The Science and Information (SAI) Organization
  • Home
  • About Us
  • Journals
  • Conferences
  • Contact Us

Publication Links

  • IJACSA
  • Author Guidelines
  • Publication Policies
  • Digital Archiving Policy
  • Promote your Publication
  • Metadata Harvesting (OAI2)

IJACSA

  • About the Journal
  • Call for Papers
  • Editorial Board
  • Author Guidelines
  • Submit your Paper
  • Current Issue
  • Archives
  • Indexing
  • Fees/ APC
  • Reviewers
  • Apply as a Reviewer

IJARAI

  • About the Journal
  • Archives
  • Indexing & Archiving

Special Issues

  • Home
  • Archives
  • Proposals
  • Guest Editors
  • SUSAI-EE 2025
  • ICONS-BA 2025
  • IoT-BLOCK 2025

Future of Information and Communication Conference (FICC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Computing Conference

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Intelligent Systems Conference (IntelliSys)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Future Technologies Conference (FTC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact
  • Home
  • Call for Papers
  • Editorial Board
  • Guidelines
  • Submit
  • Current Issue
  • Archives
  • Indexing
  • Fees
  • Reviewers
  • Subscribe

IJACSA Volume 7 Issue 12

Copyright Statement: This is an open access publication licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.

View Full Issue

Paper 1: Estimation Method of Ionospheric TEC Distribution using Single Frequency Measurements of GPS Signals

Abstract: The satellite-to-ground communications are influenced by ionospheric plasma which varies depending on solar and geomagnetic activities as well as regions and local times. With the expansion of use of the space, continuous monitoring of the ionospheric plasma has become an important issue. In Global Positioning System (GPS), the ionospheric delay, which is proportional to ionospheric total electron content (TEC) along the propagation path, is the largest error in signal propagation. The TEC has been observed from dual frequency GPS signals because only the ionospheric delay has frequency dependences. Costs of multi-frequency receivers are, however, much higher than those of single frequency ones. In the present study, an estimation method of TEC distribution map from single frequency GPS measurements was developed. The developed method was evaluated by comparing its results with those from dual frequency measurements. The method makes it possible to expand ionospheric TEC observation networks easily.

Author 1: Win Zaw Hein
Author 2: Yoshitaka Goto
Author 3: Yoshiya Kasahara

Keywords: Global Positioning System; GPS; Signal processing and propagation; Ionospheric Delay; Total Electron Content (TEC)

PDF

Paper 2: A New Mixed Signal Platform to Study the Accuracy/Complexity Trade-Off of DPD Algorithms

Abstract: The increase in bandwidth of Power Amplifier (PA) input signals has led to the development of more complex behavioral PA models. Most recent models such as the Generalized Memory Polynomial (1) or the Polyharmonic distortion modeling (2) can be used to design very performant but complex and thus very consuming Digital Predistortion algorithms (DPDs). On the other hand, with earlier simpler models, the precision of the DPD may not be enough. The model order is also the major factor influencing the requirements in terms of bandwidth and dynamic range of the digitized signal in the feedback loop of a typical Power amplification system architecture: the higher the order, the more information is needed for identification. This paper describes a new mixed signal simulation platform developed to study the complexity vs. accuracy trade-off from the DPD point of view. The platform estimates the accuracy of the DPD and the power consumption (including the consumption of the DPD itself) of the whole feedback loop, by comparing various PA models with various DPDs algorithms. Contrary to older works, measuring the accuracy on the open loop without DPD and estimating the complexity in theoretical number of operations, our goal is to be able to estimate with precision the performances and the power consumption of the whole amplification system (PA + DPD + DAC + feedback loop) for optimization of DPD algorithms.

Author 1: Hanan Thabet
Author 2: Morgan Roger
Author 3: Caroline Lelandais-Perrault

Keywords: LTE; DPD algorithms; Simulation Platform; Accuracy/Complexity; Power Consumption; Co-Simulation

PDF

Paper 3: A Universally Designed and Usable Data Visualization for A Mobile Application in the Context of Rheumatoid Arthritis

Abstract: This paper discusses the design, development and evaluation of a data visualization prototype for a mobile application, for people with rheumatoid arthritis conditions. The visualizations concern ways of displaying graphically data for monitoring and evaluating the daily activities of rheumatoid arthritis sufferers. An initial visualization was developed and then a second was developed, aiming to be more usable and universally designed than the first version. An empirical experiment was used for evaluation and collection of quantitative data. Furthermore, semi-structured interviews were used for eliciting more qualitative data in terms of participant opinions. The overall results suggest that the second visualization was more usable and more universally designed than the first version. The paper concludes with some recommendations for future improvements.

Author 1: Suraj Shrestha
Author 2: Pietro Murano

Keywords: universal design; usability; evaluation; data visualization; mobile application; rheumatoid arthritis

PDF

Paper 4: Towards Development of Real-Time Handwritten Urdu Character to Speech Conversion System for Visually Impaired

Abstract: Text to Speech (TTS) Conversion Systems have been an area of research for decades and have been developed for both handwritten and typed text in various languages. Existing research shows that it has been a challenging task to deal with Urdu language due to the complexity of Urdu ‘Nastaliq’ (rich variety in writing styles), therefore, to the best of our knowledge, not much work has been carried out in this area. Keeping in view the importance of Urdu language and the lack of development in this domain, our research focuses on ‘handwritten’ Urdu TTS system. The idea is to first recognize a handwritten Urdu character and then convert it into an audible human speech. Since handwriting styles of different people vary greatly from each other, a machine learning technique for the recognition part is used i.e., Artificial Neural Networks (ANN). Correctly recognized characters, then, undergo processing which converts them into human speech. Using this methodology, a working prototype has been successfully implemented in MATLAB that gives an overall accuracy of 91.4%. Our design serves as a platform for further research and future enhancements for word and sentence processing, especially for visually impaired people.

Author 1: Tajwar Sultana
Author 2: Abdul Rehman Abbasi
Author 3: Bilal Ahmed Usmani
Author 4: Sadeem Khan
Author 5: Wajeeha Ahmed
Author 6: Naima Qaseem
Author 7: Sidra

Keywords: Artificial Neural Network; Classification; OCR; Text To Speech; Urdu Handwritten Character

PDF

Paper 5: Scheduling of Distributed Algorithms for Low Power Embedded Systems

Abstract: Recently, the advent of embedded multicore processors has created interesting technologies for power management. Systems consisting of low-power and high-efficient cores create new possibilities for the optimization of power consumption. However, new design methods, dedicated to these technologies should be developed. In this paper we present a method of static task scheduling for low-power real-time embedded systems. We assume that the system is specified as a distributed algorithm, then it is implemented using multi-core embedded processor with low-power processing capabilities. We propose a new scheduling method to create the optimal or suboptimal schedule. The goal of optimization is to minimize the power consumption while all time constraints will be satisfied or the quality of service will be as high as possible. We present experimental results, obtained for sample systems, showing advantages of our method.

Author 1: Stanislaw Deniziak
Author 2: Albert Dzitkowski

Keywords: Embedded system; distributed algorithm; task scheduling; big.LITTLE; low power system

PDF

Paper 6: RSECM: Robust Search Engine using Context-based Mining for Educational Big Data

Abstract: With an accelerating growth in the educational sector along with the aid of ICT and cloud-based services, there is a consistent rise of educational big data, where storage and processing become the prime matter of challenge. Although many recent attempts have used open source framework e.g. Hadoop for storage, still there are reported issues in sufficient security management and data analyzing problems. Hence, there is less applicability of mining techniques for upcoming search engine due to unstructured educational data. The proposed system introduces a technique called as RSECM i.e. Robust Search Engine using Context-based Modeling that presents a novel archival and search engine. RSECM generates its own massive stream of educational big data and performs the efficient search of data. Outcome exhibits RSECM outperforms SQL based approaches concerning faster retrieval of the dynamic user-defined query.

