The Science and Information (SAI) Organization
  • Home
  • About Us
  • Journals
  • Conferences
  • Contact Us

Publication Links

  • IJACSA
  • Author Guidelines
  • Publication Policies
  • Digital Archiving Policy
  • Promote your Publication
  • Metadata Harvesting (OAI2)

IJACSA

  • About the Journal
  • Call for Papers
  • Editorial Board
  • Author Guidelines
  • Submit your Paper
  • Current Issue
  • Archives
  • Indexing
  • Fees/ APC
  • Reviewers
  • Apply as a Reviewer

IJARAI

  • About the Journal
  • Archives
  • Indexing & Archiving

Special Issues

  • Home
  • Archives
  • Proposals
  • Guest Editors
  • SUSAI-EE 2025
  • ICONS-BA 2025
  • IoT-BLOCK 2025

Future of Information and Communication Conference (FICC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Computing Conference

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Intelligent Systems Conference (IntelliSys)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Future Technologies Conference (FTC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact
  • Home
  • Call for Papers
  • Editorial Board
  • Guidelines
  • Submit
  • Current Issue
  • Archives
  • Indexing
  • Fees
  • Reviewers
  • Subscribe

IJACSA Volume 7 Issue 2

Copyright Statement: This is an open access publication licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.

View Full Issue

Paper 1: Fruit Fly Optimization Algorithm for Network-Aware Web Service Composition in the Cloud

Abstract: Service Oriented Computing (SOC) provides a framework for the realization of loosely coupled service oriented applications. Web services are central to the concept of SOC. Currently, research into how web services can be composed to yield QoS optimal composite service has gathered significant attention. However, the number and spread of web services across the cloud data centers has increased, thereby increasing the impact of the network on composite service performance experienced by the user. Recently, QoS-based web service composition techniques focus on optimizing web service QoS attributes such as cost, response time, execution time, etc. In doing so, existing approaches do not separate QoS of the network from web service QoS during service composition. In this paper, we propose a network-aware service composition approach which separates QoS of the network from QoS of web services in the Cloud. Consequently, our approach searches for composite services that are not only QoS-optimal but also have optimal QoS of the network. Our approach consists of a network model which estimates the QoS of the network in the form of network latency between services on the cloud. It also consists of a service composition technique based on fruit fly optimization algorithm which leverages the network model to search for low latency compositions without compromising service QoS levels. The approach is discussed and the results of evaluation are presented. The results indicate that the proposed approach is competitive in finding QoS optimal and low latency solutions when compared to recent techniques.

Author 1: Umar SHEHU
Author 2: Ghazanfar SAFDAR
Author 3: Gregory EPIPHANIOU

Keywords: Web Services; Service Composition; QoS; Network Latency; Cloud; Fruit Fly Algorithm

PDF

Paper 2: Role of Security in Social Networking

Abstract: In this paper, the concept of security and privacy in social media, or social networking will be discussed. First, a brief history and the concept of social networking will be introduced. Many of the security risks associated with using social media are presented. Also, the issue of privacy and how it relates to security are described. Based on these discussions, some solutions to improve a user’s privacy and security on social networks will be suggested. Our research will help the readers to understand the security and privacy issues for the social network users, and some steps which can be taken by both users and social network organizations to help improve security and privacy.

Author 1: David Hiatt
Author 2: Young B. Choi

Keywords: Security; Information Security; Social Networking: CIA; Confidentiality; Integrity; Availability; PII; Social Networking Service; SNS

PDF

Paper 3: The SVM Classifier Based on the Modified Particle Swarm Optimization

Abstract: The problem of development of the SVM classifier based on the modified particle swarm optimization has been considered. This algorithm carries out the simultaneous search of the kernel function type, values of the kernel function parameters and value of the regularization parameter for the SVM classifier. Such SVM classifier provides the high quality of data classification. The idea of particles' «regeneration» is put on the basis of the modified particle swarm optimization algorithm. At the realization of this idea, some particles change their kernel function type to the one which corresponds to the particle with the best value of the classification accuracy. The offered particle swarm optimization algorithm allows reducing the time expenditures for development of the SVM classifier. The results of experimental studies confirm the efficiency of this algorithm.

Author 1: Liliya Demidova
Author 2: Evgeny Nikulchev
Author 3: Yulia Sokolova

Keywords: particle swarm optimization; SVM-classifier; kernel function type; kernel function parameters; regularization parameter; support vectors

PDF

Paper 4: 3D Servicescape Model: Atmospheric Qualities of Virtual Reality Retailing

Abstract: The purpose of this paper is to provide a 3D servicescape conceptual model which explores the potential effect of 3D virtual reality retail stores’ environment on shoppers' behaviour. Extensive review of literature within two different domains, namely: servicescape models, and retail atmospherics, was carried out in order to propose a conceptual model. Further, eight detailed interviews were conducted to confirm the stimulus dimension of the conceptual model. A 3D servicescape conceptual model is offered on the basis of stimulus-organism-dimension, which proposes that a 3D virtual reality retail (VRR) store environment consists of physical, social, socially symbolic and natural dimensions. These dimensions are proposed to affect shoppers’ behaviour through the mediating variables of emotions (pleasure and arousal). An interrelationship between pleasure and arousal, as mediating variables, is also proposed. This research opens a number of new avenues for further research through the proposed model of shoppers’ behaviour in a VRR store environment. Further, a systematic taxonomy development of VRR store environment is attempted through this proposed model that may prove to be an important step in theory building. A comprehensive 3D service scape model along with a large number of propositions is made to define a 3D VRR store environment.

Author 1: Aasim Munir Dad
Author 2: Professor Barry Davies
Author 3: Dr. Asma Abdul Rehman

Keywords: Virtual Reality Retailing (VRR); Servicescape; 3D Servicescape; Retail Atmospherics; Shoppers’ behaviour Introduction (Heading 1)

PDF

Paper 5: Hidden Markov Models (HMMs) and Security Applications

Abstract: The Hidden Markov models (HMMs) are statistical models used in various communities and applications. Such applications include speech recognition, mental task classification, biological analysis, and anomaly detection. In hidden Markov models, there are two states: one is a hidden state and the other is an observation state. The purpose of this survey paper is to further the understanding of hidden Markov models, as well as the solutions to the three central problems: evaluation problem, decoding problem and learning problem. In addition, applying HMMs in real world applications such as security and engineering will improve the classification and accuracy for the whole field.

Author 1: Rubayyi Alghamdi

Keywords: Markov model; Hidden Markov model; HMM, Markove model; Forward algorithm; Viterbi Algorithm; Baum-Welch algorithm

PDF

Paper 6: Toward Secure Web Application Design: Comparative Analysis of Major Languages and Framework Choices

Abstract: We will examine the benefits and drawbacks in the selection of various software development languages and web application frameworks. In particular, we will consider five of the ten threats outlined in the Open Web Application Security Project (OWASP) Top 10 list of the most critical Web application security flaws [12], and examine the role of three popular Web application frameworks (Ruby on Rails (Ruby), Play Framework (Scala), and Zend Framework 2 (PHP)) in addressing a selection of these major threats. In addition, we will compare the strengths and weaknesses of each Web application framework as it pertains to the implementation of strong security measures. Furthermore, for each framework examined, assess how an organization should address these security threats in their software design utilizing their framework of choice. We will suggest the direction in which an organization facing such a decision ought to head; moreover, facilitate such a decision by assessing the benefits and drawbacks of each, based on the findings; and encourage one to decide what works best for the organization’s technical direction.

Author 1: Stephen J. Tipton
Author 2: Young B. Choi

Keywords: Web; security; framework; application; authentication; ruby; ruby on rails; play framework; Scala; PHP; Zend Framework 2; SQL injection; threats

PDF

Paper 7: Pattern Visualization Through Detection Plane Generation for Macroscopic Imagery

Abstract: Macroscopic images are kind of environments in which complex patterns are present. Satellite images are one of these classes where many patterns are present. This fact reflects the challenges in detecting patterns present in this kind of environments. SPOT1b satellite images provide valuable information. These images are affordable and can be applicable in wide applications. This paper demonstrates an approach to generate detection plane that visualize patterns present in the satellite image. The detection plane uses rough neural network to provide optimal representation in backpropagation architecture. Rough set theory combined with multilayer perceptron constitutes the rough neural network. Reduction in the feature dimensionality via the rough module improves the recognition ability of the neural network. It is found that the rough module provides the neural network with optimal features. The ability of the neural network to efficiently detect and visualize the pattern stems from a developed extraction algorithm. The result of the hybrid architecture provides the plane with the best features that visualize the phenomena under investigation. Together with the novel extraction algorithm, the developed system provides a tool to visualize patterns present in SPOT1b Satellite image.

Author 1: Hanan Hassan Ali Adlan

Keywords: pattern detection; hybrid architecture; backpropagation networks; rough set; image patterns

PDF

Paper 8: Hierarchical Compressed Sensing for Cluster Based Wireless Sensor Networks

Abstract: Data transmission consumes significant amount of energy in large scale wireless sensor networks (WSNs). In such an environment, reducing the in-network communication and distributing the load evenly over the network can reduce the overall energy consumption and maximize the network lifetime significantly. In this work, the aforementioned problem of network lifetime and uneven energy consumption in large scale wireless sensor networks is addressed. This work proposes a hierarchical compressed sensing (HCS) scheme to reduce the in-network communication during the data gathering process. Co-related sensor readings are collected via a hierarchical clustering scheme. A compressed sensing (CS) based data processing scheme is devised to transmit the data from the source to the sink. The proposed HCS is able to identify the optimal position for the application of CS to achieve reduced and similar number of transmissions on all the nodes in the network. An activity map is generated to validate the reduced and uniformly distributed communication load of the WSN. Based on the number of transmissions per data gathering round, the bit-hop metric model is used to analyse the overall energy consumption. Simulation results validate the efficiency of the proposed method over the existing CS based approaches.

Author 1: Vishal Krishna Singh
Author 2: Manish Kumar

Keywords: Compressed sensing; in-network communication; network lifetime; traffic load balancing; wireless sensor network

PDF

Paper 9: A Model for Classification Secondary School Student Enrollment Approval Based on E-Learning Management System and E-Games

Abstract: Student is the key of the educational process, where students’ creativity and interactions are strongly encouraged. There are many tools embedded in Learning Management Systems (LMS) that considered as a goal evaluation of learners. A problem that currently appeared is that assessment process is not always fair or accurate in classifying students according to accumulated knowledge. Therefore, there is a need to apply a new model for better decision making for students’ enrollment and assessments. The proposed model may run along with an assessment tool within a LMS. The proposed model performs analysis and obtains knowledge regarding the classification capability of the assessment process. It offers knowledge for course managers regarding the course materials, quizzes, activities and e-games. The proposed model is an accurate assessment tool and thus better classification among learners. The proposed model was developed for learning management systems, which are commonly used in e-learning in Egyptian language schools. The proposed model demonstrated good accuracy compared to real sample data (250 students).

Author 1: Hany Mohamed El-katary
Author 2: Essam M. Ramzy Hamed
Author 3: Safaa Sayed Mahmoud

Keywords: evaluation; learning management system; e-games; classification

PDF

Paper 10: A Random-Walk Based Privacy-Preserving Access Control for Online Social Networks

Abstract: Online social networks are popularized with people to connect friends, share resources etc. Meanwhile, the online social networks always suffer the problem of privacy exposure. The existing methods to prevent exposure are to enforce access control provided by the social network providers or social network users. However, those enforcements are impractical since one of essential goal of social network application is to share updates freely and instantly. To better the security and availability in social network applications, a novel random walking based access control of social network is proposed in this paper. Unlike using explicit attribute based match in the existing schemes, the results from random walking are employed to securely compute L1 distance between two social network users in the presented scheme, which not only avoids the leakage of private attributes, but also enables each social network user to define access control policy independently. The experimental results show that the proposed scheme can facilitate the access control for online social network.

