Volume 3, Issue 7, July 2012

Independent and Comprehensive Intrusion Detection Management
Pages: 1-6 (6) | [Full Text] PDF (296K)
Björn-C. Bösch
System Software and Distributed Systems Group, Faculty II - Department of Computing Science, Carl-von-Ossietzky-University, Oldenburg, Germany

Abstract -
Coverage of services and configuration influence the efficiency of Intrusion Detection Systems (IDS). Today, IDS have vendor-specific configurations and this limits a wide coverage of services by IDS. Operations might become complex, in case of usage of multiple systems. Efforts and frame conditions for a multi-vendor IDS implementation under one central administration and notification entity will be demonstrated. This solution provides administrators one consistent front-end for all integrated IDS. The security level will be improved by one central administration entity for the complete IDS solution independent of the respective IDS vendor. Updates and parameter modifications could be done from this supervising point. There is still no constraint to allow a connection from any analyzer to the Internet or the central operations LAN for notifications or to update itself. Managers are independent from the rest of the IDS. IDS of different vendors and analyzing levels are able to manage with one administration interface.
 Index Terms - IDS Management, IDXP, Intrusion Detection, Standardization and Parameterization
Service-Oriented Delivery of ITS Content to Mobile Vehicles
Pages: 7-15 (8) | [Full Text] PDF (419K)
M. Elshenawy and M. EL-Darieby
Software Systems Engineering, University of Regina, Regina, SK, Canada

Abstract -
Wireless mesh networks (WMN) is poised to be a cost-effective platform for many municipal applications in public safety, business and entertainment. In this paper we present a service-oriented WMN-based platform for content delivery within Intelligent Transportation Systems (ITS) applications. An example ITS application would be to deliver content used for vehicle route guidance in emergency evacuation situations. The characteristics of ITS applications of higher vehicle speeds and of the limited coverage of WMN router causes more frequent handoffs which complicates content delivery over wireless mesh networks. Frequent handoffs mandate smaller handoff delay. Using standard IEEE handoffs may cause unacceptable interruption in content delivery. We propose a Service-Oriented mobility management protocol (SMMP) for ITS content delivery. Within the protocol, content is considered as services described by XML metadata files. The protocol takes advantage of a hierarchical organization of WMN routers to reduce the handoff delay. The quasi-stationary nature of WMN mesh routers enables the detection of the sequence of routers that a vehicle will be in connection with. SMMP provides to the travelling vehicles cached MAC addresses of WMN mesh routers to communicate with. Moreover, we study and present three different vehicular mobility management schemes and compare these to the standard IEEE 802.11 mobility management scheme. We evaluate the benefits of the proposed protocol and compared it to the traditional solutions using OMNET++ simulator. Our results show that using SMMP reduces handoff latencies and improves the overall network throughput at lower and higher vehicle speeds.
 Index Terms - Wireless Mesh Networks, Mobility Management, Handoff and Intelligent Transportation Systems
QoS Based Dynamic Service Composition
Pages: 16-19 (4) | [Full Text] PDF (422K)
Dr. E. Kirubakaran, D. Ravindran and Dr. D. I. George Amalarathinam
AGM, Outsourcing Department, BHEL, Tiruchirappalli, India
Computer Science, St Joseph’s College, Tiruchirappalli, India
MCA, Jamal Mohamed College, Tiruchirappalli, India

Abstract -
Web services are application components maintained by different service providers, always accessible, implementation independent and can be used if a situation needs. In a loosely coupled distributed system, web services play an important role. Higher level service, composite web service, may be constructed, not from the scratch, but by using the methods available in the primitive web services. When such composite web services are formed, for each service, many candidate services would be available. Among these candidate services, one service has to be selected and executed to accomplish composition. For such selection, QoS attributes may be used because all those candidate services would be similar with respect to functional attributes. In this paper, service selection based on the QoS factors viz response time, availability and dependency, is proposed. Using these factors, priority will be assigned to candidate services and the one with top priority will be selected. After the service invocation, the factors will be updated paving the way for a dynamic ordering of the candidate services.
 Index Terms - SOA, Composite Web Service, Quality of Service and Orchestration
Toward the Influenza Virus Data Mining from a DNA Data Bank
Pages: 20-26 (7) | [Full Text] PDF (462K)
Nguyen Gia Khoa, Tran Van Lang, Tran Van Hoai and Van Dinh Vy Phuong
Institute of Applied Mechanics and Informatics, Vietnam Academy of Science and Technology, Vietnam
HCMC University of Technology, Vietnam National University in HCM City, Vietnam
Lac Hong University, Vietnam Ministry of Education and Training, Vietnam

