The Science and Information (SAI) Organization
  • Home
  • About Us
  • Journals
  • Conferences
  • Contact Us

Publication Links

  • IJACSA
  • Author Guidelines
  • Publication Policies
  • Digital Archiving Policy
  • Promote your Publication
  • Metadata Harvesting (OAI2)

IJACSA

  • About the Journal
  • Call for Papers
  • Editorial Board
  • Author Guidelines
  • Submit your Paper
  • Current Issue
  • Archives
  • Indexing
  • Fees/ APC
  • Reviewers
  • Apply as a Reviewer

IJARAI

  • About the Journal
  • Archives
  • Indexing & Archiving

Special Issues

  • Home
  • Archives
  • Proposals
  • Guest Editors
  • SUSAI-EE 2025
  • ICONS-BA 2025
  • IoT-BLOCK 2025

Future of Information and Communication Conference (FICC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Computing Conference

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Intelligent Systems Conference (IntelliSys)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Future Technologies Conference (FTC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact
  • Home
  • Call for Papers
  • Editorial Board
  • Guidelines
  • Submit
  • Current Issue
  • Archives
  • Indexing
  • Fees
  • Reviewers
  • Subscribe

IJACSA Volume 4 Issue 12

Copyright Statement: This is an open access publication licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.

View Full Issue

Paper 1: Personalizing of Content Dissemination in Online Social Networks

Abstract: Online social networks have seen a rapid growth in recent years. A key aspect of many of such networks is that they are rich in content and social interactions. Users of social networks connect with each other and forming their own communities. With the evolution of huge communities hosted by such websites, users suffer from managing information overload and it is become hard to extract useful information. Thus, users need a mechanism to filter online social streams they receive as well as enable them to interact with most similar users. In this paper, we address the problem of personalizing dissemination of relevant information in knowledge sharing social network. The proposed framework identifies the most appropriate user(s) to receive specific post by calculating similarity between target user and others. Similarity between users within OSN is calculated based on users’ social activity which is an integration of content published as well as social pattern Application of this framework to a representative subset of a large real-world social network: the user/community network of the blog service stack overflow is illustrated here. Experiments show that the proposed model outperform tradition similarity methods.

Author 1: Abeer ElKorany
Author 2: Khaled ElBahnasy

Keywords: social network; content similarity measurement; Information retrieval; Information dissemination

PDF

Paper 2: Attacking Misaligned Power Tracks Using Fourth-Order Cumulant

Abstract: Side channel attacks (SCA) use the leaked confidential data to reveal the cipher key. Power consumptions, electromagnetic emissions, and operation timing of cryptographic hardware are examples of measurable parameters (analysis) effected by internal confident data. To prevent such attacks, SCA countermeasures are implemented. Misaligned power tracks is a considerable countermeasure which directly affect the effectiveness of SCA. Added to that, SCA are suffering from tremendous types of noise problems. This paper proposes Fourth-order Cumulant Analysis as preprocessing step to align power tracks dynamically and partially. Moreover, this paper illustrates that the proposed analysis can efficiently deal with Gaussian noise and misaligned tracks through comprehensive analysis of an AES 128 bit block cipher.

Author 1: Eng. Mustafa M. Shiple
Author 2: Prof. Dr. Iman S. Ashour
Author 3: Prof. Dr. Abdelhady A. Ammar

Keywords: Correlation power analysis (CPA); Differential power analysis (DPA); side channel attack; FPGA; AES; cryptography; cipher; fourth-order cumulant; Gaussian noise; higher order statistics

PDF

Paper 3: Quantum Cost Optimization for Reversible Sequential Circuit

Abstract: Reversible sequential circuits are going to be the significant memory blocks for the forthcoming computing devices for their ultra low power consumption. Therefore design of various types of latches has been considered a major objective for the researchers quite a long time. In this paper we proposed efficient design of reversible sequential circuits that are optimized in terms of quantum cost, delay and garbage outputs. For this we proposed a new 3*3 reversible gate called SAM gate and we then design efficient sequential circuits using SAM gate along with some of the basic reversible logic gates.

