The Science and Information (SAI) Organization
  • Home
  • About Us
  • Journals
  • Conferences
  • Contact Us

Publication Links

  • IJACSA
  • Author Guidelines
  • Publication Policies
  • Digital Archiving Policy
  • Promote your Publication
  • Metadata Harvesting (OAI2)

IJACSA

  • About the Journal
  • Call for Papers
  • Editorial Board
  • Author Guidelines
  • Submit your Paper
  • Current Issue
  • Archives
  • Indexing
  • Fees/ APC
  • Reviewers
  • Apply as a Reviewer

IJARAI

  • About the Journal
  • Archives
  • Indexing & Archiving

Special Issues

  • Home
  • Archives
  • Proposals
  • Guest Editors
  • SUSAI-EE 2025
  • ICONS-BA 2025
  • IoT-BLOCK 2025

Future of Information and Communication Conference (FICC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Computing Conference

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Intelligent Systems Conference (IntelliSys)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Future Technologies Conference (FTC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact
  • Home
  • Call for Papers
  • Editorial Board
  • Guidelines
  • Submit
  • Current Issue
  • Archives
  • Indexing
  • Fees
  • Reviewers
  • Subscribe

IJACSA Volume 3 Issue 2

Copyright Statement: This is an open access publication licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.

View Full Issue

Paper 1: A Comprehensive Analysis of E-government services adoption in Saudi Arabia: Obstacles and Challenges

Abstract: Often referred as Government to Citizen (G2C) e-government services, many governments around the world are developing and utilizing ICT technologies to provide information and services to their citizens. In Saudi Arabia (KSA) e-government projects have been identified as one of the top government priority areas. However, the adoption of e-government is facing many challenges and barriers including technological, cultural, organizational which must be considered and treated carefully. This paper explores the key factors of user adoption of e-government services through empirical evidence gathered by survey of 460 Saudi citizens including IT department employees from different public sectors. Based on the analysis of data collected the researchers were able to identify some of the important barriers and challenges from these different perspectives. As a result, this study has generated a list of possible recommendations for the public sector and policy-makers to move towards successful adoption of e-government services in Saudi Arabia.

Author 1: Mohammed Alshehri
Author 2: Steve Drew

Keywords: Mohammed Alshehri, Steve Drew, Osama Alfarraj

PDF

Paper 2: A Flexible Approach to Modelling Adaptive Course Sequencing based on Graphs implemented using Xlink

Abstract: A major challenge in developing systems of distance learning is the ability to adapt learning to individual users. This adaptation requires a flexible scheme for sequencing the material to teach diverse learners. This is where we intend to contribute to model the personalized learning paths to be followed by the learner to achieve his/her determined educational objective. Our modelling approach of sequencing is based on the pedagogical graph which is called SMARTGraph. This graph allows expressing the totality of the pedagogic constraints under which the learner is submitted in order to achieve his/her pedagogic objective. SMARTGraph is a graph in which the nodes are the learning units and the arcs are the pedagogic constraints between learning units. We shall see how it is possible to organize the learning units and the learning paths to answer the expectations within the framework of individual courses according to the learner profile or within the framework of group courses. To implement our approach we exploit the strength of XLink (XML Linking Language) to define the sequencing graph.

Author 1: Rachid ELOUAHBI
Author 2: Driss BOUZIDI
Author 3: Noreddine ABGHOUR
Author 4: Mohammed Adil NASSIR

Keywords: e-learning; pedagogical graph; adaptability; profile; learning units; XML; XLINK; XSL.

PDF

Paper 3: A Global Convergence Algorithm for the Supply Chain Network Equilibrium Model

Abstract: In this paper, we first present an auxiliary problem method for solving the generalized variational inequalities problem on the supply chain network equilibrium model (GVIP), then its global convergence is also established under milder conditions.

Author 1: Lei Wang

Keywords: Supply chain management; network equilibrium model; generalized variational inequalities; algorithm; globally convergent.

