The Science and Information (SAI) Organization
  • Home
  • About Us
  • Journals
  • Conferences
  • Contact Us

Publication Links

  • IJACSA
  • Author Guidelines
  • Publication Policies
  • Digital Archiving Policy
  • Promote your Publication
  • Metadata Harvesting (OAI2)

IJACSA

  • About the Journal
  • Call for Papers
  • Editorial Board
  • Author Guidelines
  • Submit your Paper
  • Current Issue
  • Archives
  • Indexing
  • Fees/ APC
  • Reviewers
  • Apply as a Reviewer

IJARAI

  • About the Journal
  • Archives
  • Indexing & Archiving

Special Issues

  • Home
  • Archives
  • Proposals
  • Guest Editors
  • SUSAI-EE 2025
  • ICONS-BA 2025
  • IoT-BLOCK 2025

Future of Information and Communication Conference (FICC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Computing Conference

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Intelligent Systems Conference (IntelliSys)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Future Technologies Conference (FTC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact
  • Home
  • Call for Papers
  • Editorial Board
  • Guidelines
  • Submit
  • Current Issue
  • Archives
  • Indexing
  • Fees
  • Reviewers
  • Subscribe

IJACSA Volume 3 Issue 1

Copyright Statement: This is an open access publication licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.

View Full Issue

Paper 1: Analysis and Selection of Features for Gesture Recognition Based on a Micro Wearable Device

Abstract: More and More researchers concerned about designing a health supporting system for elders that is light weight, no disturbing to user, and low computing complexity. In the paper, we introduced a micro wearable device based on a tri-axis accelerometer, which can detect acceleration change of human body based on the position of the device being set. Considering the flexibility of human finger, we put it on a finger to detect the finger gestures. 12 kinds of one-stroke finger gestures are defined according to the sensing characteristic of the accelerometer. Feature is a paramount factor in the recognition task. In the paper, gestures features both in time domain and frequency domain are described since features decide the recognition accuracy directly. Feature generation method and selection process is analyzed in detail to get the optimal feature subset from the candidate feature set. Experiment results indicate the feature subset can get satisfactory classification results of 90.08% accuracy using 12 features considering the recognition accuracy and dimension of feature set.

Author 1: Yinghui Zhou
Author 2: Lei Jing
Author 3: Junbo Wang
Author 4: Zixue Cheng

Keywords: Internet of Things; Wearable Computing; Gesture Recognition; Feature analysis and selection; Accelerometer.

PDF

Paper 2: A Framework for Improving the Performance of Ontology Matching Techniques in Semantic Web

Abstract: Ontology matching is the process of finding correspondences between semantically related entities of different ontologies. We need to apply this process to solve the heterogeneity problems between different ontologies. Some ontologies may contain thousands of entities which make the ontology matching process very complex in terms of space and time requirements. This paper presents a framework that reduces the search space by removing entities (classes, properties) that have less probability of being matched. In order to achieve this goal we have introduced a matching strategy that uses multi matching techniques specifically; string, structure, and linguistic matching techniques. The results obtained from this framework have indicated a good quality matching outcomes in a low time requirement and a low search space in comparisons with other matching frameworks. It saves from the search space from (43% - 53%), and saves on the time requirement from (38% - 45%).

Author 1: Kamel Hussein Shafa’amri
Author 2: Jalal Omer Atoum

Keywords: Ontology matching; RDF statements;Semantic web; Similarity Aggregation.

PDF

Paper 3: Fingerprint Image Enhancement:Segmentation to Thinning

Abstract: Fingerprint has remained a very vital index for human recognition. In the field of security, series of Automatic Fingerprint Identification Systems (AFIS) have been developed. One of the indices for evaluating the contributions of these systems to the enforcement of security is the degree with which they appropriately verify or identify input fingerprints. This degree is generally determined by the quality of the fingerprint images and the efficiency of the algorithm. In this paper, some of the sub-models of an existing mathematical algorithm for the fingerprint image enhancement were modified to obtain new and improved versions. The new versions consist of different mathematical models for fingerprint image segmentation, normalization, ridge orientation estimation, ridge frequency estimation, Gabor filtering, binarization and thinning. The implementation was carried out in an environment characterized by Window Vista Home Basic operating system as platform and Matrix Laboratory (MatLab) as frontend engine. Synthetic images as well as real fingerprints obtained from the FVC2004 fingerprint database DB3 set A were used to test the adequacy of the modified sub-models and the resulting algorithm. The results show that the modified sub-models perform well with significant improvement over the original versions. The results also show the necessity of each level of the enhancement.

