The Science and Information (SAI) Organization
  • Home
  • About Us
  • Journals
  • Conferences
  • Contact Us

Publication Links

  • IJACSA
  • Author Guidelines
  • Publication Policies
  • Digital Archiving Policy
  • Promote your Publication
  • Metadata Harvesting (OAI2)

IJACSA

  • About the Journal
  • Call for Papers
  • Editorial Board
  • Author Guidelines
  • Submit your Paper
  • Current Issue
  • Archives
  • Indexing
  • Fees/ APC
  • Reviewers
  • Apply as a Reviewer

IJARAI

  • About the Journal
  • Archives
  • Indexing & Archiving

Special Issues

  • Home
  • Archives
  • Proposals
  • Guest Editors
  • SUSAI-EE 2025
  • ICONS-BA 2025
  • IoT-BLOCK 2025

Future of Information and Communication Conference (FICC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Computing Conference

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Intelligent Systems Conference (IntelliSys)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Future Technologies Conference (FTC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact
  • Home
  • Call for Papers
  • Editorial Board
  • Guidelines
  • Submit
  • Current Issue
  • Archives
  • Indexing
  • Fees
  • Reviewers
  • Subscribe

IJACSA Volume 2 Issue 11

Copyright Statement: This is an open access publication licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.

View Full Issue

Paper 1: Crytosystem for Computer security using Iris patterns and Hetro correlators

Abstract: Biometric based cryptography system provides an efficient and secure data transmission as compare to the traditional encryption system. However, it is a computationally challenge task to solve the issues to incorporate biometric and cryptography. In connection with our previous works, this paper reveals a robust cryptosystem using iris biometric pattern as a crypto-key to resolve the issues in the encryption. An error correction engine based on hetro-correlators has been used to evoke the partially tarnished data fashioned by the decryption process. This process determines the non-repudiation and key management problems. The experimental results show that the suggestion algorithm can implement in the real-life cryptosystem.

Author 1: R Bremananth
Author 2: Ahmad Sharieh

Keywords: Auto-correlators; Biometric; crytosystem; Hetro-correlators.

PDF

Paper 2: On the transmission capacity of quantum networks

Abstract: We provide various results about the transmission capacity of quantum networks. Our primary focus is on algorithmic methods to efficiently compute upper-bounds to the traffic that the network can handle at most, and to compute lower-bounds on the likelihood that a customer has to wait for service due to network congestion. This establishes analogous assertions as derived from Erlang B or Erlang C models for standard telecommunications. Our proposed methods, while specifically designed for quantum networks, do neither hinge on a particular quantum key distribution technology nor on any particular routing scheme. We demonstrate the feasibility of our approach using a worked example. Moreover, we explicitly consider two different architectures for quantum key management, one of which employs individual key-buffers for each relay connection, the other using a shared key-buffer for every transmission. We devise specific methods for analyzing the network performance depending on the chosen key-buffer architecture, and our experiments led to quite different results for the two variants.

Author 1: Sandra König
Author 2: Stefan Rass

Keywords: Quantum network; Quantum cryptography; network transmission capacity; queuing network; system security.

PDF

Paper 3: Confidential Deterministic Quantum Communication Using Three Quantum States

Abstract: A secure quantum deterministic communication protocol is described. The protocol is based on transmission of quantum states from unbiased bases and exploits no entanglement. It is composed form two main components: a quantum quasi secure quantum communication supported by a suitable classical message preprocessing layer. Contrary to many others propositions, it does not require large quantum registers. A security level comparable to classic block ciphers is achieved by a specially designed, purely classic, message pre- and post-processing. However, unlike to the classic communication, no key agreement is required. The protocol is also designed in such a way, that noise in the quantum channel works in advantage to legitimate users improving the security level of the communication.

Author 1: Piotr ZAWADZKI

Keywords: quantum cryptography; quantum secure direct communication; privacy amplification.

