you are off for your PhD defence, promotion to associate or professor level, competing for a research grant, applying to a higher prestigious university, then believe it of not, evaluators/reviewers will definitely verify all your existing works and where they got published. We would suggest you to better re-work your paper, make it better and publish it in a respected venue. We are not here to do any favor for any journal in the area of computer science, so it’s up to you to decide where to publish.

7. As we said it before, we are not here to do any favor for any journal, we list and cover only craps with facts.

Wishing all researchers good luck in where they choose to publish, and hopefully avoid damaging your academic career and integrity!

Science Academy Publisher – A curse for academics

Science Academy Publisher – A curse for academics


We recently came across a “publisher”, or better we would say a “one-man show“, here are the list of journals this person proposed to the community. Most of the papers published appears legit and most of them appears to be low quality articles.

As expected, NO REVIEW is done AT ALL. Not sure? Try it by yourself. Send them any paper and wait a few days to receive an email asking you that your paper has been accepted and to pay.

Below are the list of journals that have already been BLACKLISTED in several universities. Publication in these journals have NO VALUE!!!!

Email: sciencepublisher@gmail.com

2079-2557 2011
2046-6447 2011
2046-6439 2011
2046-6188 2011
2046-5122 2011
2046-5130 2011
2046-6897 2011
2047-0037 2011
2046-5106 2011
2046-5718 2011
2046-6501 2011
2046-6412 2011
2046-5149 2011
2046-6234 2011
2046-617X 2011
2046-5157 2011
2046-6404 2011

LIST OF UNREFEREED PAPERS, NO REVIEW, WASTE PUBLICATIONS – Journal of Computer Science and Engineering

Anyone, try this, send them any sort of stupid paper, the journal will accept and will ask you to give MONEY.

Papers published by this journal have no value. The journal is already blacklisted by many universities.

Journal of Computer Science and Engineering
Email: editor.jcse@gmail.com



An Efficient Sampling Algorithm on Data Streams to Improve Closed Frequent Itemsets Mining Algorithms Results [Full Text]

Mohammad Saniee Abadeh and Mansour Tarafdar

Sampling is one of the effective methods in data reduction especially as a preprocessing task for data streams. Regard to the features of data streams, it is essential to introduce a lossless-information sampling algorithm. Despite on several Closed Frequent Itemset mining algorithms presented since now for non-redundant itemsets discovery over transactional data streams, we can improve performance of these algorithms using sampling task.In this paper, we introduce a Closed Frequent Itemset mining based on reservoir sampling algorithm called CFISDS1 in landmark window model of transactional data stream.
This algorithm initiate a concept lattice then, processes the transactions arriving in the stream and updates the concept lattice appropriately in batch form. This incremental update preserve more relevant transaction to closed frequent itemset mining task in reservoir space and extract this sample on demand of user. Experimental evaluations over synthetic datasets and real life datasets demonstrate the scalability of the algorithm. In addition, presented measure shows the efficiency of CFISDS compare to the other transactional data stream sampling algorithms.


Facing the Duplicates in a Greek Hospital Information System [Full Text]

E. Mourtou

Medical informatics has been growing rapidly over the past decades. Due to the advances in new applications in health and wel-fare, vast amounts of patient data are generated every day, and thus critical medical information such as patient records, need to be effec-tively organized and analyzed. Duplicates patient data in Hospital Information Systems (HIS), implies a problematic management of clinical information and prevent the patient data sharing even among healthcare professionals of the same hospital. This paper explores the reasons for duplicates within the HIS and aims to identify them through both deterministic and probabilistic search methods. Certainty levels for matching criteria are specified according to matching weights that are based on several studies that have investigated the matching algo-rithms and on empirical inspection. Query design algorithms are analyzed for both methods and finally a partial linking of patient data has been achieved, through clerical reviews in order to examine whether the possible matches are true. Our research is still in evolution and there is much work to be done to completely and correctly consolidate patient data.


Implementation of Approximate Reasoning Techniques using Vague Logic [Full Text]

Supriya Raheja, Reena Dadhich and Smita Rajpal

Approximate Reasoning using fuzzy logic provides a realistic framework for human reasoning. The concept of vague logic introduced by Gau & Buehrer is the higher order fuzzy logic. Our present work is based on the concept of vague Logic. In this paper we are defining the approximate reasoning implication rules Generalized Modus Ponens (GMP) and Generalized Modus Tollens (GMT) using vague logic. As a special case we are also reducing the concept of GMT and GMP using fuzzy logic with the help of example.


