International Journal of Computer Networks and Communications Security

Volume 3, Issue 5, May 2015

 

 

 

The Application of Cellular Learning Automata in Individuals Identification on the Basis of iris Image

Pages: 200-204 (5) | [Full Text] PDF (415 KB)
NCC GHORBANI, HHS JAVADI
Department of Computer Engineering, Science and Research Branch, Islamic Azad University, Boroujerd, Iran
Department of Computer Engineering, Boroujerd Branch, Islamic Azad University, Boroujerd, Iran
Department of Applied Mathematics, Faculty of Mathematics and Computer Science, Shahed University, Tehran, Iran

Abstract -
Using biometric methods is one of the methods widely used for individuals identification. In this system, unique characteristics of individuals are used such as fingerprint, face recpgnition, image detection of iris or retinal, the form of ears and complex tissue, and the part nearer to pupil is called crinkle part. This area has an intensive tissue placed near to each other. An identification system on the basis of iris involves four steps as follows: step 1: getting the image and pre-processing, step 2: Segmentation, step 3: Normalization, step 4: features and characteristics extraction, and step 5: adaptation and Classification. Pre-processing step involves three steps such as zoning, normalization and recovery. In this study, the application of cellular learning automata is studied in image pre-processing constituted of simple components, and the behavior of each element and component is determined and improved on the basis of neighbors behavior and previous experiences. In this method, cells show a complex behavior by interacting with each other. Image features involving edges, lines, borders and etc can be extracted in machine sight and image processing by using some mathematics operations sight and image processing by using mathematics operations such as edge detection by gradient or by through applying suitable filters. By extracting these features, processing area can be segmented with higher precision. Cellular learning automata can be applied in terms of edge and border detection.
 
Index Terms - Cellular Learning Automata, Identification, iris, Moor Neighborhood, Canny

Citation - NCC GHORBANI, HHS JAVADI. "The Application of Cellular Learning Automata in Individuals Identification on the Basis of iris Image." International Journal of Computer Networks and Communications Security 3, no. 5 (2015): 200-204.

 

Quality of Service-Concept and Need for Wireless Telemedicine and E-Health Services

Pages: 205-207 (3) | [Full Text] PDF (169 KB)
A CHOPRA
Department of Computer Science And Engg. Giani Zail Singh-PTU Campus, Bathinda (Pb.)(151001), India

Abstract -
In this article we mainly look for the merits of IEEE 802.11 wireless standard in the field of Telemedicine and E-health by examining its Quality Of Service (QoS). The important and one of the foremost demand of medical application is the need to introduce and modernize the concept of QoS to improve medical networks. One of the necessity is the data delivery of patient in emergency cases via network services. Most important concept to implement this idea is to take proper steps to device a good telemedicine and e-health service by having a planned scheme of handoffs for QoS to support wireless networks. The technology which we use should have a motive to reduce patients journey, hospital admissions and also to raise the standard of care and treatment which has to be delivered to the patient. We all know in medical networks time factor plays a vital role and thus there should be no delay in order to save the life of a serious patient. In remote areas where it is difficult have immediate medical service, telemedicine and e-health services come out with the best solutions to provide patient with the medical aid. Thus to make these services perform at their best QoS needs to be maintained. This paper mainly emphasis on the architecture needed to improve and maintain QoS to make the provision of telemedicine and e-health services perform at their very best level.
 
Index Terms - QoS, Telemedicine, E-Health, Priority, Mobihealth, Handoffs

Citation - A CHOPRA. "Quality of Service-Concept and Need for Wireless Telemedicine and E-Health Services." International Journal of Computer Networks and Communications Security 3, no. 5 (2015): 205-207.

 

SECURITY & PRIVACY BY DESIGN: A new approach for Healthcare Information and Communication Systems

Pages: 208-219 (12) | [Full Text] PDF (418 KB)
AAE KALAM, Jean-Philippe LEROY, L B, Jean-Marie MAHE
IPI -LISER / Propedia, Paris, France

Abstract -
Nowadays, more and more applications use sensitive and personal information. Subsequently, respecting citizens privacy while preserving information security is becoming extremely important. Initially, deploying security mechanisms as well as Privacy-Enhancing Technologies (PETs) was seen as the solution. Today, we realize that a more substantial approach is required, taking into account the security and privacy needs from the earlier steps of the system specification. Dedicated to this issue, this paper is organized as follows: after defining the topic through several examples, this paper analyzes the most typical anonymization procedures used in various countries and presents the main privacy-related concepts. Then, it suggests a rigorous approach to define suitable anonymization solutions and mechanisms through the needs, objectives and requirements. Afterwards, a representative range of scenarios is presented and confronted to the approach already described. Finally, a new generic procedure to anonymize and link identities is suggested. Details about the implementation and analysis of our solution are also presented. Our approach takes the purpose of use into consideration, guarantees the citizens consent, resists dictionary attacks, respects the least privilege principle and thus fulfills the European legislation requirements. Even if our approach is applied in this paper to healthcare examples, it could also be suitable to every system with security and privacy needs.
 
