Vol. 12 No. 5 MAY 2014

Vol. 12 No. 5 MAY 2014 International Journal of Computer Science and Information Security

Publication MAY 2014, Volume 12 No. 5 (Download Full Journal) (Archive) (Download 2)

.

Copyright © IJCSIS. This is an open access journal distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

1. Paper 30041408: An Advanced Bottom Up Generalization Approach For Big Data On Cloud (pp. 1-6)

Full Text: PDF

.

K. R. Pandi Lakshmi, Department of Computer Science, Vel’s University, Chennai, India.

Dr. G. Rasitha Banu, Department of MCA, Vel’s University, Chennai, India

.

Abstract — At present, the scale of data in many cloud applications increases tremendously in accordance with the Big Data trend, thereby making it a challenge for commonly used software tools to capture, manage and process such large-scale data within a tolerable elapsed time. In big data applications, data privacy is one of the most concerned issues because processing large-scale privacy-sensitive data sets often requires computation power provided by public cloud services. As a result is challenge for existing anonymization approaches to achieve privacy preservation on privacy-sensitive large-scale data sets due to their insufficiency of scalability. In this paper we propose a scalable Advanced Bottom up generalization approach for data anonymization based on Map Reduce on cloud. To make full use of the parallel capability of Map Reduce on cloud, specializations are required in an anonymization process. Original datasets are split up into a group of smaller datasets, and these datasets are anonymized in parallel, producing intermediate results. Then, the intermediate results are merged into one, and further anonymized to achieve consistent k-anonymous data sets. A group of MapReduce jobs are deliberately designed and coordinated to perform specializations on data sets collaboratively.

.

Keywords- cloud; Data Anonymization; MapReduce; Bottom Up Generalization.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

2. Paper 30041417: Proposal of Countermeasure against Attacks Similar to Stuxnet (pp. 7-13)

Full Text: PDF

.

Youssef ZIZA, RITM LAB ESTC, CED ENSEM Hassan II University, Casablanca, Morocco

Hicham BELHADAOUI, RITM LAB ESTC, Hassan II University, Casablanca, Morocco

Nadia AFIFI, RITM LAB ESTC, Hassan II University, Casablanca, Morocco

Mounir RIFI, RITM LAB ESTC, Hassan II University, Casablanca, Morocco

.

Abstract — A command control system refers to a general control system, of a production system, of a process, or of another type of dynamic system, wherein the control elements are not centralized, but are distributed throughout the system; and each component or sub- system is controlled by one or more controllers. DCS (Distributed Control System) is a computerized control system used to control the production line in the industry. The entire controller system is connected via networks communication and monitoring. DCS is a very broad term used in various industries, to monitor and control distributed equipment. Nowadays, there are generally an information system upstream command control systems. To ensure the security of a system, we must secure the weakest link of this system. Thus, a flaw in the information system can lead to a multitude of command control system vulnerabilities.

This is considered as a real threat to the states [1] and can lead to disasters [2]. A multitude of vulnerabilities currently affects these systems. These vulnerabilities are exploited for various reasons such as cybercrime, industrial espionage or other. The objective of our work is to analyze the workings of Stuxnet and to propose countermeasures to strengthen the security of command control systems.

.

Keywords — Stuxnet, Strong authentication, SCADA, HOTP.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

3. Paper 30041435: Text Mining System for Non-Expert Miners (pp. 14-18)

Full Text: PDF

.

Ramya P, Sasirekha S, Department of Information Technology, SSN College of Engineering, Chennai, India

.

Abstract -- Service oriented architecture integrated with text mining allows services to extract information in a well defined manner. In this paper, it is proposed to design a knowledge extracting system for the Ocean Information Data System. Deployed ARGO floating sensors of INCOIS (Indian National Council for Ocean Information Systems) organization reflects the characteristics of ocean. This is forwarded to the OIDS (Ocean Information Data System). For the data received from OIDS, pre-processing techniques are applied. Pre-processing involves the header retrieval and data separation. Header information is used to identify the region of sensor, whereas data is used in the analysis process of Ocean Information System. Analyzed data is segmented based on the region, by the header value. Mining technique and composition principle is applied on the segments for further analysis.

.

Index Terms-- Service oriented architecture; Text Mining; ARGO floating sensor; INCOIS; OIDS; Pre-processing.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

4. Paper 30041444: DNA Sequence Alignment using Hadoop in Cloud Computing Environment (pp. 19-22)

Full Text: PDF

.

Hamoud Alshammari, Department of Computer Science and Engineering, 221 University Ave, University of Bridgeport, Bridgeport, CT, USA

.

Abstract — Sequence Alignment process in DNA datasets faces different concerns, one of them is the complexity of finding any sequence since the data is unstructured and unrelated. Hadoop solves some of these issues by dividing the data into many blocks and manipulates these data perfectly with high efficient process. However, applying Hadoop has to be more accurate because DNA still needs more reliable and efficient solution because some problems might be not reliable via using Hadoop. In this project, I will explain until what extend Hadoop can solve the DNA sequence alignment with high degree of reliability.

