World of Computer Science and Information Technology Journal FA Multilayered Secure, Robust and High Capacity Image Steganographic Algorithm Abstract: It is observed that all of the current steganographic algorithms  rely heavily on the conventional encryption systems which do not serve  well in the context of image steganography. Advanced encryption standard  (AES) is one of the most powerful techniques of cryptography which can be  used as an integral part of steganographic system for better confidentiality  and security. In this paper we propose a reversible image steganographic  embedding algorithm consisting of three parts. First, we use the self-  synchronization variable codes, viz., T-codes for encoding/compressing the  original text message. Next, the encoded binary string is encrypted using  an improved AES method. The encrypted message is then embedded in the  high frequency bands obtained from the cover image by applying the 1-  level decomposition of Double Density Dual Tree Discrete Wavelet  Transform (DD DT DWT). This algorithm provides three layer of security-  one layer at each level of compression, encryption and embedding,  respectively. Thus, there is no chance that the intruder may detect the  original message after couple of attacks. The algorithm is compared with  the corresponding algorithm based on Discrete Wavelet Transform (DWT)  and found to be better in terms of imperceptibility, robustness and  embedding capacity.                                     Keywords : T-codes; AES; DD DT DWT; DWT; PSNR; SSIM. A Study on the Readiness of Cloud Computing for Captious Computations Abstract: The emergence cloud computing in the computing arena has had  major effect in way we utilize computing resources. It is being heralded by  many as the new computing paradigm, coming with disruptive technologies  which are expected to foster all sorts of innovations. However, further  investigations suggest that cloud computing it is nothing new, rather an  evolution of different existing technologies creatively integrated together.  Therefore, it has inherited strengths and weaknesses of existing  technologies, but has lowered the entry bar to computing making it an  interesting proposition. In this paper we propose a security wrapper, which  affords enough protection to the classified data as it flows in the cloud.  The wrapper offers security to data in motion and at rest, and incorporates  adaptive SLA negotiation. Keywords : Cloud Computing; Security Wrapper; Cloud Providers; Service  Level Agreement. Do Indonesian Province Website Rich and Popular? Abstract: Most local governments in Indonesia are relatively left behind in  terms of e-government implementation. According to Indonesian e-  government road map, Indonesia has only reached the third phase of the  action. This article will discuss the diversity of features, popularity, and  information richness on the website of the provinces in Indonesia. The  population of study is the website of 33 provinces in Indonesia. The  research result show that the traffic does not depend on information  richness and number of web features. There were differences in  information richness and real traffic rank among the provinces outside Java  with Java. Keywords : e-Government; popularity; information richness; webmetric.   A Fast Approach for Breaking RSA Cryptosystem Abstract: Prime numbers play a very important role in the complexity and  security of the public key cryptosystem. RSA is one type of public key  algorithm and its security depends on the complexity of factoring (n) value.  Any encryption algorithm depends on the length of the key and the  computational effort required breaking the key.  This paper introduces an efficient algorithm to attack the RSA Scheme.  Obtaining the private key of the RSA scheme is the target of the suggested  algorithm by factoring the modulus based on the public key (e, n) of the  RSA scheme. The suggested algorithm is very fast due to its treatments for  the factorizing problem. It will limited the search for the p & q  values  especially when the value of n is small, since most of public key encryption  schemes select a small encryption n in order to improve the efficiency and  reliability of encryption. The suggested algorithm is more efficient than  most existed algorithms of attack since it is break the search process and  takes less running time. Keywords : RSA Scheme; Factoring; GCD; Attack; Prime Numbers. Interoperability of Digital Signatures in Public Administration Abstract: Interoperability is becoming one of the technical terms used in  the IT industry and this is due to the development of the Internet and the  growing need to make different applications communicate to each other.  Interoperability seen as critical in public key infrastructure (PKI)  implementations, because are used to assess the ability of two PKI  applications to interact, providing great flexibility in carrying out secure  transactions between two or more organizations using different PKI  technologies. In this paper, we present some public key infrastructure  interoperability problems, and we identify an infrastructure for  interoperability of digital signatures in public administration.  Keywords : digital signature; encryption; public key infrastructure;  interoperability. Congestive Loss in Wireless Ad hoc Network, Network Performance Analysis Abstract: Communication in wireless network is quite susceptible to  mobility, nodes capacity and power consumption level. These might  contributes to the major problem of TCP performance degradation where  there are highly potential of packet loss and packet reordering. In this  research, we manage to observe the impact of packet behavior once the  node's capacity is limited when passing on-going data. This condition occurs  when the node's buffer starts to be overloaded. A simulation study by using  OPNET Modeler 14.5 is conducted to achieve the purpose. A static ad hoc  topology with the size of users (2n where n=0, 1, 2, 3 and 4) is used to  observe several parameters such as throughput, number of packet dropped,  retransmission count and end-to-end TCP delay. The results show that the  size of buffer for ad hoc node influence the network performance  whenever number of users is changed. In future, we plan to extend this  study in a way of deeply understanding the effect of mobility in wireless  network.  Keywords : Wireless; Ad hoc; CBR; BER; OPNET; network congestion; buffer  size; PLI. Web-based Timetable Information System for Public Transport Abstract: Web-based timetable information system for public transport has  been created in Tver region, Russia, aimed to serve as a communication  system for passengers and offering the opportunity for Internet search for  path between any stops of any modes of transport in the region. Moreover  the system is adjusted for traffic schedules and transport schedule  information receiving at any stop of the travel line and timetable for any  route. Information updating is provided by the carriers. The system is  implemented on Microsoft technologies base.  Keywords : timetable information system; PTV Vision VISUM; public  transport; shortest path. Image Deblurring Using Back Propagation Neural Network Abstract: Image deblurring is the process of obtaining the original image by  using the knowledge of the degrading factors. Degradation comes in many  forms such as blur, noise, and camera misfocus. A major drawback of  existing restoration methods for images is that they suffer from poor  convergence properties; the algorithms converge to local minima, that they  are impractical for real imaging applications. Added to its disadvantage,  some methods make restrictive assumptions on the PSF or the true image  that limits the algorithm's portability to different applications. In  conventional approach, deblurring filters are applied on the degraded  images without the knowledge of blur and its effectiveness. In this paper,  concepts of artificial intelligence are applied for restoration problem in  which images are degraded by a blur function and corrupted by random  noise. The proposed methodology adopted back propagation network with  gradient decent rule which consists of three layers. This methodology uses  highly nonlinear back propagation neuron for image restoration to get a  high quality restored image and attains fast neural computation, less  computational complexity due to the less number of neurons used and  quick convergence without lengthy training algorithm. Specific experiments  are carried out and the results explore that this work can have extensive  application expansion. Keywords: Image restoration; deblurring ; BPN ; blur parameter ; point  spread function. Authors S.K.Muttoo Sushil Kumar Authors GhantaSrinivasaRao ShaikNazeer U.UshaRani Gogineni Vijay Krishna Authors Widya Silfianti Ruddy J. Suhatril Authors Alaa H Al-Hamami Bilal S O Al-Kubaysee Authors Nicușor Vatră Authors Haniza N. Zulkiflee M. Abdul S.Shibghatullah Shahrin S. Authors Andrey Makarovskiy Authors P.Subashini M.Krishnaveni Vijay Singh