Universal Journal of Computer Science and Engineering Technology @ 2012, unicse.editor@unicse.org Lorem ipsum dolor sit amet, consectetuer adipiscing elit, sed diam nonummy nibh euismod tincidunt ut laoreet 1- Cancer Diagnosis Using Modified Fuzzy Network, Download pdf. Essam Al-Daoud. Computer Science Department, Zarka University, Jordan. Abstract- In this study, a modified fuzzy c-means radial basis functions network is proposed. The main purposes of the suggested model are to diagnose the cancer diseases by using fuzzy rules with relatively small number of linguistic labels, reduce the similarity of the membership functions and preserve the meaning of the linguistic labels. The modified model is implemented and compared with adaptive neuro- fuzzy inference system (ANFIS). The both models are applied on "Wisconsin Breast Cancer" data set. Three rules are needed to obtain the classification rate 97% by using the modified model (3 out of 114 is classified wrongly). On the contrary, more rules are needed to get the same accuracy by using ANFIS. Moreover, the results indicate that the new model is more accurate than the state-of-art prediction methods. The suggested neuro-fuzzy inference system can be re-applied to many applications such as data approximation, human behavior representation, forecasting urban water demand and identifying DNA splice sites. Keywords- fuzzy c-means; radial basis functions; fuzzy-neuro; rules; cancer diagnosis. 2- Geometric Transformation Technique for Total Hip Implant in Digital Medical Images, Download pdf. Azrulhizam Shapi’i, Riza Sulaiman, Abdul Yazid Mohd Kassim. Faculty of Information Science and Technology, Universiti Kebangsaan, Malaysia. Abstract- The use of geometric transformation is extremely crucial in the medical field because it can assist surgeons in carrying out pre-surgery process effectively and properly. This study aims to produce techniques and algorithms that can be used to implement the implant transformation process such as rotation and reflection on medical images. The main objective of this paper is to show the hip joint implant transformation algorithm used in x-ray images of hip joint patients. The computerised hip joint replacement process developed by a group of researchers from the Industrial Computing Research Group, Faculty of Technology and Information Science, Universiti Kebangsaan Malaysia shows how the implant transformation process being perform. The code of two transformation algorithms (rotation and reflection transformation) were shown in this paper. The example showed that by using the suggested transformation, the position of the hip joint implant can be manipulated to obtain the optimal position on the x-ray images of patients. Keywords- Transformation; rotation; image; implant; total hip; geometric. 3- A Dedicated Web-Based Learning System, Download pdf. Said Ghoniemy, Ashraf Fahmy, Sultan Aljahdali. College of Computers and Information Systems,Taif University, Saudi Arabia. Abstract- The fields of Learning Management Systems (LMS) and Learning Content Management Systems (LCMS) are full of open source and commercial products including Blackboard, WEB CT, and Moodle. These systems are tutor-oriented, not designed to facilitate personalized learning support for an individual learner. Professors and students, frustrated with current LMS, need a new, innovative, user-friendly alternative to encourage and empower students to take control of their education, and teachers to explore new styles of teaching, depending on their students’ needs. Most of the students in the developing world, specially in the middle east region, suffer from limited English proficiency, in addition to limited computer skills. These obstacles compose a barrier to, and impose limitations on the design and implementation of E-learning systems. This paper introduces a prototype for a simple, dedicated, learner-oriented e-learning system to facilitate the learning process. The proposed system enables the student (even with moderate English level and general IT knowledge) to wander through the system, and register for a specific course to make use of the scientific material available there in. In addition, the design of a computer engineering course conforming SCORM standards is introduced. The proposed prototype is made available for students to examine and evaluate. Feedbacks will be analyzed and enhancements will be proposed. Keywords- component; e-learning; Learning Management Systems; Content Management Systems; Virtual University. 