The Science and Information (SAI) Organization
  • Home
  • About Us
  • Journals
  • Conferences
  • Contact Us

Publication Links

  • IJACSA
  • Author Guidelines
  • Publication Policies
  • Digital Archiving Policy
  • Promote your Publication
  • Metadata Harvesting (OAI2)

IJACSA

  • About the Journal
  • Call for Papers
  • Editorial Board
  • Author Guidelines
  • Submit your Paper
  • Current Issue
  • Archives
  • Indexing
  • Fees/ APC
  • Reviewers
  • Apply as a Reviewer

IJARAI

  • About the Journal
  • Archives
  • Indexing & Archiving

Special Issues

  • Home
  • Archives
  • Proposals
  • Guest Editors
  • SUSAI-EE 2025
  • ICONS-BA 2025
  • IoT-BLOCK 2025

Future of Information and Communication Conference (FICC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Computing Conference

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Intelligent Systems Conference (IntelliSys)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Future Technologies Conference (FTC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact
  • Home
  • Call for Papers
  • Editorial Board
  • Guidelines
  • Submit
  • Current Issue
  • Archives
  • Indexing
  • Fees
  • Reviewers
  • Subscribe

IJACSA Volume 4 Issue 1

Copyright Statement: This is an open access publication licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.

View Full Issue

Paper 1: Classifying Personalization Constraints in Digital Business Environments through Case Study Research

Abstract: To aid professionals in the early assessment of possible risks related to personalization activities in marketing as well as to give academics a starting point to discover not only the opportunities but also the risks of personalization, a ‘Classification Scheme of Personalization Constraints’ is established after the analysis of 24 case studies. The classification scheme includes three dimensions: origin (internal, external), subject (technological, organizational) and time (data collection, matchmaking, delivery) and describes the different obstacles with which companies are confronted when implementing personalization activities. Additionally four ‘Standard Types of Personalization Environments’ are developed. They describe a set of business environments which inherit different internal and external risks related to personalization activities in marketing. The standard types are termed Flow, Performance, Dependence and Risk.

Author 1: Michael J. Harnisch

Keywords: personalization; case study research; corporate communication; personalization constraint

PDF

Paper 2: Formal Method to Derive Interoperability Requirements and Guarantees

Abstract: Interoperability among telecommunications systems, possibly by different vendors, is essential for both the development of many telecommunications networks, and today's civilization development. Interoperability testing is very costly, as it has a complexity of (n**2) for n systems, and somewhat informal. In this paper, we develop a 'Conformance Testing (CT)'-based formal technique to determine interoperability requirements/guarantees. It allows automated derivation of the interoperability' requirements of various networks as well as the interoperability guarantees among different telecommunications systems. This is achieved using static analysis of the conformance classes of the standard and knowledge of the implementation's degree of conformance (DoC) of the telecommunications systems. Consequently, it results in a lot of cost saving in addition to being a formal technique.

Author 1: Hazem El- Gendy
Author 2: Magdi Amer
Author 3: Ihab Talkhan

Keywords: Computer/Communications Protocols and Standards; Conformance Requirements and Classe; Interoperability; Protocol Data Units (PDUs); Capabilities.

PDF

Paper 3: Stable Haptic Rendering For Physics Engines Using Inter-Process Communication and Remote Virtual Coupling

Abstract: Availability of physics engines has significantly reduced the effort required to develop interactive applications concerning the simulation of physical world. However, it becomes a problem when kinesthetic feedback is needed in the applications since the incorporation of haptic rendering is non-trivial, where fast haptic data update is demanded for stable rendering. In the regard, a framework for integrating haptic rendering into physics simulation engines is proposed. It mediates the update-rate disparity between haptic rendering and physics simulation engine by means of inter-process communication and remote virtual coupling, which fully decouples haptic rendering from complex physical simulation. Experimental results demonstrate that this framework can guarantee fast haptic rendering at 1k Hz even the physical simulation system operates at very low update rate. The remote virtual coupling algorithm shows better performance than the interpolation based methods in terms of stability and robustness.

