Vol. 10 No. 11 NOV 2012

Vol. 10 No. 11 November 2012 International Journal of Computer Science and Information Security

Publication November 2012, Volume 10 No. 11 (Download Full Journal) (Archive) (Download 2)

.

Copyright © IJCSIS. This is an open access journal distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

1. Paper 27101203: Design and Implementation of a Secure NeMo (pp. 1-5)

Full Text: PDF

.

Diyar Khairi M S, DEEI, FCT, University of Algarve, Portugal

Amine Berqia, DEEI, FCT, University of Algarve, Portugal

.

Abstract— Network Mobility (NEMO) Basic Support protocol enables Mobile Networks to attach to different points in the Internet. The protocol is an extension of Mobile IPv6 and allows session continuity for every node in the Mobile Network as the network moves. It also allows every node in the Mobile Network to be reachable while moving around. In this paper detailed implementation of such a system on Linux OS is presented. For wireless security measures, the Wired Equipment Privacy (WEP) method is deployed. Then it is showed that this method can be easily cracked using the BackTrack 5 operating system and the airecrack-ng application. Finally, to solve the security problem, a Wi-Fi Protected Access II (WPA2) Enterprise method is implemented using a Windows Server 2008 R2 with Network Policy Services (NPS) as a radius server and a simple router as a radius client.

.

Keywords: NEMO, Security, Radius, Mobile IPv6

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

2. Paper 29101208: Virtual Zones and Virtual Coordinates on a Multi Layer Infrastructure for Wireless Sensor Networks (VMLI) (pp. 6-15)

Full Text: PDF

.

Amina MERBAH, Ahmed KAMIL, Olaf MALASSÉ, Hicham BELHADAOUI, Mohamed OUZZIF

Casablanca,Morroco & Metz,France

.

Abstract-- Wireless sensor network (WSN) is currently representing a rapidly developing field. The challenge that manifests itself, accordingly, is about reducing the per unit-energy consumption of these networks that show very limited capacity. Several academic undertakings have been interested in maximizing the network’s lifetime. The architectures of hierarchical structures ensure the provision of different network nodes in a way that accomplishes this goal. This paper offers a new WSN infrastructure based on a virtual organization through two layers representing the physical layer that contains all nodes of sensor network. The first virtual layer is based on a partitioning into sub-areas that are geographically localized by the sensors. The second is partitioned into four typical layers for the four units (sensors, aggregators, logger and users equipments) of the devices in our platform. This partitioning impacts on (affects) all resources to obtain a global surveillance of WSN at a larger scale. Simulation results have shown that the proposed partitioning algorithm has reduced both the capacity of consumed energy and the number of packets transmitted during topology construction.

.

Key-words — Wireless sensor networks (WSN), Virtual zones, , Partitioning algorithms, WSN Infrastructures , Energy consumption.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

3. Paper 31101216: Brain Connectivity Analysis Methods for Better Understanding of Coupling (pp. 16-22)

Full Text: PDF

.

Revati Shriram, Sathyabama University, Research Scholar, Chennai. & Cummins College of Engg for Women, Pune, INDIA

Dr. M. Sundhararajan, Shri Lakshmi Ammal Engg. College, Chennai, INDIA

Nivedita Daimiwal, Cummins College of Engineering for Women, Pune, INDIA

.

Abstract — Action, cognition, emotion and perception can be mapped in the brain by using set of techniques. Translating unimodal concepts from one modality to another is an important step towards understanding the neural mechanisms. This paper provides a comprehensive survey of multimodal analysis of brain signals such as fMRI, EEG, MEG, NIRS and motivations, assumptions and pitfalls associated with it. All these non-invasive brain modalities complement and restrain each other and hence improve our understating of functional and neuronal organization. By combining the various modalities together, we can exploit the strengths and flaws of individual brain imaging methods. Integrated anatomical analysis and functional measurements of human brain offer a powerful paradigm for the brain mapping. Here we provide the brief review on non invasive brain modalities, describe the future of co-analysis of these brain signals.

.

Keywords- EEG, fMRI, MEG, NIRS and BMI.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

4. Paper 31101217: Applications of fMRI for Brain Mapping (pp. 23-27)

Full Text: PDF

.

Nivedita Daimiwal, Research Scholar,Sathyabama University,Chennai, INDIA & Cummins college of Engg. For Women, Pune

Dr. M. Sundhararajan, Principal, Shri Laxmi Ammal Engineering College,Chennai, INDIA

Revati Shriram, Cummins College of Engg. For Women,Pune, INDIA

.

Abstract — Brain-mapping techniques have proven to be vital in understanding the molecular, cellular, and functional mechanisms of the brain. Normal anatomical imaging can provide structural information on certain abnormalities in the brain. However there are many neurological disorders for which only structure studies are not sufficient. In such cases it is required to investigate the functional organization of the brain. Further it is necessary to study the brain functions under normal as well as diseased conditions. Brain mapping techniques can help in deriving useful and important information on these issues. Brain functions and brain area responsible for the particular activities like motor, sensory speech and memory process could be investigated. The authors provide an overview of various Brain Mapping techniques and fMRI signal processing methods.

