GET THE APP

..

Journal of Computer Science & Systems Biology

ISSN: 0974-7230

Open Access

Volume 10, Issue 1 (2017)

Research Article Pages: 185 - 187

MOOC as a Tool for Computer Sciences Academic Staff, Continued Professional Development (CPD) in Hail University, Saudi Arabia

Kawther A Al- Dhlan

DOI: 10.4172/jcsb.1000237

This research work investigates the importance of use MOOCs (Massive Open Online Courses) by academic staff at the faculty of computer sciences at Hail University in Saudi Arabia. However, little is known about how the use MOOCs will be effective for faculty members Continued Professional Development (CPD) in Hail University. The study is based on online data from (Black Board) “e-learning management system” which is used in Hail University. One survey was used to collect the data. The results of the survey show that the importance of using MOOC in the faculty of computer sciences in Hail University, and it arrived to survey results 87.95%. Most of the comments that instructors convinced about interaction in MOOCs. High percent of instructors are convinced with MOOC.

Review Article Pages: 188 - 189

Barcode Currency Notes in Future - Necessity and its Benefits

Manikandakumar K, Gokul Raj K, Chidambaram R, Srikumar R, Vijayakumar R, Naveen Kumar C and Amirthavalli K

DOI: 10.4172/jcsb.1000238

The black money, unaccounted money and fake money are obstacles to fastest-growing economies of a country especially the developing countries like India and reduction in the value of real money. The present study was aimed to propose a new system of advantage of currency notes imprinting with barcode and will it promote the economy of a country. Based on the analysis and review present study concludes that imprinting of barcode in currency notes will be a beneficial step for main economy growth of a country.

Research Article Pages: 190 - 195

A Proposed Lower Computational Complexity Secret Key Mirroring System on GSM

Oyinloye OE, Alese BK, Thompson F and Adetunmbi AO

DOI: 10.4172/jcsb.1000239

Global system for mobile communication is a wireless radio technology used mostly on network communication. It is designed to overcome the challenges of analog communication. GSM evolved from generation 1G to 4G LTE and uses protocols to protect transmissions, which have shown to be susceptible to attacks. This fact has been proven based on several attacks ranging from narrow pipe attack, guess, and determine attacks, side channel attacks, time memory tradeoff attacks and correlation attacks which have high computational complexities. The proposed system called GSM Traffic Monitoring System (GTMS) attempts to proffer a lower computational complexity attack. It uses a key retrieval and passive attack module to handle the mirroring of the secret key authentication procedure given a chosen random challenge on a SIM card through the injection of a malware. This research aims at drawing the attention of network providers- SIM configuration; an area that requires protection from attackers.

Research Article Pages: 196 - 197

Compression of Image with Different File Formats

Abdul Jabbar

DOI: 10.4172/jcsb.1000240

Reducing the size of original data (Image, Audio, or Video) is called Data compression. Data compression is basically a technique in which data is represented with the help of fewer bits. These fewer bits (fewer pixels) will represent the original data as it is represented with the help of larger bits (larger pixels). With the help of lower bits (fewer pixels), the size of the data automatically decrease, it takes less storage space, faster writing and reading, it takes less time during the uploading and downloading. Whether you’re dealing with images, music, or video files, it’s important to understand the difference between different types of formats and when to use them. Using the wrong format could ruin a file’s quality or make its file size unnecessarily large. In this paper, I present a comparison among different image formats in the form of table, so that the user will decide which image format is better to use before using it.

Research Article Pages: 198 - 200

Quantum-Chemical Study of the Propensity of the Amino Acid Pairs for the Peptide Bond Formation

Jumber Kereselidze, George Mikuchadze and Lia Bobokhidze

DOI: 10.4172/jcsb.1000241

The Modern method of quantum chemistry - the density functional theory (DFT) was used to quantitative describe the formation of the peptide bond between amino acid pairs. In particular the formula of parameter of propensity (Kp), which is a function of six variables: the length and order of the CO and NH bonds, (RCO, RNH, PCO PNH), the activation energy for the formation of the peptide bond (ΔE#), and difference between charges of the carbon atom of the carbonyl group and the amino nitrogen atom (Δq) was constructed. By means of the proposed formula the Kp parameter for 400 amino acid pairs was calculated. Among them only 26 amino acid pairs are most likely to take part in the synthesis of proteins that have been selected based on the value of the parameter Kp. This approach may have important meaning for quantitative description of the amino acid sequences in proteins.

Google Scholar citation report
Citations: 2279

Journal of Computer Science & Systems Biology received 2279 citations as per Google Scholar report

Journal of Computer Science & Systems Biology peer review process verified at publons

Indexed In

 
arrow_upward arrow_upward