The Science and Information (SAI) Organization
  • Home
  • About Us
  • Journals
  • Conferences
  • Contact Us

Publication Links

  • IJACSA
  • Author Guidelines
  • Publication Policies
  • Digital Archiving Policy
  • Promote your Publication
  • Metadata Harvesting (OAI2)

IJACSA

  • About the Journal
  • Call for Papers
  • Editorial Board
  • Author Guidelines
  • Submit your Paper
  • Current Issue
  • Archives
  • Indexing
  • Fees/ APC
  • Reviewers
  • Apply as a Reviewer

IJARAI

  • About the Journal
  • Archives
  • Indexing & Archiving

Special Issues

  • Home
  • Archives
  • Proposals
  • Guest Editors
  • SUSAI-EE 2025
  • ICONS-BA 2025
  • IoT-BLOCK 2025

Future of Information and Communication Conference (FICC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Computing Conference

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Intelligent Systems Conference (IntelliSys)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Future Technologies Conference (FTC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact
  • Home
  • Call for Papers
  • Editorial Board
  • Guidelines
  • Submit
  • Current Issue
  • Archives
  • Indexing
  • Fees
  • Reviewers
  • Subscribe

IJACSA Volume 4 Issue 11

Copyright Statement: This is an open access publication licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.

View Full Issue

Paper 1: Implicit sensitive text summarization based on data conveyed by connectives

Abstract: So far and trying to reach human capabilities, research in automatic summarization has been based on hypothesis that are both enabling and limiting. Some of these limitations are: how to take into account and reflect (in the generated summary) the implicit information conveyed in the text, the author intention, the reader intention, the context influence, the general world knowledge…. Thus, if we want machines to mimic human abilities, then they will need access to this same large variety of knowledge. The implicit is affecting the orientation and the argumentation of the text and consequently its summary. Most of Text Summarizers (TS) are processing as compressing the initial data and they necessarily suffer from information loss. TS are focusing on features of the text only, not on what the author intended or why the reader is reading the text. In this paper, we address this problem and we present a system focusing on acquiring knowledge that is implicit. We principally spotlight the implicit information conveyed by the argumentative connectives such as : but, even, yet …. and their effect on the summary.

Author 1: Henda Chorfi Ouertani

Keywords: Automatic summarization; implicit data; topoi; topos; argumentation

PDF

Paper 2: The Development of Learning Resource for the Saleng Community under the Bridge of Zone 1 Entitled “How to Repair Electrical Appliances”

Abstract: This research was aimed to develop a learning resource for the Saleng community under the bridge of zone 1 entitled “How to Repair Electrical Appliances” in order to determine the quality of learning community and to examine the satisfaction of the sampling group which was chosen using specified sampling method. The tools used in this study consisted of 1) learning resource for the Saleng community under the bridge of zone 1 entitled “How to Repair Electrical Appliances”, including video clips, posters, leaflets, and exhibitions; 2) the quality assessment forms; and 3) the satisfaction evaluation form. According to the quality assessment of the learning resource for the Saleng community under the bridge of zone 1 by the panel of 6 experts, the mean score for the quality in terms of contents was 4.83 with S.D. of 0.29, or at a very good level. As for the quality in terms of media, the mean score was 4.47 with S.D. of .63, or at a good level. Afterwards, the learning resource for the Saleng community under the bridge of zone 1 entitled “How to Repair Electrical Appliances” was used by the sampling group of 30 persons. The satisfaction towards the learning resource was 4.71 with S.D. of .64, or at the highest level. It could be concluded that the learning resource for the Saleng community under the bridge of zone 1 entitled “How to Repair Electrical Appliances” can be used as a practical instructional tool for the community.

