The Science and Information (SAI) Organization
  • Home
  • About Us
  • Journals
  • Conferences
  • Contact Us

Publication Links

  • IJACSA
  • Author Guidelines
  • Publication Policies
  • Digital Archiving Policy
  • Promote your Publication
  • Metadata Harvesting (OAI2)

IJACSA

  • About the Journal
  • Call for Papers
  • Editorial Board
  • Author Guidelines
  • Submit your Paper
  • Current Issue
  • Archives
  • Indexing
  • Fees/ APC
  • Reviewers
  • Apply as a Reviewer

IJARAI

  • About the Journal
  • Archives
  • Indexing & Archiving

Special Issues

  • Home
  • Archives
  • Proposals
  • Guest Editors
  • SUSAI-EE 2025
  • ICONS-BA 2025
  • IoT-BLOCK 2025

Future of Information and Communication Conference (FICC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Computing Conference

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Intelligent Systems Conference (IntelliSys)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Future Technologies Conference (FTC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact
  • Home
  • Call for Papers
  • Editorial Board
  • Guidelines
  • Submit
  • Current Issue
  • Archives
  • Indexing
  • Fees
  • Reviewers
  • Subscribe

IJACSA Volume 6 Issue 1

Copyright Statement: This is an open access publication licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.

View Full Issue

Paper 1: Cluster-Based Context-Aware Routing Protocol for Mobile Environments

Abstract: Mobile environment has many issues due to mobility, energy limitations and status changing over time. Routing method is an important issue and has a significant impact in mobile networks, whereas selecting the optimum routing path will reduce the wasting in network resources, reduce network overhead and increase network reliability and lifetime. To decide which path will achieve the networks objectives, we need to construct a new routing algorithm that uses context attributes of a mobile device such as available bandwidth, residual energy, connection number and mobility value. In this paper, we propose a new mobile nodes ranking scheme based on the combination of two multi-criteria decision making approaches, the analytic hierarchy process (AHP) and the technique for order performance by similarity to ideal solution (TOPSIS) in Fuzzy environments. The Fuzzy AHP is used to analyze the structure of the clusterhead selection problem and to determine weights of the criteria, while the Fuzzy TOPSIS method is used to obtain the final mobile node ranking value. By basing on node ranking, we propose a new cluster based routing algorithm select the optimal clusterheads and the best routing path. Our simulation results show that the proposed method increases the network accuracy and lifetime and reduces network overhead.

Author 1: Ahmed. A. A. Gad-ElRab
Author 2: T. A. A. Alzohairy
Author 3: Almohammady S. Alsharkawy

Keywords: Clustering; Context; FMCDM; Mobile and Routing

PDF

Paper 2: Security Issues of a Recent RFID Multi Tagging Protocol

Abstract: RFID is now a widespread method used for identifying people and objects. But, not all communication protocols can provide the same rigorous confidentiality to RFID technology. In return, unsafe protocols put individuals and organizations into jeopardy. In this paper, a scheme that uses multiple low cost tags for identifying a single object is studied. Through algebraic analysis on chronologically ordered messages, the proposed multi tag arrangement is shown to fail to provide the claimed security. The weaknesses are discussed and previously proven precautions are recommended to increase the security of the protocol, and thus the safety of its users.

Author 1: Mehmet Hilal Özcanhan
Author 2: Sezer Baytar
Author 3: Semih Utku
Author 4: Gökhan Dalkiliç

Keywords: Authentication; EPC Gen 2; ISO 18000-6; NFC; RFID; UHF tag

PDF

Paper 3: Model Driven Testing of Web Applications Using Domain Specific Language

Abstract: As more and more systems move to the cloud, the importance of web applications has increased recently. Web applications need more strict requirements in order to sup-port higher availability. The techniques in quality assurance of these applications hence become essential, the role of testing for web application becomes more significant. Model-driven testing is a promising paradigm for the automation of software testing. In the web domain, the challenge however remains in the creation of models and the complexity of configuring, launching, and testing big number of valid configuration and testing cases. This paper proposes a solution towards this challenge with an approach using Domain Specific Language (DSL) for model driven testing of web application. Our techniques are based on building abstractions of web pages using domain specific language. We introduce WTML - a domain specific language for modeling web pages and provide automatic code generation with a web-testing framework. This methodology and techniques aim at helping software developers as well as testers to become more productive and reduce the time-to-market, while maintaining high standards of web application quality.

