Vol. 10 No. 7 JUL 2012

Vol. 10 No. 7 July 2012 International Journal of Computer Science and Information Security

Publication July 2012, Volume 10 No. 7 (Download Full Journal) (Archive) (Download 2)

.

Copyright © IJCSIS. This is an open access journal distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

1. Paper 24061207: A Low Cost PC-Controlled Electronic-Display Board (pp. 1-4)

Full Text: PDF

.

M. G. Golam Faruque, Bangladesh Computer Council, Dhaka, Bangladesh

Shamim Ahmad, Dept. of Computer Scienec and Engineering, Rajshahi University, Rajshahi, Bangladesh

.

Abstract — This paper describes the development of a computer controlled electronic display-board by using a low cost older personal computer (PC) that has become almost unusable otherwise. This display system is capable to display the information as an independent system in the manner that can be dynamically programmed by the computer. A local control system, memory-subsystem has been developed to make it to work as an independent system.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

2. Paper 30061215: An Approach be Operational Security in 3 and 4 Phases of Developing Software Systems (pp. 5-11)

Full Text: PDF

.

Saman Aleshi, Dept. Department of Electrical and Computer, Islamic Azad University, Zanjan Branch, Zanjan, Iran

Nasser Modiri, Dept. Department of Electrical and Computer, Islamic Azad University, Zanjan Branch, Zanjan, Iran

Hossein Fruzi, Dept. Department of Electrical and Computer, Islamic Azad University, Zanjan Branch, Zanjan, Iran

.

Abstract - Security in today's software applications because raw data acquisition system at the lowest level, the position is very important however, part of the development application under consideration is the security and therefore also delirium costs have to using and user. Security is essential in software development because the resource is protected to the integrity, availability and privacy of data guarantee. There are different models and standards for information security. PSSS is one of those models specialized for providing security tasks in PSSS, as an efficient software security model, in order to map in along with other security models and standard for 3 and 4 phases of software development, ensuring safety of task performance in the phases.

.

Keywords - IT (Information Technology), IT security, Security Models and Standards and their limitations.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

3. Paper 30061225: Analysis & Selection of Requirements Elicitation Techniques for OSSD (pp. 12-22)

Full Text: PDF

.

Munazza Ishtiaq, Fareeha Choudhry, Fahim Ashraf Awan, Aasia Khanum

Department of Computer Engineering, College of Electrical & Mechanical Engineering, National University of Sciences and Technology (NUST), Rawalpindi, Pakistan

.

Abstract — Open Source Software development (OSSD) is unlike traditional software development in many aspects. Requirements elicitation is the most critical phase in software development as it is the basis for developing software. The requirements elicitation phase in OSSD is different from traditional software development process and somehow a difficult process as the developer is the only person that has to elicit the requirements and then make the software open for review from the user community. The users can add or modify the product according to their own needs and requirements. The focus of this paper is on the requirements elicitation phase and elicitation techniques for open source software development. In this paper, requirements elicitation phase model for OSSD is proposed as well as best suited requirements elicitation techniques for OSSD are discussed and a framework for choosing and comparing these techniques is developed and the selected techniques for OSS are analyzed in the context of the criteria mentioned in the framework. A formula is proposed using the framework and the proposed model for the requirements elicitation process and selection of techniques for OSSD.

.

Keywords — framework, OSSD, requirements elicitation process model, requirements elicitation techniques, traditional software development

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

4. Paper 30061229: Log Analysis Techniques using Clustering in Network Forensics (pp. 23-30)

Full Text: PDF

.

Imam Riadi, Faculty of Mathematics and Natural Science, Ahmad Dahlan University, Yogyakarta, Indonesia

Jazi Eko Istiyanto & Ahmad Ashari, Subanar, Faculty of Mathematics and Natural Sciences, Gadjah Mada University, Yogyakarta, Indonesia

.

Abstract — Internet crimes are now increasing. In a row with many crimes using information technology, in particular those using Internet, some crimes are often carried out in the form of attacks that occur within a particular agency or institution. To be able to find and identify the types of attacks, requires a long process that requires time, human resources and utilization of information technology to solve these problems. The process of identifying attacks that happened also needs the support of both hardware and software as well. The attack happened in the Internet network can generally be stored in a log file that has a specific data format. Clustering technique is one of methods that can be used to facilitate the identification process. Having grouped the data log file using K-means clustering technique, then the data is grouped into three categories of attack, and will be continued with the forensic process that can later be known to the source and target of attacks that exist in the network. It is concluded that the framework proposed can help the investigator in the trial process.

