Vol. 10 No. 6 JUN 2012

Vol. 10 No. 6 June 2012 International Journal of Computer Science and Information Security

Publication June 2012, Volume 10 No. 6 (Download Full Journal) (Archive) (Download 2)

.

Copyright © IJCSIS. This is an open access journal distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

1. Paper 20051207: Comparison of Data Mining Techniques Used To Predict Cancer Survivability (pp. 1-6)

Full Text: PDF

.

Charles Edeki 1, Shardul Pandya, Ph.D.2,

1 Mercy College, Mathematics and Computer Science Department, 555 Broadway, Dobbs Ferry, NY 10522

2 School of Business and Technology, Faculty of Information Technology, Capella University, 225 South Sixth Street, Minneapolis, Minnesota – US

.

Abstract — Huge efforts are being made by computer scientists and statisticians to design and implement algorithms and techniques for efficient storage, management, processing, and analysis of biological databases. The data mining and statistical learning techniques are commonly used to discover consistent and useful patterns in a biological dataset. These techniques are used in a computational biology and bioinformatics fields. Computational biology and bioinformatics seeks to solve biological problems by combining aspects of biology, computer science, mathematics, and other disciplines [1]. The main focus of this study was to expand understanding of how biologists, medical practitioners and scientists would benefit from data mining and statistical learning techniques in prediction of breast cancer survivability and prognosis using R statistical computing tool and Weka machine learning tool (freely available open source software applications). Six data mining and statistical learning techniques were applied to breast cancer datasets for survival analysis. The results were mixed as to which algorithm is the most optimal model, and it appeared that the performance of each algorithm depends on the size, high dimensionality of data representation and cleanliness of the dataset.

.

Keywords- Data Mining, WEKA, R tool, Computational Biology, Bioinformatics

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

2. Paper 30051217: Advanced Security-Based Data Sharing Model for the Cloud Service Providers (pp. 7-12)

Full Text: PDF

.

Mohamed Meky and Amjad Ali

Center of Security Studies, University of Maryland University College, Adelphi, Maryland, USA

.

Abstract- The authors recently published a security model that provides data owner full control over data sharing in the cloud environment and prevents cloud providers from revealing data to unauthorized users. Security analysis has demonstrated that the published model meets cloud security requirements and is resilient to several security threats. However, in the subject published model, the cloud service provider was a passive party that did not have the authority to authenticate nor confirm users' access policies before forwarding encrypted data to authorized users. In this paper, the authors propose an enhanced model that introduces authentication and policy confirmation authorization to cloud service providers without compromising the full data owner control. The result is an advanced security-based data sharing model that may be applied to secure data sharing of highly sensitive information in the cloud environment.

.

Keywords- cloud computing; cloud storage; data sharing model; data access control; data owner full control, cloud storage as a service; data encryption

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

3. Paper 31051232: Secure And Context-Aware Routing In Mobile Ad-Hoc Networks (pp. 13-18)

Full Text: PDF

.

R. Haboub And M. Ouzzif

RITM laboratory, Computer science and Networks team, ESTC - ENSEM - UH2 Casablanca, Morocco

.

Abstract - The increasing availability of wireless handheld devices and recent advances in Mobile Ad-hoc networks (MANET) open new scenarios in which users can benefit from anywhere and at anytime for impromptu collaboration. However, nodes energy constraints, low channel bandwidth, node mobility, channel variability and packet loss are some of the limitations of MANETs. Instead of handling packet loss, in this work, we propose an approach to reduce packet loss by avoiding the conditions in which packet losses are likely, using a context-aware routing approach, which selects the optimal path from source node to the destination node. The proposed approach was tested and the results show an interesting reduction of packet loss.

.

Keywords - MANETs, context aware routing, packet loss.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

4. Paper 31051243: Non-Linear Attitude Simulator of LEO Spacecraft and Large Angle Attitude Maneuvers (pp. 19-25)

Full Text: PDF

.

Azza El-S. Ibrahim, Electronics Research Institute: Computers & Systems dept., Giza, Egypt

Ahamed M. Tobal, Electronics Research Institute: Computers & Systems dept., Giza, Egypt

Mohammad A. Sultan, Cairo University, Faculty of Engineering: Electronics & Communications dept., Giza, Egypt

.

