Vol. 8 No. 9 DEC 2010

Vol. 8 No. 9 December 2010 International Journal of Computer Science and Information Security
Publication December 2010, Volume 8 No. 9 (Download Full Journal) (Archive

.
Copyright © IJCSIS. This is an open access journal distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
1. Paper 23111015: Chaotic Hash Function Based on MD5 and SHA-1 Hash Algorithms (pp. 1-3)
Full Text: PDF

.
Mouad HAMRI & Jilali Mikram, Applied Mathematics and computer science department, Science University of Rabat, 4 Avenue Ibn Battouta Rabat Morocco
Fouad Zinoun, Economical sciences and management department, University of Meknes

.
Abstract — In this work an implementation of a 128 bits chaotic hash function is presented. We have used the logistic map as the chaotic dynamical system of our algorithm and for the initial condition generation of the chaotic map, we’ve used the two hash functions MD5 and SHA-1. The main idea is to use the MD5 and SHA-1 digits of the a message to construct the initial condition of the logistic map and using this map we will generate the digit of this message. The algorithm was implemented using JAVA programming language and its performance was studied by comparing it to MD5 hash function.
.
Keywords: Cryptography, Hash functions, MD5, SHA, Dynamical systems, Chaos theory.
.
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
2. Paper 23111018: Concept Measure Supported Aesthetics Ontology Construction for Videos (pp. 4-7)
Full Text: PDF

.
Dr Sunitha Abburu, Professor & Director, Department of Computer Applications, Adhiyamaan College of Engineering, Hosur, pin-635109, Tamilnadu, India
.
Abstract — Entertainment plays a vital role in human life. Multimedia conquers top position in the entertainment world. Video stands first among the multimedia entertainment. The rapid growth of the videos has resulted in the emergence of numerous multimedia repositories that require efficient and effective video storage, semantic annotation, indexing and retrieval systems. The introduction of ontologies in multimedia retrieval system can improve the precision and recall rate effectively. The performance of the annotation and the retrieval system increases with the support of the domain ontology. Most of the video annotation, indexing and the retrieval systems focus on the semantic concepts like objects, people, location, events, actions etc. But most of the multimedia systems are filled with human and their emotions. Any multimedia system like cinema, news videos, sports videos, and any domestic functional videos tries to capture the emotions of the human involved in the occasion. A video retrieval system will be complete if the system identifies, captures and represents the emotions of the humans. This paper focus on identification and representation of human emotions and the intensity of the emotions are represented using the fuzzy logic. The concept of Navarasra has been brought in to video retrieval system to classify the human emotions. The proposed approach is generic and flexible. It is designed and constructed for all videos where human beings and their emotions are been captured. A practical implementation is done using Protégé as an Ontology developing tool.
.
Keywords-component; Video Semantics, Concept measures, Ontology, Retrieval, Human Emotions.
.
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
3. Paper 26111027: Reconfigurable Hardware Intelligent Memory Controller for H.264/AVC Encoders (pp. 8-16)
Full Text: PDF

.
Kamel Messaoudi, LERICA Laboratory Badj Mokhtar University Annaba, Algeria
El-Bay Bourennane, LE2I Laboratory, Burgundy University, Dijon, France
Salah Toumi, LERICA Laboratory, Badj Mokhtar University, Annaba, Algeria

.
Abstract — In this paper, we propose an intelligent memory controller for H.264/AVC CODECs with memory management strategies based on a preloading mechanism in order to reduce the number of accesses to external memory. The controller is used both in simulation and implementation platform for the H.264 encoder. This platform uses an external DDR2 memory to record an image sequence, and an intelligent component with local memories to read the images periodically according to the needs of the H.264 processing modules. Several on-chip memories are used to avoid accessing to off-chip memory and consequently decrease energy consumption. The proposed memory controller can be adapted to the various profiles defined in the standard. The intelligent controller is implemented in VHDL and verified to run at 114 MHz using a Xilinx virtex5-ML501 platform. The proposed architecture occupies 10% of the FPGA’s resources and ensures data for the processing modules in H.264 encoder.
.
Keywords- Memory management; intelligent controller; FPGA; H.264/AVC codec; real-time processing.
.
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
4. Paper 26111030: Fragmentation Investigation And Evaluation In Distributed DBMS Using JDBC and OGSA-DAI (pp. 17-24)
Full Text: PDF

.
Ahmed Almadi, Ahmed Manasrah, Omer Abouabdalla, Homam El-Taj
National Advanced IPv6 Center of Excellence (NAv6) Universiti Sains Malaysia Penang, Malaysia

.
Abstract — This research investigates and evaluate the impact of the fragmentation on different database retrieval modes based on derived horizontal fragmentation by generating and distributing the query to the servers (distributed search) or send the query to the direct server (direct search). Moreover, it provides recommendation on suitable query execution strategies based on a proposed fitness fragmentation formula. Furthermore, examine the suitable technology such as OGSA-DAI and JDBC in grid database to examine the time overhead in distributed systems and grid environments in different cases like size or number of servers. The results show that the fragmentation's time performance impact is clearly effective and positively applied while increasing the database size or the number of servers. On the other hand, the OGSA-DAI kept on showing slower execution time on all conducted scenarios, and the differences between the execution time exceeds up to 70% while increasing the size of data or number of servers. In addition, this thesis has tested the impact of fragmentation search against the distributed search where the first one submit the query to direct server(s) (direct search), and the second one distribute the query to the servers (distributed search). The result shows that the speed effectiveness of direct search technique in JDBC case is around 70% faster than the distributed search and around 50% faster in OGSA-DAI case.
.
Keywords-component; JDBC; OGSA-DAI; Fragmentation; Distributed DBMS
.
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
5. Paper 29111036: Impact of Guard Interval in Proposed MIMO-OFDM System for wireless communication (pp. 25-30)
Full Text: PDF

.
M. P. Chitra, Research Scholar, Sathyabama University, Chennai, India.
Dr. S. K. Srivatsa, Senior Professor, St. Joseph College of Engineering, Chennai, India.

.
Abstract - Alamouti’s space-time coding scheme for Multi-Input Multi-Output (MIMO) system has drawn much attention in 4G wireless technologies. Orthogonal frequency division multiplexing (OFDM) is a popular method for high data rate wireless transmission. OFDM may be combined with antenna arrays at the transmitter and receiver to increase the diversity gain and enhance the system capacity on time variant and frequency selective channels, resulting in Multi-Input Multi-Output (MIMO) configuration. This paper explores varies physical layer research challenges in MIMO-OFDM system design including channel modeling, space time block code techniques, channel estimation and signal processing algorithms used for performing time and frequency synchronization in MIMO-OFDM system .The proposed system is simulated in matlab and analyzed in terms of BER with signals to noise ratio (SNR).The difference of BER for coded and uncoded MIMO system and also the impact of guard interval are simulated using different wireless channel.
.
Keywords - Multi-Input Multi-Output (MIMO); orthogonal frequency division multiplexing (OFDM); Bit error rate (BER); signals to noise ratio (SNR); Single input single output (SISO); space time block code (STBC)
.
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
6. Paper 29111037: Implementation of New Routing Protocol for Node Security in a Mobile Ad Hoc Network (pp. 31-36)
Full Text: PDF

.
Virendra Singh Kushwah, Department of Computer Science, Hindustan Institute of Management and Computer Studies, Farah, Mathura, INDIA
Gaurav Sharma, Department of Computer Science, GLA, University Mathura, INDIA

.
Abstract-- A routing protocol plays important role to handle entire network for communication and determines the paths of packets. A node is a part of the defined network for transferring information in form of packets. If all packets transferred from source to destination successfully, it has been assumed that the routing protocol is good. But, an attacker turns this dealing as a speed breaker and turning point of a highway. So, prevention from attacks and secure packets, a new routing protocol is being introduced in this paper. The proposed routing protocol is called by SNAODV (Secure Node AODV). This paper is also tried to maximize throughput as compared with AODV and SAODV.
.
Keywords—AODV; routing; packets; network
.
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
7. Paper 30111038: Runtime Monitoring and Controlling Of Information Flow (pp. 37-45)
Full Text: PDF