Author 1: Iwasokun Gabriel Babatunde
Author 2: Akinyokun Oluwole Charles
Author 3: Alese Boniface Kayode
Author 4: Olabode Olatubosun

Keywords: AFIS;Pattern recognition;pattern matching;fingerprint;minutiae; image enhancement.

PDF

Paper 4: Data Warehouse Requirements Analysis Framework: Business-Object Based Approach

Abstract: Detailed requirements analysis plays a key role towards the design of successful Data Warehouse (DW) system. The requirements analysis specifications are used as the prime input for the construction of conceptual level multidimensional data model. This paper has proposed a Business Object based requirements analysis framework for DW system which is supported with abstraction mechanism and reuse capability. It also facilitate the stepwise mapping of requirements descriptions into high level design components of graph semantic based conceptual level object oriented multidimensional data model. The proposed framework starts with the identification of the analytical requirements using business process driven approach and finally refine the requirements in further detail to map into the conceptual level DW design model using either Demand-driven of Mixed-driven approach for DW requirements analysis.

Author 1: Anirban Sarkar

Keywords: Requirements analysis; Business objects; Conceptual Model; Graph Data Model; Data Warehouses.

PDF

Paper 5: A new graph based text segmentation using Wikipedia for automatic text summarization

Abstract: The technology of automatic document summarization is maturing and may provide a solution to the information overload problem. Nowadays, document summarization plays an important role in information retrieval. With a large volume of documents, presenting the user with a summary of each document greatly facilitates the task of finding the desired documents. Document summarization is a process of automatically creating a compressed version of a given document that provides useful information to users, and multi-document summarization is to produce a summary delivering the majority of information content from a set of documents about an explicit or implicit main topic. According to the input text, in this paper we use the knowledge base of Wikipedia and the words of the main text to create independent graphs. We will then determine the important of graphs. Then we are specified importance of graph and sentences that have topics with high importance. Finally, we extract sentences with high importance. The experimental results on an open benchmark datasets from DUC01 and DUC02 show that our proposed approach can improve the performance compared to state-of-the-art summarization approaches.

Author 1: Mohsen Pourvali
Author 2: Ph.D. Mohammad Saniee Abadeh

Keywords: text Summarization; Data Mining; Word Sense Disambiguation.

PDF

Paper 6: Automated Periodontal Diseases Classification System

Abstract: This paper presents an efficient and innovative system for automated classification of periodontal diseases, The strength of our technique lies in the fact that it incorporates knowledge from the patients' clinical data, along with the features automatically extracted from the Haematoxylin and Eosin (H&E) stained microscopic images. Our system uses image processing techniques based on color deconvolution, morphological operations, and watershed transforms for epithelium & connective tissue segmentation, nuclear segmentation, and extraction of the microscopic immunohistochemical features for the nuclei, dilated blood vessels & collagen fibers. Also, Feedforward Backpropagation Artificial Neural Networks are used for the classification process. We report 100% classification accuracy in correctly identifying the different periodontal diseases observed in our 30 samples dataset.

Author 1: Aliaa A.A Youssif
Author 2: Abeer Saad Gawish
Author 3: Mohammed Elsaid Moussa

Keywords: Biomedical image processing; epithelium segmentation; feature extraction; nuclear segmentation; periodontal diseases classification.

PDF

Paper 7: Communication and migration of an embeddable mobile agent platform supporting runtime code mobility

Abstract: In this paper we present the design and the implementation of Mobile-C, an IEEE Foundation for Intelligent Physical Agents (FIPA) compliant agent platform for mobile C/C++ agents. Such compliance ensures the interoperability between a Mobile-C agent and other agents from heterogeneous FIPA compliant mobile agent platforms. Also, the Mobile-C library was designed to support synchronization in order to protect shared resources and provide a way of deterministically timing the execution of mobile agents and threads. The new contribution of this work is to combine the mechanisms of agent migration and their synchronization.

