Vol. 9 No. 10 OCT 2011

Vol. 9 No. 10 October 2011 International Journal of Computer Science and Information Security
Publication October 2011, Volume 9 No. 10 (Download Full Journal) (Archive) (Download 2)

.
Copyright © IJCSIS. This is an open access journal distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

 1. Paper 29091118: PAPR Performance Analysis of DFT-spread OFDM for LTE Uplink Transmission (pp 1-7)
Full Text: PDF

.
Bader Hamad Alhasson, Department of Electrical and Computer Engineering, University of Denver, Denver, USA
Mohammad A. Matin, Department of Electrical and Computer Engineering, University of Denver, Denver, USA

.
Abstract — 3rd Generation Partnership Project (3GPP) LTE has adopted SC-FDMA as the uplink multiple access scheme which use single carrier modulation and frequency domain equalization. In this paper, we show that the PAPR performance of DFT-spreading technique with IFDMA can be significantly improved by varying the roll-off factor from 0 to 1 of the RC (Raised-Cosine) filter for pulse shaping after IFFT. Our PAPR reduction is 30% of DFT with IFDMA utilizing QPSK and varying the roll-off factor. We show pulse shaping does not affect LFDMA as much as it affects IFDMA. Therefore, IFDMA has an important trade-off relationship between excess bandwidth and PAPR performance since excess bandwidth increases as the roll-off factor increases. Our simulation indicates that the performance of PAPR of DFT spreading technique is dependent on the number of subcarriers assigned to each user. The effect of PAPR dependency on the method used to assign the subcarriers to each terminal is also simulated.
.
Index terms— Long-term-evolution (LTE); Discrete Fourier Transform (DFT); Orthogonal frequency division multiplexing (OFDM);Localized-frequency-division-multiple-access (LFDMA);Interleaved-frequency-division-multiple-access (IFDMA); peak-to-average power ratio (PAPR); single carrier frequency division multiple access (SC-FDMA).
.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

2. Paper 29091116: Effect of Curvature on the Performance of Cylindrical Microstrip Printed Antenna for TM01 mode Using Two Different Substrates (pp. 8-16)
Full Text: PDF

.
Ali Elrashidi, Department of Computer and Electrical Engineering, University of Bridgeport, Bridgeport, CT, USA
Khaled Elleithy, Department of Computer and Electrical Engineering, University of Bridgeport, Bridgeport, CT, USA
Hassan Bajwa, Department of Electrical Engineering, University of Bridgeport, Bridgeport, CT, USA

.
Abstract — Curvature has a great effect on fringing field of a microstrip antenna and consequently fringing field affects effective dielectric constant and then all antenna parameters. A new mathematical model for input impedance, return loss, voltage standing wave ratio and electric and magnetic fields is introduced in this paper. These parameters are given for TM01 mode and using two different substrate materials RT/duroid-5880 PTFE and K-6098 Teflon/Glass. Experimental results for RT/duroid-5880 PTFE substrate are also introduced to validate the new model.
.
Keywords: Fringing field, Curvature, effective dielectric constant and Return loss (S11), Voltage Standing Wave Ratio (VSWR), Transverse Magnetic TM01 mode.
.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
3. Paper 31011181: A Password-Based authentication and Key Agreement Protocol for Wireless LAN Based on Elliptic Curve and Digital Signature (pp. 17-21)
Full Text: PDF

.
Saed Rezayi, Department of Electrical Engineering, Amir kabir University of Tehran, Tehran, Iran
Mona Sotoodeh, Department of Applied Mathematics, Science and Research Azad University, Tehran, Iran
Hojjat Esmaili, Department of Computer Engineering, Sharif University of Tehran

.
Abstract — Password-based authentication protocols are the strongest among all methods which has been proposed through the period that wireless networks have been rapidly growing, and no perfect scheme has been provided for this sensitive technology. The biggest drawback of strong password protocols is IPR (Intellectual Properties Right); hence they have not become standard; SPEKE, SRP, Snapi and AuthA for instance. In this paper we propose a user-friendly, easy to deploy and PKI-free protocol to provide authentication in WLAN. We utilize elliptic curve and digital signature to improve AMP (Authentication via Memorable Password) and apply it for wireless networks as AMP is not patented and strong enough to secure WLAN against almost all possible known attacks.
.
Keywords—WLAN, Password-Based Authentication, AMP, Elliptic Curve, Digital Signature.

