Vol. 13 No. 4 APR 2015

Vol. 13 No. 4 APRIL 2015 International Journal of Computer Science and Information Security

Download Full Journal: [Academia.edu ¦ Figshare ¦ Scribd ¦ Docstoc ¦ Archive]

.

Copyright © IJCSIS. This is an open access journal distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

1. Paper 31031505: Where is the Cybersecurity Hero? Practical Recommendations for Making Cybersecurity Heroism More Visible in Organizations (pp. 1-5)

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Docstoc ¦ Archive]

Paul D. Nugent, Ph.D., Emilio Collar, Jr., Ph.D. Management Information Systems, Ancell School of Business Western Connecticut State University Westside Classroom Building, Room 203 181 White Street, Danbury, CT 06810, USA

Abstract — Given the current state of cyber crime, cyber attacks, and cyber warfare, it is easy to argue that steps taken by those in cybersecurity and Information Assurance (IA) roles to thwart these attacks deserve heroic status. Yet, the reality is that these functions are rarely perceived by their organizations or by broader society as heroic and this has negative consequences for job satisfaction and for the attractiveness of careers in these fields. This paper explores the concept of the hero broadly as well as in organizational literature to understand how heroes are made in organizations and why the nature of cybersecurity and IA work present barriers to perceptions of heroism. This is

because the intrinsic nature of security work focuses on vulnerabilities and therefore differs from other types of work that are focused on new capabilities. The paper concludes with practical recommendations on how managers, industry leaders, and educators can take steps to overcome these limitations and make careers in cybersecurity and IA more attractive.

Keywords: Heroes; Heroism; Cybersecurity; Information Assurance; Information Security

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

2. Paper 31031525: User Customizable Privacy-Preserving Personalized Web Search (pp. 6-11)

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Docstoc ¦ Archive]

Akhila G. S, Department of Computer Science and Engineering, Mohandas College of Engineering, Anad, Trivandrum, Kerala, India

Mr. Prasanth R.S, Department of Computer Science and Engineering, Mohandas College of Engineering, Anad, Trivandrum, Kerala, India

Abstract — Personalized web search (PWS) has demonstrated its effectiveness in improving the quality of various search services on the Internet. However, evidences show that users’ reluctance to disclose their private information during search has become a major barrier for the wide proliferation of PWS. This paper proposes a PWS framework called UPS that can adaptively generalize profiles by queries while respecting user specified privacy requirements. Present an algorithm, namely GreedyIL, for runtime generalization. The experimental results show that GreedyIL performs efficiently.

Keywords—Personalized Web Search,User profile

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

3. Paper 31031513: A Modified Model for Threat Assessment by Fuzzy Logic Approach (pp. 12-18)

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Docstoc ¦ Archive]

Ehsan Azimirad, Electrical and Computer Engineering Department, Hakim Sabzevari University, Sabzevar, Iran

Javad Haddadnia, Electrical and Computer Engineering Department, Hakim Sabzevari University, Sabzevar, Iran

Abstract — In this paper, a precise description of the threat evaluation process is presented. This is followed by a review describing which parameters that have been suggested for threat evaluation in an air surveillance context throughout the literature. Threat evaluation is a critical component of the system protecting the defended assets against the hostile targets like aircrafts, missiles, helicopters etc. The degree of threat is evaluated for all possible hostile targets on basis of heterogeneous parameter values extracted from various sensors, to improve the situational awareness and decision making. Taking into consideration the amount of uncertainty involved in the process of threat evaluation for dynamic targets, the fuzzy logic turns out to be a good candidate to model this problem. This model is based on a Fuzzy logic approach, making it possible to handle imperfect observations. The structure of the Fuzzy Logic is described in detail. Finally, an analysis of the system’s performance as applied to a synthetic static scenario is presented. The simulation results are acceptable and fine and show that this model is reliability.

Keywords-component; Threat Assessment; Fuzzy Knowledge Based System; Decision Support System; Weapons Assignment; Threat Evaluation Fuzzy Model

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

4. Paper 31031518: A New Data Fusion Instrument for Threat Evaluation Using of Fuzzy Sets Theory (pp. 19-32)

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Docstoc ¦ Archive]

Ehsan Azimirad, Electrical and Computer Engineering Department, Hakim Sabzevari University, Sabzevar, Iran

Javad Haddadnia, Electrical and Computer Engineering Department, Hakim Sabzevari University, Sabzevar, Iran

Abstract — This paper represents an intelligent description of the threat evaluation process in 3 level of JDL model using of fuzzy sets theory. The degree of threat is evaluated for all possible targets to improve the situational awareness and decision making in command and control system and is calculated to precise weapon assignment. Taking into consideration the amount of uncertainty involved in the process of threat evaluation for dynamic targets, the fuzzy set theory turns out to be a good candidate to model this problem. In this approach, based on a fuzzy logic, is making it possible to handle imperfect observations. The structure of the fuzzy expert system based on fuzzy number approach is described in detail. Finally, an analysis of the system’s performance as applied to multiple dynamic scenarios is presented. The simulation results show the correctness, accuracy, reliability and minimum errors in the system is designed.

