Vol. 11 No. 5 MAY 2013

Vol. 11 No. 5 MAY 2013 International Journal of Computer Science and Information Security

Publication MAY 2013, Volume 11 No. 5 (Download Full Journal) (Archive) (Download 2)

.

Copyright © IJCSIS. This is an open access journal distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

1. Paper 26041306: Selection Mammogram Texture Descriptors Based on Statistics Properties Back Propagation Structure (pp. 1-5)

Full Text: PDF

.

Shofwatul ‘Uyun, Department of Informatics, Faculty of Science and Technology, Sunan Kalijaga State Islamic University, Yogyakarta, Indonesia

.

Sri Hartati (2), Agus Harjoko (2), Subanar (3)

(2) Department of Computer Science and Electronics,

(3) Department of Mathematics,

(2,3) Faculty of Mathematics and Natural Sciences,

Gadjah Mada University, Yogyakarta, Indonesia

.

Abstract — Computer Aided Diagnosis (CAD) system has been developed for the early detection of breast cancer, one of the most deadly cancer for women. The benign of mammogram has different texture from malignant. There are fifty mammogram images used in this work which are divided for training and testing. Therefore, the selection of the right texture to determine the level of accuracy of CAD system is important. The first and second order statistics are the texture feature extraction methods which can be used on a mammogram. This work classifies texture descriptor into nine groups where the extraction of features is classified using backpropagation learning with two types of multi-layer perceptron (MLP). The best texture descriptor as selected when the value of regression 1 appears in both the MLP-1 and the MLP-2 with the number of epoches less than 1000. The results of testing show that the best selected texture descriptor is the second order (combination) using all direction that have twenty four descriptors.

.

Keywords: feature, extraction, mammogram, classification

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

.

2. Paper 30041320: Generalized Parallelization of String Matching Algorithms on SIMD Architecture (pp. 6-16)

Full Text: PDF

.

Akhtar Rasool, Nilay Khare

Maulana Azad National Institute of Technology, Bhopal-462051 India

.

Abstract - String matching is a classical problem in computer science. Numerous algorithms are known to solve the string matching problem such as Brute Force algorithm, KMP, Boyer Moore, various improved versions of Boyer-Moore, Bit Parallel BNDM algorithm and various others algorithms for single pattern string matching, Aho-Corasick, multiple pattern bit parallel algorithm for multiple pattern string matching. The algorithms have mainly been designed to work on a single processor called as sequential algorithms. To make the algorithms more time efficient by utilizing the processor maximum, a parallel approach the generalized text division concept of parallelization for string matching has been introduced. The parallelized approach is conceived by dividing the text and different parts of the text are worked simultaneously upon the same string matching algorithm to match the patterns. The concept is applicable to any of exact single and multiple pattern string matching algorithms. The notion of text dividing achieves parallelization on a SIMD parallel architecture. As different parts of the text are processed in parallel, special attention is required at the connection or division points for consistent and complete searching. This concept makes all string matching algorithms more time efficient in compare to the sequential algorithm. This paper presents how different string matching algorithms are implemented using the parallelization concept on different SIMD architectures like multithreaded on multi-core and GPUs. There performance comparison also shown in this paper.

.

Keywords: String Matching, Parallelization, SIMD, GPGPU’s

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

.

3. Paper 30041321: A Survey of Conceptual Data Mining and Applications (pp. 17-23)

Full Text: PDF

.

Priyanka Mandrai and Raju Barskar

CSE, UIT, RGPV, Bhopal, India

.

Abstract - Data mining may be a process of distinguishing and extracting hidden patterns and knowledge from databases and data warehouses. It is also referred to as knowledge Discovery in Databases (KDD) and permits knowledge discovery, data analysis, and data visualization of large databases at a high level of abstraction, while not a selected premise in mind. The operation of data mining is known by employing a technique known as modeling with it to create predictions. There are various algorithms and tools on the market for this purpose. Data mining encompasses a large variety of applications ranging from business to medication to engineering. This paper provides a survey of data mining technology, its models, and task, applications, major problems, and directions for advance analysis of data mining applications.

