Tuesday 17 May 2011

Developing a Block-Cipher-Key Generator Using Philosophy of Data Fusion Technique


AuthorSoukaena H. Hashem, Mohammad A. AL-Hamami, Alaa H. AL-Hamami
ISSN2079-8407
On Pages222-227
Volume No.2
Issue No.5
Issue DateMay 01, 2011
Publishing DateMay 01, 2011
KeywordsData Fusion, Block Cipher, key generator, Data Encryption Standard, Artificial Neural Network, and Genetic Algorithm


Abstract

Good cryptographic systems should always be designed so that they are as difficult to break as possible. This research will concentrate on increasing the complexity of block cipher encryption. This complexity could be done by building a dynamic pool that consists of thousands of fused random bits;...
Download Link:

Download Link

A Comparative Study of Available Protocols during Privacy Preservation in Secure Multiparty Computation


AuthorZulfa Shaikh, Poonam Garg
ISSN2079-8407
On Pages219-221
Volume No.2
Issue No.5
Issue DateMay 01, 2011
Publishing DateMay 01, 2011
KeywordsSecurity, Privacy, Correctness, Secure Multiparty Computation.


Abstract

In this paper, comparative study of different available Secure Multiparty Computation (SMC) protocols have been addressed. In SMC, a set of parties wishes to jointly compute some function on their inputs. This computation must preserve certain security properties, like privacy and correctness.... 

Download Link:

An ATMS-Based Tool for Locating Honor Cards in Rubber Bridge


uthorAli Awada, May Dehayni, Antoun Yaacoub
ISSN2079-8407
On Pages209-218
Volume No.2
Issue No.5
Issue DateMay 01, 2011
Publishing DateMay 01, 2011
KeywordsBridge, Honor card location, ATMS, Abduction Reasoning, Consistency management.


Abstract

This paper deals with the problem of providing assistance to a Bridge player using Artificial Intelligence techniques. In order to achieve this goal, we propose an approach that consists in making assumptions about the honor cards location,......

Download Link:

Investigate the Result of Object Oriented Design Software Metrics on Fault-Proneness in Object Oriented Systems: A Case Study


AuthorAmjan. Shaik, N.Satyanarayana, Mohammed Huzaifa, Nazeer Shaik, Mohd Zainuddin Naveed, S.V.Achuta Rao, C.R.K.Reddy
ISSN2079-8407
On Pages201-208
Volume No.2
Issue No.4
Issue DateApril 01, 2011
Publishing DateApril 01, 2011
KeywordsObject Oriented Metrics, Coupling, Cohesion, Inheritance, Empirical Analysis.


Abstract

In the last decade, empirical studies on object-oriented design metrics have shown some of them to be useful for predicting the faults-proneness of classes in object-oriented software systems. It would be valuable to know how object-oriented design metrics and class fault-proneness ......

Download Link:

Meta Similarity Noise-free Clusters Using Dynamic Minimum Spanning Tree with Self-Detection of Best Number of Clusters


AuthorT. Karthikeyan, S. John Peter
ISSN2079-8407
On Pages192-200
Volume No.2
Issue No.4
Issue DateApril 01, 2011
Publishing DateApril 01, 2011
KeywordsEuclidean minimum spanning tree, Subtree, Clustering, Eccentricity, Center, Hierarchical clustering, Dendrogram, Cluster validity, Cluster Separation, Outliers


Abstract

Clustering is a process of discovering group of objects such that the objects of the same group are similar, and objects belonging to different groups are dissimilar. A number of clustering algorithms exist that can solve the problem of clustering, but most of them are very sensitive to their input parameters. Minimum Spanning Tree clustering algorithm is capable of detecting clusters with irregular boundaries....

Download Link:

Self-Stabilizing Leader Election Algorithm in Highly Dynamic Ad-hoc Mobile Networks


AuthorK Ranganath, L.Naveen Kumar, Y.V.Sreevani
ISSN2079-8407
On Pages187-191
Volume No.2
Issue No.4
Issue DateApril 01, 2011
Publishing DateApril 01, 2011
KeywordsSelf-stabilizing, Leader node, Ad hoc networks, Bandwidth, MANET.