Author 1: You-sheng Zhou
Author 2: En-wei Peng
Author 3: Cheng-qing Guo

Keywords: online social networks; access control; random walk; privacy-preserving

PDF

Paper 11: Pricing Schemes in Cloud Computing: An Overview

Abstract: Cloud Computing is one of the technologies with rapid development in recent years where there is increasing interest in industry and academia. This technology enables many services and resources for end users. With the rise of cloud services number of companies that offer various services in cloud infrastructure is increased, thus creating a competition on prices in the global market. Cloud Computing providers offer more services to their clients ranging from infrastructure as a service (IaaS), platform as a service (PaaS), software as a service (SaaS), storage as a service (STaaS), security as a service (SECaaS), test environment as a service (TEaaS). The purpose of providers is to maximize revenue by their price schemes, while the main goal of customers is to have quality of services (QoS) for a reasonable price. The purpose of this paper is to compare and discuss several models and pricing schemes from different Cloud Computing providers.

Author 1: Artan Mazrekaj
Author 2: Isak Shabani
Author 3: Besmir Sejdiu

Keywords: Cloud Computing; Pricing Models; Pricing Schemes

PDF

Paper 12: Analysis of a Braking System on the Basis of Structured Analysis Methods

Abstract: In this paper, we present the general context of the research in the domain of analysis and modeling of mechatronic systems. In fact, we present à bibliographic review on some works of research about the systemic analysis of mechatronic systems. To better understand its characteristics, we start with an introduction about mechatronic systems and various fields related to these systems, after we present a few analysis and design methods applied to mechatronic systems. Finally, we apply the two methods SADT (Structured Analysis Design Technique) and SA-RT (Structured Analysis Real Time) to the Anti-lock Braking System (ABS).

Author 1: Ben Salem J.
Author 2: Lakhoua M.N.
Author 3: El Amraoui L.

Keywords: mechatronic system; ABS braking system; analysis and modeling; SADT method; SA-RT method

PDF

Paper 13: Contributions to the Analysis and the Supervision of a Thermal Power Plant

Abstract: Supervision systems play an important role in industry mainly due to the increasing demand for product quality and high efficiency, and to the growing integration of automatic control systems in technical processes. In fact, the supervision system has a great number of components and interconnections, and it is difficult to describe and understand its behavior. Furthermore, the supervision system in industrial plants, implemented in supervisory control and data acquisition (SCADA) software, must undertake, at least, the following three main tasks: monitoring, control and fault tolerance. So it can be classified as a complex system. The objective of this paper is to show interests of the use of functional analysis techniques such as SADT (Structured Analysis and Design Technique) and SA-RT (Structured Analysis Real Time) for the design of supervisory systems. This is why we present a general model of analysis and supervision of production systems. This model was based on the one hand on the functional analysis (FA) and on the other hand on the SCADA system.

Author 1: Lakhoua M.N
Author 2: Glaa R.
Author 3: Ben Hamouda M.
Author 4: El Amraoui L.

Keywords: SCADA systems; SADT method; SA-RT method; thermal power plant

PDF

Paper 14: Effective Teaching Methods and Proposed Web Libraries for Designing Animated Course Content: A Review

Abstract: The primary aim of education system is to improve cognitive and computational skills in students. It cannot be achieved by just using the latest technology. This goal can only be achieved through effective teaching methods in combination with effective technology. Lot of researchers has offered effective teaching methods and published their findings in the past. Most of them offered teaching through animations, puzzles, games and storyline. This research paper focuses on identifying effective teaching methods offered by researchers and their findings by reviewing last few years articles published in renowned journals and conferences. Another aim of this paper is to propose ideas to make teaching tools more effective that can help students to understand difficult concepts deeply, improve cognitive and computational skills and retain knowledge for longer times. These ideas will serve as future research directions in this area. Another aim of this research paper is to introduce latest web libraries that can help educators to design animated courses.

Author 1: Rajesh Kumar Kaushal
Author 2: Dr. Surya Narayan Panda

Keywords: cognitive; web education; dynamic teaching tool; animation libraries

PDF

Paper 15: An Augmented Reality Approach to Integrate Practical Activities in E-Learning Systems

Abstract: In the past, the term E-learning was mentioned to any learning method that used electronic machine for the distribution. With the evolution and the apparition of the internet, the term e learning has been evolved and referred to the online courses. There are a lot of platform which serves to distribute and manage the learning content. In some domain learners need to use some equipment and useful product for purpose completing the image built in the theoretical part by the practical activity part. However, most of those platforms suffer from a lack in tools that offer practical activities for learners. Using videos, virtual laboratories or distance control of real equipment as solutions to solve this lack were proposed but still limited. The mixed reality as new technology promised to create a virtual environment where the learner is an actor and can interact with the virtual objects. This article present an approach for developing integrated E-learning systems, helping to carry out the practical work by establishing a virtual laboratory that all tools and products can be manipulated by learners and teachers like in real practical activity, based on an augmented reality system.

Author 1: EL KABTANE Hamada
Author 2: EL ADNANI Mohamed
Author 3: SADGAL Mohamed
Author 4: MOURDI Youssef

Keywords: E-learning; virtual reality; augmented reality; practical activities

PDF

Paper 16: Designing of Hydraulically Balanced Water Distribution Network Based on GIS and EPANET

Abstract: The main objectives of this paper are, designing and balancing of Water Distribution Network (WDN) based on loops hydraulically balanced method as well as using Geographical Information System (GIS) methodology with the contribution of EPANET. GIS methodology is used to ensure WDN’s integrity and skeletonized a proper and functional WDN by using Network Analyst utilizing the geometric network and topology network by hierarchical geo-databases. The problem is to make WDN hydraulically balanced by applying WDN balancing method. For that reason, we have analyzed water flows in each pipe and performed the iterations process on loops in order to make the algebraic summation of head loss“h_f” around any closed loop zero. In case, the summation of pipe flows must be equal to the flow amount entering or leaving the system through each node. At each iteration, reasonable changes occurred at pipes flow until the head loss has become very small or fixed zero as (optimizes correction) by using excel sheet solver. Since this method is confirmed to be effective, simulations were done by using GIS and EPANET water distribution platform. As a result, we accomplished hydraulically balanced WDN. Finally, we have analyzed and simulated hydraulics parameters for the targeted area in Kabul city. Thus, determined successfully the hydraulics state of parameters around the network as a positive result. It is worth mentioning that, Hardy-cross method is being used for approaching more precise optimized correction and consequences concerning hydraulically-balanced and optimal WDN. This method can be done for complex loops WDN as well; the advantage of the method is simple math and self-correction. Managers and engineers who work in the field of water supply this methodology has been recommended as the more advantageous workflow in planning water distribution pattern.

Author 1: RASOOLI Ahmadullah
Author 2: KANG Dongshik

Keywords: Geographical Information System (GIS); Water Distribution Network (WDN); Hydraulics; EPANET

PDF

Paper 17: Corporate Responsibility in Combating Online Misinformation

Abstract: In the age of mass information and misinformation, the corporate duty of developers of browsers, social media, and search engines are falling short of the minimum standards of responsibility. The tools and technologies are already available to combat misinformation online but the desire to integrate these tools has not taken enough priority to warrant action. This paper presents an effective and practical method based on technologies already available that could be used for browsers and social media websites that would help combat misinformation presented in the form of photo evidence, video evidence, or textual evidence the authors have termed as the “Right-click Authenticate” every browser and social media website should have.

Author 1: Fadi Safieddine
Author 2: Wassim Masri
Author 3: Pardis Pourghomi

Keywords: Misinformation; Social Media; Browsers; Search Engines; Corporate; Ethical; Responsibility

PDF

Paper 18: A Framework for Classifying Unstructured Data of Cardiac Patients: A Supervised Learning Approach

Abstract: Data mining has recently emerged as an important field that helps in extracting useful knowledge from the huge amount of unstructured and apparently un-useful data. Data mining in health organization has highest potential in this area for mining the unknown patterns in the datasets and disease prediction. The amount of work done for cardiovascular patients in Pakistan is scarcely very less. In this research study, using classification approach of machine learning we have proposed a framework to classify unstructured data of cardiac patients of the Armed Forces Institute of Cardiology (AFIC), Pakistan to four important classes. The focus of this study is to structure the unstructured medical data/reports manually, as there was no structured database available for the specific data under study. Multi-nominal Logistic Regression (LR) is used to perform multi-class classification and 10-fold cross validation is used to validate the classification models. In order to analyze the results and the performance of Logistic Regression models. The performance-measuring criterion that is used includes precision, f-measure, sensitivity, specificity, classification error, area under the curve and accuracy. This study will provide a road map for future research in the field of Bioinformatics in Pakistan.

Author 1: Iqra Basharat
Author 2: Ali Raza Anjum
Author 3: Mamuna Fatima
Author 4: Usman Qamar
Author 5: Shoab Ahmed Khan

Keywords: bioinformatics; classification techniques; heart disease in Pakistan; heart disease prediction; multinomial classification; logistic regression

PDF

Paper 19: Optimum Route Selection for Vehicle Navigation

Abstract: The objective of Optimum Route Selection for Vehicle Navigation System (ORSVNS) article is to develop a system, which provides information about real time alternate routes to the drivers and also helps in selecting the optimal route among all the alternate routes from an origin to destination. Two types of query systems, special and general, are designed for drivers. Here, the criterion for route selection is introduced using primary and secondary road attributes. The presented methodology helps the drivers in better decision making to choose optimal route using fuzzy logic. For experimental results ORSVNS is tested over 220 km portion of Haryana state in India.

Author 1: Dalip
Author 2: Vijay Kumar

Keywords: Vehicle Navigation; Route Selection; Fuzzy; Optimum; Navigation System

PDF

Paper 20: Skip List Data Structure Based New Searching Algorithm and Its Applications: Priority Search

Abstract: Our new algorithm, priority search, was created with the help of skip list data structure and algorithms. Skip list data structure consists of linked lists formed in layers, which were linked in a pyramidal way. The time complexity of searching algorithm is equal to O(lgN) in an N-element skip list data structure. The new developed searching algorithm was based on the hit search number for each searched data. If a datum has greater hit search number, then it was upgraded in the skip list data structure to the upper level. That is, the mostly searched data were located in the upper levels of the skip list data structure and rarely searched data were located in the lower levels of the skip list data structure. The pyramidal structure of data was constructed by using the hit search numbers, in another word, frequency of each data. Thus, the time complexity of searching was almost ?(1) for N records data set. In this paper, the applications of searching algorithms like linear search, binary search, and priority search were realized, and the obtained results were compared. The results demonstrated that priority search algorithm was better than the binary search algorithm.

Author 1: Mustafa Aksu
Author 2: Ali Karci

Keywords: Algorithms; Priority search; Algorithm analysis; Data structures; Performance analysis

PDF

Paper 21: Self-Organized Hash Based Secure Multicast Routing Over Ad Hoc Networks

Abstract: Multicast group communication over mobile ad hoc networks has various challenges related to secure data transmission. In order to achieve this goal, there is a need to authenticate the group member as well as it is essential to protect the application data, routing information, and other network resources etc. Multicast-AODV (MAODV) is the extension of an AODV protocol, and there are several issues related to each multicast network operation. In the case of dynamic group behavior, it becomes more challenging to protect the resources of a particular group. Researchers have developed different solutions to secure multicast group communication, and their proposed solutions can be used for resource protection at different layers i.e. application layer, physical layer, network layer, etc. Each security solution can guard against a particular security threat. This research paper introduced a self-organized hash based secure routing scheme for multicast ad hoc networks. It uses group Diffie-Hellman method for key distribution. Route authentication and integrity, both are ensured by generating local flag codes and global hash values. In the case of any violation, route log is monitored to identify the malicious activities.