Keywords-component; Fuzzy Number, JDL Model, Decision Support System, Dynamic Air Targets, Multi Sensor Data Fusion; Weapons Assignment

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

5. Paper 31031526: Optimizing TCP Vegas for Optical Networks: a Fuzzy Logic Approach (pp. 33-45)

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Docstoc ¦ Archive]

Reza Poorzare, Department of Computer Science Young Researchers Club, Ardabil Branch, Islamic Azad University, Ardabil, Iran

Shahram Jamali, Department of Computer Engineering University of Mohaghegh Ardabili, Ardebil, Iran

Abstract — Performance of TCP is reduced over buffer-less optical burst switched (OBS) networks by misunderstanding of the congestion status in the network. In other words, when a burst drop occurs in the network and we cannot distinguish congestion and burst contention in the network, TCP wrongly decreases the congestion window size (cwnd) and causes significant reduction of the network performance. This paper employs the fuzzy logic to solve this problem. By using the fuzzy logic we provide a framework to distinguish whether the burst drop is due to the congestion or is due to the burst contention. The full approach, for detecting state of network, relies on Round-Trip-Time (RTT) measurement only. So, this is an end-to-end scheme which only end nodes are needed to cooperate. Extensive simulative studies show that the proposed algorithm outperforms other TCP flavors such as TCP Vegas, TCP Sack and TCP Reno, in terms of throughput, packet delivery count and fairness.

Keywords — Fuzzy Logic, Optical Burst Switching, TCP Vegas, Transport Control Protocol (TCP).

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

6. Paper 31031532: Improved Algorithm for fusion of Satellite Images Using Combined DWT-FDCT Transforms (pp. 46-50)

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Docstoc ¦ Archive]

Manjushree B S, CSE, DBIT/VTU, Bangalore, India

Shruthi G, CSE, DBIT/VTU, Bangalore, India

Abstract - Image fusion based on the Fourier and wavelet transform methods retain rich multispectral details but less spatial details from source images. Wavelets perform well only at linear features but not at non linear discontinuities because they do not use the geometric properties of structures. Curvelet transforms overcome such difficulties in feature representation. A novel fusion rule via high pass modulation using Local Magnitude Ratio (LMR) in Fast Discrete Curvelet Transforms (FDCT) domain and Discrete wavelet transforms (DWT) is defined. For experimental study of this method Indian Remote Sensing (IRS) Geo satellite images are used for Pan and MS images. This fusion rule generates HR multispectral image at high spatial resolution. This method is quantitatively compared with Wavelet, Principal component analysis (PCA) fusion methods. Proposed method spatially outperforms the other methods and retains rich multispectral details.

Keywords: Image Fusion, Fast Discrete Curvelet Transforms, Discrete wavelet transforms, Local Magnitude Ratio (LMR)

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

7. Paper 31031534: Biometric Student Record Management System (pp. 51-62)

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Docstoc ¦ Archive]

Onuiri Ernest E., Oludele Awodele, Oshilagun Ibukun, Yadi Chukwuemeka and Etuk Otobong

Department of Computer Science, Babcock University, Ilishan-Remo, Ogun State; Nigeria

Abstract – Information is an important part of any system. In the academic world, information is especially very important and essential. Students have to register for courses, take attendance, quizzes, and exams and as well as check their scores. Years after graduating from the school, students come back asking for transcript. It is therefore very important to handle students’ records in a way that is accessible, maintainable and secure. The manual method of cumulating and storing student record is often prone to various degrees of human error and is also unsecured making it exposed to unauthorized personnel. This paper presents the design and development of a biometric student

record management that provides an interface between student and the institution to enable prompt checking of grades, as well as track their progress and efficiently record each student’s attendance for every lecture attended through the use of a biometric device. The methodology used in developing this system is the waterfall methodology and this was used because it is a one dimensional model, meaning it is very easy to implement and also the documentation is done at the beginning of the software development. During the course of this research, it was realized that developing a biometric student record management system was a herculean task. This system was given to random students to use and 90% of them loved the interactive nature of the system. A projection of record growth in relation to student population and system requirement was carried out in the study.