Author 1: Md. Selim Al Mamun
Author 2: David Menville

Keywords: Flip-flop; Garbage Output; Reversible Logic; Quantum Cost

PDF

Paper 4: Color, texture and shape descriptor fusion with Bayesian network classifier for automatic image annotation

Abstract: Due to the large amounts of multimedia data prevalent on the Web, Some images presents textural motifs while others may be recognized with colors or shapes of their content. The use of descriptors based on one’s features extraction method, such as color or texture or shape, for automatic image annotation are not efficient in some situations or in absence of the chosen type. The proposed approach is to use a fusion of some efficient color, texture and shape descriptors with Bayesian networks classifier to allow automatic annotation of different image types. This document provides an automatic image annotation that merges some descriptors in a parallel manner to have a vector that represents the various types of image characteristics. This allows increasing the rate and accuracy of the annotation system. The Texture, color histograms, and Legendre moments, are used and merged respectively together in parallel as color, texture and shape features extraction methods, with Bayesian network classifier, to annotate the image content with the appropriate keywords. The accuracy of the proposed approach is supported by the good experimental results obtained from ETH-80 databases.

Author 1: Mustapha OUJAOURA
Author 2: Brahim MINAOUI
Author 3: Mohammed FAKIR

Keywords: image annotation; k-means segmentation; Bayesian networks; color histograms; Legendre moments; Texture; ETH-80 database

PDF

Paper 5: Building an Artificial Idiotopic Immune Model Based on Artificial Neural Network Ideology

Abstract: In the literature, there were many research efforts that utilized the artificial immune networks to model their designed applications, but they were considerably complicated, and restricted to a few areas that such as computer security applications. The objective of this research is to introduce a new model for artificial immune networks that adopts features from other biological successful models to overcome its complexity such as the artificial neural networks. Common concepts between the two systems were investigated to design a simple, yet a robust, model of artificial immune networks. Three artificial neural networks learning models were available to choose from in the research design: supervised, unsupervised, and reinforcement learning models. However, it was found that the reinforcement model is the most suitable model. Research results examined network parameters, and appropriate relations between concentration ranges and their dependent parameters as well as the expected reward during network learning. In conclusion, it is recommended the use of the designed model by other researchers in different applications such as controlling robots in hazardous environment to save human lives as well as using it on image retrieval in general to help the police department identify suspects.

Author 1: Hossam Meshref

Keywords: Artificial Immune Systems; Artificial Neural Networks

PDF

Paper 6: Anonymous Broadcast Messages

Abstract: The Dining Cryptographer network (or DC-net) is a privacy preserving communication protocol devised by David Chaum for anonymous message publication. A very attractive feature of DC-nets is the strength of its security, which is inherent in the protocol and is not dependent on other schemes, like encryption. Unfortunately the DC-net protocol has a level of complexity that causes it to suffer from exceptional communication overhead and implementation difficulty that precludes its use in many real-world use-cases. We have designed and created a DC-net implementation that uses a pure client-server model, which successfully avoids much of the complexity inherent in the DC-net protocol. We describe the theory of DC-nets and our pure client-server implementation, as well as the compromises that were made to reduce the protocol’s level of complexity. Discussion centers around the details of our implementation of DC-net.

Author 1: Dragan Lazic
Author 2: Charlie Obimbo

Keywords: Dining Cryptographer network; Privacy; sender-untraceability

PDF

Paper 7: High Performance Color Image Processing in Multicore CPU using MFC Multithreading

Abstract: Image processing is an engineering field where stored image data is readily available for parallel processing. Basically data processing algorithms developed in sequential approach are not capable of harnessing the computing power of individual cores present in a single-chip multicore processor. To utilize the multicore processor efficiently on windows platform for color image processing applications, a lock-free multithreading approach was developed using Visual C++ with Microsoft Foundation Class (MFC) support. This approach distributes the image data processing task on multicore Central Processing Unit (CPU) without using parallel programming framework like Open Multi-Processing (OpenMP) and reduces the algorithm execution time. In image processing, each pixel is processed using same set of high-level instruction which is time consuming. Therefore to increase the processing speed of the algorithm in a multicore CPU, the entire image data is partitioned into equal blocks and copy of the algorithm is applied on each block using separate worker thread. In this paper, multithreaded color image processing algorithms namely contrast enhancement using fuzzy technique and edge detection were implemented. Both the algorithms were tested on an Intel Core i5 Quad-core processor for ten different images of varying pixel size and their performance results are presented. A maximum of 71% computing performance improvement and speedup of about 3.4 times over sequential approach was obtained for large-size images using four thread model.

