Vol. 11 No. 3 MAR 2013

Vol. 11 No. 3 March 2013 International Journal of Computer Science and Information Security
Publication March 2013, Volume 11 No. 3 (Download Full Journal) (Archive) (Download 2)

.
Copyright © IJCSIS. This is an open access journal distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
.
1. Paper 18021308: RGB Color Space Performance Limit for Skin Detection Using Neural Networks (pp. 1-4)
Full Text: PDF 

.
Saleh Ali Alshehri, Jubail Industrial College, Jubail Industrial City, Saudi Arabia 
.
Abstract — Although the separation in skin and non-skin pixel classes is high using RGB color space, it is limited due to the high number of pixels that fall in both skin and non-skin classes. To improve the skin detection, some skin texture descriptors have been introduced. The color space components and skin texture descriptors were used in this research study as Neural Network feature vector. It has been demonstrated in this research study that when using a general image database, the skin detection performance rate could not go much beyond 83.3%. The result of this study is consistent with the findings of similar studies.
.
Keywords- skin detection, neural networks, RGB color space, LBP.
.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
2. Paper 20021310: Location-based Solar Energy Potential Prediction Algorithm for Mountainous Rural Landscapes (pp. 5-12)
Full Text: PDF 

.
Onabajo Olawale Olusegun & Chong Eng Tan
Faculty of Computer Science & Information Technology, Universiti Malaysia Sarawak, 94300 Kota Samarahan, Malaysia 

.
Abstract -- The world is facing critical energy crisis today. As a result the conventional grid energy supplies are not enough to meet the present demand. Many advance researches are in progress to overcome this energy predicament. Power generation and management in disconnected rural villages is challenging. The situation is even more challenging when landscape structure in such environment are irregular. Forces of diffusion, ground reflectance and sky view factor among others, affect the quality of final solar radiation incident on a solar panel. This paper describes the implementation of an algorithm that can be used to predict solar energy potential of irregular landscapes. Location-based Solar Energy Potential Prediction Algorithm (LOSEPPA) takes as input, the geographic latitude and longitude of the location of interest to compute the Solar Irradiance Factor (SIF). Geographic latitude plays an important role in the availability of sufficient solar radiation as well as the state of the atmosphere. Therefore, SIF value serves as a guide to the state of the atmosphere in terms of degree of cloud cover, temperature, humidity and landscape structure; which determines the feasibility of the solar energy implementation. The approach described in this paper can be used for rapidly computing the amount of solar radiation generated on a mountainous landscape surface and in the atmosphere as a function of height parameters. With SIF value known, solar panel can be mounted along specific angle of inclination to the sun. The algorithm design covers one year period and is based on the Digital Elevation Model (DEM) of the location under investigation. The proposed system was simulated using MATLAB1. Result show that the more irregular the landscape is, the lower the solar irradiance factor. SIF value of 400 and above predicts well enough sunshine for solar PV implementation in mountainous landscapes. Sample results show that solar radiation per kernel per day for a given landscape is highest between 12noon and 2.00PM local time; and the radiation per kernel per year for a given landscape have highest sunshine hours in January and December.
.
Keywords- Geographic latitude, Diffusion, Solar Panel, Landscape, DEM
.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
3. Paper 23021318: Impact of Multipath Routing Performance of Video Traffic (pp. 13-20)
Full Text: PDF 

.
Adel ECHCHAACHOUI , SIME laboratory, E.N.S.I.A.S, Rabat, Morocco
Ali CHOUKRI, SIME laboratory, E.N.S.I.A.S, Rabat, Morocco 
Ahmed HABBANI, SIME laboratory, E.N.S.I.A.S, Rabat, Morocco 
Mohammed ELKOUTBI, SIME laboratory, E.N.S.I.A.S, Rabat, Morocco 

.
Abstract — Ad-hoc Network is a wireless environment of transmission which offers a very high mobility with low establishment costs. However, in this mode of communication the throughput and delay are limited, especially if traffic is needs high bandwidth, such as streaming video. In this paper, we study and evaluate the performance of video traffic in Ad-hoc network based on reactive routing protocol. As a first step, we study and compare the behaviour of AODV and AOMDV to carry streaming video traffic.
.
Keywords—Performance, Video, AODV and AOMDV
.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
4. Paper 28021326: Stock Prices Forecast Using Radial Basis Function Neural Network (pp. 21-29)
Full Text: PDF 