Author 1: Amit Chopra
Author 2: Dr. Rajneesh Kumar

Keywords: Security; Multicast; Group Communication; MAODV; Key management; HASH

PDF

Paper 22: Ranking Documents Based on the Semantic Relations Using Analytical Hierarchy Process

Abstract: With the rapid growth of the World Wide Web comes the need for a fast and accurate way to reach the information required. Search engines play an important role in retrieving the required information for users. Ranking algorithms are an important step in search engines so that the user could retrieve the pages most relevant to his query. In this work, we present a method for utilizing genealogical information from ontology to find the suitable hierarchical concepts for query extension, and ranking web pages based on semantic relations of the hierarchical concepts related to query terms, taking into consideration the hierarchical relations of domain searched (sibling, synonyms and hyponyms) by different weighting based on AHP method. So, it provides an accurate solution for ranking documents when compared to the three common methods.

Author 1: Ali I. El-Dsouky
Author 2: Hesham A. Ali
Author 3: Rabab S. Rashed

Keywords: Semantic rank; ranking web; ontology; search engine; information retrieval

PDF

Paper 23: The Effect of Parallel Programming Languages on the Performance and Energy Consumption of HPC Applications

Abstract: Big and complex applications need many resources and long computation time to execute sequentially. In this scenario, all application's processes are handled in sequential fashion even if they are independent of each other. In high- performance computing environment, multiple processors are available to running applications in parallel. So mutually independent blocks of codes could run in parallel. This approach not only increases the efficiency of the system without affecting the results but also saves a significant amount of energy. Many parallel programming models or APIs like Open MPI, Open MP, CUDA, etc. are available to running multiple instructions in parallel. In this paper, the efficiency and energy consumption of two known tasks i.e. matrix multiplication and quicksort are analyzed using different parallel programming models and a multiprocessor machine. The obtained results, which can be generalized, outline the effect of choosing a programming model on the efficiency and energy consumption when running different codes on different machines.

Author 1: Muhammad Aqib
Author 2: Fadi Fouad Fouz

Keywords: power consumption; quicksort; high- performance computing; performance; Open MP; Open MPI; CUDA

PDF

Paper 24: Image Transmission Model with Quality of Service and Energy Economy in Wireless Multimedia Sensor Network

Abstract: The objective of this article is to present the efficiency of image compression in the Wireless Multimedia Sensor Network (WMSN), the method used in this work is based on the lifting scheme coupled with the SPIHT coding to wavelet biorthogonal CDF 9/7. The effectiveness of this technique results in combining two advantages. First it allows saving energy to prolong the life of the network; second, it improves the Quality of Service (QoS) in terms of average throughput, the number of dropped packets, and End-to-End average delay. The authors examined two scenarios of the same network model in NS2 simulator, according to the above critical points of the energy economy and quality of service, the first scenario transmits an original image, and the second sends the compressed image with the used method. The simulation results presented show that the proposed system allows to extend the life of the network and minimizes the consumption of energy; and it can transmit the image in comfortable conditions for QoS of network, reduce the End-to-End average delay, no dropped packet, best average throughput and satisfied for bandwidth.

Author 1: Benlabbes Haouari
Author 2: Benahmed Khelifa
Author 3: Beladgham Mohammed

Keywords: Wireless Multimedia Sensor Network; Multimedia; Compression; Routing; Energy Consumption; QoS; Energy Economy

PDF

Paper 25: Dual Security Testing Model for Web Applications

Abstract: In recent years, web applications have evolved from small websites into large multi-tiered applications. The quality of web applications depends on the richness of contents, well structured navigation and most importantly its security. Web application testing is a new field of research so as to ensure the consistency and quality of web applications. In the last ten years there have been different approaches. Models have been developed for testing web applications but only a few focused on content testing, a few on navigation testing and a very few on security testing of web applications. There is a need to test content, navigation and security of an application in one go. The objective of this paper is to propose Dual Security Testing Model to test the security of web applications using UML modeling technique which includes web socket interface. In this research paper we have described how our security testing model is implemented using activity diagram, activity graph and based on this how test cases is generated.

Author 1: Singh Garima
Author 2: Kaushik Manju

Keywords: Web application testing; Security testing; UML modeling; Web socket programming

PDF

Paper 26: Automatic Keyphrase Extractor from Arabic Documents

Abstract: The keyphrase is a sentence or a part of a sentence that contains a sequence of words that expresses the meaning and the purpose of any given paragraph. Keyphrase extraction is the task of identifying the possible keyphrases from a given document. Many applications including text summarization, indexing, and characterization use keyphrase extraction. Also, it is an essential task to improve the performance of any information retrieval system. The internet contains a massive amount of documents that may have been manually assigned keyphrases or not. The Arabic language is an important language in the world. Nowadays the number of online Arabic documents is growing rapidly; and most of them have no manually assigned keyphrases, so the user will scan the whole retrieved web documents. To avoid scanning the entire retrieved document, we need keyphrases assigned to each web document manually or automatically. This paper addresses the problem of identifying keyphrases in Arabic documents automatically. In this work, we provide a novel algorithm that identified keyphrases from Arabic text. The new algorithm, Automatic Keyphrases Extraction from Arabic (AKEA), extracts keyphrases from Arabic documents automatically. In order to test the algorithm, we collected a dataset containing 100 documents from Arabic wiki; also, we downloaded another 56 agricultural documents from Food and Agricultural Organization of the United Nations (F.A.O.). The evaluation results show that the system achieves 83% precision value in identifying 2-word and 3-word keyphrases from agricultural domains.

Author 1: Hassan M. Najadat
Author 2: Ismail I. Hmeidi
Author 3: Mohammed N. Al-Kabi
Author 4: Maysa Mahmoud Bany Issa

Keywords: Arabic Keyphrase Extraction; Unsupervised Arabic Keyphrase Extraction; Information Retrieval

PDF

Paper 27: A Topic Modeling Based Solution for Confirming Software Documentation Quality

Abstract: this paper presents an approach for evaluating and confirming the quality of the external software documentation using topic modeling. Typically, the quality of the external documentation has to mirror precisely the organization of the source code. Therefore, the elements of such documentation should be strongly written, associated, and presented. In this paper, we use Latent Dirichlet Allocation (LDA) and HELLINGER DISTANCE to compute the similarities between the fragments of source code and the external documentation topics. These similarities are used in this paper to improve and advance the existing external documentation. Furthermore, these similarities can also be used for evaluating the new documenting process during the evolution phase of the software. The results show that the new approach yields state-of-the-art performance in evaluating and confirming the existing external documentations quality and superiority.

Author 1: Nouh Alhindawi
Author 2: Obaida M. Al-Hazaimeh
Author 3: Rami Malkawi
Author 4: Jamal Alsakran

Keywords: Software Documentation; LDA; Clusters; HELLINGER DISTANCE; and Information Retrieval

PDF

Paper 28: A New Hybrid Network Sniffer Model Based on Pcap Language and Sockets (Pcapsocks)

Abstract: Nowadays, the protection and the security of data transited within computer networks represent a real challenge for developers of computer applications and network administrators. The Intrusion Detection System and Intrusion Prevention System are the reliable techniques for a Good security. Any detected intrusion is based on data collection. So, the collection of an important and significant traffic on the monitored systems is an interesting feature. Thus, the first task of Intrusion Detection System and Intrusion Prevention System is to collect information’s basis to treat and analyze them, and to make accurate decisions. Network analysis can be used to improve networks performances and their security, but it can also be used for malicious tasks. Our main goal in this article is to design a reliable and powerful network sniffer, called PcapSockS, based on pcap language and sockets, able to intercept traffic in three modes: connected, connectionless and raw mode. We start with the performances assessment performed on a list of most expanded and most recently used network sniffers. The study will be completed by a classification of these sniffers related to computer security objectives based on parameters library (libpcap/winpcap or libnet), filtering, availability, software or hardware, alert and real time. The PcapSockS provides a nice performance integrating reliable sniffing mechanisms that allow a supervision taking into account some low and high-level protocols for TCP and UDP network communications.

Author 1: Azidine GUEZZAZ
Author 2: Ahmed ASIMI
Author 3: Yassine SADQI
Author 4: Younes ASIMI
Author 5: Zakariae TBATOU

Keywords: Network Security; Intrusion Detection; Intrusion Prevention; Sniffing; Filtering; Network sniffer; Libpcap; Libnet; Sockets

PDF

Paper 29: Choosing a Career Based Personality Matching: A Case Study of King Abdulaziz University

Abstract: Traditionally, selecting a career involves matching the specific aptitudes and characteristics of an individual with a career which requires or involves such factors. This particular approach has as its foundation the fact that certain careers have need of individuals with certain skills and attitudes, that is to say the individual is a ‘fit’ for that particular career based on their knowledge, skill and disposition. Many students have problems determining their college majors and a suitable career. This paper shows how to find a career that fits one’s personality, and aims to help students analyse their personalities based on the Holland personality test. This paper will identify the most suitable career for students by using a validated Arabic version of the Holland survey, which is one of the most popular models used for career personality tests. This study implements a new set of tasks, testing 117 students from King Abdulaziz University with the Arabic version of the Holland test. The test was applied to female students from three majors, computer science, information systems, and preparatory year distance learning students. The implications of the test results will help students to understand their personality types and determine a suitable career, as the results of the test suggest suitable careers for students which match their personalities. Ultimately, the results show a difference between computer science, information systems and preparatory year distance learning students with regard to personality types and suitable careers.

Author 1: Nahla Aljojo

Keywords: Holland’s Theory of Vocational Personalities; RIASEC personality and environment types; occupational interests; Career change; hexagonal model

PDF

Paper 30: Tracking Items Through Rfid and Solving Heterogeneity Problems During a Collaboration Between Port Companies

Abstract: In this article, we are proposing an architecture that enables improvements in various steps of the collaboration process between different port companies, based on the use of ontologies, multi-agent systems and RFIDs. This approach allows us to collect and present all the data stored in each information system, by exchanging and incorporating any data to facilitate its processing while respecting the territory regulation and compliance, and data confidentiality between all these port companies in a cooperative environment. Thanks to the use of RFID (radio frequency identification), this architecture can also deal with the process of tracking commodities belonging to any company that is included in this collaboration process, while each item will be monitored and tracked in real time.

Author 1: Mehdi ABID
Author 2: Benayad NSIRI
Author 3: Yassine SERHANE
Author 4: Haitam AGHARI

Keywords: Ontologies; Multi-agent systems; RFID; Port Information System; Collaboration

PDF

Paper 31: Frequency Domain Analysis for Assessing Fluid Responsiveness by Using Instantaneous Pulse Rate Variability

Abstract: In the ICU, fluid therapy is conventional strategy for the patient in shock. However, only half of ICU patients have well-responses to fluid therapy, and fluid loading in non-responsive patient delays definitive therapy. Prediction of fluid responsiveness (FR) has become intense topic in clinic. Most of conventional FR prediction method based on time domain analysis, and it is limited ability to indicate FR. This study proposed a method which predicts FR based on frequency domain analysis, named instantaneous pulse rate variability (iPRV). iPRV provides a new indication in very high frequency (VHF) range (0.4-0.8Hz) of spectrum for peripheral responses. Twenty six healthy subjects participated this study and photoplethysmography signal was recorded in supine baseline, during head-up tilt (HUT), and passive leg raising (PLR), which induces variation of venous return and helps for quantitative assessment of FR individually. The result showed the spectral power of VHF decreased during HUT (573.96±756.36 ms2 in baseline; 348.00±434.92 ms2 in HUT) and increased during PLR (573.96±756.36 ms2 in baseline; 718.92±973.70 ms2 in PLR), which present the compensated regulation of venous return and FR. This study provides an effective indicator for assessing FR in frequency domain and has potential to be a reliable system in ICU.

