Vol. 10 No. 9 SEP 2012

Vol. 10 No. 9 September 2012 International Journal of Computer Science and Information Security

Publication September 2012, Volume 10 No. 9 (Download Full Journal) (Archive) (Download 2)

.

Copyright © IJCSIS. This is an open access journal distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

1. Paper 22081201: Additive Update Algorithm for Nonnegative Matrix Factorization (pp. 1-7)

Full Text: PDF

.

Tran Dang Hien, Vietnam National University

Do Van Tuan, Hanoi College of Commerce and Tourism, Hanoi – Vietnam

Pham Van At, Hanoi University of Communications and Transport

.

Abstract — Nonnegative matrix factorization (NMF) is an emerging technique with a wide spectrum of potential applications in data analysis. Mathematically, NMF can be formulated as a minimization problem with nonnegative constraints. This problem is currently attracting much attention from researchers for theoretical reasons and for potential applications. Currently, the most popular approach to solve NMF is the multiplicative update algorithm proposed by D.D. Lee and H.S. Seung. In this paper, we propose an additive update algorithm that has faster computational speed than the algorithm of D.D. Lee and H.S. Seung.

.

Keywords - nonnegative matrix factorization; Krush-Kuhn-Tucker optimal condition; the stationarity point; updating an element of matrix; updating matrices;

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

2. Paper 28081215: QoS Adoption And Protect It Against DoS Attack (pp. 8-17)

Full Text: PDF

.

Dr. Manar Y. Kashmola, Computer Sciences Department, Computer Sciences and Mathematics College, Mosul University, Mosul, Iraq

Rasha Saadallah Gargees, Software Engineering Department, Computer Sciences and Mathematics College, Mosul University, Mosul, Iraq

.

Abstract— The enormous growth of the internet and the variation in the needs of its applications resulted in the great interest in the recent years in the Quality of Service (QoS). Since it must meet the QoS in all circumstances, another challenge has emerged which represents a hindrance to achieve the QoS. And this challenge was represented by the emergence of some types of DoS that aim at exhausting the bandwidth and eventually violating the agreements of the QoS. In this research a system was constructed to achieve the QoS depending on the Diffserv technology, as the bandwidth is distributed on the various applications according to the specifications and the requirements of the application, giving the priority to certain applications as well as providing protection to them from the DoS attacks. The model of Anomaly Detection was adopted to detect the attack, and then prohibiting the attack detected by means of dropping the attack flow. The system prove efficiency in improving the QoS for the applications with critical requirements, through measuring a set of factors that affect the QoS and the efficiency degree of halting the DoS attack manifested by means of the available bandwidth, and eventually preserving the bandwidth in the cases of such attacks.

.

Keywords: QoS, DoS, Bandwidth, DiffServ, attack.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

3. Paper 29081218: Investigation of Hill Cipher Modifications Based on Permutation and Iteration (pp. 18-24)

Full Text: PDF

.

Mina Farmanbar & Alexander G. Chefranov, Dept. of Computer Engineering, Eastern Mediterranean University, Famagusta T.R. North Cyprus via Mersin 10, Turkey

.

Abstract— Two recent Hill cipher modifications which iteratively use interweaving and interlacing are considered. We show that strength of these ciphers is due to non-linear transformation used in them (bit-level permutations). Impact of number of iterations on the avalanche effect is investigated. We propose two Hill cipher modifications using column swapping and arbitrary permutation with significantly less computational complexity (2 iterations are used versus 16). The proposed modifications decrease encryption time while keeping the strength of the ciphers. Numerical experiments for two proposed ciphers indicate that they can provide a substantial avalanche effect.

.

Keywords: Hill cipher, non-linear transformation, avalanche effect, permutation, iteration.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

4. Paper 29081220: Underwater Acoustic Channel Modeling: A Simulation Study (pp. 25-28)

Full Text: PDF

.

Pallavi Kamal, Electrical Engineering, University Teknologi Mara, 40450 Shah Alam, Selangor Darul, Ehsan, Malaysia

Taussif Khanna, Institute of Information Technology, Kohat University of Science and Technology, Pakistan

.