.
Julia Fajaryanti, Faculty of Industrial Technology, Gunadarma University, Jalan Margonda Raya 100 Depok - Indonesia
Priyo Sarjono Wibowo, Faculty of Industrial Technology, Gunadarma University, Jalan Margonda Raya 100 Depok - Indonesia 

.
Abstract — Neural Network has been implemented in various applications especially in pattern recognition. This power has attracted several people to use Neural Network for various systems. One of the neural network implementation in the field of finance or investments is forecasting stocks. Assuming that the prediction of the output system is deterministic, than the suitable Neural Network model to predict it is Multilayer Network. To get the solution, Multilayer Neural Network method with supervised algorithm is applied. The supervised algorithm used for stock price prediction is Radial Basis Function. This algorithm can supervise the networks by using previous stock price data, classifying them and putting weight on the networks. This journal illustrates how Radial Basis Function Neural Network method can be used to predict stocks. The result showed that Radial Basis Function Neural Network method is able to forecast and follow the movement of stock data used in the experiment.
.
Keywords: Stock Prices, Multilayer Neural Network, Radial Basis Function, Supervised
.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
5. Paper 28021327: Model Based Framework for Estimating Mutation Rate of Hepatitis C Virus in Egypt (pp. 30-35)
Full Text: PDF 

.
Nabila Shikoun, Mohamed ElNahas, Faculty of Engineering, Al Azhar University
Samar Kassim, Faculty of Medicine, Ain Shams University 

.
Abstract - Hepatitis C virus (HCV) is a widely spread disease all over the world. HCV has very high mutation rate that makes it resistant to antibodies. Modeling HCV to identify the virus mutation process is essential to its detection and predicting its evolution. This paper presents a model based framework for estimating mutation rate of HCV in two steps. Firstly profile hidden Markov model (PHMM) architecture was builder to select the sequences which represents sequence per year. Secondly mutation rate was calculated by using pair-wise distance method between sequences. A pilot study is conducted on NS5B zone of HCV dataset of genotype 4 subtype a (HCV4a) in Egypt.
.
Keywords: Hepatitis C virus (HCV), Profile Hidden Markov Model (PHMM), Non-structure 5 B(NS5B), Phylogenetic tree, pair-wise distance.
.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
6. Paper 28021329: Exploring Tracer Study Service in Career Center Web Site of Indonesia Higher Education (pp. 36-39)
Full Text: PDF 
.
Renny, Department of Accounting, Gunadarma University, Depok, Indonesia
Reza Chandra, Department of Information Systems, Gunadarma University, Depok, Indonesia 
Syamsi Ruhama, Department of Informatics Management, Gunadarma University, Depok, Indonesia 
Mochammad Wisuda Sarjono, Department of Information Systems, Gunadarma University, Depok, Indonesia 

.
Abstract — Quality competence of worker the present do not meet labor market criteria and the low level of labor productivity, the lack of communication between the labor market with education, changing of socio-economic structure and global political influence labor market, the development of science and technology very rapidly lead to fundamental changes in terms of qualifications, competencies and requirements for entering the workforce. Tracer Study results can be used by universities to determine the success of the educational process that has been done towards their students. Therefore, universities need a technology services to support the optimization of the use of tracer study. One of that is the use of a website to facilitate the conduct tracer study. Most services tracer study provides information to college, like year graduated, got a job waiting period, the first salary to work, first job, the relevance of the curriculum to the work, and compliance with the major areas of work taken in college. Tracer study feature in Career Center Website affect the popularity website especially in traffic and rich file website.
.
Keywords — career center, tracer study, traffic, popularity.
.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
7. Paper 28021342: Active Use of ICTs among the Elderly by Positive User Experience (pp. 40-44)
Full Text: PDF 

.
Ayako Hashizume, Faculty of System Design, Tokyo Metropolitan University, 6-6 Asahigaoka, Hino, Tokyo 191-0065, Japan
Masaaki Kurosu, Center for ICT and Distance Education, The Open University of Japan, 2-11 Wakaba, Mihama, Chiba-shi 261-8586, Japan 

