The Science and Information (SAI) Organization
  • Home
  • About Us
  • Journals
  • Conferences
  • Contact Us

Publication Links

  • IJACSA
  • Author Guidelines
  • Publication Policies
  • Digital Archiving Policy
  • Promote your Publication
  • Metadata Harvesting (OAI2)

IJACSA

  • About the Journal
  • Call for Papers
  • Editorial Board
  • Author Guidelines
  • Submit your Paper
  • Current Issue
  • Archives
  • Indexing
  • Fees/ APC
  • Reviewers
  • Apply as a Reviewer

IJARAI

  • About the Journal
  • Archives
  • Indexing & Archiving

Special Issues

  • Home
  • Archives
  • Proposals
  • Guest Editors
  • SUSAI-EE 2025
  • ICONS-BA 2025
  • IoT-BLOCK 2025

Future of Information and Communication Conference (FICC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Computing Conference

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Intelligent Systems Conference (IntelliSys)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Future Technologies Conference (FTC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact
  • Home
  • Call for Papers
  • Editorial Board
  • Guidelines
  • Submit
  • Current Issue
  • Archives
  • Indexing
  • Fees
  • Reviewers
  • Subscribe

IJACSA Volume 2 Issue 3

Copyright Statement: This is an open access publication licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.

View Full Issue

Paper 1: Quality of Service Management on Multimedia Data Transformation into Serial Stories Using Movement Oriented Method

Abstract: Multimedia data transformation into serial stories or story board will help to reduce the consumption of storage media, indexing, sorting and searching system. Movement Oriented Method that is being developed changes the form of multimedia data into serial stories. Movement Oriented Method depends on the knowledge each actor who uses it. Different knowledge of each actor in the transformation process raises complex issues, such as the sequence, and the resulted story object that could becomes the standard. And the most fatal could be, the resulted stories does not same with the original multimedia data. To solve it, the Standard Level Knowledge (SLK) in maintaining the quality of the story could be taken. SLK is the minimum knowledge that must be owned by each actor who will perform this transformation process. Quality of Service management could be applied to assess and maintain the stability and validity of the level of the each system to SLK.

Author 1: A Muslim
Author 2: A.B. Mutiara

Keywords: multimedia data; serial stories; movement oriented; standard level knowledge;quality of service

PDF

Paper 2: A Survey on Attacks and Defense Metrics of Routing Mechanism in Mobile Ad hoc Networks

Abstract: A Mobile Ad hoc Network (MANET) is a dynamic wireless network that can be formed infrastructure less connections in which each node can act as a router. The nodes in MANET themselves are responsible for dynamically discovering other nodes to communicate. Although the ongoing trend is to adopt ad hoc networks for commercial uses due to their certain unique properties, the main challenge is the vulnerability to security attacks. In the presence of malicious nodes, one of the main challenges in MANET is to design the robust security solution that can protect MANET from various routing attacks. Different mechanisms have been proposed using various cryptographic techniques to countermeasure the routing attacks against MANET. As a result, attacks with malicious intent have been and will be devised to exploit these vulnerabilities and to cripple the MANET operations. Attack prevention measures, such as authentication and encryption, can be used as the first line of defense for reducing the possibilities of attacks. However, these mechanisms are not suitable for MANET resource constraints, i.e., limited bandwidth and battery power, because they introduce heavy traffic load to exchange and verifying keys. In this paper, we identify the existent security threats an ad hoc network faces, the security services required to be achieved and the countermeasures for attacks in routing protocols. To accomplish our goal, we have done literature survey in gathering information related to various types of attacks and solutions. Finally, we have identified the challenges and proposed solutions to overcome them. In our survey, we focus on the findings and related works from which to provide secure protocols for MANETs. However, in short, we can say that the complete security solution requires the prevention, detection and reaction mechanisms applied in MANET.

