Vol. 11 No. 2 FEB 2013

Vol. 11 No. 2 February 2013 International Journal of Computer Science and Information Security

Publication February 2013, Volume 11 No. 2 (Download Full Journal) (Archive) (Download 2)

.

Copyright © IJCSIS. This is an open access journal distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

1. Paper 27011307: Smartphones Resources Analysis during Playback of Progressive Video over Wi-Fi (pp. 1-9)

Full Text: PDF

.

Ali H. Mohammed, Dr. Omar A. Ibrahim

Computer Science Dept., College of Computer Science and mathematics, Iraq, Mosul, Mosul University

.

Abstract — This paper presents the implementation of progressive video stream to mobile phone over Wi-Fi channel with different CODECs . J2ME is the language that will be adopted, especially the techniques named (MMAPI) which specialized in multimedia technologies in mobile phones. Moreover, the paper will make an analysis of the CPU and RAM resources due to the effect of these resources when playing progressive video stream in a mobile device. The choice of these two resources is made because they directly affect the mobile performance when dealing with different services, especially when using multitasking extensively. Also the paper will make a power consumption analysis in mobile phone when utilising progressive streaming service due to the fact that mobile phone derives energy from a limited lifetime battery depending on its size and mobile activity. The main components of the architecture are HTTP server, Wi-Fi infrastructure, mobile client-enabled Java working under Symbian OS.

.

Keywords: Progressive video stream, Mobile phone, Wi-Fi, CODEC, J2ME, MMAPI, CPU&RAM , Power consumption , HTTP server, Symbian OS

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

2. Paper 30011308: Knowledge Discovery in Academic Electronic Resources using Text Mining (pp. 10-19)

Full Text: PDF

.

Ojo, Adebola K. & Adeyemo, Barnabas A.

Department of Computer Science, University of Ibadan, Ibadan, Nigeria

.

Abstract - Academic resources documents contain important knowledge and research results. They have highly quality information. However, they are lengthy and have much noisy results such that it takes a lot of human efforts to analyse. Text mining could be used to analyse these textual documents and extract useful information from large amount of documents quickly and automatically. In this paper, abstracts of electronic publications from African Journal of Computing and ICTs, an IEEE Nigerian Computer Chapter Publication were analysed using text mining techniques. A text mining model was developed and was used to analyse the abstracts collected. The texts were transformed into structured data in frequency form, cleaned up and the documents split into series of word features (adjectives, verbs, adverbs, nouns) and the necessary words were extracted from the documents. The corpus collected had 1637 words. The word features were then analysed by classifying and clustering them. The text mining model developed is capable of mining texts from academic electronic resources thereby identifying the weak and strong issues in those publications.

.

Keywords: Text Mining, Academic Journals, Classification, Clustering, Document collection.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

3. Paper 30011309: A Comparative Evaluation of Security Aspects of VoIP Technology (pp. 20-24)

Full Text: PDF

.

Mohd Rahul, Mohd Asadullah, Md Shabbir Hassan, Mohd Muntjir, Ahmad Tasnim Siddiqui

College of Computers and Information Technology, Taif University, Saudi Arabia

.

Abstract — Voice over IP (VoIP) technology is swiftly accepted by consumers, militaries, enterprises and governments. This technology recommend higher flexibility and more features than traditional telephony (PSTN) infrastructures, over and above the potential for lower cost through equipment consolidation, new business models for the consumer market. Voice over IP (VoIP) communications is becoming essential to the corporate world. Possibly, Voice over IP should be viewed as a chance to develop new, more effective security policies, infrastructure and processes. These all new policies and practices can have a positive impact on the security of the entire network not only voice communications. This paper provide starting point for understanding the security facets of VoIP in a rapidly evolving set of technologies that are seeing growing deployment and use. The main goal is to provide a better understanding of the security background with respect to VoIP security facet toward directing future research and in other similar up-and-coming technologies.

.

Keywords— VoIP, ITU-T H.323, Session Initiation Protocol, Media Gateway Control Protocol, Security attacks.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

4. Paper 31011312: An Approach To QoS-Aware Web Service Composition Using Learning Automata (pp.25-29)

Full Text: PDF

.

Ali Mehrpour, Engineering Department, Islamic Azad University, Research and Science Branch, Tehran, Iran

Mir Ali Seyyedi, Engineering Department, Islamic Azad University, Research and Science Branch, Tehran, Iran

Shahrbanoo Majlesi, Engineering Department, Islamic Azad University, Research and Science Branch, Tehran, Iran

.