Author 1: Pornpapatsorn Princhankol
Author 2: Kuntida Thamwipat
Author 3: Paveena Thambunharn
Author 4: Wuttipong Phansatarn

Keywords: learning resource; Saleng community under the bridge of zone 1; repairing electrical appliances

PDF

Paper 3: Image fusion approach with noise reduction using Genetic algorithm

Abstract: Image fusion is becoming a challenging field as for its importance to different applications, Multi focus image fusion is a type of image fusion that is used in medical fields, surveillances, and military issues to get the image all in focus from multi images every one is in focus in a different part, and for making the input images more accurate before making the fusing process we use Genetic Algorithm (GA) for image de-noising as a preprocessing process. In our research paper we introduce a new approach that begin with image de-noising using GA and then apply the curvelet transform for image decomposition to get a multi focus image fusion image that is focused in all of its parts. The results show that Curvelet transform had been proven to be effective at detecting image activity along curves, and increasing the quality of the obtained fused images. And applying the mean fusion rule for fusing multi-focus images gives accurate results than PCA, contrast and mode fusion rule, Also, GA shows more accurate results in image de-noising after comparing it to contourlet transform.

Author 1: Gehad Mohamed Taher
Author 2: Mohamed Elsayed Wahed
Author 3: Ghada El Taweal
Author 4: Ahmed Fouad

Keywords: Multi-focus image fusion; Curvelet transform; genetic algorithm Introduction

PDF

Paper 4: Security of Mobile Phones and Their Usage in Business

Abstract: The purpose of this document is to provide an overview on the growth on mobile phone and PDA devices and use in business-oriented modern day life style. The explosion of smartphones in enterprise and personal computing heighten the concerns of security and privacy of users. Now a day’s use of mobile is in every walk of life like shopping, trading, paying bill and even using internet banking. But with these facilities some draw backs are also there. Recent studies have shown that applications can host new types of malware. This discussion explores smartphone security through several research works and how user himself can avoid from data hacking and other insecurities.

Author 1: Abdullah Saleh Alqahtani

Keywords: Smartphone; PDA; security; business-oriented; applications

PDF

Paper 5: Performance Comparison between Naïve Bayes, Decision Tree and k-Nearest Neighbor in Searching Alternative Design in an Energy Simulation Tool

Abstract: Energy simulation tool is a tool to simulate energy use by a building prior to the erection of the building. Commonly it has a feature providing alternative designs that are better than the user’s design. In this paper, we propose a novel method in searching alternative design that is by using classification method. The classifiers we use are Naïve Bayes, Decision Tree, and k-Nearest Neighbor. Our experiment shows that Decision Tree has the fastest classification time followed by Naïve Bayes and k-Nearest Neighbor. The differences between classification time of Decision Tree and Naïve Bayes also between Naïve Bayes and k-NN are about an order of magnitude. Based on Percision, Recall, F-measure, Accuracy, and AUC, the performance of Naïve Bayes is the best. It outperforms Decision Tree and k-Nearest Neighbor on all parameters but precision.

Author 1: Ahmad Ashari
Author 2: Iman Paryudi
Author 3: A Min Tjoa

Keywords: energy simulation tool; classification method; naïve bayes; decision tree; k-nearest neighbor

PDF

Paper 6: Modification of Contract Net Protocol (CNP) : A Rule-Updation Approach

Abstract: Coordination in multi-agent system is very essential, in order to perform complex tasks and lead MAS towards its goal. Also, the member agents of multi-agent system should be autonomous as well as collaborative to accomplish the complex task for which multi-agent system is designed specifically. Contract-Net Protocol (CNP) is one of the coordination mechanisms which is used by multi-agent systems which prefer coordination through interaction protocols. In order to overcome the limitations of conventional CNP, this paper proposes a modification in conventional CNP called updated-CNP. Updated-CNP is an effort towards updating of a CNP in terms of its limitations of modifiability and communication overhead. The limitation of the modification of tasks, if the task requirements change at any instance, corresponding to tasks which are allocated to contractor agents by manager agents is possible in our updated-CNP version, which was not possible in the case of conventional-CNP, as it has to be restarted in the case of task modification. This in turn will be reducing the communication overhead of CNP, which is time taken by various agents using CNP to pass messages to each other. For the illustration of the updated CNP, we have used a sound predator-prey case study.