Author 1: Pei-Chen Lin
Author 2: Chia-Chi Chang
Author 3: Hung-Yi Hsu
Author 4: Tzu-Chien Hsiao

Keywords: fluid responsiveness (FR); instantaneous pulse rate variability (iPRV); head-up tilt (HUT); passive leg raising (PLR)

PDF

Paper 32: Arabic Studies’ Progress in Information Retrieval

Abstract: The field of information retrieval has witnessed tangible progress over the past decades in response to the expanded usage of the internet and the dire need of users to search for massive amounts of digital information. Given the steady increase of Arabic e-content, excellent information retrieval systems must be devised to suit the nature and requirements of the Arabic language. This paper sheds light on the current progress in the field of Arabic information retrieval, identifies the challenges that hinder the progress of this science, and proposes suggestions for further research. This paper uses the descriptive analytical method to examine the reality of Arabic studies in the field of information retrieval and to study the problems that are being faced in this area. Specifically, the previous literature on information retrieval is reviewed by searching the related databases and websites.

Author 1: Essam Hanandeh
Author 2: Hayel Khafajah

Keywords: Information retrieval; Arabic information retrieval; Indexing; Query reformulation

PDF

Paper 33: Preliminary Study of Software Performance Models

Abstract: Context: Software performance models can be obtained by applying for specific roles, skills and techniques in software life cycle, and it depends on formulating the software problem as well as gathering the performance requirements. This paper presents a preliminary review of the software performance models. This constitutes a reference for the IT companies and personnel that help them select the suitable model for their projects. Also, the study helps researchers find out further research areas in this field. A preliminary review according to a predefined strategy is used to conduct previous approaches of software performance models integrated with software development cycle in early software cycle. A review has been done for exploring and comparing the software performance models that are published previously. This study results in a comprehensive review for the existing software performance models. This review composes a clear reference for highlighting the weak and strength points of these models.

Author 1: Issamjebreen
Author 2: Mohammed Awad

Keywords: Performance Models; Measurement Model; Performance Prediction; Performance evaluation

PDF

Paper 34: Implementing Project Management Category Process Areas of CMMI Version 1.3 Using Scrum Practices, and Assets

Abstract: Software development organizations that rely on Capability Maturity Model Integration (CMMI) to assess and improve their processes have realized that agile approaches can provide improvements as well. CMMI and agile methods can work well together and exploit synergies that have the potential to improve dramatically business performance. The major question is: How to realize the integration of these two seemingly different approaches? In an earlier work, we have conducted a field study within six companies. These companies worked with agile methods for years and the Egyptian Software Engineering Competence Center (SECC), which is the regional CMMI appraisal center, assessed them. This study was mainly conducted to enhance the empirical understanding in this research field. Additionally, it showed that companies usually don’t use agile in a good way that helps in covering the CMMI specific practices. In this paper, we present a new approach for mapping between CMMI and Scrum method. This mapping has been analyzed, enhanced, and then applied to the same companies. Putting in considerations that other previous efforts have worked in the same context but for an older version of CMMI, our research is using the latest CMMI version, which is 1.3. The research shows that our mapping approach has resulted in 37% satisfaction and achieved 17% partial satisfaction for CMMI specific practices. This resembles 19.4% enhancement in the satisfaction, and 6.2% improvement in the partial satisfaction against the previous related research effort that was already not targeting the latest CMMI version.

Author 1: Ahmed Bahaa Farid
Author 2: A. S. Abd Elghany
Author 3: Yehia Mostafa Helmy

Keywords: Software Engineering; Scrum Software development; Process Improvement; CMMI; Scrum; Scrum CMMI Mapping; Project Management CMMI Process Areas; CMMI-Dev version 1,3; CMMI Project Management Category

PDF

Paper 35: Development of System Architecture for E-Government Cloud Platforms

Abstract: Requirements and criteria for selection of cloud platform and platform visualization are stated by which optimal cloud products will be chosen for the Republic of Kazakhstan e-Government considering quality-price ratio, and also the framework of information and communication architecture will be introduced.

Author 1: Margulan Aubakirov
Author 2: Evgeny Nikulchev

Keywords: cloud technologies; outsourcing; Kazakhstan; cloud platform; e-Government

PDF

Paper 36: Comparative Study for Software Project Management Approaches and Change Management in the Project Monitoring & Controlling

Abstract: A software project encounters many changes during the software development life cycle. The key challenge is to control these changes and manage their impact on the project plan, budget, and implementation schedules. A well-developed change control process should assist the project manager and the responsible team in monitoring these changes.In this paper, we examine a number of approaches for project monitoring & control with different scenarios of project schedules. The comparison shows the effect of applying each approach on the cost and the time of the project. The evaluation illustrates that the integrated software Project and Change Management (IPCM) is a more efficient for providing more control in tracking change requests, and improve the performance monitoring process.

Author 1: Amira M. Gaber
Author 2: Sherief Mazen
Author 3: Ehab E. Hassanein

Keywords: Software Engineering; Software Project Management; and Software Change Management

PDF

Paper 37: N-ary Relations of Association in Class Diagrams: Design Patterns

Abstract: Most of the technology of object-oriented development relies on the use of UML diagrams, in particular, class diagrams. CASE tools, used for automation of object-oriented development, often do not support n-ary associations in the class diagrams, and their implementation in the form of program code in contrast to binary rather time-consuming. The article will show how in some cases it is possible to move from the n-ary association between classes to binary and how can reduce the number of objects. The rules to transform models, that contain n-ary association, will be presented in the form of design patterns. Proposed three new design patterns can be used in the process of developing software systems. These patterns describe transformations of n-ary (often ternary) associations occur between classes in binary and the introduction of additional classes and binary association with the aim of optimizing the model.

Author 1: Sergievskiy Maxim

Keywords: UML; class diagram; multiplicity; ternary association; n-ary association; class-association; design pattern; object

PDF

Paper 38: Towards Domain Ontology Creation Based on a Taxonomy Structure in Computer Vision

Abstract: In computer vision to create a knowledge base usable by information systems, we need a data structure facilitating the information access. Artificial intelligence community uses the ontologies to structure and represent the domain knowledge. This information structure can be used as a database of many geographic information systems (GIS) or information systems treating real objects for example road scenes, besides it can be utilized by other systems. For this, we provide a process to create a taxonomy structure based on new hierarchical image clustering method. The hierarchical relation is based on visual object features and contributes to build domain ontology.

Author 1: Mansouri fatimaezzahra
Author 2: Sadgal mohamed
Author 3: Elfazziki abdelaziz
Author 4: Benchikhi loubna

Keywords: Domain Ontology; Categorization; Taxonomy; Road scenes; Computer vision

PDF

Paper 39: The Discovery of the Implemented Software Engineering Process Using Process Mining Techniques

Abstract: Process model guidance is an important feature by which the software process is orchestrated. Without complying with this guidance, the production lifecycle deviates from producing a reliable software with high-quality standards. Usually, teams break the process deliberately or impulsively. Application Lifecycle Management (ALM) tools log what teams do even if they break the process. The log file could be a key to discover the behavior of the undertaken process against the targeted process model. Since the date of its introduction, Process Mining techniques have been used in business process domains with no focus on the software engineering processes. This research brings the Process Mining techniques to the software engineering domain. The research shows a conclusive effort that used a Scrum adapted process model as an example of Agile adoption. This research has applied Process Mining discovery techniques to capture the actually implemented process by the Scrum team. This application clarifies the gap between the standard process guidance and the actually implemented one. The research’s results showed that Process Mining techniques have the ability to discover and verify the deviation on both levels; the process itself as well as the work items state-machine workflows.

Author 1: Mostafa Adel Zayed
Author 2: Ahmed Bahaa Farid

Keywords: Process Mining; Process Models Discovery; Software Engineering; Agile; and Scrum

PDF

Paper 40: A Novel Neural Network Based Method Developed for Digit Recognition Applied to Automatic Speed Sign Recognition

Abstract: This Paper presents a new hybrid technique for digit recognition applied to the speed limit sign recognition task. The complete recognition system consists in the detection and recognition of the speed signs in RGB images. A pretreatment is applied to extract the pictogram from a detected circular road sign, and then the task discussed in this work is employed to recognize digit candidates. To realize a compromise between performances, reduced execution time and optimized memory resources, the developed method is based on a conjoint use of a Neural Network and a Decision Tree. A simple Network is employed firstly to classify the extracted candidates into three classes and secondly a small Decision Tree is charged to determine the exact information. This combination is used to reduce the size of the Network as well as the memory resources utilization. The evaluation of the technique and the comparison with existent methods show the effectiveness.

Author 1: Hanene Rouabeh
Author 2: Chokri Abdelmoula
Author 3: Mohamed Masmoudi

Keywords: Image processing; Road Sign Recognition; Neural Networks; Digit Recognition

PDF

Paper 41: A Secure Cloud Computing Architecture Using Homomorphic Encryption

Abstract: The Purpose of homomorphic encryption is to ensure privacy of data in communication, storage or in use by processes with mechanisms similar to conventional cryptography, but with added capabilities of computing over encrypted data, searching an encrypted data, etc. Homomorphism is a property by which a problem in one algebraic system can be converted to a problem in another algebraic system, be solved and the solution later can also be translated back effectively. Thus, homomorphism makes secure delegation of computation to a third party possible. Many conventional encryption schemes possess either multiplicative or additive homomorphic property and are currently in use for respective applications. Yet, a Fully Homomorphic Encryption (FHE) scheme which could perform any arbitrary computation over encrypted data appeared in 2009 as Gentry’s work. In this paper, we propose a multi-cloud architecture of N distributed servers to repartition the data and to nearly allow achieving an FHE.

Author 1: Kamal Benzekki
Author 2: Abdeslam El Fergougui
Author 3: Abdelbaki El Belrhiti El Alaoui

Keywords: multi-cloud; privacy; fully homomorphic encryption; distributed System; confidentiality

PDF

Paper 42: Nonquadratic Lyapunov Functions for Nonlinear Takagi-Sugeno Discrete Time Uncertain Systems Analysis and Control

Abstract: This paper deals with the analysis and design of the state feedback fuzzy controller for a class of discrete time Takagi -Sugeno (T-S) fuzzy uncertain systems. The adopted framework is based on the Lyapunov theory and uses the linear matrix inequality (LMI) formalism. The main goal is to reduce the conservatism of the stabilization conditions using some particular Lyapunov functions. Four nonquadratic Lyapunov Functions are used. This Lyapunov function represent an extention from two Lypaunov functions existing in the literature. Their influence in the stabilization region (feasible area of stabilization) is shown through examples, the stabilization conditions of controller for discrete time T-S parametric uncertain systems is demonstrated with the variation of the lyapunov functions between (k, k+1) and (k, k+t) sample times. The controller gain can be obtained via solving several linear matrix inequalities (LMIs). Through the examples and simulations, we demonstrate their uses and their robustness. Comparative study verify the effectiveness of the proposed methods.

