The Science and Information (SAI) Organization
  • Home
  • About Us
  • Journals
  • Conferences
  • Contact Us

Publication Links

  • IJACSA
  • Author Guidelines
  • Publication Policies
  • Digital Archiving Policy
  • Promote your Publication
  • Metadata Harvesting (OAI2)

IJACSA

  • About the Journal
  • Call for Papers
  • Editorial Board
  • Author Guidelines
  • Submit your Paper
  • Current Issue
  • Archives
  • Indexing
  • Fees/ APC
  • Reviewers
  • Apply as a Reviewer

IJARAI

  • About the Journal
  • Archives
  • Indexing & Archiving

Special Issues

  • Home
  • Archives
  • Proposals
  • Guest Editors
  • SUSAI-EE 2025
  • ICONS-BA 2025
  • IoT-BLOCK 2025

Future of Information and Communication Conference (FICC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Computing Conference

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Intelligent Systems Conference (IntelliSys)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Future Technologies Conference (FTC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact
  • Home
  • Call for Papers
  • Editorial Board
  • Guidelines
  • Submit
  • Current Issue
  • Archives
  • Indexing
  • Fees
  • Reviewers
  • Subscribe

IJACSA Volume 8 Issue 1

Copyright Statement: This is an open access publication licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.

View Full Issue

Paper 1: Approach for Acquiring Computer Systems to Satisfy Mission Capabilities

Abstract: Defense Computer Systems developed and maintained over the years has resulted in thousands of disparate, compartmented, focused, and mission driven systems that are utilized daily for deliberate and crisis mission planning activities. The defense acquisition community is responsible for the development and sustainment of these systems over the course of its systems engineering lifecycle from conception, utilization, and eventually the decommissioning of these systems. While missions are being planned, and satisfied by existing computer systems, there are new missions being proposed which cannot be satisfied by a single existing computer system capability. Therefore, this raises the question whether a Networked Computer System (NCS) using combinations of existing and developmental computer systems is preferred in order to satisfy new capability requirements. This paper explores an approach in identifying a preferred NCS solution and determining the effectiveness in satisfying a mission.

Author 1: Glenn Tolentino
Author 2: Jeff Tian
Author 3: Jerrell Stracener

Keywords: Systems Integration; Systems Development; Systems Reliability; Software Systems; Systems Engineering; Lifecycle Cost

PDF

Paper 2: Permutation of Web Search Query Types for User Intent Privacy

Abstract: Privacy remains a major concern when using search engines to find for information on the web due to the fact that search engines own massive resources in preserving search logs of each user and organizations. However, many of the present query search privacy practices require the very same search engine and third party to collaborate, making privacy even more difficult. Therefore, as a contribution, we present a heuristic, permutation of web search query types, a non-cryptographic heuristic that works by formation of obfuscated search queries via permutation of query keyword categories. Preliminary results from this study show that web search query and specific user intent privacy might be achievable from the user side without involvement of the search engine or other third parties by the permutation of web search query types.

Author 1: Kato Mivule

Keywords: Web search query privacy; user intent privacy; search engines; Information Retrieval

PDF

Paper 3: Building a Penetration Testing Device for Black Box using Modified Linux for Under $50

Abstract: This study analyzes the use of a Raspberry Pi (RPi) as part of a Penetration Tester’s toolkit. The RPi’s form factor, performance to cost ratio, used in conjunction with modified Linux, allows the RPi to be a very versatile product. Whatsmore, the RPi retails for $35 and is available from many hobby shops and on Amazon.com. Included in this research is the use of a virtual lab where the RPi is attached using an Ethernet connection. Simple attacks are carried out with a few suggestions for preventing this scenario from playing out in the real world.

Author 1: Young B. Choi
Author 2: Kenneth P. LaCroix

Keywords: Penetration Testing; Black Box; White Box; Modified Linux; Raspberry Pi (RPi); Kali Linux

PDF

Paper 4: Analysis of Particle Swarm Optimization and Genetic Algorithm based on Task Scheduling in Cloud Computing Environment

Abstract: Since the beginning of cloud computing technology, task scheduling problem has never been an easy work. Because of its NP-complete problem nature, a large number of task scheduling techniques have been suggested by different researchers to solve this complicated optimization problem. It is found worth to employ heuristics methods to get optimal or to arrive at near-optimal solutions. In this work, a combination of two heuristics algorithms was proposed: particle swarm optimization (PSO) and genetic algorithm (GA). Firstly, we list pros and cons of each algorithm and express its best interest to maximize the resource utilization. Secondly, we conduct a performance comparison approach based on two most critical objective functions of task scheduling problems which are execution time and computation cost of tasks in cloud computing. Thirdly, we compare our results with other existing heuristics algorithms from the literatures. The experimental results was examined with benchmark functions and results showed that the particle swarm optimization (PSO) performs better than genetic algorithm (GA) but they both present a similarity because of their population based search methods. The results also showed that the proposed hybrid models outperform the standard PSO and reduces dramatically the execution time and lower the processing cost on the computing resources.

Author 1: Frederic Nzanywayingoma
Author 2: Yang Yang

Keywords: Execution Time; Task Scheduling Algorithms; Particle Swarms (PSO); Genetic Algorithm (GA); Virtual Machines (VMs)

PDF

Paper 5: Efficient Video Editing for Mobile Applications

Abstract: Recording, storing and sharing video content has become one of the most popular usages of smartphones. This has resulted in demand for video editing apps that the users can use to edit their videos before sharing on various social networks. This study describes a technique to create a video editing application that uses the processing power of both GPU and CPU to process various editing tasks. The results and subsequent discussion shows that using the processing power of both the GPU and CPU in the video editing process makes the application much more time-efficient and responsive as compared to just the CPU-based processing.

Author 1: Ignasi Vegas Pajaro
Author 2: Ankur Agrawal
Author 3: Tina Tian

Keywords: iOS programming; Image processing; GPU; CPU; Objective-C; GPUImage; OpenGL

PDF

Paper 6: Insights on Error-Resilient Image Transmission Schemes on Wireless Network

Abstract: Usage of image as data (or signal) is quite frequent in majority of the user-centric application. However, transmission of image over non-concrete communication medium like air is still vulnerable due to inherent weakness of wireless communication e.g. interference, noise, scattering, fading, security etc. Wireless image transmission has yet unsolved problems when it comes to error resiliency. In this paper, we have reviewed the significant research contribution published in last 5 years associated with wireless image transmission, channel coding mechanism, and investigated the scale of effectiveness in the techniques based on advantages and limitations. We also extracted a significant research gap, which requires immediate attention. Hence, we propose our future direction of work with an indicative architectural design in order to address the problems identified in research gap from existing literatures. This paper is meant to brief about the existing system and practical approaches to solve such problems.

Author 1: Bharathi Gururaj
Author 2: G Sadashivappa

Keywords: Wireless Image Transmission: Wireless Networks; Fading; Error-Correction; Channel Coding

PDF

Paper 7: Factors Influencing the Adoption of Cloud Computing by Saudi University Hospitals

Abstract: This study aims to evaluate the adoption of Cloud Computing in Saudi university hospitals and to investigate the factors that impact the adoption. This study integrates the Technological, Organizational, Environmental (TOE) framework and the Diffusion of Innovation (DOI) theory, and adds the decision maker context to the original model. The study sample included Saudi university hospitals in Riyadh city. The data were collected using semi-structured interviews and a questionnaire. The result of this study determines the five most significant factors influencing the adoption of cloud computing in Saudi university hospitals, which are in sequence: Relative advantage, Decision-maker's innovativeness, Decision-maker's knowledge in IT, Compatibility, and Top management support. Moreover, among the four different contexts, the most important context is the Decision-maker context, followed by the Technological context, then the Organizational context, and finally the Environmental context. The findings are beneficial for hospitals to guide them to make better decisions regarding cloud computing adoption. Scholars can use this study to gain a more holistic understanding of cloud computing adoption and apply new theories in this field.

