Vol. 11 No. 6 JUN 2013

Vol. 11 No. 6 JUNE 2013 International Journal of Computer Science and Information Security

Publication JUNE 2013, Volume 11 No. 6 (Download Full Journal) (Archive) (Download 2)

.

Copyright © IJCSIS. This is an open access journal distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

1. Paper 31051314: 3-SAT Problem: A New Memetic-PSO Algorithm (pp. 1-6)

Full Text: PDF

Academia.edu

.

Nasser Lotfi, Jamshid Tamouk, Mina Farmanbar

Department of Computer Engineering, EMU University, Famagusta, North Cyprus

.

Abstract — 3-SAT problem is of great importance to many technical and scientific applications. This paper presents a new hybrid evolutionary algorithm for solving this satisfiability problem. 3-SAT problem has the huge search space and hence it is known as a NP-hard problem. So, deterministic approaches are not applicable in this context. Thereof, application of evolutionary processing approaches and especially PSO will be very effective for solving these kinds of problems. In this paper, we introduce a new evolutionary optimization technique based on PSO, Memetic algorithm and local search approaches. When some heuristics are mixed, their advantages are collected as well and we can reach to the better outcomes. Finally, we test our proposed algorithm over some benchmarks used by some another available algorithms. Obtained results show that our new method leads to the suitable results by the appropriate time. Thereby, it achieves a better result in compared with the existent approaches such as pure genetic algorithm and some verified types.

.

Keywords: 3-SAT problem; Particle swarm optimization; Memetic algorithm; Local search.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

2. Paper 31051328: Design a Data Model Diagram from Textual Requirements (pp. 7-12)

Full Text: PDF

Academia.edu

.

Thakir N. Abdullah, Msc. Student, Software Engineering Dept., University of Mosul, Mosul, Iraq

Dr. Nada N. Saleem, Asst. Prof., Software Engineering Dept., University of Mosul, Mosul, Iraq

.

Abstract — This paper try to automate the process of designing data model diagram (Entity Relationship Diagram) from textual requirements. It focuses on the very early stage of the database development which is the stage of user requirement analysis. It is supposed to be used between the requirements determination stage and analysis. The approach provides the opportunity of using natural language text documents as a source and extract knowledge from textual requirements for generation of a conceptual data model. The system performs information extraction by parsing the syntax of the sentences and semantically analyzing their content.

.

Index Terms — natural language processing, textual requirements, conceptual data modeling, heuristic rules.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

3. Paper 31051334: Towards a Multi-Level architecture of distributed, dynamic and cooperative workflow management (pp. 13-19)

Full Text: PDF

Academia.edu

.

Samiha EL MESSARI, Khalid BOURAGBA, Mohamed OUZZIF and Mounir RIFI

Laboratory RITM, CEDoc ENSEM, University Hassan II – Ain Chock, Casablanca, Morocco

.

Abstract — Workflow technology, designed to automate business processes and provide support to their management is now an active area of research. It is within this context that our work covers both the modeling workflow process and its cooperation through a system of distributed workflow management. The emergence of what might be called Cloud Virtual Enterprise , covering all partners in order to achieve an overall business process and complement the expertise of each, has created the need for the management of this exchange and for the coordination and interoperability ensuring greater autonomy and flexibility of users, within the framework of an interorganizational workflow. In this paper we first present a literature review of workflow management and the different existing approaches about cooperation. Then, we suggest a multileveled architecture of a collaborative workflow management system and distributed dynamic of a virtual business on Cloud. Finally, we offer an algorithm for cooperation between the socalled private and public components workflow in the environment of a dynamic virtual enterprise. This algorithm of cooperation is divided into four phases, namely: publication, search, filter and connection.

.

Mots-clés : Workflow, WFMS, Multi-level Architecture Cooperation, Virtual Enterprise, CoopFlow, cloud.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

4. Paper 31051338: Text Summarization Using Tense Recognizing Identifier (pp. 20-24)

Full Text: PDF

Academia.edu

.

Rajesh Wadhvani & Devshri Roy

Computer Science Department, National Institute of Technology, Bhopal, India

.

Abstract — Text summarization method finds important data and select relevant sentences to form a summary from the original text data. In this paper a new approach for extracting summary from a document is proposed. The updated information about the document is obtained in two phases. In the first phase, parsing is performed on tagged sentences governed by some rules and different chunks obtained are separated. In Second phase, summary of future chunks is found based on some parameters like word frequency, sentence position etc. To extract the future sense of sentences from the complete text, modal verbs are used. The new summary produced can now meets the need of user by making selection easier and saving reading time.We generated the summaries of documents using our approach and compared the results with respective ideal summaries that showed that sentences in the generated summaries are really helpful in extracting the important data according to user.