Author 1: Ali Bouyahya
Author 2: Yassine Manai
Author 3: Joseph Haggège

Keywords: Nonquadratic Lyapunov functions; Non-PDC; Linear Matrix Inequality; Parametric Uncertain Systems; Takagi-Sugeno

PDF

Paper 43: Design of Intelligent Control System of Transformer Oil Temperature

Abstract: in working process of power transformer, which directly affects the safe operation of transformer oil temperature as well as the stability of the network, so vital to transformer oil temperature detection and control. Based on single chip and chip design of digital temperature measurement transformer oil temperature of an intelligent control system. The system uses a digital temperature sensor DS18B20 collection transformer oil temperature, improves the accuracy of the system. The low power consumption, strong anti-jamming ability of the SCM STC89C51 as the main controller to achieve control and real-time monitoring of transformer oil temperature, and input control module is designed for different transformer oil temperature preset control during normal operation, improving system usability and human-computer interaction.

Author 1: Caijun Xu
Author 2: Liping Zhang
Author 3: Yuchen Chen
Author 4: Zhifeng Liu

Keywords: transformer oil temperature; temperature control; STC89C51; DS18B20

PDF

Paper 44: Design of Wireless Temperature Measuring System Based on the nRF24l01

Abstract: Wireless data transmission system which composed of wireless data transmission device nRF24L01, temperature sensor [DS18B20,] and STC89C52. The system can collect and transmit temperature information and display it on LED, when the temperature excess the set value, the system will alarm by the buzzer. The hardware and software of the design are explained in detail. Finally, the application of this system in wireless temperature collection system is discussed.

Author 1: Song Liu
Author 2: Zhiqiang Yuan
Author 3: Yuchen Chen

Keywords: nRF24L01; wireless data transmission; DS18B20; STC89C52

PDF

Paper 45: Risk Diffusion Modeling and Vulnerability Quantification on Japanese Human Mobility Network from Complex Network Analysis Point of View

Abstract: The human mobility networks are vital infrastructure in recent social systems. Many efforts have been made to keep the healthy human mobility flows to maintain sustainable development of recent well-connected society. However, the inter-connectivity sometimes raises unintended diffusion and amplification of the intrinsic risks, which is difficult to forecast because of the complexity of the underlying networks. Therefore, it is believed that modeling and simulation of the risk diffusion in the human mobility networks are suggestive and meaningful. Also, recent improvement of usability of individual-level human mobility data and capabilities of high-performance computing technologies enable us to employ the data-driven approaches. In this paper, the risk diffusion dynamics is modeled based on the SIS epidemic model and the vulnerability index is defined to quantify the node-level easiness of suffering risks. We also conduct the link removal test to find the better risk mitigation methods.

Author 1: Kiyotaka Ide
Author 2: Hiroshi Sato
Author 3: Tran Quang Hoang Anh
Author 4: Akira Namatame

Keywords: Human mobility network; Risk analysis; Complex network analysis; SIS model

PDF

Paper 46: Detection and Defense Against Packet Drop Attack in MANET

Abstract: MANET is a temporary network for a specified work and with the enormous growth MANETs it is becoming important and simultaneously challenging to protect this network from attacks and other threats. Packet drop attack or gray hole attack is the easiest way to make a denial of service in these dynamic networks. In this attack the malicious node reflects itself as the shortest path and receives all the packets and drops the selected packets in order to give the user the service that that is not correct. It is a specific kind of attack and protects the network and user from detecting this malicious activity. In this article I have proposed an efficient for step technique that confirms that this attack can be detected and defended with least efforts and resource consumption.

Author 1: Tariq Ahamad

Keywords: MANET; gray hole; DoS; packet drop; security

PDF

Paper 47: The Enhanced Arabchat: An Arabic Conversational Agent

Abstract: The Enhanced ArabChat is a complement of the previous version of ArabChat. This paper details an enhancements development of a novel and practical Conversational Agent for the Arabic language called the “Enhanced ArabChat”. A conversational Agent is a computer program that attempts to simulate conversations between machine and human. Some of lessons was learned by evaluating the previous work of ArabChat . These lessons revealed that two major issues affected the ArabChat’s performance negatively. Firstly, the need for a technique to distinguish between question and non-question utterances to reply with a more suitable response depending on the utterance’s type (question and non-question based utterances). Secondly, the need for a technique to handle an utterance targeting many topics that require firing many rules at the same time. Therefore, in this paper, the “Enhanced ArabChat” will cover these enhancements to improve the ArabChat’s performance. A real experiment has been done in Applied Science University in Jordan as an information point advisor for their native Arabic students to evaluate the Enhanced ArabChat.

Author 1: Mohammad Hijjawi
Author 2: Zuhair Bandar
Author 3: Keeley Crockett

Keywords: Artificial Intelligence; Conversational Agents and Arabic

PDF

Paper 48: Understanding a Co-Evolution Model of Business and IT for Dynamic Business Process Requirements

Abstract: Organizations adapt existing business processes in order to become competitive but a change in a process affects other processes as well. In order to support the required change suitable technologies must be provided so that business could run smoothly and efficiently. Since in a dynamic business environment requirements are changed frequently it is difficult to update underlying technologies to support changes in business processes. This creates a gap between business and information technology (IT) that directly affects whole business. In this study requirements for a dynamic business and a co-evolution model are presented that may bring both the entities closer to bridging the gap in a dynamic business organization. The co-evolution model has been used in a financial institution and feasibility and viability of the model has been observed.

Author 1: Muhammad Asif Khan

Keywords: alignment; business-IT gap; business process; co-evolution

PDF

Paper 49: Performance Evaluation of Loss Functions for Margin Based Robust Speech Recognition

Abstract: Margin-based model estimation methods are applied for speech recognition to enhance the generalization capability of acoustic model by increasing the margin. An important aspects of margin based acoustic model for parameter estimation is that, the acoustic models are derived from soft margin concept and hinge loss function used in SVM as loss function to attained enhanced speech recognition performance. In this study, performance evaluation of loss functions (Logistic, Savage, Sigmoid) have been computed in the presence of white noise, pink noise, and brown noise with and without SVM classifiers to analyze the impact of noise on loss functions in comparison with hinge loss function used in SVM for parameter estimation in margin based acoustic model. Experimental results show that hinge loss function in the presence of pink noise and white noise have significant effects on isolated digits (0-9) in both pre-conditioned and recorded data samples in comparison with brown noise. Whereas hinge loss functions show serious anomalies with savage loss and sigmoid loss in term of performance and sigmoid loss function provides exceptionally good results in term of percentage error for all prescribed conditions.

Author 1: Syed Abbas Ali
Author 2: Maria Andleeb
Author 3: Raheela Asif
Author 4: Danish-ur-Rehman

Keywords: Loss Functions; Statistical Learning; Automatic Speech Recognition (ASR); SVM Classifiers; Soft Margin Estimation (SME)

PDF

Paper 50: Improving Quality of Vietnamese Text Summarization Based on Sentence Compression

Abstract: Sentence compression is a valuable task in the framework of text summarization. In previous works, the sentence is reduced by removing redundant words or phrases from original sentence and tries to remain information. In this paper, we propose a new method that used Grid Model and dynamic programming to calculate n-grams for generating the best sentence compression. These reduced sentences are combined to text summarization. The experimental results showed that our method really effective and the text is grammatically, coherence and concise.

Author 1: Ha Nguyen Thi Thu
Author 2: Tu Nguyen Ngoc
Author 3: Cuong Nguyen Ngoc
Author 4: Hiep Xuan Huynh

Keywords: Sentence compression; topic modeling; text summarization; Grid model; n-grams; dynamic programming

PDF

Paper 51: Virtual Identity Approaches Evaluation for Anonymous Communication in Cloud Environments

Abstract: Since the era’s of Cloud computing beginning, the Identity Management is considered as a permanent challenge especially for the hybrid IT environments that permit for many users’ applications to share the same data center depending on servers’ virtualization. This paper introduces a complete study about Identity forms in different domains and applications. Also, a performance evaluation of new approaches for Virtual Identity was done. Actually, Virtual Identity, a new terminology used in virtual environments, was introduced to enhance the anonymous communication in such types of complex networks. Based on the work analysis and motivations done through an online survey, two techniques were used to implement the Virtual Identity; Identity Based Encryption (IBE) and Pseudonym Based Encryption (PBE). Both techniques were validated using MIRACL library for security algorithms. In addition, the performance of both approaches was evaluated under different configurations and network conditions through OPNET Modeler. The results showed the impact of the number of cloud users and their locations (either local or remote) on the application response time in cloud environments using the proposed virtual identities. Moreover, Application Characterization Environment whiteboard was used to simulate the overall flow of data across different tiers from start to end of the application task for Virtual Identity creation. The results and outcomes for both methodologies showed that they are suitable paradigm for achieving high degree of security and efficiency in such sophisticated network access to many online services and applications.

Author 1: Ibrahim A.Gomaa
Author 2: Emad Abd-Elrahman
Author 3: Mohamed Abid

Keywords: Cloud Environments; Virtual Identity; Performance Evaluation and Security

PDF

Paper 52: A Multi-Criteria Decision Method in the DBSCAN Algorithm for Better Clustering

Abstract: This paper presents a solution based on the unsupervised classification for the multiple-criteria analysis problems of data, where the characteristics and the number of clusters are not predefined, and the objects of data sets are described by several criteria, and the latter can be contradictory, of different nature and varied weights. This work focuses on two different tracks of research, the unsupervised classification which is one of data mining techniques as well as the multi-criteria clustering which is part of the field of Multiple-criteria decision-making. Experimental results on different data sets are presented in order to show that clusters, formed using the improvement of the algorithm DBSCAN by incorporating a model of similarity, are intensive and accurate.

Author 1: Abdellah IDRISSI
Author 2: Altaf ALAOUI

Keywords: Data mining; Clustering; Density-based clustering; Multiple-criteria decision-making

PDF

Paper 53: CAT5:A Tool for Measuring the Maturity Level of Information Technology Governance Using COBIT 5 Framework

Abstract: Companies have more and more trends to automate their operational and organizational activities, therefore the investment of information technology (IT) continues to increase every year. However, good governance that can ensure the alignment of IT and business strategy and realized benefits from IT investments has not always followed this increase. Measurement of IT governance is then required as a basis for the continuous improvement of the IT services. This study is aimed at producing a tool CAT5 to measure the maturity level of IT governance, thus facilitating the process of improvement of IT services. CAT5 is based on COBIT 5 framework and the design used is Unified Modeling Language. Through stages of information system development, this research results in an application for measuring the maturity level of IT governance that can be used in assessing existing IT governance.

Author 1: Souhaïl El ghazi El Houssaïni
Author 2: Karim Youssfi
Author 3: Jaouad Boutahar

Keywords: COBIT5; IT Governance; Process Capability Model; Maturity Model; CAT5; Process Assessment

PDF

Paper 54: A Platform to Support the Product Servitization

Abstract: Nowadays manufacturers are forced to shift from their traditional product-manufacturing paradigm to the goods-services continuum by providing integrated combination of products and services. The adoption of service-based strategies is the natural consequence of the higher pressure that these companies are facing in the global markets especially due to the presence of competitors which operate in low wage region. By betting on services, or more specifically, on servitization manufacturing companies are moving up the value chain in order to move the competition from costs to sophistication and innovation. The proliferation of new emerging technologies and paradigms together with a wider dissemination of information technology (IT) can significantly improve the capability of manufacturing companies to infuse services in their own products. The authors present a knowledge-based and data-driven platform that can support the design and development of Product Extended by Services (PESs) solutions.

