The Science and Information (SAI) Organization
  • Home
  • About Us
  • Journals
  • Conferences
  • Contact Us

Publication Links

  • IJACSA
  • Author Guidelines
  • Publication Policies
  • Digital Archiving Policy
  • Promote your Publication
  • Metadata Harvesting (OAI2)

IJACSA

  • About the Journal
  • Call for Papers
  • Editorial Board
  • Author Guidelines
  • Submit your Paper
  • Current Issue
  • Archives
  • Indexing
  • Fees/ APC
  • Reviewers
  • Apply as a Reviewer

IJARAI

  • About the Journal
  • Archives
  • Indexing & Archiving

Special Issues

  • Home
  • Archives
  • Proposals
  • Guest Editors
  • SUSAI-EE 2025
  • ICONS-BA 2025
  • IoT-BLOCK 2025

Future of Information and Communication Conference (FICC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Computing Conference

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Intelligent Systems Conference (IntelliSys)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Future Technologies Conference (FTC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact
  • Home
  • Call for Papers
  • Editorial Board
  • Guidelines
  • Submit
  • Current Issue
  • Archives
  • Indexing
  • Fees
  • Reviewers
  • Subscribe

IJACSA Volume 5 Issue 10

Copyright Statement: This is an open access publication licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.

View Full Issue

Paper 1: A GA-Based Replica Placement Mechanism for Data Grid

Abstract: Data Grid is an infrastructure that manages huge amount of data files, and provides intensive computational resources across geographically distributed collaboration. To increase resource availability and to ease resource sharing in such environment, there is a need for replication services. Data replication is one of the methods used to improve the performance of data access in distributed systems by replicating multiple copies of data files in the distributed sites. Replica placement mechanism is the process of identifying where to place copies of replicated data files in a Grid system. Choosing the best location is not an easy task. Current works find the best location based on number of requests and read cost of a certain file. As a result, a large bandwidth is consumed and increases the computational time. Authors proposed a GA-Based Replica Placement Mechanism (DBRPM) that finds the best locations to store replicas based on five criteria, namely, 1) Read Cost, 2) Storage Cost, 3) Sites’ Workload, and 4) Replication Site.

Author 1: Omar Almomani
Author 2: Mohammad Madi

Keywords: Data Grid; Data replication; distributed systems; Replica placement mechanism; GA-Based Replica Placement Mechanism

PDF

Paper 2: The Reality of Applying Security in Web Applications in Academia

Abstract: Web applications are used in academic institutions, such as universities, for variety of purposes. Since these web pages contain critical information, securing educational systems is as important as securing any banking system. It has been found that many academic institutions have not fully secured their web pages against some class of vulnerabilities. In this empirical study, these vulnerabilities are focused and their existences in the web sites of the academic institutions are shown. The degree of securing web pages in education systems is measured. The differences among academic institutions on protecting their web applications are discussed. Recommendation on ways of protecting websites is addressed.

Author 1: Mohamed Al-Ibrahim
Author 2: Yousef Shams Al-Deen

Keywords: Web applications; Security; Education systems

PDF

Paper 3: Female Under-Representation in Computing Education and Industry - A Survey of Issues and Interventions

Abstract: This survey paper examines the issue of female under-representation in computing education and industry, which has been shown from empirical studies to be a problem for over two decades. While various measures and intervention strategies have been implemented to increase the interest of girls in computing education and industry, the level of success has been discouraging. The primary contribution of this paper is to provide an analysis of the extensive research work in this area. It outlines the progressive decline in female representation in computing education. It also presents the key arguments that attempt to explain the decline and intervention strategies. We conclude that there is a need to further explore strategies that will encourage young female learners to interact more with computer educational games.