Author 1: Xue-Jian He
Author 2: Kup-Sze Choi

Keywords: haptic rendering; physics engine; inter-process communication; virtual coupling

PDF

Paper 4: FF-MAC : Fast Forward IEEE 802.15.4 MAC Protocol for Real-Time Data Transmission

Abstract: This paper presents a Fast Forward MAC layer designed for hard real-time applications in wireless sensor networks. This protocol is an enhancement to the IEEE 802.15.4 standard MAC layer proposed for Low-Rate Personal Area Network. The energy conservation mechanism proposed by the current standard is quite efficient and very flexible. This flexibility comes from the ability to configure different duty cycles to meet specific application’s requirements. However, this mechanism has a considerable impact on the end-to-end delay. Our approach resolves the energy delay trade-off by avoiding the storage of the real-time data in the coordinator during sleep time. A new superframe structure is adopted and a deterministic reception scheduling is used. All the simulations were done using the network simulator 2 ‘NS-2’. The simulations outcomes show that this new proposed protocol performs better than the current standard and reduces considerably the end-to-end delay even in low duty cycle networks. Our protocol can also provides a delay bound for all network configurations which allows a better choice of the duty cycle for the required delay.

Author 1: Khalid El Gholami
Author 2: Najib ELKAMOUN
Author 3: Kun Mean HOU

Keywords: component; IEEE 802.15.4; WSN; Superframe; star topology; delay; Duty cycle; D-GTS

PDF

Paper 5: VHDL Design and FPGA Implementation of a Parallel Reed-Solomon (15, K, D) Encoder/Decoder

Abstract: In this article, we propose a Reed Solomon error correcting encoder/decoder with the complete description of a concrete implementation starting from a VHDL description of this decoder. The design on FPGA of the (15, k, d) Reed Solomon decoder is studied and simulated in order to implement an encoder/decoder function.The proposed architecture of the decoder can achieve a high data rate, in our case, 5 clock cycles, and having a reasonable complexity (1010 CLBs).

Author 1: Mustapha ELHAROUSSI
Author 2: Asmaa HAMYANI
Author 3: Mostafa BELKASMI

Keywords: Error detecting correcting codes; Reed-Solomon encoder/decoder; VHDL language; FPGA

PDF

Paper 6: An Analysis of Security Challenges in Cloud Computing

Abstract: Vendors offer a pool of shared resources to their users through the cloud network. Nowadays, shifting to cloud is a very optimal decision as it provides pay-as-you-go services to users. Cloud has boomed high in business and other industries for its advantages like multi-tenancy, resource pooling, storage capacity etc. In spite of its vitality, it exhibits various security flaws including loss of sensitive data, data leakage and few others related to cloning, resource pooling and so on. As far as security issues are concerned, a very wide study has been reviewed which signifies threats with service and deployment models of cloud. In order to comprehend these threats, this study is presented so as to effectively refine the crude security issues under various areas of cloud. This study also aims at revealing different security threats under the cloud models as well as network concerns to stagnate the threats within cloud, facilitating researchers, cloud providers and end users for noteworthy analysis of threats.

Author 1: Ms.Disha H. Parekh
Author 2: Dr. R. Sridaran

Keywords: Security threats; SQL Injection; Malevolent users; Browser Security; Malicious Attacks; Data Leakage.

PDF

Paper 7: Applicability of Data Mining Technique Using Bayesians Network in Diagnosis of Genetic Diseases

Abstract: This study aims to identify a methodology to aid in the identification of diagnosis for chromosomal abnormalities and genetic diseases, presenting as a tutorial model the Turner Syndrome. So, it has been used classification techniques based in decision trees, probabilistic networks (Naïve Bayes, TAN e BAN) and neural MLP network (Multi-Layer Perception) and training algorithm by error retro-propagation. Described tools capable of propagating evidence and developing techniques of generating efficient inference techniques to combine expert knowledge with data defined in a database. We have come to a conclusion about the best solution to work out the show problem in this study that was the Naïve Bayes model, because this presented the greatest accuracy. The decision - ID3, TAN e BAN tree models presented solutions to the indicated problem, but those were not as much satisfactory as the Naïve Bayes. However, the neural network did not promote a satisfactory solution.

