International Journal of Computing, Science and New Technologies (IJCSNT) https://ijcsnt.com/index.php/IJCSNT <p><strong>INTERNATIONAL JOURNAL OF COMPUTING, SCIENCE AND NEW TECHNOLOGIES (IJCSNT)</strong></p> <p>Welcome to International Journal of Computing, Science &amp; New Technologies (IJCSNT).</p> <p>IJCSNT is a scholarly academic journal which publishes the best in research works. Its mission is to provide an outlet for quality research papers to a global audience. The journal is aimed at publishing papers selected through rigorous double-blind peer review to ensure originality, timeliness, relevance, and readability.</p> <p>The journal publishes articles in the areas of computing, science, engineering, technology, environmental and applied natural science fields. Such fields include computer science, environmental and earth science, software engineering, cyber security, information system, information technology, statistics, mathematics, physics, energy studies, all fields of engineering and technology, surveying and informatics, applied biological sciences, applied chemical sciences, urban and regional planning, agricultural science, etc. We have drawn editors and reviewers from different universities across the five continents, making it to be an international journal. </p> <p>At IJCSNT, we stand strong because we have zero tolerance for plagiarism, and we know that global challenges make way for new innovations, new ways and new talents.</p> <p> </p> <p><strong>CALL FOR PAPER</strong>:</p> <p><strong>ONLINE MARCH 2024 PAPER SUBMISSION</strong>:</p> <p><strong><u>IMPORTANCE NOTICE</u></strong>:</p> <ul> <li>Manuscript Submission: Anytime of the month</li> <li>Acknowledgement Notification: Within 24 hours</li> <li>Acceptance Notification: Within 10 days</li> <li>Online Paper publication: Within 4 days after payment</li> <li>Hard copy Paper publication: <strong>30</strong><strong><sup>th</sup></strong><strong>March, 2024</strong></li> </ul> <p><strong>Submit your latest original research paper to ijcsntjournal57@gmail.com.</strong><strong><br /></strong><strong>You will get response immediately.</strong></p> en-US submissions@ijcsnt.com (Dr. Nwanze David) myrasoftsystems@gmail.com (Dr. Engr. Fidelis C. OBODOEZE ) Mon, 30 Jun 2025 00:00:00 +0000 OJS 3.3.0.7 http://blogs.law.harvard.edu/tech/rss 60 IMPLEMENTATION ANALYSES AND EVALUATION OF SECURITY ALGORITHMS WITH RFID TECHNOLOGY https://ijcsnt.com/index.php/IJCSNT/article/view/17 <p>&nbsp;</p> <p>The rapid advancement of Radio Frequency Identification (RFID) technology has revolutionized the field of automated identification, enabling the efficient and wireless retrieval of data from RFID tags. Despite its widespread adoption, the inherent vulnerabilities associated with RFID systems—such as eavesdropping, snooping, cloning, and unauthorized tracking—necessitate robust security measures to ensure data protection. This paper explores the application of various cryptographic algorithms, including symmetric and asymmetric encryption techniques, within RFID systems to bolster security. In particular, the study emphasizes the implementation of the Advanced Encryption Standard (AES) in RFID technology, addressing the unique challenges of limited processing time, small area, and low power consumption inherent to these systems. By analysing network security algorithms such as DES, AES, RSA, and hash functions like MD5 and SHA-512, this paper aims to evaluate their effectiveness in safeguarding RFID communications. Additionally, it explores integrating digital signatures, email security, and IP security protocols like ESP and AH, contributing to a comprehensive understanding of secure RFID deployments. Through this analysis, the research aspires to propose optimized cryptographic solutions that enhance the security and privacy of RFID systems across various applications.</p> Isizoh A.N., Providence Mathias, Eze Ukamaka J., Ebih U. J. Copyright (c) 2024 https://ijcsnt.com/index.php/IJCSNT/article/view/17 Wed, 02 Jul 2025 00:00:00 +0000 IMPLEMENTATION AND ANALYSES OF DATA MINING TECHNIQUE IN SEARCHING TECHNICAL PUBLICATIONS https://ijcsnt.com/index.php/IJCSNT/article/view/18 <p>Searching for technical literature on the Web is a difficult task because of the large volume and the complex dynamics of technical literatures, and because of the complexity and narrow target of typical queries. The problem is compounded by differences among publication standards and formats used in various fields of knowledge. In this paper, an analysis of several specific solutions that apply or adapt data mining techniques to searching technical publications was made.</p> <p><strong>&nbsp;</strong></p> <p><strong>KEYWORDS:</strong>&nbsp;Search engine, relevance, rank, citations.</p> Eze Ukamaka J., Ebih U. J., Chime K. Martina Copyright (c) 2024 https://ijcsnt.com/index.php/IJCSNT/article/view/18 Wed, 02 Jul 2025 00:00:00 +0000