.
Mohamed Sarrab, Software Technology Research Laboratory, De Montfort University, Leicester, LE1 9BH, UK
Helge Janicke, Software Technology Research Laboratory, De Montfort University, Leicester, LE1 9BH, UK

.
Abstract— Computer systems are monitored to check performance or verified to check the correctness of the software systems with respect to security properties such as integrity, availability and confidentiality. The more sensitive the information, such as credit card information, military information or personal medical information, being processed by the software, the more necessary and important it is to monitor and control the flow of sensitive information. Monitoring and controlling an untrusted program behavior to ensure information confidentiality during runtime in an environment where confidential information is present is often difficult and unnerving task for users. The issue is how users can monitor and control the flow of the confidential information at the runtime of untrusted programs. In this paper we present a novel runtime verification approach for monitoring and controlling information flow that supports user interaction with a running program.
.
Keywords-Information flow control; Runtime monitoring; Confidentiality; Usability.
.
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
8. Paper 30111047: Design of Novel Usability Driven Software Process Model (pp. 46-53)
Full Text: PDF
.
Hina Gull, Department of Computer Engineering, College of Electrical & Mechanical Engineeing NUST, Rawalpindi Pakistan
Farooque Azam, Department of Computer Engineering, College of Electrical & Mechanical Engineeing NUST, Rawalpindi Pakistan
Sardar Zafar Iqbal, Department of Computer Sciences, Iqra University, Islamabad Pakistan

.
Abstract - In this paper we have proposed a novel software process model for web based applications. This model is based on the empirical study carried out by us and also by the literature review of software development models. Model consists of three phases: Requirement Engineering, Design and Implementation. Model contains certain sub activities in each phase describing the flow and steps which should be followed to develop a web application. The main emphasis of the model is on usability aspect, keeping in view the criticality of the user interface for a good web application. Flexible and easy change manageable nature of the model makes it different and worth using as compared to other software development approaches.
.
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
9. Paper 30111050: Power-Based Key Hopping (PBKH) and Associated Hardware Implementation (pp. 54-60)
Full Text: PDF

.
Rabie A. Mahmoud, Department of Mathematics, Faculty of Science, Cairo University, Cairo, Egypt.
Magdy Saeb, Computer Engineering Department, Arab Academy for Science, Tech. & Maritime Transport, Alexandria, Egypt.

.
Abstract: Power-Based Key Hopping (PBKH) is a process of key hopping that is used to interchange the user key of a cipher. Power based key hopping is founded on the idea of dynamic frequency power-based hopping to change the user key. This is achieved through computing the power of a previous cipher packet and comparing it with a standard value. In this work, we discuss various key hopping methods and suggest a procedure of power based key hopping. Moreover, we provide a Field Programmable Gate Array (FPGA) hardware implementation of the proposed key hopping technique.
.
Keywords: Power Based Key Hopping; Security; Hardware; FPGA
.
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
10. Paper 30111058: The Innovative Application of Multiple Correlation Plane (pp. 61-69)
Full Text: PDF

.
Julaluk Watthananon, Faculty of Information Technology, King Mongkut’s University of Technology North Bangkok, Thailand
Sageemas Na Wichian, College of Industrial Technology, King Mongkut’s University of Technology North Bangkok, Thailand
Anirach Mingkhwan, Faculty of Industrial and Technology Management, King Mongkut’s University of Technology North Bangkok, Thailand

.
Abstract—Presentation data with column graph and line graph is a well-known technique used in data explanation to compare and show direction that users can easily understand. However, the techniques has limitations on the data describing complex with multiple relations, that is, if the data contains diverse relationships and many variables, the efficiency of the presentation will decrease. In this paper, the mathematical method for multi relations based on Radar graph is proposed. The position of information approaches on the correlation plane referred to the distribution of content and the deep specific content. However, the proposed method analyzes the multi variants data by plotting in the correlation plane, and compared with the base line system. The result shows that the performance is higher than other methods in term of accuracy, time and features.
.
Keywords-Correlation plane; correlation boundary; correlation plot; Star plot; Radar graph
.
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
11. Paper 30111059: Structural Analysis of Bangla Sentences of Different Tenses for Automatic Bangla Machine Translator (pp. 70-75)
Full Text: PDF

.
Md. Musfique Anwar, Nasrin Sultana Shume and Md. Al-Amin Bhuiyan
Dept. of Computer Science & Engineering, Jahangirnagar University, Dakha, Bangladesh

.
Abstract - This paper addresses about structural mappings of Bangla sentences of different tenses for machine translation (MT). Machine translation requires analysis, transfer and generation steps to produce target language output from a source language input. Structural representation of Bangla sentences encodes the information of Bangla sentences and a transfer module has been designed that can generate English sentences using Context Free Grammar (CFG). The MT system generates parse tree according to the parse rules and a lexicon provides the properties of the word and its meaning in the target language. The MT system can be extendable to paragraph translation.
.
Keywords: Machine Translation, Structural representation, Context Free Grammar, Parse tree, Lexicon etc.
.
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
12. Paper 30111064: Image Retrieval using Shape Texture Patterns generated from Walsh-Hadamard Transform and Gradient Image Bitmap (pp. 76-82)
Full Text: PDF

.
Dr. H.B.Kekre, Sudeep D. Thepade, Varun K. Banura
Computer Engineering Department, MPSTME, SVKM’s NMIMS (Deemed-to-be University), Mumbai, India

.
Abstract — The theme of the work presented here is gradient mask texture based image retrieval techniques using image bitmaps and texture patterns generated using Walsh-Hadamard transform. The shape of the image is extracted by using three different gradient operators (Prewitt, Robert and Sobel) with slope magnitude method followed by generation of bitmap of the shape feature extracted. This bitmap is then compared with the different texture patterns namely ‘4-pattern’, ‘16-pattern’ and ‘64-pattern’ generated using Walsh-Hadamard transform matrix to produce the feature vector as the matching number of ones and minus ones per texture pattern. The proposed content based image retrieval (CBIR) techniques are tested on a generic image database having 1000 images spread across 11 categories. For each proposed CBIR technique 55 queries (randomly selected 5 per image category) are fired on the image database. To compare the performance of image retrieval techniques average precision and recall of all the queries per image retrieval technique are computed. The results have shown improved performance (higher precision and recall values of crossover points) with the proposed methods compared to the mask-shape based image retrieval techniques. Further the performance of proposed image retrieval methods is enhanced using even image part. In the discussed image retrieval methods, the combination of original and even image part for 4-pattern texture with shape masks generated using Robert gradient operator gives the highest crossover point of precision and recall indicating better performance.
.
Keywords- CBIR, Gradient operators, Walsh-Hadamard transform, Texture, Pattern, Bitmap.
.
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
13. Paper 30111075: An Evaluation of Software Requirement Prioritization Techniques (pp. 83-94)
Full Text: PDF

.
Mohammad Shabbir Hasan, Abdullah Al Mahmood, Md. Jahangir Alam, Sk. Md. Nahid Hasan, Farin Rahman
Panacea Research Lab, Dhaka, Bangladesh and Dhaka International University, Dhaka, Bangladesh.