Author 1: Hugo Pereira Leite Filho

Keywords: Turner Syndrome; probabilistic networks; classification techniques based in decision trees

PDF

Paper 8: Green ICT Readiness Model for Developing Economies: Case of Kenya

Abstract: There has been growing concerns about the rising costs of doing business and environmental degradation world over. Green ICT has been proposed to provide solutions to the two issues yet it is not being implemented fully in developing economies like Kenya. For its implementation, it is critical to establish the level of green ICT readiness of organisations to inform where to start and where to put more emphasis. Over the past few years this has been done using Molla’s G-readiness model. However this model assumes the basic level of G-readiness to be same for both developed and developing economies to be the same with regard to ICT personnel preparedness. Based on green ICT readiness in Kenya, the relationship between ICT personnel’s gender, age and training with the G-readiness variables as proposed in Molla’s G-readiness model was investigated. The study surveyed ICT personnel in four cases using a questionnaire on a seven scale likert scale. It established that there exists a significant relationship between the ICT personnel related variables and the G-readiness variables. Based on the findings on the relationship, the study extended Molla’s G-readiness model to include a sixth dimension of personnel readiness

Author 1: Mr.Franklin Wabwoba
Author 2: Dr. Stanley Omuterema
Author 3: Dr. Gregory W. Wanyembi
Author 4: Mr. Kelvin Kebati Omieno

Keywords: Developing economies; Extended G-readiness model; Green ICT; G-readiness model; Green ICT readiness

PDF

Paper 9: Evaluating English to Arabic Machine Translation Using BLEU

Abstract: This study aims to compare the effectiveness of two popular machine translation systems (Google Translate and Babylon machine translation system) used to translate English sentences into Arabic relative to the effectiveness of English to Arabic human translation. There are many automatic methods used to evaluate different machine translators, one of these methods; Bilingual Evaluation Understudy (BLEU) method, which was adopted and implemented to achieve the main goal of this study. BLEU method is based on the assumptions of automated measures that depend on matching machine translators' output to human reference translations; the higher the score, the closer the translation to the human translation will be. Well known English sayings in addition to manually collected sentences from different Internet web sites were used for evaluation purposes. The results of this study have showed that Google machine translation system is better than Babylon machine translation system in terms of precision of translation from English to Arabic.

Author 1: Mohammed N. Al-Kabi
Author 2: Taghreed M. Hailat
Author 3: Emad M. Al-Shawakfa
Author 4: Izzat M. Alsmadi

Keywords: component; Machine Translation; Arabic; Google Translator; Babylon Translator; BLEU

PDF

Paper 10: Parametric and Non Parametric Time-Frequency Analysis of Biomedical Signals

Abstract: Due to non-stationary multicomponent nature of the electrocardiogram (ECG) signal its analysis by the monodimensional techniques temporal and frequenctial can be very difficult. The use of the time-frequency techniques can be inevitable to achieve to a correct diagnosis. Between the different existing parametric and non-parametric time-frequency techniques the Periodgram Capon Choi-Williams and Smoothed Pseudo Wigner-Ville were chosen to deal with analysis of this biomedical signal. In a first time a comparison between these time-frequency techniques was made by analyzing modulated signal to make in evidence the technique that gives a good resolution and low level of cross-terms. In a second time the Periodogram which presents a powerful technique was applied to a normal and abnormal ECG signal. The results show the effectiveness of this time-frequency in analyzing this type of biology signal.

Author 1: S. Elouaham
Author 2: R. Latif
Author 3: A. Dliou
Author 4: M. LAABOUBI
Author 5: F. M. R. Maoulainie

Keywords: ECG; Time-frequency; Periodogram; Capon; Choi-williams.

PDF

Paper 11: Validating Utility of TEIM: A Comparative Analysis

Abstract: Concrete efforts to integrate Software Engineering and Human Computer Interaction exist in the form of models by many researchers. An unconventional model called TEIM (The Evolved Integrated Model) of Software Engineering and Human Computer Interaction was proposed by us. There is a need to establish correlation with prior models as well validate utility of TEIM. In this paper product PS designed using SE-HCI integration model TEIM is evaluated by making a comparative analysis. For evaluation UGAM and IOI tools designed by DR.Anirudha Joshi are used. Our analysis showed that correlation of TEIM exists with prior models. Regression analysis showed that high correlation exists between TEIM and prior model.

Author 1: Rajesh Kulkarni
Author 2: P.Padmanabham

Keywords: SE; HCI; UGAM; IOI; PS; TEIM.