Author 1: D. Pratiba
Author 2: G. Shobha

Keywords: Big Data; Context; Cloud; Educational Data; Hadoop; Search Engine

PDF

Paper 7: A Heterogeneous Framework to Detect Intruder Attacks in Wireless Sensor Networks

Abstract: Wireless sensor network (WSN) has been broadly implemented in real world applications, such as monitoring of forest fire, military targets detection, medical and/or science areas and above all in our daily home life as well. Nevertheless, WSNs are effortlessly compromised by adversaries due to their broadcast transmission medium as a means of communication which are lacking in tamper resistance. Consequently, an intruder can over hear all traffic, replay previous messages, inject malicious data packets, or can compromise a node. Commonly, sensor nodes are very much vulnerable of two main issues in security aspect that are node authentication and compromising a node. In this paper, a heterogeneous framework of node capture and intrusion detection for WSNs is proposed. This framework efficiently detects the captured nodes by using a novel technique, embedded with an Intrusion Detection mechanism which aggregates Signature and Anomaly based approach with Neural Network Multi-Layer Perceptron (MLP) classification in a clustering environment. Moreover, the proposed framework achieves efficiency at reasonable computation and communication costs and it can be a security shield to real WSN applications.

Author 1: Mustafa Al-Fayoumi
Author 2: Yasir Ahmad
Author 3: Usman Tariq

Keywords: Intrusion; node compromise; anomaly; signature; MLP

PDF

Paper 8: Segmentation using Codebook Index Statistics for Vector Quantized Images

Abstract: In this paper, the segmentation using codebook index statistics (SUCIS) method is proposed for vector-quantized images. Three different codebooks are constructed according to the statistical characteristics (mean, variance, and gradient) of the codewords. Then they are employed to generate three different index images, which can be used to analyze the image contents including the homogeneous, edge, and texture blocks. An adaptive thresholding method is proposed to assign all image blocks in the compressed image to several disjoint regions with different characteristics. In order to make the segmentation result more accurate, two post-processing methods: the region merging and boundary smoothing schemes, are proposed. Finally, the pixel-wise segmentation result can be obtained by partitioning the image blocks at the single-pixel level. Experimental results demonstrate the effectiveness of the proposed SUCIS method on image segmentation, especially for the applications on object extraction.

Author 1: Hsuan T. Chang
Author 2: Jian-Tein Su

Keywords: image segmentation; vector quantization; index image; adaptive thresholding; codebook statistics

PDF

Paper 9: An Enhanced Partial Transmit Sequence Segmentation Schemes to Reduce the PAPR in OFDM Systems

Abstract: Although the orthogonal frequency division multiplexing system (OFDM) is widely used in high-speed data rate wire and wireless environment, the peak-to- average-power-ratio (PAPR) is one of its major obstacles for the real applications. The high PAPR value leads some devices of the OFDM system such as power amplifiers and analog to digital converters to work out of band of these devices. Thus the system efficiency is degraded. Many techniques have been proposed to overcome the high PAPR in OFDM systems such as partial transmit sequences (PTS), selected mapping and interleaving technique. PTS is considered as one of the effective PAPR reduction methods; this scheme depends on segmentation of the input data into several subblocks and then combined again. The three well-known segmentation schemes are pseudo-random, adjacent and interleaving; each scheme has PAPR reduction performance, and computational complexity differs from one to another. In this paper, five types of segmentation schemes are proposed to improve the PAPR reduction execution including sine and cosine shape as well as hybrid interleaving and adjacent schemes in new approaches. From the simulation results, the proposed methods can achieve PAPR reduction performance greater than that of the adjacent and interleaving partition schemes, without increasing the computational complexity of the system. Moreover, the enhanced schemes can realize better PAPR performance with any number of subcarriers.

Author 1: Yasir Amer Al-Jawhar
Author 2: Nor Shahida M. Shah
Author 3: Montadar Abas Taher
Author 4: Mustafa Sami Ahmed
Author 5: Khairun N. Ramli

Keywords: OFDM; PAPR; PTS; adjacent PTS; interleaving PTS

PDF

Paper 10: Model and Criteria for the Automated Refactoring of the UML Class Diagrams

Abstract: Many papers have been written on the challenges of the software refactoring. The question is which refactorings can be applied on the modelling level. Based on the UML model, for example. With the aim of evaluating this possibility the algorithm and the software tool of automated UML class diagram refactoring were introduced. The software tool proposed reduces the level of the UML class diagram complexity metric.

Author 1: Evgeny Nikulchev
Author 2: Olga Deryugina

Keywords: UML; refactoring; class diagrams; software architecture; software design; UML transformation

PDF

Paper 11: Improved Sliding Mode Nonlinear Extended State Observer based Active Disturbance Rejection Control for Uncertain Systems with Unknown Total Disturbance

Abstract: This paper presents a new strategy for the active disturbance rejection control (ADRC) of a general uncertain system with unknown bounded disturbance based on a nonlinear sliding mode extended state observer (SMESO). Firstly, a nonlinear extended state observer is synthesized using sliding mode technique for a general uncertain system assuming asymptotic stability. Then the convergence characteristics of the estimation error are analyzed by Lyapunov strategy. It revealed that the proposed SMESO is asymptotically stable and accurately estimates the states of the system in addition to estimating the total disturbance. Then, an ADRC is implemented by using a nonlinear state error feedback (NLSEF) controller; that is suggested by J. Han and the proposed SMESO to control and actively reject the total disturbance of a permanent magnet DC (PMDC) motor. These disturbances caused by the unknown exogenous disturbances and the matched uncertainties of the controlled model. The proposed SMESO is compared with the linear extended state observer (LESO). Through digital simulations using MATLAB / SIMULINK, the chattering phenomenon has been reduced dramatically on the control input channel compared to LESO. Finally, the closed-loop system exhibits a high immunity to torque disturbance and quite robustness to matched uncertainties in the system.

Author 1: Wameedh Riyadh Abdul-Adheem
Author 2: Ibraheem Kasim Ibraheem

Keywords: extended state observer; sliding mode; rejection control; tracking differentiator; DC motor; nonlinear state feedback

PDF

Paper 12: Towards A Broader Adoption of Agile Software Development Methods

Abstract: Traditionally, software design and development has been following the engineering approach as exemplified by the waterfall model, where specifications have to be fully detailed and agreed upon prior to starting the software construction process. Agile software development is a relatively new approach in which specifications are allowed to evolve even after the beginning of the development process, among other characteristics. Thus, agile methods provide more flexibility than the waterfall model, which is a very useful feature in many projects. To benefit from the advantages provided by agile methods, the adoption rate of these methods in software development projects can be further encouraged if certain practices and techniques in agile methods are improved. In this paper, an analysis is provided of several practices and techniques that are part of agile methods that may hinder their broader acceptance. Further, solutions are proposed to improve such practices and consequently facilitate a wider adoption rate of agile methods in software development.

Author 1: Abdallah Alashqur

Keywords: Agile Methods; Agile software development; SCRUM

PDF

Paper 13: A Bayesian Approach to Predicting Water Supply and Rehabilitation of Water Distribution Networks

Abstract: Water distribution network (WDN) consists of several elements the main ones: pipes and valves. The work developed in this article focuses on a water supply prediction in the short and long term. To this end, reliability data were conjugated in decision making tools on water distribution network rehabilitation in a forecasting context. The pipes are static elements that allow the transport of water to customers, while the valves are dynamic components which perform ensure management of water flow. This paper presents a Bayesian approach that allows management of water distribution network based on the evaluation of the reliability of network components. Modeling based on a Static Bayesian Network (SBN) is implemented to analyze qualitatively and quantitatively the availability of water in the different segments of the network. Dynamic Bayesian networks (DBN) are then used to assess the valves reliability as function of time, which allows management of water distribution based on water availability assessment in different segments. Finally an application on data of a fraction of a distribution network supplying a town is presented to show the effectiveness and the strong contribution of Bayesian networks (BN) in this research field.