.

Keywords — Cloud Computing, DNA Sequence Alignment, Hadoop, MapReduce.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

5. Paper 30041445: Video Game User Interface Development Using Scaleform Gfx (CLIK™ AND SCALEFORM 3Di™) (pp. 23-28)

Full Text: PDF

.

Oluwafemi J. Ayangbekun, Department of Information Systems, Faculty of Commerce, University of Cape Town, South Africa.

Ibrahim O. Akinde, Department of Computer Science, Faculty of Information and Communication Technology, Crescent University, Abeokuta, Nigeria.

.

Abstract — This paper explains how Scaleform Gfx technology can be used to create a beautifully rendered Front-End Menu using Flash Professional’s proprietary language, ActionScript, both in 2D and 3D for video game development. Scaleform Gfx is cutting edge technology designed by Autodesk for creating stunning user interfaces. This paper introduces Scaleform Gfx as videogame middleware, reviews some of the previous games’ user interfaces designed with Scaleform Gfx, provides an iteration of steps that can serve as a framework for creating a fully functional front-end menu and discusses the limitations of Scaleform Gfx. Also, this paper introduces Scaleform CLIK and Scaleform 3Di and explains how interoperable they are with each other when developing a user interface.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

6. Paper 30041441: Bovines Muzzle Identification Using Box-Counting (pp. 29-34)

Full Text: PDF

.

Ibrahim El-Henawy, Faculty of Computer and Information Sciences, Zagazig University, Zagazig, Egypt

Hamdi A. Mahmoud, Faculty of Computer Science and Information, Beni-Suef University, Beni-Suef, Egypt

Hazem. M. El bakry, Department of Information System, Mansoura University, Mansoura, Egypt

Hagar M. El Hadad, Faculty of Computer Science and Information, Beni-Suef University, Beni-Suef, Egypt

.

Abstract — Bovines identification has become widely used as essential for guarantee the safety of cattle products and assists veterinary disease supervision and control. Texture feature extraction is a key step for muzzle image processing. In this paper, we focus on bovines muzzle patterns identification as a biological texture using a method for feature extraction of Muzzle images. The proposed method has been implemented by using Box-counting Fractal Dimension. Before texture feature extraction, preprocessing operations such as histogram equalization and morphological filtering (opening and closing) have been used for increasing the contrast and remove noise of the image. After that, fractal dimension is calculated as the texture feature. The experimental results show that feature vector for different image of the same muzzle are highly symmetry. Therefore, it can be applied in registration of bovines for breeding and marketing systems.

.

Keywords-component; bovine’s identification, image processing, fractal dimension, feature extraction, Box-counting

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

7. Paper 30041446: Electricity Power Theft Detection Using Wireless Prepaid Meter (pp. 35-78)

Full Text: PDF

.

Ebole Alpha F., Department of Computer science, Lagos state polytechnic, Ikorodu Lagos, Nigeria

Prof: N. Goga, Department of Computer Science / Information Technology, University of Groningen, The Netherland

.

Abstract - Energy meters in Nigeria have dominantly been electromechanical in nature but are gradually being replaced by more sophisticated and accurate digital and electronic meters. Today, a high percentage of electricity revenue is lost to power theft, incorrect meter reading and billing, and reluctance of consumers towards paying electricity bills on time based on postpaid meter. Considerable amount of revenue losses can be reduced by using Prepaid Energy Meters. A prepaid energy meter enables power utilities to collect energy bills from the consumers prior to the usage of power by delivering only as much as what has been paid for. This research provides a prepaid energy meter behaving like a prepaid mobile phone. The meter contains a prepaid card similar to mobile SIM card. The prepaid card communicates with the power utility using mobile communication infrastructure. Once the prepaid card is out of balance, the consumer load is disconnected from the utility supply by the contactor. The power utility can recharge the prepaid card remotely through mobile communication based on customer requests or consumer purchasing recharge card. A prior billing is bound to do away with the problems of unpaid bills and human error in meter readings, thereby ensuring justified revenue for the utility. Over the past several years, smart cards have achieved a growing acceptance as a powerful tool for security, identification, and authorization. The increasing computational power placed on the chip along with advances in cryptography has made the smart card a very powerful tool for identification. The advent of multi-application smart card operating systems for both contact and contact less applications has put smart cards on the edge of information technology. The proposed system uses an IP-based controller for the prepaid meter and the load meter and the responsibility of Load meter is to provide a simple way of detecting electricity power theft without any human intervention. The Load meter would indicate exact building or location and distribution line on which unauthorized taping is done in real time. It would be time saving if distribution company personnel take reading by this wireless technique and also it would provide a digital record in case of any judicial dispute which will be use for comparative analysis between the prepaid meter. The idea is to maximize the profit margin of power utility company, efficient online control of the total amount of electricity consumed in a specific location and be able to detect when there is bypass by the user either by shoot- hunting without connecting the cable through the digital meter or parts of the equipment are connected through to the smart meter why high voltage equipment are bypassed.

.

Keywords: Prepaid Meter, IP-Based Controller, Load Meter.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

.