Book of Abstract Volume 8 No 9 IJCSIS December 2010

36
International Journal of Computer Science & Information Security © IJCSIS PUBLICATION 2010 IJCSIS Vol. 8 No. 9, December 2010 ISSN 1947-5500

Transcript of Book of Abstract Volume 8 No 9 IJCSIS December 2010

Page 1: Book of Abstract Volume 8 No 9 IJCSIS December 2010

International Journal of Computer Science

& Information Security

© IJCSIS PUBLICATION 2010

IJCSIS Vol. 8 No. 9, December 2010 ISSN 1947-5500

Page 2: Book of Abstract Volume 8 No 9 IJCSIS December 2010

Editorial Message from Managing Editor

The International Journal of Computer Science and Information Security (IJCSIS) is

a well-established publication venue on novel research in computer science and

information security. The year 2010 has been very eventful and encouraging for all

IJCSIS authors/researchers and IJCSIS technical committee, as we see more and more

interest in IJCSIS research publications. IJCSIS is now empowered by over thousands

of academics, researchers, authors/reviewers/students and research organizations.

Reaching this milestone would not have been possible without the support, feedback,

and continuous engagement of our authors and reviewers.

Field coverage includes: security infrastructures, network security: Internet security,

content protection, cryptography, steganography and formal methods in information

security; multimedia systems, software, information systems, intelligent systems, web

services, data mining, wireless communication, networking and technologies,

innovation technology and management. ( See monthly Call for Papers)

We are grateful to our reviewers for providing valuable comments. IJCSIS December

2010 issue (Vol. 8, No. 9) has paper acceptance rate of nearly 35%.

We wish everyone a successful scientific research year on 2011.

Available at http://sites.google.com/site/ijcsis/

IJCSIS Vol. 8, No. 9, December 2010 Edition

ISSN 1947-5500 © IJCSIS, USA.

Abstracts Indexed by (among others):

Page 3: Book of Abstract Volume 8 No 9 IJCSIS December 2010

IJCSIS EDITORIAL BOARD

Dr. Gregorio Martinez Perez Associate Professor - Professor Titular de Universidad, University of Murcia (UMU), Spain Dr. M. Emre Celebi, Assistant Professor, Department of Computer Science, Louisiana State University in Shreveport, USA Dr. Yong Li School of Electronic and Information Engineering, Beijing Jiaotong University, P. R. China Prof. Hamid Reza Naji Department of Computer Enigneering, Shahid Beheshti University, Tehran, Iran Dr. Sanjay Jasola Professor and Dean, School of Information and Communication Technology, Gautam Buddha University Dr Riktesh Srivastava Assistant Professor, Information Systems, Skyline University College, University City of Sharjah, Sharjah, PO 1797, UAE Dr. Siddhivinayak Kulkarni University of Ballarat, Ballarat, Victoria, Australia Professor (Dr) Mokhtar Beldjehem Sainte-Anne University, Halifax, NS, Canada Dr. Alex Pappachen James, (Research Fellow) Queensland Micro-nanotechnology center, Griffith University, Australia Dr. T.C. Manjunath,ATRIA Institute of Tech, India.

Page 4: Book of Abstract Volume 8 No 9 IJCSIS December 2010

IJCSIS 2010

TABLE OF CONTENTS 1. Paper 23111015: Chaotic Hash Function Based on MD5 and SHA-1 Hash Algorithms (pp. 1-3) Mouad HAMRI & Jilali Mikram, Applied Mathematics and computer science department, Science University of Rabat, 4 Avenue Ibn Battouta Rabat Morocco Fouad Zinoun, Economical sciences and management department, University of Meknes Abstract — In this work an implementation of a 128 bits chaotic hash function is presented. We have used the logistic map as the chaotic dynamical system of our algorithm and for the initial condition generation of the chaotic map, we’ve used the two hash functions MD5 and SHA-1. The main idea is to use the MD5 and SHA-1 digits of the a message to construct the initial condition of the logistic map and using this map we will generate the digit of this message. The algorithm was implemented using JAVA programming language and its performance was studied by comparing it to MD5 hash function. Keywords: Cryptography, Hash functions, MD5, SHA, Dynamical systems, Chaos theory. 2. Paper 23111018: Concept Measure Supported Aesthetics Ontology Construction for Videos (pp. 4-7) Dr Sunitha Abburu, Professor & Director, Department of Computer Applications, Adhiyamaan College of Engineering, Hosur, pin-635109, Tamilnadu, India Abstract — Entertainment plays a vital role in human life. Multimedia conquers top position in the entertainment world. Video stands first among the multimedia entertainment. The rapid growth of the videos has resulted in the emergence of numerous multimedia repositories that require efficient and effective video storage, semantic annotation, indexing and retrieval systems. The introduction of ontologies in multimedia retrieval system can improve the precision and recall rate effectively. The performance of the annotation and the retrieval system increases with the support of the domain ontology. Most of the video annotation, indexing and the retrieval systems focus on the semantic concepts like objects, people, location, events, actions etc. But most of the multimedia systems are filled with human and their emotions. Any multimedia system like cinema, news videos, sports videos, and any domestic functional videos tries to capture the emotions of the human involved in the occasion. A video retrieval system will be complete if the system identifies, captures and represents the emotions of the humans. This paper focus on identification and representation of human emotions and the intensity of the emotions are represented using the fuzzy logic. The concept of Navarasra has been brought in to video retrieval system to classify the human emotions. The proposed approach is generic and flexible. It is designed and constructed for all videos where human beings and their emotions are been captured. A practical implementation is done using Protégé as an Ontology developing tool. Keywords-component; Video Semantics, Concept measures, Ontology, Retrieval, Human Emotions. 3. Paper 26111027: Reconfigurable Hardware Intelligent Memory Controller for H.264/AVC Encoders (pp. 8-16) Kamel Messaoudi, LERICA Laboratory Badj Mokhtar University Annaba, Algeria El-Bay Bourennane, LE2I Laboratory, Burgundy University, Dijon, France Salah Toumi, LERICA Laboratory, Badj Mokhtar University, Annaba, Algeria Abstract — In this paper, we propose an intelligent memory controller for H.264/AVC CODECs with memory management strategies based on a preloading mechanism in order to reduce the number of accesses to external memory. The controller is used both in simulation and implementation platform for the H.264 encoder. This platform uses an external DDR2 memory to record an image sequence, and an

(IJCSIS) International Journal of Computer Science and Information Security, Vol. 8, No. 9, December 2010

http://sites.google.com/site/ijcsis/ ISSN 1947-5500

Page 5: Book of Abstract Volume 8 No 9 IJCSIS December 2010

IJCSIS 2010

intelligent component with local memories to read the images periodically according to the needs of the H.264 processing modules. Several on-chip memories are used to avoid accessing to off-chip memory and consequently decrease energy consumption. The proposed memory controller can be adapted to the various profiles defined in the standard. The intelligent controller is implemented in VHDL and verified to run at 114 MHz using a Xilinx virtex5-ML501 platform. The proposed architecture occupies 10% of the FPGA’s resources and ensures data for the processing modules in H.264 encoder. Keywords- Memory management; intelligent controller; FPGA; H.264/AVC codec; real-time processing. 4. Paper 26111030: Fragmentation Investigation And Evaluation In Distributed DBMS Using JDBC and OGSA-DAI (pp. 17-24) Ahmed Almadi, Ahmed Manasrah, Omer Abouabdalla, Homam El-Taj National Advanced IPv6 Center of Excellence (NAv6) Universiti Sains Malaysia Penang, Malaysia Abstract — This research investigates and evaluate the impact of the fragmentation on different database retrieval modes based on derived horizontal fragmentation by generating and distributing the query to the servers (distributed search) or send the query to the direct server (direct search). Moreover, it provides recommendation on suitable query execution strategies based on a proposed fitness fragmentation formula. Furthermore, examine the suitable technology such as OGSA-DAI and JDBC in grid database to examine the time overhead in distributed systems and grid environments in different cases like size or number of servers. The results show that the fragmentation's time performance impact is clearly effective and positively applied while increasing the database size or the number of servers. On the other hand, the OGSA-DAI kept on showing slower execution time on all conducted scenarios, and the differences between the execution time exceeds up to 70% while increasing the size of data or number of servers. In addition, this thesis has tested the impact of fragmentation search against the distributed search where the first one submit the query to direct server(s) (direct search), and the second one distribute the query to the servers (distributed search). The result shows that the speed effectiveness of direct search technique in JDBC case is around 70% faster than the distributed search and around 50% faster in OGSA-DAI case. Keywords-component; JDBC; OGSA-DAI; Fragmentation; Distributed DBMS 5. Paper 29111036: Impact of Guard Interval in Proposed MIMO-OFDM System for wireless communication (pp. 25-30) M. P. Chitra, Research Scholar, Sathyabama University, Chennai, India. Dr. S. K. Srivatsa, Senior Professor, St. Joseph College of Engineering, Chennai, India. Abstract - Alamouti’s space-time coding scheme for Multi-Input Multi-Output (MIMO) system has drawn much attention in 4G wireless technologies. Orthogonal frequency division multiplexing (OFDM) is a popular method for high data rate wireless transmission. OFDM may be combined with antenna arrays at the transmitter and receiver to increase the diversity gain and enhance the system capacity on time variant and frequency selective channels, resulting in Multi-Input Multi-Output (MIMO) configuration. This paper explores varies physical layer research challenges in MIMO-OFDM system design including channel modeling, space time block code techniques, channel estimation and signal processing algorithms used for performing time and frequency synchronization in MIMO-OFDM system .The proposed system is simulated in matlab and analyzed in terms of BER with signals to noise ratio (SNR).The difference of BER for coded and uncoded MIMO system and also the impact of guard interval are simulated using different wireless channel. Keywords - Multi-Input Multi-Output (MIMO); orthogonal frequency division multiplexing (OFDM); Bit error rate (BER); signals to noise ratio (SNR); Single input single output (SISO); space time block code (STBC)

(IJCSIS) International Journal of Computer Science and Information Security, Vol. 8, No. 9, December 2010

http://sites.google.com/site/ijcsis/ ISSN 1947-5500

Page 6: Book of Abstract Volume 8 No 9 IJCSIS December 2010

IJCSIS 2010

6. Paper 29111037: Implementation of New Routing Protocol for Node Security in a Mobile Ad Hoc Network (pp. 31-36) Virendra Singh Kushwah, Department of Computer Science, Hindustan Institute of Management and Computer Studies, Farah, Mathura, INDIA Gaurav Sharma, Department of Computer Science, GLA, University Mathura, INDIA Abstract-- A routing protocol plays important role to handle entire network for communication and determines the paths of packets. A node is a part of the defined network for transferring information in form of packets. If all packets transferred from source to destination successfully, it has been assumed that the routing protocol is good. But, an attacker turns this dealing as a speed breaker and turning point of a highway. So, prevention from attacks and secure packets, a new routing protocol is being introduced in this paper. The proposed routing protocol is called by SNAODV (Secure Node AODV). This paper is also tried to maximize throughput as compared with AODV and SAODV. Keywords—AODV; routing; packets; network 7. Paper 30111038: Runtime Monitoring and Controlling Of Information Flow (pp. 37-45) Mohamed Sarrab, Software Technology Research Laboratory, De Montfort University, Leicester, LE1 9BH, UK Helge Janicke, Software Technology Research Laboratory, De Montfort University, Leicester, LE1 9BH, UK Abstract— Computer systems are monitored to check performance or verified to check the correctness of the software systems with respect to security properties such as integrity, availability and confidentiality. The more sensitive the information, such as credit card information, military information or personal medical information, being processed by the software, the more necessary and important it is to monitor and control the flow of sensitive information. Monitoring and controlling an untrusted program behavior to ensure information confidentiality during runtime in an environment where confidential information is present is often difficult and unnerving task for users. The issue is how users can monitor and control the flow of the confidential information at the runtime of untrusted programs. In this paper we present a novel runtime verification approach for monitoring and controlling information flow that supports user interaction with a running program. Keywords- Information flow control; Runtime monitoring; Confidentiality; Usability. 8. Paper 30111047: Design of Novel Usability Driven Software Process Model (pp. 46-53) Hina Gull, Department of Computer Engineering, College of Electrical & Mechanical Engineeing NUST, Rawalpindi Pakistan Farooque Azam, Department of Computer Engineering, College of Electrical & Mechanical Engineeing NUST, Rawalpindi Pakistan Sardar Zafar Iqbal, Department of Computer Sciences, Iqra University, Islamabad Pakistan Abstract - In this paper we have proposed a novel software process model for web based applications. This model is based on the empirical study carried out by us and also by the literature review of software development models. Model consists of three phases: Requirement Engineering, Design and Implementation. Model contains certain sub activities in each phase describing the flow and steps which should be followed to develop a web application. The main emphasis of the model is on usability aspect, keeping in view the criticality of the user interface for a good web application. Flexible and easy change manageable nature of the model makes it different and worth using as compared to other software development approaches.

