Horizons in Computer Science Research. Volume 22


Thomas S. Clary (Editor)

Series: Horizons in Computer Science
BISAC: COM014000

This volume includes eight chapters that describe recent advances in computer science research. Chapter One reviews the taxonomy of phishing attacks and focuses on the soft computing-based anti-phishing techniques proposed for identifying phishing websites. Chapter Two gives the basic theory and applications of quantum hypercomputation. Chapter Three presents a method using soft sets for a qualitative assessment of human-machine performance under fuzzy conditions and describes how topological spaces can be extended to fuzzy structures. Chapter Four considers forensic computing, collection of relevant data, and metrology and measurements in the cybernetic system. Chapter Five explores the features of phase change memory and proposes a series of strategies to improve its lifetime. Chapter Six proposes a new method for developing Quality of Service routing applications in Software Defined Networks. Chapter Seven discusses the recent trends of machine learning applications in cosmology and gravitational wave astronomy. Finally, Chapter Eight introduces a write-aware data allocation approach to address the data assignment problem and a bucket-based wear-leveling algorithm for phase-change memory data management.

Table of Contents


Chapter 1. A Systematic Review of Anomaly Based Techniques for Detection of Phishing Attacks
S. Selvakumar1,2 and S. Priya1
Department of Computer Science and Engineering, National Institute of Technology, Tiruchirappalli, Tamil Nadu, India
2Indian Institute of Information Technology, Una, Himachal Pradesh, India

Chapter 2. Quantum Hypercomputation: Basic Theory and Its Applications
Takaaki Musha
Advanced Sci.-Tech. Research Organization, Yokohama, Japan
Foundation of Physics Research Center (FoPRC), Cosenza, Italy

Chapter 3. Application of Soft Sets to Assessment Problems and Topology
Michael Gr. Voskoglou
Graduate Technological Educational Institute of Western Greece, Koukouli,
Patras – Greece

Chapter 4. Digital Forensic Analysis Cybernetic Model and Metalanguage Proposal
D. Delija, G. Sirovatka and D. Tuličić
The University of Applied Science, Zagreb, Croatia

Chapter 5. Lifetime Enhancement for Phase Change Memory
Mengying Zhao, PhD
Department of Computer Science and Technology, Shandong University, Qingdao, China

Chapter 6. SCOR: A Constraint Programming Approach to Software Defined Networking
Siamak Layeghy and Marius Portmann
School of ITEE, The University of Queensland, Australia

Chapter 7.  Machine Learning in Cosmology and Gravitational Wave Astronomy: Recent Trends
Alvina Burgazli, PhD, Olga Sergijenko, PhD and Iryna Vavilova, Prof.
Main Astronomical Observatory of the NAS of Ukraine, Kyiv, Ukraine

Chapter 8. Efficient Data Allocation for PCM in Processing-In-Memory Systems
Yan Wang and Keqin Li
School of Computer Science and Network Engineering, Guangzhou University, Guangzhou, China
Department of Computer Science, State University of New York, New Paltz, New York, US