Author 1: Sandeep Kaur
Author 2: Harjot Kaur
Author 3: Sumeet Kaur Sehra

Keywords: Multi-Agent System; Coordination; Communication Language; Norm-based Contract Net Protocol; utility parameters

PDF

Paper 7: Blind Turing-Machines: Arbitrary Private Computations from Group Homomorphic Encryption

Abstract: Secure function evaluation (SFE) is the process of computing a function (or running an algorithm) on some data, while keeping the input, output and intermediate results hidden from the environment in which the function is evaluated. This can be done using fully homomorphic encryption, Yao's garbled circuits or secure multiparty computation. Applications are manifold, most prominently the outsourcing of computations to cloud service providers, where data is to be manipulated and processed in full confidentiality. Today, one of the most intensively studied solutions to SFE is fully homomorphic encryption (FHE). Ever since the first such systems have been discovered in 2009, and despite much progress, FHE still remains inefficient and difficult to implement practically. Similar concerns apply to garbled circuits and (generic) multiparty computation protocols. In this work, we introduce the concept of a blind Turing-machine, which uses simple homomorphic encryption (an extension of ElGamal encryption) to process ciphertexts in the way as standard Turing-machines do, thus achieving computability of any function in total privacy. Remarkably, this shows that fully homomorphic encryption is indeed an overly strong primitive to do SFE, as group homomorphic encryption with equality check is already sufficient. Moreover, the technique is easy to implement and perhaps opens the door to efficient private computations on nowadays computing machinery, requiring only simple changes to well-established computer architectures.

Author 1: Stefan Rass

Keywords: secure function evaluation; homomorphic encryption; chosen ciphertext security; cloud computing

PDF

Paper 8: An Exploratory study of proposed factors to Adopt e-government Services

Abstract: this paper discusses e-government, in particular the challenges that face adoption of e-government in Saudi Arabia. In this research we define e-government as a matrix of stakeholders: governments to governments, governments to business and governments to citizens, using information and communications technology to deliver and consume services. e-government services still face many challenges in their implementation and general adoption in many countries including Saudi Arabia. In addition, the background and the discussion identify the influential factors that affect the citizens’ intention to adopt e-government services in Saudi Arabia. Consequently, these factors have been defined and categorized followed by an exploratory study to examine the importance of these factors. Therefore, this research has identified factors that determine if the citizen will adopt e-government services and thereby aiding governments in accessing what is required to increase adoption.

Author 1: Sulaiman A. Alateyah
Author 2: Richard M Crowder
Author 3: Gary B Wills

Keywords: adoption; citizens’ intention; e-government; e-government models; influential factors; Saudi Arabia

PDF

Paper 9: Grouping-based Scheduling with Load Balancing for Fine-Grained Jobs in Grid Computing

Abstract: Grid computing is characterized by the existence of a collection of heterogeneous geographically distributed resources that are connected over high speed networks. Job scheduling and resource management have been a great challenge to researchers in the area of grid computing. Very often, there are applications having a large number of fine-grained jobs. Sending these fine-grained jobs individually to be executed on grid resources that have high processing power reduces resource utilization and is thus uneconomical. This paper presents efficient grouping-based scheduling models that group fine-grained jobs to form coarse-grained jobs which are sent for execution on grid resources. Our grouping strategy is based on the processing capability of resources and the processing requirements of grouped jobs. A load balancing approach is also presented to achieve efficient utilization of resources. Simulation experiments were conducted using the Gridsim toolkit. Results show that the total simulation time and the cost are improved by grouping. Furthermore, our load balancing approach enhances resource utilization and achieves load balancing among resources.