.

Keywords- Functional MRI (fMRI), Signal Processing, Brain Mapping.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

5. Paper 31101218: Performance Evaluation of an Orthogonal Frequency Division Multiplexing based Wireless Communication System with implementation of Least Mean Square Equalization technique (pp. 28-32)

Full Text: PDF

.

Farhana Enam, Assistant Professor, Dept. of Information & Communication Engineering, University of Rajshahi, Rajshahi, Bangladesh

Md. Arif Rabbani, Dept. of Information & Communication Engineering, University of Rajshahi, Rajshahi, Bangladesh

Md. Ashraful Islam, Dept. of Information & Communication Engineering, University of Rajshahi, Rajshahi, Bangladesh

Sohag Sarker, Dept. of Information & Communication Engineering, University of Rajshahi, Rajshahi, Bangladesh

.

Abstract — Orthogonal Frequency Division Multiplexing (OFDM) has recently been applied in wireless communication systems due to its high data rate transmission capability with high bandwidth efficiency and its robustness to multi-path delay. Fading is the one of the major aspect which is considered in the receiver. To cancel the effect of fading, channel estimation and equalization procedure must be done at the receiver before data demodulation. This paper mainly deals with pilot based channel estimation techniques for OFDM communication over frequency selective fading channels. This paper proposes a specific approach to channel equalization for Orthogonal Frequency Division Multiplex (OFDM) systems. Inserting an equalizer realized as an adaptive system before the FFT processing, the influence of variable delay and multi path could be mitigated in order to remove or reduce considerably the guard interval and to gain some spectral efficiency. The adaptive algorithm is based on adaptive filtering with averaging (AFA) for parameter update. Based on the development of a model of the OFDM

system, through extensive computer simulations, we investigate the performance of the channel equalized system. The results show much higher convergence and adaptation rate compared to one of the most frequently used algorithms - Least Mean Squares (LMS).

.

Keywords- LMS (Least Mean Square), Adaptive Equalizer, OFDM, Fading Channel, AWGN Channel)

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

6. Paper 31101224: Microcontroller Based Security System: An electronic application for fire monitoring and surveillance (pp. 33-37)

Full Text: PDF

.

Md. Fasiul Alam, MSc. In Electronic System engineering, Politecnico di Milano, Milan, Italy

Helena Bulbul, Assistant Professor, United International University, Dhaka, Bangladesh

Md. Delwar Hossain, Assistant communication engineer, Boishaki International Television ltd., Dhaka, Bangladesh

.

Abstract — The importance of electronic security is now an important term in the global world. Due to the lack of modern security equipments we often face problems and lose our valuable assets. Though there are some security system are available in the market but wireless system are not so common and economic to us. Therefore, a Microcontroller Based Security System has been developed to recover that limitation. It can be used for ensuring fire security in Offices, Banks, Apartments, Industry and so on. The system detects the fire fault situation and inform automatically to the desired destination without any human intervention. Microcontroller Based Security System is an intelligent stand alone system with proven performance and stability. The aim of an engineering design is to produce maximum output with minimum cost involved. According to that, our designed system involves low cost yet offers better performance in comparison to other security system available. Microcontroller is the heart in our security system which is interfaced with smoke sensors, SIMCom GSM Module, alarm circuit and LCD display unit. The important feature of the project are it can easily specify the location where the fire occurred and it instructs the SIMCom GSM Module to send SMS to the desired end for taking necessary action immediately. The results obtained stand as a proof of concept for the credibility of implementing wireless based Security System. Achieved result of the project encouraging to us.

.

Keywords-Microcontroller, security, sensors, alarm, GPS, GSM

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

7. Paper 31101227: Internet Fraud as one of the cyber threat and its impact in India (pp. 38-41)

Full Text: PDF

.

Ashwini Manish Brahme, Assitant Professor, Indira Institute of Management(MCA), Pune, University of Pune, Maharashtra, India

.

Abstract - India is becoming superpower in the IT field and also reached to the global world because of Internet but the fraud incidents are on the rise in almost every fast-growing industry across the country. The ratio of Internet fraud is growing significantly in India. Life is about a mix of good and evil so is the Internet. For all the good it does us, cyberspace has its dark sides too. This paper discusses about the Internet Fraud and how the Internet fraud is creating the Cyber Cold War. It also briefs about the Internet Users in India, its Scope and the role of Internet for the Indian Business Growth. This paper talks about the Cyber crime and Cyber threat in India and the motives behind any Cyber attack or Internet Fraud, the tools used for the cyber terrorism, the Impact of Internet Threat at Work, proportion of Internet Fraud in India, and cyber crime cases with different examples. Furthermore paper gives details regarding how the Internet fraud is becoming a growing threat for the online retailers and business, how to deal with Internet Fraud to overcome the cyber threat and the role of Government of India, to avoid the misuse of Internet and the act or penalties for it and the skill to take out the Cyber Threat. This paper also gives the details on the Current status of cyber threat, internet fraud, and future in India with respect to the different security aspects and also talks about the Challenges that India need to face to beat the cyber threat.

.

