The Science and Information (SAI) Organization
  • Home
  • About Us
  • Journals
  • Conferences
  • Contact Us

Publication Links

  • IJACSA
  • Author Guidelines
  • Publication Policies
  • Digital Archiving Policy
  • Promote your Publication
  • Metadata Harvesting (OAI2)

IJACSA

  • About the Journal
  • Call for Papers
  • Editorial Board
  • Author Guidelines
  • Submit your Paper
  • Current Issue
  • Archives
  • Indexing
  • Fees/ APC
  • Reviewers
  • Apply as a Reviewer

IJARAI

  • About the Journal
  • Archives
  • Indexing & Archiving

Special Issues

  • Home
  • Archives
  • Proposals
  • Guest Editors
  • SUSAI-EE 2025
  • ICONS-BA 2025
  • IoT-BLOCK 2025

Future of Information and Communication Conference (FICC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Computing Conference

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Intelligent Systems Conference (IntelliSys)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Future Technologies Conference (FTC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact
  • Home
  • Call for Papers
  • Editorial Board
  • Guidelines
  • Submit
  • Current Issue
  • Archives
  • Indexing
  • Fees
  • Reviewers
  • Subscribe

IJACSA Volume 3 Issue 3

Copyright Statement: This is an open access publication licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.

View Full Issue

Paper 1: A New Approach for Arabic Handwritten Postal Addresses Recognition

Abstract: In this paper, we propose an automatic analysis system for the Arabic handwriting postal addresses recognition, by using the beta elliptical model. Our system is divided into different steps: analysis, pre-processing and classification. The first operation is the filtering of image. In the second, we remove the border print, stamps and graphics. After locating the address on the envelope, the address segmentation allows the extraction of postal code and city name separately. The pre-processing system and the modeling approach are based on two basic steps. The first step is the extraction of the temporal order in the image of the handwritten trajectory. The second step is based on the use of Beta-Elliptical model for the representation of handwritten script. The recognition system is based on Graph-matching algorithm. Our modeling and recognition approaches were validated by using the postal code and city names extracted from the Tunisian postal envelopes data. The recognition rate obtained is about 98%.

Author 1: Moncef Charfi
Author 2: Monji Kherallah
Author 3: Abdelkarim El Baati
Author 4: Adel M. Alimi
Author 5:

Keywords: Postal automation; handwritten postal address; address segmentation; beta-elliptical representation; graph matching.

PDF

Paper 2: A Keyword Driven Framework for Testing Web Applications

Abstract: The goal of this paper is to explore the use of Keyword driven testing for automated testing of web application. In Keyword driven testing, the functionality of the system-under-test is documented in a table as well as in step by- step instructions for each test. It involves the creation of modular, reusable test components. These components are then assembled into test scripts. These components can be parameterized to make them reusable across various test script. These test scripts can also be divided into various reusable actions. This saves a lot of recording procedure. The Existing tools for this testing uses Html, Xml, Spreadsheet, etc. to maintain the test steps. The test results are analyzed to create test reports.

Author 1: Rashmi
Author 2: Neha Bajpai

Keywords: driven testing; test automation; test script;, test results; Html; test reports; test result; recording.

PDF

Paper 3: Effect of Error Packetization on the Quality of Streaming Video in Wireless Broadband Networks

Abstract: A Markov model describing the duration of error intervals and error-free reception for streaming video transmission was developed based on the experimental data obtained as a result of streaming video from a mobile source on IEEE 802.16 standard network. The analysis of experimental results shows that the average quality of video sequences when simulating Markov model of packetization of errors are similar to those obtained when simulating single packet errors with PER index in the range of 3×?10?^(-3) to 1×?10?^(-2). An algorithm for creating software for simulating packetization of errors was developed. In this paper we describe the algorithm, software developed based on this algorithm as well as the Markov model created for the modeling.

Author 1: Aderemi A Atayero
Author 2: Oleg I. Sheluhin
Author 3: Yury A. Ivanov

Keywords: Video streaming; Markov model; IEEE 802.16; Bit Error Rate; Burst Error Length; Packet Error Rate; Codec.

