Vol. 12 No. 3 MAR 2014

Vol. 12 No. 3 MARCH 2014 International Journal of Computer Science and Information Security

Publication MARCH 2014, Volume 12 No. 3 (Download Full Journal) (Archive) (Download 2)

.

Copyright © IJCSIS. This is an open access journal distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

1. Paper 28021449: Privacy and Security Concerns in Cloud Computing (pp. 1-4)

Full Text: PDF

.

Hamoud Alshammari

Department of Computer Science and Engineering

221 University Ave, University of Bridgeport,

Bridgeport, CT, USA

.

Abstract — In Cloud Computing environment, when clients or providers want to authenticate themselves to the cloud, they face some problems like the security level of their credential information to be stolen or by illegal using of their decrypted messages by attackers during the communication process. The service providers and clients delegate a third party to monitor and enforce the datacenter in the infrastructure level of cloud. However, the third party might not be a trusted enough for one of them or for both, so they need to manage their data by themselves. In this paper, I will go over one technique for each issue to solve the privacy problem. Web Service Security model for encrypted and decrypted messages, and Private Virtual Infrastructure model for monitoring the data over cloud.

.

Keywords — Cloud Computing, Cloud Security, Locator Bot, Virtual Private Infrastructure, Web Service Security.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

2. Paper 28021427: A knowledge-Based DSS for Egypt's Water Security (pp. 5-10)

Full Text: PDF

.

Ahmed Mohamed Omran, Computer Science Department, FCI, Fayoum University, Fayoum, Egypt

Nisreen Laham, Information and Decsion Support Centre, Egyptian Cabinet, Cairo,Egypt

.

Abstract — In Egypt, water security tops the national agenda whereby studies reveal that estimations of available water and water needs for different purposes are heading towards an increasing gap between water supply and demand. This paper is the first to integrate RT-Delphi with ontology KB, explanation, scenario methods and structural analysis. It provides a strategic planning methodology based on a multi-participatory approach. Moreover, this paper introduces a tailored methodology for a successful scenarios building process in Egypt. It discusses how the futures studies methods could be integrated into the decision analysis and making process in Egypt. Final, this Research builds on our research to support policy/decision makers in Information and Decision Support Centre (IDSC)-Egyptian Cabinet for the Egypt's water security research.

.

Keywords: Knowledge-based DSS, Eyptian Water Security, RTDelphi, Ontology-based, Secnario-based, Explanation.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

3. Paper 28021412: A Study on the Radio Spectrum Management in South Asian Countries: Challenges and Opportunities (pp. 11-15)

Full Text: PDF

.

Md. Kabir Uddin and M Abdus Sobhan

School of Engineering and Computer Science, Independent University, Bangladesh, Bashundhara, Dhaka

.

Abstract — The enhancing cumbersome intricacy of wireless communications technologies and inclusion in a wide range of miscellaneous applications mean the related spectrum management issues are being more complex. Pursuant to this spectrum complexity relates equally to private and public sector use of the spectrum. Changes from an industrial to an informational based society and the associated demand for enhanced communications services push the need for seamless access further. It is likely that removing unnecessary regulatory distinctions between government and non-government spectrum will become increasingly important to maximize the overall benefit derived from use of the spectrum. Many applications of practical interest stem from the capability to monitor and store packet-level traces in a WiFi, WiMAX, 3G and 4G networks. In this approach, yields strong practical benefits, given the costs and complication of accessing network equipments, especially in the Radio Access Network as well as pondering of security. The author of this paper discusses the opportunities to exploit in and addresses challenges faced by the key players in South Asian region and seeks the spectrum commons approach in South Asian countries and concludes that, even in the face of enormous challenges, the potential benefits and opportunities are noteworthy adequate to necessitate grim thoughtfulness by telecommunications policy–makers in their function as spectrum managers.

.

Keywords — Spectrum, Regulatory, RFID, DSA

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

4. Paper 28021416: On the Implications of Current Radio Spectrum Management Issues in Bangladesh (pp. 16-21)

Full Text: PDF

.