Author 1: Seham S. Almubarak

Keywords: cloud computing; (TOE) framework; (DOI) theory; technological innovation; IT adoption; healthcare; Saudi hospitals

PDF

Paper 8: Comparative Analysis and Survey of Ant Colony Optimization based Rule Miners

Abstract: In this research study, we analyze the performance of bio inspired classification approaches by selecting Ant-Miners (Ant-Miner, cAnt_Miner, cAnt_Miner2 and cAnt_MinerPB) for the discovery of classification rules in terms of accuracy, terms per rule, number of rules, running time and model size discovered by the corresponding rule mining algorithm. Classification rule discovery is still a challenging and emerging research problem in the field of data mining and knowledge discovery. Rule based classification has become cutting edge research area due to its importance and popular application areas in the banking, market basket analysis, credit card fraud detection, costumer behaviour, stock market prediction and protein sequence analysis. There are various approaches proposed for the discovery of classification rules like Artificial Neural Networks, Genetic Algorithm, Evolutionary Programming, SVM and Swarm Intelligence. This research study is focused on classification rule discovery by Ant Colony Optimization. For the performance analysis, Myra Tool is used for experiments on the 18 public datasets (available on the UCI repository). Data sets are selected with varying number of instances, number of attributes and number of classes. This research paper also provides focused survey of Ant-Miners for the discovery of classification rules.

Author 1: Zulfiqar Ali
Author 2: Waseem Shahzad

Keywords: Classification Rule; Ant Colony Optimization; Data Mining; Rule Discovery

PDF

Paper 9: A Classification Model for Imbalanced Medical Data based on PCA and Farther Distance based Synthetic Minority Oversampling Technique

Abstract: Medical data are extensively used in the diagnosis of human health. So it has played a vital role for physicians as well as in medical engineering. Accordingly, many types of research are going on related to this to have a better prediction of the diseases or to improve the diagnosis quality. However, most of the researchers work on either dimensionality space or imbalanced data. Due to this, sometimes one may not have the accurate predictions or classifications of the malignant diseases as both the factors are equally important. So it still needs an improvement or more work required to address these biomedical challenges by combing both the factors. As such this paper proposes a new and efficient combined algorithm based on FD_SMOTE (Farther Distance Based on Synthetic Minority Oversampling Techniques) and Principle Component Analysis (PCA), which successfully reduces the high dimensionality and balances the minority class. Finally, the present algorithm has been investigated on biomedical data and it gives the desired results in terms of dimensionality and data balancing. Here, In this paper, the quality of dimensionality reduction and balanced data has been evaluated using assessment metrics like co-variance, Accuracy (ACC) and Area Under the Curve (AUC). It has been observed from the numerical results that the performance of the algorithm achieved the best accuracy with metrics of ACC and AUC.

Author 1: NADIR MUSTAFA
Author 2: JIAN-PING LI
Author 3: Raheel A. Memon
Author 4: Mohammed Z. Omer

Keywords: Principle Component Analysis; Information Gain; farther Distance based Synthetic Minority Oversampling; Correlation based Feature

PDF

Paper 10: An Interoperable Data Framework to Manipulate the Smart City Data using Semantic Technologies

Abstract: During the last decade, enormous volumes of urban data have been produced by the Government agencies, the NGOs and the citizens. In such a scenario, we are presented with a diverse sets of data which holds valuable information. This information can be extracted and analyzed and have a number of usages for the well-being of citizens. The major impediment to achieve this goal is the data itself, the available data are redundant, scattered and come with various legacy formats. Data interoperability, scalability and integration are paramount issues which could not be resolved unless the scattered data silos are accessible with a standard representation. In this paper, we propose a framework that resolves the data interoperability and associated challenges in the smart city environment. The framework takes the raw smart city data from several resources and stores them in a NoSQL database. The framework transforms the scattered data into machine-processable data. Besides, the database is linked with an API and simple dashboard for further analysis, which can be utilized to build big data applications based on urban data so that government agencies can get a summarized overview of resource distribution.

Author 1: Majdi Beseiso
Author 2: Abdulkareem Al-Alwani
Author 3: Abdullah Altameem

Keywords: Smart cities; Smart Data Integration; Big data; IOT; Software architecture

PDF

Paper 11: Novel Conception of a Tunable RF MEMS Resonator

Abstract: This paper presents a new monolithic microwave integrated circuit (MMIC) based on coplanar waveguide (CPW) design for a tunable resonator based on RF MEMS. This RF structure, which can be used for system on chip (SOC), is constituted with MEMS Bridge placed between two meander inductors and the tenability is controlled by a variable applied DC voltage. Moreover, this device presents a compactness characteristic and the possibility to operate at high frequencies. The resonant frequency and the bandwidth can be changed easily by changing the bridge gap of the RF MEMS. The numerical simulations of this novel structure of a tunable RF MEMS resonator were performed with the electromagnetic solvers CST MWS (Computer simulation Technology Microwave Studio) and validated by the more accurate electromagnetic solver HFSS (High Frequency Structural Simulator). The simulation results, for three different spacing of the bridge gap, show that the tunable frequency band are between 10 and 40 GHz with the two electromagnetic solvers and exhibiting three resonant frequencies (21, 23.1 and 24.6 GHz).The simulation results of the return loss using CST achieves 29 dB with an insertion loss less than 1 dB; However, the HFSS simulation shows similar performance in the resonant frequencies and in the bandwidth giving better results in terms of the return loss (about 35dB instead of 29 dB) and showing a good adaptation.

Author 1: Bassem Jmai
Author 2: Adnen Rajhi
Author 3: Ali Gharsallah

Keywords: RF MEMS; CPW; Meander inductor; Tunable; Resonator; MMIC

PDF

Paper 12: A New Optimum Frequency Controller of Hybrid Pumping System: Bond Graph Modeling-Simulation and Practice with ARDUINO Board

Abstract: The strategy of rural development in Tunisia needs to include as one of its priorities: the control of water. In seeking solutions for the energy control dedicated to pumping, it seems interesting to know the benefits of a new technique based on the complementarities of two renewable energy sources such as solar and wind power. The climate’s dependence requires a complex modelling and more optimization methods for controlling of hybrid system. Moreover, in recent years, technological progression at hardware and software enables researchers to process these optimization problems using embedded platforms. For this paper, we apply the approach bond graph to model a complex system. Our hybrid pumping installation contains a photovoltaic generator, a wind source, converters and an induction motor-pump group. The numerical closed-loop simulation of the complete model in an appropriate environment allows us to generate an optimisation control whose the appropriate frequency depends on meteorological conditions (wind speed, insulation and temperature). The implementation of this control and the experimental measurements validate the optimum efficiency and verify operation reliability of our hybrid structure.

Author 1: MEZGHANI Dhafer
Author 2: OTHMANI Hichem
Author 3: SASSI Fares
Author 4: MAMI Abdelkader
Author 5: DAUPHIN-TANGUY Geneviève

Keywords: Hybrid power systems; Control systems; Optimization; Photovoltaic; wind turbine

PDF

Paper 13: Non-Linear Distance Transformation Algorithm and its Application in Medical Image Processing in Healthcare

Abstract: Medical image processing is one of the most demanding domains of the computing sciences. The importance of the domain is in terms of the CPU and the memory requirements that shall be used by the system to compute the result. Moreover, the volume of the data is often very large in terms of the space and primarily requires many processing tools. At the same time, the tools have to be available as the real time applications, in order to be used by the physicians On the other hand; computational complexity is also another significant issue in the processing of the data. Therefore, the development of advanced and optimized algorithms is now sought as the way to improvise the effectiveness of the processing and development capability of the image processing systems. Thus, distance map (DT) has emerged as one of the most influential types of algorithms to enhance the computational capacity of the unit and further produce better results for the actual outcome of the system. The results of the output have been in high favour of the distance map algorithm. Moreover, the output has witnessed an increasing trend in the performance of the system and has been quite prominent in terms of acquiring the resources. The results of the conclusion has concluded the fact that, the application of the distance map algorithms has resulted in the reliable alternative that can be applied in the field to improvise the running norms and further speed up the existing procedures.

Author 1: Yahia S. AL-Halabi

Keywords: Distance map; complexity; nonlinear; medical; image processing

PDF

Paper 14: Antenna Performance Improvement Techniques for Energy Harvesting: A Review Study

Abstract: The energy harvesting is defined as using energy that is available within the environment to increase the efficiency of any application. Moreover, this method is recognized as a useful way to break down the limitation of battery power for wireless devices. In this paper, several antenna designs of energy harvesting are introduced. The improved results are summarized as a 2×2 patch array antenna realizes improved efficiency by 3.9 times higher than the single patch antenna. The antenna has enhanced the bandwidth of 22.5 MHz after load two slots on the patch. The solar cell antenna is allowing harvesting energy during daylight. A couple of E-patches antennas have increased the bandwidth of 33% and the directivity up to 20 dBi. The received power can be improved by 1.2-1.4 times when using the dual port on pixel antenna. Complementary split ring resonator and substrate integrated waveguide are utilized cavity-backed feeding on a fractal patch antenna to enhance the bandwidth around 5.1%. Moreover, adding a rectifier circuit to an antenna converts the reserved RF-signal to DC power, and then duplicated the input voltage up to sum the total number of rectifier circuit stages. Therefore, the advantages and disadvantages of each antenna depend on the technique which used in design.