Author 1: Giovanni Di Orio
Author 2: Oliviu Matei
Author 3: Sebastian Scholze
Author 4: Dragan Stokic
Author 5: José Barata
Author 6: Claudio Cenedese

Keywords: Product-Services System; Servitization; Service-Oriented Architecture; Ambient Intelligence; Context Awareness; Data Mining

PDF

Paper 55: On Shear Wave Speed Estimation for Agar-Gelatine Phantom

Abstract: Conventional imaging of diagnostic ultrasound is widely used. Although it makes the differences in the soft tissues echogenicities’ apparent and clear, it fails in describing and estimating the soft tissue mechanical properties. It cannot portray their mechanical properties, such as the elasticity and stiffness. Estimating the mechanical properties increases chances of the identification of lesions or any pathological changes. Physicians are now characterizing the tissue’s mechanical properties as diagnostic metrics. Estimating the tissue’s mechanical properties is achieved by applying a force on the tissue and calculating the resulted shear wave speed. Due to the difficulty of calculating the shear wave speed precisely inside the tissue, it is estimated by analyzing ultrasound images of the tissue at a very high frame rate. In this paper, the shear wave speed is estimated using finite element analysis. A model is constructed to simulate the tissue’s mechanical properties. For a generalized soft tissue model, Agar-gelatine model is used because it has properties similar to that of the soft tissue. A point force is applied at the center of the proposed model. As a result of this force, a deformation is caused. Peak displacements are tracked along the lateral dimension of the model for estimating the shear wave speed of the propagating wave using the Time-To-Peak displacement (TTP) method. Experimental results have shown that the estimated speed of the shear wave is 5.2 m/sec. The speed value is calculated according to shear wave speed equation equals about 5.7 m/sec; this means that our speed estimation system’s accuracy is about 91 %, which is reasonable shear wave speed estimation accuracy with a less computational power compared to other tracking methods.

Author 1: Hassan M. Ahmed
Author 2: Nancy M. Salem
Author 3: Ahmed F. Seddik
Author 4: Mohamed I. El Adawy

Keywords: Elasticity Imaging; Acoustic radiation force impulse (ARFI); Shear wave elasticity imaging; Soft tissue stiffness imaging

PDF

Paper 56: A Variant of Genetic Algorithm Based Categorical Data Clustering for Compact Clusters and an Experimental Study on Soybean Data for Local and Global Optimal Solutions

Abstract: Almost all partitioning clustering algorithms getting stuck to the local optimal solutions. Using Genetic algorithms (GA) the results can be find globally optimal. This piece of work offers and investigates a new variant of the Genetic algorithm (GA) based k-Modes clustering algorithm for categorical data. A statistical analysis have been done on the popular categorical dataset which shows the user specified cluster centres stuck at local optimal solution in K-modes algorithm even in all the higher iterations and the proposed algorithm overcome this problem of local optima. To the best of our knowledge, such comparison has been reported here for the first time for the case of categorical data. The obtained results, shows that the proposed algorithm is better over the conventional k-Modes algorithm in terms of optimal solutions and within cluster variation measure.

Author 1: Abha Sharma
Author 2: R. S. Thakur

Keywords: Categorical data; Genetic Algorithm; Population; Population size

PDF

Paper 57: Improving Throughput and Delay by Signaling Modification in Integrated 802.11 and 3G Heterogeneous Wireless Network

Abstract: Current trends show that UMTS network and WLAN will co-exist and work together to support more users with higher data rate services over a wider area. However, this integration invokes many challenges such as mobility management and handoff decision making. Vertical handoff is switching process between heterogeneous wireless networks in a 3G/WLAN network. Vertical handoffs often fail due to the abrupt degrade of the WLAN signal strength. In this paper, proposed a new vertical handoff method for to decrease the number of signaling and registration processes, to examine the Special conditions such as WLAN black holes and to eliminate disconnecting effects. By estimating user locations related to WLAN position, interface on-times will be reduced which makes the power consuming of the system decreased. To indicate the efficiency of proposed approach the performance and the delay results are simulated.

Author 1: Majid Fouladian
Author 2: Mohammad Ali Pourmina
Author 3: Faramarz Hendessi

Keywords: Registration; WLAN; 3G network; Vertical handover

PDF

Paper 58: Constructing Relationship Between Software Metrics and Code Reusability in Object Oriented Design

Abstract: The role of the design pattern in the form of software metric and internal code architecture for object-oriented design plays a critical role in software engineering regarding production cost efficiency. This paper discusses code reusability that is a frequently exercised cost saving methodology in IT production. After reviewing existing literature towards a study on software metrics, we found that very few studies are witnessed to incline towards code reusability. Hence, we developed a simple analytical model that establishes a relationship between the design components of standard software metric and code reusability using case studies of three software projects (Customer Relationship Management project, Supply Chain Management project, and Enterprise Relationship Management project). We also testify our proposal using stochastic based Markov model to find that proposed system can extract significant information of maximized values of code reusability with increasing level of uncertainties of software project methodologies.

Author 1: Manoj H.M
Author 2: Dr. Nandakumar A.N

Keywords: Analytical Modeling; Code Reusability; Design Pattern; Software Methodologies

PDF

Paper 59: An Ensemble of Fine-Tuned Heterogeneous Bayesian Classifiers

Abstract: Bayesian network (BN) classifiers use different structures and different training parameters which leads to diversity in classification decisions. This work empirically shows that building an ensemble of several fine-tuned BN classifiers increases the overall classification accuracy. The accuracy of the constituent classifiers can be achieved by fine-tuning each classifier and the diversity is achieved using different BN classifiers. The proposed ensemble combines a Naive Bayes (NB) classifier, five different models of Tree Augmented Naive Bayes (TAN), and four different model of Bayesian Augmented Naive Bayes (BAN). This work also proposes a new Distance-based Diversity Measure (DDM) and uses it to analyze the diversity of the ensembles. The ensemble of fine-tuned classifier achieves better average classification accuracy than any of its constituent classifiers or the ensemble of un-tuned classifiers. Moreover, the empirical experiments present better significant results for many data sets.

Author 1: Amel Alhussan
Author 2: Khalil El Hindi

Keywords: Ensemble classifier; Bayesian Network (BN) classifiers; Fine-tuned BN classifiers; Stacking; Diversity

PDF

Paper 60: Cloud-Based Processing on Data Science for Visualization

Abstract: The big data processing and visualization have the challenge on method and process. The volume, variety, velocity, and veracity in the big data need to handle for visualizing the data. The research work investigates, design and develop cloud-based processing for data science visualization. The cloud-based processing used the data management that interact with Google drive, communicate with processing tools that deliver the system, and visualize with Google Fusion. The research uses financial banking data in Indonesia, that analyze based on geolocation, transaction flows, and networks. The research process consists of data mapping process, data tagging, data manipulation, and data visualization to resulting the data science visualization. The cloud-based processing present the data science process can be done use cloud. The research has a contribution on delivering cloud-based approach to handling data science visualization for big data.

Author 1: Ahmad Ashari
Author 2: A Min Tjoa
Author 3: Mardhani Riasetiawan

Keywords: component; cloud-based processing; visualization; data science; big data

PDF

Paper 61: Comparative Study of Robust Control Strategies for a Dfig-Based Wind Turbine

Abstract: Conventional vector control configurations which use a proportional-integral (PI) regulator for the powers DFIGs driven have some drawbacks such as parameter tuning difficulties, mediocre dynamic performances and reduced robustness. So, based on analysis of the DFIG model, fed by a direct AC-AC converter, two nonlinear algorithms: sliding mode and adaptive fuzzy logic is used to control independently active and reactive powers provided by the stator side of the DFIG to the grid. Their respective performances are compared with the conventional PI controller regarding reference tracking, response to sudden speed variation and robustness against machine parameters variations.

Author 1: Mohamed BENKAHLA
Author 2: Rachid TALEB
Author 3: Zinelaabidine BOUDJEMA

Keywords: Wind turbine (WT); doubly fed induction generator (DFIG); sliding mode controller (SMC); PI controller; adaptive fuzzy logic controller (AFLC)

PDF

Paper 62: Android Malware Detection & Protection: A Survey

Abstract: Android has become the most popular smartphone operating system. This rapidly increasing adoption of Android has resulted in significant increase in the number of malwares when compared with previous years. There exist lots of antimalware programs which are designed to effectively protect the users’ sensitive data in mobile systems from such attacks. In this paper, our contribution is twofold. Firstly, we have analyzed the Android malwares and their penetration techniques used for attacking the systems and antivirus programs that act against malwares to protect Android systems. We categorize many of the most recent antimalware techniques on the basis of their detection methods. We aim to provide an easy and concise view of the malware detection and protection mechanisms and deduce their benefits and limitations. Secondly, we have forecast Android market trends for the year up to 2018 and provide a unique hybrid security solution and take into account both the static and dynamic analysis an android application.

Author 1: Saba Arshad
Author 2: Munam Ali Shah
Author 3: Abid Khan
Author 4: Mansoor Ahmed

Keywords: Android; Permissions; Signature

PDF

Paper 63: An Improved Transformer for LLC Resonant Inverter for Induction Heating Applications

Abstract: A new trend in power converters is to design a planar transformer that aims for low profile. However, at high frequency, the planar transformer AC losses become significant due to the proximity and skin effects. In this paper the most important factors for planar transformer (PT) design including winding loss, core loss, leakage inductance, and stray capacitance have individually been investigated. The tradeoffs among these factors have to be analysed to achieve optimal parameters. We will show a strategy to reduce losses in the primary coil of the transformer. The loss analysis of th PT was verified by the Finite Element Method (FEM) Simulations (ANSOFT MAXWELL FIELD SIMULATOR 2D) and could be utilized to optimize the transformer design procedure. Finally, the proposed PT has been integrated into an LLC Resonant Inverter for Induction Heating Application to test at high signal levels.

Author 1: Amira ZOUAOUI-KHEMAKHEM
Author 2: Hamed belloumi
Author 3: Ferid KOURDA

Keywords: planar transformer; induction heating; Finite Element Method; skin effect; diffusive representation

PDF

Paper 64: An Empirical Investigation of Predicting Fault Count, Fix Cost and Effort Using Software Metrics

Abstract: Software fault prediction is important in software engineering field. Fault prediction helps engineers manage their efforts by identifying the most complex parts of the software where errors concentrate. Researchers usually study the fault-proneness in modules because most modules have zero faults, and a minority have the most faults in a system. In this study, we present methods and models for the prediction of fault-count, fault-fix cost, and fault-fix effort and compare the effectiveness of different prediction models. This research proposes using a set of procedural metrics to predict three fault measures: fault count, fix cost and fix effort. Five regression models are used to predict the three fault measures. The study reports on three data sets published by NASA. The models for each fault are evaluated using the Root Mean Square Error. A comparison amongst fault measures is conducted using the Relative Absolute Error. The models show promising results to provide a practical guide to help software engineers in allocating resources during software testing and maintenance. The cost fix models show equal or better performance than fault count and effort models.

Author 1: Raed Shatnawi
Author 2: Wei Li

Keywords: Software metrics; fault prediction; fix cost; fix effort; regression analysis

PDF

Paper 65: Issues Elicitation and Analysis of CMMI Based Process Improvement in Developing Countries Theory and Practice

Abstract: Researchers have tried to find out the pattern of rising and fall of Pakistani software industry and also the reasons for what is going exactly wrong with this industry. Different studies have witnessed that in Pakistan, the software industry is not following the international standards. Another surprising fact, being observed in the past analysis, is the companies which have initiated CMMI-based SPI program have not even achieved the higher levels of CMMI from past three years, which is an alarming sign of the declining attitude of the industry. Therefore, it has become mandatory to look for the weak points or critical barriers or issues which are actually, the reason for this slow progress of CMMI-based SPI in Pakistan software industry. This study has identified that the issues for CMMI based SPI in Pakistan are much different than what it reported in the literature. Giving proper attention to the root of the problem can help solve many of the problems in this regard.