.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
4. Paper 30091160: Computer Based Information System Functions for Decision Makers in Organizations (pp. 22-29)
Full Text: PDF

.
Mohammed Suliman Al-Shakkah, School of Computing, College of Arts and Sciences, University Utara Malaysia, UUM, 06010 UUM-Sintok, Kedah, Malaysia
Wan Rozaini Sheik Osman, School of Computing, College of Arts and Sciences, University Utara Malaysia, UUM, 06010 UUM-Sintok, Kedah, Malaysia

.
Abstract — Computer Based Information System (CBIS) was discussed by many scholars. In this paper a review was conducted for the CBIS types from different point views scholars. CBIS is important for decision makers (managers) to make decisions at their different levels. Eighteen managers from five organizations were interviewed with structural interviews. The findings showed that only six managers with 33% only are using CBIS in decision making process (DMP). Thus, this indicates the need for future research in Jordan to find out, why CBIS is still not fully adopted by decision makers.
.
Keywords - Computer Based Information System, CBIS, Components, Types, Decision making, Manager, Interview.
.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
5. Paper 30091144: An Immune Inspired Multilayer IDS (pp. 30-39)
Full Text: PDF

.
Mafaz Muhsin Khalil Alanezi, Computer Sciences, College of Computer Sciences and Mathematics, Iraq, Mosul, Mosul University
Najlaa Badie Aldabagh, Computer Sciences, College of Computer Sciences and Mathematics, Iraq, Mosul, Mosul University

.
Abstract — The use of artificial immune systems in intrusion detection is an appealing concept for two reasons. Firstly, the human immune system provides the human body with a high level of protection from invading pathogens, in a robust, selforganized and distributed manner. Secondly, current techniques used in computer security are not able to cope with the dynamic and increasingly complex nature of computer systems and their security. The objective of our system is to combine several immunological metaphors in order to develop a forbidding IDS. The inspiration come from: (1) Adaptive immunity which is characterized by learning, adaptability, and memory and is broadly divided into two branches: humoral and cellular immunity. And (2) The analogy of the human immune systems multilevel defense could be extended further to the intrusion detection system itself. This is also the objective of intrusion detection which need multiple detection mechanisms to obtain a very high detection rate with a very low false alarm rate.
.
Keywords: Artificial Immune System (AIS); Clonal Selection Algorithm (CLONA); Immune Complement Algorithm (ICA); Negative Selection (NS); Positive Selection (PS); NSl-KDD dataset.
.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
6. Paper 30091123: UML Model of Deeper Meaning Natural Language Translation System using Conceptual Dependency Based Internal Representation (pp. 40-46)
Full Text: PDF

.
Sandhia Valsala, Dr Minerva Bunagan, Roger Reyes
College of Computer Studies, AMA International University, Salmabad, Kingdom of Bahrain

.
Abstract — Translation from one language to another language involves many mechanical rules or statistical inferences. Statistical inference based translations lack any depth or logical basis for the translation. For a deeper meaning translation to be performed using only the mechanical rules are not sufficient. There is a need to extract suggestions from common world knowledge and cultural knowledge. These suggestions can be used to fine tune or may be even reject the possible candidate sentences. This research presents a software design for a translation system that will examine sentences based on the syntax rules of the natural language. It will then construct an internal representation to store this knowledge. It can then annotate and fine tune the translation process by using the previously stored world knowledge.
.
Keywords: Natural language, Translation, Conceptual Dependency, Unified Modeling Language (UML)

.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
7. Paper 29091119: Monitoring Software Product Process Metrics (pp. 47-50)
Full Text: PDF

.
Zahra Gholami, Department of Software Engineering, North Tehran Branch - Islamic Azad, Tehran, Iran
Nasser Modiri, Department of Software Engineering, Zanjan Branch - Islamic Azad, Zanjan, Iran
Sam Jabbedari, Department of Software Engineering, North Tehran Branch - Islamic Azad, Tehran, Iran