Author 1: Abdelaziz Lakehal
Author 2: Fares Laouacheria

Keywords: Water distribution network (WDN) management; Rehabilitation; Pipes and valves reliability; Bayesian Networks (BN); Water supply

PDF

Paper 14: Reducing Energy Consumption in Wireless Sensor Networks using Ant Colony Algorithm and Autonomy Mechanisms

Abstract: Wireless sensor network includes hundreds or thousands of nodes with limited energy. Since the lifetime of each sensor is as the battery life of the sensor, the energy issue is discussed as a fundamental challenge. In this article, parallel ant algorithm and exclusive territoriality algorithm have been used by providing the ability of nodes self-determination, in order to improve the parameters of energy consumption, extend the life and network coverage. For routing nodes also is used direct send method, sending by hierarchical clustering, along with carrier head cluster. This article is evaluated by focusing on network stability, based on two main factors: reduce energy consumption and extend the network life and increase network coverage. The simulated output in this paper represents an increase of energy consumption balance and network lifetime approach (the first death time) and network imperative life (the last death time), which represents network high-performance than latch, direct transmission and other methods. Therefore, also in this article the purpose is to provide a better way than previous methods based on developed ant algorithm to reduce energy consumption against hardware limitations.

Author 1: Javad Mozaffari
Author 2: Mehdi EffatParvar

Keywords: wireless sensor networks; ant algorithm; network stability; energy consumption reduction; network coverage; network lifetime

PDF

Paper 15: Measuring the Data Openness for the Open Data in Saudi Arabia e-Government – A Case Study

Abstract: Conceptually, data can be found at the lowest level of abstraction from where information and knowledge are being extracted. Furthermore, data itself has no meaning, unless it’s being interpreted and transferred into information and knowledge. Thus, all governments have come to appreciate the relevance between releasing data and obtaining information and knowledge in return. However, the abstract nature of data with the undefined benefits to everyday life has slowed down the awareness of public to open data and its relevance. Thus, the increasing efforts by governments in embracing open data agendas may not be clear and shared among people. Most of the open government data initiatives focus on the technology needed to support the usability and accessibility of data. However, this focus has not been proven to increase citizens’ awareness. Citizens’ awareness of open data practices must be carefully measured as without citizen engagement, open government data is useless. The purpose of this research is to measure data openness level of Saudi Arabia e-Government Data Portal. Moreover, a proposed model by the researcher, which is based on a scoring model by Global Open data index, is used to measure data openness level of Saudi Arabia e-Government Data Portal.

Author 1: Marwah W. AlRushaid
Author 2: Abdul Khader Jilani Saudagar

Keywords: abstraction; accessibility; awareness; benchmarking; e-Government; knowledge; information; openness

PDF

Paper 16: Automatic Fall Detection using Smartphone Acceleration Sensor

Abstract: In this paper, we describe our work on developing an automatic fall detection technique using smart phone. Fall is detected based on analyzing acceleration patterns generated during various activities. An additional long lie detection algorithm is used to improve fall detection rate while keeping false positive rate at an acceptable value. An application prototype is implemented on Android operating system and is used to evaluate the proposed technique performance. Experiment results show the potential of using this app for fall detection. However, more realistic experiment setting is needed to make this technique suitable for use in real life situations.

Author 1: Tran Tri Dang
Author 2: Hai Truong
Author 3: Tran Khanh Dang

Keywords: fall detection; long lie detection; acceleration sensor; smartphone; personal healthcare

PDF

Paper 17: All in Focus Image Generation based on New Focusing Measure Operators

Abstract: To generate an all in focus image, the Shape-From-Focus (SFF) is used. The SFF key is finding the optimal focus depth at each pixel or area in an image within sequence of images. In this paper two new focusing measure operators are suggested to be used for SFF. The suggested operators are based on modification for the state of art tool for time-frequency analysis, the Stockwell Transform (ST). The first operator depends on Discrete Orthogonal Stockwell Transform (DOST) which represents a pared version of ST, while the other depends on Pixelwise DOST (P-DOST) which provides a local spatial frequency description. Both of the operators provides the computational complexity and memory demand efficiency compared to the operator depending on ST. A comparison between the suggested operators to operators based on ST are performed and showed that the suggested operators’ performances are as analogous to that of ST.

Author 1: Hossam Eldeen M. Shamardan

Keywords: Focus Measure; All In Focus; Stockwell Transform; DOST

PDF

Paper 18: Stemmer Impact on Quranic Mobile Information Retrieval Performance

Abstract: Stemming algorithms are employed in information retrieval (IR) to reduce verity variants of the same word with several endings to a standard stem. Stemmers can also help IR systems by unifying vocabulary, reducing term variants, reducing storage space, and increasing the likelihood of matching documents, all of which make stemming very attractive for use in IR. This paper aims to study the impact of using stemming techniques in mobile effectiveness. Two-word extraction stemming techniques will be used: a light stemmer and a dictionary-lookup stemmer. Also, three sets of experiments were conducted in this research in order to raise the efficiency of mobile aapplications. Implementing the two stemming approaches and assessing their accuracy by calculating the precision, recall, MAP, and f-measure, produced results which show that the light10 stemmer outperforms the dictionary-lookup stemmer in precision and MAP. Furthermore, the mobile performance of the light10 stemmer exceeds that of the dictionary-based stemmer.

Author 1: Huda Omar Aljaloud
Author 2: Mohammed Dahab
Author 3: Mahmoud Kamal

Keywords: stemming; information retrieval; light10; Quran lexicon; mobile performance; natural language processing

PDF

Paper 19: Internal Model Control of A Class of Continuous Linear Underactuated Systems

Abstract: This paper presents an Internal Model Control (IMC) structure designed for a class of continuous linear underactuated systems. The study treats the case of Minimum Phase (MP) systems and those whose zero dynamics are not necessarily stable. The proposed IMC structure is based on a specific controller which is obtained by the realization of an approximate inverse of the model plant. It is shown that, using such IMC structure, it is possible to remedy the problem of system underactuation and Non-Minimum Phase (NMP) behavior. The case of non-zero initial conditions and imperfect modeling are also presented and model parameters effects on the system evolution are discussed. Simulated examples are presented to prove the effectiveness of the proposed control method to ensure set-point tracking, stability and disturbance rejection.

Author 1: Asma Mezzi
Author 2: Dhaou Soudani

Keywords: Internal Model Control; continuous linear underactuated systems; specific controller; minimum phase systems; non-minimum phase behavior; non-zero initial conditions; model parameters effects; set-point tracking; stability; disturbance rejection

PDF

Paper 20: Comparison Study of Different Lossy Compression Techniques Applied on Digital Mammogram Images

Abstract: The huge growth of the usage of internet increases the need to transfer and save multimedia files. Mammogram images are part of these files that have large image size with high resolution. The compression of these images is used to reduce the size of the files without degrading the quality especially the suspicious regions in the mammogram images. Reduction of the size of these images gives more chance to store more images and minimize the cost of transmission in the case of exchanging information between radiologists. Many techniques exists in the literature to solve the loss of information in images. In this paper, two types of compression transformations are used which are Singular Value Decomposition (SVD) that transforms the image into series of Eigen vectors that depends on the dimensions of the image and Discrete Cosine Transform (DCT) that covert the image from spatial domain into frequency domain. In this paper, the Computer Aided Diagnosis (CAD) system is implemented to evaluate the microcalcification appearance in mammogram images after using the two transformation compressions. The performance of both transformations SVD and DCT is subjectively compared by a radiologist. As a result, the DCT algorithm can effectively reduce the size of the mammogram images by 65% with high quality microcalcification appearance regions.

Author 1: Ayman AbuBaker
Author 2: Mohammed Eshtay
Author 3: Maryam AkhoZahia

Keywords: Mammogram Images; DCT Compression; SVD compression; Microcalcifications

PDF

Paper 21: Evaluating Confidentiality Impact in Security Risk Scoring Models

Abstract: Risk scoring models assume that confidentiality evaluation is based on user estimations. Confidentiality evaluation incorporates the impacts of various factors including systems' technical configuration, on the processes relating to users' confidentiality. The assumption underlying this research is that system users are not capable of estimating systems' confidentiality since they lack the knowledge on the technical structure. According to the proposed model, systems' confidentiality is calculated using technical information of systems' components. The proposed model evaluates confidentiality based on quantitative metrics rather than qualitative estimates which are currently being used. Frameworks' presentation includes system design, an algorithm calculating confidentiality measures and an illustration of risk scoring computations.