PDF

Paper 4: A Novel Implementation of RISI Controller Employing Adaptive Clock Gating Technique

Abstract: With the scaling of technology and the need for higher performance and more functionality power dissipation is becoming a major issue for controller design. Interrupt based programming is widely used for interfacing a processor with peripherals. The proposed architecture implements a mechanism which combines interrupt controller and RIS (Reduced Instruction Set) CPU (Central processing unit) on a single die. RISI Controller takes only one cycle for both interrupt request generation and acknowledgement. The architecture have a dynamic control unit which consists of a program flow controller, interrupt controller and I/O controller. Adaptive clock gating technique is used to reduce power consumption in the dynamic control unit. The controller consumes a power of 174µw@1MHz and is implemented in verilog HDL using Xilinx platform

Author 1: M Kamaraju
Author 2: Praveen V N Desu

Keywords: Interrupt; Controller; Clock gating; power.

PDF

Paper 5: Strength of Quick Response Barcodes and Design of Secure Data Sharing System

Abstract: With the vast introduction of the wireless world, the exchanged information now is more prone to security attacks than ever. Barcodes are the information careers in the form of an image. Their various applications have been discussed in brief and also the structure, symbology and properties of barcodes. This paper aims to provide an approach which can share high security information over the network using QR barcodes. QR barcodes are explained in detail to get the rigged understanding on quick response technology. The design of data security model to share the data over the network is explained. This model aims to enable secure data share over the network. This model is a layered architecture and protects the data by transforming the structure of content. So barcodes are used to put tricks over the information rather than directly using it for its noble functionality.

Author 1: Sona Kaushik

Keywords: QR Barcode; Quick response technology; Data Security; Information Security; Image processing; Data Sharing Architecture

PDF

Paper 6: Graphing emotional patterns by dilation of the iris in video sequences

Abstract: For this paper, we took videos of iris of people while induced a feeling of joy or sadness, using videos to motivate the states affective. The manuscript implemented is a system of recognition affective pattern by dilating the iris, with which extracted images of the videos. The results obtained are plotted to facilitate the interpretation. A suitable treatment occurred for locating the pupil and the obtaining of the diameter of the pupil. The graphics are based on statistical time intervals. Within the research found that the iris diameter varies depending on your mood present in the subject of study. There is software that can detect changes in the pupil diameter, however it is also develops software, the main objective is to detect changes with respect to affective states and in this study is the main contribution. The joy and sadness were the emotional states that may differ. The system presents graphs that can be observed when analyzing the dependence between feelings and dilation present in the eye.

Author 1: Rodolfo Romero Herrera,
Author 2: rromeroh@ipn.mx
Author 3: Saul De La O Torres

Keywords: Pupil dilation; joy; sadness; mathematical morphology; average interpolation.

PDF

Paper 7: The impact of competitive intelligence on products and services innovation in organizations

Abstract: This paper discusses the findings of the study that was aimed at establishing the effect of Competitive Intelligence, hereafter referred to as CI, on product and service innovations. A literature study revealed that CI and innovation are widely studied subjects, but the impact of CI on innovation was not well documented. CI has been widely acclaimed as a panacea to a lot of organizational problems. The study aimed at establishing the impact of Competitive Intelligence (CI) on products and services Innovation in organisation. A case study was conducted, using an Information and communication technology (ICT) organisation. Innovation-decision process was applied in the data analysis. At the end of the study on the impact of competitive intelligence on products and services innovation in organisations the following was achieved. It was better understood that while CI is overemphasized as revolutionary, customer focused information systems products and services still remain challenging. It was also understood that not all organisations that deploy CI produce more innovative methods. A lack of knowledge- sharing and limitations within the organisational culture were found to be important factors for the deployment of competitive intelligence products and services in the organisations. Conclusions of the study basing on the findings are presented.

Author 1: Phathutshedzo Nemutanzhela,
Author 2: Tiko Iyamu

Keywords: Competitive Intelligence (CI); Diffusion of Innovation (DoI); Innovation; Product; Services.