Author 1: Viet-Cuong Nguyen

Keywords: Domain specific language (DSL); model-driven development; model-driven testing; WTML

PDF

Paper 4: A Design of Pipelined Architecture for on-the-Fly Processing of Big Data Streams

Abstract: Conventional processing infrastructures have been challenged by huge demand of stream-based applications. The industry responded by introducing traditional stream processing engines along-with emerged technologies. The ongoing paradigm embraces parallel computing as the most-suitable proposition. Pipelining and Parallelism have been intensively studied in recent years, yet parallel programming on multiprocessor architectures stands as one of the biggest challenges to the software industry. Parallel computing relies on parallel programs that may encounter internal memory constrains. In addition, parallel computing needs special skillset of programming as well as software conversions. This paper presents reconfigurable pipelined architecture. The design is especially aimed at Big Data clustering, and it adopts Symmetric multiprocessing (SMP) along with crossbar switch and forced interrupt. The main goal of this promising architecture is to efficiently process big data streams on-the-fly, while it can process sequential programs on parallel-pipelined model. The system overpasses internal memory constrains of multicore architectures by applying forced interrupts and crossbar switching. It reduces complexity, data dependency, high-latency, and cost overhead of parallel computing.

Author 1: Usamah Algemili
Author 2: Simon Berkovich

Keywords: Big Data; Clustering; Computer Architecture; Parallel Processing; Pipeline Design; Variable Lengths; Symmetric Multiprocessing; Crossbar Switch; Forced Interrupt

PDF

Paper 5: Review of Cross-Platforms for Mobile Learning Application Development

Abstract: Mobile learning management systems are very important for training purpose. But considering the present scenario, the learners are equipped with a number of mobile devices that run by different operating systems with diverse device features. Therefore, developing a mobile application for different platforms is a cumbersome task if appropriate tools and techniques are not practiced. There are three categories of mobile application namely native, web based and hybrid. For mobile learning system, hybrid is an appropriate choice. In order to avoid re-implementation of the same hybrid application for different platform separately, several tools are proposed for example: PhoneGap, Adobe Air, Sencha Touch and QT, each with their own strength. With proper use of the strength of individual framework or the combination of frameworks, more compatible and more stable, cross-platform mobile learning application specifically for quizzes and assignments can be developed.

Author 1: Nabil Litayem
Author 2: Bhawna Dhupia
Author 3: Sadia Rubab

Keywords: cross-platform; mobile devices; framework; mobile learning; hybrid mobile app

PDF

Paper 6: Fault-Tolerant Attitude Control System for a Spacecraft with Control Moment Gyros Using Multi-Objective Optimization

Abstract: Recent years have seen a growing requirement for accurate and agile attitude control of spacecraft. To both quickly and accurately control the attitude of a spacecraft, Control Moment Gyros (CMGs) which can generate much higher torque than conventional spacecraft actuators are used as actuators of the spacecraft. The drive on the motors is needed for rapid maneuverability, negatively affecting their life. Thus, in designing spacecraft the conflicting requirements are rapid maneuverability and reduced the drive on motors. Furthermore, the attitude control system needs to be fault-tolerant. The dominant requirement is different for each spacecraft mission, and therefore the relationship between the requirements should be shown. In this study, a design method is proposed for the attitude control system, using multi objective optimization of the skew angle and parameters of the control system. Pareto solutions that can show the relationship between the requirements are obtained by optimizing the parameters. Through numerical analysis, the effect with fault-tolerance and parameter differences for the dominant requirement are confirmed and the method to guide for determining parameters of the attitude control system is established.