4- Adaptive System Simulation and Noise Analysis Toolbox (ASSNAT) : The Open-Source Toolbox Developed with Newer Features for Adaptive System Simulation, Download pdf. Ajoy Kumar Dey, Susmita Saha, Department of Signal Processing, Blekinge Tekniska Hogskola (BTH), Karlskrona, Sweden. Avijit Saha and Shibani Ghosh, Bangladesh University of Engineering and Technology, Dhaka, Bangladesh. Abstract- This paper introduces Adaptive System Simulation and Noise Analysis Toolbox (ASSNAT) version 1.1 (v1.1), which is an open- source MATLAB based software package for simulation and analysis of Adaptive signal processing systems and noises, with its new feature Learning curve method, where we can make an advanced level comparative study based analysis. ASSNAT v1.1 contains a variety of adaptive systems, filter algorithm and a wide range of input signals for simulation in a user friendly graphical interface. Central and advanced features, underlying models and algorithms, and case studies are presented in this paper to demonstrate the capabilities of this toolbox and its suitability for educational and research purposes. Keywords- adaptive systems; simulation; open-source; matlab; toolbox; algorithm; learning curve; ASSNAT v1.1. 5- Making secure Semantic Web, Download pdf. Adis Medić, Infosys ltd, Bos. Krupa, Bihać, Bosnia and Herzegovina. Adis Golubović, Primary School “Podzvizd”, Podzvizd, Velika Kladuša, Bosnia and Herzegovina. Abstract- This paper first describes ways of semantic web security implementation through layers. These layers are presented as a backbone for semantic web architecture and are represented in XML security, RDF security and in an idea of semantic web security standardization. Keywords- ontology; XML Schema; RDF Schema; OWL; Proof; Trust; 6- An Energy Aware WSN Geographic Routing Protocol, Download pdf. Adel Gaafar A.Elrahim, Hussein A.Elsayed, Salwa El Ramly,Magdy M. Ibrahim Electronics & Communication Eng. Dept, Ain Shams University, Cairo, Egypt. Abstract- Wireless Sensor Networks (WSNs) consist of small nodes with sensing, computation, and wireless communications capabilities. Many routing, power management, and data dissemination protocols have been specially designed for WSNs. The focus has been given to the routing protocols which might differ depending on the application and network architecture. In this paper, we propose an energy efficient data forwarding protocol called Energy Aware Geographic Routing Protocol (EAGRP) for wireless sensor networks to extend the life time of the network. In EAGRP, both position information and energy are available at nodes used to route packets from sources to destination. This will prolong the lifetime of the sensor nodes; hence the network life time and thus get higher packet delivery ratio and minimal compromise of energy efficiency. The proposed protocol is an efficient and energy conservative routing technique for multi-hop wireless sensor networks. The routing design of EAGRP is based on two parameters: location and energy levels of nodes. Each node knows the location and energy level of its neighbors. The performance measures have been analyzed with variable number of nodes. Our simulation results indicate that the proposed algorithm gives better performance in terms of higher packet delivery ratio, delay, and energy consumption. Keywords- Wireless Sensor Networks; Energy efficient; Position information; Routing protocol. 7- A Novel Business Intelligence System Framework, Download pdf. Hanumat G. Sastry, Dept of Computer Science, School of Science and Technology, Dravidian University, India. Venkatadri. M and Manjunath. G, Dept of Computer Science and Engineering, Jawaharlal Nehru Institute of Technology, India. Abstract- Business Intelligence (BI) systems plays a vital role in effective decision making in order to improve the business performance and opportunities by understanding the organization’s environments through the systematic process of information. The development of BI systems is limited due to its huge development costs. Developing the complex systems with Self Organized Multi Agent technology would reduce the building cost without affecting the scalability and reliability of the system. Hence, this paper presents a novel framework based on Self Organized Multi Agent technology for building the low cost BI systems. Keywords- Business Intelligence; Self organized systems; Self Organized Multi Agent systems; BI framework. 