PDF

Paper 8: Arabic Sign Language (ArSL) Recognition System Using HMM

Abstract: Hand gestures enabling deaf people to communication during their daily lives rather than by speaking. A sign language is a language which, instead of using sound, uses visually transmitted gesture signs which simultaneously combine hand shapes, orientation and movement of the hands, arms, lip-patterns, body movements and facial expressions to express the speaker's thoughts. Recognizing and documenting Arabic sign language has only been paid attention to recently. There have been few attempts to develop recognition systems to allow deaf people to interact with the rest of society. This paper introduces an automatic Arabic sign language (ArSL) recognition system based on the Hidden Markov Models (HMMs). A large set of samples has been used to recognize 20 isolated words from the Standard Arabic sign language. The proposed system is signer-independent. Experiments are conducted using real ArSL videos taken for deaf people in different clothes and with different skin colors. Our system achieves an overall recognition rate reaching up to 82.22%.

Author 1: Aliaa A.A Youssif
Author 2: Amal Elsayed Aboutabl
Author 3: Heba Hamdy Ali

Keywords: Hand Gesture; Hand Tracking; Arabic Sign Language (ArSL); HMM; Hand Features; Hand Contours.

PDF

Paper 9: Modularity Index Metrics for Java-Based Open Source Software Projects

Abstract: Open Source Software (OSS) Projects are gaining popularity these days, and they become alternatives in building software system. Despite many failures in these projects, there are some success stories with one of the identified success factors is modularity. This paper presents the first quantitative software metrics to measure modularity level of Java-based OSS Projects called Modularity Index. This software metrics is formulated by analyzing modularity traits such as size, complexity, cohesion, and coupling of 59 Java-based OSS Projects from sourceforge.net using SONAR tool. These OSS Projects are selected since they have been downloaded more than 100K times and believed to have the required modularity trait to be successful. The software metrics related to modularity in class, package and system level of these projects are extracted and analyzed. The similarities found are then analyzed to determine the class quality, package quality, and then combined with system architecture measure to formulate the Modularity Index. The case study of measuring Modularity Index during the evolution of JFreeChart project has shown that this software metrics is able to identify strengths and potential problems of the project.

Author 1: Andi Wahju Rahardjo Emanuel
Author 2: Retantyo Wardoyo, Jazi Eko Istiyanto

Keywords: Open source software projects; modularity; Java; sourceforge; software metrics; system architecture.

PDF

Paper 10: Survey of Nearest Neighbor Condensing Techniques

Abstract: The nearest neighbor rule identifies the category of an unknown element according to its known nearest neighbors’ categories. This technique is efficient in many fields as event recognition, text categorization and object recognition. Its prime advantage is its simplicity, but its main inconvenience is its computing complexity for large training sets. This drawback was dealt by the researchers’ community as the problem of prototype selection. Trying to solve this problem several techniques presented as condensing techniques were proposed. Condensing algorithms try to determine a significantly reduced set of prototypes keeping the performance of the 1-NN rule on this set close to the one reached on the complete training set. In this paper we present a survey of some condensing KNN techniques which are CNN, RNN, FCNN, Drop1-5, DEL, IKNN, TRKNN and CBP. All these techniques can improve the efficiency in computation time. But these algorithms fail to prove the minimality of their resulting set. For this, one possibility is to hybridize them with other algorithms, called modern heuristics or metaheuristics, which, themselves, can improve the solution. The metaheuristics that have proven results in the selection of attributes are principally genetic algorithms and tabu search. We will also shed light in this paper on some recent techniques focusing on this template.

Author 1: MILOUD-AOUIDATE Amal
Author 2: BABA-ALI Ahmed Riadh

Keywords: Nearest neighbor (NN); kNN; Prototype selection; Condensed NN; Reduced NN; Condensing; Genetic algorithms; Tabu search.

