Journal of
Systemics, Cybernetics and Informatics
HOME  |   CURRENT ISSUE   |   PAST ISSUES   |   RELATED PUBLICATIONS     IIIS   |   SEARCH     CONTACT US
 


ISSN: 1690-4524 (Online)


Indexed by
EBSCO, Cabell, DOAJ (Directory of Open Access Journals), Academic Journals Database, and Google Scholar


Listed in
Cabell Directory of Publishing Opportunities and in Ulrich’s Periodical Directory


Re-Published in
Academia.edu
(A Community of about 10.000.000 Academics)


Editorial Advisory Board's Chair
William Lesso

Editor-in-Chief
Nagib C. Callaos


Sponsored by
The International Institute of
Informatics and Systemics

www.iiis.org

 

Editorial Advisory Board

Journal's Reviewers
 

Description and Aims

Submission of Articles

Areas and Subareas

Information to Contributors

Editorial Peer Review Methodology


Information Management Processes for Extraction of Student Dropout Indicators in Courses in Distance Mode
Renata Maria Abrantes Baracho, Paloma de Albuqyerque Diesel
(pages: 1-6)

Tools for Teaching Mathematical Functions and Geometric Figures to Tactile Visualization through a Braille Printer for Visual Impairment People
Lorena León, Luiz Cesar Martini, Cristhian Moreno-Chaparro
(pages: 7-10)

A Project-Based Language Learning Model for Improving the Willingness to Communicate of EFL Students
Ibrahim Farouck
(pages: 11-18)

Educating Future Coders with a Holistic ICT Curriculum and New Learning Solutions
Pia Niemelä, Cristiano Di Flora, Martti Helevirta, Ville Isomöttönen
(pages: 19-23)

Challenges with Ethical Behavior and Accountability in Leadership
Laura Thompson
(pages: 24-29)

Biotreatment of Slaughterhouse Wastewater Accompanied with Sustainable Electricity Generation in Microbial Fuel Cell
Zainab Z. Ismail, Ali J. Mohammed
(pages: 30-35)

Towards to a Predictive Model of Academic Performance Using Data Mining in the UTN - FRRe
David L. La Red Martínez, Marcelo Karanik, Mirtha Giovannini, Reinaldo Scappini
(pages: 36-41)

SIGMATA: Storage Integrity Guaranteeing Mechanism against Tampering Attempts for Video Event Data Recorders
Hyuckmin Kwon, Seulbae Kim, Heejo Lee
(pages: 42-47)

Hypertextuality in the Alexander von Humboldt Digital Library
Detlev Doherr, Andreas Jankowski
(pages: 48-53)

The Time Diagram Control Approach for the Dynamic Representation of Time-Oriented Data
Rolf Dornberger, Darjan Hil, Johann Wittwer, Pascal Bürgy
(pages: 54-60)

Q-Learning Multi-Objective Sequential Optimal Sensor Parameter Weights
Raquel Cohen, Mark Rahmes, Kevin Fox, George Lemieux
(pages: 61-66)

Multi-User Virtual Reality Therapy for Post-Stroke Hand Rehabilitation at Home
Daria Tsoupikova, Kristen Triandafilou, Greg Rupp, Fabian Preuss, Derek Kamper
(pages: 67-71)

Adding agility to Enterprise Process and Data Engineering
Sergey Zykov, Pavel Shapkin, Nikolay Kazantsev, Vladimir Roslovtsev
(pages: 72-77)

Automatic Parallelization Tool: Classification of Program Code for Parallel Computing
Mustafa Basthikodi, Waseem Ahmed
(pages: 78-82)

Securing Information Systems in an Uncertain World Enterprise Level Security (Invited Article)
William R. Simpson
(pages: 83-90)


 

Abstracts

 


ABSTRACT


A User Authentication Based on Personal History- A User Authentication System Using E-mail History -

Masakatsu Nishigaki, Makoto Koike


This paper proposes a user authentication using personal history of each user. Here, authentication is done by giving answers to questions about the history of user’s daily life. Users do not have to memorize any password, since the passwords are what users already know by experience. In addition, everyday-life experience increases day by day, and thus the question could change on every authentication trial. In this paper, a user authentication system using user’s e-mail history is shown as a prototype of our proposal, and some basic experiments to evaluate the availability of the system are carried out.

Full Text