Author 1: Joseph Osunde
Author 2: Gill Windall
Author 3: Professor Liz Bacon
Author 4: Professor Lachlan Mackinnon

Keywords: Female under-representation; Structural factors; Biological factors; Socio-cultural factors; User Interaction

PDF

Paper 4: A Secure Cloud-Based NFC Mobile Payment Protocol

Abstract: Near Field Communication (NFC) is one the most recent technologies in the area of application development and service delivery via mobile phone. NFC enables the mobile phone to act as identification and a credit card for customers. Dynamic relationships of NFC ecosystem players in an NFC transaction process make them partners in a way that sometimes they should share their access permissions on the applications that are running in the service environment. One of the technologies that can be used to ensure secure NFC transactions is cloud computing which offers wide range advantages compare to the use of a Secure Element (SE) as a single entity in an NFC enabled mobile phone. In this paper, we propose a protocol based on the concept of NFC mobile payments. Accordingly, we present an extended version of the NFC cloud Wallet model [14], in which, the Secure Element in the mobile device is used for customer authentication whereas the customer's banking credentials are stored in a cloud under the control of the Mobile Network Operator (MNO). In this circumstance, Mobile Network Operator plays the role of network carrier which is responsible for controlling all the credentials transferred to the end user. The proposed protocol eliminates the requirement of a shared secret between the Point-of-Sale (POS) and the Mobile Network Operator before execution of the protocol, a mandatory requirement in the earlier version of this protocol [16]. This makes it more practicable and user friendly. At the end, we provide a detailed analysis of the protocol where we discuss multiple attack scenarios.

Author 1: Pardis Pourghomi
Author 2: Muhammad Qasim Saeed
Author 3: Gheorghita Ghinea

Keywords: Near Field Communication; Security; Mobile transaction; Cloud

PDF

Paper 5: Arabic Phrase-Level Contextual Polarity Recognition to Enhance Sentiment Arabic Lexical Semantic Database Generation

Abstract: Most of opinion mining works need lexical resources for opinion which recognize the polarity of words (positive/ negative) regardless their contexts which called prior polarity. The word prior polarity may be changed when it is considered in its contexts, for example, positive words may be used in phrases expressing negative sentiments, or vice versa. In this paper, we aim at generating sentiment Arabic lexical semantic database having the word prior coupled with its contextual polarities and the related phrases. To do that, we study first the prior polarity effects of each word using our Sentiment Arabic Lexical Semantic Database on the sentence-level subjectivity and Support Vector Machine classifier. We then use the seminal English two-step contextual polarity phrase-level recognition approach to enhance word polarities within its contexts. Our results achieve significant improvement over baselines.

Author 1: Samir E. Abdelrahman
Author 2: Hanaa Mobarz
Author 3: Ibrahim Farag
Author 4: Mohsen Rashwan

Keywords: Sentiment Arabic Lexical Semantic Database; Support Vector Machine; Contextual Polarity

PDF

Paper 6: Application of Content-Based Approach in Research Paper Recommendation System for a Digital Library

Abstract: Recommender systems are software applications that provide or suggest items to intended users. These systems use filtering techniques to provide recommendations. The major ones of these techniques are collaborative-based filtering technique, content-based technique, and hybrid algorithm. The motivation came as a result of the need to integrate recommendation feature in digital libraries in order to reduce information overload. Content-based technique is adopted because of its suitability in domains or situations where items are more than the users. TF-IDF (Term Frequency Inverse Document Frequency) and cosine similarity were used to determine how relevant or similar a research paper is to a user's query or profile of interest. Research papers and user's query were represented as vectors of weights using Keyword-based Vector Space model. The weights indicate the degree of association between a research paper and a user's query. This paper also presents an algorithm to provide or suggest recommendations based on users' query. The algorithm employs both TF-IDF weighing scheme and cosine similarity measure. Based on the result or output of the system, integrating recommendation feature in digital libraries will help library users to find most relevant research papers to their needs.

Author 1: Simon Philip
Author 2: P.B. Shola
Author 3: Abari Ovye John

Keywords: Recommender Systems; Content-Based Filtering; Digital Library; TF-IDF; Cosine Similarity; Vector Space Model

PDF

Paper 7: A Survey of Pedestrian Detection in Video

Abstract: Pedestrian detection is one of the important topics in computer vision with key applications in various fields of human life such as intelligent vehicles, surveillance and advanced robotics. In recent years, research related to pedestrian detection commonplace. This paper aims to review the papers related to pedestrian detection in order to provide an overview of the recent research. Main contribution of this paper is to provide a general overview of pedestrian detection process that is viewed from different sides of the discussion. We divide the discussion into three stages: input, process and output. This paper does not make a selection or technique best method and optimal because the best technique depends on the needs, concerns and existing environment. However, this paper is useful for future researchers who want to know the current researches related to pedestrian detection.