PDF

Paper 11: Concurrent Edge Prevision and Rear Edge Pruning Approach for Frequent Closed Itemset Mining

Abstract: Past observations have shown that a frequent item set mining algorithm are purported to mine the closed ones because the finish provides a compact and a whole progress set and higher potency. Anyhow, the newest closed item set mining algorithms works with candidate maintenance combined with check paradigm that is pricey in runtime yet as space usage when support threshold is a smaller amount or the item sets gets long. Here, we show, CEG&REP that could be a capable algorithm used for mining closed sequences while not candidate. It implements a completely unique sequence finality verification model by constructing a Graph structure that build by an approach labeled “Concurrent Edge Prevision and Rear Edge Pruning” briefly will refer as CEG&REP. a whole observation having sparse and dense real-life knowledge sets proved that CEG&REP performs bigger compared to older algorithms because it takes low memory and is quicker than any algorithms those cited in literature frequently.

Author 1: Anurag Choubey
Author 2: Dr. Ravindra Patel
Author 3: Dr. J.L. Rana

Keywords: Data mining; Closed Itemsets; Pattern Mining; sequence length; graph structure.

PDF

Paper 12: Error Filtering Schemes for Color Images in Visual Cryptography

Abstract: The color visual cryptography methods are free from the limitations of randomness on color images. The two basic ideas used are error diffusion and pixel synchronization. Error diffusion is a simple method, in which the quantization error at each pixel level is filtered and fed as the input to the next pixel. In this way low frequency that is obtained between the input and output image is minimized which in turn give quality images. Degradation of colors are avoided with the help of pixel synchronization. The proposal of this work presents an efficient color image visual cryptic filtering scheme to improve the image quality on restored original image from visual cryptic shares. The proposed color image visual cryptic filtering scheme presents a deblurring effect on the non-uniform distribution of visual cryptic share pixels. After eliminating blurring effects on the pixels, Fourier transformation is applied to normalize the unevenly transformed share pixels on the original restored image. This in turn improves the quality of restored visual cryptographic image to its optimality. In addition the overlapping portions of the two or multiple visual cryptic shares are filtered out with homogeneity of pixel texture property on the restored original image. Experimentation are conducted with standard synthetic and real data set images, which shows better performance of proposed color image visual cryptic filtering scheme measured in terms of PSNR value (improved to 3 times) and share pixel error rate (reduced to nearly 11%) with existing grey visual cryptic filters. The results showed that the noise effects such as blurring on the restoration of original image are removed completely.

Author 1: Shiny Malar F.R
Author 2: Jeya Kumar M.K

Keywords: Error Diffusion; Visual Cryptography; Fourier Filtering; Context Overlapping; Color Extended Visual Cryptography.

PDF

Paper 13: Passwords Selected by Hospital Employees: An Investigative Study

Abstract: The health care industry has benefitted from its employees’ ability to view patient data, but at the same time this access allows for patient’s health care records and information to be easily tampered with or stolen. Access to and transmission of patient data may improve care, increase delivery time of services and reduce health care costs, security of that information may be jeopardized due to the innocent sharing of personal and non-personal data with the wrong person. In this study, we surveyed employees of different size hospitals in various regions of the state who were willing to share their passwords. Our findings indicate that employees need further or additional training in their awareness surrounding password creation.

Author 1: B Dawn Medlin
Author 2: Ken Corley
Author 3: B. Adriana Romaniello

Keywords: Passwords; Security; HIPPA; HITECH.

PDF

Paper 14: Current Trends in Group Key Management

Abstract: Various network applications require sending data onto one or many members, maintaining security in the large groups is one of the major obstacles for controlling access. Unfortunately, IP multicast is not providing any security over the group communication. Group key management is a fundamental mechanism for secured multicast. This paper presents relevant group key management protocols. Then, we compared them against some pertinent performance criteria. Finally, we discuss the new research directions in group key management.