(IJCSIS) International Journal of Computer Science and Information Security, Vol. 8, No. 9, December 2010

http://sites.google.com/site/ijcsis/ ISSN 1947-5500

Page 7: Book of Abstract Volume 8 No 9 IJCSIS December 2010

IJCSIS 2010

9. Paper 30111050: Power-Based Key Hopping (PBKH) and Associated Hardware Implementation (pp. 54-60) Rabie A. Mahmoud, Department of Mathematics, Faculty of Science, Cairo University, Cairo, Egypt. Magdy Saeb, Computer Engineering Department, Arab Academy for Science, Tech. & Maritime Transport, Alexandria, Egypt. Abstract: Power-Based Key Hopping (PBKH) is a process of key hopping that is used to interchange the user key of a cipher. Power based key hopping is founded on the idea of dynamic frequency power-based hopping to change the user key. This is achieved through computing the power of a previous cipher packet and comparing it with a standard value. In this work, we discuss various key hopping methods and suggest a procedure of power based key hopping. Moreover, we provide a Field Programmable Gate Array (FPGA) hardware implementation of the proposed key hopping technique. Keywords: Power Based Key Hopping; Security; Hardware; FPGA 10. Paper 30111058: The Innovative Application of Multiple Correlation Plane (pp. 61-69) Julaluk Watthananon, Faculty of Information Technology, King Mongkut’s University of Technology North Bangkok, Thailand Sageemas Na Wichian, College of Industrial Technology, King Mongkut’s University of Technology North Bangkok, Thailand Anirach Mingkhwan, Faculty of Industrial and Technology Management, King Mongkut’s University of Technology North Bangkok, Thailand Abstract—Presentation data with column graph and line graph is a well-known technique used in data explanation to compare and show direction that users can easily understand. However, the techniques has limitations on the data describing complex with multiple relations, that is, if the data contains diverse relationships and many variables, the efficiency of the presentation will decrease. In this paper, the mathematical method for multi relations based on Radar graph is proposed. The position of information approaches on the correlation plane referred to the distribution of content and the deep specific content. However, the proposed method analyzes the multi variants data by plotting in the correlation plane, and compared with the base line system. The result shows that the performance is higher than other methods in term of accuracy, time and features. Keywords-Correlation plane; correlation boundary; correlation plot; Star plot; Radar graph 11. Paper 30111059: Structural Analysis of Bangla Sentences of Different Tenses for Automatic Bangla Machine Translator (pp. 70-75) Md. Musfique Anwar, Nasrin Sultana Shume and Md. Al-Amin Bhuiyan Dept. of Computer Science & Engineering, Jahangirnagar University, Dakha, Bangladesh Abstract - This paper addresses about structural mappings of Bangla sentences of different tenses for machine translation (MT). Machine translation requires analysis, transfer and generation steps to produce target language output from a source language input. Structural representation of Bangla sentences encodes the information of Bangla sentences and a transfer module has been designed that can generate English sentences using Context Free Grammar (CFG). The MT system generates parse tree according to the parse rules and a lexicon provides the properties of the word and its meaning in the target language. The MT system can be extendable to paragraph translation. Keywords: Machine Translation, Structural representation, Context Free Grammar, Parse tree, Lexicon etc.

(IJCSIS) International Journal of Computer Science and Information Security, Vol. 8, No. 9, December 2010

http://sites.google.com/site/ijcsis/ ISSN 1947-5500

Page 8: Book of Abstract Volume 8 No 9 IJCSIS December 2010

IJCSIS 2010

12. Paper 30111064: Image Retrieval using Shape Texture Patterns generated from Walsh-Hadamard Transform and Gradient Image Bitmap (pp. 76-82) Dr. H.B.Kekre, Sudeep D. Thepade, Varun K. Banura Computer Engineering Department, MPSTME, SVKM’s NMIMS (Deemed-to-be University), Mumbai, India Abstract — The theme of the work presented here is gradient mask texture based image retrieval techniques using image bitmaps and texture patterns generated using Walsh-Hadamard transform. The shape of the image is extracted by using three different gradient operators (Prewitt, Robert and Sobel) with slope magnitude method followed by generation of bitmap of the shape feature extracted. This bitmap is then compared with the different texture patterns namely ‘4-pattern’, ‘16-pattern’ and ‘64-pattern’ generated using Walsh-Hadamard transform matrix to produce the feature vector as the matching number of ones and minus ones per texture pattern. The proposed content based image retrieval (CBIR) techniques are tested on a generic image database having 1000 images spread across 11 categories. For each proposed CBIR technique 55 queries (randomly selected 5 per image category) are fired on the image database. To compare the performance of image retrieval techniques average precision and recall of all the queries per image retrieval technique are computed. The results have shown improved performance (higher precision and recall values of crossover points) with the proposed methods compared to the mask-shape based image retrieval techniques. Further the performance of proposed image retrieval methods is enhanced using even image part. In the discussed image retrieval methods, the combination of original and even image part for 4-pattern texture with shape masks generated using Robert gradient operator gives the highest crossover point of precision and recall indicating better performance. Keywords- CBIR, Gradient operators, Walsh-Hadamard transform, Texture, Pattern, Bitmap. 13. Paper 30111075: An Evaluation of Software Requirement Prioritization Techniques (pp. 83-94) Mohammad Shabbir Hasan, Abdullah Al Mahmood, Md. Jahangir Alam, Sk. Md. Nahid Hasan, Farin Rahman Panacea Research Lab, Dhaka, Bangladesh and Dhaka International University, Dhaka, Bangladesh. Abstract — Requirements prioritization plays an important role in the requirement engineering process, particularly, with respect to critical tasks like requirements negotiation and software release planning. Selecting the right set of requirements for a product release largely depends on how successfully the requirement candidates are prioritized. There are different requirement prioritization techniques available which are some more elaborated than others. This paper takes a closer look at nine different techniques of requirement prioritization namely Analytical Hierarchy Process (AHP), Hierarchy AHP, Minimal Spanning Tree, Bubble Sort, Binary Search Tree (BST), Priority Group, Planning Game (PG), 100 points method and Planning Game combined with AHP (PGcAHP) and then put them into a controlled experiment, in order to find out the best one. The evaluation was done on the basis of some criteria like: ease of use, certainty, accuracy of result, method’s ability to scale up to many more requirements, required number of comparisons, and required time to make decision. Analysis of the data from the experiment indicates that the analytic hierarchy process to be a promising candidate, although it may be problematic to scaleup. However, the result clearly indicates that the Planning Game (PG) yields accurate result, is able to scale up, requires least amount of time, the easiest method to use and so on. For these reasons, finding of the experiment is, the Planning Game (PG) method is supposed to be the best method for prioritizing requirements. Keywords- Requirement Engineering, Requirement Prioritization, Requirement Negotiation, Software Product Management, Software Release Planning.

(IJCSIS) International Journal of Computer Science and Information Security, Vol. 8, No. 9, December 2010

http://sites.google.com/site/ijcsis/ ISSN 1947-5500

Page 9: Book of Abstract Volume 8 No 9 IJCSIS December 2010

IJCSIS 2010

14. Paper 30111076: Routing Fairness in Mobile Ad-Hoc Networks: Analysis and Enhancement (pp. 95-100) M. Shiraz Ahmed, Lecturer, Department Of Computer Science & Information Systems, Najran University, Najran, Saudi Arabia, Haji Moinuddin, Lecturer, Department Of Computer Science & Information Systems, Najran University, Najran, Saudi Arabia, Fazeelatunnisa, Lecturer, Department Of Computer Science & Information Systems, Najran University, Najran, Saudi Arabia Abstract: With the rapid advances in wireless and semiconductor technologies mobile connectivity became cheap and ubiquitous. One of the major challenges facing Mobile Ad-Hoc Networks (also known as MANETs) is the absence of a proper routing protocol that provides good fairness and scalability, low overhead, low end-to-end delays, seamless connectivity and good quality of service. This paper studies the fairness of routing protocols for MANETS. In this paper we propose routing segments methods to solve the problem of lack of fairness in routing. Keywords: MANETS, Fairness, Segments, Scalability 15. Paper 30111054: Nano-particle Characterization Using a Fast Hybrid Clustering Technique for TEM Images (pp. 101-110) M.A. Abdou, Researcher, IRI, Mubarak City for Scientific Research and Technology Applications, Alexandria, Egypt. Bayumy B.A. Youssef, Researcher, IRI, Mubarak City for Scientific Research and Technology Applications, Alexandria, Egypt. W.M. Sheta, Researcher, IRI, Mubarak City for Scientific Research and Technology Applications, Alexandria, Egypt Abstract - This Paper introduces a new fast Transmission Electron Microscopy (TEM) images clustering technique. Since analysis of particle sizes and shapes from two-dimensional TEM images is affected by variations in image contrast between adjacent particles, automatic methods requires more efforts. The proposed hybrid method consists of two main steps: automatic segmentation and nano-particles counting. The segmentation procedure begins with an automatic threshold generator and moves towards a high efficient multiple- regions segmentation technique. Results are observed, compared with existing methods and manual counting. Keywords: TEM, Image segmentation, Threshold generator, Nano-particle counting 16. Paper 30111042: Gaussian Process Model for Uncertain Data Classification (pp. 111-115) G.V. Suresh, Assoc. Professor, CSE Department, Universal College of Engineering, Guntur, India Shabbeer Shaik, Assoc. Professor, MCA Department, Tirmula College of Engineering , Guntur, India E.V.Reddy, Assoc. Professor, CSE Department, Universal College of Engineering, Guntur, India Usman Ali Shaik, Assoc. Professor, CSE Department, Universal College of Engineering, Guntur, India Abstract— Data uncertainty is common in real-world applications due to various causes, including imprecise measurement, network latency, out-dated sources and sampling errors. These kinds of uncertainty have to be handled cautiously, or else the mining results could be unreliable or even wrong. We propose that when data mining is performed on uncertain data, data uncertainty has to be considered in order to obtain high quality data mining results. In this paper we study how uncertainty can be incorporated in data mining by using data clustering as a motivating example. We also present a Gaussian process model that can be able to handle data uncertainty in data mining. Keywords- Gaussian process, uncertain data, Gaussian distribution, Data Mining

(IJCSIS) International Journal of Computer Science and Information Security, Vol. 8, No. 9, December 2010

http://sites.google.com/site/ijcsis/ ISSN 1947-5500

Page 10: Book of Abstract Volume 8 No 9 IJCSIS December 2010

IJCSIS 2010

17. Paper 30111078: Pair Wise Sorting: A New Way of Sorting (pp. 116-120) Md. Jahangir Alam, Dhaka International University, Dhaka, Bangladesh Muhammad Monsur Uddin, Institute of Science, Trade and Technology, Dhaka, Bangladesh Mohammad Shabbir Hasan, Abdullah Al Mahmood, Panacea Research Lab, Dhaka, Bangladesh Abstract — This paper presents a technique for sorting numerical data in an efficient way. The numbers of comparisons i.e. the running time of this technique is dependent on distribution or diversity of the value of data items as like as other efficient algorithms. When the total number of data is even, this method groups that data into a collection of pairs and therefore establishes the sorting constraints on each of the pairs. The control is traversed through the list of elements by changing the position of each pair which is the major principle of this technique. On the other hand, when the total number of elements is odd, this method sorts all elements except the last one in the same was as mentioned earlier and the last element is sorted using the general Insertion Sort. This algorithm is therefore a hybrid sorting method that sorts elementary numeric data in a faster and efficient manner. Keywords- Sorting, Pair Wise Sorting, Sorting Techniques. 18. Paper 30111086: Improving Client-Server Response Time Using IPv6 Header Suppresion Over MPLS (pp. 121-126) Imad J. Mohamad & Yung-Wey Chong, National Advanced IPv6 Center, Universiti Sains Malaysia, 11800 Penang, Malaysia Tat-Chee Wan & Putra Sumari, School of Computer Sciences, Universiti Sains Malaysia, 11800 Penang, Malaysia Abstract — Optimizing the response time for Client-Server IPv6 traffic over label switched path (LSP) is the main contribution for this paper. It is achieved using header suppression for real time IPv6 traffic across MPLS label switched path (LSP). Robust Header Compression (RoHC) and Payload Header Suppression (PHS) are two options defined in IEEE 802.16 for mobile WiMAX performance work using link-by-link approach. This paper adapts PHS for MPLS performance and extends it to work over LSP using end-to-end approach. The implementation for IPv6 header suppression using NS2 shows improvement in response time for client-server traffic by 1.7s. Additional improvement in QoS parameters for UDP and TCP traffic is investigated. Keywords-component; Client-Server Traffic, LSP, IPv6, Header Suppression; 19. Paper 31101070: Hybrid Compression of Color Images with Larger Trivial Background by Histogram Segmentation (pp. 127-131) M. Mohamed Sathik, Department of Computer Science, Sadakathullah Appa College, Tirunelveli, India K. Senthamarai Kannan and Y. Jacob Vetha Raj, Department of Statistics, Manonmanium Sundaranar University, Tirunelveli, India Abstract - A hybrid image compression method is proposed by which the background of the image is compressed using lossy compression and the rest of the image is compressed using lossless compression. In Hybrid Compression of Color Images with Larger Trivial Background by Histogram Segmentation(HCCILTBHS) , input color image is subjected to binary segmentation using histogram to detect the background. The color image is compressed by standard lossy compression method. The difference between the lossy image and the original image is computed and is called as residue. The residue at the background area is dropped and rest of the area is compressed by standard lossless compression method. This method gives lower bit rate than the lossless compression methods and is well suited to any color image with larger trivial background. Key Words- Segmentation, Erosion, Dilation, Image Compression.