Author 1: Mohamed BAHAJ
Author 2: Khaoula ADDAKIRI
Author 3: Noreddine GHERABI

Keywords: Mobile agent; Mobile agent platform;Agent communication.

PDF

Paper 8: An Adaptive parameter free data mining approach for healthcare application

Abstract: In today’s world, healthcare is the most important factor affecting human life. Due to heavy work load it is not possible for personal healthcare. The proposed system acts as a preventive measure for determining whether a person is fit or unfit based on his/her historical and real time data by applying clustering algorithms viz. K-means and D-stream. Both clustering algorithms are applied on patient’s biomedical historical database. To check the correctness of both the algorithms, we apply them on patient’s current biomedical data. The Density-based clustering algorithm i.e. the D-stream algorithm overcomes drawbacks of K-means algorithm. By calculating their performance measures we finally find out effectiveness and efficiency of both the algorithms.

Author 1: Dipti Patil
Author 2: Bhagyashree Agrawal
Author 3: Snehal Andhalkar
Author 4: Richa Biyani
Author 5: Mayuri Gund
Author 6: Dr. V.M.Wadhai

Keywords: Data stream mining; clustering; healthcare applications; medical signal analysis.

PDF

Paper 9: Question Answering System for an Effective Collaborative Learning

Abstract: The increasing advances of Internet Technologies in all application domains have changed life styles and interactions. With the rapid development of E-Learning, collaborative learning is an important for teaching, learning methods and strategies. Interaction between the students also student with the teacher is important for student to gain knowledge. Based on the four basic teaching styles formal authority, demonstrator or personal model, facilitator and delegator, today combined between facilitator and delegator style is responsible for student learning. It is student centered and the teacher as facilitates the material and activities, but learning becomes part of valuable and effective when they collaborate with each other, and as the teacher who will delegates and facilitates the responsibility of learning to the students. In this paper, we introduce an effective question answering Q&A system for collaborative learning, which can act not just like a virtual teacher, but also virtual discussion for student. With the proposed system, brings a new Q&A system, student can attach their question when they want collaborate using collaborative learning capitalize on one another’s resources and skills. Students can ask their questions to the group when they want to collaborate with others, asking one another for information, evaluating one another’s ideas, then each of the answer will compare with encyclopedia data base. In this research, the Q&A system for the Senior High School in Indonesia, in this subject of Information Communication Technology implemented. From the the 40 question and 120 answer, the result is 90,48% precision 50% recall.

Author 1: Kohei Arai
Author 2: Anik Nur Handayani

Keywords: component; E-Learning; Collaborative Learning; Q&A; Knowledge Base.

PDF

Paper 10: An Efficient Method For Multichannel Wireless Mesh Networks With Pulse Coupled Neural Network

Abstract: Multi cast communication is a key technology for wireless mesh networks. Multicast provides efficient data distribution among a group of nodes, Generally sensor networks and MANETs uses multicast algorithms which are designed to be energy efficient and to achieve optimal route discovery among mobile nodes whereas wireless mesh networks needs to maximize throughput. Here we propose two multicast algorithms: The Level Channel Assignment (LCA) algorithm and the Multi-Channel Multicast (MCM) algorithm to improve the throughput for multichannel sand multi interface mesh networks. The algorithm builds efficient multicast trees by minimizing the number of relay nodes and total hop count distance of the trees. Shortest path computation is a classical combinatorial optimization problem. Neural networks have been used for processing path optimization problem. Pulse Coupled Neural Networks (PCNNS) suffer from high computational cast for very long paths we propose a new PCNN modal called dual source PCNN (DSPCNN) which can improve the computational efficiency two auto waves are produced by DSPCNN one comes from source neuron and other from goal neuron when the auto waves from these two sources meet the DSPCNN stops and then the shortest path is found by backtracking the two auto waves.

Author 1: S Sobana
Author 2: S.Krishna Prabha

Keywords: Wireless Mesh Networks; Multicast; Multichannel; Multiinterface; Shortest path; DSPCNN; Auto wave; Search space.

