The Science and Information (SAI) Organization
  • Home
  • About Us
  • Journals
  • Conferences
  • Contact Us

Publication Links

  • IJACSA
  • Author Guidelines
  • Publication Policies
  • Digital Archiving Policy
  • Promote your Publication
  • Metadata Harvesting (OAI2)

IJACSA

  • About the Journal
  • Call for Papers
  • Editorial Board
  • Author Guidelines
  • Submit your Paper
  • Current Issue
  • Archives
  • Indexing
  • Fees/ APC
  • Reviewers
  • Apply as a Reviewer

IJARAI

  • About the Journal
  • Archives
  • Indexing & Archiving

Special Issues

  • Home
  • Archives
  • Proposals
  • Guest Editors
  • SUSAI-EE 2025
  • ICONS-BA 2025
  • IoT-BLOCK 2025

Future of Information and Communication Conference (FICC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Computing Conference

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Intelligent Systems Conference (IntelliSys)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Future Technologies Conference (FTC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact
  • Home
  • Call for Papers
  • Editorial Board
  • Guidelines
  • Submit
  • Current Issue
  • Archives
  • Indexing
  • Fees
  • Reviewers
  • Subscribe

IJACSA Volume 4 Issue 3

Copyright Statement: This is an open access publication licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.

View Full Issue

Paper 1: Sensitivity Analysis and Validation of Refractive Index Estimation Method with Ground Based Atmospheric Polarized Radiance Measurement Data

Abstract: Sensitivity analysis and validation of the proposed refractive index estimation method with ground based atmospheric polarized radiance measurement data is conducted. Through the sensitivity analysis, it is found that Degree of Polarization: DP is highly dependent upon surface reflectance followed by imaginary and real part of refractive index and Junge parameter. DP at 550nm is greater than that at 870nm slightly. DP is decreased in accordance with increasing of real part and is increased with increasing of imaginary part while DP is increased with increasing of Junge parameter. It is also found that the peak of DP is appeared not only 90 degree of scattering angle but also at around 150 degree, in particular, when aerosol scattering is dominant. By using the aforementioned characteristics, it may be concluded that it is possible to estimate refractive index with ground based polarized radiance measurements

Author 1: Kohei Arai

Keywords: solar irradiance; refractive index; atmospheric polarized radiance

PDF

Paper 2: Vicarious Calibration Based Cross Calibration of Solar Reflective Channels of Radiometers Onboard Remote Sensing Satellite and Evaluation of Cross Calibration Accuracy through Band-to-Band Data Comparisons

Abstract: Accuracy evaluation of cross calibration through band-to-band data comparison for visible and near infrared radiometers which onboard earth observation satellites is conducted. The conventional cross calibration for visible to near infrared radiometers onboard earth observation satellites is conducted through comparisons of band-to-band data of which spectral response functions are overlapped mostly. There are the following major error sources due to observation time difference, spectral response function difference in conjunction of surface reflectance and atmospheric optical depth, observation area difference. These error sources are assessed with dataset acquired through ground measurements of surface reflectance and optical depth. Then the accuracy of the conventional cross calibration is evaluated with vicarious calibration data. The results show that cross calibration accuracy can be done more precisely if the influences due to the aforementioned three major error sources are taken into account.

Author 1: Kohei Arai

Keywords: vicarious calibration; cross calibration; visible to near infrared radiometer; earth observation satellite; remote sensing; radiative transfer equation;

PDF

Paper 3: Interactive Application Development Policy Object 3D Virtual Tour History Pacitan District based Multimedia

Abstract: Pacitan has a wide range of tourism activity. One of the tourism district is Pacitan historical attractions. These objects have a history tour of the educational values, history and culture, which must be maintained and preserved as one tourism asset Kabupeten Pacitan. But the history of the current tour the rarely visited and some of the students also do not understand the history of each of these historical attractions. Hence made a information media of 3D virtual interactive applications Pacitan tour history in the form of interactive CD applications. The purpose of the creation of interactive applications is to introduce Pacitan history tours to students and the community. Creating interactive information media that can provide an overview of the history of the existing tourist sites in Pacitan The benefits of this research is the students and the public will get to know the history of historical attractions Pacitan. As a media introduction of historical attractions and as a medium of information to preserve the historical sights. Band is used in the manufacturing methods Applications 3D Virtual Interactive Attractions: History-Based Multimedia Pacitan authors used the method library, observation and interviews. Design using 3ds Max 2010, Adobe Director 11.5, Adobe Photoshop CS3 and Corel Draw. The results of this research is the creation of media interakif information that can provide knowledge about the history of Pacitan.