.

Keywords: Knowledge Extraction; Text Summarization; Extract Summarization; Abstract Summarization; Part-of speech (POS) Tagging; Scoring.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

5. Paper 31051339: A Game Theoretic Formulation for Strategic Sensing in Cognitive Radio Networks: Equilibrium Analysis and Fully Distributed Learning (pp. 25-32)

Full Text: PDF

Academia.edu

.

Sofia Bouferda, RITM-ESTC-GREENTIC, ENSEM-Hassan II University, Casablanca, Morocco

Essaid Sabir, ENSEM-GREENTIC, Hassan II University, Casablanca, Morocco

Aawatif Hayar, ENSEM-GREENTIC, Hassan II University, Casablanca, Morocco

Mounir RIFI, RITM-ESTC-GREENTIC, Hassan II University, Casablanca, Morocco

.

Abstract — In cognitive radio (CR) systems, the licenced bands are opened to secondary users (SU), when they are not used. To support this reuse the CR users must sense the environment, and use the spectrum when its not utilized by primary users (PU). For these reasons, the spectrum sensing is an important topic in cognitive radio networks (CRN). In this paper, we consider a distributed opportunistic access (D-OSA), in which CR users attempt to access a channel licensed to a primary network. In this context, we formulate the problem of designing the equilibrium sensing time in a distributed manner, in order to maximize the throughput of CR users while guarantying a good protection to the PU. Next, we study the Nash equilibrium of the system, we also propose a combined learning algorithm for continuous actions that is fully distributed, and allows to the CR users to learn their equilibrium payoffs and their equilibrium sensing time. Finaly we give a comparison between the proposed solution and a centralized one. The simulation results show that the system can learn the sensing time and converge to a unique Nash equilibrium, which come to prove the theoretical study. The comparison between the proposed solution and the centralized one shows an expected result, which is the higher performances of the centralized method, in terms of throughput and sensing time, but as we can see in the simulation results, the difference is slight.

.

Keywords— Distributed Spectrum sensing, Nash equilibrium, combined learning.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

6. Paper 31051341: A Neural Approach for Analysis of Lymphocytes in Detection of Rheumatoid Arthritis using Center Approximation Method (pp. 33-38)

Full Text: PDF

Academia.edu

.

Murugan V. & Thivakaran T.K.

Department of Computer science and Engineering,Sri Venkateswara College of Engineering,Chennai, India

.

Abstract — Rheumatoid Arthritis is an autoimmune disease that mainly affects joints in the human body. It is a chronic disease that causes stiffness, pain, swelling and limited motion of various joints which leads to the erosion of bones at the joints. As treatments are currently available only to delay or stop the erosion and not to regain the eroded joints, it is important to detect its occurrence at the onset of aberration. Early detection of Rheumatoid Arthritis involves analysis of Lymphocytes present in human blood. Manual analysis of Lymphocytes is a long term process which needs an expert hematologist for continuous microscopic assessment of blood smear which is costly and time consuming. Digital image processing plays a vital role in the field of medical diagnosis. The proposed work aims to minimize the expenditure of the assessment of Lymphocytes with the help of digital image processing techniques. 105 samples of blood smear images containing Lymphocytes are collected from various laboratories out of which 60 images are affected and 45 images are not affected by rheumatoid arthritis. In order to reduce the noise from these images, initially they are enhanced using Weiner Filter. To locate the region of interest the enhanced images are subjected to thresholding. After thresholding image is allowed to segmentation using bounding box technique in order to separate the nucleus of the Lymphocyte from the smear image. The segmented nucleus is used to extract the required features: area, perimeter and circularity. Here the circularity value is obtained using center approximation method. These features are given to a single layer perceptron which achieved a classification accuracy of about 97.50%.

.

Keywords - Adaptive thresholding, Circularity of Lymphocytes.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

7. Paper 31051342: The Use of Cuckoo Search in Estimating the Parameters of Software Reliability Growth Models (pp. 39-46)

Full Text: PDF

Academia.edu

.

Dr. Najla Akram AL-Saati & Marwa Abd-AlKareem

Software Engineering Dept, College of Computer Sciences & Mathematics, Mosul, Iraq

.