PDF

Paper 11: A Congestion Avoidance Approach in Jumbo Frame-enabled IP Network

Abstract: Jumbo frame is as an approach that allows for higher utilization of larger packet sizes on a domain-wise basis, decreasing the number of packets processed by core routers while not having any adverse impact on the link utilization of fairness. The major problem faced by jumbo frame networks is packet loss during queue congestion inside routers is as the RED mechanism that is recommended to combine with jumbo frame treats jumbo frame encapsulation as one packet by drop the whole jumbo frame with packets encapsulate during the congestion time. RED dropping the whole jumbo frame encapsulation randomly from head, middle and tail inside queue of router during periods of router congestion, leading to affect the scalability and performance of the networks by decreasing throughputs and increasing queue delay. This work proposes the use of two AQM techniques with jumbo frame, modified Random Early Detection MRED and developed drop Front technique DDF, which are used with the jumbo frame network to reduce packet drop and increase throughput by decreasing overhead in the network. For the purpose of evaluation, network simulator NS-2.28 was set up together with jumbo frame and AQM scenarios. Moreover, for justification objectives, the proposed algorithm and technique for AQM with jumbo frame were compared against the existing AQM algorithm and techniques that are found in the literature using metrics such as packet drop and throughput.

Author 1: Aos Anas Mulahuwaish
Author 2: Kamalrulnizam Abu Bakar
Author 3: Kayhan Zrar Ghafoor

Keywords: Jumbo Frame; Queue Congestion; AQM; RED.

PDF

Paper 12: Cross Layer QoS Support Architecture with Integrated CAC and Scheduling Algorithms for WiMAX BWA Networks

Abstract: In this paper, a new technique for cross layer design, based on present Eb/N0 (bit energy per noise density) ratio of the connections and target values of the Quality of Service (QoS) information parameters from MAC layer, is proposed to dynamically select the Modulation and Coding Scheme (MCS) at the PHY layer for WiMAX Broadband Wireless Access (BWA) networks. The QoS information parameter includes New Connection Blocking Probability (NCBP), Hand off Connection Dropping Probability (HCDP) and Connection Outage Probability (COP). In addition, a Signal to Interference plus Noise Ratio (SINR) based Call Admission Control (CAC) algorithm and Queue based Scheduling algorithm are integrated for the cross layer design. An analytical model using the Continuous Time Markov Chain (CTMC) is developed for performance evaluation of the algorithms under various MCS. The effect of Eb/No is observed for QoS information parameters in order to determine its optimum range. Simulation results show that the integrated CAC and packet Scheduling model maximizes the bandwidth utilization and fair allocation of the system resources for all types of MCS and guarantees the QoS to the connections.

Author 1: Prasun Chowdhury
Author 2: Iti Saha Misra
Author 3: Salil K Sanyal

Keywords: Cross layer QoS support architecture; SINR based CAC algorithm; Queue based Scheduling algorithm; Adaptive Modulation and Coding; WiMAX BWA networks.

PDF

Paper 13: A Conceptual Design Model for High Performance Hotspot Network Infrastructure (GRID WLAN).

Abstract: The emergence of wireless networking technologies for large enterprises, operators (service providers), small-medium organizations, has made hotspot solutions for metropolitan area networks (MAN), last mile wireless connectivity, mobile broadband solutions, IP-based cellular phones (VOIP) and other event-based wireless solutions in very high demand. Wireless radio gateways (routers and access points) with its wide-spread deployment has made Wi-Fi an integral part of today’s hotspot access technology in organizational models. Despite its role in affecting performance for mobility market segments, previous research has focused on media access control (MAC) protocol techniques , carrier sense multiple access with collision avoidance (CSMA/CA), fair scheduling, and other traffic improvement methodologies without detailed consideration for virtual switch partitioning for load balancing, reliable fragmentation capacities, buffer size dependencies, load effects, queuing disciplines as well as hotspot access control framework. This paper proposes a conceptual high performance hotspot solution (GRID WLAN) and through simulations with OPNET modeler, presents efficient performance metrics for its deployment. Considering the GRID WLAN access points in context, the results shows that with the design model, a careful selection of buffer sizes, fragmentation threshold, network management framework with network load intensity will guarantee an efficient hotspot solution.

Author 1: Udeze Chidiebele C
Author 2: Okafor Kennedy .C
Author 3: H. C Inyiama
Author 4: Dr C. C. Okezie

Keywords: Hotspot solutions, IP-based cellular phones, Buffer size dependencies, GRID WLAN.