Author 1: Eli Weintraub

Keywords: information security; risk management; continuous monitoring; vulnerability; confidentiality; risk assessment; access control; authorization system

PDF

Paper 22: Formal Modeling and Verification of Smart Traffic Environment with Design Aided by UML

Abstract: Issue challan in response to rules violation, LED (Light Emitting Diode) and Bridge components of this proposed Smart Traffic Monitoring and Guidance System are presented in this paper to monitor violation of rules, update users about traffic congestion through LED and to provide central hub to communicate with sensors to update server about the traffic situation. It involves the Wireless Sensors and actors to communicate with the system. The proposed components require fewer resources in terms of sensors and actors. Further sensors identify violation of rules through issue challan. Secondly, LED component provides information to users about the traffic situations. Thirdly, Bridge component is used to provide central hub to communicate with different components in the proposed model and to update the server. The proposed components of this model are implemented by developing formal specification using VDM-SL. VDM-SL is a formal specification language used for analysis of complex systems. The developed specification is validated, verified and analyzed using VDM-SL Toolbox.

Author 1: Umber Noureen Abbas
Author 2: Nazir Ahmad Zafar
Author 3: Farhan Ullah

Keywords: Formal specification; Formal analysis; VDM; Sequence Diagram; Issue Challan; LED

PDF

Paper 23: Response Prediction for Chronic HCV Genotype 4 Patients to DAAs

Abstract: Hepatitis C virus (HCV) is a major cause of chronic liver disease, end stage liver disease and liver cancer in Egypt. Genotype 4 is the prevalent genotype in Egypt and has recently spread to Southern Europe particularly France, Italy, Greece and Spain. Recently, new direct acting antivirals (DAAs) have caused a revolution in HCV therapy with response rates approaching 100%. Despite the diversity of DAAs, treatment of chronic hepatitis C genotype 4 has not yet been optimized. The aim of this study is to build a framework to predict the response of chronic HCV genotype 4 patients to various DAAs by applying Data Mining Techniques (DMT) on clinical information. The framework consists of three phases which are data preprocessing phase to prepare the data before applying the DMT; DM phase to apply DMT, evaluation phase to evaluate the performance and accuracy of the built prediction model using a data mining evaluation technique. The experimental results showed that the model obtained acceptable results.

Author 1: Mohammed A. Farahat
Author 2: Khaled A.Bahnasy
Author 3: A. Abdo
Author 4: Sanaa M.Kamal
Author 5: Samar K. Kassim
Author 6: Ahmed Sharaf Eldin

Keywords: HCV; DMT; Decision Tree; DAAs; Prediction Model

PDF

Paper 24: RAX System to Rank Arabic XML Documents

Abstract: This paper describes an RAX System designed for ranking Arabic documents in information retrieval processes. The proposed solution basically depends on the similarity of textual content. The model we have designed can be used for documents stored in the different formats and written in Arabic language. Due the complex lingual semantics of this language the proposed solution uses a pure statistical approach. The design and implementation are based on existing text processing frameworks and referent Arabic grammar. The main focus of our research has been the evaluation of different similarity measures used for classifying Arabic documents from different domains and different document categories based on query criteria provided by the user.

Author 1: Hesham Elzentani
Author 2: Mladen Veinovic
Author 3: Goran Šimic

Keywords: Text similarity measures; Text classification; Processing Arabic documents

PDF

Paper 25: A Novel Method for Measuring the Performance of Software Project Managers

Abstract: This paper is focused on providing a novel method for measuring the performance of software project managers. It clarifies the fundamental concepts of software project management, knowledge areas, life cycle phases of software project, and performance metrics. It presents some examples of processes and common performance metrics related to knowledge areas of software project management. The researcher extracts an enhanced list of performance metrics using a questionnaire that is passed to 60 experts and specialists in the field of software projects. Their responses are collected and filtered for reaching to effective performance metrics and the importance degree of each one. The researcher adapts Goal Question Metrics method to include an additional step that dedicated to calculate a performance indicator for each knowledge area of software project management. Finally, the new method has been applied on 3 real software projects to measure the performance of their managers. Measuring the performance of software project managers can be helpful in controlling and improving the performance.

Author 1: Jasem M. Alostad

Keywords: software project manager; performance; measurement; metrics; indicators; Goal Question Metrics method; schedule management

PDF

Paper 26: A Topic based Approach for Sentiment Analysis on Twitter Data

Abstract: Twitter has grown in popularity during the past decades. It is now used by millions of users who share information about their daily life and their feelings. In order to automatically process and analyze these data, applications can rely on analysis methods such as sentiment analysis and topic modeling. This paper contributes to the sentiment analysis research field. First, the preprocessing steps required to extract features from Twitter data are described. Then, a topic based method is proposed so as to estimate the sentiment of a tweet. This method requires to extract topics from the training dataset, and train models for each of these topics. The method allows to increase the accuracy of the sentiment estimation compared to using a single model for every topic.

Author 1: Pierre FICAMOS
Author 2: Yan LIU

Keywords: sentiment analysis; opinion mining; natural language processing; feature extraction; topic modeling

PDF

Paper 27: An Improved Malicious Behaviour Detection Via k-Means and Decision Tree

Abstract: Data Mining algorithm which is applied as an anomaly detection system has been considered as one of the essential techniques in malicious behaviour detection. Unfortunately, such detection system is known for its inclination in detecting a cyber-malicious activity more accurately (i.e. maximizing malicious and non-malicious behaviours detection) and has become a persistent limitation in the deployment of intrusion detection systems. Consequently, these constraints will affect a number of important performance factors such as the accuracy, detection rate and false alarms. In this research, KMDT proposed as an anomaly detection model that utilized k-means clustering and decision tree classifier to maximize the detection of malicious behaviours by scrutinizing packet headers. The k-means clustering employed for labelling and plots the whole behaviours into identical cluster, which characterized the behaviours into suspicious or non-suspicious composition. Subsequently, these dissimilar clustered behaviours are reordered within two classes of types such as malicious and non-malicious via decision tree classifier. KMDT is a profitable finding which improved the anomaly detection performance in identifying suspicious and non-suspicious behaviours as well as characterizes it into malicious and non-malicious behaviours more accurately. These criteria have been validated by the result from the experiments throughout banking system environment dataset 2016. KMDT have detected more malicious behaviours accurately as contrast to discrete and diversely combined methods.

Author 1: Warusia Yassin
Author 2: Siti Rahayu
Author 3: Faizal Abdollah
Author 4: Hazlin Zin

Keywords: Intrusion Detection; Malicious Behaviours; Clustering; Decision Tree Classifier; Packet Headers

PDF

Paper 28: Integrated Approach to Conceptual Modeling

Abstract: Conceptual modeling is supporting understanding and communication of the requirements in developing the information system (IS). The nature of requirements is usually divided into the functional (FRs) and non-functional requirements (NFRs). Thus, the scholars who are representing the conceptual modeling separate FRs and NFRs. Attempting to create an integrated framework for conceptual modeling of FRs and NFRs a new approach is being represented. In order to justify the approach, the research work and relevant literature in the field by using integrated perspective has been analyzed in this paper. As an outcome of this review, the need for an integrated approach to the requirement determination and proposed an integrated framework for conceptual modeling, which shall include the functional and non-functional requirements in one conceptual model has been identified. There is also identified that a small number of researchers have worked in this field, whilst the failure rate of the IS implementation which continues to be high has been the motivation, therefore the concept of proposing an integrated framework which will contribute to the increase of the efficacy of the requirements from the analysis phase in order to secure the sustainability of the IS has been approached.

Author 1: Lindita Nebiu Hyseni
Author 2: Zamir Dika

Keywords: Integrated Framework; Conceptual Model; Functional Requirements; Non-Functional Requirements; Research Gaps; Joint Approval Requirements (JAR)

PDF

Paper 29: Low Complexity for Scalable Video Coding Extension of H.264 based on the Complexity of Video

Abstract: Scalable Video Coding (SVC) / H.264 is one type of video compression techniques. Which provided more reality in dealing with video compression to provide an efficient video coding based on H.264/AVC. This ensures higher performance through high compression ratio. SVC/H.264 is a complexity technique whereas the takes considerable time for computation the best mode of macroblock and motion estimation through using the exhaustive search techniques. This work reducing the processing time through matching between the complexity of the video and the method of selection macroblock and motion estimation. The goal of this approach is reducing the encoding time and improving the quality of video stream the efficiency of the proposed approach makes it suitable for are many applications as video conference application and security application.