.
Abstract — Software quality is an important criterion in producing softwares which increases productivity and results in powerful and invincible softwares. We can say that quality assurance is the main principle and plan in software production. One of the most important challenges in Software Engineering is lack of software metrics for monitoring and measurement of software life cycle phases which causes low quality and usefulness of software products. Considering the importance of software metrics, utilization of international standard software life cycle process model (ISO/IEC 12207) and measurement process of Plan/Do/Check/Act in order to monitor software production cycle is presented in this paper.
.
Keywords- Software Metrics, Measurement, Software Product Process, ISO/IEC 12207
.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
8. Paper 25091108: Designing a Comprehensive Model for Evaluating SOA-based Services Maintainability (pp. 51-57)
Full Text: PDF
.
Maryam Zarrin, Computer Engineering Department, Science & Research Branch of Islamic Azad University, Tehran, Iran
Mir Ali Seyyedi, Computer Engineering Department, Islamic Azad University, Tehran-south branch, Tehran, Iran
Mehran Mohsenzaeh, Computer Engineering Department, Science & Research Branch of Islamic Azad University, Tehran, Iran

.
Abstract - The aim of this paper is to propose a comprehensive and practical model to evaluate the maintainability of software services in service-oriented architecture in the entire service lifecycle and based on the fuzzy system. This model provides the possibility of making decisions concerning the maintainability of SOA-based services for service managers and owners in various service operation and design phases. The proposed maintainability evaluation model consists of five sections: input, analysis, measurement, decision making and output. According to the studies conducted on the leading article, the service structural properties in design phase as well as service management mechanism structures at the operation phase have been identified as effective factors in evaluating the maintainability of services. So the proposed model investigates both discussed factors and is generally categorized in two sections: design and operation. To assess maintainability in both sections, the fuzzy technique is used.
.
Keywords- maintainability; service-oriented; evaluation model; fuzzy system
.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
9. Paper 18091103: The SVM Based Interactive tool for Predicting Phishing Websites (pp. 58-66)
Full Text: PDF

.
Santhana Lakshmi V, Research Scholar, PSGR Krishnammal College for Women, Coimbatore, Tamilnadu.
Vijaya MS, Associate Professor,Department of Computer Science, GRG School of Applied Computer Technology, Coimbatore, Tamilnadu

.
Abstract — Phishing is a form of social engineering in which attackers endeavor to fraudulently retrieve the legitimate user’s confidential or sensitive credentials by imitating electronic communications from a trustworthy or public organization in an automated fashion. Such communications are done through email or deceitful website that in turn collects the credentials without the knowledge of the users. Phishing website is a mock website whose look and feel is almost identical to the legitimate website. So internet users expose their data expecting that these websites come from trusted financial institutions. Several antiphishing methods have been introduced to prevent people from becoming a victim to these types of phishing attacks. Regardless of the efforts taken, the phishing attacks are not alleviated. Hence it is more essential to detect the phishing websites in order to preserve the valuable data. This paper demonstrates the modeling of phishing website detection problem as binary classification task and provides convenient solution based on support vector machine, a pattern classification algorithm. The phishing website detection model is generated by learning the features that have been extracted from phishing and legitimate websites. A third party service called ‘blacklist’ is used as one of the feature that helps to envisage the phishing website effectively. Various experiments have been carried out and the performance analysis shows that the SVM based model outperforms well.
.
Keywords - Antiphishing, Blacklist, Classification, Machine Learning, Phishing, Prediction
.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
10. Paper 18091104: Color-Base Skin Detection using Hybrid Neural Network & Genetic Algorithm for Real Times (pp. 67-71)
Full Text: PDF

.
Hamideh Zolfaghari, Azam Sabbagh Nekonam, Javad Haddadnia
Department of Electronic Engineering, Sabzevar Tarbeyat Moallem University, Sabzevar, Iran

.
Abstract —This paper present a novel method of human skin detection base on hybrid neural network(NN) and genetic algorithm(GA) and is compared to NN & PSO and other method .The back propagation neural network has been used as classifier that its input are image pixels H,S and V features. In order to optimization the NN weight, the GA and PSO have been used. Dataset that has been used in this paper consists of 200 thousands skin and non-skin pixel that has been produced in HSV colorspace. Result efficiency is 98.825% (accurate of correct identification) that is comparable to the other former methods. The advantage of this method is high rate and accuracy to identify skin in 2-dimentional images. Thus can use this method in real times. We compare accuracy and rate of the proposed method with the other known methods for show Verity of this work.
.
Keywords- Hybrid NN& GA; Genetic Algorithm; PSO; HSV color-space; Back propagation
.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
11. Paper 18091105: Hand Geometry Identification Based On Multiple-Class Association Rules (pp 72-77)
Full Text: PDF

.
A. S. Abohamama, O. Nomir, and M. Z. Rashad
Department of Computer Sciences, Mansoura University, Mansoura, Egypt

