Loading [MathJax]/extensions/MathZoom.js
Karin Rojas - IEEE Xplore Author Profile

Showing 1-25 of 28 results

Filter Results

Show

Results

Identifying fake news has become an increasingly challenging task in recent years, with the proliferation of digital media and the ease of spreading misinformation. The problem has only become more complex with the global pandemic situation, as false information about COVID-19 can have serious consequences for public health and safety. Fortunately, the same technological advancements that have mad...Show More
Technological improvements have been exponential in the last two decades. The advancements in networking, fog computing, and artificial intelligence have allowed us to implement the "Internet of Things" starting from small sensors connected to the Internet to enormous "smart cities". However, what is common in all of these improvements is that without data, and more precisely correct data, they wo...Show More
Smart grids with their advanced communication capabilities and sensing methodologies introduce a smart manner for energy management systems. In fact, the fast development of smart grid technologies provide an advanced control over the energy offered and consumed by the suppliers and the consumers of the electricity, respectively. The growing usage of electricity is leading to an increased demand o...Show More
The high competition among various companies in software development enforces strict metrics to measure the quality of software produced and enhance its performance while evaluating the cost carried out to apply those metrics. This comes along with critical demands such as safety, accuracy, availability, scalability and durability. One of the key principles to ensure such metrics is to consider in...Show More
Uncovering the dynamics of community structures in complex networks helps us to explore how such community structures change over time. But, understanding these structures is very challenging, especifically in dynamic complex networks where network structure changes frequently and interaction between the individuals changes over time. Recently, many dynamic community detection algorithms have been...Show More
Mutation testing is a fault based testing technique which examines the adequacy of test cases by generating faulty programs, called mutants, to be run against them. However, one of the pitfalls of mutation testing is its high computational cost, rendering it impractical for industry use. In this survey, we study mutation generation techniques, cost reduction methods and test-data generation approa...Show More
Service Oriented Architecture (SOA) provides a high level structure and related facets for developing service oriented system (SOS). In recent days, various SOA modelling approaches, such as set theoretic and graph, have been proposed. These approaches hinder the scalability in the design of large scale SOS. In such system, the computational complexity is increasing due to the multiple numbers of ...Show More
Providing clients with high quality web applications has long been a major concern for web developers especially with the increased diversity of web frameworks and functionalities. In the past years, several tools and methodologies have been used for evaluating and measuring the quality of web services. One of the ways of guaranteeing high quality applications is done through testing. Testing is a...Show More
The Knapsack Problem (KP) is one of the most studied combinatorial problems. There are many variations of the problem along with many real life applications. KP seeks to select some of the available items with the maximal total weight in a way that does not exceed a given maximum limit L. Knapsack problems have been used to tackle real life problem belonging to a variety of fields including crypto...Show More
Security has always been a privilege for governments and banks, from the old Egyptian civilization to the latest technologies. Nowadays, security has become an essential part in our daily life; from protecting mobile chats to bank accounts to confidential data. It is everywhere due to the huge amount of data stored and transmitted over public and unsecure networks. On the other hand, computers are...Show More
As communication becomes more and more an integral part of our daily lives, so does our need to access more and more information. Mobility is currently one of the most important factors to consider in our aim to achieve ubiquitous computing, and with it rises the problem of how to manipulate data while maintaining consistency and integrity. This paper presents a comparative analysis of mobile data...Show More
Databases are always the main target of attackers because they contain the critical data of organizations. Although prevention techniques are available, the history of system break-ins guarantees that there is no foolproof technique that totally eliminates security loopholes in a computer system. Hence, efficient damage assessment and recovery techniques are needed. Traditional methods require sca...Show More
Since the day the Internet became a common and reliable mechanism for communication and data transfer, security officers and enthusiasts rallied to enforce security standards on data transported over the globe. Whenever a user tries communicating with another recipient on the Internet, vital information is sent over different networks until the information is dropped, intercepted, or normally reac...Show More
Since the day the Internet became a common and reliable mechanism for communication and data transfer, security officers and enthusiasts rallied to enforce security standards on data transported over the globe. Whenever a user tries communicating with another recipient on the Internet, vital information is sent over different networks until the information is dropped, intercepted, or normally reac...Show More
With the advancement of Internet technology, securing information systems from electronic attacks has become a significant concern. With all the preventive methods, malicious users still find new ways to overcome the system security and access and modify sensitive information. To make the process of damage assessment and recovery fast and effective (not scanning the entire log), researchers have p...Show More
Information systems security defines three properties of information: confidentiality, integrity, and availability. These characteristics remain major concerns throughout the commercial and military industry. In this work, we focus on the security aspect of commercial security applications by exploring the nature and scope of the famous security policy - the Role Based Access Control Policy. We mo...Show More
Design Patterns (DPs) recently took over software development by storm. Object oriented development, workflows and distributed computing are a few of the disciplines where DPs made a significant difference in delivery speed and product quality. Unfortunately, databases had not yet attracted the attention of DP designers. This work benefits from the growing popularity of open source-data centric an...Show More
Multitasking in both uniprocessor (multithreading) and multiprocessor (multiprocessing) systems have been attracted by many applications. Database systems are somewhat the most important in this regard, especially in centralized and humongous ones. Sometimes thousands, and maybe hundred of thousands of operations are sent to the transaction processing system per second. To handle this bottleneck s...Show More
As communication becomes more and more an integral part of our day to day lives, so our need to access information increases as well. Mobility is currently one of the most important factors to consider in our aim to achieve ubiquitous computing, and with it raises the problem of how to manipulate data while maintaining consistency and integrity. Recent years have seen tremendous interest in quorum...Show More
SWIFT is a financial institution, which provides an interface for banks in order to communicate and transfer money worldwide. These banks, together with their branches incur significant expenses including security infrastructure, SAA package license, yearly maintenance, and message costs. Banks always look for a good investment and the swift routing protocol does not deal with intra bank message p...Show More
A powerful and practical public-key and digital signature scheme was produced by ElGamal. ElGamal public-key and digital signature scheme were modified from the domain of natural integers, Z, to the domains of Gaussian integers, Z[i], and polynomials over finite fields, F[x]. We implement the classical and modified ElGamal digital signature scheme to compare and to test their functionality, reliab...Show More
Secure Socket Layer (SSL) is a cryptographic protocol widely used to make a secure connection to a Web server. SSL uses three interdependent cryptographic functions to perform a secure connection. The first function is authentication. It is used to allow the client to identify the server and optionally allow the server to identify the client. The most common cryptographic algorithm used for this f...Show More
Mobile ad-hoc networks are becoming more popular as the use of mobile computers is increasing. The biggest challenge facing such networks is continuous and random change in the topology. Table driven routing protocols where not designed for such networks. For this reason new routing protocols that can handle continuous change of topology where created. Two popular protocols are Dynamic Source Rout...Show More
Summary form only given. Our work demonstrates the process of extracting the temporal references from the texts. This procedure is highly dependable on the stemming process. A list of all the temporal references is used. The type of the temporal word decides the procedure to treat this word and gives the importance of this temporal reference. These conditions, with the help of the stemmer, produce...Show More
Summary form only given. In 1985 a powerful and practical public-key scheme was produced by ElGamal; his work was applied using large prime integers. El-Kassar et al. and El-Kassar and Haraty modified the ElGamal public-key encryption scheme from the domain of natural integers, Z, to two principal ideal domains, namely the domain of Gaussian integers, Z[i], and the domain of the rings of polynomia...Show More