Author 1: Muga Linggar Famukhit
Author 2: Maryono
Author 3: Lies Yulianto
Author 4: Bambang Eka Purnama

Keywords: Interactive 3D Virtual Application Development Object-Based Tourism Pacitan History Multimedia

PDF

Paper 4: Spatial-Temporal Variations of Turbidity and Ocean Current Velocity of the Ariake Sea Area, Kyushu, Japan Through Regression Analysis with Remote Sensing Satellite Data

Abstract: Regression analysis based method for turbidity and ocean current velocity estimation with remote sensing satellite data is proposed. Through regressive analysis with MODIS data and measured data of turbidity and ocean current velocity, regressive equation which allows estimation of turbidity and ocean current velocity is obtained. With the regressive equation as well as long term MODIS data, turbidity and ocean current velocity trends in Ariake Sea area are clarified. It is also confirmed that the negative correlation between ocean current velocity and turbidity.

Author 1: Kohei Arai
Author 2: Yuichi Sarusawa

Keywords: turbidity; ocean current; remote sensing satellite; regressive analysis

PDF

Paper 5: Transmission Control for Fast Recovery of Rateless Codes

Abstract: Luby Transform (LT) codes are more important in communication applications due to the characteristics of fast encoding/decoding process, and low complexity. However, LT codes are optimal only when the number of input symbols is close to infinity. Some researches modified the degree distribution of LT codes to make LT codes suitable for short symbol length. In this article, we propose an optimal coding algorithm to recover all of the encoded symbols for LT codes quickly. The proposed algorithm observes the coding status of each client and increases the coding performance by changing the transmission sequence of low-degree and high-degree encoding packets. Simulation results show that the resulting decoding overhead of our algorithm are lower than the traditional LT codes, and our algorithm is very appropriate to server various clients in the broadcasting channel environment.

Author 1: Jau-Wu Huang
Author 2: Kai-Chao Yang
Author 3: Han-Yu Hsieh
Author 4: Jia-Shung Wang

Keywords: LT codes; broadcasting channel; degree distribution

PDF

Paper 6: A Project Based CS/IS-1 Course with an Active Learning Environment

Abstract: High level programming languages use system defined data types and the user defined data types in computations. We have developed a project-based CS/IS-1 course to substitute the traditional lecture based classroom to help students design and use at least two user defined data types in their computations to solve real world problems. Abstract data types and basic programming constructs are introduced efficiently to the students in an active learning environment using games. To assess and evaluate the changes made we distributed the course module among our students and other instructors. This paper describes our experience in developing the project based active learning environment.

Author 1: Dr. Suvineetha Herath
Author 2: Dr. Ajantha Herath
Author 3: Mr. Mohammed A.R. Siddiqui
Author 4: Mr. Khuzaima AH. El-Jallad

Keywords: I/O; arithmetic expressions; if-else and switch conditional operations; for-while iterative computation; inheritance; polymorphism; recursion; searching and sorting algorithms; IDE.

PDF

Paper 7: Quadrant Based WSN Routing Technique By Shifting Of Origin

Abstract: A sensor is a miniaturized, low powered (basically battery powered), limited storage device which can sense the natural phenomenon or things and convert it into electrical energy or vice versa using transduction process. A Wireless Sensor Network (WSN) is such a wireless network built using sensors. The sensors communicate with each other’s using wireless medium. They can be deployed in such an environment; inaccessible to human or difficult to reach. Basically there is a vast application on automated world such as robotics, avionics, oceanographic study, space, satellites etc. The routing of a packet from a source node to a destination should be efficient in such a way that must be efficient in case of energy, communication overhead, less intermediate hops. The scheme will help to route the packet with a lesser intermediate nodes as the neighbors are being selected based on their Quadrant position.