PDF

Paper 14: An enhanced Scheme for Reducing Vertical handover latency

Abstract: Authentication in vertical Hand over is a demanding research problem. Countless methods are commenced but all of them have insufficiencies in term of latency and packet loss. Standard handover schemes (MIPv4, MIPv6, FMIPv6, and HMIPv6) also practice these shortages when a quick handover is desirable in several genuine circumstances like MANETs, VANETs etc. This paper will evaluate the literature of the work done in past and present for undertaking the authentication concerns in vertical handover and will put down a basis for building the latency and packet loss more effective in such a huge shared situation that can produce to an extremely bulky level. This effort will mostly focus on the existing tendency in vertical handover mostly with the authentication, latency and packet loss issues.

Author 1: Mohammad Faisal
Author 2: Muhammad Nawaz Khan

Keywords: Vertical hand over, Authentication, FMIPv6, HMIPv6, reactive, proactive, latency and packet loss.

PDF

Paper 15: A Feasible Rural Education System

Abstract: The education system in rural and semi-rural areas of developing and underdeveloped countries are facing many challenges. The limited accessibility and challenges to the education are attributed mainly to political, economic and social issues of these underdeveloped countries. We propose a “Feasible Rural Education System (FRES)” based on Ontology and supported by Cloud to enhance the accessibility to education in rural areas. The system has been proposed incorporating the FOSS approach.

Author 1: Lincy Meera Mathews
Author 2: Dr Bandaru Rama Krishna Rao

Keywords: FRES; Education; FOSS; Semantic Web; Ontology; Natural language processing; Cloud computing.

PDF

Paper 16: Efficient Threshold Signature Scheme

Abstract: In this paper, we introduce a new threshold signature RSA-typed scheme. The proposed scheme has the characteristics of un-forgeable and robustness in random oracle model. Also, signature generation and verification is entirely non-interactive. In addition, the length of the entity signature participate is restricted by a steady times of the length of the RSA signature modulus. Also, the signing process of the proposed scheme is more efficient in terms of time complexity and interaction.

Author 1: Sattar J Aboud
Author 2: Mohammad AL-Fayoumi

Keywords: Shamir secret sharing; threshold signature; random oracle model.

PDF

Paper 17: Fault Tolerant Platform for Application Mobility across devices

Abstract: In the mobile era, users started using Smartphone’s, tablets and other handheld devices, The advances in telecom technologies like 3G accelerates the migration towards smart phones. But still battery power and frequent change of handsets is still a constraint.They burden on user have to manually synchronize their contacts, applications they use to the new phones. Also they loss whatever they are doing when the mobile get power down. In this paper, we propose a solution to the problem discussed with a new fault tolerant platform which can provide application mobility across the devices.

Author 1: T N Anitha
Author 2: Jayanth. A

Keywords: Fault tolerance; Middle ware; Midstore Manager.

PDF

Paper 18: Viable Modifications to Improve Handover Latency in MIPv6

Abstract: Various Handover techniques and modifications for Handover in MIPv6 come into light during past few years. Still the problem remains, such as quality of services, better resource utilization during Handover and Handover latency. This paper focuses on such problems within various Handover techniques and proposes some modifications to reduce the Handover latency. This also improves the quality of services related with Handover in MIPv6. Experimental results presented in this paper shows that the Handover latency in MIPv6 will be reduced by applying these proposed modifications. This paper is organized in following sections: section I gives the introduction, Section II presents the Basic operations for MIPv6 Handover, Section III focuses on the related work with background, Section IV proposes modifications and Section V concludes the paper while underlining future prospects in this domain.

Author 1: Purnendu Shekhar Pandey
Author 2: Dr.Neelendra Badal

Keywords: Handover, CoA, Home Agent, Foreign Agent, MIPv4, MIPv6.