PDF

Paper 4: An Overview of Video Allocation Algorithms for Flash-based SSD Storage Systems

Abstract: Despite the fact that Solid State Disk (SSD) data storage media had offered a revolutionary property storages community, but the unavailability of a comprehensive allocation strategy in SSDs storage media, leads to consuming the available space, random writing processes, time-consuming reading processes, and system resources consumption. In order to overcome these challenges, an efficient allocation algorithm is a desirable option. In this paper, we had executed an intensive investigation on the SSD-based allocation algorithms that had been proposed by the knowledge community. An explanatory comparison had been made between these algorithms. We reviewed these algorithms in order to building advanced knowledge armature that would help in inventing new allocation algorithms for this type of storage media.

Author 1: Jaafer Al-Sabateen
Author 2: Saleh Ali Alomari
Author 3: Putra Sumari

Keywords: SSDs; Allocation Algorithms; Data Management Systems; Garbage Collection; Storage Media.

PDF

Paper 5: Building Trust In Cloud Using Public Key Infrastructure - A step towards cloud trust

Abstract: Cloud services have grown very quickly over the past couple of years, giving consumers and companies the chance to put services, resources and infrastructures in the hands of a provider. There are big security concerns when using cloud services. With the emergence of cloud computing, Public Key Infrastructure (PKI) technology has undergone a renaissance, enabling computer to computer communications. This study describes use of PKI in cloud computing and provides insights into some of the challenges which cloud-based PKI systems face.

Author 1: Heena Kharche
Author 2: Mr. Deepak Singh Chouhan

Keywords: Cloud Computing; Public Key infrastructure; Cryptography.

PDF

Paper 6: Contextual Modelling of Collaboration System

Abstract: Faced with new environmental constraints, firms decide to collaborate in collective entities and adopt new patterns of behavior. So, this firms’ collaboration becomes an unavoidable approach. Indeed, our aim interest in our study is to propose a collaborative information system for supply chain. Our proposed platform ensures cooperation and information sharing between partners in real time. In fact, several questions have to be asked: What is the information nature may be shared between partners? What processes are implemented between actors? What functional services are supported by the platform? In order to answer these questions, we present, in this article, our methodological approach of modelling, called CMCS (Contextual Modelling of Collaborative System).

Author 1: Wafaa DACHRY
Author 2: Brahim AGHEZZAF
Author 3: Bahloul BENSASSI
Author 4: Adil SAYOUTI

Keywords: collaborative information system; business process; collaborative process; BPMN; CMCS.

PDF

Paper 7: Development of a Mobile Phone Based e-Health Monitoring Application

Abstract: The use of Electrocardiogram (ECG) system is important in primary diagnosis and survival analysis of the heart diseases. Growing portable mobile technologies have provided possibilities for medical monitoring for human vital signs and allow patient move around freely. In this paper, a mobile health monitoring application program is described. This system consists of the following sub-systems: real-time signal receiver, ECG signal processing, signal display in mobile phone, and data management as well five user interface screens. We verified the signal feature detection using the MIT-BIH arrhythmia database. The detection algorithms were implemented in the mobile phone application program. This paper describes the application system that was developed and tested successfully.

Author 1: Duck Hee Lee
Author 2: Ahmed Rabbi
Author 3: Jaesoon Choi
Author 4: Reza Fazel-Rezai

Keywords: Electrocardiogram(ECG); mobile phone; MIT-BIH database; health monitoring system.

PDF

Paper 8: Development of knowledge Base Expert System for Natural treatment of Diabetes disease

Abstract: The development of expert system for treatment of Diabetes disease by using natural methods is new information technology derived from Artificial Intelligent research using ESTA (Expert System Text Animation) System. The proposed expert system contains knowledge about various methods of natural treatment methods (Massage, Herbal/Proper Nutrition, Acupuncture, Gems) for Diabetes diseases of Human Beings. The system is developed in the ESTA (Expert System shell for Text Animation) which is Visual Prolog 7.3 Application. The knowledge for the said system will be acquired from domain experts, texts and other related sources.