Abstract — Underwater acoustic (UWA) communications have been regarded as one of the most challenging wireless communications due to the unique and complicated properties of underwater acoustic environments, such as severe multipath delay, large Doppler shift and fast environmental changes. Therefore, accurate UWA channel modeling is crucial for achieving high performance UWA communication systems. Since there is no generalized UWA channel mode, most of existing channel models is either empirical measurement- or simulation based channel models. In this paper, we propose a study of simulation-based UWA channel modeling, which is based on the Bellhop algorithm and Time Variable Acoustic Propagation Model (TVAPM) platform. Our study is capable of handling almost any type of steady and unsteady environmental motion except the modeling of breaking waves.

.

Keywords-underwater acoustic channel modeling; Bellhop algorithm; VIRTEX platform; environmental motion

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

5. Paper 31081224: A Fast Accurate Network Intrusion Detection System (pp. 29-35)

Full Text: PDF

.

Ahmed A. Elngar, Sinai University, El-Arish ,Egypt

Dowlat A. El A. Mohamed & Fayed F. M. Ghaleb, Ain-Shams University, Cairo, Egypt

.

Abstract — Intrusion Detection System (IDS) is a valuable tool for the defense-in-depth of computer networks. However, Intrusion detection systems face a number of challenges. One of the important challenges is that, the input data to be classified is in a high dimension feature space. In this paper, we effectively proposed PSO-DT intrusion detection system. Where, Particle Swarm Optimization (PSO) is used as a feature selection algorithm to maximize the C4.5 Decision Tree classifier detection accuracy and minimize the timing speed. To evaluate the performance of the proposed PSO-DT IDS several experiments on NSL-KDD benchmark network intrusion detection dataset are conducted. The results obtained demonstrate the effectiveness of reducing the number of features from 41 to 11, which leads to increase the detection performance to 99.17% and speed up the time to 11.65 sec.

.

Keywords-Network Security;Intrusion Detection System; Feature Selection; Particle Swarm Optimization ; Genetic Algorithm; Decision Tree.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

6. Paper 31081231: Quality of Service Support on High Level Petri-Net Based Model for Dynamic Configuration of Web Service Composition (pp. 36-45)

Full Text: PDF

.

Sabri MTIBAA & Moncef TAGINA

LI3 Laboratory / University of Manouba, National School of Computer Sciences, 2010 Manouba, Tunisia

.

Abstract — Web services are widely used thanks to their features of universal interoperability between software assets, platform independent and loose-coupled. Web services composition is one of the most challenging topics in service computing area. In this paper, an approach based on High Level Petri-Net model as dynamic configuration schema of web services composition is proposed to achieve self adaptation to run-time environment and self management of composite web services. For composite service based applications, in addition to functional requirements, quality of service properties should be considered. This paper presents and proves some quality of service formulas in context of web service composition. Based on this model and the quality of service properties, a suitable configuration with optimal quality of service can be selected in dynamic way to reach the goal of automatic service composition. The correctness of the approach is proved by a simulation results and corresponding analysis.

.

Keywords — Web services composition, High Level Petri-Net, dynamic configuration, quality of service

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

7. Paper 31081233: Contextual Ontology for Delivering Learning Material in an Adaptive E-learning System (pp. 46-51)

Full Text: PDF

.

Kalla. Madhu Sudhana, Research Scholar, Dept of Computer Science, St. Peter’s University, Chennai, India

Dr V. Cyril Raj, Head, Dept of Computer Science, Dr M.G.R University,Chennai, India

.

Abstract — The rapid growth of internet technology and the explosion of learning material in educational domain are leading to the next generation E-learning applications that exploit user contextual information to provide a richer experience. One of the activities to perform during the development of these context-aware E-learning applications is to define a model to represent and manage context information. In this work, the model for Context-aware and adaptive learning system has been proposed and introduces context ontology, to model context-related knowledge that allows the system to deliver learning material by adapting learner context in an adaptive learning system.

