The Science and Information (SAI) Organization
  • Home
  • About Us
  • Journals
  • Conferences
  • Contact Us

Publication Links

  • IJACSA
  • Author Guidelines
  • Publication Policies
  • Digital Archiving Policy
  • Promote your Publication
  • Metadata Harvesting (OAI2)

IJACSA

  • About the Journal
  • Call for Papers
  • Editorial Board
  • Author Guidelines
  • Submit your Paper
  • Current Issue
  • Archives
  • Indexing
  • Fees/ APC
  • Reviewers
  • Apply as a Reviewer

IJARAI

  • About the Journal
  • Archives
  • Indexing & Archiving

Special Issues

  • Home
  • Archives
  • Proposals
  • Guest Editors
  • SUSAI-EE 2025
  • ICONS-BA 2025
  • IoT-BLOCK 2025

Future of Information and Communication Conference (FICC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Computing Conference

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Intelligent Systems Conference (IntelliSys)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Future Technologies Conference (FTC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact
  • Home
  • Call for Papers
  • Editorial Board
  • Guidelines
  • Submit
  • Current Issue
  • Archives
  • Indexing
  • Fees
  • Reviewers
  • Subscribe

IJACSA Volume 6 Issue 10

Copyright Statement: This is an open access publication licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.

View Full Issue

Paper 1: Framework for Assessing Privacy of Internet Applications

Abstract: This paper presents a new framework for assessing and documenting the privacy risks associated with developing and managing internet applications. The Framework for Assessing Privacy of Internet Applications (FAPIA) provides a tool to aid the analysis of privacy risks and a structured means of analyzing the risks and documenting a control systems to ensure compliance with data protection and privacy legislation in a range of different countries.

Author 1: James PH Coleman

Keywords: privacy; privacy compliance; risk; data protection; privacy impact assessments; internet applications

PDF

Paper 2: Towards Network-Aware Composition of Big Data Services in the Cloud

Abstract: Several Big data services have been developed on the cloud to meet increasingly complex needs of users. Most times a single Big data service may not be capable in satisfying user requests. As a result, it has become necessary to aggregate services from different Big data providers together in order to execute the user's request. This in turn has posed a great challenge; how to optimally compose services from a given set of Big data providers without affecting if not optimizing Quality of Service (QoS). With the advent of cloud-based Big data applications composed of services spread across different network environments, QoS of the network has become important in determining the true performance of composite services. However current studies fail to consider the impact of QoS of network on composite service selection. Therefore a novel network-aware genetic algorithm is proposed to perform composition of Big data services in the cloud. The algorithm adopts an extended QoS model which separates QoS of network from service QoS. It also uses a novel network coordinate system in finding composite services that have low network latency without compromising service QoS. Results of evaluation indicate that the proposed approach finds low latency and QoS-optimal compositions when compared with current approaches.

Author 1: Umar SHEHU
Author 2: Ghazanfar SAFDAR
Author 3: Gregory EPIPHANIOU

Keywords: Big data; Service composition; QoS; Genetic Algorithm; Network latency; Cloud

PDF

Paper 3: SOHO: Information Security Awareness in the Aspect of Contingency Planning

Abstract: This paper seeks to take general security awareness information for home and small business owners and make it understandable and accessible by looking at practical ways to keep valuable information accessible after an incident or disaster according to current methods. This paper will first review select general security awareness information, then take a look at some aspects of contingency planning and look at some basic practical techniques to use in order to protect systems and information from complete loss after an incident. Finally, the ground work for implementing an individualized plan for a small business office or home office will be laid and some practical steps to take will be recommended.

Author 1: Jason Maurer
Author 2: Brandon Clark
Author 3: Young B. Choi

Keywords: SOHO; Information Security; Contingency Planning; Small Office; Home Office

PDF

Paper 4: An Improved Bees Algorithm for Real Parameter Optimization

Abstract: The Bees Algorithm (BA) is a bee swarm-based search algorithm inspired by the foraging behavior of a swarm of honeybees. BA can be divided into four parts: the parameter tuning part, the initialization part, the local search part, and the global search part. Recently, BA based on Patch-Levy-based Initialization Algorithm (PLIA-BA) has been proposed. However, the initial stage remains an initial step, and its improvement is not enough for more challenging problem classes with different properties. The local and global search capabilities are also required to be enhanced to improve the quality of final solution and the convergence speed of PLIA-BA on such problems. Consequently, in this paper, a new local search algorithm has been adopted based on the Levy looping flights. Moreover, the mechanism of the global search has been enhanced to be closer to nature and based on the patch-Levy model adopted in the initialization algorithm (PLIA). The improvements in local and global search parts are incorporated into PLIA-BA to advise a new version of BA that is called Patch-Levy-based Bees Algorithm (PLBA). We investigate the performance of the proposed PLBA on a set of challenging benchmark functions. The results of the experiments indicate that PLBA significantly outperforms the other BA variants, including PLIA-BA and can produce comparable results with other state-of-the-art algorithms.

Author 1: Wasim A. Hussein
Author 2: Shahnorbanun Sahran
Author 3: Siti Norul Huda Sheikh Abdullah

Keywords: Bees algorithm; Population initialization; Local search; Global search; Levy flight; Patch environment

PDF

Paper 5: Comprehensive Centralized-Data Warehouse for Managing Malaria Cases

Abstract: Tanah Bumbu is one of the most endemic areas in Indonesia for patients diagnosed with malaria diseases. Currently, available malaria case data were stored in disparate sources. Hence, it is difficult for the public health department to quickly and easily gather the useful information for determining strategic actions in tackling these cases. The purpose of this research is to build a data warehouse that integrates all malaria cases from disparate sources. This malaria data warehouse is a centralized architecture of galaxy or constellation scheme that consists of three fact tables and 13 dimension tables. SQL Server Integration Services (SSIS) is utilized to build ETL packages that load data from various sources to stages, dimensions, and fact tables in malaria data warehouse. Finally, a timely report can be generated by extracting the salient information located in malaria data warehouse.

