Vol. 13 No. 1 JANUARY 2015 International Journal of Computer Science and Information Security
Publication JANUARY 2015, Volume 13 No. 1 (Download Full Journal) (Archive) (Download 2)
.
Copyright © IJCSIS. This is an open access journal distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
1. Paper 31121405: Image Steganography Using Least Significant Bits (LSBs): A Novel Algorithm (pp. 1-5)
Full Text: PDF
.
Abdul-Gabbar Tarish Al-Tamimi, Abdulmalek Abduljabbar Alqobaty
Computer Science Department, Faculty of Applied Sciences, University of Taiz, Taiz, Yemen
Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ arXiv.org ¦ ProQuest]
.
Abstract — Steganography plays a major role in data communication security. It focuses on hiding the fact that communication is taking place by hiding information in other information. The least significant bit (LSB) based approach is a popular type of steganographic algorithms in the spatial domain. The advantage of LSB is its simplicity to embed the bits of the message directly into the LSB plane of cover-image and many applications use this method. Images are the most popular cover objects used for Steganography. In this paper, we introduce a novel secure algorithm for color image steganography using least significant bits (LSBs). The security of our algorithm comes from using a key (the stego key) which is an array of 32 integers chosen randomly from Z24. The first pixel position, where we start hiding process, is computed based on this stego key.
.
Index Terms—information hiding, information security, steganography, LSB image steganography.
.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
2. Paper 31121409: Survey on Awareness of Privacy Issues in Ubiquitous Environment (pp. 6-10)
Full Text: PDF
.
Huma Tabassum, Sameena Javaid, Humera Farooq
Department of Computer Sciences, Bahria University Karachi, Pakistan
Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ arXiv.org ¦ ProQuest]
.
Abstract — It is in human nature to keep certain details intimate. This confidential information, if made public, can result in annoyance, humiliation, and even devastating loss. The latter one holds true for individuals as well as organizations. In the case of ubiquitous environment, system adapts to the context of user’s actions and intentions and the collection of data becomes pervasive. Thus, privacy turns out to be a vital aspect. This study aims to determine privacy awareness among people in ubiquitous environment. For this purpose, a survey was conducted. This survey was based on a questionnaire. The results show that people consider themselves quite aware, but, more concerned with privacy issues in ubiquitous environment. Also, a significant number of people admit to not taking privacy measures. The analysis was carried out on the basis of current status of participants in the university, namely, Undergraduate students, Graduate students, and Faculty members.
.
Keywords-ubiquitous environment; privacy; privacy awareness.
.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
3. Paper 31121412: Efficient Support Vector Machines for Spam Detection: A Survey (pp. 11-28)
Full Text: PDF
.
Zahra S. Torabi, Department of Computer Engineering, Islamic Azad University of Najafabad, Isfahan, Iran
Mohammad H. Nadimi-Shahraki, Department of Computer Engineering, Islamic Azad University of Najafabad, Isfahan, Iran
Akbar Nabiollahi, Department of Computer Engineering, Islamic Azad University of Najafabad, Isfahan, Iran
Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ arXiv.org ¦ ProQuest]
.
Abstract — Nowadays, the increase volume of spam has been annoying for the internet users. Spam is commonly defined as unsolicited email messages, and the goal of spam detection is to distinguish between spam and legitimate email messages. Most of the spam can contain viruses, Trojan horses or other harmful software that may lead to failures in computers and networks, consumes network bandwidth and storage space and slows down email servers. In addition it provides a medium for distributing harmful code and/or offensive content and there is not any complete solution for this problem, then the necessity of effective spam filters increase. In the recent years, the usability of machine learning techniques for automatic filtering of spam can be seen. Support Vector Machines (SVM) is a powerful, state-of-the-art algorithm in machine learning that is a good option to classify spam from email. In this article, we consider the evaluation criterions of SVM for spam detection and filtering.
.
Keywords- support vector machines (SVM); spam detection; classification; spam filtering; machine learning;
.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
4. Paper 31121414: A Proposed Approach for Monitoring Quality of Web Services Using Service Level Agreement (pp. 29-36)
Full Text: PDF
.
Nagy Ramadan Darwish, Department of Computer and Information Sciences, Institute of Statistical Studies and Research, Cairo University, Cairo, Egypt
Rabab Emad Mohamed, Department of Computer and Information Sciences, Institute of Statistical Studies and Research, Cairo University, Cairo, Egypt
Doaa Hany Elsayed, Department of Computer and Information Sciences, Institute of Statistical Studies and Research, Cairo University, Cairo, Egypt
Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ResearchGate ¦ ProQuest]
.