Author 1: R Siva Ranjani
Author 2: Dr.D.Lalitha Bhaskari
Author 3: Dr.P.S.Avadhani3

Keywords: Multicast; group key management, security member driven; time driven.

PDF

Paper 15: CluSandra: A Framework and Algorithm for Data Stream Cluster Analysis

Abstract: The clustering or partitioning of a dataset’s records into groups of similar records is an important aspect of knowledge discovery from datasets. A considerable amount of research has been applied to the identification of clusters in very large multi-dimensional and static datasets. However, the traditional clustering and/or pattern recognition algorithms that have resulted from this research are inefficient for clustering data streams. A data stream is a dynamic dataset that is characterized by a sequence of data records that evolves over time, has extremely fast arrival rates and is unbounded. Today, the world abounds with processes that generate high-speed evolving data streams. Examples include click streams, credit card transactions and sensor networks. The data stream’s inherent characteristics present an interesting set of time and space related challenges for clustering algorithms. In particular, processing time is severely constrained and clustering algorithms must be performed in a single pass over the incoming data. This paper presents both a clustering framework and algorithm that, combined, address these challenges and allows end-users to explore and gain knowledge from evolving data streams. Our approach includes the integration of open source products that are used to control the data stream and facilitate the harnessing of knowledge from the data stream. Experimental results of testing the framework with various data streams are also discussed.

Author 1: Josh R Fernandez
Author 2: Eman M. El-Sheikh

Keywords: data stream; data mining; cluster analysis; knowledge discovery; machine learning; Cassandra database; BIRCH; CluStream; distributed systems.

PDF

Paper 16: Clustering: Applied to Data Structuring and Retrieval

Abstract: Clustering is a very useful scheme for data structuring and retrieval behuhcause it can handle large volumes of multi-dimensional data and employs a very fast algorithm. Other forms of data structuring techniques include hashing and binary tree structures. However, clustering has the advantage of employing little computational storage requirements and a fast speed algorithm. In this paper, clustering, k-means clustering and the approaches to effective clustering are extensively discussed. Clustering was employed as a data grouping and retrieval strategy in the filtering of fingerprints in the Fingerprint Verification Competition 2000 database 4(a). An average penetration of 7.41% obtained from the experiment shows clearly that the clustering scheme is an effective retrieval strategy for the filtering of fingerprints.

Author 1: Ogechukwu N Iloanusi
Author 2: Charles C. Osuagwu

Keywords: component; Clustering; k-means; data retrieval; indexing.

PDF

Paper 17: Irrigation Fuzzy Controller Reduce Tomato Cracking

Abstract: Sunlight heats the greenhouse air temperature and tomato cracking decreases marketable product up to 90%. A shade screen reduced incoming radiation during warm and sunny conditions to reduce tomato cracking. A fuzzy controller managed greenhouse irrigation to reduce tomato cracking using as variables solar radiation and substrate temperature. The embedded controller presented 9 rules and three assumptions that made it operate better. Signal peaks were removed and control actions could take place ten minutes after irrigation. Irrigation was increased during the peak hours from 12:00 to 15:00 h when it was required by the fuzzy controller; meanwhile water containing the nutrient solution was removed during very cloudy days with limited photosynthesis. After three continuous cloudy days irrigation should be scheduled to avoid plant nutrient problems. Substrate temperature in volcanic rock can be used as real time irrigation sensor. Tomato cracking decreased to 29% using the fuzzy controller and canopy temperature never exceeded 30ºC.

Author 1: Federico Hahn

Keywords: component; Fuzzy controller; irrigation controller; tomato cracking.

PDF

Paper 18: 18: Plethora of Cyber Forensics

Abstract: As threats against digital assets have risen and there is necessitate exposing and eliminating hidden risks and threats. The ability of exposing is called “cyber forensics.” Cyber Penetrators have adopted more sophistical tools and tactics that endanger the operations of the global phenomena. These attackers are also using anti-forensic techniques to hide evidence of a cyber crime. Cyber forensics tools must increase its toughness and counteract these advanced persistent threats. This paper focuses on briefing of Cyber forensics, various phases of cyber forensics, handy tools and new research trends and issues in this fascinated area.