Author 1: Ai Noumi
Author 2: Misuzu Haruki
Author 3: Takuya Kanzawa
Author 4: Masaki Takahashi

Keywords: Control Moment Gyros; Spacecraft; Attitude Control; Multi-objective Optimization

PDF

Paper 7: Golay Code Transformations for Ensemble Clustering in Application to Medical Diagnostics

Abstract: Clinical Big Data streams have accumulated large-scale multidimensional data about patients’ medical conditions and drugs along with their known side effects. The volume and the complexity of this Big Data streams hinder the current computational procedures. Effective tools are required to cluster and systematically analyze this amorphous data to perform data mining methods including discovering knowledge, identifying underlying relationships and predicting patterns. This paper presents a novel computation model for clustering tremendous amount of Big Data streams. The presented approach is utilizing the error-correction Golay Code. This clustering methodology is unique. It outperforms all other conventional techniques because it has linear time complexity and does not impose predefined cluster labels that partition data. Extracting meaningful knowledge from these clusters is an essential task; therefore, a novel mechanism that facilitates the process of predicting patterns and likelihood diseases based on a semi-supervised technique is presented.

Author 1: Faisal Alsaby
Author 2: Kholood Alnowaiser
Author 3: Simon Berkovich

Keywords: medical Big Data; clustering; machine learning; pattern recognition; prediction tool; Big Data classification; Golay Code

PDF

Paper 8: A Monitoring Model for Hierarchical Architecture of Distributed Systems

Abstract: Distributed systems are complex systems and there are a lot of the potential risks in the system, so system administrators need to have some effective support tools for network management. The architecture information of distributed systems is an essential part of distributed system monitoring solutions, because it provides general information about monitored objects in the system for administrators, as well as supports administrator in quickly detecting change of topology, error status or potential risks that arise during operation of distributed systems. The modeling approaches have an important role in developing monitoring solutions, in which they are background to develop algorithms for monitoring problems in distributed systems. This paper proposes an approach in order to model for hierarchical architecture of objects in distributed systems, in which consists of architecture of monitored objects, networks, domains and global distributed systems. Based on this model, a basic monitoring solution for hierarchical architecture of distributed systems is developed and this solution is able to provide administrators more important architecture information such as the topology of hardware components, processes, status of monitored objects, etc.

Author 1: Phuc Tran Nguyen Hong
Author 2: Son Le Van

Keywords: architecture; distributed systems; model; monitored objects; monitoring

PDF

Paper 9: Ipv6 Change Threats Behavior

Abstract: IPv4 address pool is already exhausted; therefore, the change to use IPv6 is eventually necessary to give us a massive address pool. Although IPv6 was built with security in mind, extensive research must be done before deploying IPv6 to ensure the protection of security and privacy. This paper firstly presents the differences between the old and new IP versions (IPv4 and IPv6), and how these differences will affect the attacks, then the paper will show how the attacks on IPv4 and IPv6 will remain mostly the same; furthermore, the use of IPv6 will give rise to new types of attacks and change other types’ behavior.

Author 1: Firas Najjar
Author 2: Homam El-Taj

Keywords: Computer Attacks; IPv4; IPv6; Security

PDF

Paper 10: Emotional Engagement and Active Learning in a Marketing Simulation: A Review and Exploratory Study

Abstract: This paper considers the role of emotional engagement during the use of a simulation. This is placed in the context of learning about marketing. The literature highlights questions of engagement and interactivity that are entailed in the use of these simulations. It is observed here that both the anticipation of and the process of engagement with the simulation generate emotional responses. The evidence of emotional anticipation was collected through the use of vignettes and a short survey. The production of negative emotions before and after the activity was observed and considered. The particular occurrence of these emotions on the development of understanding is then discussed. There is general evidence for the mundane reality of such simulations that support learning and group engagement. The connection with activity theory was explored and proposed as a potential theoretical fit with the evidence.