Abstract — Web service technology has gained more important role in developing distributed applications and systems on the Internet. Rapid growth of published web services makes their discovery more and more difficult. Nowadays, most of web service providers sign Services Level Agreement (SLA) contracts with their clients in order to guarantee the offered functionality of their services. This paper proposes an approach to monitor Quality of Services (QoS) in web service according to Service Level Objectives (SLO) in SLA. Monitoring procedures are introduced to check variations in the pre-agreed metric values of SLAs. Then, the deviation between the actual quality and the acceptable quality level can be identified and analyzed. Finally, the weaknesses of the web service practices can be discovered and solved.
.
Keywords: Web Services, Services Level Agreement, Quality of Services, Web Service Level Agreement, Services Level Agreement Metric.
.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
5. Paper 31121415: Towards a Fuzzy based Framework for Effort Estimation in Agile Software Development (pp. 37-45)
Full Text: PDF
.
Atef Tayh Raslan, Department of Computer and Information Sciences, Institute of Statistical Studies and Research, Cairo University, Egypt
Nagy Ramadan Darwish, Department of Computer and Information Sciences, Institute of Statistical Studies and Research, Cairo University, Cairo, Egypt
Hesham Ahmed Hefny, Department of Computer and Information Sciences, Institute of Statistical Studies and Research, Cairo University, Egypt
Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ ResearchGate ¦ ProQuest]
.
Abstract — Effort estimation in the domain of software development is a process of forecasting the amount of effort expressed in persons/month required to develop software. Most of the existing effort estimation techniques are suitable for traditional software projects. The nature of agile software projects is different from traditional software projects; therefore using the traditional effort estimation techniques can produce inaccurate estimation. Agile software projects require an innovated effort estimation framework to help in producing accurate estimation. The main focus of this paper is the utilization of fuzzy logic in improving the effort estimation accuracy using the user stories by characterizing inputs parameters using trapezoidal membership functions. In this paper, the researchers proposed a framework based on the fuzzy logic which receives fuzzy input parameters of Story Points (SP), Implementation Level Factor (ILF), FRiction factors (FR), and Dynamic Forces (DF) to be processed in many successive steps to produce in final the effort estimation. The researchers designed the proposed framework using MATLAB to make it ready for later experiments using real data sets.
.
Keywords: Agile software development, Effort estimation, story points, fuzzy logic
.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
6. Paper 31121420: A Novel Architecture for Improving Performance under Virtualized Environments (pp. 46-52)
Full Text: PDF
.
A. P. Nirmala, Research Scholar, Karpagam University, Coimbatore & Assistant Professor, New Horizon College of Engg., Bangalore, India
Dr. R. Sridaran, Dean, Faculty of Computer Applications, Marwadi Education Foundation's Group of Institutions, Rajkot, India
Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ arXiv.org ¦ ProQuest]
.
Abstract — Even though virtualization provides a lot of advantages in cloud computing, it does not provide effective performance isolation between the virtualization machines. In other words, the performance may get affected due the interferences caused by co-virtual machines. This can be achieved by the proper management of resource allocations between the Virtual Machines running simultaneously. This paper aims at providing a proposed novel architecture that is based on Fast Genetic Kmeans++ algorithm and test results show positive improvements in terms of performance improvements over a similar existing approach.
.
Keywords- Virtualization, Performance, Performance Interference, Scheduling Algorithm, Throughput
.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
7. Paper 31121423: The Comprehensive Review on JDL Model in Data Fusion Networks: Techniques and Methods (pp. 53-60)
Full Text: PDF
.
Ehsan Azimirad, PHD Student, Electrical and Computer Engineering Department, Hakim Sabzevari University Sabzevar, Iran
Javad Haddadnia, Associate Professor, Electrical and Computer Engineering Department, Hakim Sabzevari University Sabzevar, Iran
Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Archive ¦ arXiv.org ¦ ProQuest]
.
Abstract — This paper provides the comprehensive review on JDl model in multi- sensor data fusion networks and its techniques and methods. Data fusion methods vary greatly depending on the type of problem and the surface to be integrated data. Two main motivations exist for using multiple sensors and combine the results of them. 1) Reduce errors and uncertainty in the measurements, 2) The use of multiple sensors to achieve a better estimate. With the data fusion of multiple databases, or multiple sensors and multiple natures, reduced uncertainty or ambiguity, and reduce complexities. The variety of models and architectures has been provided by researchers to combine sensor data for military and civilian applications. In this paper, we first defined the concept model, architecture and framework based on JDl model, and then states its techniques and methods.
.
Keywords-component; data fusion techniques; JDL model; data fusion models; data fusion architectures
.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------