.
Abstract — Recent technological advances have drastically changed our daily life. Information and communication technology (ICT) devices are being used by a wide variety of people to achieve diverse goals in different situations. However, there is an identifiable gap between high-end users and low-end users depending on demographic traits, particularly age. Focusing on ICT usage, we conducted a field survey by using the contextual inquiry method, analyzed the data by applying the modified grounded theory approach, and then summarized the results in a category relationship diagram. We found that motivation, active involvement in communication, and literacy are three principal factors for the use of ICTs.
.
Keywords - user experience (UX); elderly people; Qualitative approach; information and communication technology (ICT)
.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
8. Paper 28021346: Feasibility Study of Millimeter Wave Transmission (pp. 45-48)
Full Text: PDF 
.
Mamta Agiwal, Associate Professor, CMRIT and Research Scholar at Jain University, Bangalore
Dr. Fathima Jabeen, Professor and P G Coordinator, K S School of Engineering and Management, Bangalore 
Kashif Ahmed, Assistant Professor, Dept. of EEE, CMRIT, Bangalore 

.
Abstract — Past few years have witnessed the stupendous growth in wireless communication networks. However much research on wireless communication has focused on Power consumption and the frequency reuse of spectrum in the range of 300 MHz–3 GHz, while the other direction could be in considering mm waves for transmission with a wave band of 30 GHz-300 GHz. Integrating of new technologies of optical fibers, mesh networks, improved CMOS platform and enhanced antenna design can open plethora of opportunities to use mm waves for transmission. The paper discusses advantages, limitations, possibilities and hardware developments to support transmission using mm waves.
.
Keywords- mm-wave; rain losses; mesh network; narrow beam and frequency reuse; CMOS platform.
.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
9. Paper 28021348: Evaluation of Watermarking Approaches for Arabic Text Documents (pp. 49-54)
Full Text: PDF 

.
Muhammed N. Kabir, Omar Tayan and Yasser M. Alginahi
IT Research Center for the Holy Quran (NOOR), College of Computer Science and Engineering, Taibah University 
P.O Box 344, Al-Madinah Al-Munawarrah, Saudi Arabia 

.
Abstract — The embedding of digital watermark data in a cover text media, as in digital text watermarking, is used in numerous applications such as copyright protection, tamper detection, content-authenticity, steganography and other applications. Such issues have been largely studied for the security and protection of digital English-texts with relatively few citations found that address the specifics of other language characteristics. Moreover, the predominance of the text as a communications medium over the Internet suggests that more attention is required to protect online textual data in languages other than English. Hence, the purpose of this paper is to identify the properties of different watermarking applications for the case of Semitic languages with particular focus on Arabic-text documents by evaluating three invisible text-watermarking approaches; Kashida-based, spacebased and sukun-based watermarking, the latter two of which present newly proposed watermark encoding schemes not found in the Arabic-text literature. This paper investigates the effect of two parameters on the watermarking scheme used, including; the word-group set-size, and, the number of bits embedded per set, before examining their consequent impact on the capacity and imperceptibility properties of the watermarking scheme on the host cover-text for different applications. Experimental results had illustrated the effect of the two encoding parameters on the resultant watermarking properties. It was found that by adjusting those variable watermark parameters, any target Arabic-text application could be optimized to achieve a desired capacity-ratio and level of imperceptibility.
.
Keywords-component; text watermarking, copyright protection, Kashida; diacritics, sukun.
.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
10. Paper 28021349: Systematic Mapping Study on Security Threats in Cloud Computing (pp. 55-64)
Full Text: PDF 

.
Carlo Marcelo Revoredo da Silva, José Lutiano Costa da Silva, Ricardo Batista Rodrigues, Leandro Marques do Nascimento, Vinicius Cardoso Garcia
Informatics Center, CIn Federal University of Pernambuco, UFPE, Recife, Brazil 