Author 1: Kear Andrew
Author 2: Bown Gerald Robin

Keywords: component; Learning; Simulations; Feedback; Emotional Learning Scenarios; Emotional Anticipation; Deep Learning; Vignette Research

PDF

Paper 11: Modeling and Simulation Analysis of Power Frequency Electric Field of UHV AC Transmission Line

Abstract: In order to study the power frequency electric field of UHV AC transmission lines, this paper which models and calculates using boundary element method simulates various factors influencing the distribution of the power frequency electric field, such as the conductor arrangement, the over-ground height, the split spacing and the sub conductor radius. Different influence of various factors on the electric field distribution will be presented. In a single loop, using VVV triangular arrangement is the most secure way; in a dual loop, the electric field intensity using reverse phase sequence is weaker than that using positive phase sequence. Elevating the over-ground height and reducing the conductor split spacing will both weaken the electric field intensity, while the change of sub conductor radius can hardly cause any difference. These conclusions are important for electric power company to detect circuit.

Author 1: Chen Han
Author 2: Yuchen Chen

Keywords: boundary element method; electric field distribution; power frequency electric field; UHV

PDF

Paper 12: A Proposal of SNS to Improve Member’s Motivation in Voluntary Community Using Gamification

Abstract: Recently, the number of voluntary communities such as local communities and university club activities are increasing. In these communities, since there are various types of members and there are no binding forces, it is usually difficult to maintain and im-prove member's motivation. To maintain and improve member's motivation, most of these communities use social networking services (SNSs). However, since existing SNS offer few functions for voluntary community, it is difficult to solve this problem. This research focused on the concept of gamification and proposed an SNS to improve member's motivation of voluntary community. First, the authors analyzed the current conditions and members of a voluntary community. Based on this analysis, the authors found that an SNS to improve member's motivation of voluntary community requires functions which support member's personal activities and also functions which increase social activities. Next, the authors built an SNS that had these functions by applying the concept of gamification. The authors implemented the SNS for a University club’s activities for one month and showed the effectiveness of our SNS.

Author 1: Kohei Otake
Author 2: Yoshihisa Shinozawa
Author 3: Akito Sakurai
Author 4: Makoto Oka
Author 5: Tomofumi Uetake
Author 6: Ryosuke Sumita

Keywords: Gamification; Voluntary Community; Motivation Management

PDF

Paper 13: Fast Vertical Mining Using Boolean Algebra

Abstract: The vertical association rules mining algorithm is an efficient mining method, which makes use of support sets of frequent itemsets to calculate the support of candidate itemsets. It overcomes the disadvantage of scanning database many times like Apriori algorithm. In vertical mining, frequent itemsets can be represented as a set of bit vectors in memory, which enables for fast computation. The sizes of bit vectors for itemsets are the main space expense of the algorithm that restricts its expansibility. Therefore, in this paper, a proposed algorithm that compresses the bit vectors of frequent itemsets will be presented. The new bit vector schema presented here depends on Boolean algebra rules to compute the intersection of two compressed bit vectors without making any costly decompression operation. The experimental results show that the proposed algorithm, Vertical Boolean Mining (VBM) algorithm is better than both Apriori algorithm and the classical vertical association rule mining algorithm in the mining time and the memory usage.

Author 1: Hosny M. Ibrahim
Author 2: M. H. Marghny
Author 3: Noha M. A. Abdelaziz

Keywords: association rule; bit vector; Boolean algebra; frequent itemset; vertical data format

PDF

Paper 14: Investigation of Adherence Degree of Agile Requirements Engineering Practices in Non-Agile Software Development Organizations

Abstract: Requirements are critical for the success of software projects. Requirements are practically difficult to produce, as the hardest stage of building a software system is to decide what the system should do. Moreover, requirements errors are expensive to fix in the later phases of the software development life cycle. The rapidly changing business environment is highly challenging traditional Requirements Engineering (RE) practices. Most of the software development organizations are working in such dynamic environment, as a result, either by or without their awareness agile methodologies are adopted in various phases of their software development cycles. The aim of this paper is to investigate the adherence degree of agile RE practices in various software development organizations that are classifying themselves as adopting traditional (i.e. non-agile) software development methodologies. An approach is proposed for achieving this aim and it is applied on five different projects from four different organizations. The result shows that even the non-agile software development organizations are applying agile RE practices by different adherence degrees.