(IJCSIS) International Journal of Computer Science and Information Security, Vol. 8, No. 9, December 2010

http://sites.google.com/site/ijcsis/ ISSN 1947-5500

Page 11: Book of Abstract Volume 8 No 9 IJCSIS December 2010

IJCSIS 2010

20. Paper 30101074: Realization and Study of High Performance Voltage Mode Oscillator based on CCCCTA: A Building Block for Analog Signal Processing (pp. 132-138) Deependra Pandey, Asst. Professor, Dept. of ECE, Amity University, Lucknow Prof.(Dr.) L.K. Singh, Director, IET, Dr. R. M. L. Avadh University, Faizabad Abstract- At present there is a growing interest in designing current mode circuits. This attributed to their large signal bandwidth, great linearity, wider dynamic range, simple circuitry and low power consumption. The paper presents a basic current-mode building block for analog signal processing, namely current controlled current conveyor transconductance amplifier (CCCCTA).Its parasitic resistance at current input port can be controlled by an input bias current. It is very suitable to use in a current-mode signal processing, which is continually more popular than a voltage one. The proposed element is realized in a CMOS technology and is examined the performances through PSPICE simulations. The CCCCTA performs tuning over a wide current range. In addition, some circuits for example as a current-mode universal biquad filter and a grounded inductance occupy only single CCCCTA. Keywords: Current Conveyors, CCCCTA, Current-mode circuits, Voltage Mode Oscillator 21. Paper 11101002: Hybrid Technique for Self Tuning PI Controller Parameters in HVDC Systems (pp. 139-150) A.Srujana, Research Scholar, JNT University, Hyderabad Dr. S.V.Jayaram Kumar, Professor, Jawaharlal Nehru Technological University, Hyderabad Abstract — Nowadays, due to certain advantages, the HVDC systems are commonly used in long distance transmissions. The major drawback associated with HVDC system is that it takes a longer duration to return to its steady state value after the occurrence of a fault. In a HVDC system, when a fault occurs, the current and voltage will deviate from their normal range and PI controllers are used to maintain its current and voltage at the normal steady state value. Controller parameter tuning plays a significant role in maintaining the steady state current and voltage of a HVDC system. Here, we propose a hybrid technique to self tune the PI controller parameters. The proposed hybrid technique utilizes fuzzy logic and neural network to self tune the controller parameters. The fuzzy rules are generated using different combinations of current error, rate and combined gain. To train the neural network, different combinations of fuzzy gain, proportional gain and integral gain are used. The neural network is trained using a back propagation algorithm. By experimentation it is shown that the system that uses this method takes a very short time to return to its normal steady state. The implementation results show that the performance of the proposed hybrid technique is superior to that of both the self tuning techniques. Keywords- fuzzy logic; HVDC; neural network; fuzzy rules; proportional and integral gain. 22. Paper 26111032: Use of Computerized Web-Based Information System For Determining Losses in 15-6.6 KV Feeders in Traditional Electrical Network Managemment: Case Study Goma Distribution Electrical Network (pp. 151-157) Ezekiel U. Okike, Department of Computer Science, University of Ibadan, Ibadan, Nigeria Bakunzi G. Joseph, School of Computer Studies, Kampala International University, Kampala, Uganda Abstract— Electrical energy plays very vital role in modern global economy. The aim of this study is to develop a framework for a Web-Based Information System (WIS) tool for computing losses from 15 – 6.6 KV Feeders in Traditional Electrical Network Management (TENM). The study was conducted in Goma District in the Democratic Republic of Congo. Data were collected from 26 key staff of Goma Distribution Electrical Network who responded to the questionnaires and from metered reading documents used in the study. The study implemented a Computerized Web-Based Information System (CWIS) to compute different losses in Goma electrical distribution network. The CWIS computed technical losses in five 15-6.6KV feeders of Goma electrical distribution network. The study revealed that among the five feeders, feeder 1 (Sud feeder) consumes 1,469,172.6 KWH representing 66.3% of the total annual energy loss while

(IJCSIS) International Journal of Computer Science and Information Security, Vol. 8, No. 9, December 2010

http://sites.google.com/site/ijcsis/ ISSN 1947-5500

Page 12: Book of Abstract Volume 8 No 9 IJCSIS December 2010

IJCSIS 2010

others presented lower annual losses. This is an indication that Feeder 1 is overloaded and needed to be resized or on the alternative, the installation of another overhead cable that will take the half of the load in charge. Keywords- Electrical energy; energy distribution; feeder loss; computerized information system 23. Paper 27101035: A Design and Execution of Activity Based Applications In Distributed Environments Using Hermes Software Architecture (pp. 158-166) B. Muthukumar, P. Banumathi & T.K.P. Rajagopal Kathir College of Engineering, Coimbatore, Tamilnadu, INDIA R.Vidhya, PG Student, Pondicherry University, Pondicherry Abstract - Hermes is an agent-based middleware structured as component-based and 3-layered software architecture. Hermes provides an integrated, flexible programming environment for design and execution of activity-based applications in distributed environments. By using workflow technology, it supports even a non expert user programmer in the model driven design and implementation of a domain specific application. In this paper, after a description of Hermes software architecture, we provide a simple demo in biological domain and we show some real case studies in which Hermes has been validated. Keywords: Hermes Software Architecture, O2I Project, Agents, Run –Time Layers etc. 24. Paper 27101036: Tracking The Face Movement Of Perceptual User Interface Using CAMSHIFT Algorithm (pp. 167-175) B. Muthukumar, Assistant Professor, Information Technology, Kathir College of Engineering, Coimbatore Dr. S. Ravi, Professor and Head, ECE Department, Dr.M.G.R University, Chennai Abstract: This paper deals with a perceptual user interface and computer vision color tracking algorithm is developed and applied towards tracking human faces. Computer vision algorithms that are intended to form part of a perceptual user interface must be fast and efficient. They must be able to track in real time yet not absorb a major share of computational resources: other tasks must be able to run while the visual interface is being used. The new algorithm developed here is based on a robust nonparametric technique for climbing density gradients to find the mode (peak) of probability distributions called the mean shift algorithm. In our case, we want to find the mode of a color distribution within a video scene. Therefore, the mean shift algorithm is modified to deal with dynamically changing color probability distributions derived from video frame sequences. The modified algorithm is called the Continuously Adaptive Mean Shift (CAMSHIFT) algorithm. CAMSHIFT’s tracking accuracy is compared against a Polhemus tracker. Tolerance to noise, distractors and performance is studied. Keywords: Computer vision, Face tracking, Mean Shift Algorithm, Perceptual User Interface, 3D Graphics Interface 25. Paper 29111035: Using RFID to Enhance Mobile Banking Security (pp. 176-182) Zakaria Saleh, MIS Department, IT faculty, Yarmouk University, Irbid, Jordan Izzat Alsmadi, CIS Department, IT faculty, Yarmouk University, Irbid, Jordan Abstract — Mobile banking is introducing a new generation of location-independent financial services using mobile terminals. This facilitates allowing users to make payments, check balances, transfer money between accounts and generate statements of recent transactions on their cellular phones. While providing, anywhere, anytime banking to the user, the service should be secure and security needs to be implemented at various levels, starting from the SIM card security, mobile software security, and secure customer access to banking services. Banks rely on users having their mobile phones with them all the time. Hence, as a mean for security measures, banks can send alerts, anytime, in order to provide an enhanced security and

(IJCSIS) International Journal of Computer Science and Information Security, Vol. 8, No. 9, December 2010

http://sites.google.com/site/ijcsis/ ISSN 1947-5500

Page 13: Book of Abstract Volume 8 No 9 IJCSIS December 2010

IJCSIS 2010

services. This paper analyzes the security issues in Mobile Banking, and proposes an improved security to the mobile banking services using RFID. Key words: Mobile banking, security, RFID, Wireless communication, Pervasive Computing, smart cards, and contactless payment, wireless security, and e-commerce. 26. Paper 30111065: Parcel Management System using GPS Tracking Unit (pp. 183-189) Tahmina Khatoon 1, Md. Musfique Anwar 2, Nasrin Sultana Shume 2, Md. Mizanur Rahman 1 1 Computer Science & Engineering Department, IBAIS University, Dhaka, Bangladesh 2 Computer Science & Engineering Department, Jahangirnagar University, Dhaka, Bangladesh Abstract - In this paper, the proposed system overcomes the deficiencies of parcel management system for providing parcel information by using operational data extracted from a GPS tracking unit. A GPS tracking unit is a device that uses the Global Positioning System to determine the precise location of a vehicle to which it is attached and to record the position at regular intervals. The recorded location data can be transmitted to a central location database of a remote tracking server using satellite modem embedded in the unit. Tracking server also has satellite modem that receives vehicle location information. This allows the vehicle's location to be displayed against a map backdrop in real-time using customized software to authorized users of the system via website over the internet. Keywords: Parcel Management System, GPS, Tracking server, Satellite Modem. 27. Paper 30111081: Generation of Mutation Operators for AOP (pp. 190-194) Mayank Singh, Research Scholar, Uttarakhand Technical University, Dehradun, India Shailendra Mishra, Professor computer science department, KEC dwarahat, Uttarakhand, India Abstract- Testing of aspect oriented programs is an upcoming challenge for the researchers. Mutation testing has a lot to be undertaken to explore the field of testing of AOP. It is an emerging field of research in testing of aspect oriented programming. Since the effectiveness of mutation testing depends on finding fault types and designing of mutation operators, therefore the effectiveness of testing depends upon the quality of these mutation operators. A detailed study has done on the mutation operators for procedural and object oriented languages, but for aspect oriented language only few researchers had contributed. This paper discusses in detail about the fault types and related mutation operators for AspectJ language. It also proposes the implementation framework of mutation operators automatically. Keywords: Mutation Testing, Aspect orietend testing, fault based testing 28. Paper 30111049: Modelling Data Transmission through a Channel Based on Huffman Coding and Encryption Methods (pp. 195-199) Eugène C. Ezin Institut de Mathématiques et de Sciences Physiques, Unité de Recherche en Informatique et Sciences Appliquées, Université d’Abomey-Calavi, République du Bénin Abstract — Data transmission through a secure channel requires the attention of many researchers. In this paper, on the basis of an alphabet of ciphers and letters, we propose a model for data transmission through a secure channel. This is achieved at two levels. First we associate each distinct symbol with a probability in the message to transmit. By doing so, we modify the well known adaptive Huffman coding method. The obtained alphabet is used to construct the coded message to transmit through a cryptosystem. Therefore, the original message is coded and encrypted before its delivering. The proposed model is examined. Keywords-component—Data compression, Huffman coding technique, encryption and decryption algorithms.

(IJCSIS) International Journal of Computer Science and Information Security, Vol. 8, No. 9, December 2010

http://sites.google.com/site/ijcsis/ ISSN 1947-5500

Page 14: Book of Abstract Volume 8 No 9 IJCSIS December 2010

IJCSIS 2010

29. Paper 30111052: Performance Comparison of Multicast Routing Protocols In Ad-Hoc Wireless Networks (pp. 200-202) N. Veena, Dept. of CSE, A N University, Guntur A. VinayaBabu, Dept. of CSE, JNTU College of Engineering, Hyderabad K. Madhukar, Nizam College, Osmania University, Hyderabad B. Sujatha, Dept. of CSE, Nizam College, Hyderabad B. Anandkumar, Dept. of CSE, Rayalasima University, Kurnool. S. Nagaprasad, Dept. of CSE, Aacharya Nagarjuna University, Guntur Abstract- The majority of applications are in the areas where rapid deployment and dynamic reconfiguration are necessary and a wire line network is not available. These include military battlefields, emergency search and rescue sites, classrooms, and conventions, where participants share information dynamically using their mobile devices. Well established routing protocols do exist to offer efficient multicasting service in conventional wired networks. These protocols, having been designed for fixed networks, may fails to keep up with node movements and frequent topology changes in a MANET. Therefore, adapting existing wired multicast protocols as such to a MANET, which completely lacks infrastructure, appear less promising. Providing efficient multicasting over MANET faces many challenges, includes scalability, quality of service, reliable service, security, Address configuration, Applications for multicast over MANET. The existing multicast routing protocol do not addresses these issues effectively over Mobile Adhoc Networks (MANET). 30. Paper 30111060: A Proposed Ontology Based Architecture to Enrich the Data Semantics Syndicated by RSS Techniques in Egyptian Tax Authority (pp. 203-209) Ibrahim M El-Henawy, Faculty of computer and Informatics, Zagazig University, Zagazig, Egypt Mahmoud M Abd El-latif & Tamer E Amer, Faculty Of Computer and Information, Mansoura University, Mansoura, Egypt Abstract — RSS (RDF site summary) is a web content format used to provide extensible metadata description and syndication for large sharing, distribution and reuse across various applications; the metadata provided by the RSS could be a bit to describe the web resource; this paper provides a framework for making the RSS not only just for syndicating a little information about news but also for further classification, filtering operations and answering many questions about that news by modeling RSS ontology. The proposed architecture will be applied to handle announcements in the Egyptian Tax authority. Keywords- Semantic Web - RDF – Ontology – RSS – OWL –Protégé - Egyptian Tax 31. Paper 30111062: Distributed Task Allocation in Multi-Agent System Based on Decision Support Module (pp. 210-215) Sally M. El-Ghamrawy, Computers and Systems Department, Faculty of Engineering, Mansoura University, Egypt Ali I. El-Desouky, Computers and Systems Department, Faculty of Engineering, Mansoura University, Egypt Ahmed I. Saleh, Computers and Systems Department, Faculty of Engineering, Mansoura University, Egypt Abstract- A Multi-Agent System (MAS) is a branch of distributed artificial intelligence, composed of a number of distributed and autonomous agents. In MAS, an effective coordination is essential for autonomous agents to reach their goals. Any decision based on a foundation of knowledge and reasoning can lead agents into successful cooperation, so to achieve the necessary degree of flexibility in coordination, an agent requires making decisions about when to coordinate and which coordination mechanism to use. The performance of any MAS depends directly with the right decisions that the agents made. Therefore the agents must have the ability of making right decisions. In this paper, we propose a decision support module in a distributed multi-agent system, which enables any agent to make decisions needed for Task allocation