Author 1: Rabab Mohamed Ezzat
Author 2: Amal Elsayed Aboutabl
Author 3: Mostafa Sami Mostafa

Keywords: grid computing; job scheduling; job grouping; load balancing; resource utilization; Gridsim

PDF

Paper 10: Performance Evaluation for the DIPDAM scheme on the OLSR and the AODV MANETs Routing Protocols

Abstract: the DIPDAM scheme is a fully-distributed message exchange framework designed to overcome the challenges caused by the decentralized and dynamic characteristics of mobile ad-hoc networks. The DIPDAM mechanism is based on three parts Path Validation Message (PVM) enables E2E feedback loop between the source and the destination, Attacker Finder Message (AFM) to detect attacker node through the routing path, and Attacker Isolation Message (AIM) to isolate the attacker from routing path and update the black list for each node then trigger to neighbors with updated information. The DIPDAM scheme was fully tested on the OLSR routing protocol. In order to prove the efficiency of DIPDAM scheme on detection and isolation packet dropping attackers, DIPDAM is applied to another routing protocol category, AODV. AODV represents different concepts in routing path calculation and it is widely adopted. The comparison between the two routing protocol is tested on smart attackers. The goal from this comparison is to prove that the DIPDAM scheme can be applied to a different routing protocols category.

Author 1: Ahmad Almazeed
Author 2: Ahmed Mohamed Abdalla

Keywords: Ad hoc networks; AODV; Computer network management; IDS; MANETS; OLSR

PDF

Paper 11: Control of Single Axis Magnetic Levitation System Using Fuzzy Logic Control

Abstract: This paper presents a fuzzy logic controller design for the stabilization of magnetic levitation system (Maglev 's).Additionally, the investigation on Linear Quadratic Regulator Controller (LQRC) also mentioned here. This paper presents the difference between the performance of fuzzy logic control (FLC) and LQRC for the same linear model of magnetic levitation system .A magnetic levitation is a nonlinear unstable system and the fuzzy logic controller brings the magnetic levitation system to a stable region by keeping a magnetic ball suspended in the air. The modeling of the system is simulated using Matlab Simulink and connected to Hilink platform and the maglev model of Zeltom company. This paper presents a comparison for both LQRC and FLC to control a ball suspended on the air. The performance results of simulation shows that the fuzzy logic controller had better performance than the LQR control.

Author 1: Tania Tariq Salim
Author 2: Vedat Mehmet Karsli

Keywords: Magnetic Levitation; System MAGLEV; Fuzzy Control; Linear Quadratic Regulator Controller

PDF

Paper 12: Developing Parallel Application on Multi-core Mobile Phone

Abstract: One cannot imagine daily life today without mobile devices such as mobile phones or PDAs. They tend to become your mobile computer offering all features one might need on the way. As a result devices are less expensive and include a huge amount of high end technological components. Thus they also become attractive for scientific research. Today multi-core mobile phones are taking all the attention. Relying on the principles of tasks and data parallelism, we propose in this paper a real-time mobile lane departure warning system (M-LDWS) based on a carefully designed parallel programming framework on a quad-core mobile phone, and show how to increase the utilization of processors to achieve improvement on the system’s runtime.

Author 1: Dhuha Basheer Abdullah
Author 2: Mohammed M. Al-Hafidh

Keywords: Mobile phone; Parallel programming; Multi-core processor; Lane detection

PDF

Paper 13: Cross Correlation versus Mutual Information for Image Mosaicing

Abstract: This paper reviews the concept of image mosaicing and presents a comparison between two of the most common image mosaicing techniques. The first technique is based on normalized cross correlation (NCC) for registering overlapping 2D images of a 3D scene. The second is based on mutual information (MI). The experimental results demonstrate that the two techniques have a similar performance in most cases but there are some interesting differences. The choice of a distinctive template is critical when working with NCC. On the other hand, when using MI, the registration procedure was able to provide acceptable performance even without distinctive templates. But generally the performance when using MI with large rotation angles was not accurate as with NCC.