Author 1: Sanjeev Kumar Jha
Author 2: D.K.Singh

Keywords: Expert System; ESTA; Natural treatment; Diabetes.

PDF

Paper 9: Maximum-Bandwidth Node-Disjoint Paths

Abstract: This paper presents a new method for finding the node-disjoint paths with maximum combined bandwidth in communication networks. This problem is an NP-complete problem which can be optimally solved in exponential time using integer linear programming (ILP). The presented method uses a maximum-cost variant of Dijkstra algorithm and a virtual-node representation to obtain the maximum-bandwidth node-disjoint path. Through several simulations, we compare the performance of our method to a modern heuristic technique and to the ILP solution. We show that, in a polynomial execution time, our proposed method produces results that are almost identical to ILP in a significantly lower execution time.

Author 1: Mostafa H Dahshan

Keywords: Maximum Bandwidth; Disjoint Paths; Widest Pair; Linear Programming; ILP; NP-Complete; Dijkstra Algorithm; Multiple Constrained Path; MCP.

PDF

Paper 10: Message Segmentation to Enhance the Security of LSB Image Steganography

Abstract: Classic Least Significant Bit (LSB) steganography technique is the most used technique to hide secret information in the least significant bit of the pixels in the stego-image. This paper proposed a technique by splitting the secret message into set of segments, that have same length (number of characters), and find the best LSBs of pixels in the stego-image that are matched to each segment. The main goal of this technique is to minimize the number of LSBs that are changed when substituting them with the bits of characters in the secret message. This will lead to decrease the distortion (noise) that is occurred in the pixels of the stego-image and as result increase the immunity of the stego-image against the visual attack. The experiment shows that the proposed technique gives good enhancement to the Classic Least Significant Bit (LSB) technique.

Author 1: Dr. Mohammed Abbas Fadhil Al-Husainy

Keywords: Security; Distortion; Embedding; Substitution.

PDF

Paper 11: Mobile Learning Environment System (MLES): The Case of Android-based Learning Application on Undergraduates’ Learning

Abstract: Of late, mobile technology has introduced new, novel environment that can be capitalized to further enrich the teaching and learning process in classrooms. Taking cognizance of this promising setting, a study was undertaken to investigate the impact of such an environment enabled by android platform on the learning process among undergraduates of Sultan Idris Education University, Malaysia; in particular, this paper discusses critical aspects of the design and implementation of the android learning system. Data were collected through a survey involving 56 respondents, and these data were analyzed by using SPSS 12.0. Findings showed that the respondents were very receptive to the interactivity, accessibility, and convenience of the system, but they were quite frustrated with the occasional interruptions due to internet connectivity problems. Overall, the mobile learning system can be utilized as an inexpensive but potent learning tool that complements undergraduates’ learning process.

Author 1: Hafizul Fahri Hanafi
Author 2: Khairulanuar Samsudin

Keywords: mobile learning; android learning; teaching and learning.

PDF

Paper 12: Simple and Efficient Contract Signing Protocol

Abstract: In this paper, a new contract signing protocol is proposed based on the RSA signature scheme. The protocol will allow two parties to sign the same contract and then exchange their digital signatures. The protocol ensures fairness in that it offers parties greater security: either both parties receive each other's signatures or neither does. The protocol is based on offline Trusted Third Party (TTP) that will be brought into play only if one party fails to sign the contract. Otherwise, the TTP remains inactive. The protocol consists of only three messages that are exchanged between the two parties.

Author 1: Abdullah M Alaraj

Keywords: contract signing; fair exchange protocol; digital signature; protocols; security.

