Vol. 10 No. 8 AUG 2012

Vol. 10 No. 8 August 2012 International Journal of Computer Science and Information Security

Publication August 2012, Volume 10 No. 8 (Download Full Journal) (Archive) (Download 2)

.

Copyright © IJCSIS. This is an open access journal distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

1. Paper 24071205: A Novel Data Hiding Scheme for Binary Images (pp. 1-5)

Full Text: PDF

.

Do Van Tuan, Hanoi College of Commerce and Tourism, Hanoi– Vietnam

Tran Dang Hien, Vietnam National University

Pham Van At, Hanoi University of Communications and Transport

.

Abstract - this paper presents a new scheme for hiding a secret message in binary images. Given m×n cover image block, the new scheme can conceal as many as ⌊ log (m x n +1)⌋ bits of data in block, by changing at most one bit in the block. The hiding ability of the new scheme is the same as Chang et al.'s scheme and higher than Tseng et al.'s scheme. Additionally, the security of the new scheme is higher than the two above schemes.

.

Keywords - Data hiding; steganography; security; binary image;

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

2. Paper 31041275: Virtual Investigation of Patients for Medical E-Learning (pp. 6-10)

Full Text: PDF

.

A. M. Riad, Faculty of Computer and Information, Sciences, Mansoura University, Mansoura, Egypt

Hazem M. El-Bakry, Faculty of Computer and Information, Sciences, Mansoura University, Mansoura, Egypt

Samir M. Abd El-razek, Faculty of Computer and Information, Sciences, Mansoura University, Mansoura, Egypt

.

Abstract — The main objective of this research is to allow medicine students to practice problem-based learning by simulating a medical consultation, using the current pedagogical methods based on clinical cases and integrating web technology methods. In a previous paper [11], a virtual medical e-learning system for a few number of students. In this paper the design is introduced to combine large number of students. The design is applied for Egyptian Universities Virtual Environment System (EUVES), a virtual environment for medical e-learning for all medicine students in the Egyptian universities. The system is logically designed to simulate case-based learning methodology, and technically designed upon MedBiquitous specifications for virtual patient. In this paper the current researches of virtual patients and MedBiquitous specifications which became a major standard for building virtual patients are introduced. Then the concept of case-based learning and the need for virtual environment is presented to support this methodology of learning. Finally an overview of workflow, data structure, and functional modules of EUVES are given.

.

Keywords- Virtual Environment, Virtual Patient, Case Based Learning, Medical E-Learning.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

3. Paper 31071207: Effect of AWGN & Fading (Raleigh & Rician) channels on BER performance of a WiMAX communication System (pp. 11-17)

Full Text: PDF

.

Nuzhat Tasneem Awon, Dept. of Information & Communication Engineering, University of Rajshahi, Rajshahi, Bangladesh

Md. Ashraful Islam, Dept. of Information & Communication Engineering, University of Rajshahi, Rajshahi, Bangladesh

Md. Mizanur Rahman, Dept. of Information & Communication Engineering, University of Rajshahi, Rajshahi, Bangladesh

A.Z.M. Touhidul Islam, Dept. of Information & Communication Engineering, University of Rajshahi, Rajshahi, Bangladesh

.

Abstract — The emergence of WIMAX has attracted significant interests from all fields of wireless communications including students, researchers, system engineers and operators. The WIMAX can also be considered to be the main technology in the implementation of other networks like wireless sensor networks. Developing an understanding of the WIMAX system can be achieved by looking at the model of the WIMAX system. This paper discusses the model building of the WIMAX physical layer using computer MATLAB 7.5 versions. This model is a useful tool for BER (Bit error rate) performance evaluation for the real data communication by the WIMAX physical layer under different communication channels AWGN and fading channel (Rayleigh and Rician), different channel encoding rates and digital modulation schemes which is described in this paper. This paper investigates the effect of communication channels of IEEE 802.16 OFDM based WIMAX Physical Layer. The performance measures we presented in this paper are: the bit error rate (BER) versus the ratio of bit energy to noise power spectral density (Eb/No). The system parameters used in this paper are based on IEEE 802.16 standards. The simulation model built for this research work, demonstrates that AWGN channel has better performance than Rayleigh and Rician fading channels. Synthetic data is used to simulate this research work.