Author 1: Sherin Ghannam
Author 2: A. Lynn Abbott

Keywords: mosaicing; normalized cross correlation; mutual information

PDF

Paper 14: Service Pyramid Concept of Knowledge Intensive Business Services in the Small and Medium Sized Enterprises Sector

Abstract: The activity of service companies is more complex today than before the use of Information and Communication Technology (ICT) became widespread in business. Fewer service companies can be found on the market based solely on physical customer interaction; however, they have been replaced with standardized and automated services. This structural change can be observed particularly among Knowledge Intensive Business Services (KIBS) companies where the use of ICT is not simply a market requirement, but a competition tool, as well. Without the application of any ICT instrument, a KIBS company could not meet market expectations, and furthermore, business developments are mainly ICT-based. On the other hand, companies need to develop their businesses more and more, as KIBS companies which are not able to differentiate themselves as trustworthy on the business services market will disappear. ‘Just another business service company’ cannot really sell today. This is applicable to a greater extent to Small and Medium Sized Enterprises (SME), where ICT has opened market opportunities that have never existed for them before. The aim of this paper is to highlight the new features of KIBS business activities in the SME sector and the related research questions.

Author 1: Sándor Nagy

Keywords: knowledge intensive business services; information and communication technology; small and medium sized enterprises; productisation; service product; service pyramid

PDF

Paper 15: Software Development Effort Estimation by Means of Genetic Programming

Abstract: In this study, a genetic programming technique was used with the goal of estimating the effort required in the development of individual projects. Results obtained were compared with those generated by a statistical regression and by a neural network that have already been used to estimate the development effort of individual software projects. A sample of 132 projects developed by 40 programmers was used for generating the three models and another sample of 77 projects developed by 24 programmers was used for validating the three models. Results in the accuracy of the model obtained from genetic programming suggest that it could be used to estimate software development effort of individual projects.

Author 1: Arturo Chavoya
Author 2: Cuauhtemoc Lopez-Martin
Author 3: M.E. Meda-Campaña

Keywords: genetic programming; feedforward neural network; software effort estimation; statistical regression

PDF

Paper 16: An analysis of Internet Banking in Portugal

Abstract: In recent years, mobile operations have gained wide popularity among mainstream users, and banks tend to follow this trend. But are bank customers ready to move forward? Mobile banking appears to be a natural extension of Internet banking, . Thus, to predict consumer decisions to adopt mobile banking, it’s useful to understand the pattern of adoption of Internet banking (IB). This investigation seeks contribute to an expansion of the knowledge regarding this matter by researching Portuguese consumers’ patterns and behaviors concerning the acceptance and use intention of IB as a foundation for establishing growth strategies of mobile banking. For data collection, we used an online “snowball” process. The statistical treatment used included a factor analysis in order to allow examination of the interrelationships between the original variables. The analysis was made possible by developing a set of factors that expresses the common traits between them. The results revealed that the majority of respondents did not identify problems with the use of and interaction with the IB service. The study generated some interesting findings. First, the data generally supports the conceptual framework presented. However, some points need to be made: (i) trust and convenience, from all the elements referenced in the literature as relevant from the client’ perspective, continue to be a very important elements; (ii) the results did not support the paradigm that the characteristics of individuals affect their behavior as consumers, (iii) individual technological characteristics affect consumer adoption of IB service; (iv) consumer perceptions about the IB service affect their use, as reveal by the existence of three types of customers that show different practices and perceptions of IB; and (v) intention to use IB is dependent upon attitudes and subjective norms regarding the use of IB.

Author 1: João Pedro Couto
Author 2: Teresa Tiago
Author 3: Flávio Tiago

Keywords: internet banking; mobile banking; technology adoption models; Portugal

PDF

Paper 17: Using Learning Analytics to Understand the Design of an Intelligent Language Tutor – Chatbot Lucy

Abstract: the goal of this article is to explore how learning analytics can be used to predict and advise the design of an intelligent language tutor, chatbot Lucy. With its focus on using student-produced data to understand the design of Lucy to assist English language learning, this research can be a valuable component for language-learning designers to improve second language acquisition. In this article, we present students’ learning journey and data trails, the chatting log architecture and resultant applications to the design of language learning systems.