.

Keywords-component; Context aware e-learning; Adaptive Delivery of learning material; Ontology based context model

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

8. Paper 31081234: Comparison of Supervised Learning Techniques for Binary Text Classification (pp. 52-59)

Full Text: PDF

.

Hetal Doshi, Dept of Electronics and Telecommunication, KJSCE, Vidyavihar, Mumbai - 400077, India.

Maruti Zalte, Dept of Electronics and Telecommunication, KJSCE, Vidyavihar, Mumbai - 400077, India

.

Abstract — Automated text classifier is useful assistance in information management. In this paper, supervised learning techniques like Naïve Bayes, Support Vector Machine (SVM) and K Nearest Neighbour (KNN) are implemented for classifying certain categories from 20 Newsgroup and WebKB dataset. Two weighting schemes to represent documents are employed and compared. Results show that effectiveness of the weighting scheme depends on the nature of the dataset and modeling approach adopted. Accuracy of classifiers can be improved using more number of training documents. Naïve Bayes performs mostly better than SVM and KNN when number of training documents is few. The average amount of improvement in SVM with more number of training documents is better than that of Naïve Bayes and KNN. Accuracy of KNN is lesser than Naïve Bayes and SVM. Procedure to evaluate optimum classifier for a given dataset using cross-validation is verified. Procedure for identifying the probable misclassified documents is developed.

.

Keywords- Naïve Bayes, SVM, KNN, Supervised learning and text classification.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

9. Paper 31081241: Creation of Digital Test Form for Prepress Department (pp. 60-64)

Full Text: PDF

.

Jaswinder Singh Dilawari, Research Scholar, Pacific University, Udaipur,Rajasthan, India

Dr. Ravinder Khanna, Sachdeva Engineering College for Girls, Mohali, Punjab,India

.

Abstract - The main problem in colour management in prepress department is lack of availability of literature on colour management and knowledge gap between prepress department and press department. So a digital test from has been created by Adobe Photoshop to analyse the ICC profile and to create a new profile and this analysed data is used to study about various grey scale of RGB and CMYK images. That helps in conversion of image from RGB to CMYK in prepress department.

.

Keywords: IT8 Test Chart, Digital Test Form, Characterisation of Scanners, ISO 12641-1997, Calibration of Scanners

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

10. Paper 31081247: Web Test Integration and Performance Evaluation of E-Commerce web sites (pp. 65-69)

Full Text: PDF

.

Md. Safaet Hossain, Department of Electrical Engineering and Computer Science, North South University, Dhaka Bangladesh

Md. Shazzad Hosain, Department of Electrical Engineering and Computer Science, North South University, Dhaka Bangladesh

.

Abstract — Web applications are becoming progressively more complex and imperative for companies. The e-commerce web sites have been serving to accelerate and disseminate more widely changes that are already under way in the economy. Their development, including analysis, design and testing, needs to be approached by means of support tools, while their correctness and reliability are often crucial to the success of businesses and organizations. There are some tools provided to support analysis and design. However, few tools are provided to directly support the software testing on Web-based applications. In this paper, an automated online website evaluation tool hosted at http://safaethossain.comze.com is proposed to support the automated testing of web-based applications. Testers can evaluate performance of a site with other websites and can precisely express the existing websites and find out what are the modifications required. The tool elevates the automation level of functional testing for web applications into a new height.

.

Keywords: Web based application testing, performance testing, functional testing, test methods integration, e-commerce.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

12. Paper 31031281: Comprehensive Analysis of π Base Exponential Functions as a Window (pp. 79-85)

Full Text: PDF

.

Mahdi Nouri, Sepideh Lahooti, Sepideh Vatanpour, and Negar Besharatmehr

Dept. of Electrical Engineering, Iran University of Science & Technology, A.B.A Institute of Higher Education, Iran

.