.

Keywords- WiMAX; Communication Channel; CRC Coding

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

4. Paper 31071208: Rule Based Hindi to English Transliteration System for Proper Names (pp. 18-21)

Full Text: PDF

.

Monika Bhargava #1, M.Kumar *2, Sujoy Das #3

# 1 M.Tech Scholar CSE Department, SIRT, Bhopal, India

*2 Professor CSE Department, SIRT, Bhopal, India

#3 Associate Professor, Department of Computer Application, MANIT, Bhopal, India

.

Abstract — There are Cross Language Information Retrieval systems that uses bilingual dictionary for translating user query from one language to another. The problem arises when a query term is not available in the bilingual dictionary. Such words are called Out of Vocabulary (OOV) words, and should be transliterated during translation process.OOV words are mainly proper nouns, named entity, and technical terms. We have developed a rule based transliteration system from Hindi to English script. We have also created a database of specialized spelling, e.g. some city names, person names, etc. which has considerably improved performance of our system.

.

Keywords- CLIR, OOV, Transliteration

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

5. Paper 31071230: Fingerprint Hiding in True Color Image (pp. 22-25)

Full Text: PDF

.

Shahd Abdul-Rhman Hasso, Maha Abdul-Rhman Hasso, Omar Saad

Department of Computer Science, College of Computer Sciences and Math., University of Mosul / Mosul, Iraq

.

Abstract — With the progress of the times and the use of technology the importance of the use of biometric is appear to get to the regulations that require identification of persons before using to reduce the risk of security attack. One of the oldest, most prominent and commonly used of these biometrics is the fingerprint, the finger is containing features that have an impact on any surface touched, especially smooth ones, from this the fingerprint become an evidence that inferred by the people. In this work, an algorithm of hiding fingerprint in an image is proposed. the fingerprint is an image of (8 bit) hidden in an image of true color (24bit) form as 1 bit and 2 bits and 4 bits. This is done using the algorithm well known algorithm Least Significant bit (LSB), which helps to hide the images and messages in the less important bits in the original image, also the hiding is applied in one of the three true colors. There is no visually sense on the image before and after hiding, no changes occur on the image. The histogram also used to test the changes on an image.

.

Keywords-component; LSB; Biometric; Fingerprint; True color images.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

6. Paper 31071228: Network Intrusion Detection Using Improved Decision Tree Algorithm (pp. 26-32)

Full Text: PDF

.

K. V. R. Swamy & K. S. Vijaya Lakshmi

Department Of Computer Science and Engineering, V.R.Siddhartha Engineering College, Vijayawada, Andhra Pradesh, India

.

Abstract – Intrusion detection involves a lot of tools that are used to identify different types of attacks against computer systems and networks. With the development of network technologies and applications network attacks are greatly increasing both in number and severe. Open source and commercial network intrusion detection tools are not able to predict new type of attacks based on the previous attacks. So, data mining is one of the methods used in IDS (Intrusion Detection System). In recent years data mining based network intrusion detection system has been giving high accuracy and good detection on different types of attacks. In this paper, the performance of the data mining algorithms like C4.5 and improved C4.5 are being used in order to detect the different types of attacks with high accuracy and less error prone.

.

Keywords- C4.5 Decision Tree; Improved C4.5 Decision Tree; Intrusion detection system

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

7. Paper 31071231: Phases vs. Levels using Decision Trees for Intrusion Detection Systems (pp. 33-39)

Full Text: PDF

.

Heba Ezzat Ibrahim, Dr. Sherif M. Badr, Asst. Prof. Mohamed A. Shaheen

College of Computing and Information Technology, Arab Academy for Science, Technology and Maritime Transport, Cairo, Egypt

.