.
Abstract — Requirements prioritization plays an important role in the requirement engineering process, particularly, with respect to critical tasks like requirements negotiation and software release planning. Selecting the right set of requirements for a product release largely depends on how successfully the requirement candidates are prioritized. There are different requirement prioritization techniques available which are some more elaborated than others. This paper takes a closer look at nine different techniques of requirement prioritization namely Analytical Hierarchy Process (AHP), Hierarchy AHP, Minimal Spanning Tree, Bubble Sort, Binary Search Tree (BST), Priority Group, Planning Game (PG), 100 points method and Planning Game combined with AHP (PGcAHP) and then put them into a controlled experiment, in order to find out the best one. The evaluation was done on the basis of some criteria like: ease of use, certainty, accuracy of result, method’s ability to scale up to many more requirements, required number of comparisons, and required time to make decision. Analysis of the data from the experiment indicates that the analytic hierarchy process to be a promising candidate, although it may be problematic to scaleup. However, the result clearly indicates that the Planning Game (PG) yields accurate result, is able to scale up, requires least amount of time, the easiest method to use and so on. For these reasons, finding of the experiment is, the Planning Game (PG) method is supposed to be the best method for prioritizing requirements.
.
Keywords- Requirement Engineering, Requirement Prioritization, Requirement Negotiation, Software Product Management, Software Release Planning.
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
14. Paper 30111076: Routing Fairness in Mobile Ad-Hoc Networks: Analysis and Enhancement (pp. 95-100)
Full Text: PDF

.
M. Shiraz Ahmed, Lecturer, Department Of Computer Science & Information Systems, Najran University, Najran, Saudi Arabia,
Haji Moinuddin, Lecturer, Department Of Computer Science & Information Systems, Najran University, Najran, Saudi Arabia,
Fazeelatunnisa, Lecturer, Department Of Computer Science & Information Systems, Najran University, Najran, Saudi Arabia

.
Abstract: With the rapid advances in wireless and semiconductor technologies mobile connectivity became cheap and ubiquitous. One of the major challenges facing Mobile Ad-Hoc Networks (also known as MANETs) is the absence of a proper routing protocol that provides good fairness and scalability, low overhead, low end-to-end delays, seamless connectivity and good quality of service. This paper studies the fairness of routing protocols for MANETS. In this paper we propose routing segments methods to solve the problem of lack of fairness in routing.
.
Keywords: MANETS, Fairness, Segments, Scalability
.
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
15. Paper 30111054: Nano-particle Characterization Using a Fast Hybrid Clustering Technique for TEM Images (pp. 101-110)
Full Text: PDF

.
M.A. Abdou, Researcher, IRI, Mubarak City for Scientific Research and Technology Applications, Alexandria, Egypt.
Bayumy B.A. Youssef, Researcher, IRI, Mubarak City for Scientific Research and Technology Applications, Alexandria, Egypt.
W.M. Sheta, Researcher, IRI, Mubarak City for Scientific Research and Technology Applications, Alexandria, Egypt

.
Abstract - This Paper introduces a new fast Transmission Electron Microscopy (TEM) images clustering technique. Since analysis of particle sizes and shapes from two-dimensional TEM images is affected by variations in image contrast between adjacent particles, automatic methods requires more efforts. The proposed hybrid method consists of two main steps: automatic segmentation and nano-particles counting. The segmentation procedure begins with an automatic threshold generator and moves towards a high efficient multiple- regions segmentation technique. Results are observed, compared with existing methods and manual counting.
.
Keywords: TEM, Image segmentation, Threshold generator, Nano-particle counting
.

---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
16. Paper 30111042: Gaussian Process Model for Uncertain Data Classification (pp. 111-115)
Full Text: PDF

.
G.V. Suresh, Assoc. Professor, CSE Department, Universal College of Engineering, Guntur, India
Shabbeer Shaik, Assoc. Professor, MCA Department, Tirmula College of Engineering , Guntur, India
E.V.Reddy, Assoc. Professor, CSE Department, Universal College of Engineering, Guntur, India
Usman Ali Shaik, Assoc. Professor, CSE Department, Universal College of Engineering, Guntur, India

.
Abstract— Data uncertainty is common in real-world applications due to various causes, including imprecise measurement, network latency, out-dated sources and sampling errors. These kinds of uncertainty have to be handled cautiously, or else the mining results could be unreliable or even wrong. We propose that when data mining is performed on uncertain data, data uncertainty has to be considered in order to obtain high quality data mining results. In this paper we study how uncertainty can be incorporated in data mining by using data clustering as a motivating example. We also present a Gaussian process model that can be able to handle data uncertainty in data mining.
.
Keywords- Gaussian process, uncertain data, Gaussian distribution, Data Mining
.
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
17. Paper 30111078: Pair Wise Sorting: A New Way of Sorting (pp. 116-120)
Full Text: PDF

.
Md. Jahangir Alam, Dhaka International University, Dhaka, Bangladesh
Muhammad Monsur Uddin, Institute of Science, Trade and Technology, Dhaka, Bangladesh
Mohammad Shabbir Hasan, Abdullah Al Mahmood, Panacea Research Lab, Dhaka, Bangladesh
.
Abstract — This paper presents a technique for sorting numerical data in an efficient way. The numbers of comparisons i.e. the running time of this technique is dependent on distribution or diversity of the value of data items as like as other efficient algorithms. When the total number of data is even, this method groups that data into a collection of pairs and therefore establishes the sorting constraints on each of the pairs. The control is traversed through the list of elements by changing the position of each pair which is the major principle of this technique. On the other hand, when the total number of elements is odd, this method sorts all elements except the last one in the same was as mentioned earlier and the last element is sorted using the general Insertion Sort. This algorithm is therefore a hybrid sorting method that sorts elementary numeric data in a faster and efficient manner.
.
Keywords- Sorting, Pair Wise Sorting, Sorting Techniques.
.
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
18. Paper 30111086: Improving Client-Server Response Time Using IPv6 Header Suppresion Over MPLS (pp. 121-126)
Full Text: PDF

.
Imad J. Mohamad & Yung-Wey Chong, National Advanced IPv6 Center, Universiti Sains Malaysia, 11800 Penang, Malaysia
Tat-Chee Wan & Putra Sumari, School of Computer Sciences, Universiti Sains Malaysia, 11800 Penang, Malaysia

.
Abstract — Optimizing the response time for Client-Server IPv6 traffic over label switched path (LSP) is the main contribution for this paper. It is achieved using header suppression for real time IPv6 traffic across MPLS label switched path (LSP). Robust Header Compression (RoHC) and Payload Header Suppression (PHS) are two options defined in IEEE 802.16 for mobile WiMAX performance work using link-by-link approach. This paper adapts PHS for MPLS performance and extends it to work over LSP using end-to-end approach. The implementation for IPv6 header suppression using NS2 shows improvement in response time for client-server traffic by 1.7s. Additional improvement in QoS parameters for UDP and TCP traffic is investigated.
.
Keywords-component; Client-Server Traffic, LSP, IPv6, Header Suppression;
.
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
19. Paper 31101070: Hybrid Compression of Color Images with Larger Trivial Background by Histogram Segmentation (pp. 127-131)
Full Text: PDF

.
M. Mohamed Sathik, Department of Computer Science, Sadakathullah Appa College, Tirunelveli, India
K. Senthamarai Kannan and Y. Jacob Vetha Raj, Department of Statistics, Manonmanium Sundaranar University, Tirunelveli, India

.
Abstract - A hybrid image compression method is proposed by which the background of the image is compressed using lossy compression and the rest of the image is compressed using lossless compression. In Hybrid Compression of Color Images with Larger Trivial Background by Histogram Segmentation(HCCILTBHS) , input color image is subjected to binary segmentation using histogram to detect the background. The color image is compressed by standard lossy compression method. The difference between the lossy image and the original image is computed and is called as residue. The residue at the background area is dropped and rest of the area is compressed by standard lossless compression method. This method gives lower bit rate than the lossless compression methods and is well suited to any color image with larger trivial background.
.
Key Words- Segmentation, Erosion, Dilation, Image Compression.
.
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
20. Paper 30101074: Realization and Study of High Performance Voltage Mode Oscillator based on CCCCTA: A Building Block for Analog Signal Processing (pp. 132-138)
Full Text: PDF