Author 1: N Sridhar
Author 2: Dr.D.Lalitha Bhaskari
Author 3: Dr.P.S.Avadhani3

Keywords: Cyber Forensics; digital evidence; forensics tools; cyber crimes.

PDF

Paper 19: A Fuzzy Similarity Based Concept Mining Model for Text Classification

Abstract: Text Classification is a challenging and a red hot field in the current scenario and has great importance in text categorization applications. A lot of research work has been done in this field but there is a need to categorize a collection of text documents into mutually exclusive categories by extracting the concepts or features using supervised learning paradigm and different classification algorithms. In this paper, a new Fuzzy Similarity Based Concept Mining Model (FSCMM) is proposed to classify a set of text documents into pre - defined Category Groups (CG) by providing them training and preparing on the sentence, document and integrated corpora levels along with feature reduction, ambiguity removal on each level to achieve high system performance. Fuzzy Feature Category Similarity Analyzer (FFCSA) is used to analyze each extracted feature of Integrated Corpora Feature Vector (ICFV) with the corresponding categories or classes. This model uses Support Vector Machine Classifier (SVMC) to classify correctly the training data patterns into two groups; i. e., + 1 and – 1, thereby producing accurate and correct results. The proposed model works efficiently and effectively with great performance and high - accuracy results.

Author 1: Shalini Puri

Keywords: Text Classification; Natural Language Processing; Feature Extraction; Concept Mining; Fuzzy Similarity Analyzer; Dimensionality Reduction; Sentence Level; Document Level; Integrated Corpora Level Processing.

PDF

Paper 20: Improved Echo cancellation in VOIP

Abstract: VoIP (voice over internet protocol) is very popular communication technology of this century and has played tremendous role in communication system. It is preferred by all because it deploys many benefits it uses Internet protocol (IP) networks to deliver multimedia information such as speech over a data network. VoIP system can be configured in these connection modes respectively; PC to PC, Telephony to Telephony and PC to Telephony. Echo is very annoying problem which occurs in VoIP and echo reduces the voice quality of VoIP. It is not possible to remove echo 100% from echoed signal because if echo is tried to be eliminated completely then the attempt may distort the main signal. That is why echo cannot be eliminated echo perfectly but the echo to a tolerable range. Clipping is not a good solution to suppress echo because part of speech may erroneously removed. Besides an NLP does not respond rapidly enough and also confuses the fading of the voice level at the end of a sentence with a residual echo. This paper has proposed echo cancellation in VoIP that has been tested and verified by MATLAB. The goal was to suppress echo without clipping and distorting the main signal. By the help of MATLAB program the echo is minimized to enduring level so that the received signal seems echo free. The percentage of suppressing echo varies with the amplitude of the main signal. With regarding the amplitude variation in received (echo free) signal the proposed method performs better in finding the echo free signal than the other conventional system.

Author 1: Patrashiya Magdolina Halder
Author 2: A.K.M. Fazlul Haque

Keywords: PSTN; round trip delay; impedance; inverse filtering; denoise; histogram amplifier; repeater.

PDF

Paper 21: A New Test Method on the Convergence and Divergence for Infinite Integral

Abstract: The way to distinguish convergence or divergence of an infinite integral on non-negative continuous function is the important and difficult question in the mathematical teaching all the time. Using the comparison of integrands to judge some exceptional infinite integrals are hard or even useless. In this paper, we establish the exponential integrating factor of negative function, and present a new method to test based on its exponential integrating factor. These conclusions are convenient and valid additions of the previously known results.

Author 1: Guocheng Li

Keywords: Infinite integral; Exponential integrating factor; Convergence and divergence.

