ISSN 2253-0150

HomeAbout IJISTEditorial BoardInstructions for AuthorsPaper submissionPeer ReviewContact
Editor-in-Chief :
Mohamed Ridda LAOUAR

Table of contents:
Volume 3 issue 2 - Current Issue
Published: 2015


- Richard Hacken.
Brigham Young University. Provo, USA

Big Data Challenges for Digital Libraries
Show/Hide Abstract

Thanks to technological progress, thanks to the copious Internet, thanks to geometrically burgeoning social media and to quickly proliferating sensors, the flood of data available to us is surging larger and larger, faster and faster. Paradigms for management and analysis are at the core of data-driven businesses and institutions, fueling the velocity of scientific research and development. The phrase “Big Data” was itself coined by scientists as they manipulated exploding data masses as a means of mapping the heavens on the astronomical scale and mapping the genome on the human scale. Now we are finding myriad uses between the celestial and the personal. The potential utility of Big Data in all fields of endeavor is as clear as are the challenges and difficulties. The entire enterprise of dealing with Big Data is so new that the field is still full of questions about the validity of the practice itself and the value of the means by which the data are analyzed. On the positive side, it is appropriate to point out how artifical intelligence may assist in legitimizing and validating approaches to massaging and interpreting Big Data. It is likewise relevant to point out how cloud computing (as series of widely interconnected digital repositories or cooperative workshops) and the use of mobile applications, (above all as sensing organs) can help us to put a human face on the computing power – a power which is not ultimately about capturing and counting things, not about crunching numbers, but rather about improving society and living conditions for the humans who live on the earth.

- Cihan Ulaş, Ulaş Aşık and Cantürk Karadeniz
TÜBİTAK BİLGEM, Kocaeli, Gebze

Analysis and Reconstruction of Laser Printer Information Leakages in the Media of Electromagnetic Radiation, Power, and Signal Lines
Show/Hide Abstract
In this paper, the emissions of a laser printer, which may contain classified information, are investigated in the media of electromagnetic radiation (ER), Power Line Conductors (PLC), and Signal Line Conductors (SLC). Analysis of modulated-type Compromising Emanations (CE) of printed data is mainly divided into three parts. First, the candidate frequency points of CE are examined in the frequency domain. Second, the emitted signal is AMdemodulated with the proper bandwidth, and then sampled by a high storage oscilloscope in these frequency points. Third, the collected data is converted to 2D image by applying signal and image processing techniques. In this study, apart from the ER signals, the emissions obtained from the power and signal line are also analyzed. In addition, this study introduces some practical measurement methods to reveal the possible CEs of laser printers. Finally, the procedure of the image reconstruction of CEs of the laser printer data is explained in detail. Experimental studies show that one can reconstruct the printed data successfully for the commercial printers.

- M. Rashid Hussain, Haris Ahmad Khan, Khurram Khurshid.
Military College of Signals, Rawalpindi, Pakistan.
Institute of Space technology, Islamabad Highway, Islamabad, Pakistan

Show/Hide Abstract
Preservation of historical documents is as critical as the history itself. Cultural advancements and modernization stems from lessons of history. Documentation does exists for these historical events / research, but owning to numerous factors like degradation, poor quality, accessibility and consultation makes this knowledge restricted, regional and monopolized limiting research and analysis around the globe. Researchers around the world have focused on this very challenging area and new innovations like word spotting have been introduced for document image retrievals. OCR systems do digitize and make the scanned images more readable yet they suffer from the limitation that they work well for good quality images. In any form of image retrieval techniques, binarization plays a pivotal role and can be termed as foundation stone for this framework. Lot of research has already been done in this area, yet scope does exists in this field which is evident from the fact that binarization competitions are held every year in renowned competitions like ICDAR. An effort has been made in this paper to undertake comparative analysis of leading document image binarization techniques with a view to suggesting options for researchers to employ various methods under different conditions. Diverse data set has been used covering wide spectrum of scope for meaningful results.

Wided BAKARI, Patrice BELLOT and Mahmoud NEJI.
Faculty of Economics and Management, Sfax. Tunisia.
Aix-Marseille University, Marseille. France.
A Survey of State-of-the-Art Arabic Question- Answering: Modeling, Generation, Experimentation and performance analysis
Show/Hide Abstract
This study provides a comparative study of Arabic question-answering systems. It presents a review of the main approaches and emphasizes the different experimentations in Arabic. It attempts to describe and detail the recent increase in interest and progress in Arabic questionanswering research. It compares already existing question-answering systems for this language. It reviews the various categories of proposed question-answering systems within a broader framework of several languages and Arabic. It projects the actual trends of researches in this area for improving the Arabic. Also, it suggests a performance analysis providing an in-depth review of Arabic question-answering, by first noting the characteristics of, and resources available for, Arabic proposed systems and then reviewing the main Arabic question-answering approaches.

- Ali SH. Alkhalid, Raaed K. Ibraheem and Roula AJ. Kadhim
Electrical and Electronic Engineering Techniques. Baghdad, Iraq.

Anti-Collision Enhancement of a SHA-1 Digest Using AES Encryption By LABVIEW
Show/Hide Abstract
A series of latest papers have pretended collision attacks on publicly used hash functions, including the widely published SHA-1 algorithm. To estimate this threat, the natural response has been to strengthening the system to overcoming the weakness that make the system apt to collision. The SHA-1 hash function used in many fields of security system such as digital signature, tamper detection, password protection and so on. SHA-1 is very important algorithm for integrity and authentication realization, SHA-1 is a one way algorithm to produce hash code of any message with 160 random hash bits, which cannot be reversible. AES with SHA-1 algorithm produce encrypted code that can be reversible to achieve confidentiality. From the implementation and simulation results of AES based on SHA-1 algorithm obtained in LabVIEW project show simplicity in modelling hash function algorithm generating hash codes encrypted by AES method.