Author 1: Mayada Khairy
Author 2: Amr Elsayed
Author 3: Alaa Hamdy
Author 4: Hesham Farouk Ali

Keywords: Scalable video coding; motion estimation; SVC layers; quality scalability

PDF

Paper 30: An M-Learning Framework in the Podcast Form (MPF) using Context-Aware Technology

Abstract: Mobile computing is rapidly transforming the world in which we live, with the advent of iPhones, iPads, tablet computers, and Android smartphones. M-learning in the podcast form (MPF) is a recent development forconveying coursecontent to students in higher education. Context-aware technologies use temporal and environmental information to determine context. Thisstudy presents a theoretical framework for using context awareness, M-learning in the podcast forminvestigate the effectiveness of using MPF engagement with context-aware technology in Teaching and Learning a multimedia course. The framework is based on two principal dimensions (MPF andcontext-aware technology), and it contributes to support researchers in e-learning and ubiquitous learning. The study was conducted onstudents (n = 42) enrolled ina multimedia course (IS 450) at QassimUniversity. After finishing the course, theycompleted an online survey to give their feedback on the effectiveness of using MPF with context-aware technology.The results indicate that learners had a positive attitude towards usingMPF with context awarenesstechnology, and that they considered it a great way to develop their knowledge and receive course information.This study demonstrates the ability of context-aware technology to enhance the behaviour of learners by using m-learning in the podcast form.

Author 1: Mohamed A.Amasha
Author 2: Elsaeed E. AbdElrazek

Keywords: M-Learning; Context Aware; E-Learning; RSS; Podcast

PDF

Paper 31: An Inclusive Comparison in LAN Environment between Conventional and Hybrid Methods for Spectral Amplitude Coding Optical CDMA Systems

Abstract: In this paper, performance analysis of conventional spectral amplitude coding (CSAC) with hybrid (HSAC) for OCDMA system is investigated in local area network (LAN) environment. The CSAC is built based on arithmetic sequence with simple algebraic ways. The HSAC technique is used in which spectral amplitude coding (SAC) combined with wavelength division multiplexing (WDM) to effectively reduce multiple access interference (MAI) and mitigate the influence of phase induced intensity noise (PIIN) arising in photodetecting process. The main idea is to construct the code sequences in SAC domain then repeat it diagonally in the wavelength domain as groups which maintains the same cardinality of a given code weight. Results show that HSAC outperforms CSAC when the number of active users is high due to its better correlation properties. It has been shown that the HSAC can suppress intensity noise effectively and improve the bandwidth utilization significantly up to 4.2 nm.

Author 1: Hassan Yousif Ahmed
Author 2: Nisar K.S
Author 3: Z. M Gharsseldien
Author 4: S. A. Aljunid

Keywords: Conventional SAC (CSAC); Hybrid SAC (HSAC); WDM; OCDMA; MAI

PDF

Paper 32: An Approach for Analyzing ISO / IEC 25010 Product Quality Requirements based on Fuzzy Logic and Likert Scale for Decision Support Systems

Abstract: Decision Support Systems (DSS) are collaborative software systems that are built to support controlling of an organization in decision making process when faced with non-routine problems in a specific application domain. It’s important to measure portability, maintainability, security, reliability, functional suitability, performance efficiency, compatibility, and usability quality requirements of DSS properly. ISO / IEC 25010 which replaced ISO 9126, used for three different quality models for software products, such as: a) Quality in use model, b) Product quality model, and c) Data quality model. There is a lack of methodologies to measure and quantify these quality requirements. Fuzzy logic used to specify quality requirements of DSS, because it’s an approach to computing based on degrees of truth, rather than true or false logics. Likert scale is a method in which it converts qualitative values into quantitative values to make a best statistical analysis. The measurement and quantification of quality requirements of DSS is a challenging task, because these quality requirements are in qualitative form and can’t be represented in quantitative way. Although, several quality requirements methods for DSS have been proposed so far, but the research on analyzing quality requirements of DSS are still limited. In this paper, quantitative approach proposed for analyzing ISO / IEC 25010 product quality requirements based on fuzzy logic and likert scale for DSS which aims to quantify quality requirements. Moreover implemented proposed framework on a case study ‘Internet Banking’ and got data from 25 respondents i.e. System Analysts and Domain Experts of banking sector.

Author 1: Hasnain Iqbal
Author 2: Muhammad Babar

Keywords: ISO / IEC 25010; Product Quality Requirements; Fuzzy Logic; Likert Scale; Functional Requirements; Non-Functional Requirements; Internet Banking; Decision Support Systems

PDF

Paper 33: Analysis of IPv4 vs IPv6 Traffic in US

Abstract: It is still an accepted assumption that internet traffic is dominated by IPv4. However, due to introduction of modern technologies and concepts like Internet of Things (IoT) IPv6 has become the essential element. So keeping in mind the advancements in new technologies and introduced concepts to update the adoption of IPv6 on the internet. We want to find out what percentage of the IPv6 traffic is present in the Internet from last 6 years (2008-14) and to obtain the adoption curve of IPv6 native traffic by years to analyze if it is slow or fast. Also what are factors, constraints and limitations involve in the adoption of IPv6. Therefore, we have taken two data sets from the Caida website. The dataset belongs to OC-48 and OC-192 links from two data center of Equinix located at Chicago and Sanjose in the US. Finally compare the final curve with infograph of World IPv6 Launch to know how realistic it is and applied Linear Prediction techniques to see the future trend of the dataset obtained from the US population.

Author 1: Mahmood ul-Hassan
Author 2: Muhammad Amir Khan
Author 3: Khalid Mahmood
Author 4: Ansar Munir Shah

Keywords: IPv4; IPv6; Mobile node; IP Traffic; IID Testing

PDF

Paper 34: Clustering-based Spam Image Filtering Considering Fuzziness of the Spam Image

Abstract: If there are pros, corns are always there. As email becomes a part of individual’s need in our busy life with its benefits, it has negative aspect too by means of email spamming. Nowadays images with embedded text called image spamming have been used by the spammers as effective text spam filtering methods already been introduced. Tracking and stopping spam become challenge in the internet world because of versatility in the spam images. In this paper a novel model AFSIF (Autonomous Fuzzy Spam Image Filter) has been introduced. The basic idea behind AFSIF is, an spam image can combine several basic features of different spam images, so feature fusion weight of the image has been generated, which keeps combined feature of spam images and user preference as well. Here user preference has not been applied separately; it is used to calculate the fusion weight in terms of predefined topics (rule table).

Author 1: Master Prince

Keywords: versatility of spam image; feature fusion weight; cluster; rule table

PDF

Paper 35: Overview of Technical Elements of Liver Segmentation

Abstract: Liver diseases are life-threatening, it’s important to detect it tumor in early stages. So, for tumor detection Segmentation of the liver is a first and significant stride. Segmentation of the liver is a yet difficult undertaking in view of its intra patient variability in intensity, shape and size of the liver. The aim of this paper is to assemble a wide assortment of techniques and used CT scan dataset information for liver segmentation that will provide a decent beginning to the new researcher. There are different strategies from basic to advance like thresholding, active contour, region growing to graph cut is briefly abridge to give an outline of existing segmentation strategies. We review the concept of particular strategies and review their original ideas. Our idea is to provide information under which condition a chosen strategy will work or utilize.

Author 1: Nazish Khan
Author 2: Imran Ahmed
Author 3: Mehreen Kiran
Author 4: Awais Adnan

Keywords: component; CT Scan; Liver; Dataset; Segmentation technique

PDF

Paper 36: Automatic Cloud Resource Scaling Algorithm based on Long Short-Term Memory Recurrent Neural Network

Abstract: Scalability is an important characteristic of cloud computing. With scalability, cost is minimized by provisioning and releasing resources according to demand. Most of current Infrastructure as a Service (IaaS) providers deliver threshold-based auto-scaling techniques. However, setting up thresholds with right values that minimize cost and achieve Service Level Agreement is not an easy task, especially with variant and sudden workload changes. This paper has proposed dynamic threshold based auto-scaling algorithms that predict required resources using Long Short-Term Memory Recurrent Neural Network and auto-scale virtual resources based on predicted values. The proposed algorithms have been evaluated and compared with some of existing algorithms. Experimental results show that the proposed algorithms outperform other algorithms.