PDF

Paper 12: Collaborative System Model for Dynamic Planning of Supply Chain

Abstract: The business need to be structured as an integrated supply chain pushes companies to make use of a greater level of co-operation and coordination. As a means of coordination, negotiation has been chosen in this work. The object of this paper is to present formalism for negotiation in dynamic planning of a supply chain with the objective of maximizing the overall profit of each partner. To model the SC, we use the multi agent approach. Each enterprise is represented by its negotiator agent. The negotiations are formalized using UML language. The proposed negotiation process allows agents to develop a feasible production schedule.

Author 1: Latifa Ouzizi
Author 2: EL Moukhtar Zemmouri
Author 3: Youssef Aoura
Author 4: Hussain Ben-azza

Keywords: supply chain; negotiation; collaboration; dynamic planning; UML

PDF

Paper 13: A Study of Influential Factors in the Adoption and Diffusion of B2C E-Commerce

Abstract: This paper looks at the present standing of e-commerce in Saudi Arabia as well as the challenges and strengths of Business to Customers (B2C) electronic commerce. Many studies have been conducted around the world in order to gain a better understanding of the demands needs and effectiveness of online commerce. A study was undertaken to review the literature identifying the factors influencing the adoption and diffusion of B2C e-commerce. It found four distinct categories: businesses customers environmental and governmental support which must all be considered when creating an e-commerce infrastructure. A concept matrix was used to provide a comparison of important factors in different parts of the world. The study found that e-commerce in Saudi Arabia was lacking in Governmental support as well as relevant involvement by both customers and retailers.

Author 1: Rayed AlGhamdi
Author 2: Ann Nguyen
Author 3: Vicki Jones

Keywords: e-commerce;adoption; B2C; Saudi Arabia

PDF

Paper 14: Comparative Study on Discrimination Methods for Identifying Dangerous Red Tide Species Based on Wavelet Utilized Classification Methods

Abstract: Comparative study on discrimination methods for identifying dangerous red tide species based on wavelet utilized classification methods is conducted. Through experiments, it is found that classification performance with the proposed wavelet derived shape information extracted from the microscopic view of the phytoplankton is effective for identifying dangerous red tide species among the other red tide species rather than the other conventional texture, color information.

Author 1: Kohei Arai

Keywords: hue feature; texture information; wavelet descripter; red tide; phytoplankton idintification

PDF

Paper 15: Nonlinear Mixing Model of Mixed Pixels in Remote Sensing Satellite Images Taking Into Account Landscape

Abstract: Nonlinear mixing model of mixed pixels in remote sensing satellite images taking into account landscape is proposed. Most of linear mixing models of mixed pixels do not work so well because the mixed pixels consist of several ground cover targets in a nonlinear basis essentially. In particular mixing model should be nonlinear because reflected photons from a ground cover target are scattered with atmospheric continuants and then reflected by the other or same ground cover targets. Therefore, mixing model has to be nonlinear. Monte Carlo Ray Tracing based nonlinear mixing model is proposed and simulated. Simulation results show a validity of the proposed nonlinear mixed pixel model.

Author 1: Kohei Arai

Keywords: nonlinearity; mixed pixels; Monte Carlo Ray Tracing; landscape

PDF

Paper 16: Passive Clustering for Efficient Energy Conservation in Wireless Sensor Network

Abstract: A wireless sensor network is a set of miniature nodes that consume little energy and route information to a base station. It will enable reliable monitoring of a wide variety of phenomena for civilian, military and medical applications. Almost any sensor network application requires some form of self-organisation to route information. Recent years many protocols for network self-organization and management have been proposed and being implemented. Hierarchical clustering algorithms are very important in increasing the network’s life time. The most important point in this algorithm is cluster head selection and cluster formation because a good clustering guarantees reliability, energy efficiency and load balancing in the network. In this paper, we will use the principles of passive clustering to propose a new mechanism for selecting clusterheads. This mechanism allows the election of an alternate for each cluster head and a dynamic balancing of the role of clusterhead to the alternate when leaving or failure. Thus, it provides several advantages network reliability, stability of clusters and reduces energy consumption among the sensor nodes. Comparison with the existing schemes such as Passive Clustering and GRIDS (Geographically Repulsive Insomnious Distributed Sensors) reveals that the mechanism for selecting an alternate for clusterhead nodes, which is the most important factor influencing the clustering performance, can significantly improves the network lifetime.