Author 1: Nova Eka Diana
Author 2: Aan Kardiana

Keywords: malaria case; centralized data warehouse; galaxy scheme; ETL; timely report

PDF

Paper 6: An Adaptive Approach to Mitigate Ddos Attacks in Cloud

Abstract: Distributed denial of service (DDOS) attack constitutes one of the prominent cyber threats and among the hardest security problems in modern cyber world. This research work focuses on reviewing DDOS detection techniques and developing a numeric stable theoretical framework used for detecting various DDOS attacks in cloud. Main sections in the paper are devoted to review and analysis of algorithms used for detection of DDOS attacks. The framework theorized here deals with the variability calculation method in conjunction with sampling, searching methods to find a current state of a particular parameter under observation for detecting DDOS attacks. This way a solution is to build that measure the performance and conduct the monitoring framework to capture adversity related to DDOS attacks. The described algorithm intends to capture the current context value of the parameters that determine the reliability of the detection algorithm and the online pass algorithm helps to maintain the variability of those collected values thus maintaining numerical stability by doing robust statistical operations at endpoints of traffic in cloud based network.

Author 1: Baldev Singh
Author 2: S.N. Panda

Keywords: DDOS attack; Intrusion detection; Threshold; Cloud; virtual machine

PDF

Paper 7: Common Radio Resource Management Algorithms in Heterogeneous Wireless Networks with KPI Analysis

Abstract: The rapid increase of number of personal wireless communication equipped devices boosts the user service demands on wireless networks. Thus, the spectrum resource management in such networks becomes an important topic in the near future. Notwithstanding, typically, users equipped with multiple wireless interfaces, thus the access operational scenario is no longer based on single Radio Access Technology (RAT). In this work, we studied the heterogeneous wireless communication scenarios, as a joint cooperative management of different RATs through which network providers can satisfy as possible as wide variety of user services demands in a more efficient manner by exploiting their varying characteristics and properties. To achieve this objective, a Common Radio Resource Management (CRRM) algorithms and techniques are proposed and designed to efficiently manage and optimize the radio resources in a heterogeneous wireless networks. In this context, this work studies and analyzes some common radio resource management techniques to efficiently distribute traffic among the available radio access technologies while provid- ing adequate quality of service levels under heterogeneous traffic scenarios. The most interesting algorithms have been critically analyzed and then some in depth investigations with attention on implementations and techno-economic issues are performed on some of the identified CRRM algorithms.

Author 1: Saed Tarapiah
Author 2: Kahtan Aziz
Author 3: Shadi Atalla

Keywords: heterogeneous wireless networks; Radio Resource Management (RRM); radio access technology (RAT)

PDF

Paper 8: Big-Learn: Towards a Tool Based on Big Data to Improve Research in an E-Learning Environment

Abstract: In the area of data management for information system and especially at the level of e-learning platforms, the Big Data phenomenon makes the data difficult to deal with standard database or information management tools. Indeed, for educational purposes and especially in a distance training or online research, the learner that uses the e-learning platform is left with a heterogeneous set of data such as files of all kinds, curves, course materials, quizzes, etc. This requires a specialized fusion system to combine the variety of data and improve the performance, robustness, flexibility, consistency and scalability, so that they can provide the best result to the learner The user of the e-learning platform. In this context, it is proposed to develop a tool called "Big-Learn" based on a technique to integrate the mixing of structured and unstructured data in one data layer, and, in order to facilitate access more optimal search relevance with adequate and consistent results according to the expectations of the learner. The methodology adopted will consist initially in a quantitative and qualitative study of the variety of data and their typology, followed by a detailed analysis of the structure and harmonization of the data to finally find a fictional model for their treatment. This conceptual work will be crowned with a working prototype as a tool achieved with UML and Java technology.

Author 1: Karim Aoulad Abdelouarit
Author 2: Boubker Sbihi
Author 3: Noura Aknin

Keywords: big data; e-learning; data structuring; learning; digital pedagogy

PDF

Paper 9: Classifying three Communities of Assam Based on Anthropometric Characteristics using R Programming

Abstract: The study of anthropometric characteristics of different communities plays an important role in design, ergonomics and architecture. As the change of life style, nutrition and ethnic composition of different communities leads to obesity epidemic etc. The authors performed two experiments. In the first experiment, the authors tried to classify three communities of Assam, India based on anthropometric characteristics using R Programming. The authors mined out the statistically significant anthropometric characteristics among the Chutia, Mising and Deori communities of Assam. In the second experiment, the authors performed the Cochran Mantel Haenszel test to find out the association between the communities and BMI based nutritional status stratified by the age of the people studied.

Author 1: Sadiq Hussain
Author 2: Dali Dutta
Author 3: Runjun Patir
Author 4: Prof. Sarthak Sengupta
Author 5: Prof. Jiten Hazarika
Author 6: Prof. G.C. Hazarika

Keywords: Data Mining; Classification; R Programming; Logistic Regression; Cochran Mantel Haenszel Test

PDF

Paper 10: Learners’ Attitudes Towards Extended-Blended Learning Experience Based on the S2P Learning Model

Abstract: Within the Moroccan context, the Higher Education Institutions have realized the importance of the integration of information technologies into the formal learning curriculum. However, the risks of demotivation remain large in tertiary education, even with the support of these new technologies. It is therefore essential to ensure consistently the maintenance of the learners’ motivation, which must start from the design phase by adopting real motivational strategies. Blended Learning addresses the issue of the quality of teaching and learning offering then some answers to learners’ motivation issue. So, we try to extend of the dimensions of Blended Learning to an “Extended Blended Learning (Ex-BL)”, according to the S2P Model Learning designed as an integration model, arguing that knowledge and learning tools are nowadays available everywhere. This integration of educational resources takes into consideration various components: Face-to-face/online learning, Text-based Learning/Game-based Learning/Media-based Learning, Gamification, and Open Educational Resources. This paper investigates the learner perceptions of this instructional design. This includes their perceptions of learning effectiveness and its impact on their motivation during the learning experience. This investigation focused on two main points: the “Observation of learners’ behavior”, especially during online activities, as a way to gauge the degree of motivation and engagement; and the “Evaluation of the learning experience” through a survey covering the appreciation of the instructional design; the degree of satisfaction; the students’ motivation; the online platform; the extension of Ex-BL elements and their impact on learners’ motivation.