Author 1: Nandan Banerji
Author 2: Uttam Kumar Kundu
Author 3: Pulak Majumder
Author 4: Debabrata Sarddar

Keywords: component; WSN; Quardent; Packet; Hops

PDF

Paper 8: Resolution of Unsteady Navier-stokes Equations with the C a,b Boundary condition

Abstract: in this work, we introduce the unsteady incompressible Navier-Stokes equations with a new boundary condition, generalizes the Dirichlet and the Neumann conditions. Then we derive an adequate variational formulation of time-dependent Navier- Stokes equations. We then prove the existence theorem and a uniqueness result. A Mixed finite-element discretization is used to generate the nonlinear system corresponding to the Navier-Stokes equations. The solution of the linearized system is carried out using the GMRES method. In order to evaluate the performance of the method, the numerical results are compared with others coming from commercial code like Adina system.

Author 1: Jaouad EL-Mekkaoui
Author 2: Ahmed Elkhalfi
Author 3: Abdeslam Elakkad

Keywords: Unsteady Navier-Stokes Equations; Mixed Finite Element Method; C_(a,b,c) boundary condition; Adina system.

PDF

Paper 9: An Overview of Recent Machine Learning Strategies in Data Mining

Abstract: Most of the existing classification techniques concentrate on learning the datasets as a single similar unit, in spite of so many differentiating attributes and complexities involved. However, traditional classification techniques, require to analysis the dataset prior to learning and for not doing so they loss their performance in terms of accuracy and AUC. To this end, many of the machine learning problems can be very easily solved just by careful observing human learning and training nature and then mimic the same in the machine learning. This paper presents an updated literature survey of current and novel machine learning strategies inducing models efficiently for supervised and unsupervised learning in data mining.

Author 1: Bhanu Prakash Battula
Author 2: Dr. R. Satya Prasad

Keywords: Data mining; classification; supervised learning; unsupervised learning; learning strategies.

PDF

Paper 10: Design of Semi-Adaptive 190-200 KHz Digital Band Pass Filters for SAR Applications

Abstract: Technologies have advanced rapidly in the field of digital signal processing due to advances made in high speed, low cost digital integrated chips. These technologies have further stimulated ever increasing use of signal representation in digital form for purposes of transmission, measurement, control and storage. Design of digital filters especially adaptive or semi adaptive is the necessity of the hour for SAR applications. The aim of this research work is to design and performance evaluation of 380-400 KHz Bartlett, Blackman and Chebyshev digital semi adaptive filters. For this work XILINX and MATLAB softwares were used for the design. As pert of practical research work these designs were translated using FPGA hardware SPARTAN-3E kit. These were optimized, analyzed, compared and evaluated keeping the sampling frequency at 5 MHz for 64 order. Both these filters designed using software and hardware were tested by passing a sinusoidal test signal of 381 KHz along with noise and the filtered output signals are presented.

Author 1: P Yadav
Author 2: A Khare
Author 3: K Parandham Gowd

Keywords: Digital filter; XILINX and MATLAB softwares; Field Programmable Gate Arrays (FPGA); SPARTAN-3E; DSP Chips.

PDF

Paper 11: Collaborative Learning Skills in Multi-touch Tables for UML Software Design

Abstract: The use of Multi-touch interfaces for collaborative learning has received significant attention. Their ability to synchronously accommodate multiple users is an advantage in co-located collaborative design tasks. This paper explores the Multi-touch interface’s potential in collaborative Unified Modeling Language diagramming by comparing it to a PC-based tool, looking at the Collaborative Learning Skills and amount of physical interactions in both conditions. The results show that even though participants talked more in the PC-based condition, the use of the Multi-touch table increased the amount of physical interactions, and encouraged the “Creative Conflict” skills amongst the team members.

Author 1: Mohammed Basheri
Author 2: Malcolm Munro
Author 3: Liz Burd
Author 4: Nilufar Baghaei

Keywords: Collaborative Design; Multi-touch Table; PC-based; Collaborative Learning Skills

PDF

Paper 13: Interference Aware Channel Assignment Scheme in Multichannel Wireless Mesh Networks