Author 1: Raed Abdulkareem Abdulhasan
Author 2: Abdulrashid O. Mumin
Author 3: Yasir A. Jawhar
Author 4: Mustafa S. Ahmed
Author 5: Rozlan Alias
Author 6: Khairun Nidzam Ramli
Author 7: Mariyam Jamilah Homam
Author 8: Lukman Hanif Muhammad Audah

Keywords: energy harvesting; slotted patch; circularly polarization; solar substrate; rectenna

PDF

Paper 15: Outcome based Assessment using Fuzzy Logic

Abstract: Outcome Based Education (OBE) or student centered learning is one of the key component in quality assurance and enhancement in the higher education. The OBE approach encourages students to become active learner rather than being passive as in the traditional teacher-centered learning approach. In OBE, teacher is a facilitator of the teaching learning process; therefore the quality of teaching learning process does not depends on how a Lecturer teaches the course, but on the skill or knowledge achieved by the students. The level of the attainment of Course Level Outcomes (CLOs) is the indicator of the skill, knowledge and behavior that students acquired at the end of the course. Therefore each and every activity conducted in the classroom has to be reflected in the assessment of course outcome, which is measurable. In this paper, an efficient way of assessing the course learning outcome using Fuzzy Logic is presented. The uniqueness of the method is it will give an accurate measure to assess the attainment level of the course by considering every parameter enabling the learning process.

Author 1: Abraham Varghese
Author 2: Shajidmon Kolamban
Author 3: Jagath Prasad Sreedhar
Author 4: Sankara Nayaki

Keywords: Outcome based Education; Course Learning Outcome; Fuzzy Logic

PDF

Paper 16: Towards Empowering Hearing Impaired Students' Skills in Computing and Technology

Abstract: Studies have shown that deaf and hearing-impaired students have many difficulties in learning applied disciplines such as Medicine, Engineering, and Computer Programming. This study aims to investigate the readiness of deaf students to pursue higher education in applied sciences, more specifically in computer science. This involves investigating their capabilities in computer skills and applications. Computer programming is an integral component in the technological field that can facilitate the development of further scientific advances. Devising a manner of teaching the deaf and hearing-impaired population will give them an opportunity to contribute to the technology sector. This would allow these students to join the scientific world when otherwise; they are generally unable to participate because of the limitations they encounter. The study showed that deaf students in Jeddah are eager to continue their higher education and that a large percentage of these students are keen on studying computer science, particularly if they are provided with the right tools.

Author 1: Nihal Esam Abuzinadah
Author 2: Areej Abbas Malibari
Author 3: Paul Krause

Keywords: computer programming education; deaf; hearing-impaired students; e-learning

PDF

Paper 17: Scheduling in Desktop Grid Systems: Theoretical Evaluation of Policies & Frameworks

Abstract: Desktop grid systems have already established their identity in the area of distributed systems. They are well suited for High Throughput Computing especially for Bag-of-Tasks applications. In desktop grid systems, idle processing cycles and memory of millions of users (connected through internet or through any other communication mechanism) can be utilized but the workers / hosts machines not under any centralized administrative control that result in high volatility. This issue is countered by applying various types of scheduling policies that not only ensure task assignments to better workers but also takes care of fault tolerance through replication and other mechanism. In this paper, we discussed leading desktop grid systems framework and performed a comparative analysis of these frameworks. We also presented a theoretical evaluation of server and client based scheduling policies and identified key performance indicators to evaluate these policies.

Author 1: Muhammad Khalid Khan
Author 2: Tariq Mahmood
Author 3: Syed Irfan Hyder

Keywords: desktop grid systems; task scheduling policies; work fetch policies

PDF

Paper 18: A Computationally Efficient P-LRU based Optimal Cache Heap Object Replacement Policy

Abstract: The recent advancement in the field of distributed computing depicts a need of developing highly associative and less expensive cache memories for the state-of-art processors i.e., Intel Core i6, i7, etc. Hence, various conventional studies introduced cache replacement policies which are one of the prominent key factors to determine the effectiveness of a cache memory. Most of the conventional cache replacement algorithms are found to be as not so efficient on memory management and complexity analysis. Therefore, a significant and thorough analysis is required to suggest a new optimal solution for optimizing the state-of-the-art cache replacement issues. The proposed study aims to conceptualize a theoretical model for optimal cache heap object replacement. The proposed model incorporates Tree based and MRU (Most Recently Used) pseudo-LRU (Least Recently Used) mechanism and configures it with JVM’s garbage collector to replace the old referenced objects from the heap cache lines. The performance analysis of the proposed system illustrates that it outperforms the conventional state of art replacement policies with much lower cost and complexity. It also depicts that the percentage of hits on cache heap is relatively higher than the conventional technologies.

Author 1: Burhan Ul Islam Khan
Author 2: Rashidah F. Olanrewaju
Author 3: Roohie Naaz Mir
Author 4: Abdul Raouf Khan
Author 5: S. H. Yusoff

Keywords: cache heap object replacement; garbage collectors; Java Virtual Machine; pseudo LRU

PDF

Paper 19: Evolutionary Method of Population Classification According to Level of Social Resilience

Abstract: Following the many natural disasters and global socio-economic upheavals of the 21st century, the concept of resilience is increasingly the subject of much research aimed at finding appropriate responses to these traumas. However, most existing work on resilience is limited to a broad cross-disciplinary panel of non-operational theoretical approaches. Thus, the study of the processes of social resilience is confronted with difficulties of modeling and a lack of appropriate analysis tools. However, the existing stratification methods are too general to take into account the specificities of the resilience and are difficult to use for non-specialists in modeling. In addition, most traditional methods of partition research have limitations including their inability to effectively exploit the research space. In this paper, we propose a classification algorithm based on the technique of genetic algorithms and adapted to the context of social resilience. Our objective function, after penalization by two criteria, allows to explore widely the space of research for solutions while favoring classes quite homogeneous and well separated between them.

Author 1: Coulibaly Kpinna Tiekoura
Author 2: Brou Konan Marcellin
Author 3: Babri Michel
Author 4: Souleymane Oumtanaga

Keywords: genetic algorithm; Unsupervised classification; social resilience; Partitioning method

PDF

Paper 20: Data Privacy Ontology for Ubiquitous Computing

Abstract: Privacy is an ability to understand, choose, and regulate what personal data one shares, with whom, for how long and under what context. Data owners must not lose the rights of ownership, once the data is shared. Privacy decisions have many components that include identity, access granularity, time and context. We propose an ontology based model for data privacy configuration in terms of producer and consumer. Producer is an IP entity who owns data, that is Data owner. Consumer is an IP entity with whom data is shared. We differentiate between consumer and data holder, also and IP entity, which may not have similar access rights as consumer. As we rely on Semantic Web technologies to enable these privacy preferences, our proposed vocabulary is platform independent and can thus be used by any system relying on these technologies. Ideally, producers can specify a set of attributes which consumers must satisfy in order to be granted access to the requested information. Privacy can be configured not only in terms of typical read and edit, but novel attributes like location and time are also included in the proposed ontology.

Author 1: Narmeen Zakaria Bawany
Author 2: Zubair A. Shaikh

Keywords: Privacy Ontology; Data Privacy; Location based privacy; Time based privacy; Ubiquitous Computing

PDF

Paper 21: Emergence of Unstructured Data and Scope of Big Data in Indian Education

Abstract: The Indian Education sector has grown exponentially in the last few decades as per various official reports[22]. Large amount of information pertaining to education sector is generated every year. This has led to the requirement for managing and analyzing the structured and unstructured information related to various stakeholders. At the same time there is a need to adapt to the dynamic global world by channelizing young talent in appropriate domains by cognizing and deriving the knowledge about individual student preferences hidden within the vast amount of education data. The derived knowledge is about getting finer information related to courses, facility and quality of institutes, etc and also analyzing unstructured educational learning resources present in the form of multimedia data. Also, the desire to cater to stakeholders for decision making related to courses, admissions, career planning etc has accentuated big data analytics. Various MIS or ERP systems handling structured information for educational applications exist in order to aid in the administration and managerial process. These systems are useful in customizing software application as per institutes or courses, generating various customizable reports and aiding the decision making process related to institutes. The need for storing, maintaining and analyzing unstructured information related to multimedia content online has generated a need for big data and data analytics. This paper is about the emergence of unstructured data, comparison of features provided by relational databases and big data and to identify the scope of big data in the Indian education sector.