Author 1: Shahbaz Ahmed Khan Ghayyur
Author 2: Ahmed Noman Latif
Author 3: Muhammad Daud Awan
Author 4: Malik Sikandar Hayat Khiyal

Keywords: CMMI-based SPI; process improvement; inefficiency; Pakistani software industry

PDF

Paper 66: Energy Efficient Clustering Using Fixed Sink Mobility for Wireless Sensor Networks

Abstract: In this research an efficient data gathering scheme is presented using mobile sink as data collector with Clustering as sensor organizer in a randomly organized sensors in sensing field for wireless sensor network. The scheme not only extends the network lifetime through clustering process but also improves the data gathering mechanism through efficient and simplified mobile sink movement scheme. The cluster heads selection is based on both energy and data weight, which gathering all the data from the nodes within a cluster and then delivers it to the sink. The single mobile sink which visits the cluster heads as per defined path gathers data periodically. The scheme is organized through “Mobile Sink based Data Gathering Protocol (MSDGP)” which combines single message energy efficient clustering and data gathering process. For performance evaluation, the protocol is extensively simulated for different performance metrics, namely Residual energy consumption, Number of dead nodes during variable number of rounds and Network lifetime. The results proves that MSDGP is successful in achieving the defined objectives of energy efficiency and is capable of extending the network lifetime by increasing the number of rounds. Therefore, proposed protocol is more suitable for scenarios where sensor nodes generate variable amount of data.

Author 1: Muhammad Ali Khan
Author 2: Arif Iqbal Umar
Author 3: Babar Nazir
Author 4: Noor ul Amin
Author 5: Shaukat Mehmood
Author 6: Kaleem Habib

Keywords: Wireless Sensors Network; Mobile Sink; Clustering; Sensors

PDF

Paper 67: A Survey on Big Data Analytics: Challenges, Open Research Issues and Tools

Abstract: A huge repository of terabytes of data is generated each day from modern information systems and digital technolo-gies such as Internet of Things and cloud computing. Analysis of these massive data requires a lot of efforts at multiple levels to extract knowledge for decision making. Therefore, big data analysis is a current area of research and development. The basic objective of this paper is to explore the potential impact of big data challenges, open research issues, and various tools associated with it. As a result, this article provides a platform to explore big data at numerous stages. Additionally, it opens a new horizon for researchers to develop the solution, based on the challenges and open research issues.

Author 1: D. P. Acharjya
Author 2: Kauser Ahmed P

Keywords: Big data analytics; Hadoop; Massive data; Struc-tured data; Unstructured Data

PDF

Paper 68: A Cloud-Based Platform for Democratizing and Socializing the Benchmarking Process

Abstract: Performances evaluation, benchmarking and re-producibility represent significant aspects for evaluating the practical impact of scientific research outcomes in the Computer Science field. In spite of all the benefits (e.g., increasing visibility, boosting impact, improving the research quality) which can be obtained from conducting comprehensive and extensive experi-mental evaluations or providing reproducible software artifacts and detailed description of experimental setup, the required effort for achieving these goals remains prohibitive. In this article, we present the design and the implementation details of the Liquid Benchmarking platform as a social and cloud-based platform for democratizing and socializing the software benchmarking processes. Particularly, the platform facilitates the process of sharing the experimental artifacts (computing resources, datasets, software implementations, benchmarking tasks) as services where the end users can easily design, mashup, execute the experiments and visualize the experimental results with zero installation or configuration efforts. Moreover, the social features of the platform enable the users to share and provide feedback on the results of the executed experiments in a form that can guarantee a transparent scientific crediting process. Finally, we present four benchmarking case studies that have been realized via the Liquid Benchmarking platform in the following domains: XML compression techniques, graph indexing and querying techniques, string similarity join algorithms and reverse K nearest neighbors algorithms.

Author 1: Fuad Bajaber
Author 2: Amin Shafaat
Author 3: Omar Batarfi
Author 4: Radwa Elshawi
Author 5: Abdulrahman Altalhi
Author 6: Ahmed Barnawi
Author 7: Sherif Sakr

Keywords: Cloud Computing; Benchmarking; Software-as-a-Service, Social Computing

PDF

Paper 69: Hierarchical Classifiers for Multi-Way Sentiment Analysis of Arabic Reviews

Abstract: Sentiment Analysis (SA) is one of hottest fields in data mining (DM) and natural language processing (NLP). The goal of SA is to extract the sentiment conveyed in a certain text based on its content. While most current works focus on the simple problem of determining whether the sentiment is positive or negative, Multi-Way Sentiment Analysis (MWSA) focuses on sentiments conveyed through a rating or scoring system (e.g., a 5-star scoring system). In such scoring systems, the sentiments conveyed in two reviews of close scores (such as 4 stars and 5 stars) can be very similar creating an added challenge compared to traditional SA. One intuitive way of handling this challenge is via a divide-and-conquer approach where the MWSA problem is divided into a set of sub-problems allowing the use of customized classifiers to differentiate between reviews of close scores. A hierarchical classification structure can be used with this approach where each node represents a different classification sub-problem and the decision from it may lead to the invocation of another classifier. In this work, we show how the use of this divide-and-conquer hierarchical structure of classifiers can generate better results than the use of existing flat classifiers for the MWSA problem. We focus on the Arabic language for many reasons such as the importance of this language and the scarcity of prior works and available tools for it. To the best of our knowledge, very few papers have been published on MWSA of Arabic reviews. One notable work is that of Ali and Atiya, in which the authors collected a large scale Arabic Book Reviews (LABR) dataset and made it publicly available. Unfortunately, the baseline experiments on this dataset had very low accuracy. We present two different hierarchical structures and compare their accuracies with the flat structure using different core classifiers. The comparison is based on standard accuracy measures such as precision and recall in addition to using the mean squared error (MSE) as a more accurate measure given the fact that not all misclassifications are the same. The results show that, in general, hierarchical classifiers give significant improvements (of more than 50% in certain cases) over flat classifiers.

Author 1: Mahmoud Al-Ayyoub
Author 2: Aya Nuseir
Author 3: Ghassan Kanaan
Author 4: Riyad Al-Shalabi

Keywords: multi-way sentiment analysis, hierarchical classi-fiers, support vector machine, decision tree, naive bayes, k-nearest neighbor, mean squared error

PDF

Paper 70: Weighted G1-Multi-Degree Reduction of B´ezier Curves

Abstract: In this paper, weighted G1-multi-degree reduction of B´ezier curves is considered. The degree reduction of a given B´ezier curve of degree n is used to write it as a B´ezier curve of degree m,m < n. Exact degree reduction is not possible, and, therefore, approximation methods are used. The weight function w(t) = 2t(1 - t), t [0, 1] is used with the L2-norm in multidegree reduction with G1-continuity at the end points of the curve. Since we consider boundary conditions this weight function improves approximation in the middle of the curve. Numerical results and comparisons show that the proposed method produces fewer errors and outperform all existing methods.

Author 1: Abedallah Rababah
Author 2: Salisu Ibrahim

Keywords: B´ezier curves; multiple degree reduction; G-continuity; geometric continuity

PDF

Paper 71: Abnormalities Detection in Digital Mammography Using Template Matching

Abstract: Breast cancer affects 1 in 8 women in the United States. Early detection and diagnosis is key to recovery. Computer-Aided Detection (CAD) of breast cancer helps decrease morbidity and mortality rates. In this study we apply Template Matching as a method for breast cancer detection to a novel data set comprised of mammograms annotated according to ground truth. Performance is evaluated in terms of Area Under the Receiver Operator Characteristic Curve (Area Under ROC) and Free-response ROC.

Author 1: Ahmed M. Farrag

Keywords: Classification, Detection, Image Processing, Dig-ital Mammography, Breast Cancer, Computer Aided Detection (CAD), Template Matching.

PDF

Paper 72: An Anti-Pattern-based Runtime Business Process Compliance Monitoring Framework

Abstract: Today's dynamically changing business and com-pliance environment demand enterprises to continuously ensure their compliance with various laws, regulations and standards. Several business studies have concluded that compliance man-agement is one of the main challenges companies face nowadays. Runtime compliance monitoring is of utmost importance for compliance assurance as during the prior design-time compli-ance checking phase, only a subset of the imposed compliance requirements can be statically checked due to the absence of required variable instantiation and contextual information. Furthermore, the fact that a BP model has been statically checked for compliance during design-time does not guarantee that the corresponding running BP instances are usually compliant due to human and machine errors. In this paper, we present a generic proactive runtime BP compliance monitoring framework, BP-MaaS. The framework incorporates a wide range of expressive high-level graphical compliance patterns for the abstract specifi-cation of runtime constraints. Compliance monitoring is achieved using anti-patterns, a novel mechanism which is agnostic towards any underlying monitoring execution technology. As a proof-of-concept, complex event processing (CEP) technology is adopted as one of the possible realizations of the monitoring engine of the framework. An integrated tool-suite has been developed as an instantiation artifact of BP-MaaS, and the validation of the approach is undertaken in several directions, which includes internal validity and case study conducts considering two real-life case studies from the banking domain.

Author 1: Ahmed Barnawi
Author 2: Ahmed Awad
Author 3: Amal Elgammal
Author 4: Radwa Elshawi
Author 5: Abduallah Almalaise
Author 6: Sherif Sakr

Keywords: Business Process Management; Business Process Monitoring; Business Process Compliance

PDF

Paper 73: Comprehensive Survey on Dynamic Graph Models

Abstract: Most of the critical real-world networks are con-tinuously changing and evolving with time. Motivated by the growing importance and widespread impact of this type of networks, the dynamic nature of these networks have gained a lot of attention. Because of their intrinsic and special characteristics, these networks are best represented by dynamic graph models. To cope with their evolving nature, the representation model must keep the historical information of the network along with its temporal time. Storing such amount of data, poses many problems from the perspective of dynamic graph data management. This survey provides an in-depth overview on dynamic graph related problems. Novel categorization and classification of the state of the art dynamic graph models are also presented in a systematic and comprehensive way. Finally, we discuss dynamic graph processing including the output representation of its algorithms.

Author 1: Aya Zaki
Author 2: Mahmoud Attia
Author 3: Doaa Hegazy
Author 4: Safaa Amin

Keywords: dynamic graphs; evolving networks; evolving graphs; temporal graphs; data management

PDF

Paper 74: Evolutionary Algorithms Based on Decomposition and Indicator Functions: State-of-the-art Survey

Abstract: In the last two decades, multiobjective optimization has become mainstream because of its wide applicability in a variety of areas such engineering, management, the military and other fields. Multi-Objective Evolutionary Algorithms (MOEAs) play a dominant role in solving problems with multiple conflicting objective functions. They aim at finding a set of representative Pareto optimal solutions in a single run. Classical MOEAs are broadly in three main groups: the Pareto dominance based MOEAs, the Indicator based MOEAs and the decomposition based MOEAs. Those based on decomposition and indicator functions have shown high search abilities as compared to the Pareto dominance based ones. That is possibly due to their firm theoretical background. This paper presents state-of-the-art MOEAs that employ decomposition and indicator functions as fitness evaluation techniques along with other efficient techniques including those which use preference based information, local search optimizers, multiple ensemble search operators together with self-adaptive strategies, metaheuristics, mating restriction approaches, statistical sampling techniques, integration of Fuzzy dominance concepts and many other advanced techniques for dealing with diverse optimization and search problems

Author 1: Wali Khan Mashwani
Author 2: Abdellah Salhi
Author 3: Muhammad Asif jan
Author 4: Muhammad Sulaiman
Author 5: Rashida Adeeb Khanum
Author 6: Abdulmohsen Algarni

Keywords: Multi-objective optimization, Multi-objective Evolu-tionary algorithms (MOEAs), Pareto Optimality, Multi-objective Memetic Algorithm (MOMAs), Pareto dominance based MOEA, Decomposition based MOEA, Indicator based MOEAs

PDF

Paper 75: Implementation and Evaluation of a Secure and Efficient Web Authentication Scheme using Mozilla Firefox and WAMP

Abstract: User authentication and session management are two of the most critical aspects of computer security and privacy on the web. However, despite their importance, in practice, authentication and session management are implemented through the use of vulnerable techniques. To solve this complex problem, we proposed new authentication architecture, called StrongAuth. Later, we presented an improved version of StrongAuth that includes a secure session management mechanism based on public key cryptography and other cryptographic primitives. In this paper, we present an experimental implementation and evaluation of the proposed scheme to demonstrate its feasibility in real-world scenarios. Specifically, we realize a prototype consisting of two modules: (1) a registration module that implements the registration, and (2) an authentication module integrating both the mutual authentication and the session management phases of the proposed scheme. The experimental results show that in comparison to traditional authentication and session management mechanisms, the proposed prototype presents the lowest total runtime.