Abstract — Because of growing number of alternative web services that provide same functionality with different qualities, how to select and composite web services to satisfy user’s end-to-end constraints is a decision problem. In this paper we have proposed an approach for web service composition based on quality parameters using learning automata consists of two steps: Step1) Stochastic Learning Automata for local selection and Step2) Distributed Learning Automata for global optimization to create composite web service. We have applied these to kind of Learning Automata as a part of Broker in Web Service Architecture. Experimental evaluations show our approach can be applied in dynamic web environment with an acceptable performance without any limitation on number of QoS parameters.

.

Keywords-component; Quality of Service (QoS); Web Service Composition (WSC); Stochastic Learning Automata (SLA); Distributed Learning Automata (DLA); Web Service Architecture

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

5. Paper 31011317: Demonstration of the Functioning of TCP Protocol Used for Network Congestion Control (pp. 30-35)

Full Text: PDF

.

Asagba Prince Oghenekaro (1); Anucha Udo Sylvester (1); Ogini Nicholas Oluwole (2)

(1)Faculty of Science, Department of Computer Science, University of Port Harcourt, Port Harcourt, PMB 5323, Choba, Rivers State, Nigeria

(2)Faculty of Science, Department of Mathematics and Computer Science, Delta State University, Abraka, Delta State, Nigeria

.

Abstract — Congestion can occur when the quality of service in a network reduces as a result of a node or link conveying too many data. TCP is the most widely used protocol for Internet traffic, including email, web browsing, data and an increasing portion of multimedia content delivered in real time using the HTTP/TCP protocols. Performances of existing TCP congestion control algorithms degrade significantly when deployed over wireless networks. TCP was designed primarily for reliability as opposed to real time delivery, but the problem is particularly severe for real time applications, such as, HTTP/TCP based streaming. In this paper, we carried out a research on the TCP’s four related congestion control algorithms, namely: slow-start, congestion avoidance, fast retransmit and fast recovery. We studied the behaviour and implementation of slow-start and congestion avoidance algorithms, as well as the modifications to the fast retransmit and fast recovery. We used the OPNET Network Model as our methodology. The TCP performance on the network was modeled, first without background traffic and then with background traffic. We compared these algorithms using the same network model to deterministically check several scenarios; and simulations were conducted to ascertain the differences between the congestion control algorithms studied and OPNET’s software. The results gotten showed that using different algorithms, traffic could actually be fine tuned in the network being modeled so as to achieve higher Performance. The adjustments were done in the OPNET simulator.

.

Keywords - TCP Protocols; Congestion control algorithms;Network; Acknowledgment (ACK); OPNET Network

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

6. Paper 31011318: Change Management Strategies and Processes for the successful ERP System Implementation: A Proposed Model (pp. 36-41)

Full Text: PDF

.

Abdullah Saad AL-Malaise AL-Ghamdi

Department of Information Systems, Faculty of Computing and Information Technology, King Abdul Aziz University

.

Abstract— Recent advancement in information technology and business development, the business organizations turned towards the adoption of advanced information technology systems for their organizational setup. Progression of technologies in business environment has been observed in many organizations by the initiation of enterprise resource planning (ERP) system implementation. ERP is business integrated information system software that attracts the attention of business organizations in order to improve their business processes and achieve the company’s goals. Almost all the ERP system implementation is based on change management system, where the traditional/ legacy system is completely replaced with the new and advance system. This paper will discuss the change management strategies and processes for the success of ERP system implementation. The paper has proposed a model, change management strategies and processes for the successful ERP system implementation that will strengthen the scope of the title of this paper.

.

Keywords-component; Change Management, IT, ERP, User Reaction, System, Implementation Process

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

7. Paper 21011302: Securing AODV with Authentication Mechanism using Cryptographic Pair of Keys (pp. 42-45)

Full Text: PDF

.

K. Suresh Babu, K. Chandra Sekharaiah

School of IT, JNT University Hyderabad, India

.

Abstract -- Mobile Ad Hoc Networks (MANETs) is characterized by self–organizing capability, dynamically configurable infrastructure and multihops. Of late, MANETs form emerging state-of-the-art networking technology faster. The routing protocol plays an important role in it overall operation of MANETs. AODV is one of MANET routing protocol. In this paper, the vulnerabilities in MANETs and security flaws in AODV are discussed. A new security mechanism for securing AODV with message digest authentication using a pair of keys (public key cryptography) is proposed and implemented in NS - 2 simulator.

.