Author 1: Abderrahim MAIZATE
Author 2: Najib EL KAMOUN

Keywords: wireless sensor networks; self-organization; Clustering passive; Clustering; network lifetime; energy efficiency; Fault tolerance; Residual Energy.

PDF

Paper 17: Inferring the Human Emotional State of Mind using Assymetric Distrubution

Abstract: This present paper highlights a methodology for Emotion Recognition based on Skew Symmetric Gaussian Mixture Model classifier and MFCC-SDC ceptral coefficients as the features for the recognition of various emotions from the generated data-set of emotional voices belonging to students of both genders in GITAM University. For training and testing of the developed methodology, the data collection is carried out from the students of GITAM University of Visakhapatnam campus using acting sequence consisting of five different emotions namely Happy, Sad, Angry, Neutral, Boredom; each uttering one short emotional base sentence. For training the data we have considered fifty speakers from different regions (30 male & 20 female) and one long sentence containing an emotional speech from each speaker. The experimentation is conducted on text dependent speech emotion recognition and results obtained are tabulated by constructing a Confusion Matrix and comparing with existing methodology like Gaussian mixture model.

Author 1: N. Murali Krishna
Author 2: P.V. Lakshmi
Author 3: Y. Srinivas

Keywords: Skew Gaussian Mixture Model; MFCC; SDC; Emotion Recognition; Confusion Matrix

PDF

Paper 18: An Area-Efficient Carry Select Adder Design by using 180 nm Technology

Abstract: In this paper, we proposed an area-efficient carry select adder by sharing the common Boolean logic term. After logic simplification and sharing partial circuit, we only need one XOR gate and one inverter gate in each summation operation as well as one AND gate and one inverter gate in each carry-out operation. Through the multiplexer, we can select the correct output result according to the logic state of carry-in signal. In this way, the transistor count in a 32-bit carry select adder can be greatly reduced from 1947 to 960.

Author 1: Garish Kumar Wadhwa
Author 2: Amit Grover
Author 3: Neeti Grover
Author 4: Gurpreet Singh

Keywords: Carry Select Adder; Area-Efficient; Hardware-Sharing; Boolean Logic

PDF

Paper 19: Towards No-Reference of Peak Signal to Noise Ratio

Abstract: The aim of this work is to define a no-referenced perceptual image quality estimator applying the perceptual concepts of the Chromatic Induction Model The approach consists in comparing the received image, presumably degraded, against the perceptual versions (different distances) of this image degraded by means of a Model of Chromatic Induction, which uses some of the human visual system properties. Also we compare our model with an original estimator in image quality assessment, PSNR. Results are highly correlated with the ones obtained by PSNR for image (99.32% Lenna and 96.95% for image Baboon), but this proposal does not need an original image or a reference one in order to give an estimation of the quality of the degraded image.

Author 1: Jaime Moreno
Author 2: Beatriz Jaime
Author 3: Salvador Saucedo

Keywords: Human Visual System; Contrast Sensitivity Function; Perceived Images; Wavelet Transform; Peak Signal-to-Noise Ratio;No-Reference Image Quality Assessment; JPEG2000.

PDF

Paper 20: A Block Cipher Involving a Key and a Key Bunch Matrix, Supplemented with Key-Based Permutation and Substitution

Abstract: In this paper, we have developed a block cipher involving a key and a key bunch matrix. In this cipher, we have made use of key-based permutation and key-based substitution. The cryptanalysis carried out in this investigation, shows very clearly, that this cipher is a very strong one. This is all on account of the confusion and the diffusion created by the permutation, the substitution, in each round of the iteration process.

Author 1: Dr. V. U.K Sastry
Author 2: K. Shirisha

Keywords: Key; key bunch matrix; encryption; decryption; permutation; substitution; avalanche effect; cryptanalysis

PDF

Paper 21: Semantic E-Learn Services and Intelligent Systems using Web Ontology

Abstract: Present vision for the web is the semantic web in which information is given explicit meaning, making it easier for machines to automatically process and integrate information available on the web. It provides the information exactly. Now days, ontology is playing a major role in knowledge representation for the semantic web [1]. Ontology is a conceptualization of domain into a human understandable and machine readable or machine process able format consisting of entities, attributes, relationships and axioms. Ontology web language is designed for use by applications that need to process the content of information [22]. In this context many e-learning systems were proposed in the literature. Semantic Web technology may support more advanced Artificial intelligence problems for knowledge retrieval [20]. This paper aims at presenting an intelligent e-learning system from the literature.