Author 1: Achmad Solichin
Author 2: Agus Harjoko
Author 3: Agfianto Eko Putra

Keywords: pedestrian detection; video; paper review

PDF

Paper 8: Risk Assessment System for Verifying the Safeguards Based on the HAZOP Analysis

Abstract: In recent years, serious accidents in chemical plants frequently occurred in Japan. In order to prevent accidents and to mitigate process risks, to re-evaluate risks which consider the reliability of existed safeguards in chemical plants is needed. The chemical plant is obligated to provide and maintain a safe environment for people that live in such circumstances. Plant safety is provided through inherently safe design and various safeguards, such as instrumented systems, procedures, and training. HAZOP (Hazard and Operability Study) is used as one of effective measures to identify hazards in chemical plants. In this paper, a method is proposed to calculate the probability of occurrence of hazards in chemical plants already considering of existing safeguards. The developed system bases on the HAZOP analysis and reliability of safety equipment arrangement. The system can verify that the safeguards are adequate or not, and it will produce recommendations for further risk reduction. This system will become valid for risk management and present useful information to support for plant operation.

Author 1: Atsuko Nakai
Author 2: Kazuhiko Suzuki

Keywords: risk assessment; HAZOP analysis; safeguards

PDF

Paper 9: An Ssvep-Based Bci System and its Applications

Abstract: A Brain-Computer-Interface (BCI) based system with a System on a Programmable Chip (SOPC) platform by using of the Steady-State Visually Evoked Potentials (SSVEP) through a Bluetooth interface was proposed in this paper. The proposed BCI system can aid the Amyotrophic Lateral Sclerosis (ALS) or other paralyzed patients to easily control an electric wheelchair in their live. The electroencephalogram (EEG) signals may be detected by electrodes and extracting chip when the patients gazed a flickered target with a specific frequencies. Then these signals can be transformed by FFT into frequency domain and then transmitted to the hardware of electric wheelchair by using of Bluetooth interface. Finally, the electric wheelchair can be moved smoothly in accordance with commands converted by the frequencies of the EEG signal. The experimental results had shown that the proposed system can easily control electric wheelchairs.

Author 1: Jzau-Sheng Lin
Author 2: Cheng-Hung Shieh

Keywords: Brain-Computer-Interface (BCI); Steady-State Visually Evoked Potentials (SSVEP); Electroencephalogram (EEG)

PDF

Paper 10: Edge Detection in Satellite Image Using Cellular Neural Network

Abstract: The present paper proposes a novel approach for edge detection in satellite images based on cellular neural networks. CNN based edge detector in used conjunction with image enhancement and noise removal techniques, in order to deliver accurate edge detection results, compared with state of the art approaches. Thus, considering the obtained results, a comparison with optimal Canny edge detector is performed. The proposed image processing chain deliver more details regarding edges than canny edge detector. The proposed method aims to preserve salient information, due to its importance in all satellite image processing applications.

Author 1: Osama Basil Gazi
Author 2: Dr. Mohamed Belal
Author 3: Dr. Hala Abdel-Galil

Keywords: cellular neural network; liner matrix inequality; differential evolution; genetic algorithm; Field-programmable gate array; partial differential equation

PDF

Paper 11: Credible Fuzzy Classification based Technique on Self Organized Features Maps and FRANT IC-RL

Abstract: Handling uncertainty and vagueness in real world becomes a necessity for developing intelligent and efficient systems. Based on the credibility theory, a fuzzy clustering approach that improves the classification accuracy is targeted by this work. This paper introduces a design of an efficient set of fuzzy rules that are inferred by a hybrid model of SOFM (Self Organized Features Maps) and FRANTIC-SRL (Fuzzy Rules from ANT-Inspired Computation – Simultaneous Rule Learning). Self-Organized Features Maps cluster inputs using self-adaption techniques. They are useful in generating fuzzy membership functions for the subsets of the fuzzy variables. The generated fuzzy variables are ranked by means of the credibility measure wherever the weighted average of their confidence level is determined. FRANT IC-SRL builds the fuzzy classification rule set using the ranked credibility variables in a simultaneous process. Moreover, the whole fuzzy system is evaluated based on the credibility value. The details and limitations of the proposed model are illustrated. Also, the experimental results and a comparison with previous techniques in generating fuzzy classification rules from medical data sets are declared.