Author 1: Yi Fei Wang
Author 2: Stephen Petrina

Keywords: learning analytics; intelligent tutor; chatbot; second language acquisition; learning design

PDF

Paper 18: Web Resources Annotation for the Web of Learning

Abstract: Semantic annotation of web resources is an essential ingredient to leverage the web of information to the semantic web where resources are easily shared and reused. In the education field, reusing hypermedia web resources can support to a great deal the design of modern instructional environments and the development of interactive and non-linear material for learning. Sharing and reusing these resources by different web applications and services presupposes that they are visible for retrieval through a semantic description of their content, function and relations with other resources. This paper presents the annotation and discovery of web resources to create learning objects that constitute the building blocks of learning sessions which are delivered to users in the Web of Learning. Semantic annotation is done by the contextual exploration method which analyzes web resources’ text descriptions and metadata in order to annotate automatically resources. We present the system architecture and a case study that illustrates the proposed approach.

Author 1: Jawad Berri

Keywords: Web resources; semantic annotation; web of learning; contextual exploration

PDF

Paper 19: An Assessment of 3G Mobile Service Acceptance in Bangladesh

Abstract: This paper aims to find out the key factors influencing mobile users to adopt 3G technology and affecting the subscriber’s feedback while using third generation (3G) mobile services that are available for one year in Bangladesh. An interesting fact that motivated this research was the significant low rate of 3G service usage among mobile operators in Bangladesh though we get the completely opposite picture worldwide. To examine the user acceptance and to depict user behavioral pattern, data were collected from 200 respondents through a survey. The analysis was done into two categories: one was in general and the other one was department based. The results of the study revealed the user intention, awareness, attitude, expectation, key 3G service usage etc.The findings have future implications for existing as well as newly arrived service providers who have very recently started their journey. Considering these identified factors would provide the directions for telecom operators to achieve high rate of 3G service adoption and to provide more successful 3G services.However, the study covered a limited area where those findings are applicable. The result of this study might be helpful for the telecom operators while targeting the 3G subscriber market and also for the future research on this field.

Author 1: Tajmary Mahfuz
Author 2: Subhenur Latif

Keywords: Awareness; Adoption; 3G mobile service; usage pattern

PDF

Paper 20: CAPTCHA Based on Human Cognitive Factor

Abstract: A CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) is an automatic security mechanism used to determine whether the user is a human or a malicious computer program. It is a program that generates and grades tests that are human solvable, but intends to be beyond the capabilities of current computer programs. CAPTCHA should be designed to be very easy for humans but very hard for machines. Unfortunately, the existing CAPTCHA systems while trying to maximize the difficulty for automated programs to pass tests by increasing distortion or noise have consequently, made it also very difficult for potential users. To address the issue, this paper addresses an alternative form of CAPTCHA that provides a variety of questions from mathematical, logical and general problems which only human can understand and answer correctly in a given time. The proposed framework supports diversity in choosing the questions to be answered and a user-friendly framework to the users. A user-study is also conducted to judge the performance of the developed system with different background. The study shows the efficacy of the implemented system with a good level of user satisfaction over traditional CAPTCHA available today.

Author 1: Mohammad Jabed Morshed Chowdhury
Author 2: Narayan Ranjan Chakraborty

Keywords: CAPTCHA; Usability; Security; Cognitive; Psychology

PDF

Paper 21: A Pilot Study Examining the Online Behavior of Web Users with Visual Impairments

Abstract: This report presents the results of a pilot study on the online behavioral habits of 46 internet users; 26 of whom self-identified as having a visual impairment (either blind or low vision). While significant research exists which documents the degree of difficulty that users with visual impairments have in interacting with the Web relative to the sighted, few have addressed the degree to which this usability disparity impacts online behavior; information seeking and online exploratory behaviors especially. Fewer still have addressed this usability disparity within the context of distinct website types; i.e. are usability issues more pronounced with certain categories of websites as opposed to others? This pilot study was effective both in exploring these issues and in identifying the accessibility of online social networks as a primary topic of investigation with respect to the formal study that is to follow.