Author 1: Salah Eddine BAHJI
Author 2: Jamila EL ALAMI
Author 3: Youssef LEFDAOUI

Keywords: learning model; S2P learning model; blended learning; extended-blended learning; learning experience; learners’ motivation; gamification

PDF

Paper 11: Hybrid Algorithm for the Optimization of Training Convolutional Neural Network

Abstract: The training optimization processes and efficient fast classification are vital elements in the development of a convolution neural network (CNN). Although stochastic gradient descend (SGD) is a Prevalence algorithm used by many researchers for the optimization of training CNNs, it has vast limitations. In this paper, it is endeavor to diminish and tackle drawbacks inherited from SGD by proposing an alternate algorithm for CNN training optimization. A hybrid of genetic algorithm (GA) and particle swarm optimization (PSO) is deployed in this work. In addition to SGD, PSO and genetic algorithm (PSO-GA) are also incorporated as a combined and efficient mechanism in achieving non trivial solutions. The proposed unified method achieves state-of-the-art classification results on the different challenge benchmark datasets such as MNIST, CIFAR-10, and SVHN. Experimental results showed that the results outperform and achieve superior results to most contemporary approaches.

Author 1: Hayder M. Albeahdili
Author 2: Tony Han
Author 3: Naz E. Islam

Keywords: Convolutional Neural Network; Particle Swarm optimization; Image Classification

PDF

Paper 12: Cloud Management and Governance: Adapting IT Outsourcing to External Provision of Cloud-Based IT Services

Abstract: Outsourcing is a strategic option which complements IT services provided internally in organizations. The maturity model for IT service outsourcing (henceforth MM-2GES) is a new holistic maturity model based on standards ISO/IEC 20000 and ISO/IEC 38500, and the frameworks and best practices of ITIL and COBIT, with a specific focus on IT outsourcing. MM-2GES allows independent validation, practical application, and an effective transition to a model of good governance and management of outsourced IT services. Cloud computing is a new model for provisioning and consuming IT services on a need and pay-per-use basis. This model allows the IT systems to be more agile and flexible. The external provision of cloud-based services as part of Cloud computing appears as an evolution of traditional outsourcing, due to the emerging technologies related to the provision of IT services. As a result of technological developments, traditional outsourcing and external provision of cloud-based services, share common characteristics, but there are also some differences. This paper adapts MM-2GES to external provision of cloud-based services, from the point of view of the customer. This way, the applicability of the model can be implemented in organizations that have both models traditional IT outsourcing and cloud-based services provided externally, in order to achieve excellence in governance and management of all kind of IT services provided externally to organizations.

Author 1: Dr. Victoriano Valencia García
Author 2: Dr. Eugenio J. Fernández Vicente
Author 3: Dr. Luis Usero Aragonés

Keywords: Cloud computing; IT governance; IT management; Outsourcing; IT service; Maturity model

PDF

Paper 13: Parallel Domain Decomposition for 1-D Active Thermal Control Problem with PVM

Abstract: this paper describes a 1-D Active Thermal Control Problem (1-D ATCP) with the use of Stationary Iterative Techniques (Jacobi and Gauss-Seidel) on the discretization of the resulted matrices. Parallelization of the problem is carried out using Domain Decomposition (DD) parallel communication approach with Parallel Virtual Machine (PVM) to enable better flexibility in parallel execution, and greater ease of parallel implementation across the different domain of block sizes. We described the parallelization of the method by the use of Single Program Multiple Data (SPMD) technique. The 1-D ATCP is implemented on a parallel cluster (Geo Cluster), with the ability to exploit inherent parallelism of the computation. The parallelization and performance strategies are discussed, and results of the parallel experiments are presented.

Author 1: Simon Uzezi Ewedafe
Author 2: Rio Hirowati Shariffudin

Keywords: 1-D ATCP; Stationary Techniques; SPMD; DD; PVM

PDF

Paper 14: Lempel - Ziv Implementation for a Compression System Model with Sliding Window Buffer

Abstract: Proposed compression system architecture based on Lempel-Ziv algorithm with sliding window history buffer, this architecture may be realized on FPGA, and can provide input data streams from multiple sources and context switching. Base requirements to impression system and compression system architecture were proposed. Compression system architecture should provide quick reconstruction possibility for building another system with other technical characteristics and architecture features (like reconfigurable system architecture features) on given architecture base. Digital signal processing may comprise lined or non-lined procedures. Non-lined signal processing is strictly associated with no lined structure sympathy then can apply in this period, regularity, and patio-temporal fields.

Author 1: Ahmad AbdulQadir AlRababah

Keywords: Digital signal processing; FPGA; RAM; dual-port RAM; token; literal

PDF

Paper 15: Design of Socket Based on Intelligent Control and Energy Management

Abstract: Smart home is one of the main applications of internet of things, and it will realize the intellectualization of household. Smart socket is part of the smart home, which can be controlled remotely by power supplied, monitor utilization condition, communication network and other functions. This article mainly introduces the intelligent electrical outlet of each hardware modules; software part mainly analyzes the socket’s communication mechanism, and the electricity consumption of collected power statistics through diagrams to feedback through wireless communication. Things achieved in an environment of communication between the user and the smart power outlet timely feedback to the user, so as to achieve energy-saving purposes.