PDF

Paper 22: Adaptive Outlier-tolerant Exponential Smoothing Prediction Algorithms with Applications to Predict the Temperature in Spacecraft

Abstract: The exponential smoothing prediction algorithm is widely used in spaceflight control and in process monitoring as well as in economical prediction. There are two key conundrums which are open: one is about the selective rule of the parameter in the exponential smoothing prediction, and the other is how to improve the bad influence of outliers on prediction. In this paper a new practical outlier-tolerant algorithm is built to select adaptively proper parameter, and the exponential smoothing prediction algorithm is modified to prevent any bad influence from outliers in sampling data. These two new algorithms are valid and effective to overcome the two open conundrums stated above. Simulation and practical results of sampling data from temperature sensors in a spacecraft show that this new adaptive outlier-tolerant exponential smoothing prediction algorithm has the power to eliminate bad infection of outliers on prediction of process state in future.

Author 1: Hu Shaolin
Author 2: Li Ye
Author 3: Zhang Wei
Author 4: Fan Shunxi

Keywords: Exponential prediction; Adaptive smoothing prediction; Outlier-tolerance smoothing prediction.

PDF

Paper 23: Towards Quranic reader controlled by speech

Abstract: In this paper we describe the process of designing a task-oriented continuous speech recognition system for Arabic, based on CMU Sphinx4, to be used in the voice interface of Quranic reader. The concept of the Quranic reader controlled by speech is presented, the collection of the corpus and creation of acoustic model are described in detail taking into account a specificities of Arabic language and the desired application.

Author 1: Yacine Yekache
Author 2: Yekhlef Mekelleche
Author 3: Belkacem Kouninef

Keywords: arabic speech recognition; quranic reader; speech corpus; HMM; acoustic model.

PDF

Paper 25: A novel approach for pre-processing of face detection system based on HSV color space and IWPT

Abstract: Face detection system is challenging area of research in the field of security surveillance. Preprocessing of facial image data is very important part of face detection system. Now days various method of facial image data preprocessing are available, but all these method are not up to mark. Now we have a novel approach for preprocessing of face detection system based on HSV color space and integer wavelet packet transform method. And finally in this paper we have used LBP (local binary pattern) and SVM classification process are used.

Author 1: Megha Gupta
Author 2: Neetesh Gupta

Keywords: facial image, HSV color space, IWPT, SVM.

PDF

Paper 26: A new approach of designing Multi-Agent Systems

Abstract: Agent technology is a software paradigm that permits to implement large and complex distributed applications [1]. In order to assist analyzing, conception and development or implementation phases of multi-agent systems, we’ve tried to present a practical application of a generic and scalable method of a MAS with a component-oriented architecture and agent-based approach that allows MDA to generate source code from a given model. We’ve designed on AUML the class diagrams as a class meta-model of different agents of a MAS. Then we generated the source code of the models developed using an open source tool called AndroMDA. This agent-based and evolutive approach enhances the modularity and genericity developments and promotes their reusability in future developments. This property distinguishes our design methodology of existing methodologies in that it is constrained by any particular agent-based model while providing a library of generic models [2].

Author 1: Sara Maalal
Author 2: Malika Addou

Keywords: Software agents; Multi-agents Systems (MAS); Analysis; Software design; Modeling; Models; Diagrams; Architecture; Model Driven Architecture (MDA); Agent Unified Modeling Language (AUML); Agent Modeling Language (AML).

PDF

The Science and Information (SAI) Organization
BACK TO TOP

Computer Science Journal

  • About the Journal
  • Call for Papers
  • Submit Paper
  • Indexing

Our Conferences

  • Computing Conference
  • Intelligent Systems Conference
  • Future Technologies Conference
  • Communication Conference

Help & Support

  • Contact Us
  • About Us
  • Terms and Conditions
  • Privacy Policy

© The Science and Information (SAI) Organization Limited. All rights reserved. Registered in England and Wales. Company Number 8933205. thesai.org