Author 1: Anandhanarayanan Kamalakannan
Author 2: Govindaraj Rajamanickam

Keywords: Color image; fuzzy contrast intensification; edge detection; lock-free multithreading; MFC thread; block-data; multicore programming

PDF

Paper 8: Fir Filter Design Using The Signed-Digit Number System and Carry Save Adders – A Comparison

Abstract: This work looks at optimizing finite impulse response (FIR) filters from an arithmetic perspective. Since the main two arithmetic operations in the convolution equations are addition and multiplication, they are the targets of the optimization. Therefore, considering carry-propagate-free addition techniques should enhance the addition operation of the filter. The signed-digit number system is utilized to speedup addition in the filter. An alternative carry propagate free fast adder, carry-save adder, is also used here to compare its performance to the signed-digit adder. For multiplication, Booth encoding is used to reduce the number of partial products. The two filters are modeled in VHDL, synthesized and place-and-routed. The filters are deployed on a development board to filter digital images. The resultant hardware is analyzed for speed and logic utilization

Author 1: Hesham Altwaijry
Author 2: Yasser Mohammad Seddiq

Keywords: FIR Filters; Signed Digit; Carry-Save ; FPGA

PDF

Paper 9: New Simulation Method of New HV Power Supply for Industrial Microwave Generators with N=2 Magnetrons

Abstract: This original work treats a new simulation method of a new type of high voltage power supply for microwave generators with N magnetrons (treated case: N=2 magnetrons), used as a source of energy in the industrial applications. This new power supply is composed of a single-phase HV transformer with magnetic leakage flow, supplying two parallel cells, which multiplies the voltage and stabilizes the current. The doubler supplies one magnetron. The transformer is presented by its p equivalent circuit. Each inductance of the model is characterized by its relation "flow-current". In this paper, we present a new approach validation of the p model of the special transformer using Matlab-Simulink code. The theoretical results compared with the experimental measurements, is in good agreement with them. The use of this tool Matlab-Simulink, has allowed us to confirm the possibility of the operation of this new system without interaction between magnetrons, with a view to a possible optimization which lead to reduce the weight, the volume and the cost of implementation while ensuring the process of regulating the current in each magnetron.

Author 1: N. El Ghazal
Author 2: A.Belhaiba
Author 3: M.Chraygane
Author 4: B.Bahani
Author 5: M.Ferfra

Keywords: Modeling; New Power Supply; Magnetron; Microwave Generator; Matlab-Simulink; High Voltage (HV)

PDF

Paper 10: A New Image-Based Model For Predicting Cracks In Sewer Pipes

Abstract: Visual inspection by a human operator has been mostly used up till now to detect cracks in sewer pipes. In this paper, we address the problem of automated detection of such cracks. We propose a model which detects crack fractures that may occur in weak areas of a network of pipes. The model also predicts the level of dangerousness of the detected cracks among five crack levels. We evaluate our results by comparing them with those obtained by using the Canny algorithm. The accuracy percentage of this model exceeds 90% and outperforms other approaches.

Author 1: Iraky Khalifa
Author 2: Amal Elsayed Aboutabl
Author 3: Gamal Sayed AbdelAziz Barakat

Keywords: Visual inspection; Sewer pipes; Canny algorithm; Crack detection

PDF

Paper 11: The cybercrime process : an overview of scientific challenges and methods

Abstract: The aim of this article is to describe the cybercrime process and to identify all issues that appear at the different steps, between the detection of incident to the final report that must be exploitable for a judge. It is to identify at all steps, issues and methods to address them.