Abstract -
Influenza virus is one of the causes of flu in human beings as well as in animals. Vietnam, with its tropical climate, is one of the countries located in heavily affected areas of the influenza virus. Building a localized information system of flu viruses for Vietnam provinces is quite necessary not only for research but also for other communities. The paper presents such an information system to extract the local viruses from international databases and provides certain utilities for research and non-research communities. The first of the paper presents an overview of data banks of flu virus in the world. The second part shows the methods of building the information system on the influenza virus. The final parts will present some results obtained and conclusion.
 Index Terms - Bioinformatics, Networking and Knowledge Discovery
Signal Strength Based Route Selection in MANETs
Pages: 27-30 (4) | [Full Text] PDF (274K)
Nitin Manjhi and Nilesh Patel
Department of Computer Science and Engineering, JUET, Guna, India

Abstract -
Mobile Ad hoc Network is a Network which contains mobile nodes that topology constantly changing. The mobile nodes can move freely from one place to another place. Most current ad-hoc routing protocols select paths that minimize hop count like AODV, DSDV and DSR .In ad hoc wireless networks; minimal hop count paths can have poor performance because they tend to include wireless links between distant nodes. These long wireless links can be slow or lossy, leading to poor throughput. Due to mobility the link between distant nodes is broken quickly. Therefore, the method can be considered in the routing that select nodes between the source and destination which are more stable than other node as intermediate nodes. In this paper we proposed a method which measures signal strength between nodes and compare with RSSI threshold values if it is greater than threshold value then it is accepted for further processing otherwise it is discarded. The benefit of this scheme is by selecting a strong route to the destination we can increase the lifetime of the network. Simulation results show that SSAODV has performance better than AODV routing protocol in terms of the metrics: End-to-end delay, Packets delivery ratio, throughput, Routing overhead.
 Index Terms - MANETs, Routing, RSSI and Route Failure
Mining Temporal Association Rules by Automatic Partitioning and Cope Up With Missing Values
Pages: 31-35 (5) | [Full Text] PDF (306K)
Mitula H. Pandya and Mahesh H. Panchal
Department of Computer Engineering, Kalol Institute of Technology & Research Center, Kalol, Gujarat, India

Abstract -
Discovering hidden knowledge from large amount of data in form of association rules have become very popular in growing field of data mining. Several algorithms have been developed for mining association rules. All those algorithms can be effectively applied on dataset where data has not any time granularity means non-temporal dataset. Temporal dataset is one where every term has time dimension. In any dataset there is much possibility of having missing values. If association rules are discovered for such dataset the rules are not be perfect, imprecise. This paper mainly focus on the temporal association rules and present a technique satisfying two main aims of temporal association rules are all the possible partitions and filled missing values. In this work, a novel approach is used to fill the most associative values at the place of missing values by temporal association rules after generating all the possible partitions of the dataset automatically.
 Index Terms - Data Mining, Temporal Data Mining, Temporal Association Rule Mining, Temporal Frequent Pattern and Missing Value
The Performance of Error and Outage Capacity in SIMO and MISO FSO Links
Pages: 36-40 (5) | [Full Text] PDF (321K)
M. Mofidi, A. Chaman-motlagh and N. Mofidi
Electrical Engineering Department, Imam Hossein University, Iran
Electrical and Robotic Engineering Department, Shahrood University of Technology, Iran