A Hybrid of Simulated Annealing and Fuzzy Data Mining Approach for Concept Extraction from Databases [Full Text]

Ayoub Bagheri, Maryam Zekri and Mohammad-A. Rigi

In the recent decades huge amounts of data have been collected and stored, due to the fact that a lot of useful information is hidden in the data, the companies need tools to find out patterns and regularities. As many of the databases are very large containing a huge number of tuples and attributes, efficient automated tools are necessary for acquiring useful information. In this paper an approach is proposed for extracting useful information from a database using a hybrid of simulated annealing and Fuzzy data mining algorithm. The simulated annealing algorithm is employed to find a set of useful fuzzy
concepts with a good fuzzy support for the output of fuzzy data mining process. Some experiments have demonstrated that our method generates rules of better performance than the common fuzzy grid-based data mining approach.


Spoofing – A threat to Biometric Systems [Full Text]

Kezia R Badhiti and Prof.Sudha Thatimakula

Biometrics is a life measurement mainly used for authentication of the people by identifying and verifying their physiological and behavioral characteristics. False Match Rate (FMR) and False Non-match rate (FNMR) are the two accuracy measures of Biometric Systems. A Biometric solution False Match Rate is the probability that users template will be incorrectly judge to be a match for a different user’s template. A Biometric solution False Non-match Rate is the probability that users template will be incorrectly judge to not match his or her enrollement template. Human Biometric Credentials like Face,
Recognition, Iris Recognition, Voice and Finger cannot be kept secret. With the advancement of technology there is every possibility for the intruders to steal the Biometric credentials and thus create fake and introduce them as real in the Biometric Database, which is a threat to Biometric Systems. This paper gives information on various spoofing attacks and explains the importance of liveness detection of human Biometric traits.


Design and Analysis of Using a Programmable Network Interface for High Speed Networks beyond the 10 Gbps [Full Text]

Mohamed Elbeshti1 , Michael Dixon and Terry Koziniec

The networks speed has been advancing rapidly in providing higher transmission rate 10 Gbps and over. These improvements based on the demand of enhancing the network services, improving their bandwidth and integrating advanced technology. As the speed of networks exceeds 10 Gbps, the design and implementation of high-performance Network Interfaces (NI) for the current and the Next Generation Network (NGN) server applications that employ TCP/IP and UDP/IP as the communication protocol of choice is becoming very challenging. Using the General Purpose Processor (GPP) as a main core processor in the NI to offload the TCP/IP or UDP/IP functions, can deliver some important features to NI such as scalability and short developing time. However, it is not clear that using GPP can support the new speed line over the 10 Gbps. Furthermore, it is necessary to find out the clock rate Hz limit of these GPP in supporting the processing of NIs. In this research, we have proposed a new programmable Ethernet NI (ENI) model design to support the high speed transmission. This model supports the Large Segment Offload (LSO) for sending side and a novel algorithm for receiving side called Receiving Side Amalgamating Algorithm (RSAA). As a result, a 240 MHz RISC core can be used in this Ethernet NI card for a wide range of the transmission line speeds up to 100 Gbps when a jumbo packet assigned as a default size for a network.


Design and Implementation of Extendable Media Streaming Application: Case Study of Windows 2003 Voice Recorder [Full Text]

Ezekiel U. Okike and Ayorinde Afolayan

Any data that changes meaningfully with respect to time can be characterized as time-based media. Such media data can be obtained from a variety of sources, such as local or network files, cameras, microphones, and live broadcasts. A key characteristic of timebased media is that it requires timely delivery and processing such that once the flow of media data begins, there are strict timing deadlines that must be met both in terms of receiving and presenting the data. For this reason, time-based media is often referred to as streaming media and is delivered in a steady stream that must be received and processed within a particular timeframe to produce acceptable results. This study evaluates a streaming medium, the Window’s sound recorder application, investigates the problem of limited recording period of 60 seconds, and implements a Unified Modeling language (UML) based design framework for an extendable media recorder application which overcomes the 60 seconds recording limitation of the system.


Development and Deployment of Fixed Wireless Access in South West Nigeria: Performance and Evaluation [Full Text]

Oluwaranti Adeniran and Achimugu Philip

Fixed Wireless Access (FWA) involves the use of wireless technology to replace copper to connect subscribers to the telephone network. It is a variant of wireless broadband which provides an alternative in the so-called ‘last mile’ connectivity between the subscriber and the fixed telecommunications network. FWA could either be narrowband or broadband and it is predominantly deployed using the Code Division Multiple Access (CDMA) technology. In assessing the extent of development and deployment of FWA, the perspective of the operators and users was elicited primarily through the use of questionnaires. Issues like setup cost, tax, Government incentive, availability of infrastructure and manpower applied to the operators while on the users’ part factors like quality of service, signal strength as well as call rate were considered. The South western zone of Nigeria is regarded as one of the most urbanized regions in the south of Sahara, this is not out of place considering the fact that Lagos which is the nation’s commercial nerve centre and a mega-city is located within this region. The scope of this research covered this very lively part of the country. The relationship between the parameters or variables considered was established using an appropriate statistical method: The Regression analysis. In terms of users’ preference, Global System of Mobile communication (GSM) was compared with FWA. Results were interpreted and suitable conclusions were drawn to wrap up a quite revealing work.