(IJCSIS) International Journal of Computer Science and Information Security, Vol. 8, No. 9, December 2010

http://sites.google.com/site/ijcsis/ ISSN 1947-5500

Page 15: Book of Abstract Volume 8 No 9 IJCSIS December 2010

IJCSIS 2010

problem; we propose an algorithm for Task Allocation Decision Maker (TADM). Furthermore, a number of experiments were performed to validate the effectiveness of the proposed algorithm (TADM)); we compare the efficiency of our algorithms with recent frameworks. The preliminary results demonstrate the efficiency of our algorithms Keywords: Decision Making, Task allocation, Coordination Mechanism, Multi-Agent System (MAS) 32. Paper 30111068: Multiplayer Enhanced Make Square Game in the Net (pp.216-223) Md. Ekramul Hamid, Department of network Engineering, College of Computer Science, King Khalid University, Abha, Kingdom of Saudi Arabia Sudip Saha, Software Engineer, Protocom Technology, Sydney, NSW-2000 , Australia Mohammed Qayyum, Department of Computer Engineering, College of Computer Science, King Khalid University, Abha, Kingdom of Saudi Arabia Abstract— In this work, the authors attempt to create a successful Java socket program to implement the “Make Square” game in the net. The game is very popular among the children. Even though this game is for kids, this one can also be played by an adult because it can be quite tricky, require concentration and a little bit of intelligence. The goal in this game is to make more small squares. A player will win the game, if he can complete maximum number of squares after the game is over. Here client/server technology is used to implement socket programming. Since the game is implemented by java, so it is platform independent and portable. Many players in many different groups can play the game on the net. To make the game more interesting we enhance its feature by adding hidden lines. This makes the game more attractive and challenging. The Java features like Networking, Graphics, Layout Management, Package and Interface, Exception Handling, I/O, Applets, AWT Controls and Event handling etc. [2-4] are used to create the game. The Make Square game consists of more than 1700 lines of code in 12 classes. Five of these classes are part of the server side and rest seven is part of the client side. The Make Square game is running properly in a network. Keywords-component; Make Square, node, socket programming, AWT, 3D object, GUI, client/server technology 33. Paper 21111008: Descriptive System for Creating Awareness In The Electoral Process In Nigeria Using Information Technology (pp. 224-229) B. A. Onyekwelu, Department Of Computer Science, Joseph Ayo Babalola University, Ikeji-Arakeji, Osun State Dr. D.T. Akomolafe, MBCS, Department Of Computer Science, Joseph Ayo Babalola University, Ikeji- Arakeji, Osun State, Nigeria Abstract – Knowledge is power, as is popularly said, and lack of knowledge of the electoral process of one’s nation makes one a subject, rather than citizen. What makes the difference between citizens and subjects is the type and volume of information possessed. This paper discusses the electoral process in Nigeria in relation to the principal actors in the process, namely, the electorates, the political players, the electoral body, the Judiciary and the Government. They roles of each principal actor are highlighted. The current state of awareness of the electoral process in Nigeria is explained as well as factors leading to this state. Information Technology and its growth in Nigeria are reviewed. The Methodology for creating people’s awareness towards the electoral process in Nigeria is proposed and evaluated. The challenges facing the advancement of Information Technology in the country are enumerated and a conclusion is drawn. Keywords: electoral process, information, Nigeria, Government, Technology.

(IJCSIS) International Journal of Computer Science and Information Security, Vol. 8, No. 9, December 2010

http://sites.google.com/site/ijcsis/ ISSN 1947-5500

Page 16: Book of Abstract Volume 8 No 9 IJCSIS December 2010

IJCSIS 2010

34. Paper 24111022: Enchancing and Deriving Actionable Knowledge from Decision Trees (pp. 230-236) P. Senthil Vadivu, HEAD, Department Of Computer Applications, Hindusthan College Of Arts and Science, Coimbatore-641028. Tamil Nadu, India Dr.(Mrs) Vasantha Kalyani David, Associate Professor, Department of Computer Science, Avinashilingam Deemed University, Coimbatore, Tamil Nadu, India Abstract - Data mining algorithms are used to discover customer models for distribution information, Using customer profiles in customer relationship management (CRM), it has been used in pointing out the customers who are loyal and who are attritors but they require human experts for discovering knowledge manually. Many post processing technique have been introduced that do not suggest action to increase the objective function such as profit. In this paper, a novel algorithm is proposed that suggest actions to change the customer from the undesired status to the desired one. These algorithms can discover cost effective actions to transform customer from undesirable classes to desirable ones. Many tests have been conducted and experimental results have been analyzed in this paper. Keywords: CRM,BSP,ACO, decision trees, attrition 35. Paper 24111023: Constructing Models for MicroArray Data with Swarm Algorithm (pp. 237-242) Mrs. Aruchamy Rajini, Lecturer in Computer Applications, Hindusthan College of Arts & Science, Coimbatore Dr.(Mrs) Vasantha Kalyani David, Associate Professor, Department of Computer Science, Avinashilingam Deemed University, Coimbatore, Tamil Nadu, India Abstract - Building a model plays an important role in DNA microarray data. An essential feature of DNA microarray data sets is that the number of input variables (genes) is far greater than the number of samples. As such, most classification schemes employ variable selection or feature selection methods to pre-process DNA microarray data. In this paper Flexible Neural Tree (FNT) model for gene expression profiles classification is done. Based on the predefined instruction/operator sets, a flexible neural tree model can be created and evolved. This framework allows input variables selection, over-layer connections and different activation functions for the various nodes involved. The FNT structure is developed using the Ant Colony Optimization (ACO) and the free parameters embedded in the neural tree are optimized by Particle Swarm Optimization (PSO) algorithm and its enhancement (EPSO). The purpose of this research is to find the model which is an appropriate model for feature selection and tree-based ensemble models that are capable of delivering high performance classification models for microarray data. Keywords --- DNA, FNT, ACO, PSO, EPSO 36. Paper 24111025: Improved Content Based Image Retrieval Using Color Histogram And Self Organizing Maps (pp. 243-248) R. Priya, HOD I/c, Dept of Computer Science, Sree Narayana Guru College, Coimbatore,India Dr.(Mrs) Vasantha Kalyani David, Associate Professor, Department of Computer Science, Avinashilingam Deemed University, Coimbatore, Tamil Nadu, India Abstract - Color is a feature of the great majority of content-based image retrieval systems. The conventional color histogram retrieval method is prone to lose the spatial information of colors. This paper proposes two methods; one combines color histograms with spatial information and the second which uses a dimensionality reduction technique that reduces the number of features. The experimental results show that the recall /precision and retrieval time of the proposed method is better than other methods. Keywords – content-based image retrieval, color histogram, spatial information, Self Organizing Map

(IJCSIS) International Journal of Computer Science and Information Security, Vol. 8, No. 9, December 2010

http://sites.google.com/site/ijcsis/ ISSN 1947-5500

Page 17: Book of Abstract Volume 8 No 9 IJCSIS December 2010

IJCSIS 2010

37. Paper 30111039: Building an Energy-Efficient Prediction S-MAC Protocol for Wireless Networks (pp. 249-260) Mahmoud Abdel-Aziz El-Sakhawy Othman, Information Technology Sector, Egyptian Financial Supervisory Authority (EFSA). Prof. Dr. Imane Aly Saroit Ismail, Vice Dean for Education & Student Affairs, Faculty of Computers & Information, Cairo University Abstract— With the rapid development of wireless networking and micro-electro-mechanical systems (MEMS), wireless sensor networks (WSNs) have been immerged. WSNs consist of large amount of small, low-end, resource constrained devices, called sensors. Since sensor nodes are usually intended to be deployed in unattended or even hostile environments, it is almost impossible to recharge or replace their batteries. One of the most important research issues in the wireless sensor networks is to extend the network lifetime by energy efficient battery management. So, there are a lot of approaches that are designed to reduce the power consumption of the wireless sensor nodes. In this paper; a new protocol named "prediction S-MAC protocol" is proposed to reduce the power consumption of the wireless sensor nodes and to improve their performance compared to the previous S-MAC protocols. Keywords - Wireless sensor network; Sensor medium access control (S-MAC) protocol; periodic listen and sleep; adaptive listen, prolong listen, prediction S-MAC protocol. 38. Paper 30111066: Simulation of Grover’s Algorithm Quantum Search in a Classical Computer (pp. 261-269) A.B. Mutiara, & R. Refianti Faculty of Computer Science and Information Technology, Gunadarma University, Jl. Margonda Raya No.100, Depok 16464, Indonesia Abstract— The rapid progress of computer science has been accompanied by a corresponding evolution of computation, from classical computation to quantum computation. As quantum computing is on its way to becoming an established discipline of computing science, much effort is being put into the development of new quantum algorithms. One of quantum algorithms is Grover's algorithm, which is used for searching an element in an unstructured list of N elements with quadratic speed-up over classical algorithms. In this work, Quantum Computer Language (QCL) is used to make a Grover's quantum search simulation in a classical computer document. Keywords: Grover’s Algorithm, Quantum Computer Language, Hadamard-Transform 39. Paper 30111071: Implementation of a new Fuzzy Based Load Balancing Algorithm for Hypercubes (pp. 270-274) Sameena Naaz ,& Afshar Alam, Department of Computer Science, Jamia Hamdard, Hamdard University New Delhi, India Ranjit Biswas, Institute of Technology and Management, Gurgaon, Haryana Abstract — Distributed computing systems are becoming increasingly available because of the rapid decrease in hardware cost and the advances in computer networking technologies.. It is frequently observed that in a computing environment with a number of hosts connected by a network, the hosts are often loaded differently. In typical distributed system task arrive at the different nodes in random fashion. This causes a situation of non-uniform load across the different nodes. Load imbalance is observed by existence of nodes that are highly loaded while the others are lightly loaded or even idle. Such situation is harmful to the system performance in terms of response time and resource utilization. In the work presented in this paper we have tried to analyze the effect of using fuzzy logic to deal with the problem of load balancing in hypercube model. Keywords - Load Balancing, Fuzzy Logic, Hypercubes, Response Time

(IJCSIS) International Journal of Computer Science and Information Security, Vol. 8, No. 9, December 2010

http://sites.google.com/site/ijcsis/ ISSN 1947-5500

Page 18: Book of Abstract Volume 8 No 9 IJCSIS December 2010

IJCSIS 2010

40. Paper 23111017: Towards a better assessment of the durations in PERT Method (pp. 275-281) Nasser Eddine MOUHOUB, Computer science department, Sétif University, Algeria Hocine BELOUADAH, Computer science department, M'sila University, Algeria Abdelhak BOUBETRA, Computer science department, Bordj Bou Arréridj University, Algeria Abstract— During many years, two of the most popular approaches to the project management were used. It is about the critical path method (CPM) and the PERT method (Program and Evaluation Review Technique). They were based on modeling by digraphs. CPM is unaware of the stochastic nature of the activities and brings back the model to a deterministic model. PERT holds in account this case but the estimation of the activities is despoiled with several errors. In this paper, this technique is presented. It will be followed by an analysis, criticisms and new proposals to make corrections to this method. Keywords - Critical Path Method (CPM), PERT method, stochastic PERT 41. Paper 30111041: Network Anomaly Detection and Visualization using Combined PCA and Adaptive Filtering (pp. 282-284) Altyeb Altaher & Sureswaran Ramadass NAv6 Center of Excellence, Universiti Sains Malaysia USM, 11800 Penang, Malaysia Noureldien Abdelrahman & Ahmed Khalid Faculty of Computer Sciences and IT, University of Sciences and Technology, Sudan Abstract - In recent years network anomaly detection has become an important area for both commercial interests as well as academic research. This paper provides a Combined Principal Component Analysis (PCA) and Filtering Technique for efficient and effective detection and identification of network anomalies. The proposed technique consists of two stages to detect anomalies with high accuracy. First, we apply the Principal Components Analysis to transform the data to a new coordinate system such that the projection on the coordinate contains the greatest variance. Second, we filter traffic to separate between the normal and anomalous traffic using adaptive threshold. Our analysis results from network-wide traffic datasets show that our proposed provides high detection rate, with the added advantage of lower complexity Keywords- Network anomaly detection, principal component analysis , network anomaly visualization, adaptive network traffic filter. 42. Paper 30111045: A Two Dimensional Approach to Back and Forth Software Process Model (pp. 285-291) Sameera Amjad, Wasi Haider Butt, Farooque Azam Department of Computer Engineering, College of Electrical & Mechanical Engineering, National University of Science & Technology (NUST), Rawalpindi, Islamabad Abstract— Many software development process models have been documented but none of them gives a detailed methodology for change management. This article proposes a novel software development process model which realizes the inherent nature of requirement changes and provides a methodology to accommodate these changes. A detailed literature survey was conducted to explain the difference of the proposed model with existing software development approaches. The proposed novel model namely, the Back and Forth software process model uses two methods to present the development methodology. Keywords- Software Development Life Cycle; Software Process Models

(IJCSIS) International Journal of Computer Science and Information Security, Vol. 8, No. 9, December 2010

http://sites.google.com/site/ijcsis/ ISSN 1947-5500

Page 19: Book of Abstract Volume 8 No 9 IJCSIS December 2010

IJCSIS 2010

43. Paper 30111051: Performance Comparison of Block Truncation Coding based Image Retrieval Techniques using Assorted Color Spaces (pp. 292-297) Dr. H.B. Kekre, Senior Professor, Computer Engg. Dept., MPSTME, SVKM’s NMIMS University, Mumbai, India Sudeep D.Thepade, Ph.D. Research Scholar & Associate Professor, Computer Engg. Dept. MPSTME, SVKM’s NMIMS University, Mumbai, India Varun Lodha, Pooja Luthra, Ajoy Joseph, Chitrangada Nemani B.Tech (IT) Students, MPSTME, SVKM’s NMIMS University, Mumbai, India Abstract— The paper presents exhaustive performance comparison of image retrieval techniques based on block truncation coding (BTC) using assorted color spaces. Including RGB total ten color spaces are considered for applying BTC to extract the feature vector in CBIR techniques. Further the image tiling is added to get three CBIR techniques per color space. In all performance comparison of thirty image retrieval techniques is done with the help of generic image database having 1000 images spread across 11 categories. For each proposed CBIR technique 55 queries (5 per category) are fired on the generic image database. To compare the performance of image retrieval techniques average precision and recall are computed of all queries. The results have shown the performance improvement (higher precision and recall values) with proposed color-BTC methods compared to gray-BTC in all color spaces except ‘rgb’ color space. Image tiling does not help to improve the performance in the chromaticity-luminance based color spaces (Kekre’s LUV, YCbCr, YUV, YIQ, Kekre’s YCgCb), while it helps in non-luminance color spaces (RGB, HSV, XYZ, HIS). Oveall Kekre’s LUV color space based BTC gives best performance in image retrieval. Keywords — CBIR,BTC, Color Space, Image Tiling, VQ,RGB, HSV, XYZ, HIS, rgb, Kekre’s LUV, YCbCr, YUV, YIQ, Kekre’s YCgCb 44. Paper 30111055: Development of a Project-Based Learning Approach in Requirement Engineering (pp. 298-303) Nor Azliana Akmal Jamaludin, Fakulti Industri Teknologi Maklumat, Universiti Industri Selangor,Kampus Bestari Jaya, Jalan Timur Tambahan, 45600 Bestari Jaya, Selangor, Malaysia. Shamsul Sahibuddin, Advanced Informatics School, UTM International Campus, Universiti Teknologi Malaysia, Malaysia Jalan Semarak, 54100 Kuala Lumpur Malaysia Kamaruzaman Jusoff (Corresponding author) Faculty of Forestry, Universiti Putra Malaysia, Serdang 43400, Selangor. Malaysia Nur Hafizah Hidayat, Fakulti Industri Teknologi Maklumat, Universiti Industri Selangor, Kampus Bestari Jaya, Jalan Timur Tambahan, 45600 Bestari Jaya, Selangor, Malaysia. Abstract— Project failure is due to the lack of Requirement Engineering (RE) practice. The Industry needs to allocate another cost to send their employee for additional training before the employee can contribute to the job specification. It indicates that current practices of delivery mechanisms at the university fail to deliver graduates with employability skills. The objective of this research is to identify weaknesses in current practice of teaching Software Engineering undergraduate in Requirement Engineering. Additionally, this paper emphasized that Project-Based Learning (PjBL) is a right method for delivery mechanisms to enhance Software Engineering undergraduate skills particularly in RE. The PjBL is a superset to Problem-Based Learning, Individual-Collaborative Learning and Product-Based Learning. The intersection can strongly assist in the learning environment. Future work should be carried out to design the framework of PjBL, measuring the effectiveness of PjBL and the electronic Learning eNvironment (eLIN) system as a supportive tools to make PjBL successful. Keywords- Software Engineering education; Project-Based Learning (PjBL); Requirement Engineering; Problem-Based Learning; Individual & Collaborative Problem Solving and Product-Based Learning.