PDF

Paper 13: The Use of Information and Communication Technologies (ICT) in Front Office Operations of Chain Hotels in Ghana

Abstract: The proliferation of Information and Communication Technologies (ICT) coupled with sophisticated network protocols have unveiled new avenues for enterprises and organizations and the hospitality industries cannot be left out. Technology-based systems stand in a pivotal position to offer better service to the populace. Hospitality industries such as hotels can take advantage of the pervasiveness of ICT vis-à-vis technology-based systems to advance some of their operations. This paper seeks to assess the use of Information and Communication Technologies (ICT) in a front office operation of chain hotels in Ghana. The paper determines the extent of the use of information technology in a front office operation of chain hotels in Ghana. The paper continues to assess the effect of the use of information technology in the front office operation of chain hotels in Ghana, thus if the use of ICT has any effect on chain hotels’ front office operations. The paper further makes recommendations to chain hotel operators and the Ghana Tourist Authority (GTA) and policy makers on the use of information and communications technology in front office operation in chain hotels. Three chain hotels in Ghana were assessed.

Author 1: Albert Kwansah Ansah
Author 2: Victoria S. Blankson
Author 3: Millicent Kontoh

Keywords: Front Office Operation; ICT; Chain Hotels; Electronic Point of Sale; Reservation.

PDF

Paper 14: A Digital Ecosystem-based Framework for Math Search Systems

Abstract: Text-based search engines fall short in retrieving structured information. When searching for x(y+z) using those search engines, for example Google, it retrieves documents that contain xyz, x+y=z, (x+y+z) =xyz or any other document that contain x, y, and/or z but not x(y+z) as a standalone math expression. The reason behind this shortage; is that the text-based search engines ignore the structure of the mathematical expressions. Several issues are associated with designing and implementing math-based search systems. Those systems must be able to differentiate between a user query that contains a mathematical expression, and any other query that contains only a text term. A reliable indexing approach, along with a flexible and efficient representation technique are highly required. Eventually, text-based search systems must be able to process mathematical expressions that are well-structured and have properties that make them different from other forms of text. Here, in this context we take advantage from the concept of digital ecosystems to refine the text search process so it becomes applicable in searching for a mathematical expression. In this research, a framework that contains the basic building blocks of a math-based search system is designed.

Author 1: Mohammed Q Shatnawi,
Author 2: Qusai Q. Abuein

Keywords: component; digital ecosystem; math search; information retrieval; text-based search engines; structured information; indexing approach; representation technique.

PDF

Paper 15: OFW-ITS-LSSVM: Weighted Classification by LS-SVM for Diabetes diagnosis

Abstract: In accordance to the fast developing technology now a days, every field is gaining it’s benefit through machines other than human involvement. Many changes are being made much advancement is possible by this developing technology. Likewise this technology is too gaining its importance in bioinformatics especially to analyse data. As we all know that diabetes is one of the present day deadly diseases prevailing. So in this paper we introduce LS-SVM classification to understand which datasets of blood may have the chance to get diabetes. Further, considering the patient’s details we can predict where he has a chance to get diabetes, if so measures to cure or stop it. In this method, an optimal Tabu search model will be suggested to reduce the chances of getting it in the future.

Author 1: Fawzi Elias Bekri
Author 2: Dr. A. Govardhan

Keywords: machine learning; SVM; Feature reduction; feature optimization; tabu search.

PDF

Paper 16: OCC: Ordered congestion control with cross layer support in Manet routing

Abstract: In the recent times many accessible congestion control procedures have no capability to differentiate involving two major problems like packet loss by link crash and packet loss by congestion. Consequently these resolutions effect in form of wastage of possessions because they target only on the packet drop by link crash that has a needless importance. Consumption of energy and possessions in order to make the basis node attentive regarding the congestion occurring in routing path is the supplementary drawback in most of the accessible procedures. This way of concentrating mainly on standardizing the outlet load at the basis node stage is the boundary to the present accessible procedures. It is already known that as a reason of link crash and congestion packet loss in the network routing largely occurs. In this article a new cross layer and path restoration procedure has been put forward. We also put forwarded two algorithms namely Path discovery Algorithm and congestion handling algorithm. In this approach of cross layer it comprises of 3 kinds of layers called network, MAC and transport layers. In this introduced approach the MAC and network layers have dynamic functionalities in identifying the congestion and standardization where the functionalities of network and transport layers are distinguished in bearing the congestion i.e. congestion endurance. The produced tentative results illustrate an enhanced management of congestion and its endurance by this approach.