.

Keywords - Data mining, Knowledge discovery in databases, Data mining applications

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

.

4. Paper 30041323: Comparative Study on Access Control Models for Privacy Preservation (pp. 24-29)

Full Text: PDF

.

Salah Bindahman, Nasriah Zakaria

School of Computer Sciences, Universiti Sains Malaysia 11800 Pulau Penang, Malaysia

.

Abstract — Privacy is considered to be a critical issue for providing high quality services to users over any information system that freely shares all data anytime, anywhere, and through any device without considering constraints. User’s privacy should be protected by controlling the access to private information in accordance with the privacy preferences. Access control is the main technique used to insure the protection of the user’s privacy by controlling the access to the private information only to the authorized ones. In this paper, we will discuss critically the current access control models that are for privacy protection purpose and then come out with a comparison between all of these models. We hope this paper can be useful as a good reference for the researchers in this field by providing valuable information in the same trend.

.

Keywords- Privacy Preservation; Security; Access Control Model; Privacy Access Control

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

.

5. Paper 30041334: Hybrid Gravitational Search Algorithm and Genetic Algorithms for Automated Segmentation of Brain Tumors Using Feature-based Symmetric Analysis (pp. 30-38)

Full Text: PDF

.

Muna Khalaf Omar, University of Mosul, Mosul, Iraq

Jamal Salahaldeen Al-Neamy, University of Mosul, Mosul, Iraq

.

Abstract — Medical image processing is the most challenging and emerging field now a days. Processing of MRI images is a part of this field. In this paper, image segmentation techniques were used to detect brain tumors from mri images, the proposed system was built from three phases, feature extraction, tumor detection and finally tumor segmentation to produce segmented brain tumor.

.

Index Terms— feature extraction, Gravitational Search Algorithm (GSA), Genetic Algorithms (GA), symmetric analysis, thresholded segmentation.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

.

6. Paper 30041335: A Review Based on Function Classification of EEG Signals (pp. 39-46)

Full Text: PDF

.

Rajesh Singla #, Neha Sharma *, Navleen Singh Rekhi #

# Department of Instrumentation and Control Engineering, Dr. B. R Ambedkar National Institute of Technology, Jalandhar

Department of Electronics and Communication Engineering ,DAV Institute of Engineering and Technology, Jalandhar, India

*Department of Electrical Engineering, DAV Institute of Engineering and Technology, Jalandhar(India)

.

Abstract — For Electroencephalography (EEG) based BCI, motor imagery is considered as one of the most effective ways. This paper presents review on the results of performance measures of different classification algorithms for brain computer interface based on motor imagery tasks such as left hand, right hand, foot and wrist moment. Based on the literature, we give a brief comparison of accuracy of various classifications algorithms in terms of their certain properties consisting of feature extraction techniques which involves FBCSP, CSP, ICA, Wavelets etc and classifiers such as SVM, LDA, ANN.

.

Keywords-BCI; EEG; Wavelet Transform; LDA; SVM; NN

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

.

7. Paper 30041337: Implementation and Analysis of Local & Download Different Video CODECs in Smartphones (pp. 47-54)

Full Text: PDF

.

Dr. Omar A. Ibrahim

Computer Science Dept., College of Computer Science and Mathematics, Iraq, Mosul, Mosul University

.

Abstract — In the last decade mobile phones have been evolved rapidly . Previously the main objective of these devices is a voice call , nowadays they provide increasingly powerful services such as (Web browsing, Playback Video, Gaming, SMS text messaging, etc…). Using these rich services mobile phone, that is powered from battery, become consuming more and more energy especially when dealing with video services. This paper presents implementation of playing back local and downloaded video with different CODECs in mobile phone. Moreover the paper will presents measurements and analysis of power consumption, CPU and RAM usage resources Measurements conducted on mobile phones based on Symbian platform. The results show that different CODECs as well as CPU&RAM resources affected directly to battery consumption during playback video in mobile phone. J2ME is the programing language that will be adopted.