Author 1: Patrick Lallement

Keywords: cybercrime; detection; forensic analysis

PDF

Paper 12: The Phenomenon of Enterprise Systems in Higher Education:Insights From Users

Abstract: Higher education has been strongly influenced by global trends to adopt new technologies. There has been a call by governments for universities worldwide to improve their performance and efficiency. In response, higher education institutions have turned to Enterprise Resource Planning systems (ERP) in order to cope with the changing environment and overcome the limitations of legacy systems as a means for integration and performance improvement advantages. However, failure rate of ERP implementation is high and debate still exists regarding the various contributions of the ERP systems to performance, especially at the user level, where the core values of information systems are represented and the actual benefits and impacts are created. As consequence, this study evaluates the impacts of ERP systems on user performance in higher education institutions with a view to better understand ERP phenomenon in these institutions and determine whether or not these systems work well in such a complex environment. The study also developed and validated statistically a new model suggesting a more inclusive sight for examining ERPs utilization and impacts and combining the key ideas of three well-known and widely used information systems models.

Author 1: Ahed Abugabah
Author 2: Louis Sansogni
Author 3: Osama Abdulaziz Alfarraj

Keywords: ERP systems; user performance; system quality; higher education

PDF

Paper 13: Loop Modeling Forward and Feedback Analysis in Cerebral Arteriovenous Malformation

Abstract: Cerebral Arteriovenous Malformation (CAVM) hemodynamic in disease condition results changes in the flow and pressure level in blood vessels. Cerebral Arteriovenous Malformation (CAVM) is an abnormal shunting of vessels between arteries and veins. It is one of the common Brain disorder. In general, the blood flows of cerebral region are from arteries to veins through capillary bed. This paper is focus on the creation of a new electrical model for spiral loop structures that will simulate the pressure at various locations of the CAVM Complex blood vessels. The proposed model helps Doctors to take diagnostic and treatment planning for treatment by non-invasive measurement.. This can cause rupture or decreased blood supply to the tissue through capillary causing infarct. Measuring flow and pressure without intervention along the vessel is big challenge due to loop structures of feedback and forward flows in Arteriovenous Malformation patients. In this paper, we proposed a lumped model for the spiral loop in CAVM Structures that will help doctors to find the pressure and velocity measurements non-invasively.

Author 1: Y. Kiran Kumar
Author 2: Shashi.B.Mehta
Author 3: Manjunath Ramachandra

Keywords: Vessel Loops; AVM; Lumped Model

PDF

Paper 14: Design and Evaluation of Spatial Multi Interaction Interface

Abstract: Nowadays interactive displays are capable of offering a great variety of interactions to users thanks to advancement of ubiquitous computing technologies. Although many methods of interactions have been researched, usability of the devices is still limited and they are offered only to a single user at a time. This paper proposes a spatial multi-interaction interface that can provide various interactions to many users in an ambient environment. An interaction surface is created for users to interact through IR-LEDs Array Bar. The coordinate information of the hand is extracted by detecting the area of the hand of a user in the interaction surface. Then users can experience various interactions through “spatial touches” on the interaction surface. In our paper a usability evaluation is carried out for our new interface which gives the emphasis to the interaction interface. The usability of our new interface is shown to be significantly better through statistical testing using t-testing. Finally, users can perform various interactions with natural hand motions only without the aid of devices that have to be operated manually.

Author 1: Chang Ok Yun
Author 2: Tae Soo Yun
Author 3: YoSeph Choi

Keywords: Interactive display; Ambient environment; Interaction surface; Spatial interaction

PDF

Paper 15: A particle swarm optimization algorithm for the continuous absolute p-center location problem with Euclidean distance

Abstract: The p-center location problem is concerned with determining the location of p centers in a plane/space to serve n demand points having fixed locations. The continuous absolute p-center location problem attempts to locate facilities anywhere in a space/plane with Euclidean distance. The continuous Euclidean p-center location problem seeks to locate p facilities so that the maximum Euclidean distance to a set of n demand points is minimized. A particle swarm optimization (PSO) algorithm previously advised for the solution of the absolute p-center problem on a network has been extended to solve the absolute p-center problem on space/plan with Euclidean distance. In this paper we develop a PSO algorithm for the continuous absolute p-center location problem to minimize the maximum Euclidean distance from each customer to his/her nearest facility, called “PSO-ED”. This problem is proven to be NP-hard. We tested the proposed algorithm “PSO-ED” on a set of 2D and 3D problems and compared the results with a branch and bound algorithm. The numerical experiments show that PSO-ED algorithm can solve optimally location problems with Euclidean distance including up to 1,904,711 points.