Author 1: S S Kolhatkar
Author 2: M Y Patil
Author 3: S P Kolhatkar
Author 4: M S Paranjape

Keywords: Big Data; Indian Education; Unstructured data; Big Data Analytics; Comparative of Big data and Relational Database; Scope of Big Data based Applications

PDF

Paper 22: A Novel Semantically-Time-Referrer based Approach of Web Usage Mining for Improved Sessionization in Pre-Processing of Web Log

Abstract: Web usage mining(WUM) , also known as Web Log Mining is the application of Data Mining techniques, which are applied on large volume of data to extract useful and interesting user behaviour patterns from web logs, in order to improve web based applications. This paper aims to improve the data discovery by mining the usage data from log files. In this paper the work is done in three phases. First and second phase0 which are data cleaning and user identification respectively are completed using traditional methods. The third phase, session identification is done using three different methods. The main focus of this paper is on sessionization of log file which is a critical step for extracting usage patterns. The proposed referrer-time and Semantically-time-referrer methods overcome the limitations of traditional methods. The main advantage of pre-processing model presented in this paper over other methods is that it can process text or excel log file of any format. The experiments are performed on three different log files which indicate that the proposed semantically-time-referrer based heuristic approach achieves better results than the traditional time and Referrer-time based methods. The proposed methods are not complex to use. Web log file is collected from different servers and contains the public information of visitors. In addition, this paper also discusses different types of web log formats.

Author 1: Navjot Kaur
Author 2: Himanshu Aggarwal

Keywords: Web Usage Mining; User Identification; Session Identification; Semantics; Data Cleaning; Time Heuristics; Referrer Heuristics

PDF

Paper 23: SSL based Webmail Forensic Engine

Abstract: In this era of information technology, email applications are the foremost and extensively used electronic communication technology. Emails are profusely used to exchange data and information using several frontend applications from various service providers by its users. Currently most of the email clients and service providers now moved to secured data communications using SSL or TLS security for their data exchanged. Cyber criminals and terrorists have started by means of this mode for exchanging their malicious information in their transactions. Forensic experts have to face greater difficulty and multiple challenges in tracing crucial forensic information from network packets as the communication is secured. These challenges might affect the digital forensic experts in procuring substantial evidences against such criminals from their working environments. This research work revels working background of SSL based webmail forensic engine, which decrypt respective communication or network session and also reconstruct the actual message contents of webmail applications. This digital forensic engine is compatible to work with in proxy servers and other computing environments and enables forensic reconstruction followed by analysis of webmail clients. Proposed forensic engine employs is a high-speed packet capturing hardware module, a sophisticated packet reformation algorithm; restores email header and messages from encrypted stream of SMTP and POP3 network sessions. Proposed forensic engine also support cyber investigation team with generated forensic report and prosecution of culprits by judiciary system of the specific country.

Author 1: Manesh T
Author 2: Abdalla A Alameen
Author 3: Mohemmed Sha M
Author 4: Mohamed Mustaq Ahmed A
Author 5: Mohamed Yacoab M.Y.
Author 6: Bhadran V K
Author 7: Abraham Varghese

Keywords: Forensics; Network Sessions; Packet Drop; Secure Data Aggregation; Sensor Nodes

PDF

Paper 24: Depth Partitioning and Coding Mode Selection Statistical Analysis for SHVC

Abstract: The Scalable High Efficiency Video Coding (SHVC) has been proposed to improve the coding efficiency. However, this additional extension generally results an important coding complexity. Several studies were performed to overcome the complexity through algorithmic optimizations that led to an encoding time reduction. In fact, mode decision analysis is imperatively important in order to have an idea about the partitioning modes based on two parameters, such as prediction unit size and frame type. This paper presents statistical observations at two levels: coding units (CUs) and prediction units (PUs) selected by the encoder. Analysis was performed for several test sequences with different motion and texture characteristics. The experimental results show that the percentage of choosing coding or prediction unit size and type depends on sequence parameters, frame type, and temporal level.

Author 1: Ibtissem Wali
Author 2: Amina Kessentini
Author 3: Mohamed Ali Ben Ayed
Author 4: Nouri Masmoudi

Keywords: Video Coding; HEVC; SHVC; Coding efficiency; Statistical analysis

PDF

Paper 25: Role of Explicit Knowledge Management and Reuse in Higher Educational Environment

Abstract: Role of knowledge management and knowledge reuse has been investigated analytically in higher educational environment using Nonaka & Takeuchi and Harsh models. It has been observed that in three dimensional environment knowledge management and reuse together play key role for students and faculty both if these could be appropriately exploited. A comprehensive system can be built which can benefit both students and faculty in wider areas of their respective knowledge management. Special benefits of knowledge reuse may be seen if we could treat knowledge reusability as an independent quantity along with explicit and tacit knowledge. Current model reveals analytically that knowledge reusability may boost the operative knowledge in an educational organization and may have its sovereign reality. Present work may be also helpful to manage knowledge during software reuse and associated actions.

Author 1: Sanjiv Sharma
Author 2: O.K. Harsh

Keywords: Knowledge Management; Higher Education; Software Engineering; Knowledge Reuse; Harsh Model

PDF

Paper 26: Discovering Semantic and Sentiment Correlations using Short Informal Arabic Language Text

Abstract: Semantic and Sentiment analysis have received a great deal of attention over the last few years due to the important role they play in many different fields, including marketing, education, and politics. Social media has given tremendous opportunities for researchers to collect huge amount of data as input for their semantic and sentiment analysis. Using twitter API, we collected around 4.5 million Arabic tweets and used them to propose a novel automatic unsupervised approach to capture patterns of words and sentences of similar contextual semantics and sentiment in informal Arabic language at word and sentence levels. We used Language Modeling (LM) model which is statistical model that can estimate the distribution of natural language in effective way. The results of experiments of proposed model showed better performance than classic bigram and latent semantic analysis (LSA) model in most of cases at word level. In order to handle the big data, we used different text processing techniques followed by removal of the unique words based on their rele Informal Arabic, Big Data, Sentiment analysis, Opinion Mining (OM), semantic analysis, bigram model, LSA model, Twitter vance to problem.

Author 1: Salihah AlOtaibi
Author 2: Muhammad Badruddin Khan

Keywords: Opinion Mining; Sentiment analysis; semantic analysis; Twitter; Informal Arabic

PDF

Paper 27: Extending Unified Modeling Language to Support Aspect-Oriented Software Development

Abstract: Aspect-Oriented Software Development (AOSD) is continuously gaining more importance as the complexity of software systems increases and requirement changes are high- rated. A smart way for making reuse of functionality without additional effort is separating the functional and non functional requirements. Aspect-oriented software development supports the capability of separating requirements based on concerns. AspectJ is one of the aspect-oriented implementations of Java. Using Model Driven Architecture (MDA) specifications, an AspectJ model representing AspectJ elements can be created in an abstract way with the ability to be applied in UML, Java or XML. One of the open source tools which support MDA and follows the standards of the Object Management Group (OMG) for both UML and MDA is Eclipse providing an implementation of MDA through Eclipse Modeling Framework (EMF). This paper focuses on creating a UML profile; a UML extension which supports language specifications for AspectJ using EMF. Our work is based on the latest UML specification (UML 2.5) and uses MDA to enable the inclusion of aspect-oriented concepts in the design process.

Author 1: Rehab Allah Mohamed Ahmed
Author 2: Amal Elsayed Aboutabl
Author 3: Mostafa-Sami M. Mostafa

Keywords: Aspect-Oriented Software Development; Model Driven Architecture; Eclipse Modeling Framework; Object Management group; UML; AspectJ

PDF

Paper 28: Studying Applicability Feasibility of OFDM in Upcoming 5G Network

Abstract: Orthogonal frequency-division multiplexing (OFDM) is one of unbeatable multiplexing technique till date. However with increasing version of next generation mobile standards like 5G, the applicability of OFDM is quite questionable. The prime reason behind this is in order to offer higher data rates and extensive networking services in 5G, OFDM will be required to overcome some inherent problems of spectral leakage, power consumption, less supportability of increased channel capacity. The reason community still believes that there is positive scope of OFDM to be applicable in 5G network provided it undergoes certain changes. This paper reviews some of the complimentary waveforms that have been theoretically proven to be adding edge to OFDM system. The paper reviews different waveforms as well as multiple access techniques to be used in designing 5G technology and assess their effectiveness in viewpoint of research applicability and effectiveness towards leveraging 5G.