PDF

Paper 4: A New Approach of Trust Relationship Measurement Based on Graph Theory

Abstract: The certainty trust relationship of network node behavior has been presented based on graph theory, and a measurement method of trusted-degree is proposed. Because of the uncertainty of trust relationship, this paper has put forward the random trusted-order and firstly introduces the construction of trust relations space (TRS) based on trusted order. Based on all those above, the paper describes new method and strategy which monitor and measure the node behavior on the expectancy behavior character for trusted compute of the node. According to manifestation of node behavior and historical information, adjust and predict the trusted-order of node behavior. The paper finally establishes dynamic trust evaluation model based node behavior characters, and then it discusses the trusted measurement method which measures the connection and hyperlink for node behavior of network in trust relationship space.

Author 1: Ping He

Keywords: Trust relations; trust relationship graph; trusted-order; random trust relationship.

PDF

Paper 5: An incremental learning algorithm considering texts' reliability

Abstract: The sequence of texts selected obviously influences the accuracy of classification. Some sequences may make the performance of classification poor. For overcoming this problem, an incremental learning algorithm considering texts’ reliability, which finds reliable texts and selects them preferentially, is proposed in this paper. To find reliable texts, it uses two evaluation methods of FEM and SEM, which are proposed according to the text distribution of unlabeled texts. The results of the last experiments not only verify the effectiveness of the two evaluation methods but also indicate that the proposed incremental learning algorithm has advantages of fast training speed, high accuracy of classification, and steady performance.

Author 1: Xinghua Fan
Author 2: Shaozhu Wang

Keywords: text classification; incremental learning; reliability; text distribution; evaluation.

PDF

Paper 6: Applying Social Network Analysis to Analyze a Web-Based Community

Abstract: this paper deals with a very renowned website (that is Book-Crossing) from two angles: The first angle focuses on the direct relations between users and books. Many things can be inferred from this part of analysis such as who is more interested in book reading than others and why? Which books are most popular and which users are most active and why? The task requires the use of certain social network analysis measures (e.g. degree centrality). What does it mean when two users like the same book? Is it the same when other two users have one thousand books in common? Who is more likely to be a friend of whom and why? Are there specific people in the community who are more qualified to establish large circles of social relations? These questions (and of course others) were answered through the other part of the analysis, which will take us to probe the potential social relations between users in this community. Although these relationships do not exist explicitly, they can be inferred with the help of affiliation network analysis and techniques such as m-slice. Book-Crossing dataset, which covered four weeks of users' activities during 2004, has always been the focus of investigation for researchers interested in discovering patterns of users' preferences in order to offer the most possible accurate recommendations. However; the implicit social relationships among users that emerge (when putting users in groups based on similarity in book preferences) did not gain the same amount of attention. This could be due to the importance recommender systems attain these days (as compared to other research fields) as a result to the rapid spread of e-commerce websites that seek to market their products online. Certain social network analysis software, namely Pajek, was used to explore different structural aspects of this community such as brokerage roles, triadic constraints and levels of cohesion. Some overall statistics were also obtained such as network density, average geodesic distance and average degree.

Author 1: Mohammed Al-Taie
Author 2: Seifedine Kadry

Keywords: Affiliation Networks; Book-Crossing; Centrality Measures; Ego-Network; M-Slice Analysis; Pajek; Social Network Analysis; Social Networks.

PDF

Paper 7: Conception of a management tool of Technology Enhanced Learning Environments

Abstract: This paper describes the process of the conception of a software tool of TELE management. The proposed management tool combines information from two sources: i) the automatic reports produced by the Learning Content Management System (LCMS) Blackboard and ii) the views of students and teachers on the use of the LCMS in the process of teaching and learning. The results show that the architecture of the proposed management tool has the features of a management tool, since its potential to control, to reset and to enhance the use of an LCMS in the process of teaching and learning and teacher training, is shown.

Author 1: Sérgio André Ferreira
Author 2: António Andrade

Keywords: Learning Content Management System; Management Tool; Technology Enhanced Learning Environments.