Abstract

We propose a self-stabilizing leader election algorithm that can tolerate multiple concurrent topological changes. By introducing the time interval based computation concept, the algorithm ensures that a network partition within a finite time converge to a legitimate state even if topological changes occur during the convergence time. An ad hoc network is a collection of mobile nodes forming a temporary network....

Download Link:

Self-Stabilizing Leader Election Algorithm in Highly Dynamic Ad-hoc Mobile Networks


AuthorK Ranganath, L.Naveen Kumar, Y.V.Sreevani
ISSN2079-8407
On Pages187-191
Volume No.2
Issue No.4
Issue DateApril 01, 2011
Publishing DateApril 01, 2011
KeywordsSelf-stabilizing, Leader node, Ad hoc networks, Bandwidth, MANET.


Abstract

We propose a self-stabilizing leader election algorithm that can tolerate multiple concurrent topological changes. By introducing the time interval based computation concept, the algorithm ensures that a network partition within a finite time converge to a legitimate state even if topological changes occur during the convergence time. An ad hoc network is a collection of mobile nodes forming a temporary network...

Download Link:

Eye Detection and Tracking in Image with Complex Background


AuthorMohammadali Azimi Kashani, Mahdi Mollaei Arani, Mohammad Reza Ramezanpour
ISSN2079-8407
On Pages182-186
Volume No.2
Issue No.4
Issue DateApril 01, 2011
Publishing DateApril 01, 2011
Keywordseye detection; eye tracking; kallman filter


Abstract

To detect and track eye images with complex background, distinctive features of user eye are used. Generally, an eye-tracking and detection system can be divided into four steps: Face detection, eye region detection, pupil detection and eye tracking. To find the position of pupil, first, face region must be separated from the rest of the image, this will cause the images background to be non effective in our next steps....

Download Link:

Information Computing in Crime Mapping: The Pocket Man Case of Criminal Child Sexual Abuse


AuthorPetter Gottschalk, Morten Espen Ørn
ISSN2079-8407
On Pages173-181
Volume No.2
Issue No.4
Issue DateApril 01, 2011
Publishing DateApril 01, 2011
KeywordsPolice service, Knowledge management, Value configuration, Criminal case, Value shop


Abstract

It took Norwegian police thirty-two years to capture the Pocket Man who was responsible for more than hundred sexual abuses over that same time period. This article presents a study police investigations of the abuses by applying the value shop configuration. Primary activities in the value shop are (i) problem definition; (ii) investigation steps; (iii) investigation decision; (iv) investigation implementation; and (v) police performance evaluation. As discussed in this article, each value shop activity had serious deficiencies in the investigations of Pocket Man cases.  

Download Link:

Employing CORBA in the Mobile Telecommunications Sector and the Application of Component Oriented Programming Techniques


AuthorPaul Storey, Raul Valverde
ISSN2079-8407
On Pages163-172
Volume No.2
Issue No.4
Issue DateApril 01, 2011
Publishing DateApril 01, 2011
Keywords3G, Component, CORBA, ORB, Performance, Telecommunications, Wireless.


Abstract

This paper focuses on the implications of employing CORBA Middleware in today’s wireless telecommunications services and applications developments. It seeks to understand what current opportunities exist to support the use of this technology and assesses some of the performance implications that might be encountered. Discussion also revolves around the use of Component Oriented Development techniques..

Download Link:

Detecting Auto Insurance Fraud by Data Mining Techniques

The paper presents fraud detection method to predict and analyze fraud patterns from data. To generate classifiers, we apply the Naïve Bayesian Classification, and Decision Tree-Based algorithms. A brief description of the algorithm is provided along with its application in detecting fraud....

Download Link:


[Journal of Computing...]

Journal of Emerging Trends in Computing and Information Sciences


International Journal of Emerging Trends in Computing and Information Sciences (E-ISSN 2218-6301/ ISSN 2079-8407) is an International refereed research publishing journal with a focused aim of promoting and publishing original high quality research dealing with theoretical and scientific aspects in all disciplines of Computing and Information Sciences.

All technical or research papers and research results submitted to CIS should be original in nature. Contributions should be written for one of the following categories:
  1. Original research
  2. Literature Review / Systematic Literature Review
  3. Short Articles on ongoing research
  4. Preliminary Findings
  5. Technical Reports / Notes
Results previously published in conferences and/or journals may be submitted as extended versions. For more info, please visit Journal of Computing