Abstract -
In spite of the several technical advantages of a free-space optical (FSO) communication, atmospheric turbulence can severely degrade the performance of a FSO link, because it creates random fluctuations in the phase and the amplitude of the received signal. The simultaneous usage of multiple transmit/receive apertures (MIMO) can mitigate the fading effects, that is particularly crucial for strong turbulent channels. However comparing to SIMO and MISO schemes, MIMO system it has more complexity and less applicability. In this paper, we investigate the performance of symbol-error-rate (SER) and outage capacity in FSO links with Q-Ary Pulse Position Modulation (PPM) in these schemes, both in the weak and strong turbulence conditions. Our results show that in a defined received energy per bit, employing diversity and adding the number of resources at the receiver end is more efficient than the transmitter both in the weak and strong atmospheric turbulence scenarios.
 Index Terms - Atmospheric Turbulence, Outage Capacity, Free-Space Optics, PPM Modulation and Symbol-Error-Rate
Peer to Peer Networks: A Study Using Fragmentation Schemes
Pages: 41-45 (5) | [Full Text] PDF (222K)
Mohd Sarfaraz Ahmed
Department of CSE, Nizam Institute of Engineering and Technology, Deshmukhi, Nalgonda, (A.P.), India

Abstract -
In P2P file sharing, millions of peers participate in file-sharing community, with each one functitioning as a server and contributing resources to the community. In this paper, we concentrate on the same data sharing in client to client system. The provider distributes the data over the P2P network wherein the users retrieve the data by using certain fragmentation schemes. The main thrust of this paper is that peers retrieve the data using fragmentation scheme according to their requirements which could effectively support in processing locality.
 Index Terms - P2P Networks, Client System and Fragmentation Schemes
Multiple Sequence Alignment on the Grid Computing using Cache Technique
Pages: 46-51 (6) | [Full Text] PDF (630K)
Le Van Vinh, Tran Van Lang, Nguyen Thi Thu Du and Vo Hong Bao Chau
HCM City University of Technical Education, Vietnam Ministry of Education and Training, Vietnam
Institute of Applied Mechanics and Informatics, Vietnam Academy of Science and Technology, Vietnam
Lac Hong University, Vietnam Ministry of Education and Training, Vietnam

Abstract -
Multiple sequence alignment is an important problem and popular in the molecular biology. This is a basic problem that its solution could be used to proof and discover the similarity of the new sequence with other exist sequences; to define the evolution process of the family’s sequences; as well as to support the protein structure prediction, etc. In this paper, we consider and improve the global progressing algorithm by using the cache storage technique to make the best of the previous alignment results. This algorithm and cache technique were been developed on the distributed system and Grid computing environment in order to decrease the algorithms execution time, as well as increase the quantity and size of input sequences.
 Index Terms - Biological Sequences, DNA, Protein, Grid Computing and Distributed Computing
Securing AODV Routing Protocol from Black Hole Attack
Pages: 52-56 (5) | [Full Text] PDF (325K)
Dr. S. Tamilarasan
Department of Information Technology, Loyola Institute of Technology & Management (LITAM), Dullipala (village) Sattenpalli (Mandal), Guntur, Andhra Pradesh-522412, India

Abstract -
Ad-hoc networks are emerging technology, due to their spontaneous nature, are frequently established insecure environments, which makes them vulnerable to attacks. These attacks are happened due to the participating malicious nodes against different network services. Routing protocols, which act as the binding force in these networks, are a common target of these nodes. Ad hoc On-demand Distance Vector routing (AODV) is a widely adopted network routing protocol for Mobile Ad hoc Network (MANET). Black hole attack is one of the severe security threats in ad-hoc networks which can be easily employed by exploiting vulnerability of on-demand routing protocols such as AODV. In this paper we proposed a solution for identifying the malicious node in AODV protocol suffering from black hole attack.
 Index Terms - Ad-hoc AODV, Black Hole Attack, MANET and Destination Sequence Number
A Survey about Security of the Wireless Sensor Network
Pages: 57-64 (8) | [Full Text] PDF (179K)
Irfanullah Khan, Faheem Khan, Lala Rukh, Zaidullah and Yasir Ali
Gandhara University of Sciences, Peshawar, Pakistan
Agriculture University KPK Peshawar, Pakistan