.
Abstract — Today, Cloud Computing is rising strongly, presenting itself to the market by its main service models, known as IaaS, PaaS and SaaS, that offer advantages in operational investments by means of on-demand costs, where consumers pay by resources used. In face of this growth, security threats also rise, compromising the Confidentiality, Integrity and Availability of the services provided. Our work is a Systematic Mapping where we hope to present metrics about publications available in literature that deal with some of the seven security threats in Cloud Computing, based in the guide entitled "Top Threats to Cloud Computing" from the Cloud Security Alliance (CSA). In our research we identified the more explored threats, distributed the results between fifteen Security Domains and identified the types of solutions proposed for the threats. In face of those results, we highlight the publications that are concerned to fulfill some standard of compliance.
.
Keywords: Security Threats, Cloud Computing, Systematic Literature Review, Security Domains, Compliance Issues.
.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
11. Paper 28021354: Survey of Server Virtualization (pp. 65-74)
Full Text: PDF 

.
Radhwan Y Ameen, Department of Comp. Engineering, College of Engineering, Mosul University, Mosul, Iraq
Asmaa Y. Hamo, Dept. of Software Engineering, College of Computer Sc. and Mathematics, Mosul University, Mosul, Iraq 

.
Abstract — Virtualization is a term that refers to the abstraction of computer resources. The purpose of virtual computing environment is to improve resource utilization by providing a unified integrated operating platform for users and applications based on aggregation of heterogeneous and autonomous resources. More recently, virtualization at all levels (system, storage, and network) became important again as a way to improve system security, reliability and availability, reduce costs, and provide greater flexibility. Virtualization has rapidly become a go-to technology for increasing efficiency in the data center. With virtualization technologies providing tremendous flexibility, even disparate architectures may be deployed on a single machine without interference This paper explains the basics of server virtualization and addresses pros and cons of virtualization.
.
Keywords- virtualization, server, hypervisor ,Virtual Machine Manager, VMM , para virtualization , full virtualization, OS level server.
.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
12. Paper 28021357: A Proposed DK-PC Algorithm for Code Bloat Control in a Tree-Based Genetic Programming (pp. 75-82)
Full Text: PDF 

.
Oghorodi, Duke Urhe-otokoh, Department of Computer Science, College of Education, Warri, Delta State, Nigeria,
Asagba, Prince Oghenekaro, Department of Computer Science, University of Port Harcourt, River State, Nigeria 

.
Abstract — This paper addresses the Genetic Programming (GP) issue of code bloat which is the uncontrolled growth of program codes without a commensurate improvement in the program fitness to solve a given problem. Code Bloat is a serious issue in GP as it consumes computer memory and processing time. Though, several reasons and solutions for code bloat control have been suggested in literature, yet no final solution has been found so far. Against this backdrop, we proposed the Delete lower and Keep higher fitness value Programs after Crossover (DKPC) algorithm which keeps the higher fitness value program and delete the lower value fitness value programs from memory. We tested the Boolean 6-multiplexer and Boolean 11-Multiplexer functions against the preparatory requirements using our proposed algorithm, and we got very impressive results; we observed that the algorithm was able to control bloat to a large degree. However, the algorithm performed better in the Boolean 11-multiplexer function than in the Boolean 6-multiolexer function. Both functions displayed almost the same behaviour; except that the Boolean 11-multiplexer exhibited higher performance result than the Boolean 6-multiplexer in terms of better program size reduction. To this extent, our algorithm performed better in bloat control, based on the benchmark problems used.
.
Keywords — Genetic Programming, Evolutionary algorithms, Code Bloat
.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
13. Paper 31011325: Attack Resilient & Adaptive Medium Access Control Protocol (pp. 83-91)
Full Text: PDF 