Author 1: Ashraf A. Shahin

Keywords: auto-scaling; cloud computing; cloud resource scaling; recurrent neural networks; resource provisioning; virtualized resources

PDF

Paper 37: U Patch Antenna using Variable Substrates for Wireless Communication Systems

Abstract: Due to their smaller size and light weighted structures patch antennas are frequently now used in GPS transmitters and receivers and throughout modern communication technology. In this paper a miniaturaized patch antenna is presented using stack configuration. Various parameters such as gain, directivity, return loss, efficiency of antenna is demonstrated. Using Air, Teflon, Foam and FR4 (Lossy) as substrates FR4 (lossy) is kept fixed and other substrates are combined one by one to observe response of proposed antenna. The antenna showed dual and tri band response with different combination of mentioned substrates. The proposed antenna has been found useful for W-LAN, GSM, Radio Satellite, Fixed Satellite Services (RSS) & (FSS) and satellite communication systems.

Author 1: Saad Hassan Kiani
Author 2: Khalid Mahmood
Author 3: Umar Farooq Khattak
Author 4: Burhan-Ud-Din
Author 5: Mehre Munir

Keywords: miniaturization; directivity; gain; substrates; efficiency; VSWR; Wireless communication; Multiband response

PDF

Paper 38: Novel Causality in Consumer’s Online Behavior: Ecommerce Success Model

Abstract: Online shopping (e-Shopping) has grown at a rapid pace with the advancement in modern web technologies, there are then socio and technical aspects (factors) in the mentioned e-shopping. The following research paper highlights some mandatory socio-technical factors affecting consumer’s behavior in online shopping environment. In this work a comprehensive conceptual model is put forward based on proposed reform DeLone and McLean Success Model for Information Systems. This model is used for the assessment of the success of eCommerce web portals. Approximately thirteen different hypotheses are proposed on the bases of this methodology which represent the cause and effect relationship among the various variables affecting consumer’s online buying behavior. Further this work is simulated in iThink technology to show prominently that consumer’s satisfaction and trust directly affects productivity of the organization. For development organizations the proposed methodology is valuable because it will facilitate in building the eCommerce websites, web portals whereas retailers can improve the productivity of their organization by accomplishing this.

Author 1: Amna Khatoon
Author 2: Shahid Nazir Bhatti
Author 3: Atika Tabassum
Author 4: Aneesa Rida
Author 5: Sehrish Alam

Keywords: Online shopping; Consumer behavior; E-marketer; Usability; DeLone & McLean; eCcommerce success model; Causal loop diagram; iThink; Simulation; Evaluation; Retailer

PDF

Paper 39: Role of Requirements Elicitation & Prioritization to Optimize Quality in Scrum Agile Development

Abstract: One of most common aspect with traditional software development is managing requirements. As requirements emerge throughout the software development process and thus are needed to be addressed through proper communication and integration between stakeholders, developers and documentation. Agile methodology is an innovative and iterative process that supports changing requirements and helps in addressing changes throughout the development process. Requirements are elicited at the beginning of every software development process and project (product) and latter are prioritized according to their importance to the market and to the product itself. One of the most important and influencing steps while making a software product is requirements prioritization. Prioritizing requirements helps the software team to understand the existence and importance of a particular requirement, its importance of use and its urgency to time to market. There are many requirements prioritization techniques with their relative strength and weaknesses. Otherwise many of them fail to take account all the factors that must be considered while prioritizing requirements such as cost, value, risk, time to market, number of requirements and effect of non-functional requirements on functional requirements. There are several requirements prioritization methodologies that aid in decision making but importantly many lacks to account the important factors that have significant influence in prioritizing requirements. A requirement prioritization methodology based on several factors such as time to market, cost, risk etc has been proposed. The proposed model is expected to overcome this lack. In sprints, requirements will be prioritized both on the basis of influencing factors such as cost, value, risk, time to market etc. and through the effect of non-functional requirements over functional requirements. This will improve the overall quality of software product when it is included in the development process of scrum. Requirements will not only be prioritized based on sprints, human decision but by critically analyzing the factors (sub characteristics) that can cause the product to success/ fail repeatedly thus ensuring the consistency in right requirements and hence the right prioritized requirements will be selected for a particular sprint at a time.

Author 1: Aneesa Rida Asghar
Author 2: Shahid Nazir Bhatti
Author 3: Atika Tabassum
Author 4: Zainab Sultan
Author 5: Rabiya Abbas

Keywords: Agile Software Engineering (ASE); Agile Software Development (ASD); Scrum Software Development Process; SCRUM; Product Owner (PO)

PDF

Paper 40: Optimizing the Locations of Intermediate Rechlorination Stations in a Drinking Water Distribution Network

Abstract: The preservation of the water quality in the distribution network requires maintaining permanently minimum residual chlorine at any point of the network. This is possible only if we plan chlore’s injections in various points of the network for intermediate rechlorination, or when increasing the initial level of chlorine in the tank outlet. In the latter case, there is a risk of disruption of the taste and smell of water for consumers near the tanks. Therefore, to avoid an excessive increase in the chlorine concentration in the tanks and to avoid affecting the taste of the distributed water, intermediate rechlorination stations should be implemented. These stations will proceed with the chlorine regulation. Given the high cost of the implementation of such stations, the optimization of the number and the choice of location of these stations are needed. This paper is focused on the implementation of an algorithm for such optimization. We used dynamic programming in this algorithm. Performance tests of our decision support system were done on real sites of the Wilaya Rabat-Sale (network of Morocco's capital).

Author 1: Amali Said
Author 2: Mourchid Mohammed
Author 3: EL Faddouli Nour-eddine
Author 4: Zouhri Mohammed

Keywords: Simulation of chlorine distribution; drinking water distribution network; deficit nodes; optimizing the locations of rechlorination stations; Dynamic programming

PDF

Paper 41: A Semantic Learning Object (SLO)Web-Editor based on Web Ontology Language (OWL) using a New OWL2XSLO Approach

Abstract: Today, we see a strong demand for real-time information, with a rapid growth of m-learning. We also see that there are many educational resources on the Internet. Learning objects (LOs) are designed as a means of reusing these resources. Most of these LOs are built for e-learning systems based on desktop computers, which prevents their use on mobile devices. A LO is an area that is open to research and has a lot of potential in the creation, adaptation and production of learning content. There are standards that describe LOs in general as IEEE LOM, SCORM. Semantic web and its associated technologies are increasingly used in electronic document editing while separating the content from the presentation. Creating a LO with the semantic web is complex and raises difficulties because of the editing tools that require general knowledge of XML syntax and related technologies. In this paper, the authors propose a new OWL2XSLO approach based on ontologies (OWL) allowing the generation of XML-Schemas LOs. They then derive a semantic LO web editor based on OWL2XSLO approach for the generation of a content type enabling the editing of interactive LOs with XML technology and which can then be integrated into LMS and adapted to the mobile display.

Author 1: Zouhair Rimale
Author 2: EL Habib Benlahmar
Author 3: Abderrahim Tragha

Keywords: m-learning; learning objects; web semantic; XML-schema; xsd; owl; Ontology; rdf

PDF

Paper 42: Detection and Classification of Mu Rhythm using Phase Synchronization for a Brain Computer Interface

Abstract: Phase synchronization in a brain computer interface based on Mu rhythm is evaluated by means of phase lag index and weighted phase lag index. In order to detect and classify the important features reflected in brain signals during execution of mental tasks (imagination of left and right hand movement), the proposed methods are implemented on two datasets. The classification is performed using linear discriminant classifier, quadratic discriminant classifier, Mahalanobis distance classifier, k nearest neighbor and support vector machine. Classification accuracies up to 74% and 61% for phase lag index and weighted phase lag index were achieved. The results indicate that phase synchronization measures are relevant for classifying mental tasks recorded in the active state and the relaxation state from additional motor area and from the sensorimotor area. Phase lag index and weighted phase lag index methods are easy to implement, efficient, provide relevant features for the classification and can be used as an offline methods for motor imagery paradigms.