Keywords – Fingerprint, Biometrics, Biometric Student Record Management System (BSRMS), Student Information Management System (SIMS), Grade Point Average (GPA), Students

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

8. Paper 31031538: Classification Framework Based on C4.5 Algorithm for Medicinal Data (pp. 63-67)

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Docstoc ¦ Archive]

Karthik Ganesan, Department of Computer Science and Engineering, College of Engineering, Anna University, Chennai, India

Abstract - This study proposes a framework with preprocessing techniques namely Missing value replacement, Discretization, Principal Component Analysis (PCA) to extract the key features and then applying c4.5 classifier algorithm to enhance the classification of medicinal data. The input data gets subjected to missing data imputation through any one of the standard methods like mean, mode, constant and manual input. The dataset is then subjected to Discretization to formalize a reasonable set of discrete bins. PCA is then applied on the dataset to identify the principal components of the dataset, which attribute to the mean data inference. C4.5 algorithm has been used to construct a decision tree based on the information gain of the training set. This work used Cleveland heart disease dataset, obtained from UCI machine learning repository. The dataset is composed of details of about 303 patients and helps to predict presence or absence of cardio vascular disorder based on 75 attributes. The proposed framework was applied on this dataset and exhibited an accuracy of about 77.73%.

Keywords — PCA, Discretization, C4.5, classification

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

9. Paper 31031539: Energy Efficiency of IEEE 802.15.6 MAC Access Modes for Remote Patient Monitoring Applications (pp. 68-77)

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Docstoc ¦ Archive]

Anas Bouayad, Nour El Houda Chaoui, Mohammed El Ghazi, Moulhime El Bekkali

TTI Laboratory, USMBA, FEZ, MOROCCO

Abstract - The progress that has been made over the last decade in the medical field was focused on integrating communication and information technology especially Wireless Body Area Networks (WBANs) in healthcare systems for remote patient monitoring (RPM) applications. WBANs have shown great potential in improving healthcare quality, allowing continuous patient to be remotely monitored and diagnosed by doctors. WBAN operates in close vicinity to, on, or inside a human body and supports a variety of medical applications. Energy consumption is a key WBANs since energy-constrained sensors monitor the vital signs of human beings in healthcare applications. In this work, we are interested in evaluating access methods and access mechanism used in MAC layer of the IEEE 802.15.6 standard and the proposition of suitable access methods and parameters should be used to decrease the energy consumption. Performance evaluation will be based on the simulation of a short range wireless Body Area Network based solution implementing the IEEE 802.15.6. Simulation will be performed on OMNet++ with the Castalia simulator.

Keywords: RPM, Wireless Body Area Networks, IEEE 802.15.6, (MAC) protocols, access methods, polling, CSMA/CA, Energy consumption.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

10. Paper 31031540: Designing a jitter buffer for QoS improvement in VoIP networks (pp. 78-83)

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Docstoc ¦ Archive]

Negar Chehregosha, Dept. of Electrical and Computer Engineering, Science and Research Branch, Islamic Azad University, Tehran, Iran

Mohammad Ali Pourmina, Dept. of Electrical and Computer Engineering, Science and Research Branch, Islamic Azad University, Tehran, Iran

Abstract -- Today main challenge in IP networks engineering is simultaneous support of different applications such as sending voice, video and data, with appropriate quality of service. The generated traffic by IP telephone, voice and video conference and on line applications, are real time and time sensitive. Jitter is an usual problem in quality of service of VoIP network. The purpose of this paper is to reduce jitter to improve quality of service. Achieve Real time voice quality is required jitter smoothing in receiver that usually is done by jitter buffer mechanism. Here we introduce an algorithm to design jitter buffer. We simulate one VoIP network by OPNeT simulator and Matlab software is used to implement the algorithm; then we compare simulation results before and after applying the algorithm and the effects of changes in buffer size on delay and jitter are checked. Output voice quality will be measured based on PESQ, according to ITU-T P.862 recommendation. The results show packet buffering reduces packets delay and makes values of them become closer together.

Keywords: VoIP, Jitter, Jitter buffer, Delay, Quality of Service

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

11. Paper 31031541: Trend Analysis in Academic Journals in Computer Science Using Text Mining (pp. 84-88)

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Docstoc ¦ Archive]

Adebola K. Ojo and Adesesan B. Adeyemo

Department of Computer Science, University of Ibadan, Ibadan, Nigeria

Abstract — Text mining is the process of discovering new, hidden information from texts- structured, semi-structured and unstructured. There are so many benefits, valuable insights, discoveries and useful information that can be derived from unstructured or semi- unstructured data. In this study, text mining techniques were used to identify trends of different topics that exist in the text and how they change over time. Keywords were crawled from the abstracts in Journal of Computer Science and Technology (JCST), one of the ISI indexed journals in the field of Computer Science from 1993 to 2013. Results of our analysis clearly showed a varying trend in the representation of

various subfields in a Computer Science journal from decade to decade. It was discovered that the research direction was changing from pure mathematical foundations, Theory of Computation to Applied Computing, Artificial Intelligence in form of Robotics and Embedded Systems.