.
Piyush Kumar Shukla, CSE, UIT, RGPV, Bhopal, India
Sarita Singh Bhadauria, ECE, MITS, Gwalior, India 
Sanjay Silakari, CSE, UIT, RGPV, Bhopal, India 
.
Abstract — In IEEE 802.11, all nodes contending for the access to a medium needs to perform activities as per the specification of medium access control sub layer. It has been observed that when the number of node increases, it leads to the probability of collisions, which finally causes longer back-off values of the concerned collided nodes. The recent development within the field of computer networking enables everyone to access the Internet in the fastest manner using the Tablet, Mobile, Laptop or traditional Desktop. One common way to achieve Internet connectivity includes the use of Wi-Fi, which also forms the subject matter of present research. In the entire situations' basic requirement at the user’s end- is a fair sharing of the available channel bandwidth, adequate quality of service (QoS), for which customers are paying lots of money. Unfairness in the network performance indicates the presence of attackers or some kind of misbehavior by existing users. It has been observed that sometimes to get more share of available bandwidth, several legitimate users show greediness or selfishness, which results in injustice to the other users in the same Wireless Local Area Network. However, it is too difficult to understand about the type and behavior of misbehaving nodes in the common shared environment. Another issue that requires attention is related to QoS that is if a user is availing better service than others within the network, then it will be appreciable. Otherwise, this is the matter of MAC misbehavior and needs to resolve. This research is motivated by selfish node, which manipulates their working ( differ from normal MAC protocols) in different ways to increase their share to occupying the access to the channel. This exploitation of the MAC layer protocol may be hidden from the upper layers and in this work a solution has been proposed to embark upon the problem at the MAC Layer itself. A faired, Attacks Resilient and opportunistic Adaptive Medium Access Control protocol has been further modified, and its performance has been compared with existing CSMA/CA base on the Key performance Indicators, i.e. Throughput, Medium Access Delay, Collisions per frame and Fairness Index.
.
Keywords - Opportunist Mode, Attacks Resiliency, Adaptability, MAC Layer Misbehavior, Selfish Node, IEEE 802.11, DCF, back-off, Attacking Mode, Suspicious Mode.
.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
14. Paper 18021307: A Cloud Computing Architecture for E-Learning Platform, Supporting Multimedia Content (pp. 92-99)
Full Text: PDF 
.
Atlee Gamundani, University of Zimbabwe, Computer Science Department, P.O.Box MP 167, Zimbabwe
Taurayi Rupere, University of Zimbabwe, Computer Science Department, P.O.Box MP 167, Harare, Zimbabwe 
Benny M Nyambo, University of Zimbabwe, Computer Science Department, P.O.Box MP 167, Zimbabwe 

.
Abstract — E-learning based platforms that support multimedia content to enhance interactive learning demands large disk space. Despite research ground covered under e-learning circles, less attention has been devoted to solicit the best methods to address the disk space challenges at minimal cost. This research focuses on advancing a best architecture that meet the need for storage space when developing interactive multimedia e-learning based portals. Simulation was used using the CloudSim toolkit. Findings show that to precisely test the performance of viable architectures, there has to be a robust platform for such experiments. The main conclusions drawn from this research were that, there is room to improve on existing architectures to scale down on development costs so attributed to e-learning portals that are interactive in stature. Storage can be built from exiting personal computers through harnessing the cloud computing functionality designed as most of the personal computers are not fully being used by their owners. This research culminate by recommending the need to explore on best simulator packages that can be used to test the functionality of cloud computing based architecture for e-learning environments.
.
Keywords-E-learning, Multimedia, Architecture, Cloud Computing, Storage, CloudSim, Simulation, Interactive.
.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
15. Paper 23021319: A Survey of Predicting Close Value in Stock Market (pp. 100-103)
Full Text: PDF 
.
Dharamveer Sisodia (1), Beerendra Kumar (2), Jitendra Kumar Gupta (2), Dr. Saurav Srivastava (3)
(1) M,Tech Scholar, Department of Computer Science & Engineering, SR Group of Institution, CSE Campus Jhansi, India
(2) Assistant Professor, Department of Computer Science & Engineering, SR Group of Institution, CSE Campus Jhansi, India 
(3) Assistant Professor Department of MCA, Bundelkhand University Jhansi, India  
College Of Science & Engineering , Jhansi (Affiliated UPTU,Lucknow) 
.
Abstract — The goal of fundamental analysis is to decide the value of a stock based on the previously mentioned factors and to act on the assumption that the actual stock price will eventually reflect the determined value. Stock price forecasting is an important task for investment/financial decision making challenge. It receives considerable attention from both researches and practitioners. Stock market is highly volatile, complex and dynamic area so stock/price forecasting is a considerable challenging issue. Several approaches have been used for forecasting stock price such as traditional and fundamental methods. In this paper we propose a hybrid combinatorial method of horizontal partition based decision tree and the genetic algorithm for the prediction of close values in the stock market.
.
Keywords- Stock market prediction, Genetic Algorithm, Decision Tree.
.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
16. Paper 28021330: Lecturer’s Homepage Usage in Indonesian Private University (pp. 104-109)
Full Text: PDF 