(IJCSIS) International Journal of Computer Science and Information Security, Vol. 8, No. 9, December 2010

http://sites.google.com/site/ijcsis/ ISSN 1947-5500

Page 20: Book of Abstract Volume 8 No 9 IJCSIS December 2010

IJCSIS 2010

45. Paper 30111061: Adaptation of GQM Method for Evaluating the Performance of Software Project Manager (pp. 304-307) Nagy Ramadan Darwish, Department of Computer and Information Sciences, Institute of Statistical Studies and Research, Cairo University Cairo, Egypt Mahmoud M. Abd Ellatif, Department of Information Systems, Faculty of Computers and Information, Mansoura University Mansoura, Egypt Abstract—This paper is concerned with evaluating the performance of software project manager using Goal Question Metrics (GQM) method. It clarifies the Software Project Management (SPM) domains and the performance metrics of each domain. This paper presents the basic concepts of GQM method. Based on a combination of statistical techniques, this paper presents how to apply GQM method to evaluate the performance of a software project manager. A software company can use the proposed approach to track, evaluate, control, correct, and enhance the performance of software project managers to increase the success rate of software projects. Keywords: Software ;Project Manager; Performance; Evaluation - GQM – Metrics – Performance Report 46. Paper 30111069: Adaptive E-Learning System based on Semantic Web and Fuzzy Clustering (pp. 308-315) Khaled M. Fouad, Computer Science Dep. - Community College - Taif University, Kingdom of Saudi Arabia (KSA) Mofreh A. Hogo, Computer Science Dep. – Computers and Information Systems College - Taif University, Kingdom of Saudi Arabia (KSA). Shehab Gamalel-Din, Computers Dept, Faculty of Science, King Abdul-Aziz University, Kingdom of Saudi Arabia (KSA) Nagdy M. Nagdy, Systems and Computers Engineering Dep. – Faculty of Engineering – AlAzhar University, Egypt. Abstract— This work aims at developing an adaptive e-learning system with high performance to reduce the challenges faces elearners, the instructors and provides a good monitoring system for the complete e-learning systems as well as the system structure. The work presents the different phases for the system development of the adaptive system as: the first stage is the collection of the e-learners documents, the second stag is the documents representation including the frequency count and the weighting of the documents with its frequencies, the third stage is the prediction and clustering of e-learners interests using the fuzzy clustering method and the statistical K-means clustering method. The results obtained from this work shows that we have to have different e-learners ontologies using the results of the clustering methods which reflect the e-learners interests. Finally the work concluded the suggestions as well as the recommendations for the instructors and the systems administrators. Keywords-component; E-Learning; Semantic Web; Fuzzy Clustering; User model; User Model Representation 47. Paper 30111072: An Innovated Server-Based Desktop Sharing Platform (pp. 316-324) Ayad H. Abdulqader, Salah Noori Saleh, Omar Amer Abouabdalla, Sureswaran Ramadas, National Advance IPv6 Centre of Excellence (NAv6), USM, 11800 Penang, Malaysia Hasan S. M. Al-Khaffaf, School of Computer Science, USM, 11800 Penang, Malaysia Abstract - In this paper, a server-based Desktop Sharing Platform (DSP) is proposed. The proposed platform is designed to work with any direct-connection Remote Desktop System (RDS) without modifying or adding any extra models to those systems for both server’s and clients’ sides. The existing RDS systems’ limitations in terms of bandwidth consumption, collaboration session initiation, and connectivity issues will be overcome by adopting the proposed platform. The proposed platform is easily adapted to work with any direct-connection RDS system. Incorporating the proposed platform will improve the performance and

(IJCSIS) International Journal of Computer Science and Information Security, Vol. 8, No. 9, December 2010

http://sites.google.com/site/ijcsis/ ISSN 1947-5500

Page 21: Book of Abstract Volume 8 No 9 IJCSIS December 2010

IJCSIS 2010

efficiency of existing RDS systems. As a result, better utilization of computer system resources in terms of bandwidth and processing power is achieved by minimizing the data transfer and processing power from n users to only one user. Keywords- Computer Supported Cooperative Work; Remote Display System; Thin-Client Computing 48. Paper 30111073: Design of Hybrid Ontologies for Mediation System Applied to the E-learning Platform (pp. 325-329) Otman ABDOUN, Laboratory LIST,ERIT, FST – Tangier, Tangier, Morocco Jaber EL BOUHDIDI, Laboratory LIST, FST – Tangier, Tangier, Morocco Mohamed GHAILANI, Laboratory LIST, FST – Tangier, Tangier, Morocco Abdelhadi FENNAN, Laboratory LIST, FST – Tangier, Tangier, Morocco Abstract—This work falls within the scope of E-learning is important for several reasons. First, resources are structured (educational needs) and therefore easier to annotate. Second, there is a curriculum (or Education Plan) that ensures the semantic integration of resources. Third, services are available to the teacher and learner. And finally, post evaluation of knowledge acquired by the learner, to verify the adequacy of resources presented to the learner, and indirectly the appropriateness of teaching strategies implemented to follow up resources and services. First of all, it describes the problems of integrating multiple sources of educational and placed in the ontology integration process, then treated mediation services, and their contribution on an E-learning platform. Keywords- E-learning; Mediation Services; Hybrid Ontologies 49. Paper 30111074: Extracting Membership Functions Using ACS Method via Multiple Minimum Supports (pp. 330-336) Ehsan Vejdani Mahmoudi, Islamic Azad University, Mashhad Branch, Young Researchers Club, Mashhad, Iran Masood Niazi Torshiz, Department of computer Engineering, Islamic Azad University - Mashhad Branch, Mashhad, Iran Mehrdad Jalali, Department of computer Engineering, Islamic Azad University - Mashhad Branch, Mashhad, Iran Abstract— Ant Colony Systems (ACS) have been successfully applied to different optimization issues in recent years. However, only few works have been done by employing ACS method to data mining. This paper addresses the lack of investigations on this study by proposing an ACS -based algorithm to extract membership functions in fuzzy data mining. In this paper, the membership functions were encoded into binary bits, and then they have given to the ACS method to discover the optimum set of membership functions. By considering this approach, a comprehensive exploration can be executed to implement the system automation. Therefore, it is a new frontier, since the proposed model does not require any user-specified threshold of minimum support. Hence, we evaluated our approach experimentally and could reveal this approach by significant improving of membership functions. Keywords- fuzzy data mining; multiple minimum supports; association rule; membership functions; ant colony system. 50. Paper 31101085: Enhancing K-Means Algorithm with Semi-Unsupervised Centroid Selection Method (pp. 337-343) R. Shanmugasundaram and Dr. S. Sukumaran Abstract— The k-means algorithm is one of the frequently used clustering methods in data mining, due to its performance in clustering massive data sets. The final clustering result of the kmeans clustering algorithm is based on the correctness of the initial centroids, which are selected randomly. The original k-

(IJCSIS) International Journal of Computer Science and Information Security, Vol. 8, No. 9, December 2010

http://sites.google.com/site/ijcsis/ ISSN 1947-5500

Page 22: Book of Abstract Volume 8 No 9 IJCSIS December 2010

IJCSIS 2010

means algorithm converges to local minimum, not the global optimum. The k-means clustering performance can be enhanced if the initial cluster centers are found. To find the initial cluster centers a series of procedure is performed. Data in a cell is partitioned using a cutting plane that divides cell in two smaller cells. The plane is perpendicular to the data axis with very high variance and is intended to minimize the sum squared errors of the two cells as much as possible, while at the same time keep the two cells far apart as possible. Cells are partitioned one at a time until the number of cells equals to the predefined number of clusters, K. The centers of the K cells become the initial cluster centers for K-means. In this paper, an efficient method for computing initial centroids is proposed. A Semi Unsupervised Centroid Selection Method is used to compute the initial centroids. Gene dataset is used to experiment the proposed approach of data clustering using initial centroids. The experimental results illustrate that the proposed method is very much apt for the gene clustering applications. Index Terms— Clustering algorithm, K-means algorithm, Data partitioning, initial cluster centers, semi-unsupervised gene selection 51. Paper 31101086: A Survey on Static Power Optimization in VLSI (pp. 344-349) A. Janaki Rani and Dr. S. Malarkkan Abstract---Power has become one of the primary constraints for both the high performance and portable system design. The growing market of battery powered electronic systems like cellular phones, personal digital assistants demands the design of microelectronic circuits with low power consumption. Power dissipation in these systems may be divided into two major components namely static and dynamic power dissipation. The static power is the standby power that is wasted even if the device is not performing any function. As technology scales down the static power dissipation is dominant in VLSI circuits which are mainly due to leakage current in transistors. Hence a focus is necessary on the leakage currents. These leakage currents are mainly due to sub-threshold leakage and gate oxide leakage. The sub-threshold leakage is dominant which can be minimized by reducing the supply voltage, reducing the transistor size, decreasing the temperature and increasing the threshold voltage. In this paper a survey is presented on static power optimization in VLSI. It presents the possible solutions to reduce the leakage power in various digital logic circuits like CMOS, I2C etc. Index Terms—Leakage, Low-Power, Power Gating, Semicustom, Input Vector Control, Body Bias Control, Sleep Transistor Sizing, Sleepy Stack, Zigzag Power Gating (ZPG) 52. Paper 31101087: A Survey on Minimizing Energy Consumption of VLSI Processors Using Multiple Supply Voltages (pp. 350-355) B. Sathiyabama and Dr. S. Malarkkan Abstract—Due to the continuous increase in earth's population, adequate supply of resources is going to be a major issue. One basic essential resource in rising demand is energy and in particular electrical energy. The contributions of the scientific community toward the goal of sustainability with regard to energy consumption of embedded systems are previously discussed in many research works. Low power has become one of the major design issues due to the increased demand in personal computing devices and portable communication system. In this paper a survey on minimizing energy consumption of VLSI Processors using multiple supply voltages is presented. This survey discusses on search method for a scheduling and module selection problem using multiple supply voltages so as to minimize dynamic energy consumption under time and area constraints. The algorithm based on a genetic algorithm is surveyed to find near-optimal solutions in a short time for large-size problems. The literature related to the multiple supply voltages with genetic approach and energy consumption minimization in various VLSI systems is presented. Keywords— Energy minimization, Functional pipelining, Multiple supply voltages, dynamic power, scheduling

(IJCSIS) International Journal of Computer Science and Information Security, Vol. 8, No. 9, December 2010

http://sites.google.com/site/ijcsis/ ISSN 1947-5500

Page 23: Book of Abstract Volume 8 No 9 IJCSIS December 2010

IJCSIS 2010

53. Paper 26111028: System Integration for Smart Paperless Ship (pp. 356-364) O. Sulaiman, A.H. Saharuddin, Faculty of Maritime Studies and Marine Science, Univeristy Malaysia Terengganu, Kuala Terengganu, Malaysia A.B.S. Kader, Faculty of Mechanical -Marine Technology, University Technology Malaysia, Kuala Terengganu, Malaysia Abstract— Sea Transportation provides a safe and reliable source for moving people and cargo across the ocean. The government and private sector provide these services, while the Government moves personnel and cargo to support global peacekeeping activities while the civilian sea transportation activities focus on providing leisure cruises and the shipment of consumer goods. These safe and efficient services are obtained through the cooperative efforts of the government and civilian sea carriers, and seaports throughout the world required connectivity raging from within ship system integration and ship sore operation, which has been much facilitated by evolution of computer age. The use of the use of new information technology and interfacing all the associated service areas of maritime industry- sea and shore has lead to reducing papers and hence cutting of threes and beneficial environmental benefit of excess water absorption and greater capture of carbon dioxide. Human race has achieved much civilization and development in recent years until it seem as development is closed to the peak. However, new philosophy under are being promoted in recent years include proactive behaviors, recycling, system integration and conservation to make all what has been built meaningful and efficient. This paper discuss how system integration under smart ship concept within ship and shore. Keywords- sytem integration, paperless, ship, elecronics waste