Keywords: Cyber Crime, Cyber Cold war, Internet Fraud, Cyber Threat, IT

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

8. Paper 31101229: Application Of Polynomial Vector (PV) Processing To Improve The Estimation Performance Of Bio Diesel In Variable Compression Ratio Diesel Engine (pp. 42-49)

Full Text: PDF

.

Suresh M., Asst. Prof, Mechanical Engineering, Sri Sai Ram Engg. College,Chennai- 44,Tamilnadu,India

Maheswar Dutta, Professor and Principal, M.N.R Engg. College, Hyderabad, India

Purushothaman S, Professor and Dean, Mechanical Engineering, Udaya School of Engineering, India-629204

.

Abstract - This paper presents the implementation of polynomial vector back propagation algorithm (PVBPA) for estimating the power, torque, specific fuel consumption and presence of carbon monoxide, hydrocarbons in the emission of a direct injection diesel engine. Experimental readings were obtained using the biodiesel prepared form the waste low quality cooking oil collected from the canteen of Sri Sairam Engineering College, India.. This waste cooking oil was due to the preparation of varieties of food (vegetables fried and non vegetarian). Over more than a week, transesterification was done in chemical lab and the biodiesel was obtained. The biodiesel was mixed in proportions of 10%, 20 % , 30%,40%, 50% with remaining combinations of the diesel supplied by the Indian government. Variable compression ratio (VCR) diesel engine with single cylinder, four stroke diesel type was used. The outputs of the engine as power, torque and specific fuel consumption were obtained from the computational facility attached to the engine. The data collected for different input conditions of the engine was further used to train (PVBPA). The trained PVBPA network was further used to predict the power, torque and brake specific fuel consumption (SFC) for different speed, biodiesel and diesel combinations and full load condition. The estimation performance of the PVBPA network is discussed.

.

Keywords: polynomial vector, back propagation algorithm, waste cooking oil, biodiesel.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

.

9. Paper 31101234: Computerized Analysis of Breast Thermograms for Early Diagnosis of Breast Cancer (pp. 50-56)

Full Text: PDF

.

Mrs. Asmita Wakankar, Sathyabama University, Chennai, India & Cummins College of Engg, Pune

Dr. G. R. Suresh, Eswari Engg College, Chennai, India

.

Abstract — Breast cancer is one of the leading causes of death in women. Early detection of breast cancer is the key to improve survival rate. Malignant tumors causes localized temperature increase on breast surface which shows as hot spot and vascular patterns in breast infrared thermograms. Thermographic detection of breast cancer primarily depends on the visual analysis of these patterns by physicians, which is hard to provide objective and quantitative analysis. This paper proposes computerized analysis of thermograms using a series of statistical features extracted from the thermograms quantifying the bilateral differences between left and right breast area for diagnosis of breast cancer. Thermography is particularly well suited for checking of tumors in their early stages or in dense tissue and implants.

.

Keywords- Breast Cancer –Infrared Thermal Imaging-Image Analysis

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

.

10. Paper 31101235: Information Security on The Communication Network In Nigeria Based On Digital Signature (pp. 57-63)

Full Text: PDF

.

O. S. Adebayo (MCPN), V. O. Waziri (PhD) and J.A Ojeniyi (MNCS)

Cyber Security Science department, Federal University of Technology Minna, Nigeria

S. A. Bashir (MNCS), Computer Science department, Federal University of Technology Minna, Nigeria

Amit Mishra, Mathematics and Computer Science department, IBB University, Lapai, Nigeria

.

Abstract - This paper presents simple abstraction concepts for some digital signature scheme algorithms that include ElGamal Signature scheme, Schnorr Signature scheme, Elliptic Curve Signature (ECS), and Digital Signature Standard (DSA). It also examines the security of this digital signature scheme to measure its effectiveness and improve on the variability. The algorithms are essential in securing application in dispatching the documents on the communication network. We try to explain the algorithms in simple form and the examples are experimented in C++ programming language which presupposing little or easy mathematical background comprehension and easy computations.

.

Keywords - ElGamal Signature scheme, Signature Scheme, Elliptic Curve Signature, Information Security, Digital Signature

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

.

11. Paper 31101230: Requirements Elicitation for Software Projects (pp. 64-71)

Full Text: PDF

.

Samaher Abdullah AL-Hothali, Department of Computer Science and Engineering, Yanbu University College, Saudi Arabia.

Noor Abdulrahman AL-Zubaidi, Department of Computer Science and Engineering, Yanbu University College, Saudi Arabia

Anusuyah Subbarao, Department of Computer Science and Engineering, Yanbu University College, Saudi Arabia

.

Abstract - Requirements elicitation is the practice of collecting the requirements of a system from users, customers and other stakeholders. It is usually realized that requirements are elicited rather than just taking or gathering. This means there are discovery and development of elements to the elicitation process. Requirements elicitation is a complex process connecting with many activities with a different of available techniques, approaches, and tools for performing them. The objectives of this paper is to present the important aspects of how to plan for elicitation, the techniques, approaches, and tools for requirements elicitation, and some elicitation problems.

.

Keywords: requirements, elicitation, techniques, approaches, problems.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

.