.
Dessy Wulandari AP, Department of Informatics Management, Gunadarma University, Depok, Indonesia
Abdus Syakur, Department of Informatics Engineering, Gunadarma University, Depok, Indonesia 
M. Achsan Isa Al Anshori, Department of Informatics Management, Gunadarma University, Depok, Indonesia 
M. Akbar Marwan, Department of Information Systems, Gunadarma University, Depok, Indonesia 

.
Abstract — The use of personal homepage by lecturers is getting popular in universities, especially to support teaching and learning process in the classroom. This study observed a lecturer in Information Systems Department in Indonesian Higher Education. Only 55.53% of the 151 lecturers who actively use the personal homepage. The amount of content and the popularity of the personal homepage on average still lower than the number of web pages viewed, number of documents, reffering domain, and total backlinks. Statistical test results showed that there were differences in the number of web pages, the number of documents, and the total backlinks between male and female lecturers. There are significant differences occur only in the total number of web pages and documents, while reffering domain and total backlinks shows no significant difference seen from the education lecturer.
.
Keywords- Lecturer’s Homepage; Indonesian Private University; Differences based on gender and educational background
.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
17. Paper 28021335: Comparative Survey of Steganography Techniques (pp. 110-114)
Full Text: PDF 
.
Rhythm walia, Om Pal
Centre for development of advanced computing, Noida, India 

.
Abstract — Steganography in its core is about hiding message in such a manner that it is invisible to any inter-mediate party. Being undetected is the most important trait for any steganography technique. To be invisible a steganography technique should produce minimum distortion in the cover image. This paper contains a through description of the techniques and also a comparison between different steganography techniques for their security against various attacks.
.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
18. Paper 28021347: Single CCTA-Based Four Input Single Output Voltage-Mode Universal Biquad Filter (pp. 115-119)
Full Text: PDF 

.
S. V. Singh, Department of Electronics and Communication Engineering, Jaypee Institute of Information Technology, Sect-128, Noida-201304, India
R. S. Tomar, Department of Electronics Engineering, Anand Engineering College, Agra-282007, India 
D. S. Chauhan, Department of Electrical Engineering, Institute of Technology, Banaras Hindu University, Varanasi-221005 (India) 

.
Abstract — In this paper a new single current conveyor transconductance amplifier (CCTA)-based four-input single-output (FISO) voltage-mode universal biquad filter is proposed. The proposed filter employs only single CCTA, two capacitors and two resistors. The proposed filter realizes all the standard filter functions i.e. low pass (LP), band pass (BP) and high pass (HP), band reject (BR) and all-pass (AP) filters in the voltage form ,through appropriate selection of the four input voltage signals. The circuit does not require inverting-type input voltage signal(s) and double input voltage signal(s) to realize any response in the design. The filter enjoys attractive features, such as orthogonal electronic tunability of quality factor and pole frequency, low sensitivity performance. The validity of proposed filter is verified through PSPICE simulations.
.
Keywords-component; CCTA, Biquad, Universal, Filter
.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
19. Paper 28021350: Reliable Multipath Routing Protocol (RMRP) For Mobile Ad Hoc Networks Using Adaptive Video Compression (pp. 120-124)
Full Text: PDF 
.
S. P. Swornambiga, Assistant Professor, Department of Computer Applications & Software Systems, C.M.S. College of Science and Commerce, Coimbatore, India
Antony Selvadoss Dhanamani, Associate Professor and Head, Research Department of Computer Science, NGM College, Pollachi, India 
.
Abstract - This paper presents a reliable multipath routing protocol for mobile ad hoc networks using adaptive video compression. Mobile ad hoc network is the kind of wireless network which consists of mobile nodes and has the characteristic of deploying anywhere anytime. An adaptive video compression mechanism is deployed. Multipath routing mechanism is adapted from the Ad hoc On-demand Distance Vector (AOMDV) routing protocol and the received signal strength is measured for the discovered available paths. The path with the maximum received signal strength is selected and the packets (compressed video packets) are sent through the path. The performance metrics such as packet delivery ratio, throughput, drop, jitter are taken into account for comparison with AOMDV. Simulation results proved that the proposed RMRP outperforms AOMDV in all performance aspects.
.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
20. Paper 28021360: Non-Preemptive Multi-Constrain Scheduling for Multiprocessor with Hopfield Neural Network (pp. 125-130)
Full Text: PDF 