PDF

Paper 19: Different Protocols for High Speed Networks

Abstract: New challenges arise with the presence of various types of physical links, such as wireless networks, high speed and satellite in today’s ever-changing network. It is clear that the TCP throughput deteriorates in high-speed networks with large bandwidth-delay product, and new congestion control algorithms have been proposed to address such deterioration. Traditional TCP protocols treat all packet loss as a sign of congestion. Their inability to recognize non-congestion related packet loss has significant effects on the communication efficiency. The proposed protocols such as TCP Adaptive Westwood, Scalable TCP, HS-TCP, BIC-TCP, FAST-TCP and H-TCP all have some improvement in functionality over the traditional TCP protocols. This survey gives a summarization of all the protocols for high speed networks.

Author 1: Srinivasa Rao Angajala

Keywords: TCP protocols; high speed networks; TCP congestion.

PDF

Paper 20: Wideband Wireless Access Systems Interference Robustness: Its Effect on Quality of Video Streaming

Abstract: A necessary requirement incumbent on any information communication system and/or network is the capacity to transmit information with a predefined degree of accuracy in the presence of inevitable interference. The transmission of audio and video streaming services over different conduits (wireless access systems, Internet, etc.) is becoming ever more popular. As should be expected, this widespread increase is accompanied by the attendant new and difficult task of maintaining the quality of service of streaming video. The use of very accurate coding techniques for transmissions over wireless networks alone cannot guarantee a complete eradication of distortions characteristic of the video signal. A software-hardware composite system has been developed for investigating the effect of single bit error and bit packet errors in wideband wireless access systems on the quality of H.264/AVC standard bursty video streams. Numerical results of the modeling and analysis of the effect of interference robustness on quality of video streaming are presented and discussed.

Author 1: Aderemi A Atayero
Author 2: Oleg I. Sheluhin
Author 3: Yuri A. Ivanov
Author 4: Julet O. Iruemi

Keywords: codec, H.264/AVC, polynomial approximation coding, signal-to-noise ratio, video streaming

PDF

Paper 21: Survey on Impact of Software Metrics on Software Quality

Abstract: Software metrics provide a quantitative basis for planning and predicting software development processes. Therefore the quality of software can be controlled and improved easily. Quality in fact aids higher productivity, which has brought software metrics to the forefront. This research paper focuses on different views on software quality. Moreover, many metrics and models have been developed; promoted and utilized resulting in remarkable successes. This paper examines the realm of software engineering to see why software metrics are needed and also reviews their contribution to software quality and reliability. Results can be improved further as we acquire additional experience with variety of software metrics. These experiences can yield tremendous benefits and betterment in quality and reliability.

Author 1: Mrinal Singh Rawat
Author 2: Arpita Mittal
Author 3: Sanjay Kumar Dubey

Keywords: Software metrics; Software quality; Software reliability; Lines of code; Function points; object oriented metrics.

PDF

Paper 22: A Cost-Effective Approach to the Design and Implementation of Microcontroller-based Universal Process Control Trainer

Abstract: This paper presents a novel approach to the design and implementation of a low-cost universal digital process control trainer. The need to equip undergraduates studying Electronic Engineering and other related courses in higher institutions with the fundamental knowledge of digital process control practical was the main objective of the work. Microcontroller-based design and implementation was the approach used where only one AT59C81 with few flip-flops were used for the whole eight processes covered by the trainer thereby justifying its low-cost and versatility.

Author 1: Udeze Chidiebele C
Author 2: Uzedeh Godwin
Author 3: H. C Inyiama
Author 4: Dr C. C. Okezie

Keywords: process control, control algorithm, Algorithmic State machine (ASM) chart, State Transition Table (STT), Fully-expanded STT, Control software etc

PDF

Paper 23: Self-regulating Message Throughput in Enterprise Messaging Servers – A Feedback Control Solution

Abstract: Enterprise Messaging is a very popular message exchange concept in asynchronous distributed computing environments. The Enterprise Messaging Servers are heavily used in building business critical Enterprise applications such as Internet based Order processing systems, pricing distribution of B2B, geographically dispersed enterprise applications. It is always desirable that Messaging Servers exhibit high performance to meet the Service Level Agreements (SLAs). There are investigations in this area of managing the performance of the distributed computing systems in different ways such as the IT administrators configuring and tuning the Messaging Servers parameters, implement complex conditional programming to handle the workload dynamics. But in practice it is extremely difficult to handle such dynamics of changing workloads in order to meet the performance requirements. Additionally it is challenging to cater to the future resource requirements based on the future workloads. Though there have been attempts to self-regulate the performance of Enterprise Messaging Servers, there is a limited investigation done in exploring feedback control systems theory in managing the Messaging Servers performance. We propose an adaptive control based solution to not only manage the performance of the servers to meet SLAs but also to pro-actively self-regulate the performance such that the Messaging Servers are capable to meet the current and future workloads. We implemented and evaluated our solution and observed that the control theory based solution will improve the performance of Enterprise Messaging Servers significantly.