Author 1: Yassine SADQI
Author 2: Ahmed ASIMI
Author 3: Younes ASIMI
Author 4: Zakaria TBATOU
Author 5: Azidine GUEZZAZ

Keywords: authentication; session management; web security; cryptographic primitives; computer security and privacy; security implementation; authentication scheme; Mozilla Firefox; WAMP

PDF

Paper 76: Indoor Navigation System based on Passive RFID Transponder with Digital Compass for Visually Impaired People

Abstract: Conventionally, visually impaired people using white cane or guide dog for traveling to desired destination. However, they could not identify their surround easily. Hence, this paper describes the development of navigation system which is applied to guide the visually impaired people at an indoor environment. To provide an efficient and user-friendly navigation tools, a navigation device is developed by using passive radio frequency identification (RFID) transponders which are mounted on the floor such as on tactile paving to build such as RFID networks. The developed navigation system is equipped with a digital compass to facilitate the visually impaired people to walk properly at right direction especially when turning process. The idea of positioning and localization with the digital compass and direction guiding through voice commands is implemented in this system. Some experiments also done which is focused on the calibration of the digital compass and relocates the visually impaired people back to the right route if they are out of the direction. Besides, a comparison between two subjects which are human and a mobile robot is made to check the validity of the developed navigation system. As the result, the traveling speed of human and mobile robot is obtained from the experiment. This project is beneficial to visually impaired people because the navigation device designed with voice commands will help them to have a better experience, safer and comfortable travel.

Author 1: A. M. Kassim
Author 2: T. Yasuno
Author 3: H. Suzuki
Author 4: H. I. Jaafar
Author 5: M. S. M. Aras

Keywords: navigation system, passive RFID, digital compass, visually impaired people

PDF

Paper 77: Smart Cities: A Survey on Security Concerns

Abstract: A smart city is developed, deployed and maintained with the help of Internet of Things (IoT). The smart cities have become an emerging phenomena with rapid urban growth and boost in the field of information technology. However, the function and operation of a smart city is subject to the pivotal development of security architectures. The contribution made in this paper is twofold. Firstly, it aims to provide a detailed, categorized and comprehensive overview of the research on security problems and their existing solutions for smart cities. The categorization is based on several factors such as governance, socioeconomic and technological factors. This classification provides an easy and concise view of the security threats, vulnerabilities and available solutions for the respective technologies areas that are proposed over the period 2010-2015. Secondly, an IoT testbed for smart cities architecture, i.e., SmartSantander is also analyzed with respect to security threats and vulnerabilities to smart cities. The existing best practices regarding smart city security are discussed and analyzed with respect to their performance, which could be used by different stakeholders of the smart cities.

Author 1: Sidra Ijaz
Author 2: Munam Ali Shah
Author 3: Abid Khan
Author 4: Mansoor Ahmed

Keywords: Smart city, ICT, IoT, Information security, RFID, M2M, WSN, Smart grids, Biometrics

PDF

Paper 78: Sorting Pairs of Points Based on Their Distances

Abstract: Sorting data is one of the main problems in computer science which studied vastly and used in several places. In several geometric problems, like problems on point sets or lines in the plane or Euclidean space with higher dimensions, the problem of sorting pairs of points based on the distance (between them is used. Using general sorting algorithms, sorting n 2) distances between n points can be done in O(n2 log n) time. Ofcourse, sorting (n2) independent numbers does not have a faster solution, but since we have dependency between numbers in this case, finding a faster algorithm or showing that the problem in this case has O(n2 log n) time complexity is interesting. In this paper, we try to answer this question.

Author 1: Mohammad Farshi
Author 2: Abolfazl Poureidi
Author 3: Zorieh Soltani

Keywords: Sorting problem; Sorting distances

PDF

Paper 79: Theoretical and numerical characterization of continuously graded thin layer by the reflection acoustic microscope

Abstract: This article presents a theoretical and numerical study by the reflection acoustic microscope of the surface acoustic waves propagation at the interface formed by a thin layer and the coupling liquid (water). The thin layer presents a gradient in its acoustical parameters along its depth. A stable transfer matrix method is used to compute the reflectance function of the surface acoustic modes radiated in the coupling liquid. This function is required to calculate the theoretical acoustic material signature which allows to determine the phase velocity of these modes. In order to characterize the influence of the gradient on the acoustic material signature, a few gradient functions are studied. The numerical results obtained show that the acoustic material signature can be used to characterize these profiles.

Author 1: Ahmed Markou
Author 2: Hassan Nounah
Author 3: Lahcen Mountassir

Keywords: Reflection acoustic microscope; Surface acoustic wave; Thin graded layer; Transfer matrix method; Reflectance function; Acoustic material signature

PDF

Paper 80: Toward Information Diffusion Model for Viral Marketing in Business

Abstract: Current obstacles in the study of social media marketing include dealing with massive data and real-time updates have motivated to contribute solutions that can be adopted for viral marketing. Since information diffusion and social networks are the core of viral marketing, this article aims to investigate the constellation of diffusion methods for viral marketing. Studies on diffusion methods for viral marketing have applied different computational methods, but a systematic investigation of these methods has limited. Most of the literature have focused on achieving objectives such as influence maxi-mization or community detection. Therefore, this article aims to conduct an in-depth review of works related to diffusion for viral marketing. Viral marketing has applied to business-to-consumer transactions but has seen limited adoption in business-to-business transactions. The literature review reveals a lack of new diffusion methods, especially in dynamic and large-scale networks. It also offers insights into applying various mining methods for viral marketing. It discusses some of the challenges, limitations, and future research directions of information diffusion for viral marketing. The article also introduces a viral marketing informa-tion diffusion model. The proposed model attempts to solve the dynamicity and large-scale data of social networks by adopting incremental clustering and a stochastic differential equation for business-to-business transactions.

Author 1: Lulwah AlSuwaidan
Author 2: Mourad Ykhlef

Keywords: information diffusion; viral marketing; social media marketing; social networks

PDF

Paper 81: A New Threshold Based Penalty Function Embedded MOEA/D

Abstract: Recently, we proposed a new threshold based penalty function. The threshold dynamically controls the penalty to infeasible solutions. This paper implants the two different forms of the proposed penalty function in the multiobjective evo-lutionary algorithm based on decomposition (MOEA/D) frame-work to solve constrained multiobjective optimization problems. This led to a new algorithm, denoted by CMOEA/D-DE-ATP. The performance of CMOEA/D-DE-ATP is tested on hard CF-series test instances in terms of the values of IGD-metric and SC-metric. The experimental results are compared with the three best performers of CEC 2009 MOEA competition. Experimental results show that the proposed penalty function is very promising, and it works well in the MOEA/D framework.

Author 1: Muhammad Asif Jan
Author 2: Nasser Mansoor Tairan
Author 3: Rashida Adeeb Khanum
Author 4: Wali Khan Mashwani

Keywords: Constrained multiobjective optimization; decompo-sition; MOEA/D; penalty function; threshold

PDF

Paper 82: Threshold Based Penalty Functions for Constrained Multiobjective Optimization

Abstract: This paper compares the performance of our re-cently proposed threshold based penalty function against its dynamic and adaptive variants. These penalty functions are incorporated in the update and replacement scheme of the multiobjective evolutionary algorithm based on decomposition (MOEA/D) framework to solve constrained multiobjective op-timization problems (CMOPs). As a result, the capability of MOEA/D is extended to handle constraints, and a new algorithm, denoted by CMOEA/D-DE-TDA is proposed. The performance of CMOEA/D-DE-TDA is tested, in terms of the values of IGD-metric and SC-metric, on the well known CF-series test instances. The experimental results are also compared with the three best performers of CEC 2009 MOEA competition. Empirical results show the pitfalls of the proposed penalty functions.

Author 1: Muhammad Asif Jan
Author 2: Nasser Mansoor Tairan
Author 3: Rashida Adeeb Khanum
Author 4: Wali Khan Mashwani

Keywords: Constrained multiobjective optimization; decomposi-tion; MOEA/D; dynamic and adaptive penalty functions; threshold

PDF

Paper 83: Regression-Based Feature Selection on Large Scale Human Activity Recognition

Abstract: In this paper, we present an approach for regression-based feature selection in human activity recognition. Due to high dimensional features in human activity recognition, the model may have over-fitting and can’t learn parameters well. Moreover, the features are redundant or irrelevant. The goal is to select important discriminating features to recognize the human activities in videos. R-Squared regression criterion can identify the best features based on the ability of a feature to explain the variations in the target class. The features are significantly reduced, nearly by 99.33%, resulting in better classification accuracy. Support Vector Machine with a linear kernel is used to classify the activities. The experiments are tested on UCF50 dataset. The results show that the proposed model significantly outperforms state-of-the-art methods.

Author 1: Hussein Mazaar
Author 2: Eid Emary
Author 3: Hoda Onsi

Keywords: Action Bank; Template Matching; SpatioTemporal Orientation Energy; Correlation; R-Squared; Support Vector Ma-chine; Logistic Regression; Linear Regression; Human Activity Recognition

PDF

Paper 84: Reflected Adaptive Differential Evolution with Two External Archives for Large-Scale Global Optimization

Abstract: JADE is an adaptive scheme of nature inspired algorithm, Differential Evolution (DE). It performed considerably improved on a set of well-studied benchmark test problems. In this paper, we evaluate the performance of new JADE with two external archives to deal with unconstrained continuous large-scale global optimization problems labeled as Reflected Adaptive Differential Evolution with Two External Archives (RJADE/TA). The only archive of JADE stores failed solutions. In contrast, the proposed second archive stores superior solutions at regular intervals of the optimization process to avoid premature convergence towards local optima. The superior solutions which are sent to the archive are reflected by new potential solutions. At the end of the search process, the best solution is selected from the second archive and the current population. The performance of RJADE/TA algorithm is then extensively evaluated on two test beds. At first on 28 latest benchmark functions constructed for the 2013 Congress on Evolutionary Computation special session. Secondly on ten benchmark problems from CEC2010 Special Session and Competition on Large-Scale Global Optimization. Experimental results demonstrated a very competitive perfor-mance of the algorithm.

Author 1: Rashida Adeeb Khanum
Author 2: Nasser Tairan
Author 3: Muhammad Asif Jan
Author 4: Wali Khan Mashwani
Author 5: Abdel Salhi

Keywords: Adaptive differential evolution; large scale global optimization; archives

PDF

The Science and Information (SAI) Organization
BACK TO TOP

Computer Science Journal

  • About the Journal
  • Call for Papers
  • Submit Paper
  • Indexing

Our Conferences

  • Computing Conference
  • Intelligent Systems Conference
  • Future Technologies Conference
  • Communication Conference

Help & Support

  • Contact Us
  • About Us
  • Terms and Conditions
  • Privacy Policy

© The Science and Information (SAI) Organization Limited. All rights reserved. Registered in England and Wales. Company Number 8933205. thesai.org