Author 1: Julian Brinkley
Author 2: Nasseh Tabrizi

Keywords: Web Accessibility; Social Networking; Human Computer Interaction

PDF

Paper 22: Inverted Indexing In Big Data Using Hadoop Multiple Node Cluster

Abstract: Inverted Indexing is an efficient, standard data structure, most suited for search operation over an exhaustive set of data. The huge set of data is mostly unstructured and does not fit into traditional database categories. Large scale processing of such data needs a distributed framework such as Hadoop where computational resources could easily be shared and accessed. An implementation of a search engine in Hadoop over millions of Wikipedia documents using an inverted index data structure would be carried out for making search operation more accomplished. Inverted index data structure is used for mapping a word in a file or set of files to their corresponding locations. A hash table is used in this data structure which stores each word as index and their corresponding locations as its values thereby providing easy lookup and retrieval of data making it suitable for search operations.

Author 1: Kaushik Velusamy
Author 2: Deepthi Venkitaramanan
Author 3: Nivetha Vijayaraju
Author 4: Greeshma Suresh
Author 5: Divya Madhu

Keywords: Hadoop; Big data; inverted indexing; data structure

PDF

Paper 23: Mobile Robots in Teaching Programming for IT Engineers and its Effects

Abstract: in this paper the new methods and devices introduced into the learning process of programming for IT engineers at our college is described. Based on our previous research results we supposed that project methods and some new devices can reduce programming problems during the first term. These problems are rooted in the difficulties of abstract thinking and they can cause the decrease of programming self-concept and other learning motives. We redesigned the traditional learning environment. As a constructive approach project method was used. Our students worked in groups of two or three; small problems were solved after every lesson. In the problem solving process students use programmable robots (e.g. Surveyor, LEGO NXT and RCX). They had to plan their program, solve some technical problems and test their solution. The usability of mobile robots in the learning process and the short-term efficiency of our teaching method were checked with a control group after a semester (n = 149). We examined the effects on our students’ programming skills and on their motives, mainly on their attitudes and programming self-concept. After a two-year-long period we could measure some positive long-term effects.

Author 1: Attila Pásztor
Author 2: Róbert Pap-Szigeti
Author 3: Erika Török

Keywords: programmable mobile robots; project method; positive effects

PDF

Paper 24: Building future generation service-oriented information broker networks

Abstract: Future generation networks target collecting intelligence from multiple sources based on end-users' data and their social interaction in order to draw useful conclusions on enabling users to execute their rights to online privacy. These networks form a rising class of service-oriented broker platforms. Designers and providers of such network platforms during the design and development of their systems focus primarily on technical specifications and issues. However, given the importance and richness of user information collected, they should already at the design phase take into account legal and ethical requirements. Failure to do so, may result in privacy violations, which may, in turn, affect the success of the network due to increasing awareness with respect to users’ privacy and security concerns, and may incur future costs. In this paper, we show how the di.me system balanced technical and legal requirements through both its design and implementation, while building a decentralized social networking platform. We report on our advances and experiences through a prototypical technology realizing such a platform, analyze the legal implications within the EU legal framework, and provide recommendations and conclusions for user-friendly service-oriented broker platforms.

Author 1: Sophie Wrobel
Author 2: Eleni Kosta
Author 3: Mohamed Bourimi
Author 4: Rafael Giménez
Author 5: Simon Scerri

Keywords: di.me; online privacy; social media; software design; legal and ethical issues; broker platform; context-aware web services; user data

PDF

Paper 25: pGBbBShift - Perceptual Generalized Bitplane-by-Bitplane Shift

Abstract: The paper we present pGBbBShift. This algorithm permits to code any Region of Interest (ROI) in a perceptual way, i.e. the presented algorithm introduces some characteristics of the Human Visual System. Furthermore, it introduces features of chromatic induction to the GBbBShift method when bitplanes of ROI and background areas are coded. Thus, the included features balance visual importance of some pixels regardless their numerical importance, namely we avoid to use Information Theory criteria. Visual criteria are applied using the CIWaM, which is contrast band-pass ?lter that predicts color perception. pGBbBShift is compared against classical ROI algorithms, such as the MaxShift method of JPEG2000 and results show that there is no perceptual difference. pGBbBShift method is an open algorithm that can be applied in any wavelet based image coder such as JPEG2000, SPIHT or SPECK. Finally, we applied pGBbBShift to Hi-SET coder and we obtain the best results when the overall visual image quality is assessed