Author 1: K P Manikandan
Author 2: Dr.R.Satyaprasad
Author 3: Dr.K.Rajasekhararao

Keywords: MANET; Routing Protocol; Security Attacks; Routing Attacks and Defense Metrics

PDF

Paper 4: Advanced Steganography Algorithm using Encrypted secret message

Abstract: In the present work the authors have introduced a new method for hiding any encrypted secret message inside a cover file. For encrypting secret message the authors have used new algorithm proposed by Nath et al(1). For hiding secret message we have used a method proposed by Nath et al(2). In MSA(1) method we have modified the idea of Play fair method into a new platform where we can encrypt or decrypt any file. We have introduced a new randomization method for generating the randomized key matrix to encrypt plain text file and to decrypt cipher text file. We have also introduced a new algorithm for encrypting the plain text multiple times. Our method is totally dependent on the random text_key which is to be supplied by the user. The maximum length of the text_key can be of 16 characters long and it may contain any character(ASCII code 0 to 255). We have developed an algorithm to calculate the randomization number and the encryption number from the given text_key. The size of the encryption key matrix is 16x16 and the total number of matrices can be formed from 16 x 16 is 256! which is quite large and hence if someone applies the brute force method then he/she has to give trail for 256! times which is quite absurd. Moreover the multiple encryption method makes the system further secured. For hiding secret message in the cover file we have inserted the 8 bits of each character of encrypted message file in 8 consecutive bytes of the cover file. We have introduced password for hiding data in the cover file. We propose that our new method could be most appropriate for hiding any file in any standard cover file such as image, audio, video files. Because the hidden message is encrypted hence it will be almost impossible for the intruder to unhide the actual secret message from the embedded cover file. This method may be the most secured method in digital water marking.

Author 1: Joyshree Nath
Author 2: Asoke Nath

Keywords: Steganography; MSA algorithm; Encryption; Decryption.

PDF

Paper 5: Transparent Data Encryption- Solution for Security of Database Contents

Abstract: The present study deals with Transparent Data Encryption which is a technology used to solve the problems of security of data. Transparent Data Encryption means encrypting databases on hard disk and on any backup media. Present day global business environment presents numerous security threats and compliance challenges. To protect against data thefts and frauds we require security solutions that are transparent by design. Transparent Data Encryption provides transparent, standards-based security that protects data on the network, on disk and on backup media. It is easy and effective protection of stored data by transparently encrypting data. Transparent Data Encryption can be used to provide high levels of security to columns, table and tablespace that is database files stored on hard drives or floppy disks or CD’s, and other information that requires protection. It is the technology used by Microsoft SQL Server 2008 to encrypt database contents. The term encryption means the piece of information encoded in such a way that it can only be decoded read and understood by people for whom the information is intended. The study deals with ways to create Master Key, creation of certificate protected by the master key, creation of database master key and protection by the certificate and ways to set the database to use encryption in Microsoft SQL Server 2008.

Author 1: Dr. Anwar Pasha Abdul Gafoor Deshmukh
Author 2: Dr. Riyazuddin Qureshi

Keywords: Transparent Data Encryption, TDE, Encryption, Decryption, Microsoft SQL Server 2008

PDF

Paper 6: Knowledge discovery from database using an integration of clustering and classification

Abstract: Clustering and classification are two important techniques of data mining. Classification is a supervised learning problem of assigning an object to one of several pre-defined categories based upon the attributes of the object. While, clustering is an unsupervised learning problem that group objects based upon distance or similarity. Each group is known as a cluster. In this paper we make use of a large database ‘Fisher’s Iris Dataset’ containing 5 attributes and 150 instances to perform an integration of clustering and classification techniques of data mining. We compared results of simple classification technique (using J48 classifier) with the results of integration of clustering and classification technique, based upon various parameters using WEKA (Waikato Environment for Knowledge Analysis), a Data Mining tool. The results of the experiment show that integration of clustering and classification gives promising results with utmost accuracy rate and robustness even when the data set is containing missing values.

Author 1: Varun Kumar
Author 2: Nisha Rathee

Keywords: Data Mining; J48; KMEANS; WEKA; Fisher’s Iris dataset.

PDF

Paper 7: A Fuzzy Decision Support System for Management of Breast Cancer

Abstract: In the molecular era the management of cancer is no more a plan based on simple guidelines. Clinical findings, tumor characteristics, and molecular markers are integrated to identify different risk categories, based on which treatment is planned for each individual case. This paper aims at developing a fuzzy decision support system (DSS) to guide the doctors for the risk stratification of breast cancer, which is expected to have a great impact on treatment decision and to minimize individual variations in selecting the optimal treatment for a particular case. The developed system was based on clinical practice of Oncology Center Mansoura University (OCMU). This system has six input variables (Her2, hormone receptors, age, tumor grade, tumor size, and lymph node) and one output variable (risk status). The output variable is a value from 1 to 4; representing low risk status, intermediate risk status and high risk status. This system uses Mamdani inference method and simulation applied in MATLAB R2009b fuzzy logic toolbox.