Author 1: Nagapushpa K.P
Author 2: Chitra Kiran N

Keywords: OFDM; 5G; Next Generation; Peak to Average Power Ratio (PAPR); multi-carrier; Waveforms; Multiple Access

PDF

Paper 29: Printed Arabic Text Recognition using Linear and Nonlinear Regression

Abstract: Arabic language is one of the most popular languages in the world. Hundreds of millions of people in many countries around the world speak Arabic as their native speaking. However, due to complexity of Arabic language, recognition of printed and handwritten Arabic text remained untouched for a very long time compared with English and Chinese. Although, in the last few years, significant number of researches has been done in recognizing printed and handwritten Arabic text, it stills an open research field due to cursive nature of Arabic script. This paper proposes automatic printed Arabic text recognition technique based on linear and ellipse regression techniques. After collecting all possible forms of each character, unique code is generated to represent each character form. Each code contains a sequence of lines and ellipses. To recognize fonts, a unique list of codes is identified to be used as a fingerprint of font. The proposed technique has been evaluated using over 14000 different Arabic words with different fonts and experimental results show that average recognition rate of the proposed technique is 86%.

Author 1: Ashraf A. Shahin

Keywords: auto-scaling; cloud computing; cloud resource scaling; queuing theory; resource provisioning; virtualized resources

PDF

Paper 30: Diabetes Disease Diagnosis Method based on Feature Extraction using K-SVM

Abstract: Nowadays, diabetes disease is considered one of the key reasons of death among the people in the world. The availability of extensive medical information leads to the search for proper tools to support physicians to diagnose diabetes disease accurately. This research aimed at improving the diagnostic accuracy and reducing diagnostic miss-classification based on the extracted significant diabetes features. Feature selection is critical to the superiority of classifiers founded through knowledge discovery approaches, thereby solving the classification problems relating to diabetes patients. This study proposed an integration approach between the SVM technique and K-means clustering algorithms to diagnose diabetes disease. Experimental results achieved high accuracy for differentiating the hidden patterns of the Diabetic and Non-diabetic patients compared with the modern diagnosis methods in term of the performance measure. The T-test statistical method obtained significant improvement results based on K-SVM technique when tested on the UCI Pima Indian standard dataset.

Author 1: Ahmed Hamza Osman
Author 2: Hani Moetque Aljahdali

Keywords: K-means Clustering; Diabetes Patients; SVM; Diagnosis; Accuracy

PDF

Paper 31: Numerical Method for Constructing Fixed Right Shift (FRS) Code for SAC-OCDMA Systems

Abstract: In optical code division multiple access (OCDMA) systems, multiple access interference (MAI) problem which amplifies with the number of users actively involving in the network robustly bound the performance of such network. In this paper an algorithm to generate binary code sequences based on spectral amplitude coding (SAC) technique for CDMA under optical communication systems environment named fixed right shifting (FRS) is proposed. This algorithm is built with minimum cross correlation (MCC) using some type of Jordan matrices with straightforward algebraic methods. By using the code weight W and the number of users N, various sets of binary code sequences for the possibilities of even and odd combination are constructed. Furthermore, this algorithm allows users with different code sequences to transmit data with minimum likelihood of interference. Simulation results show our technique for an agreeable bit error rate (BER) of 10-12 can support a higher number of users in deterministic and stochastic methods compared to reported techniques such Modified Quadratic Congruence (MQC) and Modified Frequency Hopping (MFH).

Author 1: Hassan Yousif Ahmed
Author 2: K. S. Nisar
Author 3: Medin Zeghid
Author 4: S. A. Aljunid

Keywords: FRS; OCDMA; MAI; BER; MFH; MQC

PDF

Paper 32: EEBFTC: Extended Energy Balanced with Fault Tolerance Capability Protocol for WSN

Abstract: This paper proposes a new framework for wireless sensor networks (WSN) by combining two routing protocol algorithms. In the proposed framework two algorithms are taking into consideration the energy balanced clustering (EBC) protocol in WSN with fault tolerance capabilities. The organizer is automatically selected by the base station (BS) and then it selects the cluster head (CH). The mechanism of selecting the organizer node and the cluster head (CH) is based on the power, efficacy and energy balance load. In addition, the organizer is responsible to select a new CH in case of failure and vice versa. So, the energy balanced clustering and fault tolerance operations will prolong the node life time and thus the network will be efficient in data transmission and more reliable. The new framework after implementation is named Extended Energy Balanced with Fault Tolerance Capability (EEBFTC) protocol.

Author 1: Mona M. Jamjoom

Keywords: wireless sensor network; clustering; EBC; energy; fault tolerant

PDF

Paper 33: TinyCO – A Middleware Model for Heterogeneous Nodes in Wireless Sensor Networks

Abstract: Wireless sensor networks (WSNs) contain multiple nodes of the same configuration and type. The biggest challenge nowadays is to communicate with heterogeneous nodes of different WSNs. To communicate with distinct networks, an application requires generic middleware. This middleware should be able to translate the requests for contrary WSNs. Most of the wireless nodes use the TinyOS or Contiki operating systems. These operating systems vary in their architecture, configuration and programming model. An application cannot communicate with heterogeneous networks because of their divergent nature. In this paper, we design and implement TinyCO (a generic middleware model for WSNs), which overcomes these challenges. TinyCO is a general-purpose service-oriented middleware model. This middleware model can identify the heterogeneous networks based on TinyOS and Contiki. It allows applications to communicate with these networks using a generic request. This middleware interprets the given input into signatures of the underlying networks. This proposed middleware is implemented in Java and tested on TelosB motes.

Author 1: Atif Naseer
Author 2: Basem Y Alkazemi
Author 3: Hossam I Aldoobi

Keywords: wireless sensor networks; middleware; heterogeneous network; interoperability; service-oriented architecture

PDF

Paper 34: Description Logic Application for UML Class Diagrams Optimization

Abstract: Most of known technologies of object-oriented developments are UML-based; particularly widely used class diagrams that serve to describe the model of a software system, reflecting the regularities of the domains. CASE tools used for object-oriented developments, often lack verification and optimization functions of diagrams. This article will discuss one of the ways to present class diagram in the form of statements description logic, and then perform their verification, and optimization. Optimization process is based on design patterns and anti-patterns. We will show that some transformations could be done automatically, while in other cases suboptimal models need to be adjusted by a designer.

Author 1: Maxim Sergievskiy

Keywords: UML; domain models; description logic; concept; role; class diagram; design patterns; anti-patterns

PDF

Paper 35: Design, Modeling and Energy Management of a PEM Fuel Cell / Supercapacitor Hybrid Vehicle

Abstract: This work concerns the study and the modeling of hybrid Proton Exchange Membrane (PEM) Fuel Cell electric vehicle. In fact, the paper deals with the model description of the powertrain which includes two energy sources: a PEM Fuel Cell as a primary source and a supercapacitor as a secondary source. The architecture is two degrees of freedom permitting a stability of the DC bus voltage. The hybridation of primary source with an energy storage system can improve vehicle dynamic response during transients and hydrogen consumption. The proposed energy management algorithm allows us to have a minimum hydrogen consumption. This algorithm is based on supercapacitor state of charge (SOC) control and acceleration/deceleration phases making possible braking energy recovery. The proposed model is simulated and tested using Matlab/Simulink software allowing rapid transitions between sources. The obtained results with the New European Driving Cycle (NEDC) cycle demonstrate a 22% gain in hydrogen consumption.

