International Journal of Computer Science & Information Security
Total Page:16
File Type:pdf, Size:1020Kb
IJCSIS Vol. 13 No. 5, May 2015 ISSN 1947-5500 International Journal of Computer Science & Information Security © IJCSIS PUBLICATION 2015 Pennsylvania, USA JCSI I S ISSN (online): 1947-5500 Please consider to contribute to and/or forward to the appropriate groups the following opportunity to submit and publish original scientific results. CALL FOR PAPERS International Journal of Computer Science and Information Security (IJCSIS) January-December 2015 Issues The topics suggested by this issue can be discussed in term of concepts, surveys, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas. See authors guide for manuscript preparation and submission guidelines. Indexed by Google Scholar, DBLP, CiteSeerX, Directory for Open Access Journal (DOAJ), Bielefeld Academic Search Engine (BASE), SCIRUS, Scopus Database, Cornell University Library, ScientificCommons, ProQuest, EBSCO and more. Deadline: see web site Notification: see web site Revision: see web site Publication: see web site Context-aware systems Agent-based systems Networking technologies Mobility and multimedia systems Security in network, systems, and applications Systems performance Evolutionary computation Networking and telecommunications Industrial systems Software development and deployment Evolutionary computation Knowledge virtualization Autonomic and autonomous systems Systems and networks on the chip Bio-technologies Knowledge for global defense Knowledge data systems Information Systems [IS] Mobile and distance education IPv6 Today - Technology and deployment Intelligent techniques, logics and systems Modeling Knowledge processing Software Engineering Information technologies Optimization Internet and web technologies Complexity Digital information processing Natural Language Processing Cognitive science and knowledge Speech Synthesis Data Mining For more topics, please see web site https://sites.google.com/site/ijcsis/ For more information, please visit the journal website (https://sites.google.com/site/ijcsis/) Editorial Message from Managing Editor It is a honor for the editorial board to present the May 2015 issue of International Journal of Computer Science and Information Security (IJCSIS). The purpose of this edition is to publicize experimental and theoretical research from both industry and academia in the broad areas of Computer Science, ICT & Security and further bring together people who work in the relevant areas. As the editors of this issue, we are glad to see variety of articles focusing on the major topics of innovation and computer science; computer security, interdisciplinary applications, information technologies etc. This journal promotes excellent research publications which offer significant contribution to the computer science knowledge and which are of high interest to a wide academic/research/practitioner audience. As a scholarly open access peer-reviewed journal, we provide an outlet for quality research & academic publications and support universal access for international scientific community to scientific knowledge; and the creation and dissemination of scientific and technical information. IJCSIS archives all publications in major academic/scientific databases. Indexed by the following International agencies and institutions: Google Scholar, CiteSeerX, Cornell’s University Library, Ei Compendex, Scopus, DBLP, DOAJ, ProQuest and EBSCO. Moreover, Google Scholar reported increased in number cited papers published in IJCSIS. We support researchers to succeed by providing high visibility & impact value, prestige and efficient publication process & service. We thank our authors and look forward to your collaboration. As final words, Publish, Get Cited & Make An Impact. For further questions please do not hesitate to contact us at [email protected]. A complete list of journals can be found at: http://sites.google.com/site/ijcsis/ IJCSIS Vol. 13, No. 5, May 2015 Edition ISSN 1947-5500 © IJCSIS, USA. Journal Indexed by (among others): Bibliographic Information ISSN: 1947-5500 Monthly publication (Regular Special Issues) Commenced Publication since May 2009 Editorial / Paper Submissions: IJCSIS Managing Editor ([email protected]) Pennsylvania, USA Tel: +1 412 390 5159 IJCSIS EDITORIAL BOARD Professor Yong Li, PhD. School of Electronic and Information Engineering, Beijing Jiaotong University, P. R. China Professor Ying Yang, PhD. Computer Science Department, Yale University, USA Professor Hamid Reza Naji, PhD. Department of Computer Enigneering, Shahid Beheshti University, Tehran, Iran Professor Elboukhari Mohamed, PhD. Department of Computer Science, University