Abstract: Wireless mesh networks (WMNs) are gaining significant attention to provide wireless broadband service. Nodes in a wireless mesh network can communicate with each other directly or through one or more intermediate nodes. Because of multi-hop transmissions with multiple contending and compet¬ing channels, performance of wireless mesh networks decreases. Supporting high performance is an important challenge in multi-hop mesh networks. Nassiri et al. proposed a Molecular MAC protocol for autonomic assignment and use of multiple channels to improve network performance. In the Molecular MAC protocol, nodes are either nuclei or electrons in an atom. Neighboring atoms use orthogonal channels to operate in parallel data transmissions. Each nucleus selects an idle channel that is not currently being occupied by its neighboring atoms with the assistance from electrons in the same atom. However, this protocol has the following drawback; since a nucleus allocates a channel with help from the electrons in its own transmission range, it is not able to recognize the existence of those atoms in the interference range. Therefore, allocating the same channel to neighboring atoms results in the deterioration of network performance. In order to resolve this problem, we propose a channel allocation scheme with the interference issue taken into account. Based on various simulation results, the proposed scheme was verified that different channels could be allocated to those neighboring atoms in the interference range.

Author 1: Sunmyeng Kim

Keywords: interference; channel assignment; multichannel; mesh network

PDF

Paper 14: Robust Facial Expression Recognition via Sparse Representation and Multiple Gabor filters

Abstract: Facial expressions recognition plays important role in human communication. It has become one of the most challenging tasks in the pattern recognition field. It has many applications such as: human computer interaction, video surveillance, forensic applications, criminal investigations, and in many other fields. In this paper we propose a method for facial expression recognition (FER). This method provides new insights into two issues in FER: feature extraction and robustness. For feature extraction we are using sparse representation approach after applying multiple Gabor filter and then using support vector machine (SVM) as classifier. We conduct extensive experiments on standard facial expressions database to verify the performance of proposed method. And we compare the result with other approach.

Author 1: Rania Salah El-Sayed
Author 2: Prof.Dr. Ahmed El Kholy
Author 3: Prof.Dr. Mohamed Youssri El-Nahas

Keywords: Facial expression recognition (FER); L1-minimization; sparse representation; Gabor filters; support vector machine (SVM).

PDF

Paper 15: New Technique for Suppression Four-Wave Mixing Effects in SAC-OCDMA Networks

Abstract: A new technique invented for suppressing the FWM in SAC-OCDMA systems based on adding idle code at the sideband of the code construction to generate the virtual FWM power at the sideband of the signal, and then by subtracting these virtual FWM power from the original FWM power in the system and filtering the data part at the channel. This technique is applied for both SAC codes, Random Diagonal Code (RD) and Multi Diagonal Code (MD). Moreover, in terms of cost, the reported technique is considered a cost-effective as the LED light source is used to generate the sideband codes. The results showed that the FWM reduced approximately 25 dBm after using the technique. For example, in the RD code the FWM power at 40km fiber length and input power is 15 dBm using the SMF fiber type is approximately -55 dBm before using the technique, after using the technique at the same values of parameters the FWM power is approximately -90dBm. In other words, at the MD code the FWM power before using the technique is approximately -61 dBm, the same parameters values, however after using our technique the value of the FWM power is approximately -81dBm. However, These results gave impact on the Bit Error Rate (BER) also, for example the value of BER in the RD code at the input power -10dBm and 35km fiber length before using the technique is 1.6×10-23 and after using the technique the value of BER will become 4.05×10-28. In addition at the MD code the BER value before using the technique is 9.4×10-22 and after using the technique the value of BER is 7.4×10-31.

Author 1: Ibrahim Fadhil Radhi
Author 2: S. A. Aljunid
Author 3: Hilal A. Fadhil
Author 4: Thanaa Hussein Abd

Keywords: Optical code division multiple access (OCDMA); Spectral amplitude coding (SAC); Multi diagonal (MD); Random Diagonal (RD); Four-Wave Mixing (FWM); Light Emitting Diode (LED).)

PDF

Paper 16: Selection of Eigenvectors for Face Recognition

Abstract: Face recognition has advantages over other biometric methods. Principal Component Analysis (PCA) has been widely used for the face recognition algorithm. PCA has limitations such as poor discriminatory power and large computational load. Due to these limitations of the existing PCA based approach, we used a method of applying PCA on wavelet subband of the face image and two methods are proposed to select best of the eigenvectors for recognition. The proposed methods select important eigenvectors using genetic algorithm and entropy of eigenvectors. Results show that compared to traditional method of selecting top eigenvectors, proposed method gives better results with less number of eigenvectors.