Author 1: Ravi Kumar G
Author 2: C.Muthusamy
Author 3: A.Vinaya Babu

Keywords: Feedback control, Message Oriented Middleware, Enterprise Messaging, Java Messaging Service, JMS Providers, Adaptive Control

PDF

Paper 24: Improved Face Recognition with Multilevel BTC using Kekre’s LUV Color Space

Abstract: The theme of the work presented in the paper is Multilevel Block Truncation Coding based Face Recognition using the Kekre’s LUV (K’LUV) color space. In [1], Multilevel Block Truncation Coding was applied on the RGB color space up to four levels for face recognition. The experimental results showed that Block Truncation Coding Level 4 (BTC-level 4) was better as compared to other BTC levels of RGB color space. Results displaying a similar pattern are realized when the K’LUV color is used. It is further observed that K’LUV color space gives improved results on all four levels.

Author 1: H.B. Kekre
Author 2: Dr. Sudeep Thepade
Author 3: Sanchit Khandelwal
Author 4: Karan Dhamejani
Author 5: Adnan Azmi
Author 6:

Keywords: Face recognition, BTC, RGB, K’LUV, Multilevel BTC, FAR, GAR.

PDF

Paper 25: Scenario-Based Software Reliability Testing Profile for Autonomous Control System

Abstract: Operational profile is often used in software reliability testing, but it is limited to non-obvious-operation software such as Autonomous Control System. After analyzing the autonomous control system and scenario technology, a scenario-based profile constructing method for software reliability testing is presented. Two levels of scenario-based profile in the paper are introduced: system level and software level, and the scenario-based profile could be obtained through mapping them. With the method, the testing data for software reliability testing could be generated.

Author 1: Jun Ai
Author 2: Jingwei Shang
Author 3: Peng Wang

Keywords: software reliability testing; scenario-based testing profile; autonomous control system.

PDF

Paper 26: Identification of Critical Node for the Efficient Performance in Manet

Abstract: This paper considers a network where nodes are connected randomly and can fail at random times. The critical-node test detects nodes, whose failures are malicious behavior, disconnects or significantly degrades the performance of the network. The critical node is an element, position or control entity whose disruption, is immediately degrades the ability of a force to command, control or effectively conducts combat operations. If a node is critical node, then more attention must be paid to it to avoid its failure or removal of a network. So how to confirm critical nodes in the ad hoc network is the premise to predict the network partition. A critical node is the most important node within the entity of a network. This paper suggests methods that find the critical nodes of a network based on residual battery power, reliability, bandwidth, availability and service traffic type. The metrics for evaluation has been considered as packet delivery ratio, end-to-end delay and throughput.

Author 1: Shivashankar
Author 2: B.Sivakumar
Author 3: G.Varaprasad

Keywords: Critical node, malicious, residual battery power, reliability, bandwidth, Mobile Ad hoc Network.

PDF

Paper 27: Secret Key Agreement Over Multipath Channels Exploiting a Variable-Directional Antenna

Abstract: We develop an approach of key distribution protocol(KDP) proposed recently by T.Aono et al., where the security of KDP is only partly estimated in terms of eavesdropper's key bit errors. Instead we calculate the Shannon's information leaking to a wire tapper and also we apply the privacy amplification procedure from the side of the legal users. A more general mathematical model based on the use of Variable-Directional Antenna (VDA) under the condition of multipath wave propagation is proposed. The new method can effectively be used even in noiseless interception channels providing thus a widened area with respect to practical applications. Statistical characteristics of the VDA are investigated by simulation, allowing to specify the model parameters. We prove that the proposed KDP provides both security and reliability of the shared keys even for very short distances between legal users and eavesdroppers. Antenna diversity is proposed as a mean to enhance the KDP security. In order to provide a better performance evaluation of the KDP, it is investigated the use of error correcting codes.