Author 1: Jiang Feng
Author 2: Wu Fei
Author 3: Dai Jian
Author 4: Zou Yan

Keywords: Internet of things; Smart home; Intelligent electrical outlet; Wireless communication; Power statistics

PDF

Paper 16: Mobile Arabchat: An Arabic Mobile-Based Conversational Agent

Abstract: The conversation automation/simulation between a user and machine evolved during the last years. A number of research-based systems known as conversational agents has been developed to address this challenge. A conversational Agent is a program that attempts to simulate conversations between the human and machine. Few of these programs targeted the mobile-based users to handle the conversations between them and a mobile device through an embodied spoken character. Wireless communication has been rapidly extended with the expansion of mobile services. Therefore, this paper discusses the proposing and developing a framework of a mobile-based conversational agent called Mobile ArabChat to handle the Arabic conversations between the Arab users and mobile device. To best of our knowledge, there are no such applications that address this challenge for Arab mobile-based users. An Android based application was developed in this paper, and it has been tested and evaluated in a large real environment. Evaluation results show that the Mobile ArabChat works properly, and there is a need for such a system for Arab users.

Author 1: Mohammad Hijjawi
Author 2: Hazem Qattous
Author 3: Omar Alsheiksalem

Keywords: Conversational Agent; Mobile; ArabChat; Chatterbot and Arabic

PDF

Paper 17: Personalized Subject Learning Based on Topic Detection and Canonical Correlation Analysis

Abstract: To keep pace with the time, learning from printed medium alone is no longer a comprehensive approach. Fresh digital contents can definitely be the complement of printed education medium. Although timely access to fresh contents is becoming increasingly important for education and gaining such access is no longer a problem, the capacity for human teachers to assimilate such huge amounts of contents is limited. Topic Detection (TD) is then a promising research area that addresses speedy access of desired contents based on topic or subject. On the other hand, personalized education is getting more attention because it facilitates the improvement of creativity and subject learning of the students. This paper reveals a patented Personalized Subject Learning (PSL) system that caters for the need of personalized education and efficiently provides subject based contents. An efficient topic detection algorithm for providing subject content is presented. Moreover, since education contents are multimedia based ones with multimodal, PSL introduces Canonical Correlation Analysis (CCA) method to detect multimodal correlations across different types of media. Due to its novelty, PSL has been used as the key engine in a real world application of personalized education system as the smart education module sponsored by a Smart City project.

Author 1: Zhangzu SHI
Author 2: Steve K. SHI
Author 3: Lucy L. SHI

Keywords: Topic Detection; Canonical Correlation Analysis; Personalized Education; Subject Learning; Multimodality

PDF

Paper 18: Power and Contention Control Scheme: As a Good Candidate for Interference Modeling in Cognitive Radio Network

Abstract: Due to the ever growing need for spectrum, the cognitive radio (CR) has been proposed to improve the radio spectrum utilization. In this scenario, the secondary users (SU) are permitted to share spectrum with the licensed primary users (SU) with a strict condition that they do not cause harmful interference to the cognitive network. In this work, we have proposed an interference model for cognitive radio network that utilizes power or contention control interference management schemes. We derived the probability density function (PDF) with the power control scheme, where the power of transmission of the CR transmitter is guided by the power control law and also with contention control scheme that has a fixed transmission power for all CR transmitter controlled by a contention control protocol. This protocol makes a decision on which CR transmitter can transmit at any point in time. In this work, we have shown that power and contention control schemes are good candidates for interference modeling in cognitive radio system. The impact of the unknown location of the primary receiver on the resulting interference generated by the CR transmitters was investigated and the results shows that the challenges of the hidden primary receivers lead to higher CR-primary interference in respect to higher mean and variance. Finally, the presented results show power control and the contention control scheme are good candidates in reducing the interference generated by the cognitive radio network.

Author 1: Ireyuwa E. Igbinosa
Author 2: Olutayo O. Oyerinde
Author 3: Viranjay M. Srivastava
Author 4: Stanley H. Mneney

Keywords: Aggregate interference; cognitive radio; interference management; interference modeling

PDF

Paper 19: Design of ANFIS Estimator of Permanent Magnet Brushless DC Motor Position for PV Pumping System

Abstract: This paper presents a new scheme for PMBLDC (permanent magnet brushless direct current) rotor position estimation based an ANFIS (adaptive network fuzzy inference system) estimator. The operation of such motor requires accurate rotor position knowledge. However, most of rotor position sensors produce undesirable effects such as mechanical losses and have other disadvantages. In order to overcome the disadvantages, sensorless scheme seems to offer great advantages. This work present an ANFIS estimator design. Combining the adaptive capability of the neural network to gather with the reasoning ability of the fuzzy logic in ANFIS modeling results in a fast responding and flexible model. This procedure lends itself perfectly adapted for complex system such as PV pumping systems.

Author 1: TERKI Amel
Author 2: MOUSSI Ammar
Author 3: TERKI Nadjiba

Keywords: Photovoltaic system; Brushless DC motor; ANFIS estimator; Speed controller

PDF

Paper 20: Effective Calibration and Evaluation of Multi-Camera Robotic Head

Abstract: The paper deals with appropriate calibration of multispectral vision systems and evaluation of the calibration and data-fusion quality in real-world indoor and outdoor conditions. Checkerboard calibration pattern developed by our team for multispectral calibration of intrinsic and extrinsic parameters is described in detail. The circular object for multispectral fusion evaluation is described as well. The objects were used by our team for calibration and evaluation of advanced visual system of Orpheus-X3 robot that is taken as a demonstrator, but their use is much wider, and authors suggest to use them as testbed for visual measurement systems of mobile robots. To make the calibration easy and straightforward, the authors developed MultiSensCalib program in Matlab, containing all the described techniques. The software is provided as publicly available, including source code and testing images.