PDF

Paper 8: E-Learning Methodologies and Tools

Abstract: E-learning is among the most important explosion propelled by the internet transformation. This allows users to fruitfully gather knowledge and education both by synchronous and asynchronous methodologies to effectively face the need to rapidly acquire up to date know-how within productive environments. This review paper discusses on e-learning methodologies and tools. The different categories of e-learning that includes informal and blending learning, network and work-based learning. The main focus of e-learning methodologies is on both asynchronous and synchronous methodology. The paper also looked into the three major e-learning tools which are (i) curriculum tools (ii) digital library tools and (iii) knowledge representation tools. The paper resolves that e-learning is a revolutionary way to empower workforce with the skill and knowledge it needs to turn change to an advantage. Consequently, many corporations are discovering that e-learning can be used as a tool for knowledge management. Finally the paper suggests that synchronous tools should be integrated into asynchronous environments to allow for “any-time” learning model. This environment would be primarily asynchronous with background discussion, assignments and assessment taking place and managed through synchronous tools.

Author 1: Oye N D
Author 2: Mazleena Salleh
Author 3: N. A. Iahad

Keywords: E-learning; Synchronous; Asynchronous; Tools; Methodology; Knowledge management.

PDF

Paper 9: Fairness Enhancement Scheme for Multimedia Applications in IEEE 802.11e Wireless LANs

Abstract: Multimedia traffic should be transmitted to a receiver within the delay bound. The traffic is discarded when breaking its delay bound. Then, QoS (Quality of Service) of the traffic and network performance are lowered. The IEEE 802.11e standard defines a TXOP (Transmission Opportunity) parameter. The TXOP is the time interval in which a station can continuously transmit multiple data packets. All stations use the same TXOP value in the IEEE 802.11e standard. Therefore, when stations transmit traffic generated in different multimedia applications, fairness problem occurs. In order to alleviate the fairness problem, we propose a dynamic TXOP control scheme based on the channel utilization of network and multimedia traffic quantity in the queue of a station. The simulation results show that the proposed scheme improves fairness and QoS of multimedia traffic.

Author 1: Young-Woo Nam
Author 2: Sunmyeng Kim
Author 3: Si-Gwan Kim

Keywords: fairness; multimedia traffic; EDCA; QoS; TXOP.

PDF

Paper 10: Hybrid Feature Extraction Technique for Face Recognition

Abstract: This paper presents novel technique for recognizing faces. The proposed method uses hybrid feature extraction techniques such as Chi square and entropy are combined together. Feed forward and self-organizing neural network are used for classification. We evaluate proposed method using FACE94 and ORL database and achieved better performance.

Author 1: Sangeeta N Kakarwal
Author 2: Ratnadeep R. Deshmukh

Keywords: Biometric; Chi square test; Entropy; FFNN; SOM.

PDF

Paper 11: Improving Seek Time for Column Store Using MMH Algorithm

Abstract: Hash based search has, proven excellence on large data warehouses stored in column store. Data distribution has significant impact on hash based search. To reduce impact of data distribution, we have proposed Memory Managed Hash (MMH) algorithm that uses shift XOR group for Queries and Transactions in column store. Our experiments show that MMH improves read and write throughput by 22% for TPC-H distribution.

Author 1: Tejaswini Apte
Author 2: Dr. Maya Ingle
Author 3: Dr. A.K.Goyal

Keywords: Load; Selectivity; Seek; TPC-H; Algorithms; Hash.

PDF

Paper 12: A Discrete Event Barber Shop Simulation

Abstract: A simulation based project is designed which can be practically implemented in a workspace (in this case, a barber shop). The design algorithm provides the user different time varying features such as number of people arrival, number of people being served, number of people waiting at the queue etc depending upon input criteria and system capability. The project is actually helpful for a modern barber shop in which a close inspection is needed. The owner or the manager of the shop can easily have a thorough but precise idea about the performance of the shop. At the same time he/she can easily decide to modify the arrangement and capability of the shop.

Author 1: Masud Rana
Author 2: Md. Jobayer Hossain
Author 3: Ratan Kumar Ghosh
Author 4: Md. Mostafizur Rahman

Keywords: Normal distribution; Simulation.