.
Deependra Pandey, Asst. Professor, Dept. of ECE, Amity University, Lucknow
Prof.(Dr.) L.K. Singh, Director, IET, Dr. R. M. L. Avadh University, Faizabad

.
Abstract- At present there is a growing interest in designing current mode circuits. This attributed to their large signal bandwidth, great linearity, wider dynamic range, simple circuitry and low power consumption. The paper presents a basic current-mode building block for analog signal processing, namely current controlled current conveyor transconductance amplifier (CCCCTA).Its parasitic resistance at current input port can be controlled by an input bias current. It is very suitable to use in a current-mode signal processing, which is continually more popular than a voltage one. The proposed element is realized in a CMOS technology and is examined the performances through PSPICE simulations. The CCCCTA performs tuning over a wide current range. In addition, some circuits for example as a current-mode universal biquad filter and a grounded inductance occupy only single CCCCTA.
.
Keywords: Current Conveyors, CCCCTA, Current-mode circuits, Voltage Mode Oscillator
.
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
21. Paper 11101002: Hybrid Technique for Self Tuning PI Controller Parameters in HVDC Systems (pp. 139-150)
Full Text: PDF

.
A.Srujana, Research Scholar, JNT University, Hyderabad
Dr. S.V.Jayaram Kumar, Professor, Jawaharlal Nehru Technological University, Hyderabad

.
Abstract — Nowadays, due to certain advantages, the HVDC systems are commonly used in long distance transmissions. The major drawback associated with HVDC system is that it takes a longer duration to return to its steady state value after the occurrence of a fault. In a HVDC system, when a fault occurs, the current and voltage will deviate from their normal range and PI controllers are used to maintain its current and voltage at the normal steady state value. Controller parameter tuning plays a significant role in maintaining the steady state current and voltage of a HVDC system. Here, we propose a hybrid technique to self tune the PI controller parameters. The proposed hybrid technique utilizes fuzzy logic and neural network to self tune the controller parameters. The fuzzy rules are generated using different combinations of current error, rate and combined gain. To train the neural network, different combinations of fuzzy gain, proportional gain and integral gain are used. The neural network is trained using a back propagation algorithm. By experimentation it is shown that the system that uses this method takes a very short time to return to its normal steady state. The implementation results show that the performance of the proposed hybrid technique is superior to that of both the self tuning techniques.
.
Keywords- fuzzy logic; HVDC; neural network; fuzzy rules; proportional and integral gain.
.
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
22. Paper 26111032: Use of Computerized Web-Based Information System For Determining Losses in 15-6.6 KV Feeders in Traditional Electrical Network Managemment: Case Study Goma Distribution Electrical Network (pp. 151-157)
Full Text: PDF

.
Ezekiel U. Okike, Department of Computer Science, University of Ibadan, Ibadan, Nigeria
Bakunzi G. Joseph, School of Computer Studies, Kampala International University, Kampala, Uganda

.
Abstract— Electrical energy plays very vital role in modern global economy. The aim of this study is to develop a framework for a Web-Based Information System (WIS) tool for computing losses from 15 – 6.6 KV Feeders in Traditional Electrical Network Management (TENM). The study was conducted in Goma District in the Democratic Republic of Congo. Data were collected from 26 key staff of Goma Distribution Electrical Network who responded to the questionnaires and from metered reading documents used in the study. The study implemented a Computerized Web-Based Information System (CWIS) to compute different losses in Goma electrical distribution network. The CWIS computed technical losses in five 15-6.6KV feeders of Goma electrical distribution network. The study revealed that among the five feeders, feeder 1 (Sud feeder) consumes 1,469,172.6 KWH representing 66.3% of the total annual energy loss while others presented lower annual losses. This is an indication that Feeder 1 is overloaded and needed to be resized or on the alternative, the installation of another overhead cable that will take the half of the load in charge.
.
Keywords- Electrical energy; energy distribution; feeder loss; computerized information system
.
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

.
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
25. Paper 29111035: Using RFID to Enhance Mobile Banking Security (pp. 176-182)
Full Text: PDF

.
Zakaria Saleh, MIS Department, IT faculty, Yarmouk University, Irbid, Jordan
Izzat Alsmadi, CIS Department, IT faculty, Yarmouk University, Irbid, Jordan

.
Abstract — Mobile banking is introducing a new generation of location-independent financial services using mobile terminals. This facilitates allowing users to make payments, check balances, transfer money between accounts and generate statements of recent transactions on their cellular phones. While providing, anywhere, anytime banking to the user, the service should be secure and security needs to be implemented at various levels, starting from the SIM card security, mobile software security, and secure customer access to banking services. Banks rely on users having their mobile phones with them all the time. Hence, as a mean for security measures, banks can send alerts, anytime, in order to provide an enhanced security and services. This paper analyzes the security issues in Mobile Banking, and proposes an improved security to the mobile banking services using RFID.
.
Key words: Mobile banking, security, RFID, Wireless communication, Pervasive Computing, smart cards, and contactless payment, wireless security, and e-commerce.

.
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
26. Paper 30111065: Parcel Management System using GPS Tracking Unit (pp. 183-189)
Full Text: PDF

.
Tahmina Khatoon 1, Md. Musfique Anwar 2, Nasrin Sultana Shume 2, Md. Mizanur Rahman 1
1 Computer Science & Engineering Department, IBAIS University, Dhaka, Bangladesh
2 Computer Science & Engineering Department, Jahangirnagar University, Dhaka, Bangladesh

.
Abstract - In this paper, the proposed system overcomes the deficiencies of parcel management system for providing parcel information by using operational data extracted from a GPS tracking unit. A GPS tracking unit is a device that uses the Global Positioning System to determine the precise location of a vehicle to which it is attached and to record the position at regular intervals. The recorded location data can be transmitted to a central location database of a remote tracking server using satellite modem embedded in the unit. Tracking server also has satellite modem that receives vehicle location information. This allows the vehicle's location to be displayed against a map backdrop in real-time using customized software to authorized users of the system via website over the internet.
.
Keywords: Parcel Management System, GPS, Tracking server, Satellite Modem.
.
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
27. Paper 30111081: Generation of Mutation Operators for AOP (pp. 190-194)
Full Text: PDF

.
Mayank Singh, Research Scholar, Uttarakhand Technical University, Dehradun, India
Shailendra Mishra, Professor computer science department, KEC dwarahat, Uttarakhand, India

.
Abstract: Testing of aspect oriented programs is an upcoming challenge for the researchers. Mutation testing has a lot to be undertaken to explore the field of testing of AOP. It is an emerging field of research in testing of aspect oriented programming. Since the effectiveness of mutation testing depends on finding fault types and designing of mutation operators, therefore the effectiveness of testing depends upon the quality of these mutation operators. A detailed study has done on the mutation operators for procedural and object oriented languages, but for aspect oriented language only few researchers had contributed. This paper discusses in detail about the fault types and related mutation operators for AspectJ language. It also proposes the implementation framework of mutation operators automatically.
.
Keywords: Mutation Testing, Aspect orietend testing, fault based testing
.
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
28. Paper 30111049: Modelling Data Transmission through a Channel Based on Huffman Coding and Encryption Methods (pp. 195-199)
Full Text: PDF

.
Eugène C. Ezin, Institut de Mathématiques et de Sciences Physiques, Unité de Recherche en Informatique et Sciences Appliquées, Université d’Abomey-Calavi, République du Bénin
.
Abstract — Data transmission through a secure channel requires the attention of many researchers. In this paper, on the basis of an alphabet of ciphers and letters, we propose a model for data transmission through a secure channel. This is achieved at two levels. First we associate each distinct symbol with a probability in the message to transmit. By doing so, we modify the well known adaptive Huffman coding method. The obtained alphabet is used to construct the coded message to transmit through a cryptosystem. Therefore, the original message is coded and encrypted before its delivering. The proposed model is examined.
.
Keywords-component—Data compression, Huffman coding technique, encryption and decryption algorithms.
.
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
29. Paper 30111052: Performance Comparison Of Multicast Routing Protocols In Ad-Hoc Wireless Networks (pp. 200-202)
Full Text: PDF