.

Keywords: analysis, network, forensic, clustering, attack

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

5. Paper 30061230: A Comparative Study between Using OWL Technology and Jess Rule Based For Applying Knowledge to Agent Based System (pp. 31-37)

Full Text: PDF

.

Najla Badie Aldabagh & Ban Sharief Mustafa, Computer Sciences Department, Mosul University Iraq, Mosul

.

Abstract — The Semantic Web is an extended to the current web where web resources can be manipulated and processed intelligently. User query is semantically analyzed and respond to in intelligent way. A set of technologies are developed to serve this requirement, including Resource Description Framework (RDF), Schema RDF and Web Ontology Language (OWL). Java Agent Development Framework (JADE) is a software framework to make easy the development of multi agent applications in compliance with The Foundation for Intelligent Physical Agents (FIPA) specifications. Several approaches for building knowledge model for JADE agent can be found. The most promising approach is using OWL ontology based knowledge representation which is one of the main standards for the Semantic Web proposed by World Wide Web Consortium (W3C), and it is based on description logic. Representing knowledge based on ontology provides many benefits over other representations. The other traditional approach is using conventional rule engine (normally production rule engine). Jess is a familiar rule engine and scripting environment written entirely in Sun’s java language. Jess gives the capability for building Knowledge in the form of declarative rules and facts, and reason about it. Also Jess can be integrated efficiently with a JADE agent. In this paper, A comparative study is held between the above two approaches. An example is implemented to show the tools and steps required in each way and to show the expressivity power of the ontology based over the traditional one.

.

Keywords-component; Java Agent Development Framework (JADE); Web Ontology Language (OWL); Jess; Knowledge Representation; Description Logic (DL).

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

6. Paper 30061233: Modeling and Control of CSTR using Model based Neural Network Predictive Control (pp. 38-43)

Full Text: PDF

.

Piyush Shrivastava, Electrical& Electronics Engineering Department, Takshshila Institute of Engineering & Technology, Jabalpur, Madhya Pradesh, India

.

Abstract — This paper presents a predictive control strategy based on neural network model of the plant is applied to Continuous Stirred Tank Reactor (CSTR). This system is a highly nonlinear process; therefore, a nonlinear predictive method, e.g., neural network predictive control, can be a better match to govern the system dynamics. In the paper, the NN model and the way in which it can be used to predict the behavior of the CSTR process over a certain prediction horizon are described, and some comments about the optimization procedure are made. Predictive control algorithm is applied to control the concentration in a continuous stirred tank reactor (CSTR), whose parameters are optimally determined by solving quadratic performance index using the optimization algorithm. An efficient control of the product concentration in CSTR can be achieved only through accurate model. Here an attempt is made to alleviate the modeling difficulties using Artificial Intelligent technique such as Neural Network. Simulation results demonstrate the feasibility and effectiveness of the NNMPC technique.

.

Keywords - Continuous Stirred Tank Reactor; Neural Network based Predictive Control; Nonlinear Auto Regressive with eXogenous signal.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

7. Paper 30061235: Visualization for levels of animal diseases by integrating OLAP and GIS (pp. 44-50)

Full Text: PDF

.

Prof. Hesham Ahmed Hassan, Faculty of Computer and Information, Cairo University, Giza, Egypt

Dr. Hazem El-Bakry, Faculty of Computer and Information, Mansoura University, Mansoura, Egypt

Mr. Hamada Gaber Abd Allah, Faculty of Computer and Information, Cairo, Egypt

.

Abstract 0- Animal diseases have constituted a major problem in many developing and developed countries. There are different limitations for the existing computer systems to meet the required information and analytical capabilities for a better decision in the Egyptian animal production domain. This paper presents an approach for helping policy/decision makers to improve animal production in Egypt. The paper integrates Online Analytical Processing (OLAP), Geographical Information System (GIS), Spatial Analysis functions and Multicriteria Decision Analysis (MCDA) capabilities to develop a Spatial Decision Support System (SDSS). The main aim of this study is to generate a composite map for decision makers by using some effective factors affect animal production in Egypt. We visualize and analyze different factors such as "Diseases", "Climate", "Soil Pollution", "Veterinary care" and "Economical factors" which affect the animal production in Egypt. The paper takes in consideration influence of each factor because importance and influence of each factor differs according policy/decision makers point of view.