Abstract — Security of computers and the networks that connect them is increasingly becoming of great significance. Intrusion detection system is one of the security defense tools for computer networks. This paper compares two different model Approaches for representing intrusion detection system by using decision tree techniques. These approaches are Phase-model approach and Level-model approach. Each model is implemented by using two techniques, New Attacks and Data partitioning techniques. The experimental results showed that Phase approach has higher classification rate in both New Attacks and Data Partitioning techniques than Level approach.

.

Keywords-component; network intrusion detection; Decision Tree; NSL-KDD dataset; network security

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

8. Paper 31071234: Survey on Using GIS in Evacuation Planning Process (pp. 40-43)

Full Text: PDF

.

Sara Shaker Abed El-Hamied, Information Systems Departement, Faculty of Computer and information Science, Mansoura University, Egypt.

Ahmed Abou El-Fotouh Saleh, Information Systems Departement, Faculty of Computer and information Science, Mansoura University, Egypt.

Aziza Asem, Information Systems Departement, Faculty of Computer and information Science, Mansoura University, Egypt.

.

Abstract - Natural crises form a big threat on environment; these crises mean the loss of enterprises and individuals, and therefore losses in the sum total of community development. Management to these crises is required through a crisis management plan to control the crises before, during, and after the event. One of the most needed things to consider during preparing the crisis management plan is preparing the evacuation plan in order to transfer people from the incident place to a safe place; this must be done quickly and carefully. Because of the geographic nature of the evacuation process, Geographical Information System (GIS) has been used widely and effectively for over 20 years in the field of crisis management in general and in evacuation planning in particular. This paper provides an overview about evacuation process and the basic concepts of GIS systems. The paper also demonstrates the importance of evacuation planning and how GIS systems used in other studies to assists in evacuation process.

.

Keywords- Crisis Management; Evacuation Planning; Geographical Information System (GIS).

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

9. Paper 31071235: Classification and Importance of Intrusion Detection System (pp. 44-47)

Full Text: PDF

.

Rajasekaran K, Bharathiar University, Coimbatore, India

Nirmala K, Quiad-E-Millath Govt. College for Women, Chennai, India.

.

Abstract - An intrusion detection system (IDS) is a device or software application that monitors network or system activities for malicious activities or policy violations and produces reports to a Management Station. Some systems may attempt to stop an intrusion attempt but this is neither required nor expected of a monitoring system. Due to a growing number of intrusion events and also because the Internet and local networks have become so ubiquitous, organizations are increasingly implementing various systems that monitor IT security breaches. This includes an overview of the classification of intrusion detection systems and introduces the reader to some fundamental concepts of IDS methodology: audit trail analysis and on-the-fly processing as well as anomaly detection and signature detection approaches. This research paper discusses the primary intrusion detection techniques and the classification of intrusion Detection system.

.

Keywords: Intrusion Detection, signature, anomaly, specification, classification

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

10. Paper 31071236: Elimination of Weak Elliptic Curve Using Order of Points (pp. 48-52)

Full Text: PDF

.

Nishant Sinha & Aakash Bansal, School of IT, CDAC Noida, India

.

Abstract - The elliptic curve cryptography (ECC) is a public key cryptography. The mathematical operations of ECC is defined over the elliptic curve y2=x3+ax+b, where 4a3+27b2 ǂ 0. Each value of the ‘a’ and ‘b’ gives a different elliptic curve. All points (x,y) which satisfies the above equation plus a point at infinity lies on the elliptic curve. There are certain property of elliptic curve which makes the cryptography weak. In this paper, we have proposed technique which would eliminate such weak property and will make elliptic curve cryptography more secure.

.

Keywords: cryptography, security, anomalous curve, discrete logarithm problem

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

11. Paper 31071216: Recent Advance in Multi-Carrier Underwater Acoustic Communications (pp. 53-56)

Full Text: PDF

.