Md. Kabir Uddin and M Abdus Sobhan

School of Engineering and Computer Science, Independent University, Bangladesh, Bashundhara, Dhaka

.

Abstract — The brisk and mammoth yield of wireless mobile community, coupled with their demands for high speed, wideband, multimedia services, stands in clear contrast to the limited radio spectrum allocated in international agreements. Advanced mobile services combine the innovation potential of reckoning, data communications, and the wireless industry. So, Current Radio Spectrum Management (CRSM) [1] remains as a key challenge to the efficient engineering of mobile wireless networks. Different types of innovation scenarios can be distinguished, depending on the constellation of sunk cost and the cost of coordination between suppliers along the value chain. No single spectrum management framework supports all equally well, although spectrum use markets seem to be most broadly compatible. A mixed approach is possibly superior to any given individual class of spectrum management. Broadening the literature on spectrum policy, the author of this Paper focuses on implications and issues of Current Radio Spectrum Management regimes for rolling out in mobile services in Bangladesh with the current status of Radio Spectrum Management (RSM) polices and outline the key issues in RSM for next generation mobile wireless networks although the development of 3G in many countries new directions are being researched.

.

Keywords — CRSM, RSM, QoS, ISM, Spectrum

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

5. Paper 28021420: Cortex Simulation System Proposal Using Distributed Computer Network Environments (pp. 22-25)

Full Text: PDF

.

Boris Tomas, University Of Zagreb, Faculty of Organization And Informatics, Pavlinska 2, Varazdin, Croatia

.

Abstract — In the dawn of computer science and the eve of neuroscience we participate in rebirth of neuroscience due to new technology that allows us to deeply and precisely explore whole new world that dwells in our brains. This review paper is merely insight to what is currently ongoing research in the interdisciplinary field of neuroscience, computer science, and cognitive science.

.

Index Terms — Artificial neuron, artificial neural networks, neuron simulation

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

6. Paper 28021422: Chaotic Scheme for Image Encryption Based on Arnold Cat's Map (pp. 26-33)

Full Text: PDF

.

Ansam Osama Abdul-Majeed

Department of Software Engineering, College of Computer Science and Mathematics / University of Mosul, Mosul, Iraq

.

Abstract — Digital images are widely used media over the Internet for different purpose. Therefore, security becomes important in the transmission. This paper presents spatial domain multilevel image encryption algorithm based on Arnold cat's map. The algorithm divides the image into different size overlapping blocks along the levels of encryption. The block at level 1 begins at the center of the image and this block is iteratively enlarged in the next levels. In each level of the proposed algorithm, Arnold cat's map is implemented in each level on the block's pixels. Also, zigzag scan is applied on the whole image to further reducing the correlation between adjacent pixels. In order to achieve the diffusion, the pixel values are xored with different xor values begin at a value, which is generated randomly, beside control parameters and iteration number of Arnold cat's map, by using mid-product algorithm with the secret key as an initial seed. The results of experiments indicated that the proposed algorithm is highly decorrelated the adjacent pixels and it resists the statistical attacks. The values of ciphered image entropy are close to the ideal value. Furthermore, the proposed algorithm is very sensitive to key. It was concluded that the use of zigzag scan beside Arnold cat's map in spatial domain was very efficient to hide the statistical characteristics of the image.

.

Keywords - Image encryption; Arnold cat's map; Zigzag scan; mid-product.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

7. Paper 31101319: An Overview of an Advanced Vehicle Security System (pp. 34-37)

Full Text: PDF

.

Tariq Alwada’n (1), Adel Hamdan Mohammad (1), Nidhal El-Omari (1), Hamza Aldabbas (2)

(1) Computer Science Department, The world Islamic Sciences and Education University, Amman-Jordan

(2) Prince Abdullah bin Ghazi Faculty of Information and Technology, Al-Balqa’ Applied University,Salt-Jordan

.