Keywords-component; Computer Science, Text Mining, mathematical foundations, applied computing, Robotics, Embedded Systems

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

12. Paper 31031543: d-HMAC — An Improved HMAC Algorithm (pp. 89-96)

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Docstoc ¦ Archive]

Mohannad Najjar, University of Tabuk, Tabuk, Saudi Arabia

Abstract—The keyed-hash message authentication code (HMAC) algorithm is a security tool primarily used to ensure authentication and data integrity in information systems and computer networks. HMAC is a very simple algorithm, and relies on hash functions that use a secret key. HMAC’s cryptographic strength is based on the use of effective cryptographic characteristics such as balancing and the avalanche effect. In this study, we develop a new algorithm, entitled dynamic HMAC (d-HMAC), to improve and enhance the cryptographic characteristics of HMAC. The improved algorithm provides stronger resistance against birthday attacks and brute force attacks. To achieve this objective, HMAC constant values ipad and opad are dynamically calculated in d-HMAC. Values for ipad and opad will be obtained from the HMAC input message, the public key of the receiver, and a substitution-box (S-box) table with enhanced security characteristics specifically created for this purpose. We demonstrate that the improved d-HMAC algorithm is more resistant to known cryptographic attacks, and prove that it exhibits similar or better cryptographic characteristics than HMAC.

Keywords-cryptography; data integrity; authentication; MAC; HMAC; hash functions; SHA-256

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

13. Paper 28021519: Hadoop Architecture and its Functionality (pp. 97-103)

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Docstoc ¦ Archive]

Dr. B V Ramana Murthy,Jyothishmathi College of Engg and Technology, Shamirpet, India

Mr. V Padmakar, Guru Nanak Institutions Technical Campus, Hyderabad

Mr. M Abhishek Reddy, Jyothishmathi College of Engg and Technology, Shamirpet, India

Abstract - Hadoop is nothing but a “framework of tools” and it is a java based programming framework (In simple terms it is not software). The main target of hadoop is to process the large data sets into smaller distributed computing. It is part of the Apache project sponsored by the Apache Software Foundation. As we observe in database management system, all the data are stored in organized form by following the rules like normalization , generalizations etc., and hadoop do not bother about the DBMS features as it stores large amount of data in servers. We are studying about Hadoop architecture and how big data is stored in servers by using this tools and the functionalities of Map Reduce and HDFS (Hadoop File System).

Keywords: Big Data, HDFS, Map Reduce Task Tracker, Job Tracker, Data Node, and Name Node.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

14. Paper 31031509: Data mining methodologies to study student’s academic performance using the C4.5 algorithm (pp. 104-113)

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Docstoc ¦ Archive]

Hythem Hashim (1) , Ahmed A. Talab (2) , Ali Satty (3) , and Samani A. Talab (1)

(1) Faculty of Computer Science and Technology, Alneelain University, Khartoum, Sudan.

(2) White Nile College for Science and Technology, White Nile state ,Kosti.

(3) School of Statistics and Actuarial Sciences, Alneelain University, Khartoum, Sudan.

Abstract - The study placed a particular emphasis on the so called data mining algorithms, but focuses the bulk of attention on the C4.5 algorithm. Each educational institution, in general, aims to present a high quality of education. This depends upon predicting the unmotivated students before they entering in to final examination. Data mining techniques give many tasks that could be used to investigate the students performance. The main objective of this paper is to built a classication model that can be used to improve the students academic records in Faculty of Mathematical Science and Statistics. This model has been done using the C4.5 algorithm as it is a well-known, commonly used data mining technique. The importance of this study is that predicting student performance is useful in many different settings. Data from the previous students academic records in the faculty have been used to illustrate the considered algorithm in order to build our classification model.

Keywords: Data mining, The C4.5 algorithm, Prediction, Classification algorithms.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

15. Paper 31031533: Resource Modeling for the Development of a Decision-making System - Applied HCEFLCD of Morocco (pp. 114-118)

Full Text: PDF [Academia.edu ¦ Figshare ¦ Scribd ¦ Docstoc ¦ Archive]

.

K. Oubedda, M. Khalfaoui, A. Ettahir

Systems Analysis Laboratory of Information Processing and Integrated Management (LASTIMI) School of Sale Technology, University Mohammed V Agdal

.

Abstract - The aim of this work and to develop a decision support system for the operation of a model including the main stakeholders of the High Commissioner for Water, Forests and Desertification Control (maker / managers, administrative, customers). This system is based on the relationship between the actors and their activities and their needs vary by contribution in time. It aims to make available to managers a set of dashboards that can improve the quality of provided services. We begin by modeling the actors up and clean process for studying both their organizations and their activities and needs. The first applications of this work has focused on data for the Directorate of Planning, Information System and Cooperation, and the Directorate of Forest Estate, Legal Affairs and Litigation. The results are encouraging.

.

Keywords: Information systems, decision support systems, dashboards, databases, modeling

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------