Author 1: Hassan M. Rabie
Author 2: Dr. Ihab A. El-Khodary
Author 3: Prof. Assem A. Tharwat

Keywords: absolute p-center; location problem; particle swarm optimization

PDF

Paper 16: Automated Timetabling Using Stochastic Free-Context Grammar Based on Influence-Mapping

Abstract: This paper presents a new system that solves the problem of finding suitable class schedule using strongly-typed heuristic search technique. The system is called Automated Timetabling Solver (ATTSolver). The system uses Stochastic Context-Free Grammar rules to build schedule and make use of influence maps to assign the fittest slot (place & time) for each lecture in the timetable. This system is very useful in cases of the need to find valid, diverse, suitable and on-the-fly timetable which takes into account the soft constraints that has been imposed by the user of the system. The performance of the proposed system is compared with the aSc system for the number of tested schedules and the execution time. The results show that the number of tested schedules in the proposed system is always less than that in aSc system. Moreover, the execution time of the proposed system is much better than aSc system in all cases of the sequential runs.

Author 1: Hany Mahgoub
Author 2: Mohamed Altaher

Keywords: Heuristic Search; Automated Timetabling; Stochastic Context-Free Grammar; Influence Map

PDF

Paper 17: Internet Forensics Framework Based-on Clustering

Abstract: Internet network attacks are complicated and worth studying. The attacks include Denial of Service (DoS). DoS attacks that exploit vulnerabilities found in operating systems, network services and applications. Indicators of DoS attacks, is when legitimate users cannot access the system. This paper proposes a framework for Internet based forensic logs that aims to assist in the investigation process to reveal DoS attacks. The framework in this study consists of several steps, among others : logging into the text file and database as well as identifying an attack based on the packet header length. After the identification process, logs are grouped using k-means clustering algorithm into three levels of attack (dangerous, rather dangerous and not dangerous) based on port numbers and tcpflags of the package. Based on the test results the proposed framework can be grouped into three level attacks and found the attacker with a success rate of 89,02%, so, it can be concluded that the proposed framework can meet the goals set in this research.

Author 1: Imam Riadi
Author 2: Jazi Eko Istiyanto
Author 3: Ahmad Ashari
Author 4: Subanar

Keywords: framework; forensics; Internet; log; clustering; Denial of Service

PDF

Paper 18: Consumer Acceptance of Location Based Services in the Retail Environment

Abstract: Smartphones have become a commodity item. In combination with their seemingly infinite extensions through mobile applications, they hold great economic potential for businesses. Location Based Services (LBS) take advantage of their portability by providing relevant information to the user regarding their location. Utilizing the user’s position to create personalized location-specific marketing messages enables businesses to yield value for their customers. The main objective of this paper is to identify factors, which influence the acceptance of LBS apps in the context of retail since there is a lack of research in this field. A qualitative research approach was chosen to investigate the relevant variables. Based on the conducted interviews, theories were derived and verified against further data retrievals. Similar to findings of previous research the factors ease of use (usability) and usefulness were confirmed as being crucial in forming consumers’ attitudes.

Author 1: Iris Uitz
Author 2: Roxane Koitz

Keywords: Location Based Services; Usability-Testing; Apps; Shopping-Apps; Mobile; Consumer Acceptance; Mobile Marketing

PDF

Paper 19: Recognition of Objects by Using Genetic Programming

Abstract: This document is devoted to the task of object detection and recognition in digital images by using genetic programming. The goal was to improve and simplify existing approaches. The detection and recognition are achieved by means of extracting the features. A genetic program is used to extract and classify features of objects. Simple features and primitive operators are processed in genetic programming operations. We are trying to detect and to recognize objects in SAR images. Due to the new approach described in this article, five and seven types of objects were recognized with good recognition results.