Abstract — In the past few decades wireless networks have become increasingly popular, due to the wide availability and rapid introduction of wireless transceivers into a variety of computing devices such as PDAs, laptop and desktop computers. Global Positioning System (GPS) is used to determine position and speed of objects by using the satellite technology. Furthermore, Radio Frequency is another technology which is used to determine the objects' locations. In this paper we have presented an overview for using the previous technologies to track a stolen vehicle by using a system that is resulted from mixing all of those technologies in addition to proposed an enhancement idea that could help the resulted system to determine the cars' thieves by sending their photos to the security agency base to be recognized.

.

Index: WiMAX, Wi-Fi, GPS, Mobile Cell Phone, Radio Frequency.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

8. Paper 30111333: Computational Intelligence Techniques Used In Iris Recognition: A Survey (pp. 38-49)

Full Text: PDF

.

Shraddha Sharma, UIT, RGPV, Bhopal, India

Shikha Agrawal, UIT, RGPV, Bhopal, India

Sanjay Silakari, UIT, RGPV, Bhopal, India

.

Abstract: Authentication is a very crucial issue for all security protocols. Biometric based authentication is widely used for security issues such as iris, face, fingerprints etc. Iris Recognition takes into account together of the simplest biometric technique used for human identification and verification, owing to its distinctive feature that disagree from one person to a different, and its importance within the security field. Now-a-days various researchers used many soft computing techniques in the iris recognition system. This paper gives a brief survey of these techniques used for feature extraction such as neural network, genetic algorithm, fuzzy logic and particle swarm optimization.

.

Keywords: Authentication, iris recognition, Feature Extraction, Neural Network, Genetic Algorithm, particle swarm optimization, Fuzzy Logic.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

9. Paper 31101312: Significant Factors Affecting the Use And Integration of Information Technology (IT) Tools in Teaching in South Western Nigerian Polytechnics (pp. 5-61)

Full Text: PDF

.

Aladesote, O. Isaiah, Agbelusi Olutola, Ojajuni O. James

Computer Science Department, Rufus Giwa Polytechnic, Owo, Ondo State.

Abstract - Information Technology (IT) also referred to as Information and Communication Technology (ICT) can be described as electronic technologies used for information storage and retrieval (Adomi & Kpangban, 2010). This paper examined various factors hindering the use of IT tools in teaching in South Western Nigerian Polytechnics and also extract the most significant factors that pose serious challenges to the use and integration of IT in teaching using Gain Ratio extraction technique. Questionnaires were distributed to Lecturers and seasoned administrators in the Polytechnic sector to access their knowledge and belief on the stated factors. The responses from the respondents were used to form a dataset. C# Programming was used for the implementation. Also, Microsoft Excel was used for the analysis of the data collected. The result of the analysis shows that seven (7) factors were highly hindering the use and integration of IT tools into teaching.

.

Keywords: ICT, Gain Ratio, Microsoft Excel, Extraction Technique.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

10. Paper 28021410: An Overview of Contemporary Cyberspace Activities and the ChallengingCyberspace Crimes/Threats (pp. 62-100)

Full Text: PDF

.

Samson Olasunkanmi Oluga*, Dr Azizah Bt Haji Ahmad, Ahmad Jamah Ahmad Alnagrat, Haroon Shakirat Oluwatosin, Maryam Omar Abdullah Sawad, Nur Adlya Bt Muktar

School of Computing (SOC), College of Arts and Sciences (CAS), Universiti Utara Malaysia, 06010 Sintok, Kedah, Malaysia

.

Abstract - One thing that has emanated from the development of the internet technology and popular embrace of social networking is the emergence of a second digital world which is a virtual reality world called the cyberspace. The cyberspace users who can be described as the Cyberians are attracted to the cyberspace from time to time especially because of the various opportunities/activities available via the cyberspace cutting across many spheres of human endeavor. There are however many threats or challenges which may be inimical to the safety of the cyberspace, the cyberspace assets/resources and the interest of the Cyberians, the regular cyberspace users or cyber citizens. This paper, based on extensive examination of contemporary literature on the cyberspace, explores fundamental activities of the cyberspace and explicates various forms of cybercrimes orchestrated by cyber criminals posing great threats to the cyberspace. The basic ideas of the paper are equally captured in vivid illustrative models.

.

Keywords: Cyberspace, Cyber activities, Cybercrimes/Threats

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------