(IJCSIS) International Journal of Computer Science and Information Security, Vol. 8, No. 9, December 2010

http://sites.google.com/site/ijcsis/ ISSN 1947-5500

Page 24: Book of Abstract Volume 8 No 9 IJCSIS December 2010

(IJCSIS) International Journal of Computer Science and Information Security, Vol. 8, No. 9, December 2010

IJCSIS REVIEWERS’ LIST Assist Prof (Dr.) M. Emre Celebi, Louisiana State University in Shreveport, USA

Dr. Lam Hong Lee, Universiti Tunku Abdul Rahman, Malaysia

Dr. Shimon K. Modi, Director of Research BSPA Labs, Purdue University, USA

Dr. Jianguo Ding, Norwegian University of Science and Technology (NTNU), Norway

Assoc. Prof. N. Jaisankar, VIT University, Vellore,Tamilnadu, India

Dr. Amogh Kavimandan, The Mathworks Inc., USA

Dr. Ramasamy Mariappan, Vinayaka Missions University, India

Dr. Yong Li, School of Electronic and Information Engineering, Beijing Jiaotong University, P.R. China

Assist. Prof. Sugam Sharma, NIET, India / Iowa State University, USA

Dr. Jorge A. Ruiz-Vanoye, Universidad Autónoma del Estado de Morelos, Mexico

Dr. Neeraj Kumar, SMVD University, Katra (J&K), India

Dr Genge Bela, "Petru Maior" University of Targu Mures, Romania

Dr. Junjie Peng, Shanghai University, P. R. China

Dr. Ilhem LENGLIZ, HANA Group - CRISTAL Laboratory, Tunisia

Prof. Dr. Durgesh Kumar Mishra, Acropolis Institute of Technology and Research, Indore, MP, India

Jorge L. Hernández-Ardieta, University Carlos III of Madrid, Spain

Prof. Dr.C.Suresh Gnana Dhas, Anna University, India

Mrs Li Fang, Nanyang Technological University, Singapore

Prof. Pijush Biswas, RCC Institute of Information Technology, India

Dr. Siddhivinayak Kulkarni, University of Ballarat, Ballarat, Victoria, Australia

Dr. A. Arul Lawrence, Royal College of Engineering & Technology, India

Mr. Wongyos Keardsri, Chulalongkorn University, Bangkok, Thailand

Mr. Somesh Kumar Dewangan, CSVTU Bhilai (C.G.)/ Dimat Raipur, India

Mr. Hayder N. Jasem, University Putra Malaysia, Malaysia

Mr. A.V.Senthil Kumar, C. M. S. College of Science and Commerce, India

Mr. R. S. Karthik, C. M. S. College of Science and Commerce, India

Mr. P. Vasant, University Technology Petronas, Malaysia

Mr. Wong Kok Seng, Soongsil University, Seoul, South Korea

Mr. Praveen Ranjan Srivastava, BITS PILANI, India

Mr. Kong Sang Kelvin, Leong, The Hong Kong Polytechnic University, Hong Kong

Mr. Mohd Nazri Ismail, Universiti Kuala Lumpur, Malaysia

Dr. Rami J. Matarneh, Al-isra Private University, Amman, Jordan

Dr Ojesanmi Olusegun Ayodeji, Ajayi Crowther University, Oyo, Nigeria

Dr. Riktesh Srivastava, Skyline University, UAE

Dr. Oras F. Baker, UCSI University - Kuala Lumpur, Malaysia

Dr. Ahmed S. Ghiduk, Faculty of Science, Beni-Suef University, Egypt

and Department of Computer science, Taif University, Saudi Arabia

Page 25: Book of Abstract Volume 8 No 9 IJCSIS December 2010

(IJCSIS) International Journal of Computer Science and Information Security, Vol. 8, No. 9, December 2010

Mr. Tirthankar Gayen, IIT Kharagpur, India

Ms. Huei-Ru Tseng, National Chiao Tung University, Taiwan

Prof. Ning Xu, Wuhan University of Technology, China

Mr Mohammed Salem Binwahlan, Hadhramout University of Science and Technology, Yemen

& Universiti Teknologi Malaysia, Malaysia.

Dr. Aruna Ranganath, Bhoj Reddy Engineering College for Women, India

Mr. Hafeezullah Amin, Institute of Information Technology, KUST, Kohat, Pakistan

Prof. Syed S. Rizvi, University of Bridgeport, USA

Mr. Shahbaz Pervez Chattha, University of Engineering and Technology Taxila, Pakistan

Dr. Shishir Kumar, Jaypee University of Information Technology, Wakanaghat (HP), India

Mr. Shahid Mumtaz, Portugal Telecommunication, Instituto de Telecomunicações (IT) , Aveiro, Portugal

Mr. Rajesh K Shukla, Corporate Institute of Science & Technology Bhopal M P

Dr. Poonam Garg, Institute of Management Technology, India

Mr. S. Mehta, Inha University, Korea

Mr. Dilip Kumar S.M, University Visvesvaraya College of Engineering (UVCE), Bangalore University,

Bangalore

Prof. Malik Sikander Hayat Khiyal, Fatima Jinnah Women University, Rawalpindi, Pakistan

Dr. Virendra Gomase , Department of Bioinformatics, Padmashree Dr. D.Y. Patil University

Dr. Irraivan Elamvazuthi, University Technology PETRONAS, Malaysia

Mr. Saqib Saeed, University of Siegen, Germany

Mr. Pavan Kumar Gorakavi, IPMA-USA [YC]

Dr. Ahmed Nabih Zaki Rashed, Menoufia University, Egypt

Prof. Shishir K. Shandilya, Rukmani Devi Institute of Science & Technology, India

Mrs.J.Komala Lakshmi, SNR Sons College, Computer Science, India

Mr. Muhammad Sohail, KUST, Pakistan

Dr. Manjaiah D.H, Mangalore University, India

Dr. S Santhosh Baboo, D.G.Vaishnav College, Chennai, India

Prof. Dr. Mokhtar Beldjehem, Sainte-Anne University, Halifax, NS, Canada

Dr. Deepak Laxmi Narasimha, Faculty of Computer Science and Information Technology, University of

Malaya, Malaysia

Prof. Dr. Arunkumar Thangavelu, Vellore Institute Of Technology, India

Mr. M. Azath, Anna University, India

Mr. Md. Rabiul Islam, Rajshahi University of Engineering & Technology (RUET), Bangladesh

Mr. Aos Alaa Zaidan Ansaef, Multimedia University, Malaysia

Dr Suresh Jain, Professor (on leave), Institute of Engineering & Technology, Devi Ahilya University, Indore

(MP) India,

Dr. Mohammed M. Kadhum, Universiti Utara Malaysia

Mr. Hanumanthappa. J. University of Mysore, India

Mr. Syed Ishtiaque Ahmed, Bangladesh University of Engineering and Technology (BUET)

Mr Akinola Solomon Olalekan, University of Ibadan, Ibadan, Nigeria

Page 26: Book of Abstract Volume 8 No 9 IJCSIS December 2010

(IJCSIS) International Journal of Computer Science and Information Security, Vol. 8, No. 9, December 2010

Mr. Santosh K. Pandey, Department of Information Technology, The Institute of Chartered Accountants of

India

Dr. P. Vasant, Power Control Optimization, Malaysia

Dr. Petr Ivankov, Automatika - S, Russian Federation

Dr. Utkarsh Seetha, Data Infosys Limited, India

Mrs. Priti Maheshwary, Maulana Azad National Institute of Technology, Bhopal

Dr. (Mrs) Padmavathi Ganapathi, Avinashilingam University for Women, Coimbatore

Assist. Prof. A. Neela madheswari, Anna university, India

Prof. Ganesan Ramachandra Rao, PSG College of Arts and Science, India

Mr. Kamanashis Biswas, Daffodil International University, Bangladesh

Dr. Atul Gonsai, Saurashtra University, Gujarat, India

Mr. Angkoon Phinyomark, Prince of Songkla University, Thailand

Mrs. G. Nalini Priya, Anna University, Chennai

Dr. P. Subashini, Avinashilingam University for Women, India

Assoc. Prof. Vijay Kumar Chakka, Dhirubhai Ambani IICT, Gandhinagar ,Gujarat

Mr Jitendra Agrawal, : Rajiv Gandhi Proudyogiki Vishwavidyalaya, Bhopal

Mr. Vishal Goyal, Department of Computer Science, Punjabi University, India

Dr. R. Baskaran, Department of Computer Science and Engineering, Anna University, Chennai

Assist. Prof, Kanwalvir Singh Dhindsa, B.B.S.B.Engg.College, Fatehgarh Sahib (Punjab), India

Dr. Jamal Ahmad Dargham, School of Engineering and Information Technology, Universiti Malaysia Sabah

Mr. Nitin Bhatia, DAV College, India

Dr. Dhavachelvan Ponnurangam, Pondicherry Central University, India

Dr. Mohd Faizal Abdollah, University of Technical Malaysia, Malaysia

Assist. Prof. Sonal Chawla, Panjab University, India

Dr. Abdul Wahid, AKG Engg. College, Ghaziabad, India

Mr. Arash Habibi Lashkari, University of Malaya (UM), Malaysia

Mr. Md. Rajibul Islam, Ibnu Sina Institute, University Technology Malaysia

Professor Dr. Sabu M. Thampi, .B.S Institute of Technology for Women, Kerala University, India

Mr. Noor Muhammed Nayeem, Université Lumière Lyon 2, 69007 Lyon, France

Dr. Himanshu Aggarwal, Department of Computer Engineering, Punjabi University, India

Prof R. Naidoo, Dept of Mathematics/Center for Advanced Computer Modelling, Durban University of

Technology, Durban,South Africa

Prof. Mydhili K Nair, M S Ramaiah Institute of Technology(M.S.R.I.T), Affliliated to Visweswaraiah

Technological University, Bangalore, India

M. Prabu, Adhiyamaan College of Engineering/Anna University, India

Mr. Swakkhar Shatabda, Department of Computer Science and Engineering, United International University,

Bangladesh

Dr. Abdur Rashid Khan, ICIT, Gomal University, Dera Ismail Khan, Pakistan

Mr. H. Abdul Shabeer, I-Nautix Technologies,Chennai, India

Dr. M. Aramudhan, Perunthalaivar Kamarajar Institute of Engineering and Technology, India

Page 27: Book of Abstract Volume 8 No 9 IJCSIS December 2010

(IJCSIS) International Journal of Computer Science and Information Security, Vol. 8, No. 9, December 2010

Dr. M. P. Thapliyal, Department of Computer Science, HNB Garhwal University (Central University), India

Dr. Shahaboddin Shamshirband, Islamic Azad University, Iran

Mr. Zeashan Hameed Khan, : Université de Grenoble, France

Prof. Anil K Ahlawat, Ajay Kumar Garg Engineering College, Ghaziabad, UP Technical University, Lucknow

Mr. Longe Olumide Babatope, University Of Ibadan, Nigeria

Associate Prof. Raman Maini, University College of Engineering, Punjabi University, India

Dr. Maslin Masrom, University Technology Malaysia, Malaysia

Sudipta Chattopadhyay, Jadavpur University, Kolkata, India

Dr. Dang Tuan NGUYEN, University of Information Technology, Vietnam National University - Ho Chi Minh

City

Dr. Mary Lourde R., BITS-PILANI Dubai , UAE

Dr. Abdul Aziz, University of Central Punjab, Pakistan

Mr. Karan Singh, Gautam Budtha University, India

Mr. Avinash Pokhriyal, Uttar Pradesh Technical University, Lucknow, India

Associate Prof Dr Zuraini Ismail, University Technology Malaysia, Malaysia

Assistant Prof. Yasser M. Alginahi, College of Computer Science and Engineering, Taibah University, Madinah

Munawwarrah, KSA

Mr. Dakshina Ranjan Kisku, West Bengal University of Technology, India

Mr. Raman Kumar, Dr B R Ambedkar National Institute of Technology, Jalandhar, Punjab, India

Associate Prof. Samir B. Patel, Institute of Technology, Nirma University, India

Dr. M.Munir Ahamed Rabbani, B. S. Abdur Rahman University, India

Asst. Prof. Koushik Majumder, West Bengal University of Technology, India

Dr. Alex Pappachen James, Queensland Micro-nanotechnology center, Griffith University, Australia

Assistant Prof. S. Hariharan, B.S. Abdur Rahman University, India

Asst Prof. Jasmine. K. S, R.V.College of Engineering, India

Mr Naushad Ali Mamode Khan, Ministry of Education and Human Resources, Mauritius

Prof. Mahesh Goyani, G H Patel Collge of Engg. & Tech, V.V.N, Anand, Gujarat, India

Dr. Mana Mohammed, University of Tlemcen, Algeria

Prof. Jatinder Singh, Universal Institutiion of Engg. & Tech. CHD, India

Mrs. M. Anandhavalli Gauthaman, Sikkim Manipal Institute of Technology, Majitar, East Sikkim

Dr. Bin Guo, Institute Telecom SudParis, France

Mrs. Maleika Mehr Nigar Mohamed Heenaye-Mamode Khan, University of Mauritius

Prof. Pijush Biswas, RCC Institute of Information Technology, India

Mr. V. Bala Dhandayuthapani, Mekelle University, Ethiopia

Dr. Irfan Syamsuddin, State Polytechnic of Ujung Pandang, Indonesia

Mr. Kavi Kumar Khedo, University of Mauritius, Mauritius

Mr. Ravi Chandiran, Zagro Singapore Pte Ltd. Singapore

Mr. Milindkumar V. Sarode, Jawaharlal Darda Institute of Engineering and Technology, India

Dr. Shamimul Qamar, KSJ Institute of Engineering & Technology, India

Dr. C. Arun, Anna University, India

Page 28: Book of Abstract Volume 8 No 9 IJCSIS December 2010

(IJCSIS) International Journal of Computer Science and Information Security, Vol. 8, No. 9, December 2010

Assist. Prof. M.N.Birje, Basaveshwar Engineering College, India

Prof. Hamid Reza Naji, Department of Computer Enigneering, Shahid Beheshti University, Tehran, Iran

Assist. Prof. Debasis Giri, Department of Computer Science and Engineering, Haldia Institute of Technology

Subhabrata Barman, Haldia Institute of Technology, West Bengal

Mr. M. I. Lali, COMSATS Institute of Information Technology, Islamabad, Pakistan

Dr. Feroz Khan, Central Institute of Medicinal and Aromatic Plants, Lucknow, India

Mr. R. Nagendran, Institute of Technology, Coimbatore, Tamilnadu, India

Mr. Amnach Khawne, King Mongkut’s Institute of Technology Ladkrabang, Ladkrabang, Bangkok, Thailand

Dr. P. Chakrabarti, Sir Padampat Singhania University, Udaipur, India

Mr. Nafiz Imtiaz Bin Hamid, Islamic University of Technology (IUT), Bangladesh.