Abstract — this work aims to investigate the reliability of software products as an important attribute of computer programs; it helps to decide the degree of trustworthiness a program has in accomplishing its specific functions. This is done using the Software Reliability Growth Models (SRGMs) through the estimation of their parameters. The parameters are estimated in this work based on the available failure data and with the search techniques of Swarm Intelligence, namely, the Cuckoo Search (CS) due to its efficiency, effectiveness and robustness. A number of SRGMs is studied, and the results are compared to Particle Swarm Optimization (PSO), Ant Colony Optimization (ACO) and extended ACO. Results show that CS outperformed both PSO and ACO in finding better parameters tested using identical datasets. It was sometimes outperformed by the extended ACO. Also in this work, the percentages of training data to testing data are investigated to show their impact on the results.

.

Keywords- Software Reliability; Growth Models; Parameter estimation; Swarm Intelligence; Cuckoo Search

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

8. Paper 31051344: Toward a New Approach for Modeling Dependability of Data Warehouse System (pp. 47-54)

Full Text: PDF

Academia.edu

.

Imane Hilal, Nadia Afifi, Reda Filali Hilali, Mohammed Ouzzif

RITM Lab., Computer Engineering Department, ESTC, Hassan II University, Casablanca, Morocco

.

Abstract — The sustainability of any Data Warehouse System (DWS) is closely correlated with user satisfaction. Therefore, analysts, designers and developers focused more on achieving all its functionality, without considering others kinds of requirement such as dependability’s aspects. Moreover, these latter are often considered as properties of the system that will must be checked and corrected once the project is completed. The practice of "fix it later" can cause the obsolescence of the entire Data Warehouse System. Therefore, it requires the adoption of a methodology that will ensure the integration of aspects of dependability since the early stages of project DWS. In this paper, we first define the concepts related to dependability of DWS. Then we present our approach inspired from the MDA (Model Driven Architecture) approach to model dependability’s aspects namely: availability, reliability, maintainability and security, taking into account their interaction.

.

Keywords-component; Data Warehouse System; Model Driven Architecture ; Dependability; Availability; Reliability, Security, Maintainability.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

9. Paper 31051345: A Novel Framework using Similar to Different Learning Strategy (pp. 55-67)

Full Text: PDF

Academia.edu

.

Bhanu Prakash Battula & Dr. R. Satya Prasad

Acharya Nagarjuna University, Guntur, India.

.

Abstract — Most of the existing classification techniques concentrate on learning the datasets as a single similar unit, in spite of so many differentiating attributes and complexities involved. However, traditional classification techniques, require to analysis the dataset prior to learning and for not doing so they loss their performance in terms of accuracy and AUC. To this end, many of the machine learning problems can be very easily solved just by careful observing human learning and training nature and then mimic the same in the machine learning. In response to these issues, we present a comprehensive suite of experiments carefully designed to provide conclusive, reliable, and significant results on the problem of efficient learning. This paper proposes a novel, simple and effective machine learning paradigm that explicitly exploits this important similar-to-different (S2D) human learning strategy, and implement it based on three algorithms (C4.5, CART and LR) efficiently. The framework not only analyzes the datasets prior to implementation, but also carefully allows classifier to have a systematic study so as to mimic the human training technique designed for efficient learning. Experimental results show that the method outperforms the state of art methods in terms of learning capability and breaks through the gap between human and machine learning. In fact, the proposed method similar-to-different (S2D) strategy may also be useful in efficient learning of realworld complex and high dimensional datasets, especially which are very typical to learn with traditional classifiers.

.

Keywords- Data Mining, Classification; learning strategy; Similar-to-Different (S2D).

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

10. Paper 31051347: Implementation of Back Propagation Algorithm For Estimation of Stress and Strain of Alloy Wheel (pp. 68-72)

Full Text: PDF

Academia.edu

.

R.I. Rajidap Neshtar, Research Scholar, Department of Mechanical Engineering, Vinayaka Missions University, Salem, India.

Dr. S. Purushothaman, Professor, Department of Mechanical Engineering, PET Engineering College, Tirunelveli District-627117, India

.

Abstract — This paper presents estimation of stress and strain of a Rapid prototype product using artificial neural network (ANN). Back propagation algorithm is used to train the ANN topology. 3D model of alloy wheel is developed by using PROE. The model is analyzed using ANSYS to find the Von Mises stress and equivalent strain. The algorithm is trained using 15 values in the input layer of the ANN topology and two values in the output layer: stress and strain that are to be estimated during the testing stage of BPA algorithm. The number of nodes in the hidden layer for BPA varies depending upon the weight updating equations.

.

Keywords - Back Propagation Algorithm, Finite Element Method, Structural Analysis, Alloy Wheel, Mean Squared Error.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

11. Paper 31051348: An Approach to Reveal Website Defacement (pp. 73-79)

Full Text: PDF

Academia.edu

.