.
Abstract - Hand geometry has long been widely used for biometric verification and identification because of its user acceptance, its good verification, and its identification performance. In this paper, a biometric system is presented for controlled access using hand geometry. It presents a new approach based on multiple-class association rules (CMAR) for classification. The system automatically extracts a minimal set of features which uniquely identify each single hand. CMAR is used to build the identification system’s classifier. During identification, the hands that have features closer to a query hand are found and presented to the user. Experimental results using a database consists of 400 hand images from 40 individuals are encouraging. The proposed system is robust, and a good identification result has been achieved.
.
Keywords: Biometric systems; Hand Geometry; CMAR; Classification.
.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
12. Paper 28091113: Survey on Web Usage Mining: Pattern Discovery and Applications (pp. 78-83)
Full Text: PDF

.
C. Thangamani, Research Scholar, Mother Teresa Women’s University, Kodaikanal
Dr. P. Thangaraj, Prof. & Head, Department of computer Science & Engineering, Bannari Amman Institute of Technology, Sathy

.
Abstract -- The past decade is described by an unexpected development of the Web both in the quantity of Web sites and in the quantity of the accessing users. This enlargement generated huge quantities of data related to the user interaction with the Web sites, recorded in Web log files. In addition, the Web sites holders uttered the requirement to recognize their visitors in an effective way so as to provide them web sites with satisfaction. The Web Usage Mining (WUM) is developed in recent years in order to discover knowledge from databases. WUM consists of three phases: the preprocessing of raw data, the discovery of schemas and the analysis of results. A WUM technique gathers usage behavior from the Web usage data. Large amount of web usage data makes difficulty in analyzing those data. When applied to large quantity of data, the existing techniques of data mining, usually, results in unsatisfactory outcome by means of behaviors of the Web sites' users. This paper focuses on analyzing the various web usage mining techniques. This analysis will help the researchers to develop a better technique for web usage mining.
.
Keywords--- Web Usage Mining, World Wide Web, Pattern Discovery, Data Cleaning
.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
13. Paper 29091114: A Comprehensive Comparison of the Performance of Fractional Coefficients of Image Transforms for Palm Print Recognition (pp. 84-89)
Full Text: PDF

.
Dr. H. B. Kekre, Sr. Professor, MPSTME, SVKM’s NMIMS (Deemed-to-be University, Vileparle(W), Mumbai-56, India.
Dr. Tanuja K. Sarode, Asst. Professor, Thadomal Shahani Engg. College, Bandra (W), Mumbai-50, India.
Aditya A. Tirodkar, B.E. (Comps) Student, Thadomal Shahani Engg. College, Bandra (W), Mumbai-50, India
.
Abstract - Image Transforms have the ability to compress images into forms that are much more conducive for the purpose of image recognition. Palm Print Recognition is an area where the usage of such techniques would be extremely conducive due to the prominence of important recognition characteristics such as ridges and lines. Our paper applies the Discrete Cosine Transform, the Eigen Vector Transform, the Haar Transform, the Slant Transform, the Hartley Transform, the Kekre Transform and the Walsh Transform on a two sets of 4000 Palm Print images and checks the accuracy of obtaining the correct match between both the sets. On obtaining Fractional Coefficients, it was found that for the D.C.T., Haar, Walsh and Eigen Transform the accuracy was over 94%. The Slant, Hartley and Kekre transform required a different processing of fractional coefficients and resulted with maximum accuracies of 88%, 94% and 89% respectively.
.
Keywords: Palm Print, Walsh, Haar, DCT, Hartley, Slant, Kekre, Eigen Vector, Image Transform
.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
14. Paper 30081133: Secured Dynamic Source Routing (SDSR) Protocol for Mobile Ad-hoc Networks (pp. 90-93)
Full Text: PDF

.
Dr. S. Santhosh Baboo, Reader, PG & Research Dept. of Computer Applications, D.G.Vaishnav College, Chennai, India
S. Ramesh, Research Scholar, Dravidian University, Kuppam, Andra Pradesh, India