Author 1: Mona Gamal
Author 2: Elsayed Radwan
Author 3: Adel M.A. Assiri

Keywords: Fuzzy Rule; Classification; Self-Organized Feature Map; Credibility Measure; Ant Colony Optimization

PDF

Paper 12: Prolonging Network Lifetime in Wireless Sensor Networks with Path-Constrained Mobile Sink

Abstract: Many studies in recent years have considered the use of mobile sinks (MS) for data gathering in wireless sensor networks (WSN), so as to reduce the need for data forwarding among the sensor nodes (SN) and thereby prolong the network lifetime. Moreover, in practice, often the MS tour length has to be kept below a threshold, usually due to timeliness constraints on the sensors data (delay-critical applications). This paper presents a modified clustering and data forwarding protocol combined with a MS solution for efficient data gathering in wireless sensor networks (WSNs) with delay constraints. The adopted cluster formation method is based in the 'residual energy' of the SNs and it is appropriately modified in order to fit properly to the requirement of length-constrained MS tour, which involves, among else, the need for inter-cluster communication and increased data forwarding. In addition, a suitable data gathering protocol is designed, based on an approximated TSP route that satisfies the given length constraint, whereas the proper application of reclustering phases guarantees the effective handling of the 'energy holes' caused around the CHs involved in the MS route. Extended simulation experiments show the stable and energy-efficient behavior of the proposed scheme (thus leading to increased network lifetime) as well as its higher performance in comparison to other competent approaches from the literature.

Author 1: Basilis G. Mamalis

Keywords: wireless sensor; mobile sink; node clustering; data gathering; network lifetime

PDF

Paper 13: E-Assessment System Based on IMS QTI for the Arabic Grammar

Abstract: Nowadays e-learning has become a fundamental stream of learning. E-assessment is an important and essential phase of the e-learning process because of all the decisions we will make about learners when teaching them. In this paper , we describe an e-assessment system for the Arabic grammar. Our system is based, on the one hand, on linguistics tools and on the other hand, it integrates the Question and Test Interoperability (QTI) proposed by IMS Global Learning Consortium . We adopt the IMS-QTI specification to build an interoperable, reusable and sharable e-assessment system. This system is composed of three main components. The first component is a set of linguistic tools and resources. The second represent an authoring tool which allows teachers to create questions and tests accordance with the IMS-QTI specification. The third component is an Arabic test player for parsing and interpreting QTI XML files.

Author 1: Abdelkarim Abdelkader
Author 2: Dalila Souilem Boumiza
Author 3: Rafik Braham

Keywords: Arabic Grammar; E-assessment; IMS QTI; ANLP QTI-Based Tools

PDF

Paper 14: Physiological Responese Measrement to Identify Online Visual Representation Designs

Abstract: This research involved the identification and validation of text-related visual display design principles from the literature. Representations were designed and developed that illustrated the intent of each visual display design principle included in the study. The representations were embedded in a research intervention and included validated examples of accurate displays of each principle and examples with varying degrees of inaccuracies. The representations were created based on design theories of human cognition: perceptual, attention memory, and mental models [1][2][3][4][5], and presented via a monitor in a controlled research environment. The environmental controls included space appropriate to the experiment, constant temperature, consistent lighting, management of distractions including sound, monitoring of operation of the measurement device and the use of standardized instructions. Bertin’s seven visual variables: position, size, color, shape, value, orientation and texture, were also examined within the design principles [6]. The result of the independent samples t test did not find significant differences between good and poor visual designs for all images across subjects. However, the results of the paired-samples t test found significant mean differences between Bertin’s principles for color, value and orientation of visual designs across subjects. The findings support future online instructional designs and investigate the implications for the design of online instruction.

Author 1: Yu-Ping Hsu
Author 2: Edward Meyen
Author 3: Richard Branham

Keywords: electrodermal activity measurement; digital visual representation design; affective learning

PDF

Paper 15: E-Learning by Using Content Management System (CMS)

Abstract: Content Management System (CMS) is a system to manage content in order to improve the educational process and to create an interactive environment where the content management system plays a role in e-learning. CMS software named (joomla) contains sources of commercial extension, the contribution of the proposed paper is replacing the commercial by a range of free extension application and employed them in the field of e-learning where new features are added to the program do not exist in the original version of joomla. The paper took advantage of these new features in building a system used by lecturers to develop the skills and capabilities of students through the electronic portal and to raise the educational level of them.