Author 1: Mennatallah H. Ibrahim
Author 2: Nagy Ramadan Darwish

Keywords: agile methods; agile requirements engineering practices; requirements engineering

PDF

Paper 15: A Review on Parameters Identification Methods for Asynchronous Motor

Abstract: The decoupling of excitation current and torque current is realized by Vector control so that the speed regulating performance of asynchronous motor is comparable with that of dc motor. The control precision is directly affected by accuracy of parameter identification in asynchronous motor. In this paper, based on the existing literatures, the existed parameters identification methods both online and offline are analyzed and compared, and the advantages and disadvantages of the various algorithms are listed it tables. Therefore, a comprehensive identification method of adjustable model which makes the least square method as adaptive method of model reference is presented. Finally, the outlook of developing direction for parameters identification of asynchronous motor are put forward to.

Author 1: Xing Zhan
Author 2: Guohui Zeng
Author 3: Jin Liu
Author 4: Qingzhen Wang
Author 5: Sheng Ou

Keywords: Vector control; Parameters identification; MRAS; the least square method

PDF

Paper 16: An Intelligent Natural Language Conversational System for Academic Advising

Abstract: Academic advisors assist students in academic, professional, social and personal matters. Successful advising increases student retention, improves graduation rates and helps students meet educational goals. This work presents an advising system that assists advisors in multiple tasks using natural language. This system features a conversational agent as the user interface, an academic advising knowledge base with a method to allow the users to contribute to it, an expert system for academic planning, and a web design structure for the implementation platform. The system is operational for several hundred students from a university department. The system performed well, obtaining close to 80%, on the traditional language processing measures of precision, recall, accuracy and F1 score. Assessment from the constituencies showed positive and assuring reviews. This work provides an assessment and technological solution to the academic advising field, i.e., the first-known advising multi-task conversational system with adaptive measures for improvement. The evaluation in a real-world scenario shows its viability, and initiated the development of a corpus for academic advising, valuable for the academic and language processing research communities.

Author 1: Edward M. Latorre-Navarro
Author 2: John G. Harris

Keywords: Natural Language Processing; Dialog System; Conversational Agent; Academic Advising; Advising System; Engineering Education; E-learning; Human Computer Interaction

PDF

Paper 17: A Comparative Study of Thresholding Algorithms on Breast Area and Fibroglandular Tissue

Abstract: One of the independently risk factors of breast cancer is mammographic density reflecting the composition of the fibroglandular tissue in breast area. Tumor in the mammogram is precisely complicated to detect as it is covered by the density (the masking effect). The determination of mammographic density may be implemented by calculating percentage of mammographic density (quantitative and objective approaches). Thereby, the use of a proper thresholding algorithm is highly required in order to obtain the fibroglandular tissue area and breast area. The mammograms used in the research were derived from Oncology Clinic, Yogyakarta that had been verified by Radiologists using semi-automatic thresholding. This research was aimed to compare the performance of the thresholding algorithm using three parameters, namely: PME, RAE and MHD. Zack Algorithm had the best performance to obtain the breast area with PME, RAE and MHD of about 0.33%, 0.71% and 0.01 respectively. Meanwhile, there were two algorithms having good performance to obtain the fibroglandular tissue area, i.e. multilevel thresholding and maximum entropy with the value for PME (13.34%; 11:27%), RAE (53.34%; 51.26%) and MHD (1:47; 33.92) respectively. The obtained results suggest that zack algorithm is perfectly suited for getting breast area than multilevel thresholding and maximum entropy for getting fibroglandular tissue. It is one of the components to determine risk factors of breast cancer based on percentage of breast density.