.
Abstract — A mobile ad hoc network (MANET) is a collection of wireless mobile nodes dynamically shaping a provisional network devoid of the use of any existing network infrastructure or centralized management. In MANETs, security is the major challenge due to the dynamic topology which is because of the mobility of the nodes. In this paper, we propose to design and develop a secure methodology incorporated with the routing mechanism without having any compromise on the performance metrics viz., throughput, and packet delivery fraction. Not only just improving the throughput and packet delivery fraction it will also reduce the end-to-end delay and MAC overhead along with reduced packet loss. We name it as Secured-Dynamic Source Routing (SDSR) protocol. It adopts several features of the already existing protocol named Dynamic Source Routing (DSR). The simulation results prove that our proposed protocol SDSR outperforms DSR in all performance aspects.
.
Keywords:
.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
15. Paper 30091126: Symbian ‘vulnerability’ and Mobile Threats (pp. 94-97)
Full Text: PDF

.
Wajeb Gharibi, Head of Computer Engineering &Networks Department, Computer Science & Information Systems College, Jazan University, Jazan 82822-6694, Kingdom of Saudi Arabia
.
Abstract - Modern technologies are becoming ever more integrated with each other. Mobile phones are becoming increasing intelligent, and handsets are growing ever more like computers in functionality. We are entering a new era - the age of smart houses, global advanced networks which encompass a wide range of devices, all of them exchanging data with each other. Such trends clearly open new horizons to malicious users, and the potential threats are self evident. In this paper, we study and discuss one of the most famous mobile operating systems “Symbia” its vulnerabilities and recommended protection technologies.
.
Keywords: Information Security, Cyber Threats, Mobile Threats, Symbian Operating System.
.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
16. Paper 30091145: Vertical Vs Horizontal Partition: In Depth (pp. 98-101)
Full Text: PDF

.
Tejaswini Apte, Sinhgad Institute of Business, Administration and Research, Kondhwa(BK), Pune-411048
Dr. Maya Ingle, Dr. A.K.Goyal, Devi Ahilya VishwaVidyalay, Indore

.
Abstract - For the write-intensive operations and predictable behavior of queries, the traditional database system have optimize performance considerations. With the growing data in database and unpredictable nature of queries, write optimize system are proven to be poorly designed. Recently, the interest in architectures that optimize read performance by using Vertically Partitioned data representation has been renewed. In this paper, we identify the components affecting the performance of Horizontal and Vertical Partition, with the analysis. Our study focusing on tables with different data characteristics and complex queries. We show that carefully designed Vertical Partition may outperform carefully designed Horizontal Partition, sometimes by an order of magnitude.
.
General Terms: Algorithms, Performance, Design
Keywords: Vertical Partition, Selectivity, Compression, Horizontal Partition

.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
17. Paper 30091127: Framework for Query Optimization (pp. 102-106)
Full Text: PDF

.
Pawan Meena, Arun Jhapate, Parmalik Kumar
Department of Computer Science and Engineering, Patel college of science & Technology, Bhopal, M.P, India

.
Abstract - Modern database systems use a query optimizer to identify the most efficient strategy, called “plan”, to execute declarative SQL queries. Optimization is much more than transformations and query equivalence. The infrastructure for optimization is significant. Designing effective and correct SQL transformations is hard. Optimization is a mandatory exercise since the difference between the cost of the best plan and a random choice could be in orders of magnitude. The role of query optimizers is especially critical for the decision-support queries featured in data warehousing and data mining applications. This paper presented an abstraction of the architecture of a query optimizer and focused on the techniques currently used by most commercial systems for its various modules. In addition, provide technical constraint of advanced issues in query optimization.
.
Keywords: Query optimizer ,Operator tree, Query analyzer, Query optimization
.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
18. Paper 30091158: A New Improved Algorithm for Distributed Databases (pp. 107-112)
Full Text: PDF

.
K. Karpagam, Assistant Professor, Dept of Computer Science, H.H. The Rajah’s College (Autonomous),
(Affiliated to Bharathidasan University, Tiruchirappalli), Pudukkottai, Tamil Nadu, India.
Dr. R. Balasubramanian, Dean, Faculty of Computer Applications, EBET Knowledge Park, Tirupur, Tamil Nadu, India.