Author 1: Reem Razzaq Abdul Hussein
Author 2: Afaf Badie Al-Kaddo

Keywords: E-learning; Content Management Systems; Joomla; Lecturer; Student

PDF

Paper 16: Java Based Computer Algorithms for the Solution of a Business Mathematics Model

Abstract: A novel approach is proposed as a framework for working out uncertainties associated with decisions between the choices of leasing and procurement of capital assets in a manufacturing industry. The mathematical concept of the tool is discussed while the technique adopted is much simpler to implement and initialize. The codes were developed in Java-programming language and text-run and executed on a computer system running on Windows 7 operating system. This was done in order to solve a model that illustrates a case study in actuarial mathematics. Meanwhile the solution obtained proves to be stable and proffers to suit the growing frenzy for software for similar recurring cases in business. In addition, it speeds up the computational results. The results obtained using the empirical method is compared with the output and adjudged excellent in terms of accuracy and adoption.

Author 1: A. D. Chinedu
Author 2: A.B.Adeoye

Keywords: Actuarial Mathematics; Java-programming Language; Leasing; Procurement; Capital Assets; Uncertainties

PDF

Paper 17: Texture Analysis and Modified Level Set Method for Automatic Detection of Bone Boundaries in Hand Radiographs

Abstract: Rheumatoid Arthritis (RA) is a chronic inflammatory joint disease characterized by a distinctive pattern of bone and joint destruction. To give an RA diagnosis, hand bone radiographs are taken and analyzed. A hand bone radiograph analysis starts with the bone boundary detection. It is however an extremely exhausting and time consuming task for radiologists. An automatic bone boundary detection in hand radiographs is thus strongly required. Garcia et al. have proposed a method for automatic bone boundary detection in hand radiographs by using an adaptive snake method, but it doesn’t work for those affected by RA. The level set method has advantages over the snake method. It however often leads to either a complete breakdown or a premature termination of the curve evolution process, resulting in unsatisfactory results. For those reasons, we propose a modified level set method for detecting bone boundaries in hand radiographs affected by RA. Texture analysis is also applied for distinguishing the hand bones and other areas. Evaluating the experiments using a particular set of hand bone radiographs, the effectiveness of the proposed method has been proved.

Author 1: Syaiful Anam
Author 2: Eiji Uchino
Author 3: Hideaki Misawa
Author 4: Noriaki Suetake

Keywords: hand bones radiograph; boundary detection; modified level set method; diffusion filter

PDF

Paper 18: Criminal Investigation EIDSS Based on Cooperative Mapping Mechanism

Abstract: On purpose of improving the research in extension intelligence systems when the knowledge in hand is not sufficient, an intuition evidence model (IEM) based on human-computer cooperative is presented. From the initial intuition process space defined by the primitive experience, a series of interactive mapping learning systems (IMLS) with various reductive levels are created. For, each IELS, the rule sets with respective belief degree are induced and saved. The paper introduces cooperative mapping of intuition evidence and object hypothesesmethod to the criminal investigation, and poses a skeleton of cooperative reasoning. The paper views that the reliability of the cooperative reasoning depends on the human-computer interaction results. Simultaneously, choosing the case-cracking clue should be determined by comprehensive evaluations and self-learning of intuition-formal judgments are essentially needed. When applying the model to reasoning and decision making, one can match the intuition judge of the given object to the rule sets of relative nodes, and then draw the conclusion by using some kind of evaluation algorithm. A simple example on how to create and apply the model is give.

Author 1: Ping He

Keywords: IDSS; EIDSS;intuition evidence; object hypotheses criminal investigation; cooperative reasoning

PDF

Paper 19: Middleware to integrate heterogeneous Learning Management Systems and initial results

Abstract: The use of the Learning Management Systems (LMS) has been increased. It is desirable to access multiple learning objects that are managed by Learning Management Systems. The diversity of LMS allow us to consider them as heterogeneous systems; each ones with their own interface to manage the provided functionality. These interfaces can be Web services or calls to remote objects. The functionalities offered by LMS depend on their user roles. A solution to integrate diverse heterogeneous platforms is based on a middleware architecture. In this paper, a middleware architecture is presented to integrate different Learning Management Systems. Furthermore, an implementation of the proposed middleware is presented. This implementation integrates two different Learning Management Systems, using Web services and XML-RPC protocols to access student-role users capabilities. The result is a transparent layer that provides access to LMS contents.