.
Abdellatief H. ALI, ECE Department Modern Acadamy, Cairo, Egypt
.
Abstract - In this paper, task scheduling for non-preemptive multi-constrained multi-processor systems presented. The proposed model based on discrete Hopfield Neural network augmented with a methodology for weighting constrains to form overall network energy function. The network augmented with a layer to handle network re-initialization, based on min-max algorithm, case of local minima trapped without an acceptable solution. The proposed neural network solution does not require a predetermined scheduling length. Constrains included in the study are: task time, precedence, resources conflict, task dead time, and favoring tasks of the same setup to run on the same processor to suit reconfigurable hardware.
.
Keywords: Preemptive, Multi-constrains, Multi-processors, Scheduling, Hopfield, Neural Network.
.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
21. Paper 31011311: Comparative Analysis between Split and HierarchyMap Treemap Algorithms for Visualizing Hierarchical Data (pp. 131-142)
Full Text: PDF 
.
Aborisade D. O., Department of Computer Science, College of Natural Sciences, Federal University of Agriculture, Abeokuta, (FUNAAB) Ogun State, Nigeria.
Oladipupo, O. O., Department of Computer and Information Sciences, Covenant University, Ota, Ogun State, Nigeria. 
Oyelade, O. J., Department of Computer and Information Sciences, Covenant University, Ota, Ogun State, Nigeria. 
Obembe O. O., Department of Biological Sciences, Covenant University, Ota, Ogun State, Nigeria. 
Obagbuwa, I. C., Department of Computer Sciences, Lagos State University, Lagos, Nigeria. (LASU) 
Ewejobi, I. T., Department of Computer and Information Sciences, Covenant University, Ota, Ogun State, Nigeria. 
.
Abstract - We carried out comparative analysis between Split treemap algorithm and a more recently introduced treemap algorithm called HierarchyMap. HierrachyMap and Split are Treemap Visualization methods for representing large volume of hierarchical information on a 2-dimensional space. Split layout algorithm has been developed much earlier as an ordered layout algorithm with capability to preserve order and reduce aspect ratio. HierarchyMap is a newer ordered treemap algorithm developed to overcome certain deficiencies of the Split layout algorithm. The two algorithms were analyzed to compare their rate of complexity. They were also implemented using object-oriented programming tool and compared using a number of standard metrics for measuring treemap algorithms. Their implementation shows that HierarchyMap and Split although maintain the same level of data ordering and usability but HierarchyMap algorithm has better aspect ratio, better readability, low run-time, and less number of thin rectangles compared to Split treemap algorithm. Since aspect ratio is an important metric for determining the efficiency of treemaps on 2-D and small screens, and the result of the analysis shows that HierarchyMap is better efficient than Split treemap alagorithm, we conlude that HierarchyMap is more efficient than Split treemap algorithm.
.
Keywords: Treemap algorithm, Aspect ratio, HierarchyMap, 2-D space, Data Visualization.
.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
22. Paper 29021255: Analysis of Network Security Policy – Based Management (pp. 143-146)
Full Text: PDF 

.
Aliyu Mohammed, Sulaiman Mohd Nor, Muhammad Nadzir Marsono
Universiti Teknologi Malaysia, Faculty of Electrical Engineering 

.
Abstract — Network security and management policy in information communication is the desire to maintain the integrity, validity and consistency of a system or network, its data and its immediate environmental infrastructure. Well established and secured infrastructure would help in no means making the network safe from all kinds of intrusion. Protecting all these resources is another very important concept that is needed of any computer system. Harnessing, accessing and configuring relevant security policies are very important roles to be played in safeguarding the complex network infrastructure. The paper therefore analysis some of the desired policies and assessment guidelines that should be followed by network administrators for effective and strong network management, security facilities and data optimization
.
Keywords: Network Security; Management Policy; Intrusion; Domain Infrastructure. 
.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------


Comments