.
Abstract — The development of web, data stores from disparate sources has contributed to the growth of very large data sources and distributed systems. Large amounts of data are stored in distributed databases, since it is difficult to store these data in single place on account of communication, efficiency and security. Researches on mining association rules in distributed databases have more relevance in today’s world. Recently, as the need to mine patterns across distributed databases has grown, Distributed Association Rule Mining algorithms have gained importance. Research was conducted on mining association rules in the distributed database system and classical Apriori algorithm was extended based on transactional database system. The Association Rule mining and extraction of data in distributed sources combined with the obstacles involved in creating and maintaining central repositories motivates the need for effective distributed information extraction and mining techniques. We present a new distributed association rule mining algorithm for distributed databases (NIADD). Theoretical analysis reveals a minimal error probability than a sequential algorithm. Unlike existing algorithms, NIADD requires neither knowledge of a global schema nor that the distribution of data in the databases.
.
Keywords- Distributed Data Mining, Distributed Association Rules
.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
19. Paper 30091159: Data mining applications in modeling Transshipment delays of Cargo ships (pp. 113-117)
Full Text: PDF

.
P. Oliver jayaprakash, Ph.D student, Division of Transportation engg, Dept. of Civil engineering, Anna University, Chennai, Tamilnadu, India
Dr. K. Gunasekaran, Associate Professor, Division of Transportation engg., Dept. of Civil engineering, Anna University, Chennai, Tamilnadu, India
Dr. S. Muralidharan, Professor, Dept. of EEE, Mepco schlenk engineering college, Sivakasi, Tamilnadu, India.

.
Abstract — The Data mining methods have a plenty of applications in various fields of engineering. The present application area is the Port operations and management. Conventionally port performance was assessed by the ship turnaround time, a marker of cargo handling efficiency. It is a time used up at port for transshipment of cargo and servicing. During the transshipment and servicing, delays were inevitable and occur predominantly; The major delay happening at port was due to the non-availability of trucks for evacuation of cargo from port wharf to the warehouses. Hence, modeling the delay occurrences in port operations had to be done, so as to control the ship’s turnaround time at the port to prevent additional demurrage charges. The objective of this paper was to study the variety of delays caused during the port processes and to model it using Data mining techniques.
.
Keywords; Data mining techniques, Transshipment delays, Shunt trucks, Artificial neural network, Nonlinear analysis.
.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
20. Paper 30091162: A Dynamic Approach For The Software Quality Enhancement In Software Houses Through Feedback System (pp. 118-122)
Full Text: PDF

.
Fakeeha Fatima, Tasleem Mustafa, Ahsan Raza Sattar, Muhammad Inayat Khan, and Waseeq-Ul-Islam Zafar
University OF Agriculture Faisalabad, Pakistan

.
Abstract - Software systems are mainly changed due to changing requirements and technology which often lead to modification of software systems. In this paper dynamic approach through feedback mechanism is used to enhance the quality of the software in software houses. It involves the continual process of updating and enhancing given software by releasing new versions. These releases provide the customer with improved and error-free versions. To enhance quality VEMP (view, evaluate, maintain, performance) mechanism applied on the results gathered through feedback mechanism. By using this approach it improves overall software quality, reduce software costs, release on time and deliver software with fewer defects and get higher performance.
.
Keywords: Software quality, Customer Feedback, User Satisfaction, Software Quality Assurance, Dynamic Updation, Software Houses.
.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
21. Paper 31081145: A Secured Chat System With Authentication Technique As RSA Digital Signature (pp. 123-130)
Full Text: PDF

.
Oyinloye O.Elohor, Ogemuno Emamuzo
Computer and Information system Achievers University, Achievers University, AUO, Owo, Ondo state, Nigeria.
Akinbohun Folake, Department of Computer Science, Owo Rufus Giwa Polythenic, Owo, Ondo, Nigeria.
Ayodeji .I. Fasiku, Department of Computer Science, Federal University of Technology, Akure, Nigeria.

.
Abstract - Over the years chat system which is an application or tool used for communicating between two or more persons over a network, has been faced with issues of security, data integrity and confidentiality of information/data, the attacks include social engineering or poisoned URL (universal resource locator). An effective attack using a poisoned URL may affect lots of users within a short period of time, since each user is regarded as a trusted user, other are plain text attack which makes communication vulnerable to eavesdropping, instant messaging client software often requires users to expose open user datagram protocol ports increasing the threat posed. The purpose of this research is to develop a secured chat system environment using Digital Signature, the digital signature is used to establish a secure communication channel, providing an improved secured technique for authentication of chat communication.
.
Keywords - Secure Chat System, RSA, Public modulus, public exponent, Private exponent, Private modulus, digital Signing, Verification, Communication Instant Messengers (IM)
.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
22. Paper 30091147: Motor Imagery for Mouse Automation and Control (pp. 131-134)
Full Text: PDF

.