Shahab-A. Shamshirband, Islamic Azad University, Chalous, Iran

Prof. B. Priestly Shan, Anna Univeristy, Tamilnadu, India

Venkatramreddy Velma, Dept. of Bioinformatics, University of Mississippi Medical Center, Jackson MS USA

Akshi Kumar, Dept. of Computer Engineering, Delhi Technological University, India

Dr. Umesh Kumar Singh, Vikram University, Ujjain, India

Mr. Serguei A. Mokhov, Concordia University, Canada

Mr. Lai Khin Wee, Universiti Teknologi Malaysia, Malaysia

Dr. Awadhesh Kumar Sharma, Madan Mohan Malviya Engineering College, India

Mr. Syed R. Rizvi, Analytical Services & Materials, Inc., USA

Dr. S. Karthik, SNS Collegeof Technology, India

Mr. Syed Qasim Bukhari, CIMET (Universidad de Granada), Spain

Mr. A.D.Potgantwar, Pune University, India

Dr. Himanshu Aggarwal, Punjabi University, India

Mr. Rajesh Ramachandran, Naipunya Institute of Management and Information Technology, India

Dr. K.L. Shunmuganathan, R.M.K Engg College , Kavaraipettai ,Chennai

Dr. Prasant Kumar Pattnaik, KIST, India.

Dr. Ch. Aswani Kumar, VIT University, India

Mr. Ijaz Ali Shoukat, King Saud University, Riyadh KSA

Mr. Arun Kumar, Sir Padam Pat Singhania University, Udaipur, Rajasthan

Mr. Muhammad Imran Khan, Universiti Teknologi PETRONAS, Malaysia

Dr. Natarajan Meghanathan, Jackson State University, Jackson, MS, USA

Mr. Mohd Zaki Bin Mas'ud, Universiti Teknikal Malaysia Melaka (UTeM), Malaysia

Prof. Dr. R. Geetharamani, Dept. of Computer Science and Eng., Rajalakshmi Engineering College, India

Dr. Smita Rajpal, Institute of Technology and Management, Gurgaon, India

Dr. S. Abdul Khader Jilani, University of Tabuk, Tabuk, Saudi Arabia

Mr. Syed Jamal Haider Zaidi, Bahria University, Pakistan

Dr. N. Devarajan, Government College of Technology,Coimbatore, Tamilnadu, INDIA

Mr. R. Jagadeesh Kannan, RMK Engineering College, India

Mr. Deo Prakash, Shri Mata Vaishno Devi University, India

Mr. Mohammad Abu Naser, Dept. of EEE, IUT, Gazipur, Bangladesh

Page 29: Book of Abstract Volume 8 No 9 IJCSIS December 2010

(IJCSIS) International Journal of Computer Science and Information Security, Vol. 8, No. 9, December 2010

Assist. Prof. Prasun Ghosal, Bengal Engineering and Science University, India

Mr. Md. Golam Kaosar, School of Engineering and Science, Victoria University, Melbourne City, Australia

Mr. R. Mahammad Shafi, Madanapalle Institute of Technology & Science, India

Dr. F.Sagayaraj Francis, Pondicherry Engineering College,India

Dr. Ajay Goel, HIET , Kaithal, India

Mr. Nayak Sunil Kashibarao, Bahirji Smarak Mahavidyalaya, India

Mr. Suhas J Manangi, Microsoft India

Dr. Kalyankar N. V., Yeshwant Mahavidyalaya, Nanded , India

Dr. K.D. Verma, S.V. College of Post graduate studies & Research, India

Dr. Amjad Rehman, University Technology Malaysia, Malaysia

Mr. Rachit Garg, L K College, Jalandhar, Punjab

Mr. J. William, M.A.M college of Engineering, Trichy, Tamilnadu,India

Prof. Jue-Sam Chou, Nanhua University, College of Science and Technology, Taiwan

Dr. Thorat S.B., Institute of Technology and Management, India

Mr. Ajay Prasad, Sir Padampat Singhania University, Udaipur, India

Dr. Kamaljit I. Lakhtaria, Atmiya Institute of Technology & Science, India

Mr. Syed Rafiul Hussain, Ahsanullah University of Science and Technology, Bangladesh

Mrs Fazeela Tunnisa, Najran University, Kingdom of Saudi Arabia

Mrs Kavita Taneja, Maharishi Markandeshwar University, Haryana, India

Mr. Maniyar Shiraz Ahmed, Najran University, Najran, KSA

Mr. Anand Kumar, AMC Engineering College, Bangalore

Dr. Rakesh Chandra Gangwar, Beant College of Engg. & Tech., Gurdaspur (Punjab) India

Dr. V V Rama Prasad, Sree Vidyanikethan Engineering College, India

Assist. Prof. Neetesh Kumar Gupta, Technocrats Institute of Technology, Bhopal (M.P.), India

Mr. Ashish Seth, Uttar Pradesh Technical University, Lucknow ,UP India

Dr. V V S S S Balaram, Sreenidhi Institute of Science and Technology, India

Mr Rahul Bhatia, Lingaya's Institute of Management and Technology, India

Prof. Niranjan Reddy. P, KITS , Warangal, India

Prof. Rakesh. Lingappa, Vijetha Institute of Technology, Bangalore, India

Dr. Mohammed Ali Hussain, Nimra College of Engineering & Technology, Vijayawada, A.P., India

Dr. A.Srinivasan, MNM Jain Engineering College, Rajiv Gandhi Salai, Thorapakkam, Chennai

Mr. Rakesh Kumar, M.M. University, Mullana, Ambala, India

Dr. Lena Khaled, Zarqa Private University, Aman, Jordon

Ms. Supriya Kapoor, Patni/Lingaya's Institute of Management and Tech., India

Dr. Tossapon Boongoen , Aberystwyth University, UK

Dr . Bilal Alatas, Firat University, Turkey

Assist. Prof. Jyoti Praaksh Singh , Academy of Technology, India

Dr. Ritu Soni, GNG College, India

Dr . Mahendra Kumar , Sagar Institute of Research & Technology, Bhopal, India.

Page 30: Book of Abstract Volume 8 No 9 IJCSIS December 2010

(IJCSIS) International Journal of Computer Science and Information Security, Vol. 8, No. 9, December 2010

Dr. Binod Kumar, India

Dr. Muzhir Shaban Al-Ani, Amman Arab University Amman – Jordan

Dr. T.C. Manjunath , ATRIA Institute of Tech, India

Mr. Muhammad Zakarya, COMSATS Institute of Information Technology (CIIT), Pakistan

Assist. Prof. Harmunish Taneja, M. M. University, India

Dr. Chitra Dhawale , SICSR, Model Colony, Pune, India

Mrs Sankari Muthukaruppan, Nehru Institute of Engineering and Technology, Anna University, India

Mr. Aaqif Afzaal Abbasi, National University Of Sciences And Technology, Islamabad

Prof. Ashutosh Kumar Dubey, Trinity Institute of Technology and Research Bhopal, India

Mr. G. Appasami, Dr. Pauls Engineering College, India

Mr. M Yasin, National University of Science and Tech, karachi (NUST), Pakistan

Mr. Yaser Miaji, University Utara Malaysia, Malaysia

Mr. Shah Ahsanul Haque, International Islamic University Chittagong (IIUC), Bangladesh

Prof. (Dr) Syed Abdul Sattar, Royal Institute of Technology & Science, India

Dr. S. Sasikumar, Roever Engineering College

Assist. Prof. Monit Kapoor, Maharishi Markandeshwar University, India

Mr. Nwaocha Vivian O, National Open University of Nigeria

Dr. M. S. Vijaya, GR Govindarajulu School of Applied Computer Technology, India

Assist. Prof. Chakresh Kumar, Manav Rachna International University, India

Mr. Kunal Chadha , R&D Software Engineer, Gemalto, Singapore

Mr. Pawan Jindal, Jaypee University of Engineering and Technology, India

Mr. Mueen Uddin, Universiti Teknologi Malaysia, UTM , Malaysia

Dr. Dhuha Basheer abdullah, Mosul university, Iraq

Mr. S. Audithan, Annamalai University, India

Prof. Vijay K Chaudhari, Technocrats Institute of Technology , India

Associate Prof. Mohd Ilyas Khan, Technocrats Institute of Technology , India

Dr. Vu Thanh Nguyen, University of Information Technology, HoChiMinh City, VietNam

Assist. Prof. Anand Sharma, MITS, Lakshmangarh, Sikar, Rajasthan, India

Prof. T V Narayana Rao, HITAM Engineering college, Hyderabad

Mr. Deepak Gour, Sir Padampat Singhania University, India

Assist. Prof. Amutharaj Joyson, Kalasalingam University, India

Mr. Ali Balador, Islamic Azad University, Iran

Mr. Mohit Jain, Maharaja Surajmal Institute of Technology, India

Mr. Dilip Kumar Sharma, GLA Institute of Technology & Management, India

Dr. Debojyoti Mitra, Sir padampat Singhania University, India

Dr. Ali Dehghantanha, Asia-Pacific University College of Technology and Innovation, Malaysia

Mr. Zhao Zhang, City University of Hong Kong, China

Prof. S.P. Setty, A.U. College of Engineering, India

Prof. Patel Rakeshkumar Kantilal, Sankalchand Patel College of Engineering, India

Mr. Biswajit Bhowmik, Bengal College of Engineering & Technology, India

Page 31: Book of Abstract Volume 8 No 9 IJCSIS December 2010

(IJCSIS) International Journal of Computer Science and Information Security, Vol. 8, No. 9, December 2010

Mr. Manoj Gupta, Apex Institute of Engineering & Technology, India

Assist. Prof. Ajay Sharma, Raj Kumar Goel Institute Of Technology, India

Assist. Prof. Ramveer Singh, Raj Kumar Goel Institute of Technology, India

Dr. Hanan Elazhary, Electronics Research Institute, Egypt

Dr. Hosam I. Faiq, USM, Malaysia

Prof. Dipti D. Patil, MAEER’s MIT College of Engg. & Tech, Pune, India

Assist. Prof. Devendra Chack, BCT Kumaon engineering College Dwarahat Almora, India

Prof. Manpreet Singh, M. M. Engg. College, M. M. University, India

Assist. Prof. M. Sadiq ali Khan, University of Karachi, Pakistan

Mr. Prasad S. Halgaonkar, MIT - College of Engineering, Pune, India

Dr. Imran Ghani, Universiti Teknologi Malaysia, Malaysia

Prof. Varun Kumar Kakar, Kumaon Engineering College, Dwarahat, India

Assist. Prof. Nisheeth Joshi, Apaji Institute, Banasthali University, Rajasthan, India

Associate Prof. Kunwar S. Vaisla, VCT Kumaon Engineering College, India

Prof Anupam Choudhary, Bhilai School Of Engg.,Bhilai (C.G.),India

Mr. Divya Prakash Shrivastava, Al Jabal Al garbi University, Zawya, Libya

Associate Prof. Dr. V. Radha, Avinashilingam Deemed university for women, Coimbatore.