Author 1: Shofwatul ‘Uyun
Author 2: Sri Hartati
Author 3: Agus Harjoko
Author 4: Lina Choridah

Keywords: Thresholding Algorithm; Breast Area; fibroglandular Area

PDF

Paper 18: Using Heavy Clique Base Coarsening to Enhance Virtual Network Embedding

Abstract: Network virtualization allows cloud infrastructure providers to accommodate multiple virtual networks on a single physical network. However, mapping multiple virtual network resources to physical network components, called virtual network embedding (VNE), is known to be non-deterministic polynomial-time hard (NP-hard). Effective virtual network embedding increases the revenue by increasing the number of accepted virtual networks. In this paper, we propose virtual network embedding algorithm, which improves virtual network embedding by coarsening virtual networks. Heavy Clique matching technique is used to coarsen virtual networks. Then, the coarsened virtual networks are enhanced by using a refined Kernighan-Lin algorithm. The performance of the proposed algorithm is evaluated and compared with existing algorithms using extensive simulations, which show that the proposed algorithm improves virtual network embedding by increasing the acceptance ratio and the revenue.

Author 1: Ashraf A. Shahin

Keywords: cloud computing; network virtualization; resource allocation; substrate network fragmentation; virtual network embedding; virtual network coarsening

PDF

Paper 19: Ontology Based SMS Controller for Smart Phones

Abstract: Text analysis includes lexical analysis of the text and has been widely studied and used in diverse applications. In the last decade, researchers have proposed many efficient solutions to analyze / classify large text dataset, however, analysis / classification of short text is still a challenge because 1) the data is very sparse 2) It contains noise words and 3) It is difficult to understand the syntactical structure of the text. Short Messaging Service (SMS) is a text messaging service for mobile/smart phone and this service is frequently used by all mobile users. Because of the popularity of SMS service, marketing companies nowadays are also using this service for direct marketing also known as SMS marketing.In this paper, we have proposed Ontology based SMS Controller which analyze the text message and classify it using ontology aslegitimate or spam. The proposed system has been tested on different scenarios and experimental results shows that the proposed solution is effective both in terms of efficiency and time.

Author 1: Mohammed A. Balubaid
Author 2: Umar Manzoor
Author 3: Bassam Zafar
Author 4: Abdullah Qureshi
Author 5: Numairul Ghani

Keywords: Short Text Classification; SMS Spam; Text Analysis; Ontology based SMS Spam; Text Analysis and Ontology

PDF

Paper 20: Android Platform Malware Analysis

Abstract: Mobile devices have evolved from simple devices, which are used for a phone call and SMS messages to smartphone devices that can run third party applications. Nowadays, malicious software, which is also known as malware, imposes a larger threat to these mobile devices. Recently, many news items were posted about the increase of the Android malware. There were a lot of Android applications pulled from the Android Market because they contained malware. The vulnerabilities of those Applications or Android operating systems are being exploited by the attackers who got the capability of penetrating into the mobile systems without user authorization causing compromise the confidentiality, integrity and availability of the applications and the user. This paper, it gave an update to the work done in the project. Moreover, this paper focuses on the Android Operating System and aim to detect existing Android malware. It has a dataset that contained 104 malware samples. This Paper chooses several malware from the dataset and attempting to analyze them to understand their installation methods and activation. In addition, it evaluates the most popular existing anti-virus software to see if these 104 malware could be detected.