8- An Invisible Communication for Secret Sharing against Transmission Error, Download pdf. Rengarajan Amirtharajan, Vivek Ganesan, R Jithamanyu and John Bosco Balaguru Rayappan. School of Electrical & Electronics Engineering, SASTRA University, India. Abstract- The electronic and information revolutions have brought a plethora of sophistications to the today’s world. Computer, one of the versatile inventions of human, always has more to offer to the benefit of the planet. The electronic substitutions to the five senses of humans have unveiled many unknown possibilities of harnessing the power of computers. The security of information handled in real time transmission and reception like internet is of paramount consideration, as this information may be confidential. This paper proposes a novel solution for handling of confidential information in real time systems, using a modern steganographic approach instead of conventional cryptographic methods. The proposed solution brings down the required channel capacity to transfer secret data in real time systems besides improving security. Keywords- Information security; Steganography; Modified Least significant embedding(LSB); 9- A New Strategy for Gene Expression Programming and Its Applications in Function Mining, Download pdf. Yongqiang ZHANG, Jing XIAO. Hebei University of Engineering, Handan, P.R.China. Abstract- Population diversity is one of the most important factors that influence the convergence speed and evolution efficiency of gene expression programming (GEP) algorithm. In this paper, the population diversity strategy of GEP (GEP-PDS) is presented, inheriting the advantage of superior population producing strategy and various population strategy, to increase population average fitness and decrease generations, to make the population maintain diversification throughout the evolutionary process and avoid “premature” and to ensure the convergence ability and evolution efficiency. The simulation experiments show that GEP-PDS can increase the population average fitness by 10% in function mining, and decrease the generations for convergence to the optimal solution by 30% or more compared with other improved GEP. Keywords- Gene Expression Programming; GEP-PDS; Function Mining; Local Optimum 10- EM/Circuit Co-Simulation: A Highly Accurate Method for Microwave Amplifier Design, Download pdf. Syuhaimi Kassim and Fareq Malek. School of Computer and Communication Engineering, University Malaysia Perlis (UniMAP), Perlis, Malaysia. Abstract- This paper features a radical and highly accurate method of designing a microwave amplifier. A Full-wave Electromagnetic Simulator, which is based on the Method-of-Moments (MoM) numerical method, is used in parallel with the conventional microwave circuit simulator to demonstrate a superior performance outcome such as Stability, Return Loss and Small Signal Gain. This method known as EM/Circuit Co- Simulation guarantees a design that work with the first PCB and concurrently multiple PCB layouts are avoided, which saves design cost and development time respectively. The method is methodically demonstrated with the design of power amplifier (PA) based on E-pHEMT technology for IEEE 802.16e Mobile WiMAX applications. Keywords- Microwave Amplifier; IEEE 802.16e Mobile WiMAX; Method of Moments; Electromagnetic Simulator; EM/Circuit Co-Simulation. 11- Eliminating Vulnerable Attacks Using One-Time Password and PassText – Analytical Study of Blended Schema, Download pdf. M. Viju Prakash, Department of Computer Science & Engineering, Sardar Raja College of Engineering. P. Alwin Infant, Department of Computer Science & Engineering, Sardar Raja College of Engineering. S. Jeya Shobana, Department of Computer Science and engineering, Francis Xavier engineering College. Abstract- Secure network partially depends on user authentication and unfortunately authentication schemes used at present are not utterly secure. Some passwords are not computationally dominant, where brute force attacks on this unprecedented scale became potential. Here we have designed a combined schema of One Time Password (OTP) algorithm concatenated with PassText which makes uncomplicated to commit to memory and is computationally powerful. It can be fairly and rapidly provided to the system, while at the same time remaining impractical to break the brute force attack. OTP algorithm powered with user’s unique identifications like International Mobile Equipment Identification and Subscriber Identification Module; makes a finite alphanumeric token valid for a session and for a single use. PassText is an easy way of system authentication schema which enables the user not obligatory to memorize any difficult passwords or character combinations. Concatenation of these two schemas gives maximum security for authentications and almost impossible to break. We have also proposed a novel measure of security levels of many popular authentication schemas against the one we proposed. Keywords- Brute force, OTP, PassText, Token, Security. UniCSE Indexing UniCSE is indexed by: Ulrich Google Scholar DOAJ CABELL Docstoc Scribd CiteSeer OpenJ-Gate Call for Paper Full Paper Submission: 10 May 2012. Author Notification: 25 May 2012.