.
N. Veena, Dept. of CSE, A N University, Guntur
A. VinayaBabu, Dept. of CSE, JNTU College of Engineering, Hyderabad
K. Madhukar, Nizam College, Osmania University, Hyderabad
B. Sujatha, Dept. of CSE, Nizam College, Hyderabad
B. Anandkumar, Dept. of CSE, Rayalasima University, Kurnool.
S. Nagaprasad, Dept. of CSE, Aacharya Nagarjuna University, Guntur

.
Abstract: The majority of applications are in the areas where rapid deployment and dynamic reconfiguration are necessary and a wire line network is not available. These include military battlefields, emergency search and rescue sites, classrooms, and conventions, where participants share information dynamically using their mobile devices. Well established routing protocols do exist to offer efficient multicasting service in conventional wired networks. These protocols, having been designed for fixed networks, may fails to keep up with node movements and frequent topology changes in a MANET. Therefore, adapting existing wired multicast protocols as such to a MANET, which completely lacks infrastructure, appear less promising. Providing efficient multicasting over MANET faces many challenges, includes scalability, quality of service, reliable service, security, Address configuration, Applications for
multicast over MANET. The existing multicast routing protocol do not addresses these issues effectively over Mobile Adhoc Networks (MANET).
.
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
30. Paper 30111060: A Proposed Ontology Based Architecture to enrich the data semantics syndicated by RSS techniques in Egyptian Tax Authority (pp. 203-209)
Full Text: PDF

.
Ibrahim M El-Henawy, Faculty of computer and Informatics, Zagazig University, Zagazig, Egypt
Mahmoud M Abd El-latif & Tamer E Amer, Faculty Of Computer and Information, Mansoura University, Mansoura, Egypt

.
Abstract — RSS (RDF site summary) is a web content format used to provide extensible metadata description and syndication for large sharing, distribution and reuse across various applications; the metadata provided by the RSS could be a bit to describe the web resource; this paper provides a framework for making the RSS not only just for syndicating a little information about news but also for further classification, filtering operations and answering many questions about that news by modeling RSS ontology. The proposed architecture will be applied to handle announcements in the Egyptian Tax authority.
.
Keywords- Semantic Web - RDF – Ontology – RSS – OWL –Protégé - Egyptian Tax
.
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
31. Paper 30111062: Distributed Task Allocation in Multi-Agent System Based on Decision Support Module (pp. 210-215)
Full Text: PDF

.
Sally M. El-Ghamrawy, Computers and Systems Department, Faculty of Engineering, Mansoura University, Egypt
Ali I. El-Desouky, Computers and Systems Department, Faculty of Engineering, Mansoura University, Egypt
Ahmed I. Saleh, Computers and Systems Department, Faculty of Engineering, Mansoura University, Egypt

.
Abstract- A Multi-Agent System (MAS) is a branch of distributed artificial intelligence, composed of a number of distributed and autonomous agents. In MAS, an effective coordination is essential for autonomous agents to reach their goals. Any decision based on a foundation of knowledge and reasoning can lead agents into successful cooperation, so to achieve the necessary degree of flexibility in coordination, an agent requires making decisions about when to coordinate and which coordination mechanism to use. The performance of any MAS depends directly with the right decisions that the agents made. Therefore the agents must have the ability of making right decisions. In this paper, we propose a decision support module in a distributed multi-agent system, which enables any agent to make decisions needed for Task allocation problem; we propose an algorithm for Task Allocation Decision Maker (TADM). Furthermore, a number of experiments were performed to validate the effectiveness of the proposed algorithm (TADM)); we compare the efficiency of our algorithms with recent frameworks. The preliminary results demonstrate the efficiency of our algorithms
.
Keywords: Decision Making, Task allocation, Coordination Mechanism, Multi-Agent System (MAS)
.
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
32. Paper 30111068: Multiplayer Enhanced Make Square Game in the Net (pp.216-223)
Full Text: PDF

.
Md. Ekramul Hamid, Department of network Engineering, College of Computer Science, King Khalid University, Abha, Kingdom of Saudi Arabia
Sudip Saha, Software Engineer, Protocom Technology, Sydney, NSW-2000 , Australia
Mohammed Qayyum, Department of Computer Engineering, College of Computer Science, King Khalid University, Abha, Kingdom of Saudi Arabia

.
Abstract— In this work, the authors attempt to create a successful Java socket program to implement the “Make Square” game in the net. The game is very popular among the children. Even though this game is for kids, this one can also be played by an adult because it can be quite tricky, require concentration and a little bit of intelligence. The goal in this game is to make more small squares. A player will win the game, if he can complete maximum number of squares after the game is over. Here client/server technology is used to implement socket programming. Since the game is implemented by java, so it is platform independent and portable. Many players in many different groups can play the game on the net. To make the game more interesting we enhance its feature by adding hidden lines. This makes the game more attractive and challenging. The Java features like Networking, Graphics, Layout Management, Package and Interface, Exception Handling, I/O, Applets, AWT Controls and Event handling etc. [2-4] are used to create the game. The Make Square game consists of more than 1700 lines of code in 12 classes. Five of these classes are part of the server side and rest seven is part of the client side. The Make Square game is running properly in a network.
.
Keywords-component; Make Square, node, socket programming, AWT, 3D object, GUI, client/server technology
.
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
33. Paper 21111008: Descriptive System For Creating Awareness In The Electoral Process In Nigeria Using Information Technology (pp. 224-229)
Full Text: PDF

.
B. A. Onyekwelu, Department Of Computer Science, Joseph Ayo Babalola University, Ikeji-Arakeji, Osun State
Dr. D.T. Akomolafe, MBCS, Department Of Computer Science, Joseph Ayo Babalola University, Ikeji- Arakeji, Osun State, Nigeria
.
Abstract – Knowledge is power, as is popularly said, and lack of knowledge of the electoral process of one’s nation makes one a subject, rather than citizen. What makes the difference between citizens and subjects is the type and volume of information possessed. This paper discusses the electoral process in Nigeria in relation to the principal actors in the process, namely, the electorates, the political players, the electoral body, the Judiciary and the Government. They roles of each principal actor are highlighted. The current state of awareness of the electoral process in Nigeria is explained as well as factors leading to this state. Information Technology and its growth in Nigeria are reviewed. The Methodology for creating people’s awareness towards the electoral process in Nigeria is proposed and evaluated. The challenges facing the advancement of Information Technology in the country are enumerated and a conclusion is drawn.
.
Keywords: electoral process, information, Nigeria, Government, Technology.
.
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
34. Paper 24111022: Enchancing And Deriving Actionable Knowledge From Decision Trees (pp. 230-236)
Full Text: PDF

.
P. Senthil Vadivu, HEAD, Department Of Computer Applications, Hindusthan College Of Arts and Science, Coimbatore-641028. Tamil Nadu, India
Dr.(Mrs) Vasantha Kalyani David, Associate Professor, Department of Computer Science, Avinashilingam Deemed University, Coimbatore, Tamil Nadu, India

.
Abstract - Data mining algorithms are used to discover customer models for distribution information, Using customer profiles in customer relationship management (CRM), it has been used in pointing out the customers who are loyal and who are attritors but they require human experts for discovering knowledge manually. Many post processing technique have been introduced that do not suggest action to increase the objective function such as profit. In this paper, a novel algorithm is proposed that suggest actions to change the customer from the undesired status to the desired one. These algorithms can discover cost effective actions to transform customer from undesirable classes to desirable ones. Many tests have been conducted and experimental results have been analyzed in this paper.
.
Keywords : CRM,BSP,ACO, decision trees, attrition
.
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
35. Paper 24111023: Constructing Models For MicroArray Data with Swarm Algorithm (pp. 237-242)
Full Text: PDF