Abstract — The Attitude control problem of a rigid spacecraft with highly nonlinear characteristics has attracted a great interest for its important applications. The main challenge of designing the non-linear attitude control is the controller parameters determination. Most of the early published works use trial and error method for these parameters computation, but it is not accurate and takes a lot of time to get the appropriate parameters. Therefore, this paper presents a novel mathematical way for sliding mode control parameters calculation at every initial attitude state, taking into consideration the actuator saturation constraints. The developed attitude control ensures shortest angular path maneuvers. The objectives are accomplished by building the microsatellite simulator using MATLAB/Simulink software. In addition, the chattering problem of the SMC technique is solved using the saturation function. A system stability based on Lyapunov’s direct method is presented. Numerical simulations are performed to show that rotational maneuver is accomplished in spite of the presence of disturbance torques, and control saturation nonlinearity. The results are compared with the conventional PD control technique.

.

Keywords- MATLAB/Simulink; sliding mode control; satellite attitude control

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

5. Paper 31051254: The Evaluation of Performance in Flow Label and Non Flow Label Approach based on IPv6 technology (pp. 26-29)

Full Text: PDF

.

Nevila Xoxa Resulaj, Albanian Academy of Science, Tirane, Albania

Nevila Baçi Kadzadej, University of Tirana, Faculty of Economic, Mathematics, Statistics and Applied Informatics Department, Tirana, Albania

Igli Tafa, Polytechnic University of Tirana Faculty of Information Technology, Computer Engineering Department, Tirana, Albania

.

Abstract - In this paper, we want to evaluate the performance of two broadcasters with Flow label and Non flow label approach. Experimentally we have presented that the throughput utilization for each broadcaster with Flow Label approach which is implemented in MPLS Routing Technology is 89.95%. This result is better than Non Flow Label approach which is evaluated at 92.77%. The aim of this paper is to present that MPLS Routers performance is better than IP routers especially in Throughput Utilization, Low Level of Drop Packet Rate and time delay. The second technology is implemented in IP routing. Experimentally we have generated some video stream packets between 2 broadcasters with an arrange of router nodes. Experiments are performed by using ns-2 simulator.

.

Keywords- MPLS technology, IP routing technology, Throughput, Flow-Label approach, ns-2 simulator

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

6. Paper 31051256: False Colour Composite Combination Based on the Determinant of Eigen Matrix (pp. 30-32)

Full Text: PDF

.

Maha Abdul-Rhman Hasso

Department of Computer Science, College of Computer Sciences and Math.,University of Mosul / Mosul, Iraq

Abstract — In remote sensing applications, a wise selection of the best colour composite images out of many possible combinations is necessary to ease the job of the interpreter and to overcome the data redundancy problem. This work includes a novel method for ranking the available three-band combinations according to the amount of information they contain. The method is based on measuring the determinant of the variance/covariance matrices of each possible combination. The consistency of the method is described and proven using the Eigen value matrix. However for ranking calculation the variance/covariance matrix is enough.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

7. Paper 30041214: Source Initiated Energy Efficient Scheme for Mobile Ad Hoc Networks (pp. 33-40)

Full Text: PDF

.

R. Bhuvaneswari, Anna University of Technology, Coimbatore, India

Dr. M. Viswanathan, Fluid Control Research Institute (FCRI), Palakkad, Kerala, India

.

Abstract - In Mobile Ad Hoc Networks (MANETs), nodes are organized in a random manner without any centralized infrastructure. Due to node mobility and limited bandwidth, nodes consume more power unnecessarily. Mobile nodes collects the route information through overhearing and stores these information in route caches through Dynamic Source Routing (DSR) Protocol. When the route cache freshness is absent, it leads to the stale route information resulting in pollution caches. If the node overhears the packet to another node, node’s energy consumption occurs unnecessarily. The main goal of this research work is to reduce the effect of overhearing and avoid the stale route problems while improving the energy efficiency using the Source Initiated Energy Efficient (SIEE) algorithm. Due to the lack of route cache update, the stale route entry and overhearing is originated among the network. For that, we developed five mechanisms to improve route cache performance in DSR. By simulation results the proposed algorithm achieves better performance than the existing methods.