Author 1: Oana Diana Eva

Keywords: brain computer interface; electroencephalogram; phase synchronization; phase lag index; weighted phase lag index; classifiers

PDF

Paper 43: Reducing the Electrical Consumption in the Humidity Control Process for Electric Cells using an Intelligent Fuzzy Logic Controller

Abstract: The electrical energy distribution uses a huge network to cover the urbanized areas. The network distribution incorporates an important number of electrical cells that ensure the energy transformation. These cells play a fundamental role to ensure a permanent feeding. Thus, the performance of these cells must be optimized. The main problem that affects these cells is the inside humidity that should be controlled permanently to prevent serious damage and power failure. The presented work proposes the use of a powerful intelligent Fuzzy Logic Controller that can online adapt their internal parameters according to the actually state of the controlled plant and auto-learn from the behavior of the plant how the current humidity level can be decreased. The used controller can stabilize the humidity inside the cells within the recommended range by controlling a set of heating resistances installed inside these cells and in the same time ensuring valuable advantages for the electrical energy distribution company. Unlike the rest of the controllers that are used to stabilize moisture. The intelligent controller used in these papers ensures a very precise control with very low power consumption which trains a very significant energy savings in each electrical cell. Knowing that the distribution network incorporates a very large number of electrical cells, the final savings balance would be a very high amount of energy that can be presented economically with significant savings on the electricity bills.

Author 1: Rafik Lasri
Author 2: Larbi Choukri
Author 3: Mohammed Bouhorma
Author 4: Ignacio Rojas
Author 5: Héctor Pomares

Keywords: humidity in electric cells; humidity control; optimization of electrical consumption; intelligent fuzzy logic controller; saving power

PDF

Paper 44: Representing Job Scheduling for Volunteer Grid Environment using Online Container Stowage

Abstract: Volunteer grid computing comprises of volunteer resources which are unpredictable in nature and as such the scheduling of jobs among these resources could be very uncer-tain. It is also difficult to ensure the successful completion of submitted jobs on volunteer resources as these resources may opt to withdraw from the grid system anytime or there might be a resource failure, which requires job reassignments. However, a careful consideration of future jobs can make scheduling of jobs more reliable on volunteer resources. There are two possibilities; either to forecast the future jobs or to forecast the resource availability by studying the history events. In this paper an attempt has been made to utilize the future job forecasting in improving the job scheduling experience with volunteer grid resources. A scheduling approach is proposed that uses container stowage to allocate the volunteer grid resources based on the jobs submitted. The proposed scheduling approach optimizes the number of resources actively used. The approach presents online container stowage adaptability for scheduling jobs using volun-teer grid resources. The performance has been evaluated by making comparison to other scheduling algorithms adopted in volunteer grid. The simulation results have shown that the pro-posed approach performs better in terms of average turnaround and waiting time in comparison with existing scheduling algo-rithms. The job load forecast also reduced the number of job reassignments.

Author 1: Saddaf Rubab
Author 2: Mohd Fadzil Hassan
Author 3: Ahmad Kamil Mahmood
Author 4: Syed Nasir Mehmood Shah

Keywords: Volunteer grid computing; volunteer resources; container stowage; job scheduling

PDF

Paper 45: An Incident Management System for Debt Collection in Virtual Banking

Abstract: An astonishing peak volume of bad loans in most countries, including Iran, is one of the latest manifestations of deep disorders which inhibited banking system from performing its main duty to promote development plans over a long period. Main mission of banking system is to link savers and those economic actors who need financial facilities. Banks, as intermediaries, receive interest from the second group and pay interest to the first group. During the last 10 years, millions of people have been controlling their financial lives online in the developed markets. Counters of access to electronic money and electronic wallet have increased currently. Bad loans increase as more facilities are provided for customers. Therefore, a mechanism is required for debt collection without any need for physical bank and improvement of this process using incident management system.

Author 1: Sareh Saberi
Author 2: Seyyed Mohsen Hashemi

Keywords: virtual banking; debt collection; incident management

PDF

Paper 46: Credibility Evaluation of Online Distance Education Websites

Abstract: Web credibility is becoming a significant factor in increasing user satisfaction, trust, and loyalty. Web credibility is particularly important for people who cannot visit an institution for one reason or other and mostly depend on the website, such as online distance education students. Accordingly, universities and educational websites need to determine the types of credibility problems they have on their websites. However, far too little attention has been paid to providing detailed information regarding the types of specific credibility problems that could be found on university websites in general, and specifically, in the Kingdom of Saudi Arabia (KSA). The aim of this paper is to study and analyze the credibility of university websites that offer distance education courses in the KSA. A total of 12 universities in Saudi Arabia were considered, which include 11 affiliated and one private university. The analysis of the data represents the level of credibility of distance education websites. Results reveal that in Saudi Arabia, distance education websites are reliable, but violate basic credibility guidelines.

Author 1: Khalid Al-Omar

Keywords: university websites; credibility; trustworthiness; online trust; website design; Saudi Arabia; distance education

PDF

Paper 47: Implementation of Cooperative Spectrum Sensing Algorithm using Raspberry Pi

Abstract: A novel cooperative spectrum sensing algorithm is implemented and analyzed using Raspberry Pi. In the proposed setup, Nokia cell phone is used as a spectrum sensing device while Raspberry Pi functions as a FC device to collect sensing results from local sensing devices. The investigation results of the proposed setup show significant improvement in detection performance as compared to local spectrum sensing techniques. Furthermore, results show a successful communication between sensing nodes and FC.

Author 1: Ammar Ahmed Khan
Author 2: Aamir Zeb Shaikh
Author 3: Shabbar Naqvi
Author 4: Talat Altaf

Keywords: Cooperative Spectrum Sensing; Cognitive Radio; Fusion Center; Raspberry Pi

PDF

Paper 48: A Centralized Reputation Management Scheme for Isolating Malicious Controller(s) in Distributed Software-Defined Networks

Abstract: Software-Defined Networks have seen an increas-ing in their deployment because they offer better network manageability compared to traditional networks. Despite their immense success and popularity, various security issues in SDN remain open problems for research. Particularly, the problem of securing the controllers in distributed environment is still short of any solutions. This paper proposes a scheme to identify any rogue/malicious controller(s) in a distributed environment. Our scheme is based on trust and reputation system which is centrally managed. As such, our scheme identifies any controllers acting maliciously by comparing the state of installed flows/policies with policies that should be installed. Controllers rate each other on this basis and report the results to a central entity, which reports it to the network administrator.

Author 1: Bilal Karim Mughal
Author 2: Sufian Hameed
Author 3: Ghulam Muhammad Shaikh

Keywords: SDN; controller security; malicious controllers; trust; reputation

PDF

Paper 49: Crowd Mobility Analysis using WiFi Sniffers

Abstract: Wi-fi enabled devices such as today’s smart-phones are regularly in-search for connectivity. They continuously send management frames called Probe Requests searching for previ-ously accessed networks. These frames contain the sender’s MAC addresses in clear text, which can be used as an identifier for that sender. Being able to sniff that MAC address at several locations allows us to understand the mobility behavior of that device. In this paper, we present a solar-powered, beagle-bone based standalone system that continuously sniffs the air for probes and extract their MAC addresses. We deployed the system in the world’s largest gathering (The Hajj) and tested it at scale. Our objective was to build an infrastructure for non-invasive mass crowd analysis. Our deployment had a total of 8 sniffers covering a population of 185,000 people. We detected 37.5% of the population, analysed their arrival and departure behaviours, identified their smartphone manufacturers and extracted their transition patterns from one sub-location to another. By pre-senting valuable insights on the mobility of our target crowd, we validated the potential of our platform for crowd mobility analysis.