Author 1: Ahmed Abou Elfetouh Saleh
Author 2: Sherif Ebrahim Barakat
Author 3: Ahmed Awad Ebrahim Awad

Keywords: Decision Support System; Breast Cancer; Fuzzy Logic; Mamdani Inference.

PDF

Paper 8: Effective Implementation of Agile Practices - Ingenious and Organized Theoretical Framework

Abstract: Delivering software in traditional ways is challenged by agile software development to provide a very different approach to software development. Agile methods aim at fast, light and efficient than any other vigorous method to develop and support customers business without being chaotic. Agile software development methods claim to be people-oriented rather than process-oriented and adaptive rather than predictive. Solid Determination and Dedicated efforts are required in agile development to overcome the disadvantages of predefined set of steps and changing requirements to see the desirable outcome and to avoid the predictable results. These methods reach the target promptly by linking developers and stakeholders. The focus of this research paper is two fold. The first part is to study different agile methodologies, find out the levelheaded difficulties in agile software development and suggests possible solutions with a collaborative and innovative framework. The second part of the research paper concentrates on the importance of handling traceability in agile software development and finally proposes an ingenious and organized theoretical framework with a systematic approach to agile software development.

Author 1: Veerapaneni Esther Jyothi
Author 2: K. Nageswara Rao

Keywords: Traceability; requirements; agile manifesto; framework

PDF

Paper 9: Wavelet Based Image Denoising Technique

Abstract: This paper proposes different approaches of wavelet based image denoising methods. The search for efficient image denoising methods is still a valid challenge at the crossing of functional analysis and statistics. In spite of the sophistication of the recently proposed methods, most algorithms have not yet attained a desirable level of applicability. Wavelet algorithms are useful tool for signal processing such as image compression and denoising. Multi wavelets can be considered as an extension of scalar wavelets. The main aim is to modify the wavelet coefficients in the new basis, the noise can be removed from the data. In this paper, we extend the existing technique and providing a comprehensive evaluation of the proposed method. Results based on different noise, such as Gaussian, Poisson’s, Salt and Pepper, and Speckle performed in this paper. A signal to noise ratio as a measure of the quality of denoising was preferred.

Author 1: Sachin D Ruikar
Author 2: Dharmpal D Doye

Keywords: Image; Denoising; Wavelet Transform; Signal to Noise ratio; Kernel.

PDF

Paper 10: Multicasting over Overlay Networks - A Critical Review

Abstract: Multicasting technology uses the minimum network resources to serve multiple clients by duplicating the data packets at the closest possible point to the clients. This way at most only one data packets travels down a network link at any one time irrespective of how many clients receive this packet. Traditionally multicasting has been implemented over a specialized network built using multicast routers. This kind of network has the drawback of requiring the deployment of special routers that are more expensive than ordinary routers. Recently there is new interest in delivering multicast traffic over application layer overlay networks. Application layer overlay networks though built on top of the physical network, behave like an independent virtual network made up of only logical links between the nodes. Several authors have proposed systems, mechanisms and protocols for the implementation of multicast media streaming over overlay networks. In this paper, the author takes a critical look at these systems and mechanism with special reference to their strengths and weaknesses.

Author 1: M.F M Firdhous

Keywords: Multicasting, overlay networks, streaming media

PDF

Paper 11: Adaptive Equalization Algorithms: An Overview

Abstract: The recent digital transmission systems impose the application of channel equalizers with short training time and high tracking rate. Equalization techniques compensate for the time dispersion introduced by communication channels and combat the resulting inter-symbol interference (ISI) effect. Given a channel of unknown impulse response, the purpose of an adaptive equalizer is to operate on the channel output such that the cascade connection of the channel and the equalizer provides an approximation to an ideal transmission medium. Typically, adaptive equalizers used in digital communications require an initial training period, during which a known data sequence is transmitted. A replica of this sequence is made available at the receiver in proper synchronism with the transmitter, thereby making it possible for adjustments to be made to the equalizer coefficients in accordance with the adaptive filtering algorithm employed in the equalizer design. In this paper, an overview of the current state of the art in adaptive equalization techniques has been presented.