Rajiv Kumar Gurjwar, Computer Science Engineering Department, MANIT, Bhopal (M.P.), INDIA

Divy­a Rishi Sahu, Computer Science Engineering Department, MANIT, Bhopal (M.P.), INDIA

Deepak Singh Tomar, Computer Science Engineering Department, MANIT, Bhopal (M.P.), INDIA

.

Abstract — Due to ad-hoc nature of web application development and design complexity of web application, it is difficult to attain fool proof web security. In recent years invaders defaced several web sites by projecting techniques such as phishing, code injection etc. In the web defacement attack the invader changes the visual appearance of the webpage. The business competitor, Insurgent and extremist groups defame the reputation of the organizations and mislead public through these types of attacks. Manual monitoring and scrutinizing these attacks on web sites is a time consuming and tedious task for law enforcement agencies. Hence there is a need to develop a system which effectively monitors the content of web sites and automatically generate alarm for any suspicious or threatening activity. In this work a prototype system is developed to scrutinize and detects the defacement activities automatically. At first phase web contents are preprocessed and stored in the web domain dictionary. Second phase checked integrity of web contents through CRC32, MD5, SHA 512, PSNR and SSIM techniques. The developed system successfully scrutinizes the web defacement attacks and it would be helpful for web administrator to monitor the web defacement attacks.

.

Keywords - web security; website defacement; internet security.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

12. Paper 31051309: Java Card For PayTV Application (pp. 80-85)

Full Text: PDF

Academia.edu

.

Pallab Dutta, Team Leader, Centre For Development Of Telematics, Electronic City, Bangalore, India.

.

Abstract — Smart cards are widely used along with PayTV receivers to store secret user keys and to perform security functions to prevent any unauthorized viewing of PayTV channels. Java Card technology enables programs written in the Java programming language to run on smart cards. Smart cards represent one of the smallest computing platforms in use today. The memory configuration of a smart card are of the order of 4K of RAM, 72K of EEPROM, and 24K of ROM. Using Java card provides advantages to the industry in terms of ease of coding, faster time to market and faster upgrades as compared to plain smart cards . Also different applications like payTV, e-commerce, health-card can easily be implemented in a single java card as multiple applets corresponding to each application can coexists in a single java card. But there are security concerns in java cards and also the performance issues. In this paper, we analyse the suitability of using Java card for PayTV applications as part of conditional access system in place of plain smart cards.

.

Keywords- Smart Card, Java Card, PayTV, Conditional Access System (CAS), Cryptography

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

13. Paper 31051320: Implementation of Omni Directional Cognitive Memory In Office Mobile Robot (pp. 86-92)

Full Text: PDF

Academia.edu

.

S. Sivagnana sundari, Research Scholar, Department of Statistics, Manonmaniam Sundaranar University, Tirunelveli, INDIA.

Dr. C. Vijayalakshmi, Professor, School of Advance Sciences, Department of Mathematics Division,VIT University, Chennai, INDIA.

.

Abstract - This paper presents a method for building omni directional memory from two dimensional memory storage. The omni directional memory is implemented in the office mobile robot. Time series method is used to estimate the next position of the robot based on the stored memory. Images and sounds are collected in the office environment to store expert database in the memory of the robot. A section of the image frames taken in the corridor and how the image is associated in the omni directional memory is shown. Based on the information in the memory and the speed with which the robot is moving, the method of predicting the next position by time series method is discussed.

.

Keywords: Omni directional, Mobile robot, Two dimensional memory, Time series method

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

14. Paper 31051329: Suggest an Aspect-Oriented Design Approach for UML Communication Diagram (pp. 93-98)

Full Text: PDF

Academia.edu

.

Mohammed F. Nather, Software Engineering Dept., University of Mosul, Mosul, Iraq

Dr. Nada N. Saleem, Software Engineering Dept., University of Mosul, Mosul, Iraq

.

Abstract - More and more works are done on the design of the Unified Modeling Language (UML) which is designed to help us for modeling effective object oriented software , Existing Object-Oriented design methods are not mature enough to capture non-functional requirement such as concurrency, fault tolerance , distribution and persistence of a software approach. Our approach proposed to use aspect-oriented software development (AOSD) mechanisms to solve the issues for interactions of the communication diagram in UML that support only the Object-Oriented mechanisms ,thus AOSD allow to design programs that are out of reach of strict Object-Orientation and could possibly improve the structures and implementations.

.