Abstract -
The considerable advancement of Hardware manufacturing Technology and the progress of Efficient Software Algorithms formulate technically and economically feasible a Network consist of a range of, small, low-priced Sensors by means of Wireless Communications, that is, a Wireless Sensor Network. Wireless Sensor Network has fascinated thorough importance from both academic world and Industry as of its broad Application in civil and military situations. In intimidating situations, it is very vital to defend Wireless Sensor Network from malevolent Attacks. As of a range of resource limitations and the salient features of a Wireless Sensor Network, the Security plan for Such Networks is considerably demanding. In this Article, we offer complete Survey of Wireless Sensor Network Security matters, which were inspected by Researchers in present years and that shed light on future direction for Wireless Sensor Network Security.
 Index Terms - WSN, Security, Challenges and Features
ComFrame: A Communication Framework for Data Management in Mobile Location Based Services
Pages: 65-68 (4) | [Full Text] PDF (185K)
R. Gobi, Dr. E. Kirubakaran and Dr. E. George Dharma Prakash Raj
School of Computer Science and Engineering, Bharathidasan University- Trichy-23, India
Outsourcing Department, Bharat Heavy Electricals Limited- Trichy-14, India

Abstract -
Recent research in mobile computing has shown that Location Based Services (LBS) is an emerging area in mobile applications. It refers that services provided to the user based on location. LBS become the most promising services of mobile computing besides voice and data services. It's growing in popularity due to the ubiquity of smart phone users. Apart from positioning, LBS is highly dynamic, so that traditional information management techniques are not well suited in LBS. To answer this challenge, we analyze the dynamic nature of the problems and then we propose a framework for data management in LBS, which includes a set of data management techniques to improve the services better with respect to dynamic access. This framework leads for future research by providing significant opportunity for information models in mobile data business.
 Index Terms - Mobile Computing, Location Based Services (LBS), Data Management Techniques and Framework for LBS
QR Codes and Security Solutions
Pages: 69-72 (4) | [Full Text] PDF (240K)
A. Sankara Narayanan
Department of Information Technology, Salalah College of Technology, Sultanate of Oman

Abstract -
Identification of objects and places in the real world is important, and 2-D printing code is useful to store identifiers of them. Any camera mobile device with capture function can read content from a barcode tag directly. When a barcode contains important data or privacy information, the risk of security becomes an important problem. Because QR codes simply feature a square barcode with a unique pattern, people have no idea whether the code will take them to reputable information or a site loaded with malware. In this paper, discusses QR codes different data types, attack via QR codes and security solutions. However, since it is easy to modify the content stored in the 2-D code, we must verify whether the identifier written in the 2-D code is indeed issued by the authorized organization.
 Index Terms - QR Codes, Barcode, Security and Smartphone
RAID Dependent Performance on Storage & Retrieval of Digital Forensics Meta Data Files with Different File Systems
Pages: 73-79 (7) | [Full Text] PDF (236K)
Bimal Kumar Goja and Prof. Devanad Padha
Department of Computer Science and IT, University of Jammu, J&K-180006, India

Abstract -
Globally rapid technological developments , fast economic growth, effective storage and effective retrieval of digital forensic meta data is emerging very fast field in modern world and use of this modern technology have necessitated the new emerging trends in digital forensic computing systems. Digital forensics has joined the mainstream in 2003 the American Society of Crime Laboratory Directors–Laboratory Accreditation Board (ASCLD–LAB) recognized digital evidence as a full-fledged forensic discipline. Here the operating systems, high capacity storage hard disks, file systems which are generally operating system dependent and complexity RAID technology will meet the new challenges for the effective storage and effective retrieval of digital forensics meta data (DFMD) files and it is a prerequisite of current and future computer systems. In this paper we analyzed the performance of meta data files, SVM model interface, different operating systems, comprehensive analysis of files across different platforms and other various dimensions of RAID technology for crucial storage.
 Index Terms - Digital Forensics Meta Data, Operating Systems Meta Data Files, Storage Virtualization Model, ZFS File System, Btrfs, UFS, MFS, NTFS, FAT and RAID
Research Challenges in Web Data Mining
Pages: 80-83 (4) | [Full Text] PDF (134K)
Md. Zahid Hasan, Khawja Jakaria Ahmad Chisty and Nur-E-Zaman Ayshik
Department of CSE, Green University of Bangladesh, Bangladesh
Department of EEE, IIUC, Dhaka Campus, Bangladesh
Department of EEE, BUET, Bangladesh