Author 1: Garima Malik
Author 2: Amandeep Singh Sappal

Keywords: Channel Equalizer, Adaptive Equalize, Least Mean Square, Recursive Least Squares

PDF

Paper 12: Pulse Shape Filtering in Wireless Communication-A Critical Analysis

Abstract: The goal for the Third Generation (3G) of mobile communications system is to seamlessly integrate a wide variety of communication services. The rapidly increasing popularity of mobile radio services has created a series of technological challenges. One of this is the need for power and spectrally efficient modulation schemes to meet the spectral requirements of mobile communications. Pulse shaping plays a crucial role in spectral shaping in the modern wireless communication to reduce the spectral bandwidth. Pulse shaping is a spectral processing technique by which fractional out of band power is reduced for low cost, reliable , power and spectrally efficient mobile radio communication systems. It is clear that the pulse shaping filter not only reduces inter-symbol interference (ISI), but it also reduces adjacent channel interference. The present paper deals with critical analysis of pulse shaping in wireless communication.

Author 1: A S Kang
Author 2: Vishal Sharma

Keywords: WCDMA, Pulse Shaping.

PDF

Paper 13: Arabic Cursive Characters Distributed Recognition using the DTW Algorithm on BOINC: Performance Analysis

Abstract: Volunteer computing or volunteer grid computing constitute a very promising infrastructure which provides enough computing and storage powers without any prior cost or investment. Indeed, such infrastructures are the result of the federation of several, geographically dispersed, computers or/and LAN computers over the Internet. Berkeley Open Infrastructure for Network Computing (BOINC) is considered the most well known volunteer computing infrastructure. In this paper, we are interested, rather, by the distribution of the Arabic OCR (Optical Character Recognition) based on the DTW (Dynamic Time Warping) algorithm on the BOINC, in order, to prove again that volunteer computing provides very interesting and promising infrastructures to speed up, at will, several greedy algorithms or applications, especially, the Arabic OCR based on the DTW algorithm. What makes very attractive the Arabic OCR based on the DTW algorithm is the following, first, its ability to recognize, properly, words or sub words, without any prior segmentation, from within a reference library of isolated characters. Second, its good immunity against a wide range of noises. Obtained first results confirm, indeed, that the Berkeley Open Infrastructure for Network Computing constitutes an interesting and promising framework to speed up the Arabic OCR based on the DTW algorithm.

Author 1: Zied TRIFA
Author 2: Mohamed LABIDI
Author 3: Maher KHEMAKHEM

Keywords: Volunteer Computing, BOINC, Arabic OCR, DTW algorithm

PDF

Paper 14: An Empirical Study of the Applications of Data Mining Techniques in Higher Education

Abstract: Few years ago, the information flow in education field was relatively simple and the application of technology was limited. However, as we progress into a more integrated world where technology has become an integral part of the business processes, the process of transfer of information has become more complicated. Today, one of the biggest challenges that educational institutions face is the explosive growth of educational data and to use this data to improve the quality of managerial decisions. Data mining techniques are analytical tools that can be used to extract meaningful knowledge from large data sets. This paper addresses the applications of data mining in educational institution to extract useful information from the huge data sets and providing analytical tool to view and use this information for decision making processes by taking real life examples.

Author 1: Dr. Varun Kumar
Author 2: Anupama Chadha

Keywords: Higher education, Data mining, Knowledge discovery, Classification, Association rules, Prediction, Outlier analysis.

PDF

Paper 15: Integrated Routing Protocol for Opportunistic Networks

Abstract: In opportunistic networks the existence of a simultaneous path is not assumed to transmit a message between a sender and a receiver. Information about the context in which the users communicate is a key piece of knowledge to design efficient routing protocols in opportunistic networks. But this kind of information is not always available. When users are very isolated, context information cannot be distributed, and cannot be used for taking efficient routing decisions. In such cases, context oblivious based schemes are only way to enable communication between users. As soon as users become more social, context data spreads in the network, and context based routing becomes an efficient solution. In this paper we design an integrated routing protocol that is able to use context data as soon as it becomes available and falls back to dissemination-based routing when context information is not available. Then, we provide a comparison between Epidemic and PROPHET, these are representative of context oblivious and context aware routing protocols. Our results show that integrated routing protocol is able to provide better result in term of message delivery probability and message delay in both cases when context information about users is available or not.

Author 1: Anshul Verma
Author 2: Dr. Anurag Srivastava

Keywords: context aware routing; context information; context oblivious routing; MANET; opportunistic network.