PDF

Paper 13: Speaker Identification using Frequency Dsitribution in the Transform Domain

Abstract: In this paper, we propose Speaker Identification using the frequency distribution of various transforms like DFT (Discrete Fourier Transform), DCT (Discrete Cosine Transform), DST (Discrete Sine Transform), Hartley, Walsh, Haar and Kekre transforms. The speech signal spoken by a particular speaker is converted into frequency domain by applying the different transform techniques. The distribution in the transform domain is utilized to extract the feature vectors in the training and the matching phases. The results obtained by using all the seven transform techniques have been analyzed and compared. It can be seen that DFT, DCT, DST and Hartley transform give comparatively similar results (Above 96%). The results obtained by using Haar and Kekre transform are very poor. The best results are obtained by using DFT (97.19% for a feature vector of size 40).

Author 1: H B Kekre
Author 2: Vaishali Kulkarni

Keywords: Speaker Identification; DFT; DCT; DST; Hartley; Haar; Walsh; Kekre’s Transform.

PDF

Paper 14: New design of Robotics Remote lab

Abstract: The Robotic Remote Laboratory (RRL) controls the Robot labs via the Internet and applies the Robot experiment in easy and advanced way. If we want to enhance the RRL system, we must study requirements of the Robot experiment deeply. One of key requirements of the Robot experiment is the Control algorithm, which includes all important activities to affect the Robot; one of them relates the path or obstacle. Our goal is to produce a new design of the RRL that includes a new treatment to the Control algorithm which depends on isolating one of the Control algorithm's activities that relates the paths in a separated algorithm, i.e., design the (Path planning algorithm) is independent of the original Control algorithm. This aim can be achieved by depending on the light to produce the Light obstacle. To apply the Light obstacle, we need to hardware (Light control server and Light arms) and software (path planning algorithm).The NXT 2.0 Robot will sense the Light obstacle depending on its Light sensor. The new design has two servers: one for the path (Light control server) and other for the other activities of the Control algorithm (Robot control server).The website of the new design includes three main parts (Lab Reservation, Open Lab, Download Simulation).We proposed a set of scenarios for organizing the reservation of the Remote Lab. Additionally, we developed an appropriate software to simulate the Robot and to practice it before using the Remote lab.

Author 1: Mohammad R Kadhum
Author 2: Seifedine Kadry

Keywords: Robotic Remote Laboratory, Robot experiment, Light obstacle, Control algorithm, NXT 2.0Robot, Robot lab, Path planning algorithm.

PDF

Paper 15: Performance Evaluation of Adaptive Virtual Machine Load Balancing Algorithm

Abstract: The conception of Cloud computing has not only reshaped the field of distributed systems but also extend businesses potential. Load balancing is a core and challenging issue in Cloud Computing. How to use Cloud computing resources efficiently and gain the maximum profits with efficient load balancing algorithm is one of the Cloud computing service providers’ ultimate goals. In this paper firstly an analysis of different Virtual machine(VM) load balancing algorithms was done, a new VM load balancing algorithm has been proposed and implemented in Virtual Machine environment of cloud computing in order to achieve better response time and cost.

Author 1: Meenakshi Sharma
Author 2: Pankaj Sharma

Keywords: Virtual machine; load balancing; cloudsim.

PDF

Paper 16: Polylogarithmic Gap between Meshes with Reconfigurable Row/Column Buses and Meshes with Statically Partitioned Buses

Abstract: This paper studies the difference in computational power between the mesh-connected parallel computers equipped with dynamically reconfigurable bus systems and those with static ones. The mesh with separable buses (MSB) is the mesh-connected parallel computer with dynamically reconfigurable row/column buses. The broadcast buses of the MSB can be dynamically sectioned into smaller bus segments by program control. We show that the MSB of size n×n can work with ?(?log?^2?n ) step even if its dynamic reconfigurable function is disabled. Here, we assume the word-model broadcast buses, and use the relation between the word-model bus and the bit-model bus.

Author 1: Susumu Matsumae

Keywords: mesh-connected parallel computer; dynamically reconfigurable bus; statically partitioned bus; simulation algorithm.