Bedi Rajneesh Kaur, Dept. of computer engineering, MIT COE, Pune, India, 411038
Bhor Rohan Tatyaba, Dept. of computer engineering, MIT COE, Pune, India, 411038
Kad Reshma Hanumant, Dept. of computer engineering, MIT COE,Pune, India, 411038
Katariya Payal Jawahar, Dept. of computer engineering, MIT COE, Pune, India, 411038
Gove Nitinkumar Rajendra, Dept. of computer engineering, MIT COE, Pune, India, 411038

.
Abstract — A brain-computer interface (BCI) basically transforms the brain’s electrical activity into commands that can be used to control devices such as robotic arms, pianos and other devices. With this, BCI provides a non-muscular communication channel, which can be used to help people with highly compromised motor abilities or functions. Mental imagery is the mental rehearsal of actions without overt execution. A study of motor imagery can help us to develop better neuroprosthetic systems. In this paper, we describe general concepts about motor imagery and other aspects associated with it. Recent researches in this field, has employed motor imagery in normal and brain-damaged subjects to understand the content and structure of covert processes that occur before execution of action. Finally, we propose a new system “μMAC”, which will automate and control basic mouse operations using motor imagery.
.
Keywords- Mu waves, Motor imagery, EEG, Neuroprosthesis, BCI, Mouse Control.
.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
23. Paper 31081169: Policy Verification, Validation and Troubleshooting In Distributed Firewalls (pp. 135-137)
Full Text: PDF

.
P. Senthilkumar, Computer Science & Engineering, Affiliated to Anna University of Technology, Coimbatore, Tamilnadu, India
Dr. S. Arumugam, CEO, Nandha Engineering College, Erode, Tamilnadu, India

.
Abstract — The Internet is one of the largest engineered systems ever deployed, has become a crucial technology for our society. It has changed the way people perform many of their daily activities from both a personal perspective and a business perspective. Unfortunately, there are risks involved when one uses the Internet. These risks coupled with advanced and evolving attack techniques place heavy burdens on security researchers and practitioners while trying to secure their networking infrastructures .Distributed firewalls are often deployed by large enterprises to filter the network traffic. Problem statement: In conventional firewall system is only verified user specified policy. But also find the inconsistencies of the firewalls. Approach: In our approach is to implement the Policy Verification, Policy Validation and Troubleshooting in Distributed Firewalls. Input: Our approach input as user specified firewall policy or security rule of the system, Administrator policy. Output: Our approach output as satisfies policy the property and troubleshooting the some problems in firewalls. In some cases the firewall cannot be work properly at the time system administrator or firewalls administrator to troubleshooting the problem.
.
Keywords - Policy Verification, Policy Validation, and Troubleshooting
.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
24. Paper 32000000: Detection and Tracking of objects in Analysing of Hyper spectral High-Resolution Imagery and Hyper spectral Video Compression (pp. 138-146)
Full Text: PDF

.
T. Arumuga Maria Devi, Nallaperumal Krishnan, K.K Sherin, Mariadas Ronnie C.P
Centre for Information Technology and Engineering, Manonmaniam Sundaranar University, Tirunelveli

.
Abstract — This paper deals mainly with the performance study and analysis of image retrieval techniques for retrieving unrecognized objects from an image using Hyper spectral camera and high-resolution image and retrieving unrecognized objects from an image using Hyper spectral camera at low light resolution. The main work identified is that efficient retrieval of unrecognized objects in an image will be made possible using spectral analysis and spatial analysis. The methods used above to retrieve unrecognized object from a high-resolution image are found to be more efficient in comparison with the other image retrieval techniques. The detection technique to identify objects in an image is accomplished in two steps: anomaly detection based on the spectral data and the classification phase, which relies on spatial analysis. At the classification step, the detection points are projected on the high-resolution images via registration algorithms. Then each detected point is classified using linear discrimination functions and decision surfaces on spatial features. The two detection steps possess orthogonal information: spectral and spatial. The identification of moving object in a camera is not possible in a low light environment as the object has low reflectance due to lack of lights. Using Hyper spectral data cubes, each object can be identified on the basis of object luminosity. Moving object can be identified by identifying the variation in frame value. The main work identified are that efficient retrieval of unrecognized objects in an image will be made possible using Hyper spectral analysis and various other methods such as Estimation of Reflectance, Feature and mean shift tracker, Traced feature located on image, Band pass filter (Background removal) etc. These methods used above to retrieve unrecognized object from a low light resolution are found to be more efficient in comparison with the other image retrieval techniques. The objects in an image may require that its edges should be smoother in order to make it detect easily by the receiver when it is send from one machine to another. As the image and video may be needed to be send from source to destination, due to huge amount of data that may be required for processing, retrieval and storage, because of the high resolution property of images, compression is a necessity. In order to overcome the problems associated with it, Transcoding technique is used by using filter arrays and lossless compression techniques.
.
Keywords— Anomaly suspect, spectral and spatial analysis, linear discrimination functions, registration algorithms, filter arrays mean shift algorithms, spectral detection.
.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
25. Paper 32000001: Efficient Retrieval of Unrecognized Objects from Hyper spectral and High Resolution imagery into JPEG imagery Processing and Fusion (pp. 147-151)
Full Text: PDF