Author 1: Jaime Moreno

Keywords: Image Coding; JPEG2000; Hi-SET; region of interest (ROI); bitplane coding; wavelet coding; maximum shift (MaxShift); bitplane-by-bitplane shift (BbBShift); generalized bitplane-by-bitplane shift (GBbBShift)

PDF

Paper 26: Personalized Real Time Weather Forecasting With Recommendations

Abstract: Temperature forecasting and rain forecasting in today's environment is playing a major role in many fields like transportation, tour planning and agriculture. The purpose of this paper is to provide a real time forecasting to the user according to their current position and requirement. The simplest method of forecasting the weather, persistence, relies upon today's conditions to forecast the conditions tomorrow i.e. analyzing historical data for predicting future weather conditions. The weather data used for the DM research include daily temperature, daily pressure and monthly rainfall.

Author 1: Abhishek Kumar Singh
Author 2: Aditi Sharma
Author 3: Rahul Mishra

Keywords: Weather Forcasting; NOAA

PDF

Paper 27: Software Effort Estimation Inspired by COCOMO and FP Models: A Fuzzy Logic Approach

Abstract: Budgeting, bidding and planning of software project effort, time and cost are essential elements of any software development process. Massive size and complexity of now a day produced software systems cause a substantial risk for the development process. Inadequate and inefficient information about the size and complexity results in an ambiguous estimates that cause many losses. Project managers cannot adequately provide good estimate for both the effort and time needed. Thus, no clear release day to the market can be defined. This paper presents two new models for software effort estimation using fuzzy logic. One model is developed based on the famous COnstructive COst Model (COCOMO) and utilizes the Source Line Of Code (SLOC) as input variable to estimate the Effort (E); while the second model utilize the Inputs, Outputs, Files, and User Inquiries to estimate the Function Point (FP). The proposed fuzzy models show better estimation capabilities compared to other reported models in the literature and better assist the project manager in computing the software required development effort. The validation results are carried out using Albrecht data set.

Author 1: Alaa F. Sheta
Author 2: Sultan Aljahdali

PDF

Paper 28: A General Framework of Generating Estimation Functions for Computing the Mutual Information of Terms

Abstract: Computing statistical dependence of terms in textual documents is a widely studied subject and a core problem in many areas of science. This study focuses on such a problem and explores the techniques of estimation using the expected mutual information measure. A general framework is established for tackling a variety of estimations: (i) general forms of estimation functions are introduced; (ii) a set of constraints for the estimation functions is discussed; (iii) general forms of probability distributions are defined; (iv) general forms of the measures for calculating mutual information of terms (MIT) are formalised; (v) properties of the MIT measures are studied and, (vi) relations between the MIT measures are revealed. Four estimation methods, as examples, are proposed and mathematical meanings of the individual methods are respectively interpreted. The methods may be directly applied to practical problems for computing dependence values of individual term pairs. Due to its generality, our method is applicable to various areas, involving statistical semantic analysis of textual data.

Author 1: D. Cai
Author 2: T.L. McCluskey

Keywords: mutual information of terms (MIT); term dependence; statistical semantic analysis; probability estimation.

PDF

The Science and Information (SAI) Organization
BACK TO TOP

Computer Science Journal

  • About the Journal
  • Call for Papers
  • Submit Paper
  • Indexing

Our Conferences

  • Computing Conference
  • Intelligent Systems Conference
  • Future Technologies Conference
  • Communication Conference

Help & Support

  • Contact Us
  • About Us
  • Terms and Conditions
  • Privacy Policy

© The Science and Information (SAI) Organization Limited. All rights reserved. Registered in England and Wales. Company Number 8933205. thesai.org