International Journal of Modern Education and Computer Science (IJMECS)

IJMECS Vol. 4, No. 1, Jan. 2012

Cover page and Table of Contents: PDF (size: 593KB)

Table Of Contents

REGULAR PAPERS

Element-Based Computational Model

By Conrad Mueller

DOI: https://doi.org/10.5815/ijmecs.2012.01.01, Pub. Date: 8 Jan. 2012

A variation on the data-flow model is proposed to use for developing parallel architectures. While the model is a data driven model it has significant differences to the data- flow model. The proposed model has an evaluation cycle of processing elements (encapsulated data) that is similar to the instruction cycle of the von Neumann model. The elements contain the information required to process them. The model is inherently parallel. An emulation of the model has been implemented. The objective of this paper is to motivate support for taking the research further. Using matrix multiplication as a case study, the element/data-flow based model is compared with the instruction-based model. This is done using complexity analysis followed by empirical testing to verify this analysis. The positive results are given as motivation for the research to be taken to the next stage - that is, implementing the model using FPGAs.

[...] Read more.
Perceived Gender Classification from Face Images

By Hlaing Htake Khaung Tin

DOI: https://doi.org/10.5815/ijmecs.2012.01.02, Pub. Date: 8 Jan. 2012

Perceiving human faces and modeling the distinctive features of human faces that contribute most towards face recognition are some of the challenges faced by computer vision and psychophysics researchers. There are many methods have been proposed in the literature for the facial features and gender classification. However, all of them have still disadvantage such as not complete reflection about face structure, face texture. The features set is applied to three different applications: face recognition, facial expressions recognition and gender classification, which produced the reasonable results in all database. In this paper described two phases such as feature extraction phase and classification phase. The proposed system produced very promising recognition rates for our applications with same set of features and classifiers. The system is also real-time capable and automatic.

[...] Read more.
A Frame of Intrusion Detection Learning System Utilizing Radial Basis Function

By S.Selvakani Kandeeban R.S.Rajesh

DOI: https://doi.org/10.5815/ijmecs.2012.01.03, Pub. Date: 8 Jan. 2012

The process of monitoring the events that occur in a computer system or network and analyzing them for signs of intrusion is known as Intrusion Detection System (IDS). Detection ability of most of the IDS are limited to known attack patterns; hence new signatures for novel attacks can be troublesome, time consuming and has high false alarm rate. To achieve this, system was trained and tested with known and unknown patterns with the help of Radial Basis Functions (RBF). KDD 99 IDE (Knowledge Discovery in Databases Intrusion Detection Evaluation) data set was used for training and testing. The IDS is supposed to distinguish normal traffic from intrusions and to classify them into four classes: DoS, probe, R2L and U2R. The dataset is quite unbalanced, with 79% of the traffic belonging to the DoS category, 19% is normal traffic and less than 2% constitute the other three categories. The usefulness of the data set used for experimental evaluation has been demonstrated. The different metrics available for the evaluation of IDS were also introduced. Experimental evaluations were shown that the proposed methods were having the capacity of detecting a significant percentage of rate and new attacks.

[...] Read more.
Using Virtual Security Lab in Teaching Cryptography

By Salma M. Gaffer Daniyal M. Alghazzawi

DOI: https://doi.org/10.5815/ijmecs.2012.01.04, Pub. Date: 8 Jan. 2012

Teaching Information Security for undergraduate students requires a safe hand-on environment for practicing. This paper focuses on using a virtual lab for two modules in cryptography concepts. At the end, a survey was conducted on a group of students at the Information Systems Department at the King Abdulaziz University to measure the performance of the students’ outcomes in the lab comparing with other students from a previous semester. The result of the survey shows a significant feedback on the system.

[...] Read more.
Finding Vulnerabilities in Rich Internet Applications (Flex/AS3) Using Static Techniques

By Sreenivasa Rao Basavala Narendra Kumar Alok Agarrwal

DOI: https://doi.org/10.5815/ijmecs.2012.01.05, Pub. Date: 8 Jan. 2012

The number and the importance of Rich Internet Applications (RIA) have increased rapidly over the last years. At the same time, the quantity and impact of security vulnerabilities in such rich internet applications (RIA) have increasing as well. Since manual code reviews are time consuming, error prone and costly and it need skilled developers or programmers to review the manual source code review, the need for automated solutions has become evident. In this paper, we address the problem of application security vulnerable detection in Adobe Flex (Rich Internet Applications) platform in web 2.0 applications by means of static source code analysis. To this end, we present precise analysis targeted at the unique reference semantics commonly found in RIA based web applications or widgets (small applications which will run on fly i.e. drag and drop) developed in Adobe Flex Framework or Action Script 3.0. Moreover, we enhance the quality and quantity of the generated vulnerability reports. 

[...] Read more.
Development of Electronic Passport Scheme for Cryptographic Security and Face, Fingerprint Biometrics using ASP.Net

By V.K. Narendira Kumar B. Srinivasan

DOI: https://doi.org/10.5815/ijmecs.2012.01.06, Pub. Date: 8 Jan. 2012

Biometric passports is to prevent the illegal entry of traveler into a specific country and limit the use of counterfeit documents by more accurate identification of an individual. The e-passport, as it is sometimes called,represents a bold initiative in the deployment of two new technologies: Cryptography security and biometrics face and fingerprints. The privacy and security implications of this impending worldwide experiment in biometrics face and fingerprints authentication technology. An overall security process that involves people, technology and procedures can overcome limitations of the Cryptography security and face and fingerprint biometric passport using ASP.Net.

[...] Read more.
Blinds Children Education and Their Perceptions towards First Institute of Blinds in Pakistan

By Tanzila SABA

DOI: https://doi.org/10.5815/ijmecs.2012.01.07, Pub. Date: 8 Jan. 2012

This paper investigates the parental participation,their perceptions and opinions about the education of their visually handicapped children in the first institute for the blinds children in Multan Pakistan. Students with visual impairments have unique educational needs which could most effectively meet using a team approach of professionals,parents and students. In order to meet their unique needs,students must have specialized services, books and materials in appropriate media to enable them to most effectively compete with their peers in school and ultimately in society.This study examines the role of education imparted by the institute as felt by the parents of visually impaired children admitted at the institute for blinds.

[...] Read more.
The Model of the Evolution of the Knowledge Content and Contemporary Science Education Crisis

By Tadeusz Wibig Punsiri Dam-o

DOI: https://doi.org/10.5815/ijmecs.2012.01.08, Pub. Date: 8 Jan. 2012

We try to diagnose the situation in science education in the beginning of the 21st century. The coincidence of the occurrence of the global science education crisis and rapid acceleration of development of the science itself allows us to derive a differential equation describing basic patterns of development of human knowledge, using a few quite obvious parameters defined by social and biological determinants of the given moment in history.We then examine the proposed solutions of the general educational problem. Predictions about the evolution of knowledge/science give us the ability to reject some of them,and the analysis of social needs, seems to lead to the one,which we called a "three-way system".

[...] Read more.