.

Keywords - MANET, DSR, Stale route entry, Cache freshness, overhearing, route cache update and energy efficiency.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

8. Paper 31051227: Assesment of Cobit Maturity Level With Existing Conditions From Auditor (pp. 41-49)

Full Text: PDF

.

I Made Sukarsa, Maria Yulita Putu Dita, I Ketut Adi Purnawan

Faculty of Engineering, Information Technology Studies Program, Udayana University, Kampus Bukit Jimbaran, Bali, Indonesia

.

Abstract — COBIT is a method that provides a basic framework in creating an information technology appropriate to the needs of the organization by taking considering other factors that affect. COBIT can be used as a guide to conduct an audit of the feasibility of an investment in information technology that has been done by a company. COBIT has a measuring element of IT performance, a list of critical success factors and maturity level measurement. All these tools are designed to support the successful implementation of corporate governance on various objects in the field of IT. These research take a case studied at employment agencies which usually called BKD. Domain selected in this study is Delivery and Support (DS). The measurement level of maturity is seen that the whole process of IT is at a scale of 3, which means the level of maturity in BKD is defined. This shows that none of current IT process has the same level with the expected one. The whole process still has a gap to be closed. Appropriate IT processes are given the initial step for the development of IT models include DS1, DS5, DS7, DS10 and DS11 with the determination of CSF, KPI and KGI. Substantive tests performed in this study meet the sufficiency of the evidence in order to obtain a conviction of compliance with the conditions of the criteria. BKD substantive test results are already has the documentation to third parties (vendors) and documentation are clearly procedures for managing civil servants information system which usually called SIMPEG. But there are some things you may need to be added to the application, such as the lack of backup, recovery, an automated help menu in SIMPEG and password to be encrypted. Substantive test also intended to develop opinions, conclusions and recommendations for the management of BKD by improving the management of information systems in the future.

.

Keywords- COBIT; Maturity Level; Substantive Test; Recommendation; IT Models

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

9. Paper 30051219: Intrusion Detection and Prevention Response based on Signature-Based and Anomaly-Based: Investigation Study (pp. 50-56)

Full Text: PDF

.

Dr. Homam El_Taj, Fahad Bin Sultan University, Tabuk, Saudi Arabia

Firas Najjar, VTECH - LTD. Riyadh, Saudi Arabia.

Hiba Alsenawi, Fahad Bin Sultan University, Tabuk, Saudi Arabia

Dr. Mohannad Najjar, Tabuk University, Tabuk, Saudi Arabia

.

Abstract - One of the fundamental topics in network Signature security is to detect intrusions and prevent them from exposing or destroying important information, or breaking down systems. In these systems the main problem is how to insure the abnormal activity is a harmful activity and what the prop irate response to stop the attack without affecting the whole process of the systems, because wrong response may affect the system more than the attempted intrusion, and because most organizations try to detect every intrusion, they examine every suspicious event; which means that more malicious events are detected but more resources are needed to differentiate actual intrusion from false malicious events. Also the Response for known attacks is accurate to stop them, because you know every step of the attacks and you know how to stop them, but when facing anomalies it’s not clear is it attack and what the best way to response without affecting the whole system. In this paper we will present the IDPS (Intrusion detection and prevention) techniques and their efficiency in preventing intrusions.

.

Keywords:Network security, Intrusion Detection and Prevention Response, False Positive, False negative

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

10. Paper 31051233: Extended Sakai-Kasahara Identity-Based Encryption Scheme to Signcryption Scheme (pp. 57-60)

Full Text: PDF

.

Hussein Khalid Abd-Alrazzaq, College of Administration and Economic-Ramadi, Anbar University, Anbar, Iraq

.