Author 1: Wahib Andari
Author 2: Samir Ghozzi
Author 3: Hatem Allagui
Author 4: Abdelkader Mami

Keywords: PEM Fuel Cell; Powertrain; Electric vehicle; Supercapacitor; Energy management; Power system; hydrogen gain

PDF

Paper 36: Enhancing Elasticity of SaaS Applications using Queuing Theory

Abstract: Elasticity is one of key features of cloud computing. Elasticity allows Software as a Service (SaaS) applications’ provider to reduce cost of running applications. In large SaaS applications that are developed using service-oriented architecture model, each service is deployed in a separated virtual machine and may use one or more services to complete its task. Although, scaling service independently from its required services propagates scaling problem to other services, most of current elasticity approaches do not consider functional dependencies between services, which increases the probability of violating service level agreement. In this paper, architecture of SaaS application is modeled as multi-class M/M/m processor sharing queuing model with deadline to take into account functional dependencies between services during estimating required scaling resources. Experimental results show effectiveness of the proposed model in estimating required resources during scaling virtual resources.

Author 1: Ashraf A. Shahin

Keywords: auto-scaling; cloud computing; cloud resource scaling; queuing theory; resource provisioning; virtualized resources

PDF

Paper 37: Analyzing Interaction Flow Modeling Language in Web Development Lifecycle

Abstract: Two years ago, the Object Management Group (OMG) adopted a new standard method named Interaction Flow Modeling Language (IFML) for web engineering domain. IFML is designed to express the content, user interaction, and control behavior of the front end of applications. There are number lacks in web engineering methods, because each of them is defined to particular specifications, one of which is the open issue of supporting the whole lifecycle in process development. In this paper, we analyze IFML models in the process development lifecycle to show capability of the method used in the process development. We then make a comparison between IFML and other methods in lifecycle phases. Finally, we add IFML to the web engineering lifecycle’s map. It is anticipated that the result of this paper will be to become a guide for developers for using IFML in the development of new applications.

Author 1: Karzan Wakil
Author 2: Dayang N.A. Jawawi

Keywords: Interaction Flow Modeling Language; IFML; Web Engineering Methods; Web Development Lifecycle

PDF

Paper 38: Context based Emotion Analyzer for Interactive Agent

Abstract: Emotions can affect human’s performance in a considerable manner. These emotions can be articulated in many ways such as text, speech, facial expressions, gestures and postures. Humans in effect of their emotions, have ability to perform surprising tasks under their emotional state. In recent years, interactive cognitive agents are being utilized in industrial and non-industrial organizations to interact with persons inside or outside the organization. Existing agents are intelligent enough to communicate like humans by expressing their emotions and recognizing emotions of other person. One of the main limitation of existing interactive agents is that they can only recognize emotions based on predefined keywords or semantics instead of analyzing the context in which those keywords were used. The focus of this paper is to study context based emotions and to present a model, which can analyze the context and generate emotion accordingly.

Author 1: Mubasher H. Malik
Author 2: Syed Ali Raza
Author 3: H.M. Shehzad Asif

Keywords: artificial general intelligence; context based sentiments; emotions; natural language processing; machine learning

PDF

Paper 39: Intelligent Real-Time Facial Expression Recognition from Video Sequences based on Hybrid Feature Tracking Algorithms

Abstract: In this paper, a method for automatic facial expression recognition (FER) from video sequences is introduced. The features are extracted from tracking of facial landmarks. Each landmark component is tracked by appropriate method, results in proposing a hybrid technique that is able to achieve high recognition accuracy with limited feature dimensionality. Moreover, our approach aims to increase the system accuracy by increasing the FER recognition accuracy of the most overlapped expressions while achieving low processing time. Thus, the paper introduces also an intelligent Hierarchal Support Vector Machine (HSVM) to reduce the cross-correlation between the confusing expressions. The proposed system was trained and tested using a standard video sequence dataset for six facial expressions, and compared with previous work. Experimental results show an average of 96% recognition accuracy and average processing time of 93 msec.

Author 1: Nehal O. Sadek
Author 2: Noha A. Hikal
Author 3: Fayez W. Zaki

Keywords: facial expression recognition (FER); Hierarchical Support Vector Machine (HSVM); Human computer Interaction (HCI); Real-time facial expression recognition

PDF

Paper 40: From PID to Nonlinear State Error Feedback Controller

Abstract: In this paper an improved nonlinear state error feedback controller (INLSEF) has been proposed for perfect reference tracking and minimum control energy. It consists of a nonlinear tracking differentiator together with nonlinear combinations of the error signal. The tracking differentiator generates a set of reference profile for the input signal, which is the signal itself in addition to its derivatives. On the other hand, the 12-parameters nonlinear combinations of the error signal make the INLSEF controller can handles with time-varying and system’s nonlinearity. Digital simulation studies have been conducted for the proposed controller and compared with several works from literature survey on two case studies, mass-spring-damper which is a very nonlinear system and nonlinear ball and beam systems. The parameters of the nonlinear combination of the error signal are tuned to satisfy the optimality condition by minimizing the OPI performance index defined in this work. From the simulations results one can conclude that the proposed INLSEF controller performance is better than that of its counterpart in terms of speed and control energy and minimum error. Also, the results showed that the proposed controller is effectively enhancing the stability and performance of the closed loop system.

Author 1: Wameedh Riyadh Abdul-Adheem
Author 2: Ibraheem Kasim Ibraheem

Keywords: tracking differentiator; state error feedback; Lyapunov function; asymptotic stability; nonlinear PID

PDF

Paper 41: MOMEE: Manifold Optimized Modeling of Energy Efficiency in Wireless Sensor Network

Abstract: Although adoption pace of wireless sensor network has increased in recent times in many advance technologies of ubiquitous-ness, but still there are various open-end challenges associated with energy efficiencies among the sensor nodes till now. We reviewed the existing research approaches towards energy optimization techniques to explore significant problems. This paper introduces MOMEE i.e. Manifold Optimized Modeling of Energy Efficiency that offers novel clustering as well as novel energy optimized routing strategy. The proposed system uses analytical modeling methodology and is found to offer better resiliency against traffic bottleneck condition. The study outcome of MOMEE exhibits higher number of alive nodes, lower number of dead nodes, good residual energy, and better throughput as compared to existing energy efficient routing approaches in wireless sensor network.

Author 1: Rajalakshmi M.C.
Author 2: A.P. Gnana Prakash

Keywords: Wireless Sensor Network; Energy Efficiency; network Lifetime; Optimization; Battery

PDF

Paper 42: Modern Authentication Techniques in Smart Phones: Security and Usability Perspective

Abstract: A smartphone has more advanced computing ability and connectivity than basic featured phones. Presently, we are moving from the Internet society to a mobile society where more and more access to the information is required. This has resulted in a mobile security which is no longer immanent, but imperative. Smartphone authentication has received substantial attention of the research community for the past several years because there have been modern developments beyond the classical PINs and passwords making user authentication more challenging. In this paper, we critically analyze the attacks and the vulnerabilities in smartphones’ authentication mechanisms. A comparative analysis of different authentication techniques along with the usage of the different authentication methods is discussed which lead the end-user towards choosing the most suitable and customizable authentication technique.

Author 1: Usman Shafique
Author 2: Hikmat Khan
Author 3: Sabah-ud-din Waqar
Author 4: Asma Sher
Author 5: Adnan Zeb
Author 6: Uferah Shafi
Author 7: Rahim Ullah
Author 8: Rehmat Ullah

Keywords: smartphone; authentication; security; attacks; knowledge-based

PDF

Paper 43: Estimation Method of the Total Number of Wild Animals based on Modified Jolly’s Method

Abstract: Estimation method of the total number, the probabilities of birth and alive of wild animals based on Jolly’s method is proposed. Jolly’s method requires putting tags to the captured wild animals by bank trap while just identifications of the wild animals using camera images are required for the proposed method. An identification method is also proposed here. Other than these, the method for detection of specific wild animals is proposed. The proposed method is validated through simulations. The proposed method for specific wild animal detection with acquired camera images is also validated. The simulation results show that the proposed Modified Jolly’s Method: MJM is superior to the conventional Petersen method by 2.65% in terms of confidence interval of the estimated total number of wild pigs in the simulation cells in concern (128 by 128).

Author 1: Kohei Arai
Author 2: Takashi Higuchi
Author 3: Tetsuya Murakami

Keywords: Wild animals; Jolly’s method; Specific wild animal detection

PDF

Paper 44: Optimized Order of Software Testing Techniques in Agile Process – A Systematic Approach

Abstract: The designing, development of a software product needs lot of efforts whereas software testing is also a very challenging task but it is equally mandatory activity in order to ensure the quality of the product before shipping to customer. When it comes to the Agile model under which software builds are developed very frequently and development goes on a very high pace, software testing becomes more important and critical. Organizations following the agile methodology, encounter number of problems in formulating a software testing process unless they come up with a systematic testing approach based on right testing technique at a proper stage of the agile process. This paper addresses the relevant software testing techniques feasible at different stages of the agile process and proposes a dedicated software testing framework producing quality software products developed under agile methodology.