Abstract — A new simple form window with the application of FIR filter design based on the π Base exponential function is proposed in this article. An improved window having a closed simple formula which is symmetric ameliorates ripple ratio in comparison with Kaiser and cosine hyperbolic windows. The proposed window has been derived in the same way as Kaiser Window, but its advantages have no power series expansion in its time domain representation. Simulation results show that proposed window provides better ripple ratio characteristics which are so important for some applications. A comparison with Kaiser window shows that the proposed window reduces ripple ratio in about 6.4dB which is more than Kaiser’s in the same mainlobe width. Moreover in comparison to cosine hyperbolic window, the proposed window decreases ripple ratio in about 6.5dB which is more than cosine hyperbolic’s. The proposed window can realize different criteria of optimization and has lower cost of computation than its competitors.

.

Keywords-component; Window functions; Kaiser Window; FIR filter design; Cosine hyperbolic window

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

13. Paper 31081237: Enhanced techniques for PDF Image Segmentation and Text Extraction (pp. 86-90)

Full Text: PDF

.

D. Sasirekha, Research Scholar, Computer Science, Karpagam University, Coimbatore, Tamilnadu, India

Dr. E. Chandra, Director,Dept of Computer Science, SNS Rajalakshmi college of Arts and Science, Coimbatore,Tamilnadu,India

.

Abstract — Extracting text objects from the PDF images is a challenging problem. The text data present in the PDF images contain certain useful information for automatic annotation, indexing etc. However variations of the text due to differences in text style, font, size, orientation, alignment as well as complex structure make the problem of automatic text extraction extremely difficult and challenging job. This paper presents two techniques under block-based classification. After a brief introduction of the classification methods, two methods were enhanced and results were evaluated. The performance metrics for segmentation and time consumption are tested for both the models.

.

Keywords- Block based segmentation, Histogram based, AC Coefficient based.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

14. Paper 31081222: Towards an Ontology based integrated Framework for Semantic Web (pp. 91-99)

Full Text: PDF

.

Nora Y. Ibrahim, Computer and System Department, Electronic Research Institute, Cairo, Egypt

Sahar A. Mokhtar, Computer and System Department, Electronic Research Institute, Cairo, Egypt

Hany M. Harb, Computer and Systems Engineering, Department, Faculty of Engineering, Al-Azhar University, Cairo, Egypt

.

Abstract — This Ontologies are widely used as a means for solving the information heterogeneity problems on the web because of their capability to provide explicit meaning to the information. They become an efficient tool for knowledge representation in a structured manner. There is always more than one ontology for the same domain. Furthermore, there is no standard method for building ontologies, and there are many ontology building tools using different ontology languages. Because of these reasons, interoperability between the ontologies is very low. Current ontology tools mostly use functions to build, edit and inference the ontology. Methods for merging heterogeneous domain ontologies are not included in most tools. This paper presents ontology merging methodology for building a single global ontology from heterogeneous eXtensible Markup Language (XML) data sources to capture and maintain all the knowledge which XML data sources can contain.

.

Keywords- Ontologies; Ontology management; ontology mapping; ontology merging

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

15. Paper 31081238: Face Recognition By Fusing Subband Images And PCA (pp. 100-105)

Full Text: PDF

.

T. Mohandoss, R. Thiyagarajan, S. Arulselvi

Annamalai University

.

Abstract — Face recognition is one of the challenging applications of image processing. This has become an important issue in many applications such as security systems, credit card verification and criminal identification etc. Robust face recognition algorithm should posses the ability to recognize identity despite many variations in pose, illumination and appearance. Principal Component Analysis (PCA) has been frequently used as the potential algorithm for dimension reduction. However, it has its limitations like poor discriminatory power and large computational load. In view of these limitations, the proposed work combines PCA and different types of wavelet for a better feature representation. In this method, wavelet transform is used to decompose an image into different frequency sub bands as a pre processing step followed by PCA to reduce the dimensionality of the image matrix into feature matrix. Euclidean distance measure method is used for classification. The proposed method gives better recognition rate and discriminatory power. Further, the proposed method reduces the computational load significantly even when the image database is large. This paper details the design and implementation of the proposed method, and presents encouraging experimental results with standard face AT&T database. The effectiveness of the proposed work is justified by FAR (False Acceptance Rate), FRR (False Rejection Rate) and ROC (Receiver Operating Characteristics). Significant improvements in terms of both FRR and FAR are observed. When compared with conventional methods.