Index Terms - Anonymization, Security, Privacy, Health Care, Electronic Medical Records

Citation - AAE KALAM, Jean-Philippe LEROY, L B, Jean-Marie MAHE. "SECURITY & PRIVACY BY DESIGN: A new approach for Healthcare Information and Communication Systems." International Journal of Computer Networks and Communications Security 3, no. 5 (2015): 208-219.

 

Efficient Scheduling in Cloud Networks Using Chakoos Evolutionary Algorithm

Pages: 220-224 (5) | [Full Text] PDF (320 KB)
M ALIPORI, HHS JAVADI
Department of Computer Engineering, Science and Research Branch, Islamic Azad University, Boroujerd, Iran
Department of Computer Engineering, Boroujerd Branch, Islamic Azad University, Boroujerd, Iran
Department of Applied Mathematics, Faculty of Mathematics and Computer Science, Shahed University, Tehran, Iran

Abstract -
Since scheduling of tasks graph is a NP-hard problem, considering approaches based on undeterminisitic methods such as evolutionary processing, mostly genetic and chakoos algorithms will be effective. Therefore, an efficient algorithm has been proposed for scheduling of tasks graph to obtain an appropriate scheduling with minimum time. In this algorithm, the new approach is based on making the length of the critical path shorter and reducing cost of communication. Finally, the results obtained from implementation of the presented method show that this algorithm acts as same as other algorithms when it faces with graphs without communication cost. It performs quicker and better than some algorithms like DSC and MCP algorithms when it faces with the graphs involving communication cost.
 
Index Terms - Cloud Computing, Scheduling, Tasks Graph, Chakoos Algorithm

Citation - M ALIPORI, HHS JAVADI. "Efficient Scheduling in Cloud Networks Using Chakoos Evolutionary Algorithm." International Journal of Computer Networks and Communications Security 3, no. 5 (2015): 220-224.

 

The Impact of Distance Metrics on K-means Clustering Algorithm Using in Network Intrusion Detection Data

Pages: 225-228 (4) | [Full Text] PDF (226 KB)
H NASOOTI, M AHMADZADEH, M KESHTGARY, SV FARRAHI
Shiraz University of Technology, Department of Computer Engineering and IT, Shiraz, Iran

Abstract -
A Network Intrusion Detection System (NIDS) can detect suspicious activities that aimed to harm the network. Since, NIDS help us to keep the networks safer many researchers are motivated to propose more accurate NIDS. K-means clustering algorithm is a distance-based algorithm which widely used in IDS research area. This paper aimed to evaluate the impact of Euclidean and Manhattan distance metrics on K-means algorithm using for clustering KDD cup99 intrusion detection data. Experimental results indicate that Manhattan distance metric performs better in terms of performance evaluation metrics than Euclidean distance metric.
 
Index Terms - K-means Clustering, Network Intrusion Detection, Euclidean Distance, Manhattan Distance, Data Mining

Citation - H NASOOTI, M AHMADZADEH, M KESHTGARY, SV FARRAHI. "The Impact of Distance Metrics on K-means Clustering Algorithm Using in Network Intrusion Detection Data." International Journal of Computer Networks and Communications Security 3, no. 5 (2015): 225-228.

 

A REVIEW: Distributed File System

Pages: 229-234 (6) | [Full Text] PDF (219 KB)
S Asadianfam, M Shamsi, S Kashany
Department of Computer Engineering, Qom Branch, Islamic Azad University, Qom, Iran
Department of Electrical & Computer Engineering, Qom University of Technology, Qom, Iran

Abstract -
Data collection in the world are growing and expanding. This capability, it is important that the infrastructure must be able to store a huge collection of data on their number grows every day. The conventional methods are used in data centers for capacity building, costs of software, hardware and management of this process will be very high, today. File system architecture is that, independent of the data stored in its metadata. All of Distributed File System (DFS) are used for processing, storing and analyzing very large amount of unstructured data. The most common file system can be noted Google File System (GFS) and Hadoop Distributed File System (HDFS). In this paper, we present a review on design of distributed file system. File systems compared by scalability, availability, compatibility, extensibility, autonomy and etc.
 
Index Terms - Distributed File System, Big Data, Design of DFS, Hadoop Distributed File System(HDFS), Google File System(GFS), Review of DFS

Citation - S Asadianfam, M Shamsi, S Kashany. "A REVIEW: Distributed File System." International Journal of Computer Networks and Communications Security 3, no. 5 (2015): 229-234.