Mohammed First, Oujda, Morocco Professor Mokhtar Beldjehem, PhD. Sainte-Anne University, Halifax, NS, Canada Professor Yousef Farhaoui, PhD. Department of Computer Science, Moulay Ismail University, Morocco Dr. Alex Pappachen James Queensland Micro-nanotechnology center, Griffith University, Australia Dr. Sanjay Jasola Professor and Dean, School of Information and Communication Technology, Gautam Buddha University Dr Riktesh Srivastava Assistant Professor, Information Systems, Skyline University College, University City of Sharjah, Sharjah, PO 1797, UAE Dr. Siddhivinayak Kulkarni University of Ballarat, Ballarat, Victoria, Australia Dr. T. C. Manjunath HKBK College of Engg., Bangalore, India Dr. Naseer Alquraishi University of Wasit, Iraq TABLE OF CONTENTS 1. Paper 30011502: A Survey on Detection of Sinkhole Attack in Wireless Sensor Network (pp. 1-9) George W. Kibirige & Camilius Sanga,, Department of Informatics, Sokoine University of Agriculture, SUA, Morogoro, Tanzania Abstract - Wireless Sensor Network (WSN) consists of large number of low-cost, resource-constrained sensor nodes. The constraints of the wireless sensor node is their characteristics which include low memory, low computation power, they are deployed in hostile area and left unattended, small range of communication capability and low energy capabilities. Base on those characteristics makes this network vulnerable to several attacks, such as sinkhole attack. Sinkhole attack is a type of attack were compromised node tries to attract network traffic by advertise its fake routing update. One of the impacts of sinkhole attack is that, it can be used to launch other attacks like selective forwarding attack, acknowledge spoofing attack and drops or altered routing information. It can also used to send bogus information to base station. This paper is focus on exploring and analyzing the existing solutions which used to detect and identify sinkhole attack in wireless sensor network. The analysis is based on advantages and limitation of the proposed solutions. Keywords: Wireless sensor network (WSN), sinkhole attack, detection of sinkhole attack 2. Paper 30041501: Decomposition and Denoise of an Image Using Singular Value Decomposition (pp. 10-12) Viji Paul, Department of Information Technology, Salalah College of Technology, Sultanate of Oman P. Selvaraju, Dept. of Computer Science & Engg, Vel Tech MultiTech Dr.RR and Dr.SR Engineering College, Avadi, Chennai, India D. Nagarajan, Department of Information Technology, Salalah College of Technology, Sultanate of Oman Abstract - Image decomposition is now essential for transmission and storage in database. Singular Value Decomposition is a decomposition technique for calculating the singular values, pseudo-inverse and rank of a matrix. The conventional way of doing this was to convert a matrix to row echelon form. The rank of a matrix is then given by the number of nonzero rows or columns of the echelon form. Singular value decomposition is one of the methods to compress and denoise the images. The main focus of this paper is to decompose and denoise an image using singular value decomposition. Keywords: SVD, decomposition, denoise. 3. Paper 30041503: An Improvement on Fragmentation in Distribution Database Design Based on Knowledge-Oriented Clustering Techniques (pp. 13-17) Van Nghia Luong, Department of Information Technology, Pham Van Dong University, Quang Ngai, Viet Nam Ha Huy Cuong Nguyen, Department of Information Technology, Quang Nam University, Quang Nam, Viet Nam Van Son Le, Da Nang University of Education, Da Nang University, Da Nang, Viet Nam Abstract — The problem of optimizing distributed database includes: fragmentation and positioning data. Several different approaches and algorithms have been proposed to solve this problem. In this paper, we propose an algorithm that builds the initial equivalence relation based on the distance threshold. This threshold is also based on knowledge- oriented clustering techniques for both of horizontal and vertical fragmentation. Similarity measures used in the algorithms are the measures developed from the classical measures. Experimental results carrying on the small data set match fragmented results based on the classical algorithm. Execution time and data fragmentation significantly reduced while the complexity of our algorithm in the general case is stable. Keywords — Vertical Fragmentation; Horizontal Fragmentation; Similarity Measure; Clustering Techniques; knowledge-oriented clustering techniques. 4. Paper 30041505: Visualizing Object-oriented Software for Understanding and Documentation (pp. 18-27) Ra’Fat AL-msie’deen, Department of Information Technology, Mutah University,