Author 1: Petra Kocmanova
Author 2: Ludek Zalud

Keywords: calibration; camera; mobile robot; thermal imaging; data-fusion

PDF

Paper 21: Optimizing User's Utility from Cloud Computing Services in a Networked Environment

Abstract: Cloud Computing customers are looking for the best utility for their money. Research shows that functional aspects are considered more important than service prices in customer buying decisions. Choosing the best service provider might be complicated since each provider may sell three kinds of services organized in three layers: SaaS (Software as a service), PaaS (Platform as a service) and IaaS (Infrastructure as a service). This research targets the problem of optimizing consumers' utility, using conjoint analysis methodology. Providers currently offer software services as bundles belonging to the same layer, or to underlying layers. Bundling services prevent customers from splitting their service purchases between a provider of software and a different provider of the underlying layers. This research assumes that in the future will exist a free competitive market, in which consumers will be free to switch their services to different providers, eliminating the negative biases of bundling, during making their buying decisions. This research proposes a mathematical model and three possible strategies for implementation in organizations, and illustrates its advantages compared to existing utility maximization practices. Current conjoint analysis method chooses the best utility in a traditional cloud architecture in which one provider offers a bundle of all three layers. The proposed model assumes a networked cloud architecture in which a customer may choose services from any provider, building for himself the best basket of services maximizing his/her total utility. This research outlines three business models which will assist organizations shift gradually from current CC architecture to the future networked architectures, thus maximizing their utility.

Author 1: Eli WEINTRAUB
Author 2: Yuval COHEN

Keywords: Utility Optimization; Cloud Computing; Consumer preferences; Conjoint Analysis

PDF

Paper 22: Design and Realization of Mongolian Syntactic Retrieval System Based on Dependency Treebank

Abstract: In the past seven years, Language Research Institute of Inner Mongolia University has constructed a 500,000-word scale Mongolian dependency treebank. The syntactic treebank provides a favorable data platform for language research and information processing. In order to effectively use the treebank, we have designed and implemented a graphical syntactic information retrieval system based on the Mongolian dependency treebank. As an application system, this retrieval system offers search and statistical analysis on word, phrase, syntactic fragment and syntactic structure level.

Author 1: S.Loglo
Author 2: Sarula

Keywords: Mongolian Language; Dependency Grammar; Dependency Treebank; Syntactic Retrieval; Information Retrieval

PDF

Paper 23: Comparison of Burden on Youth in Communicating with Elderly using Images Versus Photographs

Abstract: Conversation is a good preventative against behavioral problems in the elderly. However, caregivers are usually very busy tending to patients and lack the time to communicate extensively with them. Toward overcoming such problems actively listening volunteers have more opportunities to communicate with the elderly, but the number of skilled volunteers is limited. Therefore, we investigated conversational support systems for inexperienced volunteers; such systems usually include content such as photographs, videos, and music. We expected that the volunteers would feel less stress when using videos instead of photographs for conversational support because the former provided both volunteers and patients with richer information than the latter. On the other hand, photographs gave patients more chances to talk with volunteers. However, there has been no research to date on the effect of content type upon stress and conversational quality. In this paper, we compared using photographs with using video from such viewpoints.

Author 1: Miyuki Iwamoto
Author 2: Noriaki Kuwahara
Author 3: Kazunari Morimoto

Keywords: elderly; reminiscence videos; senior care home photographic image

PDF

Paper 24: Medical Image De-Noising Schemes using Wavelet Transform with Fixed form Thresholding

Abstract: Medical Imaging is currently a hot area of bio-medical engineers, researchers and medical doctors as it is extensively used in diagnosing of human health and by health care institutes. The imaging equipment is the device, which is used for better image processing and highlighting the important features. These images are affected by random noise during acquisition, analyzing and transmission process. This condition results in the blurry image visible in low contrast. The Image De-noising System (IDs) is used as a tool for removing image noise and preserving important data. Image de-noising is one of the most interesting research areas among researchers of technology-giants and academic institutions. For Criminal Identification Systems (CIS) & Magnetic Resonance Imaging (MRI), IDs is more beneficial in the field of medical imaging. This paper proposes an algorithm for de-noising medical images using different types of wavelet transform, such as Haar, Daubechies, Symlets and Bi-orthogonal. In this paper noise image quality has been evaluated using filter assessment parameters like Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE) and Variance, It has been observed to form the numerical results that, the presentation of proposed algorithm reduced the mean square error and achieved best value of peak signal to noise ratio (PSNR). In this paper, the wavelet based de-noising algorithm has been investigated on medical images along with threshold.

Author 1: Nadir Mustafa
Author 2: Jiang Ping Li
Author 3: Saeed Ahmed Khan
Author 4: Mohaned Giess

Keywords: Image De-noising System; GUI De-noised image; Code De-noised image; Wavelet transform; Soft and Hard Threshold

PDF

Paper 25: Automation and Validation of Annotation for Hindi Anaphora Resolution

Abstract: The process of labelling any language genre by which one can extract useful information is called annotation. This provides syntactic information about a word or a word phrase. In this paper, an effort has been made to provide the algorithm for semiautomatic annotation for Hindi text to cater anaphora resolution only. The study was conducted on twelve files of Ranchi Express available in EMILLE corpus. The corpus is originally tagged for demonstrative pronouns. The detection of the pronouns is supported by the incorporation of seven tags. However the semantic interpretation of the demonstrative pronoun is not supported in the original corpus. In this paper an effort has been made to automate the process of tagging as well as the handling of semantic information through addition tags. It was conducted on 1485 demonstrative pronouns. The average accuracy of precision, recall and F measure is 74, 71 and 72 respectively.

