

A Various Issues in Image Steganography that Using LSB Technique |
Pages: 363-366 (4) | [Full Text] PDF (159 KB) |
M S Atoum, M M A Shquier |
Faculty of Science, Information Technology, Irbid National UniversityFaculty of Science, Faculty of Information Technology, Jerash University |
Abstract - This paper presents the issues and challenges faced for image steganographic techniques. Many LSB method techniques were developed in recent year using direct or un-direct position to embed secret message into cover. Some techniques for embedding information in Image files were reviewed, and recommendations are being proposed for the best strategy of hide information in image files and the possibility of finding other new techniques hiding information in image files. |
Index Terms - LSB, Steganography, Image Steganography |
C itation - M S Atoum, M M A Shquier. "A Various Issues in Image Steganography that Using LSB Technique." International Journal of Computer Networks and Communications Security 3, no. 9 (2015): 363-366. |
Privacy Issues in Access Control of Web Services: An Appraisal |
Pages: 367-372 (6) | [Full Text] PDF (232 KB) |
R BHATIA, M SINGH |
Punjabi University Regional Centre, MohaliPunjabi University, Patiala |
Abstract - Privacy is the right of individuals to determine for themselves when, how and to what extent information about them is communicated to others. Due to the rapid growth in popularity of web services, the complexity of their access control policies is also rising, thus, increasing the likelihood of inadvertent privacy disclosures. Anyone involved in e-business transactions would believe that it is axiomatic that privacy is a building block of effective collaborations of web services. Most of the stakeholders are reluctant to use web services as they are not confident about the privacy preservation of their credentials and this attitude is hampering the growth of web based businesses. These web services collect, store, process and share information about lakhs of citizens, who have different notions and preferences related to their Privacy. This promotes a number of ethical, legal and technical issues that must be addressed at a global level to preserve online privacy of e-Citizens. This paper provides an appraisal of privacy related works in web services access control process. |
Index Terms - Access Control, Trust, Web Services, Privacy, Service Collaborations |
C itation - R BHATIA, M SINGH. "Privacy Issues in Access Control of Web Services: An Appraisal." International Journal of Computer Networks and Communications Security 3, no. 9 (2015): 367-372. |
Review: Information Retrieval Techniques and Applications |
Pages: 373-377 (5) | [Full Text] PDF (369 KB) |
A Roshdi, A Roohparvar |
Departmentof Engineering, Khoy branch, Islamic Azad University, Khoy, IRANDepartment of Engineering, Qom branch, Islamic Azad University, Qom, IRAN |
Abstract - For thousands of years people have realized the importance of archiving and finding information. With the advent of computers, it became possible to store large amounts of information; and finding useful information from such collections became a necessity. The field of Information Retrieval (IR) was born in the 1950s out of this necessity. Over the last forty years, the field has matured considerably. Several IR systems are used on an everyday basis by a wide variety of users. Information retrieval is become a important research area in the field of computer science. Information retrieval (IR) is generally concerned with the searching and retrieving of knowledge-based information from database. In this paper, we represent the various models and techniques for information retrieval. In this Review paper we are describing different indexing methods for reducing search space and different searching techniques for retrieving a information. We are also providing the overview of traditional IR models. |
Index Terms - Information Retrieval (IR), Indexing, IR mode,Searching, Vector Space Model (VSM) |
C itation - A Roshdi, A Roohparvar. "Review: Information Retrieval Techniques and Applications." International Journal of Computer Networks and Communications Security 3, no. 9 (2015): 373-377. |
Decrease Interference Using Adaptive Modulation and Coding |
Pages: 378-383 (6) | [Full Text] PDF (651 KB) |
O M Elfadil, Y M Alkasim, R A Ali |
Department of Electrical and Electronics Engineering, Omdurman Islamic University |
Abstract - The limitations of channel bandwidth, time varying channel and fading are significant and fundamental problem in wireless communication, which leads to the difficulty of providing high Quality of Service. The traditional wireless communication systems are designed to provide good quality of services at the worst channel conditions. Wherein any attempts to increase the channel bandwidth, interference arises along with these attempts. And result in inefficient utilization of the full channel capacity. One of the efficient techniques to overcome to these problems is known as adaptive modulation and coding (AMC). This paper was prepared as simulation study of interference decreasing using AMC algorithm where a comparison between ordinary modulation techniques is compared to Multicarrier Modulation MCM and adaptive modulation, results of the simulation was observed and compared for above scenarios. |
Index Terms - MCM, SCM, OFDM, AMC, BER, AWGN, Rayleigh |
C itation - O M Elfadil, Y M Alkasim, R A Ali. "Decrease Interference Using Adaptive Modulation and Coding." International Journal of Computer Networks and Communications Security 3, no. 9 (2015): 378-383. |