Author 1: T Suryaprakash Reddy
Author 2: Dr.P.Chenna Reddy

Keywords: manet; routing protocol; congestion control; zone; occ; cross layer.

PDF

Paper 17: Multi-Objective Intelligent Manufacturing System for Multi Machine Scheduling

Abstract: This paper proposes a framework for Intelligent Manufacturing systems in which the machine scheduling is achieved by MCDM and DRSA. The relationship between perception/knowledge base and profit maximization is being extended. Further for production function.

Author 1: Sunita Bansal
Author 2: Dr. Manuj Darbari

Keywords: Decision making; pareto; intelligent manufacturing.

PDF

Paper 18: Evaluation of Data Security Measures in a Network Environment Towards Developing Cooperate Data Security Guidelines

Abstract: Data security in a networked environment is a topic that has become significant in organizations. As companies and organizations rely more on technology to run their businesses, connecting system to each other in different departments for efficiency data security is the concern for administrators. This research assessed the data security measures put in place at Mumias Sugar Company and the effort it was using to protect its data. The researcher also highlighted major security issues that were significantly impacting the operations of Mumias Sugar Company. The researcher used the case study methods where both qualitative and quantitative data was collected by use of questionnaire, interviewing and observation. From the findings the researcher developed data security guidelines for Mumias Sugar Company. The information gained from extensive literature review was tested and observed during the case study.The research revealed that data security lapses in the company was as a result of system administrators’ failure to update and train computer users in the company on how to implement different data security measures that were in place. The final outcome of the research was data security guidelines that were practical enough to be used at Mumias Sugar Company.

Author 1: Ayub Hussein Shirandula

Keywords: Data, security; security measures; guidelines; computer users; Mumias Sugar Company.

PDF

Paper 19: RC4 stream cipher and possible attacks on WEP

Abstract: In this paper we analyze and present some weaknesses and possible attacks on the RC4 stream cipher which were published in many journals. We review some advantages and disadvantages which come from several authors, as well as similarities and differences which can be observed in the published results. Also, we analyze the Key Scheduling Algorithm (KSA) which derives the initial state from a variable size key, and strengths and weaknesses of the RCS stream cipher. Using examples from other papers, we show that RC4 is completely insecure in a common mode of operation which is used in the widely deployed Wired Equivalent Privacy protocol (WEP, which is part of the 802.11 standard).

Author 1: Lazar Stošic
Author 2: Milena Bogdanovic

Keywords: RC4 stream cipher; KSA; WEP; security of WEP; WEP attack.

PDF

Paper 20: Transforming Conceptual Model into Logical Model for Temporal Data Warehouse Security: A Case Study

Abstract: Extraction–transformation–loading (ETL) processes are responsible for the extraction of data from several sources, their cleansing, customization and insertion into a data warehouse. Data warehouse often store historical information which is extracted from multiple, heterogeneous, autonomous and distributed data sources, thereby, the survival of the organizations depends on the correct management, security and confidentiality of the information. In this paper, we are using the Model Driven Architecture (MDA) approach to represent logical model requirements for secure Temporal Data Warehouses (TDW). We use the Platform-Independent Model (PIM) which does not include information about specific platforms and technologies. Nowadays, the most crucial issue in MDA is the transformation between a PIM and Platform Specific Models PSM. Thus, OMG defines use the Query/View/Transformation (QVT) language, an approach for expressing these MDA transformations. This paper proposes a set of rules to transform PIM model for secure temporal data warehouse (TDW) to PSM model, we apply the QVT language to the development of a secure data warehouse by means of a case study.