Author 1: Pardeep Singh
Author 2: Kamlesh Dutta

Keywords: Annotation; natural language processing; demonstrative pronoun; semantic category; indirect anaphora; semiautomatic annotation

PDF

Paper 26: An Effective Storage Mechanism for High Performance Computing (HPC)

Abstract: All over the process of treating data on HPC Systems, parallel file systems play a significant role. With more and more applications, the need for high performance Input-Output is rising. Different possibilities exist: General Parallel File System, cluster file systems and virtual parallel file system (PVFS) are the most important ones. However, these parallel file systems use pattern and model access less effective such as POSIX semantics (A family of technical standards emerged from a project to standardize programming interfaces software designed to operate on variant UNIX operating system.), which forces the MPI-IO implementations to use inefficient techniques based on locks. To avoid this synchronization in these techniques, we ensure that the use of a versioning-based file system is much more effective.

Author 1: Fatima El Jamiy
Author 2: Abderrahmane Daif
Author 3: Mohamed Azouazi
Author 4: Abdelaziz Marzak

Keywords: Big data; High Performance Computing; Storage; Distributed File System; BlobSeer

PDF

Paper 27: SLA for E-Learning System Based on Cloud Computing

Abstract: The Service Level Agreement (SLA) becomes an important issue especially over the Cloud Computing and online services that based on the ‘pay-as-you-use’ fashion. Establishing the Service level agreements (SLAs), which can be defined as a negotiation between the service provider and the user, is needed for many types of current applications as the E-Learning systems. The work in this paper presents an idea of optimizing the SLA parameters to serve any E-Learning system over the Cloud Computing platform, with defining the negotiation process, the suitable frame work, and the sequence diagram to accommodate the E-Learning systems.

Author 1: Doaa Elmatary
Author 2: Samy Abd El Hafeez
Author 3: Wael Awad
Author 4: Fatma Omara

Keywords: Cloud Computing; Service Level Agreement (SLA); E-learning System

PDF

Paper 28: FRoTeMa: Fast and Robust Template Matching

Abstract: Template matching is one of the most basic techniques in computer vision, where the algorithm should search for a template image T in an image to analyze I. This paper considers the rotation, scale, brightness and contrast invariant grayscale template matching problem. The proposed algorithm uses a sufficient condition for distinguishing between candidate matching positions and other positions that cannot provide a better degree of match with respect to the current best candidate. Such condition is used to significantly accelerate the search process by skipping unsuitable search locations without sacrificing exhaustive accuracy. Our proposed algorithm is compared with eight existing state-of-the-art techniques. Theoretical analysis and experiments on eight image datasets show that the proposed simple algorithm can maintain exhaustive accuracy while providing a significant speedup.

Author 1: Abdullah M. Moussa
Author 2: M. I. Habib
Author 3: Rawya Y. Rizk

Keywords: template matching; pattern matching; brightness-contrast invariance; rotation invariance; scale invariance; sufficient condition

PDF

Paper 29: A Bayesian Approach to Service Selection for Secondary Users in Cognitive Radio Networks

Abstract: In cognitive radio networks where secondary users (SUs) use the time-frequency gaps of primary users' (PUs) licensed spectrum opportunistically, the experienced throughput of SUs depend not only on the traffic load of the PUs but also on the PUs' service type. Each service has its own pattern of channel usage, and if the SUs know the dominant pattern of primary channel usage, then they can make a better decision on choosing which service is better to be used at a specific time to get the best advantage of the primary channel, in terms of higher achievable throughput. However, it is difficult to inform directly SUs of PUs' dominant used services in each area, for practical reasons. This paper proposes a learning mechanism embedded in SUs to sense the primary channel for a specific length of time. This algorithm recommends the SUs upon sensing a free primary channel, to choose the best service in order to get the best performance, in terms of maximum achieved throughput and the minimum experienced delay. The proposed learning mechanism is based on a Bayesian approach that can predict the performance of a requested service for a given SU. Simulation results show that this service selection method outperforms the blind opportunistic SU service selection, significantly.

Author 1: Elaheh Homayounvala

Keywords: Cognitive Radio; Service Selection; Bayesian Networks

PDF

Paper 30: A Real-Time Face Motion Based Approach towards Modeling Socially Assistive Wireless Robot Control with Voice Recognition

Abstract: The robotics domain has a couple of specific general design requirements which requires the close integration of planning, sensing, control and modeling and for sure the robot must take into account the interactions between itself, its task and its environment surrounding it. Thus considering the fundamental configurations, the main motive is to design a system with user-friendly interfaces that possess the ability to control embedded robotic systems by natural means. While earlier works have focused primarily on issues such as manipulation and navigation only, this proposal presents a conceptual and intuitive approach towards man-machine interaction in order to provide a secured live biometric logical authorization to the user access, while making an intelligent interaction with the control station to navigate advanced gesture controlled wireless Robotic prototypes or mobile surveillance systems along desired directions through required displacements. The intuitions are based on tracking real-time 3-Dimensional Face Motions using skin tone segmentation and maximum area considerations of segmented face-like blobs, Or directing the system with voice commands using real-time speech recognition. The system implementation requires designing a user interface to communicate between the Control station and prototypes wirelessly, either by accessing the internet over an encrypted Wi-Fi Protected Access (WPA) via a HTML web page for communicating with face motions or with the help of natural voice commands like “Trace 5 squares”, “Trace 10 triangles”, “Move 10 meters”, etc. evaluated on an iRobot Create over Bluetooth connectivity using a Bluetooth Access Module (BAM). Such an implementation can prove to be highly effective for designing systems of elderly aid and maneuvering the physically challenged.