Author 1: Manisha Satone
Author 2: G.K.Kharate

Keywords: face recognition; PCA; wavelet transform; genetic algorithm

PDF

Paper 17: Sentiment Analyzer for Arabic Comments System

Abstract: Today, the number of users of social network is increasing. Millions of users share opinions on different aspects of life every day. Therefore social network are rich sources of data for opinion mining and sentiment analysis. Also users have become more interested in following news pages on Facebook. Several posts; political for example, have thousands of users’ comments that agree/disagree with the post content. Such comments can be a good indicator for the community opinion about the post content. For politicians, marketers, decision makers …, it is required to make sentiment analysis to know the percentage of users agree, disagree and neutral respect to a post. This raised the need to analyze theusers’ comments in Facebook. We focused on Arabic Facebook news pages for the task of sentiment analysis. We developed a corpus for sentiment analysis and opinion mining purposes. Then, we used different machine learning algorithms – decision tree, support vector machines, and naive bayes - to develop sentiment analyzer. The performance of the system using each technique was evaluated and compared with others.

Author 1: Alaa El-Dine Ali Hamouda
Author 2: Fatma El-zahraa El-taher

Keywords: Analysis for Arabic comments; machine learning algorithms; sentiment analysis; opinion mining

PDF

Paper 18: Routing Discovery Algorithm Using Parallel Chase Packet

Abstract: On demand routing protocols for ad hoc networks such as Ad Hoc On Demand Distance Vector (AODV) initiate a route discovery process when a route is needed by flooding the network with a route request packet. The route discovery process in such protocols depends on a simple flooding as a broadcast technique due to its simplicity. Simple flooding results in packet congestion, route request overhead and excessive collisions, namely broadcast storm problem. A number of routing techniques have been proposed to control the simple flooding technique. Ideally, the broadcast of route request or the route discovery process must be stopped as soon as the destination node is found. This will free the network from many redundant packets that may cause network collision and contention. In this paper, chasing packet technique is used with standard AODV routing protocol to end the fulfilled route requests. The chase packet is initiated by the source node and is broadcasted in parallel with route request packet. As soon as the destination is found the chase packet starts its work by trying to catch and discard the route request in early stages before it broadcasts further in the network. Performance evaluation is conducted using simulation to investigate the performance of the proposed scheme against the existing approach that uses chase packet technique such as Traffic Locality Route Discovery Algorithm with Chase (TLRDA-C). Results reveal that the proposed scheme minimizes end-to-end packet delays and achieves low routing request overhead.

Author 1: Muneer Bani Yassein
Author 2: Yaser M. Khamayseh
Author 3: Amera Al-Ameri
Author 4: Wail E. Mardini

Keywords: MANET; Chase Packets; AODV; Broadcast Storm Problem.

PDF

Paper 19: Simulation of a WiMAX network to evaluate the performance of MAC IEEE 802.16 during the IR phase of Network Entry and Initialization

Abstract: Pervasive Computing is also called as Ubiquitous Computing, which means “being present everywhere at once” or “constantly encountered”. The main idea behind making these pervasive computing systems is that these systems improve living by performing computations on their own, without having to be monitored by anyone. These systems are targeted to become invisible to the user i.e., they perform their tasks without the user’s knowledge. To achieve this environment, the underlying requirement is a Network. One of the biggest constraints in achieving this environment is the “Last Mile” problem. It refers to the last leg of delivering connectivity from a communications provider to a customer. In recent years there has been increasing interest shown in wireless technologies for subscriber access, as an alternative to traditional twisted-pair local loop. WiMAX, Worldwide Interoperability for Microwave Access, is a Telecommunications technology that provides wireless transmission of data and is based on the IEEE 802.16 standard (also called Broadband Wireless Access). 802.16 uses paired radio channels Up Link Channel (UL) and Down Link Channel (DL) for establishing a communication between Base Station (BS) and Subscriber Station (SS). When a SS wants to establish connectivity with a BS it goes through the Network Entry and Initialization procedure of which Initial Ranging (IR) is a very important part. IR is the process of acquiring the correct timing offset and power adjustments such that the SS’s transmissions are aligned to maintain the UL connection with the BS. All the SS’s of a BS will compete for the contention slots for their network entry. Whenever the SS has to transmit the request packets it performs the Truncated Binary Exponential Backoff procedure. This method is the contention resolution procedure used in IEEE 802.16 networks. Our focus here was to simulate a WiMAX network so as to evaluate the performance of MAC IEEE 802.16 during the IR phase of Network Entry and Initialization. We have used Network Simulator-2 (NS-2) for our simulation purposes. We are using WiMAX “patch” which simulates the PHY and the MAC features of a WiMAX network. We have evaluated the performance of MAC IEEE 802.16 for various topologies.