Author 1: Rubayyi Alghamdi
Author 2: Khalid Alfalqi
Author 3: Mofareh Waqdan

Keywords: Smartphone Security; Malware Analysis; Android Malware; Static Analysis; Dynamic Analysis; SDK; VAD

PDF

Paper 21: A Survey of Topic Modeling in Text Mining

Abstract: Topic models provide a convenient way to analyze large of unclassified text. A topic contains a cluster of words that frequently occur together. A topic modeling can connect words with similar meanings and distinguish between uses of words with multiple meanings. This paper provides two categories that can be under the field of topic modeling. First one discusses the area of methods of topic modeling, which has four methods that can be considerable under this category. These methods are Latent semantic analysis (LSA), Probabilistic latent semantic analysis (PLSA), Latent Dirichlet allocation (LDA), and Correlated topic model (CTM). The second category is called topic evolution models, which model topics by considering an important factor time. In the second category, different models are discussed, such as topic over time (TOT), dynamic topic models (DTM), multiscale topic tomography, dynamic topic correlation detection, detecting topic evolution in scientific literature, etc.

Author 1: Rubayyi Alghamdi
Author 2: Khalid Alfalqi

Keywords: Topic Modeling; Methods of Topic Modeling; Latent semantic analysis (LSA); Probabilistic latent semantic analysis (PLSA); Latent Dirichlet allocation (LDA); Correlated topic model (CTM); Topic Evolution Modelin

PDF

Paper 22: Effectiveness of Iphone’s Touch ID: KSA Case Study

Abstract: A new trend of incorporating Touch ID sensors in mobile devices is appearing. Last year, Apple released a new model of its famous iPhone (5s). One of the most anticipated and hailed features of the new device was its Touch ID. Apple advertised that the new technology will increase the security of its device, and it will also be used in different applications as a proof of identity. To make the issue more controversial, Apple announced a new financial service (Apple Pay) that allows iPhone 6 users to use their iPhone as a replacement to credit cards. The minute the new technology was introduced; many questions appeared that needed immediate answers. Users were concerned about how it will work? Is it easy to use? Is it really safe? And whether it will be effective in protecting their private data or not? In this paper we provide a comprehensive study of this feature. We discuss the advantages and disadvantages of using it. Then we analyze and share the results of a survey that we conducted to measure the effectiveness of such feature in the Kingdom of Saudi Arabia (KSA). In this study, we only focus on users from KSA, because if the device fails to protect mobile’s data, severe consequences might happen. Due to cultural believes in KSA, releasing mobile contents to unauthorized people could lead to crimes. Survey analysis revealed somewhat controversial results, while 76% of all participants believe that this technology will improve the device security, only 33% use it to lock/unlock their devices, and even a smaller percentage use it to make purchases.

Author 1: Ahmad A. Al-Daraiseh
Author 2: Diana Al Omari
Author 3: Hadeel Al Hamid
Author 4: Nada Hamad
Author 5: Rawan Althemali

Keywords: IPhone 5s; IPhone 6; IPhone 6 plus; Fingerprint; Touch ID

PDF

Paper 23: A Comparison of OSPFv3 and EIGRPv6 in a Small IPv6 Enterprise Network

Abstract: As the Internet slowly transitions towards IPv6, the routing protocols that are used to forward traffic across this global network must adapt to support this gradual transition. Two of the most frequently discussed interior dynamic routing protocols today are the IETF’s OSPF and Cisco’s EIGRP routing protocol. A wealth of papers have compared OSPF and EIGRP in terms of converge times and resource usage, however few papers have assessed the performance of each when implementing their respective security mechanisms. Therefore a comparison of OSPFv3 and EIGRPv6 will be conducted using dedicated Cisco hardware. This paper will firstly introduce each protocol and its security mechanisms, before conducting a comparison of OSPFv3 and EIGRPv6 using Cisco equipment. After discussing the simulation results, a conclusion will be drawn to reveal the findings of this paper and which protocol performs the best upon implementing their respective security mechanisms within a small IPv6 enterprise network.