Author 1: Nerses Safaryan
Author 2: Hakob Sarukhanyan

Keywords: Terminals; Fitness; Selection; Crossover; Mutation; Ground Truth

PDF

Paper 20: Route Optimization in Network Mobility

Abstract: NEtwork MObility (NEMO) controls mobility of a number of mobile nodes in a comprehensive way using one or more mobile routers. To choose a route optimization scheme, it is very important to have a quantitative comparison of the available route optimization schemes. The focus of this paper is to analyze the degree of Route Optimization (RO), deploy-ability and type of RO supported by each class in general. The comparison shows the differences among the schemes in terms of issues, such as additional header, signaling and memory requirement. We classify the schemes established on the basic method for route optimization, and equal the schemes based on protocol overhead, such as header overhead, amount of signaling, and memory requirements. Lastly the performance of the classes of different schemes has to be estimated under norms such as available bandwidth, topology of the mobile network and mobility type.

Author 1: Md. Hasan Tareque
Author 2: Ahmed Shoeb Al Hasan

Keywords: Delegation; Hierarchical; Source Routing; BGP- assisted; Network Mobility; Route Optimization

PDF

Paper 21: Survey: Risk Assessment for Cloud Computing

Abstract: with the increase in the growth of cloud computing and the changes in technology that have resulted a new ways for cloud providers to deliver their services to cloud consumers, the cloud consumers should be aware of the risks and vulnerabilities present in the current cloud computing environment. An information security risk assessment is designed specifically for that task. However, there is lack of structured risk assessment approach to do it. This paper aims to survey existing knowledge regarding risk assessment for cloud computing and analyze existing use cases from cloud computing to identify the level of risk assessment realization in state of art systems and emerging challenges for future research.

Author 1: Drissi S.
Author 2: Houmani H.
Author 3: Medromi H.

Keywords: cloud computing; risk; risk assessment approach; survey; cloud consumers

PDF

Paper 22: A Model of an E-Learning Web Site for Teaching and Evaluating Online.

Abstract: This research is endeavoring to design an e-learning web site on the internet having the course name as "Object Oriented Programming" (OOP) for the students of level four at Computer Science Department (CSD). This course is to be taught online (through web) and then a programme is to be designed to evaluate students’ performance electronically while introducing a comparison between online teaching , e-evaluation and traditional methods of evaluation. The research seeks to lay out a futuristic perception that how the future online teaching and e-electronic evaluation should be the matter which highlights the importance of this research.

Author 1: Mohammed A. Amasha
Author 2: Salem Alkhalaf

Keywords: Key Words; e-learning; evaluation; designing a website; university performance

PDF

Paper 23: The Failure of E-government in Jordan to Fulfill Potential

Abstract: The aim of this paper is to uncover the reasons behind what so-called total failure in e-government project in Jordan. Reviewing the published papers in this context revealed that both citizens and employees do not understand the current status of this program. The majority of these papers measure the quality of e-services presented by e-government. However, according to the minister of Communication and Information Technologies (MOCIT), only three e-services are provided by this program up to writing this paper. Moreover, he decided to freeze the current working on e-government programme. These facts drove the authors to conduct this research. General review of the existing literature concerning e-government implementation in Jordan was applied, then a qualitative research was utilised to uncover the reasons behind the failure of the e-government program in Jordan. The collected data then was analysed using Strauss and Corbin's method of grounded theory. This paper illustrates that Jordanian government need to exert strenuous efforts to move from the first stage of e-government implementation into an interactive one after fourteen years of launching the program, considering that only three e-services are presented up to October 2013. Reasons behind the failure of e-government in Jordan have also been identified.