.
T. Arumuga Maria Devi, Nallaperumal Krishnan, Mariadas Ronnie C.P
Centre for Information Technology and Engineering, Manonmaniam Sundaranar University, Tirunelveli

.
Abstract - This paper deals mainly with the performance study and analysis of image retrieval techniques for retrieving unrecognized objects from an image using Hyper spectral camera and high-resolution image. The main work identified is that efficient retrieval of unrecognized objects in an image will be made possible using spectral analysis and spatial analysis. The methods used above to retrieve unrecognized object from a high-resolution image are found to be more efficient in comparison with the other image retrieval techniques. The detection technique to identify objects in an image is accomplished in two steps: anomaly detection based on the spectral data and the classification phase, which relies on spatial analysis. At the classification step, the detection points are projected on the high-resolution images via registration algorithms. Then each detected point is classified using linear discrimination functions and decision surfaces on spatial features. The two detection steps possess orthogonal information: spectral and spatial. The objects in an image may require that its edges should be smoother in order to make it detect easily by the receiver when it is send from one machine to another. In order to overcome the problems associated with it, Transcoding technique is used by using filter arrays.
.
Keywords— Anomaly suspect, spectral and spatial analysis, linear discrimination functions, registration algorithms, filter arrays.
.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
26. Paper 32000002: Retrieving Unrecognized Objects from HSV into JPEG Video at various Light Resolutions (pp. 152-156)
Full Text: PDF

.
T. Arumuga Maria Devi, Nallaperumal Krishnan, K.K Sherin
Centre for Information Technology and Engineering, Manonmaniam Sundaranar University, Tirunelveli

.
Abstract — This paper deals mainly with the performance study and analysis of image retrieval techniques for retrieving unrecognized objects from an image using Hyper spectral camera at low light resolution. Since the identification of moving object in a camera is not possible in a low light environment as the object has low reflectance due to lack of lights. Using Hyper spectral data cubes, each object can be identified on the basis of object luminosity. Moving object can be identified by identifying the variation in frame value. The main work identified are that efficient retrieval of unrecognized objects in an image will be made possible using Hyper spectral analysis and various other methods such as Estimation of Reflectance, Feature and mean shift tracker, Traced feature located on image, Band pass filter (Background removal) etc. These methods used above to retrieve unrecognized object from a low light resolution are found to be more efficient in comparison with the other image retrieval techniques.
.
Keywords— Anomaly suspect, mean shift algorithms, spectral detection.

.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
27. Paper 32000003: Bayesian Spam Filtering using Statistical Data Compression (pp. 157-159)
Full Text: PDF

.
V. Sudhakar, Avanthi Institute of Engineering and Technology, Visakhapatnam, vsudhakarmtech@yahoo.com
Dr.CPVNJ.Mohan Rao, Professor in CSE Dept, Avanthi Institute of Engineering andTechnology, Visakhapatnam
Satya Pavan Kumar Somayajula, Asst. Professor, CSE Dept, Avanthi Institute of Engineering and Technology, Visakhapatnam

.
Abstract - The Spam e-mail has become a major problem for companies and private users. This paper associated with spam and some different approaches attempting to deal with it. The most appealing methods are those that are easy to maintain and prove to have a satisfactory performance. Statistical classifiers are such a group of methods as their ability to filter spam is based upon the previous knowledge gathered through collected and classified e-mails. A learning algorithm which uses the Naive Bayesian classifier has shown promising results in separating spam from legitimate mail.

.

-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------



Comments