G. P. Harish, Annamalai University, Tamilnadu, India

.

Abstract — Underwater acoustic (UWA) channel is characterized as a severe multipath propagation channel due to signal reflections from the surface and the bottom of the sea and also a fast time-varying channel due to transceiver motion and medium inhomogeneities. Therefore, UWA communications have been regarded as the most challenging wireless communications. The Multi-carrier communication is a promising communication technique for future communication systems. In the past decade, much research literature focuses on deploying multi-carrier communications in UWA environments. This paper propose an overview of recent advance in multi-carrier UWA communications, which includes but not limited to Orthogonal Frequency Division Multiplexing (OFDM), Multi-input-Multi-Output (MIMO), and their related channel estimation and adaptive communications.

.

Keywords- Underwater acoustic channel, OFDM, MIMO, Adaptive communications, Channel estimation.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

12. Paper 31071217: Decreasing defect rate of test cases by designing and analysis for recursive modules of a program structure: Improvement in test cases (pp. 57-60)

Full Text: PDF

.

Muhammad Javed, Bashir Ahmad , Zaffar Abbas, Allah Nawaz, Muhammad Ali Abid , Ihsan Ullah

Institute of Computing and Information Technology Gomal University, D.I.Khan, Pakistan

.

Abstract - Designing and analysis of test cases is a challenging tasks for tester roles especially those who are related to test the structure of program. Recently, Programmers are showing valuable trend towards the implementation of recursive modules in a program structure. In testing phase of software development life cycle, test cases help the tester to test the structure and flow of program. The implementation of well designed test cases for a program leads to reduce the defect rate and efforts needed for corrective maintenance. In this paper, author proposed a strategy to design and analyze the test cases for a program structure of recursive modules. This strategy will definitely leads to validation of program structure besides reducing the defect rate and corrective maintenance efforts.

.

Index Term—Test cases, Recursive module, Black-box, Whitebox, corrective maintenance, defect rate.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

13. Paper 31071238: Text Hiding Based on True Color Image Classification (pp. 61-68)

Full Text: PDF

.

Shahd Abdul-Rhman Hasso

Department of Computer Science, College of Computer Sciences and Math., University of Mosul / Mosul, Iraq

.

Abstract — In this work a new approach was built to apply k-means algorithm on true colored images (24bit images) which are usually treated by researchers as three image (RGB) that are classified to 15 class maximum only. We find the true image as 24 bit and classify it to more than 15 classes. As we know k-means algorithm classify images to many independent classes or features and we could increase the class number therefore we could hide information in the classes or features that have minimum number of pixels which are considered unimportant features and reconstruct the images. Correlation factor and Signal to Noise Ratio were used to measure the work and the results seems that by increasing the image resolution the effect of removing minimum features is decreased. The MATLAB 2010 application language was used to build the algorithms which are able to allocate huge matrices especially im image processing.

.

Keywords-component; k-means clustering, steganography, data hiding; True color images.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

14. Paper 31071246: Analysis of Examination Results Data Using Various Mining Techniques (pp. 69-73)

Full Text: PDF

.

Devendra Singh Rajpoot, UIT, RGPV, Bhopal (M.P.)

Dr. Kanak Saxena, Computer Applications SATI, Vidisha (M.P.)

Dr. Anubhuti Khare, UIT, RGPV, Bhopal (M.P.)

.

Abstract - The paper comprises of various pattern mining techniques from data mining such as statistical techniques, classification and clustering. The domain we have chosen is the university domain for the above entitled thesis. The objective for choosing a university domain is, as educational data mining is an emerging discipline concern with the developing method for the exploring the unique types of data that come from the educational context. Due to an increasing number of institutions and students' technical educational institutions becoming increasingly oriented to performance and their measurement and an accordingly setting goals and developing strategies for their achievements [02]. This already happens in Europe in Croatia, USA [01] but still lacking in India. The pattern extracted after applying mining techniques, clearly shows the impact of subject contents in the students' career with the variations in the examination policy.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------