.

Keywords— Mobile phone, Playback video, Downloaded video, CODECs, J2ME, MMAPI, Power consumption, CPU & RAM, Symbian.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

.

8. Paper 30041340: SQL Injection and Vulnerability Detection (pp. 55-58)

Full Text: PDF

.

Samira Mehrnoosh (1) , Behrooz Shahi Sheykhahmadloo (2) , Abdolkhaleg hkhandouzi genare (2)

(1) Department of Software Engineering, Shiraz Azad University, shiraz, Iran

(2) Department of Software Engineering, University of Isfahan, Isfahan, Iran

.

Abstract — With the increasing use of web-based applications, the issue of information security has become more important in this regard. Attack on databases is one of the most important attacks that threaten the security of web based applications. A large group of these attacks have been known as SQL injection. In this article, we present a method for the detection of SQL Injection vulnerability that has some advantages in comparison with previous methods. In this method has been used from two proxies: One proxy in front of web server and the other one in front of Database. The first proxy hashes parameters that request for http and the second proxy decodes them. The main advantage of this method is being independent of language and technology of web development. Hence there is no need to change the code. This approach has covered all SQL injection attacks and does not require to learning step.

.

Keywords- SQL injection vulnerability, Input validation, Web security.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

.

9. Paper 30041342: Electronically Tunable Voltage-Mode Biquad Filter/Oscillator Based On CCCCTAs (pp. 59-63)

Full Text: PDF

.

S. V. Singh, Department of Electronics and Communication Engineering, Jaypee Institute of Information Technology, Sect-128, Noida-201304, India

G. Gupta, Department of Electronics and Communication Engineering, RKGIT, Ghaziabad -201001, India

R. Chabra, Department of Electronics and Communication Engineering, Jaypee Institute of Information Technology, Sect-128, Noida-201304, India

K. Nagpal, Department of Electronics and Communication Engineering, Jaypee Institute of Information Technology, Sect-128, Noida-201304, India

Devansh, Department of Electronics and Communication Engineering, Jaypee Institute of Information Technology, Sect-128, Noida-201304, India

.

Abstract — In this paper, a circuit employing current controlled current conveyor trans-conductance amplifiers (CCCCTAs) as active element is proposed which can function both as biquad filter and oscillator. It uses two CCCCTAs and two capacitors. As a biquad filter it can realizes all the standard filtering functions (low pass, band pass, high pass, band reject and all pass) in voltage-mode and provides the feature of electronically and orthogonal control of pole frequency and quality factor through biasing current(s) of CCCCTAs. The proposed circuit can also be worked as oscillator without changing the circuit topology. Without any resistors and using capacitors, the proposed circuit is suitable for IC fabrication. The validity of proposed filter is verified through PSPICE simulations.

.

Keywords-component; CCCCTA, Tunable, Universal, Voltagemode

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

.

10. Paper 30041345: Ontology Enrichment by Extracting Hidden Assertional Knowledge from Text (pp. 64-72)

Full Text: PDF

.

Meisam Booshehri+, Abbas Malekpour+, Peter Luksch+

+Department of Distributed High Performance Computing, Institute of Computer Science, University of Rostock, Rostock, Germany

Kamran Zamanifar ++, Shahdad Shariatmadari +++

++ Faculty of Computer Engineering, Najfabad Branch, Islamic Azad University , Najafabad, Iran

+++ Faculty of Computer Engineering, Shiraz Branch, Islamic Azad University , Shiraz, Iran

.

Abstract — In this position paper we present a new approach for discovering some special classes of assertional knowledge in the text by using large RDF repositories, resulting in the extraction of new non-taxonomic ontological relations. Also we use inductive reasoning beside our approach to make it outperform. Then, we prepare a case study by applying our approach on sample data and illustrate the soundness of our proposed approach. Moreover in our point of view current LOD cloud is not a suitable base for our proposal in all informational domains. Therefore we figure out some directions based on prior works to enrich datasets of Linked Data by using web mining. The result of such enrichment can be reused for further relation extraction and ontology enrichment from unstructured free text documents.