Author 1: Anas Basalamah

Keywords: WiFi Probes; Crowd Monitoring; Crowd Mobility Analysis

PDF

Paper 50: Fault-Tolerant Resource Provisioning with Deadline-Driven Optimization in Hybrid Clouds

Abstract: Resource provisioning remains as one of the chal-lenging research problems in cloud computing, more importantly when considered together with service reliability. Fault-tolerance techniques such as fault-recovery is one of the techniques that can be employed to improve on service reliability. Technically, fault-recovery has obvious impact on service performance. Such impact requires detailed studies. Only few works on hybrid cloud resource provisioning address fault recovery and its impact. In this paper, we investigate the problem of resource provisioning in hybrid Clouds, considering the probability of hybrid cloud resource failure during job execution. We formulate this problem as an optimization model with operational cost as an objective function subject to the deadline constraint of jobs. Based on our proposed optimization model, we design a heuristic-based algo-rithm called dynamic resource provisioning algorithm (DRPA). We then perform extensive experiments to evaluate performance of the proposed algorithm based on a real world set of data. The results confirm the obvious impact of fault recovery on the performance metrics (operational cost and deadline violation rate) and also confirms that DRPA can be useful in minimizing operational cost.

Author 1: Emmanuel Ahene
Author 2: Kingsley Nketia Acheampong
Author 3: Heyang Xu

Keywords: Deadline; fault recovery; hybrid Clouds; resource provisioning; software-as-a-service

PDF

Paper 51: Using Real-World Car Traffic Dataset in Vehicular Ad Hoc Network Performance Evaluation

Abstract: Vehicular ad hoc networking is an emerging paradigm which is gaining much interest with the development of new topics such as the connected vehicle, the autonomous vehicle, and also new high-speed mobile communication technologies such as 802.11p and LTE-D. This paper presents a brief review of different mobility models used for evaluating performance of routing protocols and applications designed for vehicular ad hoc networks. Particularly, it describes how accurate mobility traces can be built from a real-world car traffic dataset that embeds the main characteristics affecting vehicle-to-vehicle communications. An effective use of the proposed mobility models is illustrated in various road traffic conditions involving communicating vehicles equipped with 802.11p. This study shows that such dataset actually contains additional information that cannot completely be obtained with other analytical or simulated mobility models, while impacting the results of performance evaluation in vehicular ad hoc networks.

Author 1: Lucas Rivoirard
Author 2: Martine Wahl
Author 3: Patrick Sondi
Author 4: Marion Berbineau
Author 5: Dominique Gruyer

Keywords: MOCoPo dataset; mobility models; vehicular ad hoc networks; simulation; performance evaluation

PDF

Paper 52: Modeling and Solving the Open-End Bin Packing Problem

Abstract: In the Open-End Bin Packing Problem a set of items with varying weights must be packed into bins of uniform weight limit such that the capacity of the bin can be exceeded only by the last packed item, known as the overflow item. The objective is to minimize the number of used bins. In this paper, we present our Integer Linear Program model based on a modification of Cesili and Righini model [1]. Also, we propose two greedy heuristics to solve a problem. The first one is an adaptation of the Minimum Bin Slack heuristic where we have reduced to one unit capacity, the weight of the largest item in the current bin. While, the second heuristic is based on the well-known First Fit Decreasing heuristic. Computational results based on benchmark instances taken from the literature as well as generated instances show the effectiveness of the proposed heuristics in both solution quality and time requirement.

Author 1: Maiza Mohamed
Author 2: Tebbal Mohamed
Author 3: Rabia Billal

Keywords: Open-End Bin-packing; heuristics; discrete opti-mization; combinatorial problem

PDF

Paper 53: Performance Comparison between MAI and Noise Constrained LMS Algorithm for MIMO CDMA DFE and Linear Equalizers

Abstract: This paper presents a performance comparison between a constrained least mean squared algorithm for MIMO CDMA decision feedback equalizer and linear equalizer. Both algorithms are constrained on the length of spreading sequence, number of users, variance of multiple access interference as well as additive white Gaussian noise (new constraint). An important feature of both algorithms is that multiple access interference together with noise variance is used as a constraint in MIMO CDMA linear and decision feedback equalization systems. Convergence analysis is performed for algorithm in both cases. From the simulation results shown at the end show that algorithm developed for decision feedback equalizer has outperformed the algorithm developed for linear equalizer in MIMO CDMA case

Author 1: Khalid Mahmood

Keywords: Least mean squared algorithm (LMS); linear equal-izer (LE); multiple input; multiple output (MIMO); decision feedback equalizer (DFE); multiple access interference (MAI); Variance; adaptive algorithm

PDF

Paper 54: Software Defined Security Service Provisioning Framework for Internet of Things

Abstract: Programmable management framework have paved the way for managing devices in the network. Lately, emerging paradigm of Software Defined Networking (SDN) have rev-olutionized programmable networks. Designers of networking applications i.e. Internet of things (IoT) have started investigating potentials of SDN paradigm in improving network management. IoT envision interconnecting various embedded devices surround-ing our environment with IP to enable internet connectivity. Unlike traditional network architectures, IoT are characterized by constraint in resources and heterogeneous inter connectivity of wireless and wired medium. Therefore, unique challenges for managing IoT are raised which are discussed in this paper. Ubiquity of IoT have raised unique security challenges in IoT which is one of the aspect of management framework for IoT. In this paper, security threats and requirements are summarized in IoT extracted from the state of the art efforts in investigating security challenges of IoT. Also, SDN based security service provisioning framework for IoT is proposed.

Author 1: Faraz Idris Khan
Author 2: Sufian Hameed

Keywords: IoT; Software Defined Security; Security in IoT; Software Defined Networking; Software Defined based IoT (SDIoT)

PDF

Paper 55: The Art of Crypto Currencies

Abstract: Crypto Currencies have recently gained enormous popularity amongst the general public. With each passing day, more and more companies are radically accepting crypto cur-rencies in their payment systems, paving way for an economic revolution. Currently more than 700 crypto-currencies are avail-able at Coindesk alone for trade purposes. As of November 2016, the Crypto currencies hold a total market share of over 14 Billion USD1 [5]. With no centralized institution to monitor the movement of funds, Crypto currencies and their users are susceptible to multiple threats. In this paper we present an effort to explain the functionality of some of the most popular crypto currencies available in the online market. We present an analysis of the mining methodologies employed by these currencies to induce new currency into the market and how they compete with each other to provide fast, decentralized transactions to the users. We also share, some of the most dangerous attacks that can be placed on these crypto currencies and how the overall model of the crypto currencies mitigates these attacks. Towards the end, we will present taxonomy of the five highly popular crypto currencies and compare their features.

Author 1: Sufian Hameed
Author 2: Sameet Farooq

Keywords: Crypto Currency; Bitcoin; Ripple; Litecoin; Dash coin; Stellar

PDF

Paper 56: A New Approach of Graph Realization for Data Hiding using Human Encoding

Abstract: The rapid advancement of technology has changed the way of our living. Sharing information becomes inevitable in everyday life. However, it encounters many security issues when dealing with secret or private information. The transmission of such sophisticated information has become highly important and received much attention. Therefore, various techniques have been exercised for security of information. Graph steganography is a way of hiding information by translating it to plotted data in a graph. Because of numerous usages of graphs in everyday life, the transmission can take place without drawing any attention. In this paper, we propose a new graph realization technique for steganography that looks as if innocent and imperceptible to present day steganalytic attacks and the hidden message can only be read by its respective recipient. The secret message is first translated to prefix codes using huffman encoding. Then the prefix code for separate word in the message is plotted in a graph. The proposed technique offers high embedding capacity and imperceptibility due to prefix presentation and word by word encoding of the message. The experimental outcomes show strong resistance towards steganalytic attacks in contrast to other approaches.

Author 1: Fatema Akhter
Author 2: Md. Selim Al Mamun

Keywords: Data hiding; Graph steganography; Huffman encoding; Steganalytic attack

PDF

The Science and Information (SAI) Organization
BACK TO TOP

Computer Science Journal

  • About the Journal
  • Call for Papers
  • Submit Paper
  • Indexing

Our Conferences

  • Computing Conference
  • Intelligent Systems Conference
  • Future Technologies Conference
  • Communication Conference

Help & Support

  • Contact Us
  • About Us
  • Terms and Conditions
  • Privacy Policy

© The Science and Information (SAI) Organization Limited. All rights reserved. Registered in England and Wales. Company Number 8933205. thesai.org