Abstract -
With the exponential growth of information in online, the World Wide Web (WWW) is a fruitful area of data mining. Mining data over the web using different tools and technologies of data mining is termed as web mining. Web mining could be used to solve the information overload problems directly or indirectly. This paper provides a brief overview both in terms of technologies and applications and outlines key future research directions.
 Index Terms - Data Mining, Information Retrieval, Knowledge Discovery, Data Mining Trends, Web Mining, Pattern Analysis and Pattern Discovery
Improving Mobility Prediction Using Data Mining Techniques
Pages: 84-87 (4) | [Full Text] PDF (305K)
Velmurugan L., and P. Thangaraj
MCA, EBET Group of Institutions, Kangayam, 638108, India
Department of CSE, Bannariamman Institute of Technology, Sathyamangalam-638401, India

Abstract -
With the increase in the popularity of mobile devices, WLAN infrastructure planning has become significant for maintaining desired quality of service. Movement pattern of the user plays a key role in maintaining quality of service. Mobility prediction involves predicting the mobile device’s next access point as it moves through the wireless network. In this paper, we propose a new method for feature extraction and use Neural network classifier to evaluate the classification accuracy. We evaluate our hypotheses using one month syslog data of Darthmouth college mobility traces available online, to extract mobility features. Our proposed methodology was implemented and achieved a precision of 0.86 and recall of 0.82.
 Index Terms - Mobility Prediction, Neural Network, Wireless Infrastructure, Quality of Service and Location Based Service
Comparative Analysis of Signal Propagation through Optical Fiber and Microwave Links
Pages: 88-90 (3) | [Full Text] PDF (346K)
Y.O. Olasoji, M.O. Kolawole and S.T. Ayoola
Department of Electrical and Electronics Engineering, Federal University of Technology, Akure, Nigeria

Abstract -
This study examines the degree of attenuation offered to the signal propagated through each of the optical fiber and microwave radio links. Measurements were taken at strategic locations of an operational telecommunication network that utilized both the optical-fiber and microwave radio links. Normalizing the effects contributing to signal attenuation, the range of attenuation per length of each link was estimated which can be used for network planning.
 Index Terms - Attenuation, Absorption Loss, Net Path Loss, Optical Fibre Link, Microwave Radio Link and Network Planning
Web Learning Systems and Cognitive Learning: A Survey
Pages: 91-94 (4) | [Full Text] PDF (171K)
L. Jayasimman and E. Geroge Dharma Prakash Raj
J J College of Engineering & Technology, Trichy, India
Bharathidasan University, Trichy, India

Abstract -
Web learning system is an innovative and powerful tool to enrich the teaching and learning processes. Web learning system has tremendous opportunities over the traditional learning environments. With the help of web learning system, different learning styles and approaches are achieved. The web learning system facilities to users experience, and also adapt the cognitive concepts like load, stress, recollection and retention. The adaptive learning support environment of the web learning system effectively accommodates a wide variety of students with different skills, background and cognitive learning styles. In this paper, various web-based learning system and aspects of cognitive associated with the web learning systems is surveyed.
 Index Terms - Web-Based Learning Systems and Cognitive Learning Style
VREL: A New Perspective of Virtual Reality in E-Learning
Pages: 95-98 (4) | [Full Text] PDF (326K)
D. Glory Ratna Mary and Dr. E. Kirubakaran
Women's Christian College, Nagercoil, India
Bharat Heavy Electricals Limited, Trichy, India

Abstract -
The perspective of learning is changing dramatically with the advent of various electronic media and computing devices. E-learning refers learning through electronic devices, which are two dimensions in nature. The need of another dimension is inevitable in our changing life style to acquire knowledge through E-learning. Producing 3D interactive models is becoming a greater challenge every day. Virtual Reality Modelling Language (VRML) provides a platform independent file format for specifying the geometry, lighting and material properties of a 3D environment, as well as a scripting interface for specifying object behaviours. Our attempt in this paper is to use the tools and techniques available within VRML for a dynamic e-learning environment.
 Index Terms - Virtual Reality, VRML, E-Learning, User Interface and Interactivity
Enterprise Wireless Fidelity Implementations Using Port Based Network Access Control (IEEE 802.1X)
Pages: 99-103 (5) | [Full Text] PDF (650K)
Noorul Ameen, Vincy Salam and Anil Sagar
Department of Information Technology, New Delhi, India
TKMIT, Kollam, Kerala, India