Abstract — Identity-Based Signcryption (IBSC) is a better approach would be to exploit the similarities between IBE and IBS in order to provide a dual-purpose IB Encryption-Signature (IBSE) scheme based on a shared infrastructure, toward efficiency increases and security improvements. In this paper describes a new identity-based signcryption scheme built upon SK scheme. It combines the functionalities of signature and encryption and it is prove security in a formal model under computational assumptions and in the random oracle model. As a result, this paper propose a new secure identity-based signcryption (IBSC) scheme that is also compare it with the other from efficiency points of view.

.

Keywords: Public Key Cryptography, Identity-Based Cryptography, Identity-Based signcryption, Sakai-Kasahara IBE

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

11. Paper 31051236: Multi-Pixel Steganography (pp. 61-66)

Full Text: PDF

.

Dr. R. Sridevi, Department of Computer Science & Engineering, JNTUH College of Engineering, Hyderabad, A.P., India

G. John Babu, Department of Computer Science & Engineering, Sreekavitha Engineering College, Khammam- A.P. – India

.

Abstract — With the advent of digital images information hiding in images known as Image steganography has gained wide acceptance as a means covert communications. This paper presents an innovative technique to hide the information in images. For any steganographic technique the evaluating parameters are deformation of cover image by the hidden message and the amount of hidden message. The former parameter should be minimum where as the payload or the size of information that can be hidden should be maximum. The proposed technique offers high payload with minimal distortion of the cover image.

.

Keywords-component; Steganography, Information hiding, Pixel value differencing, hiding capacity

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

12. Paper 31051248: Design of 16 bit Low Power Processor (pp. 67-71)

Full Text: PDF

.

Prof. Khaja Mujeebuddin Quadry, Royal Institute of Technology & Science, Chevella, R. R. Dist. A. P. India

Dr. Syed Abdul Sattar, Professor & Dean of Academics, Royal Institute of Technology & Science, Chevella, R. R. Dist. A. P. India.

.

Abstract — This paper describes the design of low power 16 bit processor. The processor is designed to incorporate 25 basic instructions involving Arithmetic, Logical, Data transfer, Branching, Control instructions. It is expandable up to 32 instructions based on the user requirements To implement these instructions the design incorporates various design blocks like Control Logic Unit (CLU), Arithmetic Logic Unit (ALU), program Counter (PC), instruction register (IR), Memory , Clock, Generator, Register and Additional glue logic. The processor has been realized using Verilog HDL, functionality is verified by writing the test programs using XILINX 9i ISE. Power estimation is done using X power tool, synthesis is done for SPARTAN 2E, SPARTAN 3E, and VIRTEX 5 FPGA. Comparison of synthesis results for various FPGA technologies has been carried out. The simulations results depict that total dissipated power by the processor to be approximately varying from 25mW to 267mW with the maximum frequency of operation ranging 30.931MHz to 122.018MHz. The bit stream file generated is successfully generated loaded in to SPARTAN 3E FPGA and tested the results using chip scope pro tool.

.

Keywords-16 bit processor; FPGA; lopower design; styling; insert

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

13. Paper 31051251: Integration of Floating Point Arithmetic User Library to Resource Library of the CAD Tool for Customization (pp. 72-76)

Full Text: PDF

.

R. Prakash Rao, St. Peter’s Engineering College, Maisammaguda, Hyderabad, India

Dr. B. K. Madhavi, Geetanjali College of Engineering & Technolog, Cheryala, Hyderabad, India

.

Abstract - Towards the integration of analog and digital circuitry, various approaches have been emerged. To achieve better integrity, mixed-signal designs have recently attain the greater significance. In various real time applications such as RF Systems, Communication Systems, Networking Systems etc., mixed signal integrated circuits are emerging. Because the use of both digital system and analog system on a single platform, the approachability is quite complex. Where digital systems are complex with synchronization problem, design of analog circuitry is too typical. Due to various CAD tools usage, the bottleneck of integration is also challenging. Hence, here our aim is to develop a generic modeling of analog-digital mixed signal design tool for easy to handle and low complex in approach. Hence, here our work focused on integrating multiple features of required analog design parameters to the digitally defined CAD tool. It is also focused to have a user friendly tool with various optimizing possibilities for easy designing and testing purpose.

.