.

Keywords--- Human face recognition, Principal Component Analysis, Sub band, Wavelet transforms.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

16. Paper 31081228: Identifying Critical Features For Network Forensics Investigation Perspectives (pp. 106-128)

Full Text: PDF

.

Ikuesan R. Adeyemi, Shukor Abd Razak, Nor Amira Nor Azhan

Department of Computer System and Communications,

Faculty of Computer Science and Information Systems,

Universiti Teknologi Malaysia

.

Abstract - Research in the field of network forensics is gradually expanding with the propensity to fully accommodate the tenacity to help in adjudicating, curbing and apprehending the exponential growth of cyber crimes. However, investigating cyber crime differs, depending on the perspective of investigation. There is therefore the need for a comprehensive model, containing relevant critical features required for a thorough investigation for each perspective, which can be adopted by investigators. This paper therefore presents the findings on the critical features for each perspective, as well as their characteristics. The paper also presents a review of existing frameworks on network forensics. Furthermore, the paper discussed an illustrative methodological process for each perspective encompassing the relevant critical features. These illustrations present a procedure for the thorough investigation in network forensics.

.

Key words: Network Forensics Investigation, Model, Framework, Perspective, Military, Law Enforcement, Industries, Investigator.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

17. Paper 31081229: Hybrid Model of Rough Sets & Neural Network for Classifying Renal stones Patient (pp. 129-135)

Full Text: PDF

.

Shahinda Mohamed Al Kholy, Ahmed Abo Al Fetoh Saleh, Aziza Asem,Khaled Z. Sheir,M.D.

Department of IS, Faculty of Computers and Information Science, and Urology and Nephrology Center, Mansoura University, Mansoura, Egypt

.

Abstract - Despite advances in diagnosis and therapy, renal stone disease remains a significant health problem. Considerable amount of time and effort has been expended researching and developing systems capable of classifying renal stones patients truly. This paper proposes a new approach for this classification by using a hybrid model of Rough Sets & ANN to predict optimum renal stone fragmentation in patients being managed by extracorporeal shock wave lithotripsy (ESWL). Rough Sets used to reduce the input factors and detect the most important ones that are used as input vectors for the ANN. The result (of treatment and the model) will be Free (success in removing the stone completely) or not Free.

.

Keywords - Renal Stones, Rough Sets, Artificial Neural Network (ANN), Fragmentation extracorporeal shock wave lithotripsy (ESWL).

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

18. Paper 23071202: Cloned Agent based data computed in Homogeneous sensor networks (pp. 136-140)

Full Text: PDF

.

S. Karthikeyan, Sathyabama university, Chennai-600119, Tamil Nadu, India

S.Jayashri, Adhiparasakthi engineering college, Melmaruvathur – 603319, Kanchipuram District, Tamil Nadu, India

.

Abstract - The innovation in the world of Wireless communication led to progressive use of tiny and multifunctional sensor nodes. These nodes, being small in size can sense the environment, compute data and communicate to a large range. The energy constraint is one of the major limitations in sensor nodes, hence given major focus. The usage of manifold mobile agents proposed by mobile agent based framework, offers flexible and robust data collection within WSNs. This also provides diverse solutions to energy constraint problems in WSN. This paper proposes multiagent system based data gathering from the WSN. The mobile agent created in the sink is cloned n-1 times, where n is the number of clusters. The cloned mobile agents travel to their corresponding cluster in a parallel fashion and compute the data for which the event occurs. Finally the computed results are transferred to the sink which sends an alert for the occurred event to the mobile device. The mobile agent computes and transfers only the result minimizing energy consumption. The approach of transferring only the event occurred data also conserves node energy. This paper proposes that the sink monitors any application and when an event is sensed, it is notified to the user via message and call.

.

Keywords: Mobile agent, Wireless sensor networks, energy consumption, lifetime.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------