PDF

Paper 17: Post-Editing Error Correction Algorithm For Speech Recognition using Bing Spelling Suggestion

Abstract: ASR short for Automatic Speech Recognition is the process of converting a spoken speech into text that can be manipulated by a computer. Although ASR has several applications, it is still erroneous and imprecise especially if used in a harsh surrounding wherein the input speech is of low quality. This paper proposes a post-editing ASR error correction method and algorithm based on Bing’s online spelling suggestion. In this approach, the ASR recognized output text is spell-checked using Bing’s spelling suggestion technology to detect and correct misrecognized words. More specifically, the proposed algorithm breaks down the ASR output text into several word-tokens that are submitted as search queries to Bing search engine. A returned spelling suggestion implies that a query is misspelled; and thus it is replaced by the suggested correction; otherwise, no correction is performed and the algorithm continues with the next token until all tokens get validated. Experiments carried out on various speeches in different languages indicated a successful decrease in the number of ASR errors and an improvement in the overall error correction rate. Future research can improve upon the proposed algorithm so much so that it can be parallelized to take advantage of multiprocessor computers.

Author 1: Youssef Bassil
Author 2: Mohammad Alwani

Keywords: Speech Recognition; Error Correction; Bing Spelling Suggestion.

PDF

Paper 18: Segmentation of the Breast Region in Digital Mammograms and Detection of Masses

Abstract: The mammography is the most effective procedure for an early diagnosis of the breast cancer. Finding an accurate and efficient breast region segmentation technique still remains a challenging problem in digital mammography. In this paper we explore an automated technique for mammogram segmentation. The proposed algorithm uses morphological preprocessing algorithm in order to: remove digitization noises and separate background region from the breast profile region for further edge detection and regions segmentation.

Author 1: Armen Sahakyan
Author 2: Hakop Sarukhanyan

Keywords: mammography; image segmentation; ROI; masses detection; breast region

PDF

Paper 19: wavelet de-noising technique applied to the PLL of a GPS receiver embedded in an observation satellite

Abstract: In this paper, we study the Doppler effect on a GPS(Global Positioning System) on board of an observation satellite that receives information on a carrier wave L1 frequency 1575.42 MHz .We simulated GPS signal acquisition. This allowed us to see the behavior of this type of receiver in AWGN channel (AWGN) and we define a method to reduce the Doppler Effect in the tracking loop which is wavelet de-noising technique.

Author 1: Dib Djamel Eddine
Author 2: Djebbouri Mohamed
Author 3: Taleb Ahmed Abddelmalik

Keywords: GPS; Doppler frequency; PLL; wavelet packet de-noising;

PDF

Paper 20: An Improved Squaring Circuit for Binary Numbers

Abstract: In this paper, a high speed squaring circuit for binary numbers is proposed. High speed Vedic multiplier is used for design of the proposed squaring circuit. The key to our success is that only one Vedic multiplier is used instead of four multipliers reported in the literature. In addition, one squaring circuit is used twice. Our proposed Squaring Circuit seems to have better performance in terms of speed.

Author 1: Kabiraj Sethi
Author 2: Rutuparna Panda

Keywords: Vedic mathematics; VLSI; binary multiplication; hardware design; VHDL.

PDF

Paper 21: Forks impacts and motivations in free and open source projects

Abstract: Forking is a mechanism of splitting in a community and is typically found in the free and open source software field. As a failure of cooperation in a context of open innovation, forking is a practical and informative subject of study. In-depth researches concerning the fork phenomenon are uncommon. We therefore conducted a detailed study of 26 forks from popular free and open source projects. We created fact sheets, highlighting the impact and motivations to fork. We particularly point to the fact that the desire for greater technical differentiation and problems of project governance are major sources of conflict.

Author 1: R Viseur

Keywords: open source; free software; community, co-creation, fork.

PDF

Paper 22: Energy-Efficient Dynamic Query Routing Tree Algorithm for Wireless Sensor Networks

Abstract: To exploit in answering queries generated by the sink for the sensor networks, we propose an efficient routing protocol called energy-efficient dynamic routing tree (EDRT) algorithm. The idea of EDRT is to maximize in-network processing opportunities using the parent nodes and sibling nodes. In-network processing reduces the number of message transmission by partially aggregating results of an aggregate query in intermediate nodes, or merging the results in one message. This results in reduction of communication cost. Our experimental results based on simulations prove that our proposed method can reduce message transmissions more than query specific routing tree (QSRT) and flooding-based routing tree (FRT).