Author 1: Richard John Whitfield
Author 2: Shao Ying Zhu

Keywords: IPv4; IPv6; OSPFv3; IPSec; ESP; EIGRPv4; EIGRPv6; MD5

PDF

Paper 24:

Abstract:

Author 1: Chika Oshima
Author 2: Kiyoshi Yasuda
Author 3: Toshiyuki Uno
Author 4: Kimie Machishima
Author 5: Koichi Nakayama

Keywords: Android; Care facility; Memory loss

PDF

Paper 25: Orientation Capture of a Walker’s Leg Using Inexpensive Inertial Sensors with Optimized Complementary Filter Design

Abstract: Accelerometers and gyroscope are often referred to as inertial sensors. They detect movement and are used for motion tracking systems in many fields. In recent years they have become much smaller, lighter and cheaper which makes them attractive for use in consumer electronics. The goal of this research is to use all these advantages to create a cheap, low cost and accurate motion tracking system. The system that will be developed is using two pairs of accelerometer + gyroscope sensors which communicates with an iOS device using BLE. The sensors are attached to a persons leg to capture the orientation of the leg while walking or running. Studying the movements of a persons leg can be useful regarding both performance and health aspects. To create the system, usage of inertial sensors and how to combine their data using the complementary filter have been studied. Further, several experiments were made to optimize the filter design for this kind of movement. The results shows how the orientation estimation differs in accuracy depending on different values of how the filter is designed. However, by using the right values, a fairly accurate orientation of the leg can be estimated which is proved by the simple visualization of the iOS application.

Author 1: Sebastian Andersson
Author 2: Liu Yan

Keywords: Motion capture, Complementary Filter, Inertial sen-sors, Bluetooth Low Energy, iOS.

PDF

Paper 26: Technical Perspectives on Knowledge Management in Bioinformatics Workflow Systems

Abstract: Workflow systems by it’s nature can help bioin-formaticians to plan for their experiments, store, capture and analysis of the runtime generated data. On the other hand, the life science research usually produces new knowledge at an increasing speed; Knowledge such as papers, databases and other systems knowledge that a researcher needs to deal with is actually a complex task that needs much of efforts and time. Thus the management of knowledge is therefore an important issue for life scientists. Approaches has been developed to organize biological knowledge sources and to record provenance knowledge of an experiment into a readily resource are presently being carried out. This article focuses on the knowledge management of in silico experimentation in bioinformatics workflow systems.

Author 1: Walaa N. Ismail
Author 2: M.Sabih Aksoy

Keywords: Bioinformatics Workflows; Knowledge Manage-ment; Ontologies; Scientific Workflows; Semantic Web.

PDF

Paper 27: Public Transportation Management System based on GPSWiFi and Open Street Maps

Abstract: Information technology (IT) has transformed many industries, from education to health care to government, and is now in the early stages of transforming transportation systems. Transportation faces many issues like high accidents rate in general, and much more rate in developing countries due to the lack of proper infrastructure for roads, is one of the reasons for these crashes. In this project we focus on public transportation vehicles - such as buses, and mini-buses -, where the goal of the project is to design and deploy a smart/intelligent unit attached to public vehicles by using embedded microcontroller and sensors and empowering them to communicate with each other through wireless technologies. The proposed Offline Intelligent Public Transportation Management System will play a major role in reducing risks and high accidents rate, whereas it can increase the traveler satisfactions and convenience. Here, we propose a method, software as well as a framework as enabling technologies to for evaluation, planning and future improvement the public transportation system. Our system even though can be as whole or parts can be applied all over the world we mostly target developing countries. This limitation mostly appear by consider off-shelf technologies such as WiFi, GPS and Open Street Maps (OSM).

Author 1: Saed Tarapiah
Author 2: Shadi Atalla

Keywords: ITS; GPS; WiFi; Transportation; OSM

PDF

The Science and Information (SAI) Organization
BACK TO TOP

Computer Science Journal

  • About the Journal
  • Call for Papers
  • Submit Paper
  • Indexing

Our Conferences

  • Computing Conference
  • Intelligent Systems Conference
  • Future Technologies Conference
  • Communication Conference

Help & Support

  • Contact Us
  • About Us
  • Terms and Conditions
  • Privacy Policy

© The Science and Information (SAI) Organization Limited. All rights reserved. Registered in England and Wales. Company Number 8933205. thesai.org