.
Mrs. Aruchamy Rajini, Lecturer in Computer Applications, Hindusthan College of Arts & Science, Coimbatore
Dr.(Mrs) Vasantha Kalyani David, Associate Professor, Department of Computer Science, Avinashilingam Deemed University, Coimbatore, Tamil Nadu, India

.
Abstract - Building a model plays an important role in DNA microarray data. An essential feature of DNA microarray data sets is that the number of input variables (genes) is far greater than the number of samples. As such, most classification schemes employ variable selection or feature selection methods to pre-process DNA microarray data. In this paper Flexible Neural Tree (FNT) model for gene expression profiles classification is done. Based on the predefined instruction/operator sets, a flexible neural tree model can be created and evolved. This framework allows input variables selection, over-layer connections and different activation functions for the various nodes involved. The FNT structure is developed using the Ant Colony Optimization (ACO) and the free parameters embedded in the neural tree are optimized by Particle Swarm Optimization (PSO) algorithm and its enhancement (EPSO). The purpose of this research is to find the model which is an appropriate model for feature selection and tree-based ensemble models that are capable of delivering high performance classification models for microarray data.
.
Keywords --- DNA, FNT, ACO, PSO, EPSO
.
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
36. Paper 24111025: Improved Content Based Image Retrieval Using Color Histogram And Self Organizing Maps (pp. 243-248)
Full Text: PDF

.
R. Priya, HOD I/c, Dept of Computer Science, Sree Narayana Guru College, Coimbatore,India
Dr.(Mrs) Vasantha Kalyani David, Associate Professor, Department of Computer Science, Avinashilingam Deemed University, Coimbatore, Tamil Nadu, India

.
Abstract - Color is a feature of the great majority of content-based image retrieval systems. The conventional color histogram retrieval method is prone to lose the spatial information of colors. This paper proposes two methods; one combines color histograms with spatial information and the second which uses a dimensionality reduction technique that reduces the number of features. The experimental results show that the recall /precision and retrieval time of the proposed method is better than other methods.
.
Keywords – content-based image retrieval, color histogram, spatial information, Self Organizing Map
.
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
37. Paper 30111039: Building an Energy-Efficient Prediction S-MAC Protocol for Wireless Networks (pp. 249-260)
Full Text: PDF

.
Mahmoud Abdel-Aziz El-Sakhawy Othman, Information Technology Sector, Egyptian Financial Supervisory Authority (EFSA).
Prof. Dr. Imane Aly Saroit Ismail, Vice Dean for Education & Student Affairs, Faculty of Computers & Information, Cairo University

.
Abstract—With the rapid development of wireless networking and micro-electro-mechanical systems (MEMS), wireless sensor networks (WSNs) have been immerged. WSNs consist of large amount of small, low-end, resource constrained devices, called sensors. Since sensor nodes are usually intended to be deployed in unattended or even hostile environments, it is almost impossible to recharge or replace their batteries. One of the most important research issues in the wireless sensor networks is to extend the network lifetime by energy efficient battery management. So, there are a lot of approaches that are designed to reduce the power consumption of the wireless sensor nodes. In this paper; a new protocol named "prediction S-MAC protocol" is proposed to reduce the power consumption of the wireless sensor nodes and to improve their performance compared to the previous S-MAC protocols.
.
Keywords - Wireless sensor network; Sensor medium access control (S-MAC) protocol; periodic listen and sleep; adaptive listen, prolong listen, prediction S-MAC protocol.
.
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
38. Paper 30111066: Simulation of Grover’s Algorithm Quantum Search in a Classical Computer (pp. 261-269)
Full Text: PDF

.
A.B. Mutiara, & R. Refianti
Faculty of Computer Science and Information Technology, Gunadarma University, Jl. Margonda Raya No.100, Depok 16464, Indonesia

.
Abstract— The rapid progress of computer science has been accompanied by a corresponding evolution of computation, from classical computation to quantum computation. As quantum computing is on its way to becoming an established discipline of computing science, much effort is being put into the development of new quantum algorithms. One of quantum algorithms is Grover's algorithm, which is used for searching an element in an unstructured list of N elements with quadratic speed-up over classical algorithms. In this work, Quantum Computer Language (QCL) is used to make a Grover's quantum search simulation in a classical computer document.
.
Keywords: Grover’s Algorithm, Quantum Computer Language, Hadamard-Transform
.
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
39. Paper 30111071: Implementation of a new Fuzzy Based Load Balancing Algorithm for Hypercubes (pp. 270-274)
Full Text: PDF

.
Sameena Naaz ,& Afshar Alam, Department of Computer Science, Jamia Hamdard, Hamdard University New Delhi, India
Ranjit Biswas, Institute of Technology and Management, Gurgaon, Haryana

.
Abstract — Distributed computing systems are becoming increasingly available because of the rapid decrease in hardware cost and the advances in computer networking technologies.. It is frequently observed that in a computing environment with a number of hosts connected by a network, the hosts are often loaded differently. In typical distributed system task arrive at the different nodes in random fashion. This causes a situation of non-uniform load across the different nodes. Load imbalance is observed by existence of nodes that are highly loaded while the others are lightly loaded or even idle. Such situation is harmful to the system performance in terms of response time and resource utilization. In the work presented in this paper we have tried to analyze the effect of using fuzzy logic to deal with the problem of load balancing in hypercube model.
.
Keywords - Load Balancing, Fuzzy Logic, Hypercubes, Response Time
.
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
40. Paper 23111017: Towards a better assessment of the durations in PERT Method (pp. 275-281)
Full Text: PDF

.
Nasser Eddine MOUHOUB, Computer science department, Sétif University, Algeria
Hocine BELOUADAH, Computer science department, M'sila University, Algeria
Abdelhak BOUBETRA, Computer science department, Bordj Bou Arréridj University, Algeria

.
Abstract— During many years, two of the most popular approaches to the project management were used. It is about the critical path method (CPM) and the PERT method (Program and Evaluation Review Technique). They were based on modeling by digraphs. CPM is unaware of the stochastic nature of the activities and brings back the model to a deterministic model. PERT holds in account this case but the estimation of the activities is despoiled with several errors. In this paper, this technique is presented. It will be followed by an analysis, criticisms and new proposals to make corrections to this method.
.
Keywords - Critical Path Method (CPM), PERT method, stochastic PERT
.
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
41. Paper 30111041: Network Anomaly Detection and Visualization using Combined PCA and Adaptive Filtering (pp. 282-284)
Full Text: PDF

.
Altyeb Altaher & Sureswaran Ramadass, NAv6 Center of Excellence, Universiti Sains Malaysia USM, 11800 Penang, Malaysia
Noureldien Abdelrahman & Ahmed Khalid, Faculty of Computer Sciences and IT, University of Sciences and Technology, Sudan

.
Abstract - In recent years network anomaly detection has become an important area for both commercial interests as well as academic research. This paper provides a Combined Principal Component Analysis (PCA) and Filtering Technique for efficient and effective detection and identification of network anomalies. The proposed technique consists of two stages to detect anomalies with high accuracy. First, we apply the Principal Components Analysis to transform the data to a new coordinate system such that the projection on the coordinate contains the greatest variance. Second, we filter traffic to separate between the normal and anomalous traffic using adaptive threshold. Our analysis results from network-wide traffic datasets show that our proposed provides high detection rate, with the added advantage of lower complexity.
.
Keywords- Network anomaly detection, principal component analysis , network anomaly visualization, adaptive network traffic filter.
.
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
42. Paper 30111045: A Two Dimensional Approach to Back and Forth Software Process Model (pp. 285-291)
Full Text: PDF

.
Sameera Amjad, Wasi Haider Butt, Farooque Azam
Department of Computer Engineering, College of Electrical & Mechanical Engineering, National University of Science & Technology (NUST), Rawalpindi, Islamabad