Author 1: Si Gwan Kim
Author 2: Hyong Soon Park

Keywords: sensor networks; routing trees; query processing.

PDF

Paper 23: Design of a web-based courseware authoring and presentation system

Abstract: A Web-based Courseware Authoring and Presentation System is a user-friendly and interactive e-learning software that can be used by both computer experts and non-computer experts to prepare a courseware in any subject of interest and to present lectures to the target audience in full media. The resultant courseware is accessed online by the target audience. The software features automated assessment and grading of students. Top-down methodology was adopted in the development of the authoring software. Implementation languages include Asp.Net and Visual Basic 9.0 and Microsoft Access 2007. An author can use the system to create a web-based courseware on any topic of his choice, while the software platform still remains intact for yet another author. A major contribution of this work is that it eases courseware preparation and delivery for lecturers and trainers.

Author 1: Hyacinth C Inyiama
Author 2: Miss Chioma N. Anozie
Author 3: Dr. Mrs. Christiana C. Okezie
Author 4: Mrs. Nkolika O. Nwazor

Keywords: Web; Courseware; Authoring; Presentation; E-Learning; Multimedia.

PDF

Paper 24: The Role of ICT in Education: Focus on University Undergraduates taking Mathematics as a Course

Abstract: This paper examines the role of ICT in education with focus on university undergraduates taking mathematics as a course. The study was conducted at the Federal University of Technology Yola, Adamawa State, Nigeria. 150 questionnaires were administered to the first year students offering MA112 which was completed and returned in the lecture hall. According to the study ICT usage shows that majority (32.7%) use technology once or more in a day. Again the majority of the respondents (35%) said that the greatest barrier to using ICT is technical. The survey shows that there is significant correlation between the students and the use of ICT in their studies. However difficulties facing ICT usage is highly significant also. This shows that students have negative attitudes towards using ICT in their academic work. This is a foundational problem which cannot be over emphasized. Most of the students have never practice using ICT in their primary and secondary schools. Recommendations were made, that the government should develop ICT policies and guidelines to support all levels of education from primary schools to university. ICT tools should be made more accessible to both academic staff and students.

Author 1: Oye N D
Author 2: Z.K. Shallsuku
Author 3: A.Iahad, N.

Keywords: University undergraduates; ICT; Education; ICT tools; ICT infrastructure.

PDF

Paper 25: Using Data Mining Techniques to Build a Classification Model for Predicting Employees Performance

Abstract: Human capital is of a high concern for companies’ management where their most interest is in hiring the highly qualified personnel which are expected to perform highly as well. Recently, there has been a growing interest in the data mining area, where the objective is the discovery of knowledge that is correct and of high benefit for users. In this paper, data mining techniques were utilized to build a classification model to predict the performance of employees. To build the classification model the CRISP-DM data mining methodology was adopted. Decision tree was the main data mining tool used to build the classification model, where several classification rules were generated. To validate the generated model, several experiments were conducted using real data collected from several companies. The model is intended to be used for predicting new applicants’ performance.

Author 1: Qasem A Al-Radaideh
Author 2: Eman Al Nagi

Keywords: Data Mining, Classification, Decision Tree, Job Performance.

PDF

Paper 26: Web 2.0 Technologies and Social Networking Security Fears in Enterprises

Abstract: Web 2.0 systems have drawn the attention of corporation, many of which now seek to adopt Web 2.0 technologies and transfer its benefits to their organizations. However, with the number of different social networking platforms appearing, privacy and security continuously has to be taken into account and looked at from different perspectives. This paper presents the most common security risks faced by the major Web 2.0 applications. Additionally, it introduces the most relevant paths and best practices to avoid these identified security risks in a corporate environment.

Author 1: Fernando Almeida

Keywords: Web 2.0; security; social networking; management risks.

PDF

Paper 27: A Knowledge-Based Educational Module for Object-Oriented Programming & The Efficacy of Web Based e-Learning

Abstract: The purpose of this research was to explore the effectiveness of using computer-aided learning methods in teaching compared to traditional instructions. Moreover, the research proposed an intelligent-based educational module for teaching object oriented languages. The results provide teachers positive outcomes of using computers technology in teaching. Sample of more than one hundred undergraduate students from two universities located in the Middle East participated in this empirical study. The findings of this study indicated that students using e-learning style perform more efficient in terms of understandability than traditional face-to-face learning approach. The research also indicated that female students’ performance is equally likely to male students.