.

Keywords - Assertional knowledge; Linked Data; invisible information; ontological knowledge; web mining

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

.

11. Paper 30041346: An Improving Method for Loop Unrolling (pp. 73-76)

Full Text: PDF

.

Meisam Booshehri, Abbas Malekpour, Peter Luksch

Chair of Distributed High Performance Computing, Institute of Computer Science, University of Rostock, Rostock, Germany

.

Abstract — In this paper we review main ideas mentioned in several other papers which talk about optimization techniques used by compilers. Here we focus on loop unrolling technique and its effect on power consumption, energy usage and also its impact on program speed up by achieving ILP (Instruction-level parallelism). Concentrating on superscalar processors, we discuss the idea of generalized loop unrolling presented by J.C. Hang and T. Leng and then we present a new method to traverse a linked list to get a better result of loop unrolling in that case. After that we mention the results of some experiments carried out on a Pentium 4 processor (as an instance of super scalar architecture). Furthermore, the results of some other experiments on supercomputer (the Alliat FX/2800 System) containing superscalar node processors would be mentioned. These experiments show that loop unrolling has a slight measurable effect on energy usage as well as power consumption. But it could be an effective way for program speed up.

.

Keywords- superscalar processors; Instruction Level Parallelism; Loop Unrolling; Linked List

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

.

12. Paper 30041351: Diagnosis of Heart Disease based on Ant Colony Algorithm (pp. 77-80)

Full Text: PDF

.

Fawziya Mahmood Ramo, Computer Science Department, College of Computer Science and Mathematics, Mosul University,Mosul, Iraq

.

Abstract - The use of artificial intelligence method in medical analysis is increasing, this is mainly because the effectiveness of classification and detection systems has improved in a great deal to help medical experts in diagnosing. In this paper, we investigate the performance of an Heart disease diagnosis is a complicated process and requires high level of expertise, the work include a novel method for diagnosing eight heart disease (Atrial Fibrillation, Ventricle Strikes, Bigemeny, Ventricular Tanchycardia, Ventricular fibrillation, Third Degree Heart Block, R on T phenomenon and normal) using Ant Colony System (ACS) based on ECG (Electrocardiogram), blood oxygen and blood pressure. The experiment show that the proposed method achieves high performance with a heart diseases classification accuracy of 92.5%.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

.

13. Paper 31031358: An Efficient Interworking Between Heterogeneous Networks Protocols and Multimedia Computing Applications (pp. 81-86)

Full Text: PDF

.

Hadeel Saleh Haj Aliwi, Putra Sumari and Saleh Ali Alomari

Multimedia Computing Research Group, School of Computer Sciences, Universiti Sains Malaysia, Penang, Malaysia

.

Abstract — Nowadays, Multimedia Communication has been developed and improved rapidly to allow users to communicate between each other over the Internet. In general, the multimedia communication consists of audio, video and instant messages communication. The interworking between protocols is a very critical issue due to solving the communication problems between any two protocols, as well as it enables people around the world to talk with each other at anywhere and anytime even they use different protocols. Providing interoperability between different signaling protocols and multimedia applications will take the advantages of more than one protocol. This paper surveys the interworking functions between different VoIP protocols (i.e. InterAsterisk eXchange Protocol (IAX), Session Initiation Protocol (SIP), and H.323 protocol), Multimedia Conferencing System (MCS) (i.e. Real Time Switching Control Protocol (RSW) and Multipoint File Transfer System (MFTS), and multimedia applications (i.e. ISO MPEG-4 standards). At the end, a comparison among these protocols in terms of call setup format, media transport, codec, etc.

.

Keywords- Multimedia; VoIP; Interworking; Instant messages (IM); Multimedia Conferencing Systems (MCS); InterAsterisk eXchange Protocol (IAX); Session Initiation Protocol (SIP); H.323 protocol; Multipoint File Transfer System (MFTS); Real Time Switching Control Criteria (RSW); ISO MPEG-4 standards

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

.