Author 1: Farrukh Latif Butt
Author 2: Shahid Nazir Bhatti
Author 3: Sohail Sarwar
Author 4: Amr Mohsen Jadi
Author 5: Abdul Saboor

Keywords: Agile methodology; software testing techniques; software build; software quality

PDF

Paper 45: Design, Release, Update, Repeat: The Basic Process of a Security Protocol’s Evolution

Abstract: Companies, businesses, colleges, etc. throughout the world use computer networks and telecommunications to run their operations. The convenience, information-gathering, and organizational abilities provided by computer networks and the Internet is undeniably useful. However, as computer and network technology continues to become increasingly advanced, the threat and number of cyber-attacks rises. Without advanced and well-developed security protocols, companies, businesses, colleges, and even ordinary individuals would be at the mercy of malicious hackers. This paper focuses on security protocols such as PGP, 3PAKE, and TLS’s processes, design, history, advantages, and disadvantages. Research for this article was conducted through reading numerous scholarly articles, conference articles, and IT and information security textbooks. The purpose of this article is to expose and elaborate on vulnerabilities in popular security protocols, introduce lesser-known protocols with great potential, and lastly, provide suggestions for future directions and modifications to improve security protocols through qualitative and theoretical research.

Author 1: Young B. Choi
Author 2: Nathan D. Hunter

Keywords: Security; Protocol; 3PAKE; PGP; quantum; service, SSL; TLS; DSQC; QSDC; cyber; hashing; DOMIH; SHA

PDF

Paper 46: Detection of J2EE Patterns based on Customizable Features

Abstract: Design patterns support extraction of design information for better program understanding, reusability and reengineering. With the advent of contemporary applications, the extraction of design information has become quite complex and challenging. These applications are multilingual in nature i.e. their design information is spread across various language components that are interlinked with each other. At present, no approach is available that is capable to extract design information of multilingual applications by using design patterns. This paper lays foundation for the analysis of multilingual source code for the detection of J2EE Patterns. J2EE Patterns provide design solutions for effective enterprise applications. A novel approach is presented for the detection of J2EE Patterns from multilingual source code of J2EE applications. For this purpose, customizable and reusable feature types are presented as definitions of J2EE Patterns catalogue. A prototype implementation is evaluated on a corpus that contains the repository of multilingual source code of J2EE Patterns. Additionally, the tool is tested on open source applications. The accuracy of the tool is validated by successfully recognizing J2EE Patterns from the multilingual source code. The results demonstrate the significance of customizable definitions of J2EE Pattern’s catalogue and capability of prototype.

Author 1: Zaigham Mushtaq
Author 2: Ghulam Rasool
Author 3: Balawal Shahzad

Keywords: Source code analysis; Cross-language; Analysis methods; Reverse Engineering; Source code parsing

PDF

Paper 47: Conceptual Model for WWBAN (Wearable Wireless Body Area Network)

Abstract: Modern world advances in sensors miniaturization and wireless networking which enables exploiting wireless sensor networking to monitor and control the environment. Human health monitoring is promising applications of sensor networks in a healthcare environment. Sensor system was worn by the human that creates wireless body area network to monitor and provide synchronized response to the patients for medical contextual information received by sensors. Though, challenging tasks are encountered by researchers to address habitually conflicting necessities for size, time to operate, correctness of data, reliability and time to store that data and provide responses accordingly. This paper encompasses the structural design of hardware as well as software in a wireless sensor network system for monitoring health issues. The paper outlines few healthcare services, innovations latest trends those monitor patients in the health care systems and propose some of the other future trends where they might be helpful for future research to be used in handheld.

Author 1: Jawad Hussain Awan
Author 2: Shahzad Ahmed Memon
Author 3: Nisar Ahmed Memon
Author 4: Raza Shah
Author 5: Zulifqar Bhutto
Author 6: Rahat Ali Khan

Keywords: Healthcare Environment; Healthcare service; wireless body area networks and wireless sensors

PDF

Paper 48: Community Detection in Networks using Node Attributes and Modularity

Abstract: Community detection in network is of vital importance to find cohesive subgroups. Node attributes can improve the accuracy of community detection when combined with link information in a graph. Community detection using node attributes has not been investigated in detail. To explore the aforementioned idea, we have adopted an approach by modifying the Louvain algorithm. We have proposed Louvain-AND-Attribute (LAA) and Louvain-OR-Attribute (LOA) methods to analyze the effect of using node attributes with modularity. We compared this approach with existing community detection approaches using different datasets. We found the performance of both algorithms better than Newman’s Eigenvector method in achieving modularity and relatively good results of gain in modularity in LAA than LOA. We used density, internal and external edge density for the evaluation of quality of detected communities. LOA provided highly dense partitions in the network as compared to Louvain and Eigenvector algorithms and close values to Clauset. Moreover, LOA achieved few numbers of edges between communities.

Author 1: Yousra Asim
Author 2: Rubina Ghazal
Author 3: Wajeeha Naeem
Author 4: Abdul Majeed
Author 5: Basit Raza
Author 6: Ahmad Kamran Malik

Keywords: Community Detection; Louvain algorithm; Node attributes; and Modularity

PDF

Paper 49: Value based PSO Test Case Prioritization Algorithm

Abstract: Regression testing is performed to see if any changes introduced in software will not affect the rest of functional software parts. It is inefficient to re-execute all test cases every time the changes are made. In this regard test cases are prioritized by following some criteria to perform efficient testing while meeting limited testing resources. In our research we have proposed value based particle swarm intelligence algorithm for test case prioritization. The aim of our research is to detect maximum faults earlier in testing life cycle. We have introduced the combination of six prioritization factors for prioritization. These factors are customer priority, Requirement volatility, implementation complexity, requirement traceability, execution time and fault impact of requirement. This combination of factors has not been used before for prioritization. A controlled experiment has been performed on three medium size projects and compared results with random prioritization technique. Results are analyzed with the help of average percentage of fault detection (APFD) metric. The obtained results showed our proposed algorithm as more efficient and robust for earlier rate of fault detection. Results are also revalidated by proposing our new validation equation and showed consistent improvement in our proposed algorithm.

Author 1: Erum Ashraf
Author 2: Khurrum Mahmood
Author 3: Tamim Ahmed Khan
Author 4: Shaftab Ahmed

Keywords: Test case prioritization (TCP); Particle swarm optimization (PSO); Average percentage of fault detection (APFD); Value based software engineering (VBSE)

PDF

Paper 50: Sentiment Classification of Twitter Data Belonging to Saudi Arabian Telecommunication Companies

Abstract: Twitter has attracted the attention of many re-searchers owing to the fact that every tweet is, by default, public in nature which is not the case with Facebook. In this paper, we present sentiment analysis of tweets written in English, belonging to different telecommunication companies in Saudi Arabia. We apply different machine learning algorithms such as k nearest neighbor algorithm, Artificial Neural Networks (ANN), Na¨ive Bayesian etc. We classified the tweets into positive, negative and neutral classes based on Euclidean distance as well as cosine similarity. Moreover, we also learned similarity matrices for kNN classification. CfsSubsetEvaluation as well as Information Gain was used for feature selection. The results of CfsSubsetEvaluation were better than the ones obtained with Information Gain. Moreover, kNN performed better than the other algorithms and gave 75.4%, 76.6% and 75.6% for Precision, Recall and F-measure, respectively. We were able to get an accuracy of 80.1%with a symmetric variant of kNN while using cosine similarity. Furthermore, interesting trends wrt days, months etc. were also discovered.

Author 1: Ali Mustafa Qamar
Author 2: Suliman A. Alsuhibany
Author 3: Syed Sohail Ahmed

Keywords: sentiment analysis; social networks; supervised machine learning; text mining

PDF

Paper 51: SIT: A Lightweight Encryption Algorithm for Secure Internet of Things

Abstract: The Internet of Things (IoT) being a promising technology of the future is expected to connect billions of devices. The increased number of communication is expected to generate mountains of data and the security of data can be a threat. The devices in the architecture are essentially smaller in size and low powered. Conventional encryption algorithms are generally computationally expensive due to their complexity and requires many rounds to encrypt, essentially wasting the constrained energy of the gadgets. Less complex algorithm, however, may compromise the desired integrity. In this paper we propose a lightweight encryption algorithm named as Secure IoT (SIT). It is a 64-bit block cipher and requires 64-bit key to encrypt the data. The architecture of the algorithm is a mixture of feistel and a uniform substitution-permutation network. Simulations result shows the algorithm provides substantial security in just five encryption rounds. The hardware implementation of the algorithm is done on a low cost 8-bit micro-controller and the results of code size, memory utilization and encryption/decryption execution cycles are compared with benchmark encryption algo-rithms. The MATLAB code for relevant simulations is available online at https://goo.gl/Uw7E0W.