Author 1: Namratha M
Author 2: Pradeep
Author 3: Manu G V

Keywords: Backoff delay; Circular topology; Linear topology; Markov Model; Pervasive computing; Ubiquitous computing; WiMAX

PDF

Paper 20: Joint Operation in Public Key Cryptography

Abstract: We believe that there is no real data protection without our own tools. Therefore, our permanent aim is to have more of our own codes. In order to achieve that, it is necessary that a lot of young researchers become interested in cryptography. We believe that the encoding of cryptographic algorithms is an important step in that direction, and it is the main reason why in this paper we present a software implementation of finding the inverse element, the operation which is essentially related to both ECC (Elliptic Curve Cryptography) and the RSA schemes of digital signature.

Author 1: Dragan Vidakovic
Author 2: Olivera Nikolic
Author 3: Jelena Kaljevic
Author 4: Dusko Parezanovic

Keywords: Public-key cryptography; RSA & ECC Digital Signature; Inverse element; Code

PDF

Paper 21: Diagnosing Learning Disabilities in a Special Education By an Intelligent Agent Based System

Abstract: The presented paper provides an intelligent agent based classification system for diagnosing and evaluation of learning disabilities with special education students. It provides pedagogy psychology profiles for those students and offer solution strategies with the best educational activities. It provides tools that allow class teachers to discuss psycho functions and basic skills for learning skills, then, performs psycho pedagogy evaluation by comprising a series of strategies in a semantic network knowledge base. The system’s agent performs its classification of student’s disabilities based on its past experience that it got from the exemplars that were classified by expert and acquired in its knowledge base.

Author 1: Khaled Nasser elSayed

Keywords: Intelligent Agent; Learning Disabilities; Special Education; Semantic Network; Psych Pedagogy Evaluation; Exemplar Based Classification

PDF

Paper 22: A Fresnelet-Based Encryption of Medical Images using Arnold Transform

Abstract: Medical images are commonly stored in digital media and transmitted via Internet for certain uses. If a medical information image alters, this can lead to a wrong diagnosis which may create a serious health problem. Moreover, medical images in digital form can easily be modified by wiping off or adding small pieces of information intentionally for certain illegal purposes. Hence, the reliability of medical images is an important criterion in a hospital information system. In this paper, the Fresnelet transform is employed along with appropriate handling of the Arnold transform and the discrete cosine transform to provide secure distribution of medical images. This method presents a new data hiding system in which steganography and cryptography are used to prevent unauthorized data access. The experimental results exhibit high imperceptibility for embedded images and significant encryption of information images.

Author 1: Muhammad Nazeer
Author 2: Dai-Gyoung Kim
Author 3: Bibi Nargis
Author 4: Yasir Mehmood Malik

Keywords: Fresnelet transform; wavelet transform; Arnold transform, data hiding; and image encryption

PDF

Paper 23: A New Type Method for the Structured Variational Inequalities Problem

Abstract: In this paper, we present an algorithm for solving the structured variational inequality problem, and prove the global convergence of the new method without carrying out any line search technique, and the global R-convergence rate are also given under the suitable conditions.

Author 1: Chengjiang Yin

Keywords: structured variational inequality problem; algorithm; globally convergent; R-linear convergent

PDF

Paper 24: A Posteriori Error Estimator for Mixed Approximation of the Navier-Stokes Equations with the Boundary Condition

Abstract: In this paper, we introduce the Navier-Stokes equations with a new boundary condition. In this context, we show the existence and uniqueness of the solution of the weak formulation associated with the proposed problem. To solve this latter, we use the discretization by mixed finite element method. In addition, two types of a posteriori error indicator are introduced and are shown to give global error estimates that are equivalent to the true error. In order to evaluate the performance of the method, the numerical results are compared with some previously published works and with others coming from commercial code like ADINA system.