Author 1: K. VANITHA
Author 2: K.YASUDHA
Author 3: Dr.M.SRI VENKATESH
Author 4: K.N.Sowjanya

Keywords: Semantic web; e-learning; Ontology Web Language (OWL); Ontology; OWL-S Service Ontology.

PDF

Paper 22: Studying Data Mining and Data Warehousing with Different E-Learning System

Abstract: Data Mining and Data Warehousing are two most significant techniques for pattern detection and concentrated data management in present technology. ELearning is one of the most important applications of data mining. The foremost idea is to provide a proposal for a practical model and architecture. The standards and system structural design are analyzed here. This paper provides importance to the combination of Web Services on the e-Learning application domain, because Web Service is the most complex choice for distance education during these days. The process of e-Learning can be promising more efficiently by utilizing of Web usage mining. Mor07/e sophisticated tools are developed for internet customer’s behaviour to boost sales and profit, but no such tools are developed to recognize learner’s performance in e-Learning. In this paper, some data mining techniques are examined that could be used to improve web-based learning environments.

Author 1: Dr. Mohamed F. AlAjmi
Author 2: Shakir Khan
Author 3: Dr.Arun Sharma

Keywords: Data Mining; Data Warehousing; e-Learning; Moodle; LMS; LCMS.

PDF

Paper 23: Monte Carlo Ray Tracing Based Non-Linear Mixture Model of Mixed Pixels in Earth Observation Satellite Imagery Data

Abstract: Monte Carlo based non-linear mixel (mixed pixel) model of visible to near infrared radiometer of earth observation satellite imagery is proposed. Through comparative studies with actual real earth observation satellite imagery data between conventional linear mixel model and the proposed non-linear mixel model, it is found that the proposed mixel model represents the pixels in concern much precisely rather than the conventional linear mixel model.

Author 1: Kohei Arai

Keywords: remote sensing satellite; visible to near infrared radiometer; mixed pixel: mixel; Monte Carlo simulation model

PDF

Paper 24: Comparison and Analysis of Different Software Cost Estimation Methods

Abstract: Software cost estimation is the process of predicting the effort required to develop a software system. The basic input for the software cost estimation is coding size and set of cost drivers, the output is Effort in terms of Person-Months (PM’s). Here, the use of support vector regression (SVR) has been proposed for the estimation of software project effort. We have used the COCOMO dataset and our results are compared to Intermediate COCOMO as well as to MOPSO model results for this dataset. It has been observed from the simulation that SVR outperforms other estimating techniques. This paper provides a comparative study on support vector regression (SVR), Intermediate COCOMO and Multiple Objective Particle Swarm Optimization (MOPSO) model for estimation of software project effort. We have analyzed in terms of accuracy and Error rate. Here, data mining tool Weka is used for simulation

Author 1: Sweta Kumari
Author 2: Shashank Pushkar

Keywords: Support vector regression; PM- person-months; MOPSO- Multiple objective particle swarm optimization; COCOMO- Constructive cost estimation; Weka data mining tools.

PDF

Paper 25: Attribute Analysis for Bangla Words for Universal Networking Language(UNL)

Abstract: The Universal Networking Language (UNL) is an artificial worldwide generalizes form human interactive in machine independent digital platform for defining, recapitulating, amending, storing and dissipating knowledge or information among people of different affiliations. The theoretical and practical research associated with these interdisciplinary endeavor facilities in a number of practical applications in most domains of human activities such as creating globalization trends of market or geopolitical independence among nations. In our research work we have tried to develop analysis rules for Bangla part of speech which will help to create a doorway for converting the Bangla language to UNL and vice versa and overcome the barrier between Bangla to other Languages.

Author 1: Aloke Kumar Saha
Author 2: Muhammad Firoz Mridha
Author 3: Shammi Akhtar
Author 4: Jugal Krishna Das

Keywords: Universal Networking Language; morphology; Bangla part of speech; morphological rules.