Author 1: Muhammad Usman
Author 2: Irfan Ahmed
Author 3: M. Imran Aslam
Author 4: Shujaat Khan
Author 5: Usman Ali Shah

Keywords: IoT; Security; Encryption; Wireless Sensor Network WSN; Khazad

PDF

Paper 52: An Online Synchronous Brain Wave Signal Pattern Classifier with Parallel Processing Optimization for Embedded System Implementation

Abstract: Commercial Brain Computer Interface applications are currently expanding due to the success of widespread dis-semination of low cost devices. Reducing the cost of a traditional system requires appropriate resources, such as proper software tools for signal processing and characterization. In this paper, a methodology for classifying a set of attention and meditation brain wave signal patterns is presented by means of unsupervised signal feature clustering with batch Self-Organizing Maps (b-SOM) and supervised classification by Support Vector Machine (SVM). Previous research on this matter did not combine both methods and also required an important amount of computation time. With the use of a small square neuron grid by b-SOM and an RBF kernel SVM, a well delimited classifier was obtained. The recognition rate was 70% after parameter tuning. In terms of optimization, the parallel b-SOM algorithm reduced drastically the computation time, allowing online clustering and classification for full length input data.

Author 1: Bruno Senzio-Savino
Author 2: Mohammad Reza Alsharif
Author 3: Carlos E. Gutierrez
Author 4: Kamaledin Setarehdan

Keywords: Brain Computer Interface; batch SOM; SVM; Parallel-processing

PDF

Paper 53: Mobile Sensing for Data-Driven Mobility Modeling

Abstract: The use of mobile sensed location data for realistic human track generation is privacy sensitive. People are unlikely to share their private mobile phone data if their tracks were to be simulated. However, the ability to realistically generate human mobility in computer simulations is critical for advances in many domains, including urban planning, emergency handling, and epidemiology studies. In this paper, we present a data-driven mobility model to generate human spatial and temporal movement patterns on a real map applied to an agent based setting. We address the privacy aspect by considering collective participant transitions between semantic locations, defined in a privacy preserving way. Our modeling approach considers three cases which decreasingly use real data to assess the value in generating realistic mobility, considering data of 89 participants over 6079 days. First, we consider a dynamic case which uses data on a half-hourly basis. Second, we consider a data-driven case without time of day dynamics. Finally, we consider a homogeneous case where the transitions between locations are uniform, random, and not data-driven. Overall, we find the dynamic data-driven case best generates the semantic transitions of previously unseen participant data.

Author 1: Kashif Zia
Author 2: Arshad Muhammad
Author 3: Katayoun Farrahi
Author 4: Dinesh Kumar Saini

Keywords: mobile sensing; data-driven mobility model; agent based models

PDF

Paper 54: Parallel Architecture for Face Recognition using MPI

Abstract: The face recognition applications are widely used in different fields like security and computer vision. The recognition process should be done in real time to take fast decisions. Princi-ple Component Analysis (PCA) considered as feature extraction technique and is widely used in facial recognition applications by projecting images in new face space. PCA can reduce the dimensionality of the image. However, PCA consumes a lot of processing time due to its high intensive computation nature. Hence, this paper proposes two different parallel architectures to accelerate training and testing phases of PCA algorithm by exploiting the benefits of distributed memory architecture. The experimental results show that the proposed architectures achieve linear speed-up and system scalability on different data sizes from the Facial Recognition Technology (FERET) database.

Author 1: Dalia Shouman Ibrahim
Author 2: Salma Hamdy

Keywords: Face Recognition; PCA; MPI; Parallel Programming; Distributed memory architecture

PDF

Paper 55: Multithreaded Sliding Window Approach to Improve Exact Pattern Matching Algorithms

Abstract: In this paper an efficient pattern matching ap-proach, based on a multithreading sliding window technique, is proposed to improve the efficiency of the common sequential exact pattern matching algorithms including: (i) Brute Force, (ii) Knuth-Morris-Pratt and (iii) Boyer-Moore. The idea is to divide the text under-search into blocks, each block is allocated one or two threads running concurrently. Reported experimental results indicated that the proposed approach improves the performance of the well-known pattern matching algorithms, in terms of search time, especially when the searched patterns are located at the middle or at the end of the text.

Author 1: Ala’a Al-shdaifat
Author 2: Basam Hammo
Author 3: Mohammad Abushariah
Author 4: Esra’a Alshdaifat

Keywords: pattern matching; multithreading; sliding window; Brute Force; Knuth-Morris-Pratt; Boyer-Moore

PDF

Paper 56: The Effectiveness of D2L System: An Evaluation of Teaching-Learning Process in the Kingdom of Saudi Arabia

Abstract: High quality education could be achieved through an e-learning system as it increases the educational information accessibility, service availability and accuracy when compared to a conventional face-to-face teaching-learning approach. However, user acceptance is one of the key essentials for adoption and success of e-learning system. Many studies revealed that use of D2L application is one of the best tool in the adoption of teaching and learning methodologies and the effectiveness of this application has gained a demand within the last few years. This paper investigates the feasibility of applying UTAUT model on Desire2Learn (D2L) e-learning system in KSA. The main objective of this study is to evaluate the efficiency of D2L (e-learning) system based on students acceptance. Questionaire method was employed to accomplish this study. Based on the (UTAUT) model the impact of trust on the adoption of e-learning systems’ services from students’ perception was studied. Feedback was collected from 213 students to carry out the study. The results of this study indicates that the services offered by D2L System has significant weightage on teaching-learning process in Saudi Arabia from the student perspective.

Author 1: Mohammed Al-Shehri

Keywords: e-learning; Desire2Learn (D2L); Unified Theory of Acceptance and Use of Technology (UTAUT)

PDF

Paper 57: Intrusion Detection in Wireless Body Sensor Networks

Abstract: The recent advances in electronic and robotics industry have enabled the manufacturing of sensors capable of measuring a set of application-oriented parameters and transmit them back to the base station for analysis purposes. These sensors are widely used in many applications including the healthcare systems forming though a Wireless Body Sensor Networks. The medical data must be highly secured and possible intrusion has to be fully detected to proceed with the prevention phase. In this paper, we propose a new intrusion superframe schema for 802.15.6 standard to detect the cloning attack. The results proved the efficiency of our technique in detecting this type of attack based on 802.15.6 parameters performances coupled with frequency switching at the radio model.

Author 1: Nadya El MOUSSAID
Author 2: Ahmed TOUMANARI
Author 3: Maryam EL AZHARI

Keywords: Intrusion detection; cloning attack; 802.15.6; healthcare; WBSN

PDF

Paper 58: Organizing Multipath Routing in Cloud Computing Environments

Abstract: One of the objectives of organizing cloud systems is to ensure effective access to remote resources by optimizing traffic engineering (TE) procedures. This paper considers the traffic engineering problem in a cloud environment by using a multipath routing technique. The multipath routing algorithm is used to identify the maximum number of disjoint paths in the graph which overcomes the problem in the junction area estimation process. So, the algorithm forms a plurality of non-overlapping and partially intersecting paths between any two nodes is proposed. Finally, the conditions for the formation of multipath virtual channels to ensure minimum build-time posts for the parallel transmission of its parts are also discussed.

Author 1: Amr Tolba

Keywords: Cloud Computing; Remote resource; Optimizing traffic engineering; Multipath routing; Disjoint paths; Parallel transmission

PDF

The Science and Information (SAI) Organization
BACK TO TOP

Computer Science Journal

  • About the Journal
  • Call for Papers
  • Submit Paper
  • Indexing

Our Conferences

  • Computing Conference
  • Intelligent Systems Conference
  • Future Technologies Conference
  • Communication Conference

Help & Support

  • Contact Us
  • About Us
  • Terms and Conditions
  • Privacy Policy

© The Science and Information (SAI) Organization Limited. All rights reserved. Registered in England and Wales. Company Number 8933205. thesai.org