Author 1: J. A. Hijar Miranda
Author 2: Daniel V´azquez S´anchez
Author 3: Dario Emmanuel V´azquez Ceballos
Author 4: Erika Hern´andez Rubio
Author 5: Amilcar Meneses Viveros
Author 6: Elena Fabiola Ruiz Ledezma

Keywords: Middleware; Learning Management Systems; Application Program Interface

PDF

Paper 20: Proposal and Evaluation of Toilet Timing Suggestion Methods for the Elderly

Abstract: Elderly people need to urinate frequently, and when they go on outings they often have a difficult time finding restrooms. Because of this, researching a body water management system is needed. Our proposed system calculates timing trips to the toilet in consideration with both their schedules and the amount of body water needing to be expelled, and recommends using the restroom with sufficient time before needing to urinate. In this paper, we describe the suggested methods of this system and show the experimental results for the toilet timing suggestion methods.

Author 1: Airi Tsuji
Author 2: Tomoko Yonezawa
Author 3: HirotakeYamazoe
Author 4: Shinji Abe
Author 5: Noriaki Kuwahara
Author 6: Kazunari Morimoto

Keywords: Elderly; Suggestion-method

PDF

Paper 21: Tracking of Multiple objects Using 3D Scatter Plot Reconstructed by Linear Stereo Vision

Abstract: This paper presents a new method for tracking objects using stereo vision with linear cameras. Edge points extracted from the stereo linear images are first matched to reconstruct points that represent the objects in the scene. To detect the objects, a clustering process based on a spectral analysis is then applied to the reconstructed points. The obtained clusters are finally tracked throughout their center of gravity using Kalman filter and a Nearest Neighbour based data association algorithm. Experimental results using real stereo linear images are shown to demonstrate the effectiveness of the proposed method for obstacle tracking in front of a vehicle.

Author 1: Safaa Moqqaddem
Author 2: Yassine Ruichek
Author 3: Raja Touahni
Author 4: Abderrahmane Sbihi

Keywords: Linear stereo vision; Spectral clustering; Objects detection and tracking; Kalman filter; Data association

PDF

Paper 22: Transfer Learning Method Using Ontology for Heterogeneous Multi-agent Reinforcement Learning

Abstract: This paper presents a framework, called the knowledge co-creation framework (KCF), for heterogeneous multiagent robot systems that use a transfer learning method. A multiagent robot system (MARS) that utilizes reinforcement learning and a transfer learning method has recently been studied in realworld situations. In MARS, autonomous agents obtain behavior autonomously through multi-agent reinforcement learning and the transfer learning method enables the reuse of the knowledge of other robots’ behavior, such as for cooperative behavior. Those methods, however, have not been fully and systematically discussed. To address this, KCF leverages the transfer learning method and cloud-computing resources. In prior research, we developed ontology-based inter-task mapping as a core technology for hierarchical transfer learning (HTL) method and investigated its effectiveness in a dynamic multi-agent environment. The HTL method hierarchically abstracts obtained knowledge by ontological methods. Here, we evaluate the effectiveness of HTL with a basic experimental setup that considers two types of ontology: action and state.

Author 1: Hitoshi Kono
Author 2: Akiya Kamimura
Author 3: Kohji Tomita
Author 4: Yuta Murata
Author 5: Tsuyoshi Suzuki

Keywords: Transfer learning; Multi-agent reinforcement learning; Multi-agent robot systems

PDF

The Science and Information (SAI) Organization
BACK TO TOP

Computer Science Journal

  • About the Journal
  • Call for Papers
  • Submit Paper
  • Indexing

Our Conferences

  • Computing Conference
  • Intelligent Systems Conference
  • Future Technologies Conference
  • Communication Conference

Help & Support

  • Contact Us
  • About Us
  • Terms and Conditions
  • Privacy Policy

© The Science and Information (SAI) Organization Limited. All rights reserved. Registered in England and Wales. Company Number 8933205. thesai.org