Author 1: Ahmad S Mashhour

Keywords: Computer-Aided Learning (CAL); Educational module; e-Learning; Knowledge-Base; Object-Oriented Programming (OOP); Student performance; Traditional Learning.

PDF

Paper 28: Clustering as a Data Mining Technique in Health Hazards of High levels of Fluoride in Potable Water

Abstract: This article explores data mining techniques in health care. In particular, it discusses data mining and its application in areas where people are affected severely by using the under- ground drinking water which consist of high levels of fluoride in Krishnagiri District, Tamil Nadu State, India. This paper identifies the risk factors associated with the high level of fluoride content in water, using clustering algorithms and finds meaningful hidden patterns which gives meaningful decision making to this socio-economic real world health hazard. [2]

Author 1: T Balasubramanian
Author 2: R.Umarani

Keywords: Data mining, Fluoride affected people, Clustering, K-means, Skeletal.

PDF

Paper 29: GSM-Based Wireless Database Access For Food And Drug Administration And Control

Abstract: GSM (Global system for mobile communication) based wireless database access for food and drug administration and control is a system that enables one to send a query to the database using the short messaging system (SMS) for information about a particular food or drug. It works in such a way that a user needs only send an SMS in order to obtain information about a particular drug produced by a pharmaceutical industry. The system then receives the SMS, interprets it and uses its contents to query the database to obtain the required information. The system then sends back the required information to the user if available; otherwise it informs the user of the unavailability of the required information. The application database is accessed by the mobile device through a serial port using AT commands. This system will be of great help to the National Agency for Food and Drug Administration and Control (NAFDAC), Nigeria in food and drug administration and control. It will help give every consumer access to information about any product he/she wants to purchase, and it will also help in curbing counterfeiting. NAFDAC can also use this system to send SMS alerts on banned products to users of mobile phones. Its application can be extended to match the needs of any envisaged user in closely related applications involving wireless access to a remote database.

Author 1: Hyacinth C Inyiama
Author 2: Mrs Lois Nwobodo
Author 3: Dr. Mrs. Christiana C. Okezie
Author 4: Mrs. Nkolika O. Nwazor

Keywords: Web; GSM; SMS; AT commands; Database; NAFDAC.

PDF

Paper 30: Novel Techniques for Fair Rate Control in Wireless Mesh Networks

Abstract: IEEE 802.11 based wireless mesh networks can exhibit severe fairness problem by distributing throughput among different flows originated from different nodes. Congestion control, Throughput, Fairness are the important factors to be considered in any wireless network. Flows originating from nodes that directly communicate with the gateway get higher throughput. On the other hand, flows originating from two or more hops away get very little throughput. For this reason a distributed fair scheduling is an ideal candidate for fair utilization of gateway’s resources (i.e., bandwidth, airtime) and thereby achieving fairness among contending flows in WMNs. There are numerous solution for aforementioned factors in wireless mesh network. We figured out some problems of few existing solutions and integrated to give the solution for those problems. We considered neighborhood phenomenon, airtime allocation and elastic rate control to design a novel technique to achieve fair rate control in wireless mesh network. And finally we introduce distributed fair scheduling to get fairness in mesh network.

Author 1: Mohiuddin Ahmed
Author 2: K.M.Arifur Rahman

Keywords: Wireless mesh network, Network Throughput, Congestion Control, Fairness, Airtime Allocation, Neighbourhood Phenomenon, Gateway.

PDF

The Science and Information (SAI) Organization
BACK TO TOP

Computer Science Journal

  • About the Journal
  • Call for Papers
  • Submit Paper
  • Indexing

Our Conferences

  • Computing Conference
  • Intelligent Systems Conference
  • Future Technologies Conference
  • Communication Conference

Help & Support

  • Contact Us
  • About Us
  • Terms and Conditions
  • Privacy Policy

© The Science and Information (SAI) Organization Limited. All rights reserved. Registered in England and Wales. Company Number 8933205. thesai.org