Author 1: Valery Korzhik
Author 2: Viktor Yakovlev
Author 3: Yuri Kovajkin
Author 4: Guillermo Morales-Luna

Keywords: wireless communication, wave propagation, cryptography, key distribution

PDF

Paper 28: The Relationships of Soft Systems Methodology (SSM), Business Process Modeling and e-Government

Abstract: e-Government have emerged in several countries. Because of many aspects that must be considered, and because of there are exist some soft components in e-Government, then the Soft Systems Methodology (SSM) can be considered to use in e-Government systems development process. On the other hand, business process modeling is essential in many fields nowadays, as well as in e-Government. Some researchers have used SSM in e-Government. Several studies that relate the business processes modeling with e-Government have been conducted. This paper tries to reveal the relationship between SSM and business process modeling. Moreover, this paper also tries to explain how business process modeling is integrated within SSM, and further link that integration to the e-Government.

Author 1: Dana Indra Sensuse
Author 2: Arief Ramadhan

Keywords: Soft Systems Methodology; Business Process Modeling; e-Government.

PDF

Paper 29: Re-tooling Code Structure Based Analysis with Model-Driven Program Slicing for Software Maintenance

Abstract: Static code analysis is a methodology of detecting errors in program code based on the programmer's reviewing the code in areas within the program text where errors are likely to be found and since the process considers all syntactic program paths; there is the need for a model-based approach with slicing. This paper presented a model of high-level abstraction of code structure analysis for a large component based software system. The work leveraged on the most important advantage of static code structure analysis in re-tooling software maintenance for a developing economy. A program slicing technique was defined and deployed to partition the source text to manageable fragments to aid in the analysis and statecharts were deployed as visual formalism for viewing the dynamic slices. The resulting model was a high-tech static analysis process aimed at determining and confirming the expected behaviour of a software system using slices of the source text presented in the statecharts.

Author 1: Oladipo Onaolapo Francisca

Keywords: software maintenance; static analysis; syntactic program behavior; program slicing.

PDF

Paper 30: Transform Domain Fingerprint Identification Based on DTCWT

Abstract: The physiological biometric characteristics are better compared to behavioral biometric identification of human beings to identify a person. In this paper, we propose Transform Domain Fingerprint Identification Based on DTCWT. The original Fingerprint is cropped and resized to suitable dimension to apply DTCWT. The DTCWT is applied on Fingerprint to generate coefficient which form features. The performance analysis is discussed with different levels of DTCWT and also with different sizes of Fingerprint database. It is observed that the recognition rate is better in the case of level 7 compared to other levels of DTCWT.

Author 1: Jossy P George
Author 2: Abhilash S. K
Author 3: Raja K. B.

Keywords: Fingerprint; DTCWT; Euclidean Distance; Preprocessing

PDF

Paper 31: Effective Security Architecture for Virtualized Data Center Networks

Abstract: This work presents a candidate scheme for effective security policy that defines the requirements that will facilitate protection of network resources from internal and external security threats. Also, it ensures data privacy and integrity in a virtualized data center network (VDCN). An integration of Open Flow Software Defined Networking (OFSDN) with VLAN Virtual Server Security (VVSS) architecture is presented to address distinct security issues in virtualized data centers. The OFSDN with VVSS is proposed to create a more secured protection and maintain compliance integrity of servers and applications in the DCN. This proposal though still on the prototype phase, calls for community driven responses.

Author 1: Udeze Chidiebele. C
Author 2: Okafor Kennedy .C
Author 3: H. C Inyiama
Author 4: Dr C. C. Okezie

Keywords: Infrastructure; Virtualization; VDCN; OFSDN; VVSS; VLAN; Virtual Server.

PDF

The Science and Information (SAI) Organization
BACK TO TOP

Computer Science Journal

  • About the Journal
  • Call for Papers
  • Submit Paper
  • Indexing

Our Conferences

  • Computing Conference
  • Intelligent Systems Conference
  • Future Technologies Conference
  • Communication Conference

Help & Support

  • Contact Us
  • About Us
  • Terms and Conditions
  • Privacy Policy

© The Science and Information (SAI) Organization Limited. All rights reserved. Registered in England and Wales. Company Number 8933205. thesai.org