.

Keywords: Geographical Information System (GIS),Multicriteria Decision Analysis (MCDA), Online Analytical Processing (OLAP), Spatial Analysis and Spatial Decision Support System (SDSS).

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

8. Paper 30061237: The Agents scrutiny at Protocol Stack in NIDS (pp. 51-57)

Full Text: PDF

.

Mr. M. Shiva Kumar, Dept. of CSE/Karpagam University/Coimbatore/T.N,

Dr. K. Krishnamoorthy, Dept. of CSE/ Kuppam Engineering College/Kuppam/A.P

.

Abstract - The Research on the betterment of IDS and IPS is an avalanche process wherein each footstep paves way for new research work. In this regard This paper is a survey sheet on my research with respect to the implementation of Agents in the NIDS, first the paper depicts the OSI, later the impact of NIDS and the implementation of Agents in NIDS and it give a overview of the role of Agents in Basic Security Model and OSI reference and TCP/IP Model

.

Keywords : IDS,IPS,NIDS,TCP,IP,OSI.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

9. Paper 30061241: Analytical study to Measure Employee satisfaction in Jordan e-government applications E- Diwan Project- in prime minister office in Jordan (pp. 58-62)

Full Text: PDF

.

Bashar H. Sarayreh, Management Information Systems Department, Information Technology College, Arab Academy for Banking and Financial Sciences, Amman Jordan

Mohamad M. Al-Laham, Al-Balqa Applied University, Amman University College, MIS Department , Amman, Jordan

.

Abstract— there is a tremendous need by governments around the world to take advantage of the information revolution particularly the field of Enterprise resource planning and E-government in ordered to attain the optimum method of recourses investment. Traditionally e-government development is organized in to different phases (requirements, analysis, design, implementation, testing and maintenance). To assess whether e-government models we implementing meets all different user requirements in order to increase user performance. E-government model with a large diversity of users suffer from failures to satisfy heterogeneous requirements. A solution for this damaging situation is by deeply and in detail studying and analyzing user satisfaction factors. The future development try to avoid such unsatisfied factors which disturb user and minimized there performance. E-government is considered as hot topic tackled by many researchers as it is considered as future fact especially for the developing countries. This research introduces a case study: Analytical study to Measure Employee satisfaction in Jordan e-government applications: E- Diwan Project- in prime minister office in Jordan.

.

Keywords: e-government, Satisfaction, E-Diwani, ERP

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

10. Paper 30051215: Bio-thentic Card: Authentication Concept For RFID Card (pp. 63-68)

Full Text: PDF

.

Ikuesan Richard Adeyemi, Dept. computer science and information system, Universiti Teknologi, Malaysia, Johor Bahru, Malaysia

Norafida Bt, Ithnin, Dept. computer science and information system, Universiti Teknologi, Malaysia, Johor Bahru, Malaysia

.

Abstract - Radio frequency identification (RFID) is a technology that employs basic identifier of an object embedded in a chip, transmitted via radio wave, for identification. An RFID Card responds to query/interrogation irrespective of ‘Who’ holds the Card; like a key to a door. Since an attacker can possess the card, access to such object can therefore be easily compromised. This security breach is classified as an unauthorized use of Card, and it forms the bedrock for RFID Card compromise especially in access control. As an on-card authentication mechanism, this research proposed a concept termed Bio-thentic Card, which can be adopted to prevent this single point of failure of RFID Card. The Bio-thentic Card was fabricated, tested and assessed in line with the known threats, and attacks; and it was observed to proffer substantive solution to unauthorized use of RFID Card vulnerability.

.

Key words: Vulnerability, unauthorized, mitigation, authentication, communication, access control system

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

11. Paper 26061209: ARP Cache Poisoning Attack and Detection (pp. 69-79)

Full Text: PDF

.

Fatimah mohammed Al-Qarni, Computer Science and Engineering, Yanbu University College