.
Abstract— Many software development process models have been documented but none of them gives a detailed methodology for change management. This article proposes a novel software development process model which realizes the inherent nature of requirement changes and provides a methodology to accommodate these changes. A detailed literature survey was conducted to explain the difference of the proposed model with existing software development approaches. The proposed novel model namely, the Back and Forth software process model uses two methods to present the development methodology.
.
Keywords- Software Development Life Cycle; Software Process Models
.
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
43. Paper 30111051: Performance Comparison of Block Truncation Coding based Image Retrieval Techniques using Assorted Color Spaces (pp. 292-297)
Full Text: PDF

.
Dr. H.B. Kekre, Senior Professor, Computer Engg. Dept., MPSTME, SVKM’s NMIMS University, Mumbai, India
Sudeep D.Thepade, Ph.D. Research Scholar & Associate Professor, Computer Engg. Dept. MPSTME, SVKM’s NMIMS University, Mumbai, India
Varun Lodha, Pooja Luthra, Ajoy Joseph, Chitrangada Nemani , B.Tech (IT) Students, MPSTME, SVKM’s NMIMS University, Mumbai, India

.
Abstract— The paper presents exhaustive performance comparison of image retrieval techniques based on block truncation coding (BTC) using assorted color spaces. Including RGB total ten color spaces are considered for applying BTC to extract the feature vector in CBIR techniques. Further the image tiling is added to get three CBIR techniques per color space. In all performance comparison of thirty image retrieval techniques is done with the help of generic image database having 1000 images spread across 11 categories. For each proposed CBIR technique 55 queries (5 per category) are fired on the generic image database. To compare the performance of image retrieval techniques average precision and recall are computed of all queries. The results have shown the performance improvement (higher precision and recall values) with proposed color-BTC methods compared to gray-BTC in all color spaces except ‘rgb’ color space. Image tiling does not help to improve the performance in the chromaticity-luminance based color spaces (Kekre’s LUV, YCbCr, YUV, YIQ, Kekre’s YCgCb), while it helps in non-luminance color spaces (RGB, HSV, XYZ, HIS). Oveall Kekre’s LUV color space based BTC gives best performance in image retrieval.
.
Keywords — CBIR,BTC, Color Space, Image Tiling, VQ,RGB, HSV, XYZ, HIS, rgb, Kekre’s LUV, YCbCr, YUV, YIQ, Kekre’s YCgCb
.
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
44. Paper 30111055: Development of a Project-Based Learning Approach in Requirement Engineering (pp. 298-303)
Full Text: PDF

.
Nor Azliana Akmal Jamaludin, Fakulti Industri Teknologi Maklumat, Universiti Industri Selangor,Kampus Bestari Jaya, Jalan Timur Tambahan, 45600 Bestari Jaya, Selangor, Malaysia.
Shamsul Sahibuddin, Advanced Informatics School, UTM International Campus, Universiti Teknologi Malaysia, Malaysia Jalan Semarak, 54100 Kuala Lumpur Malaysia
Kamaruzaman Jusoff (Corresponding author) Faculty of Forestry, Universiti Putra Malaysia, Serdang 43400, Selangor. Malaysia
Nur Hafizah Hidayat, Fakulti Industri Teknologi Maklumat, Universiti Industri Selangor, Kampus Bestari Jaya, Jalan Timur Tambahan, 45600 Bestari Jaya, Selangor, Malaysia.

.
Abstract— Project failure is due to the lack of Requirement Engineering (RE) practice. The Industry needs to allocate another cost to send their employee for additional training before the employee can contribute to the job specification. It indicates that current practices of delivery mechanisms at the university fail to deliver graduates with employability skills. The objective of this research is to identify weaknesses in current practice of teaching Software Engineering undergraduate in Requirement Engineering. Additionally, this paper emphasized that Project-Based Learning (PjBL) is a right method for delivery mechanisms to enhance Software Engineering undergraduate skills particularly in RE. The PjBL is a superset to Problem-Based Learning, Individual-Collaborative Learning and Product-Based Learning. The intersection can strongly assist in the learning environment. Future work should be carried out to design the framework of PjBL, measuring the effectiveness of PjBL and the electronic Learning eNvironment (eLIN) system as a supportive tools to make PjBL successful.
.
Keywords-Software Engineering education; Project-Based Learning (PjBL); Requirement Engineering; Problem-Based Learning; Individual & Collaborative Problem Solving and Product-Based Learning.)
.
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
45. Paper 30111061: Adaptation of GQM Method for Evaluating the Performance of Software Project Manager (pp. 304-307)
Full Text: PDF

.
Nagy Ramadan Darwish, Department of Computer and Information Sciences, Institute of Statistical Studies and Research, Cairo University Cairo, Egypt
Mahmoud M. Abd Ellatif, Department of Information Systems, Faculty of Computers and Information, Mansoura University Mansoura, Egypt

.
Abstract—This paper is concerned with evaluating the performance of software project manager using Goal Question Metrics (GQM) method. It clarifies the Software Project Management (SPM) domains and the performance metrics of each domain. This paper presents the basic concepts of GQM method. Based on a combination of statistical techniques, this paper presents how to apply GQM method to evaluate the performance of a software project manager. A software company can use the proposed approach to track, evaluate, control, correct, and enhance the performance of software project managers to increase the success rate of software projects.
.
Keywords Software ;Project Manager; Performance; Evaluation - GQM – Metrics – Performance Report
.
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
46. Paper 30111069: Adaptive E-Learning System based on Semantic Web and Fuzzy Clustering (pp. 308-315)
Full Text: PDF

.
Khaled M. Fouad, Computer Science Dep. - Community College - Taif University, Kingdom of Saudi Arabia (KSA)
Mofreh A. Hogo, Computer Science Dep. – Computers and Information Systems College - Taif University, Kingdom of Saudi Arabia (KSA).
Shehab Gamalel-Din, Computers Dept, Faculty of Science, King Abdul-Aziz University, Kingdom of Saudi Arabia (KSA)
Nagdy M. Nagdy, Systems and Computers Engineering Dep. – Faculty of Engineering – AlAzhar University, Egypt.

.
Abstract— This work aims at developing an adaptive e-learning system with high performance to reduce the challenges faces elearners, the instructors and provides a good monitoring system for the complete e-learning systems as well as the system structure. The work presents the different phases for the system development of the adaptive system as: the first stage is the collection of the e-learners documents, the second stag is the documents representation including the frequency count and the weighting of the documents with its frequencies, the third stage is the prediction and clustering of e-learners interests using the fuzzy clustering method and the statistical K-means clustering method. The results obtained from this work shows that we have to have different e-learners ontologies using the results of the clustering methods which reflect the e-learners interests. Finally the work concluded the suggestions as well as the recommendations for the instructors and the systems administrators.
.
Keywords-component; E-Learning; Semantic Web; Fuzzy Clustering; User model; User Model Representation
.
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
47. Paper 30111072: An Innovated Server-Based Desktop Sharing Platform (pp. 316-324)
Full Text: PDF

.
Ayad H. Abdulqader, Salah Noori Saleh, Omar Amer Abouabdalla, Sureswaran Ramadas, National Advance IPv6 Centre of Excellence (NAv6), USM, 11800 Penang, Malaysia
Hasan S. M. Al-Khaffaf, School of Computer Science, USM, 11800 Penang, Malaysia

.
Abstract - In this paper, a server-based Desktop Sharing Platform (DSP) is proposed. The proposed platform is designed to work with any direct-connection Remote Desktop System (RDS) without modifying or adding any extra models to those systems for both server’s and clients’ sides. The existing RDS systems’ limitations in terms of bandwidth consumption, collaboration session initiation, and connectivity issues will be overcome by adopting the proposed platform. The proposed platform is easily adapted to work with any direct-connection RDS system. Incorporating the proposed platform will improve the performance and efficiency of existing RDS systems. As a result, better utilization of computer system resources in terms of bandwidth and processing power is achieved by minimizing the data transfer and processing power from n users to only one user.
.
Keywords- Computer Supported Cooperative Work; Remote Display System; Thin-Client Computing
.
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
48. Paper 30111073: Design of Hybrid Ontologies for Mediation System Applied to the E-learning Platform (pp. 325-329)
Full Text: PDF