Author 1: Abhinaba Bhattacharjee
Author 2: Partha Das
Author 3: Debasish Kundu
Author 4: Sudipta Ghosh
Author 5: Sauvik Das Gupta

Keywords: Face detection; Skin tone segmentation; Voice Commands; Speech Recognition; Wi-Fi Protected Access (WPA); Arduino Wi-Fi Shield; iRobot Create; Surveillance systems

PDF

Paper 31: The Effect of Feature Selection on Phish Website Detection

Abstract: Recently, limited anti-phishing campaigns have given phishers more possibilities to bypass through their advanced deceptions. Moreover, failure to devise appropriate classification techniques to effectively identify these deceptions has degraded the detection of phishing websites. Consequently, exploiting as new; few; predictive; and effective features as possible has emerged as a key challenge to keep the detection resilient. Thus, some prior works had been carried out to investigate and apply certain selected methods to develop their own classification techniques. However, no study had generally agreed on which feature selection method that could be employed as the best assistant to enhance the classification performance. Hence, this study empirically examined these methods and their effects on classification performance. Furthermore, it recommends some promoting criteria to assess their outcomes and offers contribution on the problem at hand. Hybrid features, low and high dimensional datasets, different feature selection methods, and classification models were examined in this study. As a result, the findings displayed notably improved detection precision with low latency, as well as noteworthy gains in robustness and prediction susceptibilities. Although selecting an ideal feature subset was a challenging task, the findings retrieved from this study had provided the most advantageous feature subset as possible for robust selection and effective classification in the phishing detection domain.

Author 1: Hiba Zuhair
Author 2: Ali Selmat
Author 3: Mazleena Salleh

Keywords: phish website; phishing detection; feature selection; classification model

PDF

Paper 32: Computer Science Approach to Information-Like Artifacts as Exemplified by Memes

Abstract: Providing information can be expanded to include systems that deliver information-like artifacts. They provide such “things” as advertisements, propaganda pieces, and meme artifacts. Memes are the subject of extensive intellectual debate in science and popular culture because it is claimed that parallels can be drawn between theories of cultural evolution manifested in memes, and theories of biological evolution. Memes are described as self-reproducing mental structures, intangible entities transmitted from mind to mind, verbally or by repeated actions and/or imitation. The problem is that researchers describe memes in terms of English-language text or ad hoc diagrams. This paper considers the problem that the field of memetics lacks a uniform language for examining diverse conceptualizations of memes. The paper presents a unifying diagrammatic representation used in computer science, in which all types of “claimed” memes can be expressed and their general characteristics observed. Several examples from the literature on memes are recast in terms of this representation. The results point to the capability of the proposed depiction to express various types of memes.

Author 1: Sabah Al-Fedaghi

Keywords: information; cultural evolution; mental structures; memes; memetics; conceptual modeling; diagrammatic representation

PDF

Paper 33: Prediction of Poor Inhabitant Number Using Least Square and Moving Average Method

Abstract: The number of poor inhabitant in South Kalimantan decreased within the last three years compared with the previous years. The numbers of poor inhabitant differs from time to time. This scaled dynamical number has been a problem for the local government to take proper polices to solve this matter. It will then be necessary to predict a potential number of poor inhabitants in the next year as the basis on subsequent policy making. This research will apply both Least Square and Moving Average method as the measurement to count prediction values. From the results of the study, the prediction analysis by using those two methods is valid for predicting acquired number of poor inhabitant for the next period according to the data from the previous year. Based on the study, the validity of Least Square was 98.35% and Moving Average was 98.79% by using the data in the last seven years.

Author 1: Ningrum Ekawati

Keywords: Poor Inhabitant; Prediction; Least Square; Moving Average

PDF

Paper 34: Study of Automatic Extraction, Classification, and Ranking of Product Aspects Based on Sentiment Analysis of Reviews

Abstract: It is very common for a customer to read reviews about the product before making a final decision to buy it. Customers are always eager to get the best and the most objective information about the product theywish to purchase and reviews are the major source to obtain this information. Although reviews are easily accessible from the web, but since most of them carry ambiguous opinion and different structure, it is often very difficult for a customer to filter the information he actually needs. This paper suggests a framework, which provides a single user interface solution to this problem based on sentiment analysis of reviews. First, it extracts all the reviews from different websites carrying varying structure, and gathers information about relevant aspects of that product. Next, it does sentiment analysis around those aspects and gives them sentiment scores. Finally, it ranks all extracted aspects and clusters them into positive and negative class. The final output is a graphical visualization of all positive and negative aspects, which provide the customer easy, comparable, and visual information about the important aspects of the product. The experimental results on five different products carrying 5000 reviewsshow 78% accuracy. Moreover, the paper also explained the effect of Negation, Valence Shifter, and Diminisher with sentiment lexiconon sentiment analysis, andconcluded that they all are independent of the case problem , and have no effect on the accuracy of sentiment analysis.

Author 1: Muhammad Rafi
Author 2: Muhammad Rafay Farooq
Author 3: Usama Noman
Author 4: Abdul Rehman Farooq
Author 5: Umair Ali Khatri

Keywords: Aspect ranking; Product Aspect Ranking; Sentiment analysis; Sentiment lexicon

PDF

Paper 35: Adoption of Biometric Fingerprint Identification as an Accessible, Secured form of ATM Transaction Authentication

Abstract: Security is continuously an important concern for most Information Technology-related industries, especially the banking industry. The banking industry is concerned with protecting and securing the privacy and data of their customers, as well as their transactions. The adoption of biometric technology as a means of identifying and authenticating individuals has been proposed as one of the varied solutions to many of the security challenges faced by the banking industry. In this paper, the authors address the ATM transaction authentication problem of banking transactions using fingerprint identification as one form of biometric authentication. The novel methodology adopted proposes the use of an online off-card fingerprint verification, which involves the matching of live fingerprint (templates) with pre-stored templates read from the ATM smart card. The experimental evaluation of the proposed methodology presents a system that offers a faster and relatively better security of authentication, as compared to previous and existing methodologies. Moreover, the use of BioHASH templates ensures an irreversible cryptographic hash function, facilitates a faster authentication, and enables an efficient framework of detecting potential duplicates of banking account holders.