Keywords-Aspect-Oriented Programming (AOP), Unified Modeling Language (UML) Aspect Oriented Software Development (AOSD), Software Engineering (SE), Separation of Concerns (SoC)

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

15. Paper 31051337: Satellite Image Classification Methods and Landsat 5TM Bands (pp. 99-103)

Full Text: PDF

Academia.edu

.

Jamshid Tamouk, Nasser Lotfi, Mina Farmanbar

Department of Computer Engineering, EMU University, Famagusta, North Cyprus

.

Abstract — This paper attempts to find the most accurate classification method among parallelepiped, minimum distance and chain methods. Moreover, this study also challenges to find the suitable combination of bands, which can lead to better results in case combinations of bands occur. After comparing these three methods, the chain method over perform the other methods with 79% overall accuracy. Hence, it is more accurate than minimum distance with 67% and parallelepiped with 65%. On the other hand, based on bands features, and also by combining several researchers' findings, a table was created which includes the main objects on the land and the suitable combination of the bands for accurately detecting of land cover objects. During this process, it was observed that band 4 (out of 7 bands of Landsat 5TM) is the band, which can be used for increasing the accuracy of the combined bands in detecting objects on the land.

.

Keywords: parallelepiped, minimum distance, chain method, classification, Landsat 5TM, satellite band

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

16. Paper 31051343: A Survey of Satellite Imagery Classification with Different Approaches (pp. 104-108)

Full Text: PDF

Academia.edu

.

Dr. Ghayda A. Al-Talib, Dept. of Computer Sciences, College of Mathematics and Computer sciences, University of Mosul, Mosul, Iraq

Ekhlas Z. Ahmed, Dept. of Computer Sciences, College of Mathematics and Computer sciences, University of Mosul, Mosul, Iraq

.

Abstract — This paper, proposes a new classification method that uses Hidden Markov Models (HMM s) to classify remote sensing imagery by exploiting the spatial and spectral information. When applying unsupervised classification to remote sensing images it can provide more useful and understandable information. Experiments shows that other clustering scheme like traditional k-means does not performs well because it does not take into account the spatial dependencies. Experiments are conducted on a set of multispectral satellite images. Proposed algorithm is verified for simulated images and applied for a selected satellite image processing in the MATLAB environment.

.

Index Terms — Hidden Markov Models(HMM), land cover, multispectral satellite images, unsupervised classification.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

17. Paper 23021317: Secure Routing in UAV (pp. 109-122)

Full Text: PDF

Academia.edu

.

Ahmed Refaat Sobhy, Rowayda.A.Sadek, Atalla Hashad

Arab Academy for Science & Technology & Maritime Transport, College of Engineering & Technology, Cairo, Egypt

.

Abstract — The field of UAV has gained an important part of the interest of researchers and become very popular in last few years. Focusing in the routing protocols used in UAV’s systems in order to obtain a secure routing protocol this paper presents the effect of DOS attack on two different types of routing protocols , proactive and reactive routing protocols. The proactive routing protocol is represented by OLSR routing protocol and the reactive routing protocol is represented by AODV , TORA routing protocols . in addition the performance metrics of ordinary routing protocols (OLSR , AODV , TORA ) are compared in three different scenarios implemented by using Opnet simulator. The simulation results will show the performance impact of security implements into reactive & proactive protocols after implementations of Authentication & encryption algorithms. The main concern of this paper is to propose an efficient and secure routing protocol to the UAV.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

18. Paper 31031339: Survey on Internet-based Mobile Ad Hoc Networking (pp. 123-128)

Full Text: PDF

Academia.edu

.

Omung Goyal, Swati Jaiswal, Prateek Poste

Dept. of CSE, UIT RGPV, Bhopal

.

Abstract - Internet‐based Mobile Ad Hoc Networking (MANET) is an emerging technology that supports self‐organizing mobile networking infrastructures. This is expected to be of great use in commercial applications for the next generation internet users. A number of technical challenges are faced today due to the heterogeneous, dynamic nature of this hybrid MANET. A new hybrid routing scheme AODV ALMA is proposed, which act simultaneously combining mobile agents to find path to the gateway and on‐demand distance vector approach to find path in local MANET is one of the unique solution. An adaptive gateway discovery mechanism based on mobile agents making use of pheromone value, pheromone decay time and balance index is used to estimate the path and next hop to the gateway. The mobile nodes automatically configure the address using mobile agents first selecting the gateway and then using the gateway prefix address. The mobile agents are also used to track changes in topology enabling high network connectivity with reduced delay in packet transmission to Internet.

.

Keywords: Hybrid MANET, mobile agents, AODV ALMA, adaptive gateway discovery.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

.