.
Otman ABDOUN, Laboratory LIST,ERIT, FST – Tangier, Tangier, Morocco
Jaber EL BOUHDIDI, Laboratory LIST, FST – Tangier, Tangier, Morocco
Mohamed GHAILANI, Laboratory LIST, FST – Tangier, Tangier, Morocco
Abdelhadi FENNAN, Laboratory LIST, FST – Tangier, Tangier, Morocco

.
Abstract—This work falls within the scope of E-learning is important for several reasons. First, resources are structured (educational needs) and therefore easier to annotate. Second, there is a curriculum (or Education Plan) that ensures the semantic integration of resources. Third, services are available to the teacher and learner. And finally, post evaluation of knowledge acquired by the learner, to verify the adequacy of resources presented to the learner, and indirectly the appropriateness of teaching strategies implemented to follow up resources and services. First of all, it describes the problems of integrating multiple sources of educational and placed in the ontology integration process, then treated mediation services, and their contribution on an E-learning platform.
.
Keywords- E-learning; Mediation Services; Hybrid Ontologies
.
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
49. Paper 30111074: Extracting Membership Functions Using ACS Method via Multiple Minimum Supports (pp. 330-336)
Full Text: PDF

.
Ehsan Vejdani Mahmoudi, Islamic Azad University, Mashhad Branch, Young Researchers Club, Mashhad, Iran
Masood Niazi Torshiz, Department of computer Engineering, Islamic Azad University - Mashhad Branch, Mashhad, Iran
Mehrdad Jalali, Department of computer Engineering, Islamic Azad University - Mashhad Branch, Mashhad, Iran

.
Abstract— Ant Colony Systems (ACS) have been successfully applied to different optimization issues in recent years. However, only few works have been done by employing ACS method to data mining. This paper addresses the lack of investigations on this study by proposing an ACS -based algorithm to extract membership functions in fuzzy data mining. In this paper, the membership functions were encoded into binary bits, and then they have given to the ACS method to discover the optimum set of membership functions. By considering this approach, a comprehensive exploration can be executed to implement the system automation. Therefore, it is a new frontier, since the proposed model does not require any user-specified threshold of minimum support. Hence, we evaluated our approach experimentally and could reveal this approach by significant improving of membership functions.
.
Keywords- fuzzy data mining; multiple minimum supports; association rule; membership functions; ant colony system.
.
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
50. Paper 31101085: Enhancing K-Means Algorithm with Semi-Unsupervised Centroid Selection Method (pp. 337-343)
Full Text: PDF

.
R. Shanmugasundaram and Dr. S. Sukumaran
.
Abstract— The k-means algorithm is one of the frequently used clustering methods in data mining, due to its performance in clustering massive data sets. The final clustering result of the kmeans clustering algorithm is based on the correctness of the initial centroids, which are selected randomly. The original k-means algorithm converges to local minimum, not the global optimum. The k-means clustering performance can be enhanced if the initial cluster centers are found. To find the initial cluster centers a series of procedure is performed. Data in a cell is partitioned using a cutting plane that divides cell in two smaller cells. The plane is perpendicular to the data axis with very high variance and is intended to minimize the sum squared errors of the two cells as much as possible, while at the same time keep the two cells far apart as possible. Cells are partitioned one at a time until the number of cells equals to the predefined number of clusters, K. The centers of the K cells become the initial cluster centers for K-means. In this paper, an efficient method for computing initial centroids is proposed. A Semi Unsupervised Centroid Selection Method is used to compute the initial centroids. Gene dataset is used to experiment the proposed approach of data clustering using initial centroids. The experimental results illustrate that the proposed method is vey much apt for the gene clustering applications.
.
Index Terms— Clustering algorithm, K-means algorithm, Data partitioning, initial cluster centers, semi-unsupervised gene selection
.
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
51. Paper 31101086: A Survey on Static Power Optimization in VLSI (pp. 344-349)
Full Text: PDF

.
A. Janaki Rani and Dr. S. Malarkkan
.
Abstract---Power has become one of the primary constraints for both the high performance and portable system design. The growing market of battery powered electronic systems like cellular phones, personal digital assistants demands the design of microelectronic circuits with low power consumption. Power dissipation in these systems may be divided into two major components namely static and dynamic power dissipation. The static power is the standby power that is wasted even if the device is not performing any function. As technology scales down the static power dissipation is dominant in VLSI circuits which are mainly due to leakage current in transistors. Hence a focus is necessary on the leakage currents. These leakage currents are mainly due to sub-threshold leakage and gate oxide leakage. The sub-threshold leakage is dominant which can be minimized by reducing the supply voltage, reducing the transistor size, decreasing the temperature and increasing the threshold voltage. In this paper a survey is presented on static power optimization in VLSI. It presents the possible solutions to reduce the leakage power in various digital logic circuits like CMOS, I2C etc.
.
Index Terms—Leakage, Low-Power, Power Gating, Semicustom, Input Vector Control, Body Bias Control, Sleep Transistor Sizing, Sleepy Stack, Zigzag Power Gating (ZPG)

---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
52. Paper 31101087: A Survey on Minimizing Energy Consumption of VLSI Processors Using Multiple Supply Voltages (pp. 350-355)
Full Text: PDF

.
B. Sathiyabama and Dr. S. Malarkkan
.
Abstract—Due to the continuous increase in earth's population, adequate supply of resources is going to be a major issue. One basic essential resource in rising demand is energy and in particular electrical energy. The contributions of the scientific community toward the goal of sustainability with regard to energy consumption of embedded systems are previously discussed in many research works. Low power has become one of the major design issues due to the increased demand in personal computing devices and portable communication system. In this paper a survey on minimizing energy consumption of VLSI Processors using multiple supply voltages is presented. This survey discusses on search method for a scheduling and module selection problem using multiple supply voltages so as to minimize dynamic energy consumption under time and area constraints. The algorithm based on a genetic algorithm is surveyed to find near-optimal solutions in a short time for large-size problems. The literature related to the multiple supply voltages with genetic approach and energy consumption minimization in various VLSI systems is presented.
.
Keywords— Energy minimization, Functional pipelining, Multiple supply voltages, dynamic power, scheduling


---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
53. Paper 26111028: System Integration for Smart Paperless Ship (pp. 356-364)
Full Text: PDF

.
O. Sulaiman, A.H. Saharuddin, Faculty of Maritime Studies and Marine Science, Univeristy Malaysia Terengganu, Kuala Terengganu, Malaysia
A.B.S. Kader, Faculty of Mechanical -Marine Technology, University Technology Malaysia, Kuala Terengganu, Malaysia

.
Abstract— Sea Transportation provides a safe and reliable source for moving people and cargo across the ocean. The government and private sector provide these services, while the Government moves personnel and cargo to support global peacekeeping activities while the civilian sea transportation activities focus on providing leisure cruises and the shipment of consumer goods. These safe and efficient services are obtained through the cooperative efforts of the government and civilian sea carriers, and seaports throughout the world required connectivity raging from within ship system integration and ship sore operation, which has been much facilitated by evolution of computer age. The use of the use of new information technology and interfacing all the associated service areas of maritime industry- sea and shore has lead to reducing papers and hence cutting of threes and beneficial environmental benefit of excess water absorption and greater capture of carbon dioxide. Human race has achieved much civilization and development in recent years until it seem as development is closed to the peak. However, new philosophy under are being promoted in recent years include proactive behaviors, recycling, system integration and conservation to make all what has been built meaningful and efficient. This paper discuss how system integration under smart ship concept within ship and shore.
.
Keywords- sytem integration, paperless, ship, elecronics waste

 ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

.---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Comments