Author 1: Marwa S Farhan
Author 2: Mohamed E. Marie
Author 3: Laila M. El-Fangary
Author 4: Yehia K. Helmy

Keywords: ETL; temporal data warehouse; Data warehouse security; MDA; QVT; PIM; PSM.

PDF

Paper 21: Web Anomaly Misuse Intrusion Detection Framework for SQL Injection Detection

Abstract: Databases at the background of e-commerce applications are vulnerable to SQL injection attack which is considered as one of the most dangerous web attacks. In this paper we propose a framework based on misuse and anomaly detection techniques to detect SQL injection attack. The main idea of this framework is to create a profile for legitimate database behavior extracted from applying association rules on XML file containing queries submitted from application to the database. As a second step in the detection process, the structure of the query under observation will be compared against the legitimate queries stored in the XML file thus minimizing false positive alarms.

Author 1: Shaimaa Ezzat Salama
Author 2: Mohamed I. Marie
Author 3: Laila M. El-Fangary
Author 4: Yehia K. Helmy

Keywords: SQL injection; association rule; anomaly detection; intrusion detection.

PDF

Paper 22: An Improved Grunwald-Letnikov Fractional Differential Mask for Image Texture Enhancement

Abstract: Texture plays an important role in identification of objects or regions of interest in an image. In order to enhance this textural information and overcome the limitations of the classical derivative operators a two-dimensional fractional differential operator is discussed, which is an improved version of the Grunwald-Letnikov (G-L) based fractional differential operator. A two dimensional-isotropic gradient operator mask based on G-L fractional differential is constructed. This nonlinear filter mask is implemented on various texture enriched digital images and enhancement of features of image is controlled by varying the intensity factor. In order to analyze the enhancement quantitatively, information entropy and average gradient are the parameters used. The results show that with improved version of Grunwald-Letnikov, fractional differential operator information entropy of image is improved by 0.5.

Author 1: Vishwadeep Garg
Author 2: Kulbir Singh

Keywords: texture enhancement; fractional differential; information entropy; average gradient.

PDF

Paper 23: A Comparative Study on Temporal Mobile Access Pattern Mining Methods

Abstract: Mobile users behavior patterns is one of the most critical issues that need to be explored in mobile agent systems. Recently the algorithms of discovering frequent mobile user’s behavior patterns have been studied extensively. Existing mining methods have proposed frequent mobile user's behavior patterns statistically based on requested services and location information. Therefore, other studies considered that the mobile user's dynamic behavior patterns are usually associated with temporal access patterns. In this paper, temporal mobile access pattern methods are studied and compared in terms of complexity and accuracy. The advantages and disadvantages of these methods will be summarized as well.

Author 1: Hanan Fahmy
Author 2: Maha A.Hana
Author 3: Yahia K. Helmy

Keywords: mobile mining; temporal data mining; mobile services; access pattern.

PDF

Paper 24: A Schema for Generating Update Semantics

Abstract: In this paper, we present a general schema for de ning new update semantics. This schema takes as input any basic logic programming semantics, such as the stable semantics, the p-stable semantics or the MMr semantics, and gives as output a new update semantics. The schema proposed is based on a concept called minimal generalized S models, where S is any of the logic programming semantics. Each update semantics is associated to an update operator. We also present some properties of these update operators.

Author 1: Jos´e Luis Carballido Carranza
Author 2: Claudia Zepeda
Author 3: Guillermo Flores

Keywords: Update semantics, Logic Programming semantics, update properties.

PDF

The Science and Information (SAI) Organization
BACK TO TOP

Computer Science Journal

  • About the Journal
  • Call for Papers
  • Submit Paper
  • Indexing

Our Conferences

  • Computing Conference
  • Intelligent Systems Conference
  • Future Technologies Conference
  • Communication Conference

Help & Support

  • Contact Us
  • About Us
  • Terms and Conditions
  • Privacy Policy

© The Science and Information (SAI) Organization Limited. All rights reserved. Registered in England and Wales. Company Number 8933205. thesai.org