Keywords- RF Systems; mixed signal designs; analog circuitry; integration; CAD tool; testing.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

14. Paper 18091102: V-Diagnostic: A Data Mining System For Human Immuno- Deficiency Virus Diagnosis (pp. 77-81)

Full Text: PDF

.

Omowunmi O. Adeyemo, Adenike O. Osofisan

Department of Computer Science, University of Ibadan, Ibadan, Nigeria

.

Abstract — A very serious health problem and life threatening diseases that has taken over the world medical scene from early 80s up to the present is Acquired Immune Deficiency Syndrome(AIDS), which is a result of Human Immuno-Deficiency Virus (HIV) in the body system. The World Health Organization through the support of United Nations advocates avoidance of unsafe sex, use of unsterilized sharp object and regular tests to ascertain ones HIV status. The campaign on HIV/AIDS is not effective especially on issues that relate to diagnosing of HIV at the early stage, it is most threatened because of discrimination against people living with the virus and lack of testing and counselling centre, most especially in rural areas of developing countries like Nigeria. Therefore, this paper focuses on the development of a Neural Network Based Data Mining System that could learn from historical data containing symptoms, mode of transmissions, region and status of patient which is used to predict or diagnose a patient HIV status. The system offers a very simple interactive platform for all any type of users providing self-diagnosis against this life threatening and deadly virus.

.

Keywords- Data Mining; Back Propagation Neural Network, Medical; AIDS; Symptoms and HIV

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

15. Paper 31051229: A Web-Based System To Enchance The Management Of Acquired Immunodeficiency Syndrome (AIDS)/ Human Immunodeficiency Virus (HIV) In Nigeria (pp. 82-89)

Full Text: PDF

.

1 Agbelusi Olutola, 2 Makinde O.E, 3 Aladesote O. Isaiah, and 4 Aliu, A. Hassan

1 & 3 Computer Science Department, Rufus Giwa Polytechnic, Owo, Ondo State, Nigeria.

2 Ajayi Crowther University, Oyo, Oyo State, Nigeria

4 Mathematics & Statistics Department, Rufus Giwa Polytechnic, Owo, Ondo State, Nigeria

.

Abstract: Acquired Immunodeficiency Syndrome (AIDS), a global disease, caused by the Human Immunodeficiency Virus (HIV) is arguably the greatest health problem of this age and there is need to make first class information on the management of HIV/AIDS available through the use of Web-Based Technology. This paper examined the various ways of contacting HIV and the effort made by Information and Technology to make life easier for people living with the virus in Nigeria. Questionnaires were distributed to Doctors and people living with HIV/AIDS to access their knowledge and belief about the said disease. MySQL was used to generate the database, to store all the vital information about the patients, their Doctors and their complaints. PHP programming for the implementation of the interfaces, Dreamweaver HTML for the design of the web-based application, T-test and Microsoft Excel were used for the analysis of data collected. The study looked into the occupation, age range and the marital status of different categories of people living with the virus. It was discovered that there were quite large numbers of people who are living with the virus.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

16. Paper 31081151: Data Mining System For Quality Prediction Of Petrol Using Artificial Neural Network (pp. 90-95)

Full Text: PDF

.

Omowumi O. Adeyemo, Adenike O. Osofisan, Ebunoluwa P. Fashina, Kayode Otubu

Department of Computer Science, University of Ibadan, Ibadan, Nigeria

.

Abstract— The increasing cry of the masses over poor quality of petroleum products most especially petrol has poised researchers and refinery engineers to devise a way of telling the class of quality of products expected from a sample crude oil without having to refine it. To this end, a system that can predict the quality and class of petrol expected from a sample crude oil is desired. Getting such accurate predictions for the class and hence the quality of petrol however can be tasking for humans. This work presents a data mining system, which implemented a multi-layer neural network trained with the back propagation training algorithm. The focus, however, was on petrol because of its significance and wide usage. The outcome generated by the system shows that multilayer perception back propagation neural network could successfully classify and predict the quality of petrol.

.

Keywords- Petrol; Multilayer Perceptron; Data Mining; Quality; Back Propagation

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------