PDF

Paper 16: An Electronic Intelligent Hotel Management System for International Marketplace

Abstract: To compete with the international market place, it is crucial for hotel industry to be able to continually improve its services for tourism. In order to construct an electronic marketplace (e-market), it is an inherent requirement to build a correct architecture with a proper approach of an intelligent systems embedded on it. This paper introduces a web based intelligent that helps in maintaining a hotel by reducing the immediate involvement of manpower. The hotel reception policy, room facilities and intelligent personalization promotion are the main focuses of this paper. An intelligent search for existing boarders as well as room availability is incorporated in the system. For each of the facilities, a flow chart has been developed which confirms the techniques and relevant devices used in the system. By studying several scenarios, the paper outlines a number of techniques for realization of the intelligent hotel management system. Special attention is paid to the security and also prevention of power and water wastages. In this power saving scenery, an image processing approach is taken to detect the presence of any people and the darkness in a particular room. Moreover, this proposed automated computerized scheme also takes an account of the cost advantage. Considering the scarcity of manpower in several countries, the objective of this paper is to initiate the discussion and research for making the proposed systems more commercialized.

Author 1: Md. Noor A Rahim
Author 2: Md. Kamal Hosain
Author 3: Md. Saiful Islam
Author 4: Md. Nashid Anjum
Author 5: Md. Masud Rana

Keywords: E-marketplac;, hotel management, intelligent search; intelligent system;, image processing algorithms and web-based application

PDF

Paper 17: The Impact of E-Media on Customer Purchase Intention

Abstract: In this research paper, authors investigated the social media (e-discussion, websites, online chat, email etc) parameters that have effect over the customers buying decisions. The research focused on the development of research model to test the impact of social media on the customer purchase intention. The literature review done to explore the work done on social media. The authors identify the problem and defined the objectives of the studies. In order to achieve them, a research model is proposed that followed by the development of research hypotheses to testify the model.

Author 1: Mehmood Rehmani,
Author 2: Muhammad Ishfaq Khan

Keywords: e-discussion; e-mail; website; online chat.

PDF

Paper 18: Feed Forward Neural Network Based Eye Localization and Recognition Using Hough Transform

Abstract: Eye detection is a pre-requisite stage for many applications such as face recognition, iris recognition, eye tracking, fatigue detection based on eye-blink count and eye-directed instruction control. As the location of the eyes is a dominant feature of the face it can be used as an input to the face recognition engine. In this direction, the paper proposed here localizes eye positions using Hough Transformed (HT) coefficients, which are found to be good at extracting geometrical components from any given object. The method proposed here uses circular and elliptical features of eyes in localizing them from a given face. Such geometrical features can be very efficiently extracted using the HT technique. The HT is based on a evidence gathering approach where the evidence is the ones cast in an accumulator array. The purpose of the technique is to find imperfect instances of objects within a certain class of shapes by a voting procedure. Feed forward neural network has been used for classification of eyes and non-eyes as the dimension of the data is large in nature. Experiments have been carried out on standard databases as well as on local DB consisting of gray scale images. The outcome of this technique has yielded very satisfactory results with an accuracy of 98.68%

Author 1: Shylaja S S
Author 2: K N Balasubramanya Murthy
Author 3: S Natarajan

Keywords: Hough Transform; Eye Detection; Accumulator Bin; Neural Network.

PDF

Paper 19: Computer Aided Design and Simulation of a Multiobjective Microstrip Patch Antenna for Wireless Applications

Abstract: The utility and attractiveness of microstrip antennas has made it ever more important to find ways to precisely determine the radiation patterns of these antennas. Taking benefit of the added processing power of today’s computers, electromagnetic simulators are emerging to perform both planar and 3D analysis of high-frequency structures. One such tool studied was IE3D, which is a program that utilizes method of moment. This paper makes an investigation of the method used by the program, and then uses IE3D software to construct microstrip antennas and analyze the simulation results. The antenna offers good electrical performance and at the same time preserves the advantages of microstrip antennas such as small size, easy to manufacture as no lumped components are employed in the design and thus, is low cost; and most importantly, it serves multiple wireless applications.

Author 1: Chitra Singh
Author 2: R. P. S. Gangwar

Keywords: Electromagnetic simulation; microstrip antenna; radiation pattern; IE3D.

PDF

The Science and Information (SAI) Organization
BACK TO TOP

Computer Science Journal

  • About the Journal
  • Call for Papers
  • Submit Paper
  • Indexing

Our Conferences

  • Computing Conference
  • Intelligent Systems Conference
  • Future Technologies Conference
  • Communication Conference

Help & Support

  • Contact Us
  • About Us
  • Terms and Conditions
  • Privacy Policy

© The Science and Information (SAI) Organization Limited. All rights reserved. Registered in England and Wales. Company Number 8933205. thesai.org