Author 1: Raed Kanaan
Author 2: Ghassan Kanaan

Keywords: e-government; grounded theory; Jordan; total failure

PDF

Paper 24: Achieving Regulatory Compliance for Data Protection in the Cloud

Abstract: The advent of cloud computing has enabled organizations to take advantage of cost-effective, scalable and reliable computing platforms. However, entrusting data hosting to third parties has inherent risks. Where the data in question can be used to identify living individuals in the UK, the Data Protection Act 1998 (DPA) must be adhered to. In this case, adequate security controls must be in place to ensure privacy of the data. Transgressions may be met with severe penalties. This paper outlines the data controller’s obligations under the DPA and, with respect to cloud computing, presents solutions for possible encryption schemes. Using traditional encryption can lead to key management challenges and limit the type of processing which the cloud service can fulfill. Improving on this, the evolving area of homomorphic encryption is presented which promises to enable useful processing of data whilst it is encrypted. Current approaches in this field have limited scope and an impractical processing overhead. We conclude that organizations must thoroughly evaluate and manage the risks associated with processing personal data in the cloud.

Author 1: Mark Rivis
Author 2: Shao Ying Zhu

Keywords: cloud computing; data protection legislation; Data Protection Act 1998; homomorphic encryption; data privacy; symmetric encryption

PDF

Paper 25: Pre-Eminance of Open Source Eda Tools and Its Types in The Arena of Commercial Electronics

Abstract: Digital synthesis with a goal of chip designing in the commercial electronics arena is packed into large EDA Software providers like, Synopsys, Cadence, or MentorGraphics. These commercial tools being expensive and having closed file structures. It is also a financial constraint for the startup companies sometimes who have their budget limitations. Any bug-fixes or add features cannot be made with ease; in such scenario the company is forced to opt for an alternative cost effective EDA software. This paper deals with the advantages of using open source EDA tools like Icarus Verilog, Verilator, GTKwave viewer, GHDL VHDL simulator, gEDA, etc. that are available as a free source and focuses on the Icarus Verilog simulator tool. It can be seen as a big encouragement for startups in Semiconductor domain. Thereby, these open source EDA tools make the design process more cost-effective, less time consuming and affordable as well.

Author 1: Geeta Yadav
Author 2: Neeraj Kr. Shukla

Keywords: Open source EDA; MentorGraphics; Cadence; Icarus Verilog; GTKwave viewer; Verilator; GHDL VHDL simulator; gEDA; Linux; Github; VPI

PDF

Paper 26: Simulating Cooperative Systems Applications: a New Complete Architecture

Abstract: For a decade, embedded driving assistance systems were mainly dedicated to the management of short time events (lane departure, collision avoidance, collision mitigation). Recently a great number of projects have been focused on cooperative embedded devices in order to extend environment perception. Handling an extended perception range is important in order to provide enough information for both path planning and co-pilot algorithms which need to anticipate events. To carry out such applications, simulation has been widely used. Simulation is efficient to estimate the benefits of Cooperative Systems (CS) based on Inter-Vehicular Communications (IVC). This paper presents a new and modular architecture built with the SiVIC simulator and the RTMaps™ multi-sensors prototyping platform. A set of improvements, implemented in SiVIC, are introduced in order to take into account IVC modelling and vehicles’ control. These 2 aspects have been tuned with on-road measurements to improve the realism of the scenarios. The results obtained from a freeway emergency braking scenario are discussed.

Author 1: Dominique Gruyer
Author 2: Sébastien Demmel
Author 3: Brigitte d’Andréa-Novel
Author 4: Grégoire S. Larue
Author 5: Andry Rakotonirainy

Keywords: Cooperative Systems; IEEE 802.11p; Inter-vehicular Communications; simulation

PDF

Paper 27: Construction of Powerful Online Search Expert System Based on Semantic Web

Abstract: In this paper we intends to build an expert system based on semantic web for online search using XML, to help users to find the desired software, and read about its features and specifications. The expert system saves user's time and effort of web searching or buying software from available libraries. Building online search expert system is ideal for capturing support knowledge to produce interactive on-line systems that provide searching details, situation-specific advice exactly like setting a session with an expert. Any person can access this interactive system from his web browser and get some questions answer in addition to precise advice which was provided by an expert. The system can provide some troubleshooting diagnose, find the right products; … Etc. The proposed system further combines aspects of three research topics (Semantic Web, Expert System and XML). Semantic web Ontology will be considered as a set of directed graphs where each node represents an item and the edges denote a term which is related to another term. Organizations can now optimize their most valuable expert knowledge through powerful interactive Web-enabled knowledge automation expert system. Online sessions emulate a conversation with a human expert asking focused questions and producing customized recommendations and advice. Hence, the main powerful point of the proposed expert system is that the skills of any domain expert will be available to everyone.

