Current Issue : October - December Volume : 2012 Issue Number : 4 Articles : 5 Articles
The increasing number of information systems\r\nrequires a reliable authentication technique for information\r\nsecurity. Password only is not enough to protect user account\r\nbecause it is still vulnerable to any intrusion. Therefore an\r\nauthentication system using dynamic keystrokes can be the\r\nsimplest and the best choice. Dynamic Keystroke Authentication\r\nSystem (DKAS) becomes an effective solution which can be easily\r\nimplemented to gain a high security information system with the\r\naid of a computer keyboard. DKAS verify users based on their\r\ntyping rythm. Two main stages of DKAS is the enrollment stage\r\nto register user into the system, and the authentication stage to\r\ncheck the authenticity of user. Moreover, we use a local threshold\r\nto make it becomes adaptive behaviometric for each user. From\r\nthe experiment conducted, the accuracy rate in distinguishing\r\ngenuine and impostor user is 91.72%. This shows that the\r\nadaptive method of DKAS has a promising result....
Satellite imagery is very useful in information\r\nacquisition of the earth''s surface image, especially the earth''s\r\nresources. However, in the process of retrieval information from\r\nsatellite imagery is often found barriers that can obscure or even\r\ncover the imaging of an area. One of these barriers is a cloud,\r\nwhich result the image that covered with lots of noise. Wavelet\r\ntransformation was usually used to enhance the image or to\r\neliminate striping noise on satellite image. In this paper is used\r\nDiscrete Haar Wavelet transformation to reduce cloud noise on\r\nLandsat TM image. The process includes the Haar Wavelet\r\ndecomposition of image rows and columns. After that,\r\nthresholding process is also applied for de-noising. Thresholding\r\nresults are then reconstructed using the Inverse Discrete Haar\r\nWavelet. The method is applied to the variation of the band\r\nimage, the type of thresholding (hard and soft), as well as the size\r\nof the image convolution. The testing results on the band 1 to\r\nband 6 of Landsat TM imagery showed that the lowest error\r\nvalues are calculated by RMSE (Root Mean Square Error)\r\npresent in band 1. Image signal to noise ratio in band 1 has the\r\nhighest value, which means most high-power image signal to\r\nnoise. This mean that band 1 has the highest pixel value\r\nsimilarity between whole testing data....
A method based on discrete wavelet decomposition of\r\ntraffic data and statistical processing algorithms based on Fisher\r\nand Cochran criteria are proposed for detection of traffic\r\nanomaly in computer and telecommunication networks. Two\r\nsliding windows with two different threshold values are employed\r\nto reduce the level of false alerts. A high efficiency level of\r\ndetection of abnormal traffic spikes is thus guaranteed. The\r\npaper likewise presents an algorithm developed for detecting DoS\r\nand DDoS attacks based on these statistical criteria. Software is\r\ndeveloped in Matlab based on the proposed algorithm. Data sets\r\nmade available by the Lincoln Laboratory of MIT (1999 DARPA\r\nIntrusion Detection Evaluation) were analyzed as the test\r\nsequence. Analysis of experimental results revealed that the\r\nultimate test for detecting an attack is to check if any one of the\r\nstatistical criteria exceeds the upper threshold at the stage of\r\ncoefficients reconstruction....
this paper presents Windows Message Device\r\nChange Tracking (WMDCT) program to protect\r\nWindows systems from Universal Serial Bus (USB)\r\nviruses which use the AutoRun property to execute.\r\nThe WMDCT program introduces a new method\r\nto develop the traditional ways of protecting techniques,\r\nwhich are used by other anti-viruses programs. The main\r\ntwo parts of WMDCT program are monitoring and\r\ntracking Windows Message Device Change, which is a\r\nmessage that is sent by the system, in the background,\r\nand removing or repairing the infected files in the USB\r\nflash drive. WMDCT has been tested in the University of\r\nMosul/ Computer Science Dept. labs and the results have\r\nbeen mentioned in this paper....
Wireless Sensor Networks (WSNs) present a new\r\ngeneration of real-time embedded systems with limited\r\ncomputation, energy and memory resources. They are\r\nbeing used in a wide variety of applications where\r\ntraditional networking infrastructure is practically\r\ninfeasible. Appropriate cluster-head node election can\r\ndrastically reduce the energy consumption enhancing so\r\nthe network lifetime. In this paper, a fuzzy logic\r\napproach to cluster-head election is proposed based on\r\nthree descriptors - energy, concentration and centrality\r\nof nodes. Simulation shows that depending upon\r\nnetwork configuration, a substantial increase in\r\nnetwork lifetime can be accomplished as compared to\r\nprobabilistically selecting the nodes as cluster-heads\r\nusing only local information....
Loading....