Dr. Kasarapu Ramani, JNT University, Anantapur, India

Dr. Anuraag Awasthi, Jayoti Vidyapeeth Womens University, India

Dr. C G Ravichandran, R V S College of Engineering and Technology, India

Dr. Mohamed A. Deriche, King Fahd University of Petroleum and Minerals, Saudi Arabia

Mr. Abbas Karimi, Universiti Putra Malaysia, Malaysia

Mr. Amit Kumar, Jaypee University of Engg. and Tech., India

Dr. Nikolai Stoianov, Defense Institute, Bulgaria

Assist. Prof. S. Ranichandra, KSR College of Arts and Science, Tiruchencode

Mr. T.K.P. Rajagopal, Diamond Horse International Pvt Ltd, India

Dr. Md. Ekramul Hamid, Rajshahi University, Bangladesh

Mr. Hemanta Kumar Kalita , TATA Consultancy Services (TCS), India

Dr. Messaouda Azzouzi, Ziane Achour University of Djelfa, Algeria

Prof. (Dr.) Juan Jose Martinez Castillo, "Gran Mariscal de Ayacucho" University and Acantelys

research Group, Venezuela

Dr. Jatinderkumar R. Saini, Narmada College of Computer Application, India

Dr. Babak Bashari Rad, University Technology of Malaysia, Malaysia

Mr. B. Muthu Kumar, Kathir College Of Engineering, Coimbatore

Dr. Nighat Mir, Effat University, Saudi Arabia

Prof. (Dr.) G.M.Nasira, Sasurie College of Engineering, India

Mr. Varun Mittal, Gemalto Pte Ltd, Singapore

Page 32: Book of Abstract Volume 8 No 9 IJCSIS December 2010

(IJCSIS) International Journal of Computer Science and Information Security, Vol. 8, No. 9, December 2010

Assist. Prof. Mrs P. Banumathi, Kathir College Of Engineering, Coimbatore

Assist. Prof. Quan Yuan, University of Wisconsin-Stevens Point, US

Dr. Pranam Paul, Narula Institute of Technology, Agarpara, West Bengal, India

Assist. Prof. J. Ramkumar, V.L.B Janakiammal college of Arts & Science, India

Mr. P. Sivakumar, Anna university, Chennai, India

Mr. Md. Humayun Kabir Biswas, King Khalid University, Kingdom of Saudi Arabia

Mr. Mayank Singh, J.P. Institute of Engg & Technology, Meerut, India

HJ. Kamaruzaman Jusoff, Universiti Putra Malaysia

Mr. Nikhil Patrick Lobo, CADES, India

Mr. Amit Wason, Rayat-Bahra Institute of Engineering & Boi-Technology, India

Dr. Rajesh Shrivastava, Govt. Benazir Science & Commerce College, Bhopal, India

Assist. Prof. Vishal Bharti, DCE, Gurgaon

Mrs. Sunita Bansal, Birla Institute of Technology & Science, India

Dr. R. Sudhakar, Dr.Mahalingam college of Engineering and Technology, India

Dr. Amit Kumar Garg, Shri Mata Vaishno Devi University, Katra(J&K), India

Assist. Prof. Raj Gaurang Tiwari, AZAD Institute of Engineering and Technology, India

Mr. Hamed Taherdoost, Tehran, Iran

Mr. Amin Daneshmand Malayeri, YRC, IAU, Malayer Branch, Iran

Mr. Shantanu Pal, University of Calcutta, India

Dr. Terry H. Walcott, E-Promag Consultancy Group, United Kingdom

Dr. Ezekiel U OKIKE, University of Ibadan, Nigeria

Mr. P. Mahalingam, Caledonian College of Engineering, Oman

Dr. Mahmoud M. A. Abd Ellatif, Mansoura University, Egypt

Prof. Kunwar S. Vaisla, BCT Kumaon Engineering College, India

Prof. Mahesh H. Panchal, Kalol Institute of Technology & Research Centre, India

Page 33: Book of Abstract Volume 8 No 9 IJCSIS December 2010

CALL FOR PAPERS International Journal of Computer Science and Information Security

IJCSIS 2011 ISSN: 1947-5500

http://sites.google.com/site/ijcsis/ International Journal Computer Science and Information Security, IJCSIS, is the premier scholarly venue in the areas of computer science and security issues. IJCSIS 2011 will provide a high profile, leading edge platform for researchers and engineers alike to publish state-of-the-art research in the respective fields of information technology and communication security. The journal will feature a diverse mixture of publication articles including core and applied computer science related topics. Authors are solicited to contribute to the special issue by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to. Submissions may span a broad range of topics, e.g.: Track A: Security Access control, Anonymity, Audit and audit reduction & Authentication and authorization, Applied cryptography, Cryptanalysis, Digital Signatures, Biometric security, Boundary control devices, Certification and accreditation, Cross-layer design for security, Security & Network Management, Data and system integrity, Database security, Defensive information warfare, Denial of service protection, Intrusion Detection, Anti-malware, Distributed systems security, Electronic commerce, E-mail security, Spam, Phishing, E-mail fraud, Virus, worms, Trojan Protection, Grid security, Information hiding and watermarking & Information survivability, Insider threat protection, Integrity Intellectual property protection, Internet/Intranet Security, Key management and key recovery, Language-based security, Mobile and wireless security, Mobile, Ad Hoc and Sensor Network Security, Monitoring and surveillance, Multimedia security ,Operating system security, Peer-to-peer security, Performance Evaluations of Protocols & Security Application, Privacy and data protection, Product evaluation criteria and compliance, Risk evaluation and security certification, Risk/vulnerability assessment, Security & Network Management, Security Models & protocols, Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,), Trusted computing, Ubiquitous Computing Security, Virtualization security, VoIP security, Web 2.0 security, Submission Procedures, Active Defense Systems, Adaptive Defense Systems, Benchmark, Analysis and Evaluation of Security Systems, Distributed Access Control and Trust Management, Distributed Attack Systems and Mechanisms, Distributed Intrusion Detection/Prevention Systems, Denial-of-Service Attacks and Countermeasures, High Performance Security Systems, Identity Management and Authentication, Implementation, Deployment and Management of Security Systems, Intelligent Defense Systems, Internet and Network Forensics, Large-scale Attacks and Defense, RFID Security and Privacy, Security Architectures in Distributed Network Systems, Security for Critical Infrastructures, Security for P2P systems and Grid Systems, Security in E-Commerce, Security and Privacy in Wireless Networks, Secure Mobile Agents and Mobile Code, Security Protocols, Security Simulation and Tools, Security Theory and Tools, Standards and Assurance Methods, Trusted Computing, Viruses, Worms, and Other Malicious Code, World Wide Web Security, Novel and emerging secure architecture, Study of attack strategies, attack modeling, Case studies and analysis of actual attacks, Continuity of Operations during an attack, Key management, Trust management, Intrusion detection techniques, Intrusion response, alarm management, and correlation analysis, Study of tradeoffs between security and system performance, Intrusion tolerance systems, Secure protocols, Security in wireless networks (e.g. mesh networks, sensor networks, etc.), Cryptography and Secure Communications, Computer Forensics, Recovery and Healing, Security Visualization, Formal Methods in Security, Principles for Designing a Secure Computing System, Autonomic Security, Internet Security, Security in Health Care Systems, Security Solutions Using Reconfigurable Computing, Adaptive and Intelligent Defense Systems, Authentication and Access control, Denial of service attacks and countermeasures, Identity, Route and

Page 34: Book of Abstract Volume 8 No 9 IJCSIS December 2010

Location Anonymity schemes, Intrusion detection and prevention techniques, Cryptography, encryption algorithms and Key management schemes, Secure routing schemes, Secure neighbor discovery and localization, Trust establishment and maintenance, Confidentiality and data integrity, Security architectures, deployments and solutions, Emerging threats to cloud-based services, Security model for new services, Cloud-aware web service security, Information hiding in Cloud Computing, Securing distributed data storage in cloud, Security, privacy and trust in mobile computing systems and applications, Middleware security & Security features: middleware software is an asset on its own and has to be protected, interaction between security-specific and other middleware features, e.g., context-awareness, Middleware-level security monitoring and measurement: metrics and mechanisms for quantification and evaluation of security enforced by the middleware, Security co-design: trade-off and co-design between application-based and middleware-based security, Policy-based management: innovative support for policy-based definition and enforcement of security concerns, Identification and authentication mechanisms: Means to capture application specific constraints in defining and enforcing access control rules, Middleware-oriented security patterns: identification of patterns for sound, reusable security, Security in aspect-based middleware: mechanisms for isolating and enforcing security aspects, Security in agent-based platforms: protection for mobile code and platforms, Smart Devices: Biometrics, National ID cards, Embedded Systems Security and TPMs, RFID Systems Security, Smart Card Security, Pervasive Systems: Digital Rights Management (DRM) in pervasive environments, Intrusion Detection and Information Filtering, Localization Systems Security (Tracking of People and Goods), Mobile Commerce Security, Privacy Enhancing Technologies, Security Protocols (for Identification and Authentication, Confidentiality and Privacy, and Integrity), Ubiquitous Networks: Ad Hoc Networks Security, Delay-Tolerant Network Security, Domestic Network Security, Peer-to-Peer Networks Security, Security Issues in Mobile and Ubiquitous Networks, Security of GSM/GPRS/UMTS Systems, Sensor Networks Security, Vehicular Network Security, Wireless Communication Security: Bluetooth, NFC, WiFi, WiMAX, WiMedia, others This Track will emphasize the design, implementation, management and applications of computer communications, networks and services. Topics of mostly theoretical nature are also welcome, provided there is clear practical potential in applying the results of such work. Track B: Computer Science Broadband wireless technologies: LTE, WiMAX, WiRAN, HSDPA, HSUPA, Resource allocation and interference management, Quality of service and scheduling methods, Capacity planning and dimensioning, Cross-layer design and Physical layer based issue, Interworking architecture and interoperability, Relay assisted and cooperative communications, Location and provisioning and mobility management, Call admission and flow/congestion control, Performance optimization, Channel capacity modeling and analysis, Middleware Issues: Event-based, publish/subscribe, and message-oriented middleware, Reconfigurable, adaptable, and reflective middleware approaches, Middleware solutions for reliability, fault tolerance, and quality-of-service, Scalability of middleware, Context-aware middleware, Autonomic and self-managing middleware, Evaluation techniques for middleware solutions, Formal methods and tools for designing, verifying, and evaluating, middleware, Software engineering techniques for middleware, Service oriented middleware, Agent-based middleware, Security middleware, Network Applications: Network-based automation, Cloud applications, Ubiquitous and pervasive applications, Collaborative applications, RFID and sensor network applications, Mobile applications, Smart home applications, Infrastructure monitoring and control applications, Remote health monitoring, GPS and location-based applications, Networked vehicles applications, Alert applications, Embeded Computer System, Advanced Control Systems, and Intelligent Control : Advanced control and measurement, computer and microprocessor-based control, signal processing, estimation and identification techniques, application specific IC’s, nonlinear and adaptive control, optimal and robot control, intelligent control, evolutionary computing, and intelligent systems, instrumentation subject to critical conditions, automotive, marine and aero-space control and all other control applications, Intelligent Control System, Wiring/Wireless Sensor, Signal Control System. Sensors, Actuators and Systems Integration : Intelligent sensors and actuators, multisensor fusion, sensor array and multi-channel processing, micro/nano technology, microsensors and microactuators, instrumentation electronics, MEMS and system integration, wireless sensor, Network Sensor, Hybrid

Page 35: Book of Abstract Volume 8 No 9 IJCSIS December 2010

Sensor, Distributed Sensor Networks. Signal and Image Processing : Digital signal processing theory, methods, DSP implementation, speech processing, image and multidimensional signal processing, Image analysis and processing, Image and Multimedia applications, Real-time multimedia signal processing, Computer vision, Emerging signal processing areas, Remote Sensing, Signal processing in education. Industrial Informatics: Industrial applications of neural networks, fuzzy algorithms, Neuro-Fuzzy application, bioInformatics, real-time computer control, real-time information systems, human-machine interfaces, CAD/CAM/CAT/CIM, virtual reality, industrial communications, flexible manufacturing systems, industrial automated process, Data Storage Management, Harddisk control, Supply Chain Management, Logistics applications, Power plant automation, Drives automation. Information Technology, Management of Information System : Management information systems, Information Management, Nursing information management, Information System, Information Technology and their application, Data retrieval, Data Base Management, Decision analysis methods, Information processing, Operations research, E-Business, E-Commerce, E-Government, Computer Business, Security and risk management, Medical imaging, Biotechnology, Bio-Medicine, Computer-based information systems in health care, Changing Access to Patient Information, Healthcare Management Information Technology. Communication/Computer Network, Transportation Application : On-board diagnostics, Active safety systems, Communication systems, Wireless technology, Communication application, Navigation and Guidance, Vision-based applications, Speech interface, Sensor fusion, Networking theory and technologies, Transportation information, Autonomous vehicle, Vehicle application of affective computing, Advance Computing technology and their application : Broadband and intelligent networks, Data Mining, Data fusion, Computational intelligence, Information and data security, Information indexing and retrieval, Information processing, Information systems and applications, Internet applications and performances, Knowledge based systems, Knowledge management, Software Engineering, Decision making, Mobile networks and services, Network management and services, Neural Network, Fuzzy logics, Neuro-Fuzzy, Expert approaches, Innovation Technology and Management : Innovation and product development, Emerging advances in business and its applications, Creativity in Internet management and retailing, B2B and B2C management, Electronic transceiver device for Retail Marketing Industries, Facilities planning and management, Innovative pervasive computing applications, Programming paradigms for pervasive systems, Software evolution and maintenance in pervasive systems, Middleware services and agent technologies, Adaptive, autonomic and context-aware computing, Mobile/Wireless computing systems and services in pervasive computing, Energy-efficient and green pervasive computing, Communication architectures for pervasive computing, Ad hoc networks for pervasive communications, Pervasive opportunistic communications and applications, Enabling technologies for pervasive systems (e.g., wireless BAN, PAN), Positioning and tracking technologies, Sensors and RFID in pervasive systems, Multimodal sensing and context for pervasive applications, Pervasive sensing, perception and semantic interpretation, Smart devices and intelligent environments, Trust, security and privacy issues in pervasive systems, User interfaces and interaction models, Virtual immersive communications, Wearable computers, Standards and interfaces for pervasive computing environments, Social and economic models for pervasive systems, Active and Programmable Networks, Ad Hoc & Sensor Network, Congestion and/or Flow Control, Content Distribution, Grid Networking, High-speed Network Architectures, Internet Services and Applications, Optical Networks, Mobile and Wireless Networks, Network Modeling and Simulation, Multicast, Multimedia Communications, Network Control and Management, Network Protocols, Network Performance, Network Measurement, Peer to Peer and Overlay Networks, Quality of Service and Quality of Experience, Ubiquitous Networks, Crosscutting Themes – Internet Technologies, Infrastructure, Services and Applications; Open Source Tools, Open Models and Architectures; Security, Privacy and Trust; Navigation Systems, Location Based Services; Social Networks and Online Communities; ICT Convergence, Digital Economy and Digital Divide, Neural Networks, Pattern Recognition, Computer Vision, Advanced Computing Architectures and New Programming Models, Visualization and Virtual Reality as Applied to Computational Science, Computer Architecture and Embedded Systems, Technology in Education, Theoretical Computer Science, Computing Ethics, Computing Practices & Applications Authors are invited to submit papers through e-mail [email protected]. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated by IJCSIS. Before submission authors should carefully read over the journal's Author Guidelines, which are located at http://sites.google.com/site/ijcsis/authors-notes .

Page 36: Book of Abstract Volume 8 No 9 IJCSIS December 2010

© IJCSIS PUBLICATION 2010 ISSN 1947 5500