Keywords – Self-organizing; multihops; authentication; public key

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

8. Paper 27011306: An Overview of Wireless Local Area Networks (WLAN) (pp. 46-53)

Full Text: PDF

.

Ibrahim Al Shourbaji, Computer Networks Department, Jazan University, Jazan 82822-6649, Saudi Arabia

.

Abstract - Wireless Communication is an application of science and technology that has come to be vital for modern existence. From the early radio and telephone to current devices such as mobile phones and laptops, accessing the global network has become the most essential and indispensable part of our lifestyle. Wireless communication is an ever developing field, and the future holds many possibilities in this area. One expectation for the future in this field is that, the devices can be developed to support communication with higher data rates and more security. Research in this area suggests that a dominant means of supporting such communication capabilities will be through the use of Wireless LANs. As the deployment of Wireless LAN increases well around the globe, it is increasingly important for us to understand different technologies and to select the most appropriate one . This paper provides a detailed study of the available wireless LAN technologies and the concerned issues ,will give a brief description of what wireless LANs are ,the need of Wireless LAN ,History of wireless LAN , advantages of Wireless Networks ,with summarizing the related work on WLAN in academic area , Wireless LAN technologies , some risks attacks against wireless technologies , suggesting some recommendations to protect wireless LAN network from attack , Finally we propose some research issues should be focused on in the future.

.

Keywords: Wireless Networking, Security, 802.11 Standard, Network security,

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

9. Paper 31011319: Ambient Noise Coherence Properties Detection for various Hydrophone Spacing (pp. 54-59)

Full Text: PDF

.

V.G.Sivaumar, Department of ECE, Sathyabama University, Chennai, India

Dr.V.Rajendran, Department of Physics/Ece, SSN College of Engineering, Chennai, India

.

Abstract — Ambient noise is a complex and important phenomenon which greatly affects the listening capacity of instruments in underwater environment. The ambient noise in sea is the overall combination of wind speed, wave speed, wave height, barometric pressure, dew point, temperature, marine life, shipping traffic and seismic activities. The present work concentrates on coherence with various hydrophone spacing. Under water ambient noise analysis is essential to enhance the Signal to Noise Ratio (SNR) of acoustic based underwater instruments. This paper investigates the effect of noise spectrum over a different hydrophone spacing and the signal coherence with hydrophone spacing is examined in the Bay of Bengal Sea region.

.

Keywords-component; Ambient noise; Noise Level; Wind speed; Coherence.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

10. Paper 31011313: Adaptive Iris Localization and Recognition: Modification On Daugman’s Algorithm (pp. 60-72)

Full Text: PDF

.

Marwan AL-abed Abu-zanona, Department of Computer Science, Imam Muhammad Ibn Saud Islamic University, KSA

Bassam M. El-Zaghmouri, Department of Computer Information Systems, Jerash University, Jordan

.

Abstract — the use of biometric information has been widely known for both people identification and security application. It is common knowledge that each person can be identified by the unique characteristics of one or more of biometric features. One most unique and identifiable biometric characteristics is the iris, wherever the second is the voice, and the third is finger print. This research attempts to apply iris recognition techniques based on the technology invented by Dr. John G. Daugman, an attempt of implementing a build an end user application. Iris Recognition is expected to play a major role in a wide range of applications in which a person's identity must be established or confirmed in high reliability and high privacy, Including access controls, authorizations, ID detection, etc. This research depends on standard iris images was token from CASIA database. The most efficient computer language for simulation and technical computing (MATLAB) will be used to make the problem statement and result in addition to mathematical and AI modelling more easier and reliable.

.

Keywords— Image Processing; Iris; Localization; Biometrics; Gradient

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

11. Paper 31071240: Design and Implementation of Security Framework for Cognitive Radio Networks Resource Management (pp. 73-78)

Full Text: PDF

.

Obeten O. Ekabua & Ifeoma U. Ohaeri

Department of Computer Science, North-West University, Mafikeng Campus, Private Bag X2046, Mmabatho 2735, South Africa

.

Abstract --- Designing and implementing a secure communication for any network is an important issue for the optimal control of resource usage in a resource constrain network environment. Therefore, in this paper, we design and implement a joint authentication and authorization framework by transforming the framework requirement analysis. The framework is a security infrastructure capable of monitoring and controlling access to the limited spectrum resources, dynamically managing data and information in CRN, for a secured communication and quality of service (QOS). We explained how the various components in the framework interact to ensure a secured communication and effective access control.

.

Keywords--Network Management; security; authentication; authorization; access control.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------