TD-PSOLA Based Emotional Speech Generation [Full Text]

A. Manpreet Kaur and B. Parminder Singh

This paper describes a speech generator system that is able to generate synthetic speech from a natural recorded speech using TD-PSOLA. Generating emotions in speech is an imperative issue of research giving the requirement of modern human-machine interaction systems to produce an emotional speech. This system implements TD-PSOLA (Time Domain Pitch synchronized Overlap-add) algorithm which is a well known technique for high quality pitch and time scale modifications of speech. An important part of this algorithm is pitch marking and prosodic modifications which is used for embedding emotions in speech signals. TD-PSOLA is chosen for adding emotions to natural recorded speech as it has very low complexity and computational cost.


The Impact of Information Technology in Nigeria’s Banking Industry [Full Text]

Oluwagbemi Oluwatolani, Abah Joshua and Achimugu Philip

Today, information technology (IT) has become a key element in economic development and a backbone of knowledge-based economies in terms of operations, quality delivery of services and productivity of services. Therefore, taking advantage of information technologies (IT) is an increasing challenge for developing countries. There is now growing evidence that Knowledge-driven innovation is a decisive factor in the competitiveness of nations, industries, organizations and firms. Organizations like the banking sector have benefited substantially from e-banking, which is one among the IT applications for strengthening the competitiveness. This paper presents the current trend in the application of IT in the banking industries in Nigeria and gives an insight into how quality banking has been enhanced via IT. The paper further reveals that the deployment of IT facilities in the Nigerian Banking industry has brought about fundamental changes in the content and quality of banking business in the country. This analysis and clarification of how Nigerian Banks have used IT to reengineer their operations is detailed through literature review and observation. Three categories of variables that relate to the use and implementation of information technology devices were considered in this paper. These include the nature and degree of adoption of innovative technologies; degree of utilization of the identified technologies; and the impact of the adoption of IT devices on the bank operations.


Development of a Window Based Security System for Electronic Data Interchange [Full Text]

Achimugu Philip, Oluwagbemi Oluwatolani and Abah Joshua

The Electronic Data Interchange (EDI) is the exchange of standardized documents between computer systems for business use. The objective of this study is to make Electronic Data Interchange secure to use and to eliminate human intervention in the transfer of data between business partners so that productivity and efficiency can be improved and also promote its usage between two or more trading organizations. This paper provides an overview of EDI by describing the traditional problems of exchanging information in business environments and how the EDI solves those problems and gives benefits to the company that makes use of EDI. This paper also introduces the common EDI Standards and explains how it works, how it is used over the internet and the security measures implemented. The system was executed on both local area network and wide area network after a critical study of the existing EDI methods and also implemented using VB.Net programming language. Finally, an interactive program was developed that handles the transfer of files, with special attention to the security of the items that are being transferred from one computer workstation to another.

A Scigen Paper accepted by Journal of Telecommunications

This is REAL!!! The journal we have been tracking down  (Journal of Telecommunications, ISSN 2042-8839, http://sites.google.com/site/journaloftelecommunications/ ) some weeks back since many authors contacted us and inform us that it appears that no review was taking place! All they receive is a registration form some days after they submitted their paper asking them to pay 100 UK Pounds. The journal starts publishing in February 2010.

One of our investigator send them a scigen paper entitled “Towards the Development of Interrupts” and receive after 3 weeks an acceptance email from the journal editor editor.telecommunications@googlemail.com informing him that the paper has been accepted for publication in July 2010.

Below is the email received from the journal:

Dear Sir,

We are please to inform you that your paper has been accepted for publication.

Paper title:
Towards the Development of Interrupts

But note that you will have to format your paper according to the paper template found on the journal website under the page Authors guidelines: http://sites.google.com/site/journaloftelecommunications/authorsguidelines

Please find attached the Paper registration form.

You are requested to print this form, fill in the required information, and send a scan copy of it together with a scan copy of the bank transfer transaction to editor.telecommunications@googlemail.com as proof of payment.

The last date of registration is on Wednesday, 14th July 2010 by 18:00 GMT

Please note that you will have to send the copyright agreement form, find a template on the journal website:  http://sites.google.com/site/journaloftelecommunications/authorsguidelines

Thanks and Regards,
Journal of Telecommunications.