PDF

Paper 26: Shadow Suppression using RGB and HSV Color Space in Moving Object Detection

Abstract: Video-surveillance and traffic analysis systems can be heavily improved using vision-based techniques to extract, manage and track objects in the scene. However, problems arise due to shadows. In particular, moving shadows can affect the correct localization, measurements and detection of moving objects. This work aims to present a technique for shadow detection and suppression used in a system for moving visual object detection and tracking. The major novelty of the shadow detection technique is the analysis carried out in the HSV color space to improve the accuracy in detecting shadows. This paper exploits comparison of shadow suppression using RGB and HSV color space in moving object detection and results in this paper are more encouraging using HSV colour space over RGB colour space.

Author 1: Shailaja Surkutlawar
Author 2: Prof. Ramesh K Kulkarni

Keywords: Shadow detection; HSV color space; RGB color space.

PDF

Paper 27: A Proposed Integrated Approach for BI and GIS in Health Sector to Support Decision Makers (BIGIS-DSS)

Abstract: This paper explores the possibilities of adopting Business Intelligence (BI), and Geographic Information System (GIS) to build a spatial intelligence and predictive analytical approach. The proposed approach will help in solving spatial problem which faces decision makers at health sector. The proposed spatial analytical approach will cover three main health planning issues. These issues are tackling health inequalities through geospatial monitor for inequalities in distribution of health units and its services, support decision-making with predictive analytics for common health indicators, and geoprocessing for input layers through dynamic health map and motion charts to support decision making.

Author 1: Torky Sultan
Author 2: Mona Nasr
Author 3: Ayman Khedr
Author 4: Randa Abdou

Keywords: Business Intelligence (BI); Geographic Information System (GIS); Decision Support System (DSS)

PDF

Paper 28: Personalized Semantic Retrieval and Summarization of Web Based Documents

Abstract: The current retrieval methods are essentially based on the string-matching approach lacking of semantic information and can’t understand the user's query intent and interest very well. These methods do regard as the personalization of the users. Semantic retrieval techniques are performed by interpreting the semantic of keywords. Using the text summarization allows a user to get a sense of the content of a full-text, or to know its information content, without reading all sentences within the full-text. In this paper, a semantic personalized information retrieval (IR) system is proposed, oriented to the exploitation of Semantic Web technology and WordNet ontology to support semantic IR capabilities in Web documents. In a proposed system, the Web documents are represented in concept vector model using WordNet. Personalization is used in a proposed system by building user model (UM). Text summarization in a proposed system is based on extracting the most relevant sentences from the original document to form a summary using WordNet. The examination of the proposed system is performed by using three experiments that are based on relevance based evaluation. The results of the experiment shows that the proposed system, which is based on Semantic Web technology, can improve the accuracy and effectiveness for retrieving relevant Web documents.

Author 1: Salah T. Babek
Author 2: Khaled M. Fouad
Author 3: Naveed Arshad

Keywords: Semnatic Web; WordNet; Personalization; User Model; Information Retrieval; Summerization.

PDF

Paper 29: A Block Cipher Involving a Key Bunch Matrix and an Additional Key Matrix, Supplemented with Xor Operation and Supported by Key-Based Permutation and Substitution

Abstract: In this paper, we have developed a block cipher by extending the analysis of a Novel Block Cipher Involving a Key bunch Matrix and a Key-based Permutation and Substitution. Here we have include and additional key matrix, which is supplemented with xor operation. The cryptanalysis carried out in this investigation clearly indicates that this cipher cannot be broken by any attack.

Author 1: Dr. V. U.K Sastry
Author 2: K. Shirisha

Keywords: Key; key bunch matrix; encryption; decryption; permutation; substitution; avalanche effect; cryptanalysis; xor operation

PDF

The Science and Information (SAI) Organization
BACK TO TOP

Computer Science Journal

  • About the Journal
  • Call for Papers
  • Submit Paper
  • Indexing

Our Conferences

  • Computing Conference
  • Intelligent Systems Conference
  • Future Technologies Conference
  • Communication Conference

Help & Support

  • Contact Us
  • About Us
  • Terms and Conditions
  • Privacy Policy

© The Science and Information (SAI) Organization Limited. All rights reserved. Registered in England and Wales. Company Number 8933205. thesai.org