Author 1: Michael Mireku Kwakye
Author 2: Hanan Yaro Boforo
Author 3: Eugene Louis Badzongoly

Keywords: Information Technology; Automatic Teller Machine; Biometrics; Fingerprint; BioHASH; Token

PDF

Paper 36: A New Approach for a Better Load Balancing and a Better Distribution of Resources in Cloud Computing

Abstract: Cloud computing is a new paradigm where data and services of Information Technology are provided via the Internet by using remote servers. It represents a new way of delivering computing resources allowing access to the network on demand. Cloud computing consists of several services, each of which can hold several tasks. As the problem of scheduling tasks is an NP-complete problem, the task management can be an important element in the technology of cloud computing. To optimize the performance of virtual machines hosted in cloud computing, several algorithms of scheduling tasks have been proposed. In this paper, we present an approach allowing to solve the problem optimally and to take into account the QoS constraints based on the different user requests. This technique, based on the Branch and Bound algorithm, allows to assign tasks to different virtual machines while ensuring load balance and a better distribution of resources. The experimental results show that our approach gives very promising results for an effective tasks planning.

Author 1: Abdellah IDRISSI
Author 2: Faouzia ZEGRARI

Keywords: Cloud Computing; Constraints QoS; Combinatorial Optimization; Task Scheduler; Exact Method

PDF

Paper 37: Distance and Speed Measurements using FPGA and ASIC on a high data rate system

Abstract: This paper deals with the implementation of FPGA and ASIC designs to calculate the distance and speed of a moving remote object using laser source and echo pulses reflected from that remote object. The project proceeded in three phases for the FPGA implementation: All-in-C design using Xilinx Microblaze soft core processor system, an accelerated design with custom co-processor and Microblaze soft core processor system, and full custom hardware design implemented using VHDL on Xilinx FPGA. Later the complete system was implemented on ASIC. The ASIC implementation optimized the modules for area and timing for a 130nm process technology.

Author 1: Abdul Rehman Buzdar
Author 2: Liguo Sun
Author 3: Azhar Latif
Author 4: Abdullah Buzdar

Keywords: Distance; Speed; FPGA; MicroBaze; Co-Design; ASIC

PDF

Paper 38: On the Codes over a Semilocal Finite Ring

Abstract: In this paper, we study the structure of cyclic, quasi cyclic, constacyclic codes and their skew codes over the finite ring R. The Gray images of cyclic, quasi cyclic, skew cyclic, skew quasi cyclic and skew constacyclic codes over R are obtained. A necessary and sufficient condition for cyclic (negacyclic) codes over R that contains its dual has been given. The parameters of quantum error correcting codes are obtained from both cyclic and negacyclic codes over R. Some examples are given. Firstly, quasi constacyclic and skew quasi constacyclic codes are introduced. By giving two inner product, it is investigated their duality. A sufficient condition for 1 generator skew quasi constacyclic codes to be free is determined.

Author 1: Abdullah Dertli
Author 2: Yasemin Cengellenmis
Author 3: Senol Eren

Keywords: Cyclic codes; Skew cyclic codes; Quantum codes

PDF

Paper 39: A New Hidden Web Crawling Approach

Abstract: Traditional search engines deal with the Surface Web which is a set of Web pages directly accessible through hyperlinks and ignores a large part of the Web called hidden Web which is a great amount of valuable information of online database which is “hidden” behind the query forms. To access to those information the crawler have to fill the forms with a valid data, for this reason we propose a new approach which use SQLI technique in order to find the most promising keywords of a specific domain for automatic form submission. The effectiveness of proposed framework has been evaluated through experiments using real web sites and encouraging preliminary results were obtained

Author 1: L.Saoudi
Author 2: A.Boukerram
Author 3: S.Mhamedi

Keywords: Deep crawler; Hidden Web crawler; SQLI query; form submission; searchable forms

PDF

Paper 40: A Simulation Model for Nakagmi-m Fading Channel with m>1

Abstract: In this paper, we propose a model to simulate a wireless fading channel based on Nakagami-m distribution with m>1. The Nakagami-m fading channel is the most generalized distribution as it can generate one-sided Gaussian distribution, Rayleigh distribution and Rician distribution for m equals to 0.5, 1 and >1 respectively. In this work we have proposed a method to generate a wireless fading channel based on Nakagami-m distribution as this distribution fits to a wide class of fading channel conditions. Simulation results were obtained using Matlab R2013a and compared with the analytical results.

Author 1: Sandeep Sharma
Author 2: Rajesh Mishra

Keywords: Nakagami Distribution; Fading Channel; Wireless Channel Modeling

PDF

The Science and Information (SAI) Organization
BACK TO TOP

Computer Science Journal

  • About the Journal
  • Call for Papers
  • Submit Paper
  • Indexing

Our Conferences

  • Computing Conference
  • Intelligent Systems Conference
  • Future Technologies Conference
  • Communication Conference

Help & Support

  • Contact Us
  • About Us
  • Terms and Conditions
  • Privacy Policy

© The Science and Information (SAI) Organization Limited. All rights reserved. Registered in England and Wales. Company Number 8933205. thesai.org