Abstract -
Enterprise Wireless Fidelity implementations have complicated requirements for Authentication, Authorization, Accounting (AAA) and detection of unauthorized access. Recent incidents show that unsecured implementations invite severe risk to enterprise network and data (especially for financial and critical sectors). In this paper a secure implementation is proposed which addresses most of the possible threats in enterprise arena. The system is based on IEEE 802.1X port based NAC. The System is having Authentication, Authorization and Accounting/Auditing Features.
 Index Terms - Wi-Fi, EAP, Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA), RADIUS and 802.1X
A PCA-AIS Approach for Intrusion Detection
Pages: 104-108 (5) | [Full Text] PDF (241K)
R. Sridevi, G. Jagajothi and Rajan Chattemvelli
Department of Information Technology, Shri Angalamman College of Engg & Tech, Trichirappalli, India
3Department of Information Technology, Periyar Maniammai University, Tanjore, India

Abstract -
Intrusion detection is now a significant part in computer and network security. Various intrusion detection approaches are presented to secure the network, but the performance of the system is reduced. Thus, to improve the detection rates and decrease false alarm rates in intrusion detection is important. The crux of an efficient intrusion detection system is its ability to differentiate between normal and potentially harmful activity. Earlier, developers had used coded rules and blocking specific activities for safeguarding the system. However, in view of the current and future threats, automated and adaptive detection systems are required to safeguard the system. In this paper, an adaptive intrusion system is proposed based on Artificial Immune Systems (AIS). The AIS is based on the Human Immune System (HIS). HIS can detect and defend against harmful and previously unknown invaders, so an Intrusion Detection System (IDS) based on the same principles is proposed. The KDD-cup dataset is used that is a benchmark for evaluating the security detection mechanisms. The Principal Component Analysis (PCA) is applied to transform the input samples into a new feature space.
 Index Terms - Intrusion Detection System (IDS), KDD Cup 99 Dataset, Principal Component Analysis (PCA) and Artificial Immune Systems (AIS)
Levelling with GPS
Pages: 109-113 (5) | [Full Text] PDF (292K)
Dr. Nagi Zomrawi Mohammed
College of Engineering, Sudan University of Science and Technology, Sudan

Abstract -
Levelling in surveying is the term stand for height difference determination between ground points. If a datum surface is defined for the observed points, the heights of these points (reduced levels) can be computed. In ordinary orthometric levelling geoid surface is usually used as a datum. Levelling process can be carried out using different survey equipments and techniques. It may be precise; when precise optical or digital levels are used, or it may be ordinary; when using ordinary optical, automatic or digital levels. Moreover it can be carried out trigonometrically or barometrically. Now a day Global Positioning System (GPS) provides a quick modern technology to determine heights of points. But here, the datum surface is already defined with ellipsoidal surface. Therefore, different reduced levels can be expected compared with orthometric levelling.....
 Index Terms - Levelling, GPS, Geoid and Ellipsoid
Legal Document Summarization using Latent Dirichlet Allocation
Pages: 114-117 (4) | [Full Text] PDF (166K)
Ravi kumar V. and K. Raghuveer
Research Scholar, Department of Information Science and Engineering, The National Institute of Engineering, Mysore, India
Faculty, Department of Information Science and Engineering, The National Institute of Engineering, Mysore, India

Abstract -
Online access to the legal judgments of cases for both past and present, from most of the courts around the world creates an opportunities and challenges for both the legal community and for information technology researchers. Due to this increased availability of legal judgments, it has become very much essential to provide a mechanism to extract information quickly and to present it in the form of a short summary from the given legal judgment. In this paper we propose an approach to generate a short summary from the given legal judgment using the topics obtained from Latent Dirichlet Allocation (LDA). The developed topic based document summarization model is capable of generating short summary in effective manner. As per our experience this is the first approach for Indian legal judgment summarization using LDA topic model.
 Index Terms - Latent Dirichlet Allocation (LDA), Legal Judgments and Legal Document Summarization