Author 1: Yasser A. Nada

Keywords: xpert System, Semantic Web, Online Search, XML.

PDF

Paper 28: Development of Intelligent Surveillance System Focused on Comprehensive Flow

Abstract: Surveillance cameras are today a common sight in public spaces and thoroughfares, where they are used to prevent crime and monitor traffic. However, human operators have limited attention spans and may miss anomalies. Here, we develop an intelligent surveillance system on the basis of spatio-temporal information in comprehensive flow of human traffic. The comprehensive flow is extracted from optical flows, and anomalies are identified on the basis of the spatiotemporal distribution. Because our system extracts only a few anomalies from many surveillance cameras, operators will not miss the important scenes. In experiment, we confirmed effectiveness of our intelligent surveillance system.

Author 1: Shigeki Aoki Tatsuya Gibo
Author 2: Eri Kuzumoto
Author 3: Takao Miyamoto

Keywords: Intelligent surveillance system; comprehensive flow; optical flow; Shannon’s information theory

PDF

Paper 29: FPGA Architecture for Kriging Image Interpolation

Abstract: This paper proposes an ultrafast scalable embedded image compression scheme based on discrete cosine transform. It is designed for general network architecture that guarantees maximum end-to-end delay (EED), in particular the Distributed Multimedia Plays (DMP) architecture. DMP is designed to enable people to perform delay-sensitive real-time collaboration from remote places via their own collaboration space (CS). It requires much lower EED to achieve good synchronization than that in existing teleconference systems. A DMP node can drop packets from networked CSs intelligently to guarantee its local delay and degrade visual quality gracefully. The transmitter classifies visual information in an input image into priority ranks. Included in the bitstream as side information, the ranks enable intelligent packet dropping. The receiver reconstructs the image from the remaining packets. Four priority ranks for dropping are provided. Our promising results reveal that, with the proposed compression technique, maximum EED can be guaranteed with graceful degradation of image quality. The given parallel designs for its hardware implementation in FPGA shows its technical feasibility as a module in the DMP architecture.

Author 1: Maciej Wielgosz
Author 2: Mauritz Panggabean
Author 3: Leif Arne Rønningen

PDF

Paper 30: Ultrafast Scalable Embedded DCT Image Coding for Tele-immersive Delay-Sensitive Collaboration

Abstract: A delay-sensitive, real-time, tele-immersive collaboration for the future requires much lower end-to-end delay (EED) for good synchronization than that for existing teleconference systems. Hence, the maximum EED must be guaranteed, and the visual-quality degradation must be graceful. Distributed Multimedia Plays (DMP) architecture addresses the envisioned collaboration and the challenges. We propose a DCT-based, embedded, ultrafast, quality scalable image-compression scheme for the collaboration on the DMP architecture. A parallel FPGA implementation is also designed to show the technical feasibility.

Author 1: Mauritz Panggabean
Author 2: Maciej Wielgosz
Author 3: Harald Øverby
Author 4: Leif Arne Rønningen

PDF

The Science and Information (SAI) Organization
BACK TO TOP

Computer Science Journal

  • About the Journal
  • Call for Papers
  • Submit Paper
  • Indexing

Our Conferences

  • Computing Conference
  • Intelligent Systems Conference
  • Future Technologies Conference
  • Communication Conference

Help & Support

  • Contact Us
  • About Us
  • Terms and Conditions
  • Privacy Policy

© The Science and Information (SAI) Organization Limited. All rights reserved. Registered in England and Wales. Company Number 8933205. thesai.org