Author 1: J. EL MEKKAOUI
Author 2: M A. BENNANI
Author 3: A.ELKHALFI
Author 4: A. ELAKKAD

Keywords: Navier-Stokes Equations; boundary condition; Mixed Finite element method; Residual Error Estimator;

PDF

Paper 25: Mitigating Cyber Identity Fraud using Advanced Multi Anti-Phishing Technique

Abstract: Developing Countries are gradually transiting from cash to an electronic based economy by virtue of cashless policy implementation. With this development, cyber criminals and hackers who hitherto attacked businesses and individuals across the Atlantic now see this development as a new venture for their criminal acts and are thus re-directing their energies towards exploiting possible loopholes in the electronic payment system in order to perpetuate fraud. In this paper, we proposed an enhanced approach to detecting phishing attempts and preventing unauthorized online banking withdrawal and transfer. We employed the use of Semantics Content Analysis, Earth Mover Distance and Biometric Authentication with finger print to construct a model. We demonstrated the efficacy of the implemented model with the experiments conducted, a good and considerable result was achieved.

Author 1: Yusuf Simon Enoch
Author 2: Adebayo Kolawole John
Author 3: Adetula Emmanuel Olumuyiwa

Keywords: Security; authentication; attack; Cybercrime; Identify theft

PDF

Paper 26: A New Viewpoint for Mining Frequent Patterns

Abstract: According to the traditional viewpoint of Data mining, transactions are accumulated over a long period of time (in years) in order to find out the frequent patterns associated with a given threshold of support, and then they are applied to practice of business as important experience for the next business processes. From the point of view, many algorithms have been proposed to exploit frequent patterns. However, the huge number of transactions accumulated for a long time and having to handle all the transactions at once are still challenges for the existing algorithms. In addition, today, new characteristics of the business market and the regular changes of business database with too large frequency of added-deleted-altered operations are demanding a new algorithm mining frequent patterns to meet the above challenges. This article proposes a new perspective in the field of mining frequent patterns: accumulating frequent patterns along with a mathematical model and algorithms to solve existing challenges.

Author 1: Thanh-Trung Nguyen
Author 2: Phi-Khu Nguyen

Keywords: accumulating frequent patterns; data mining; frequent pattern; horizontal parallelization; representative set; vertical parallelization

PDF

Paper 27: Pilot Study: The Use of Electroencephalogram to Measure Attentiveness towards Short Training Videos

Abstract: Universities, schools, and training centers are seeking to improve their computer-based [3] and distance learning classes through the addition of short training videos, often referred to as podcasts [4]. As distance learning and computer based training become more popular, it is of great interest to measure if students are attentive to recorded lessons and short training videos. The proposed research presents a novel approach to this issue. Signal processing of electroencephalogram (EEG) has proven useful in measuring attentiveness in a variety of applications such as vehicle operation and listening to sonar [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15]. Additionally, studies have shown that EEG data can be correlated to the ability of participants to remember television commercials days after they have seen them [16]. Electrical engineering presents a possible solution with recent advances in the use of biometric signal analysis for the detection of affective (emotional) response [17] [18] [19] [20] [21] [22] [23] [24] [25] [26] [27]. Despite the wealth of literature on the use of EEG to determine attentiveness in a variety of applications, the use of EEG for the detection of attentiveness towards short training videos has not been studied, nor is there a great deal of consistency with regard to specific methods that would imply a single method for this new application. Indeed, there is great variety in EEG signal processing and machine learning methods described in the literature cited above and in other literature [28] [29] [30] [31] [32] [33] [34]. This paper presents a novel method which uses EEG as an input to an automated system that measures a participant’s attentiveness while watching a short training video. This paper provides the results of a pilot study, including a structured comparison of signal processing and machine learning methods to find optimal solutions which can be extended to other applications.

Author 1: Paul Alton Nussbaum
Author 2: Rosalyn Hobson Hargraves

Keywords: Electroencephalogram; EEG; Signal Analysis; Machine Learning; Attentiveness; Training; Videos

PDF

Paper 28: Camera Mouse Including “Ctrl-Alt-Del” Key Operation Using Gaze, Blink, and Mouth Shape

Abstract: This paper presents camera mouse system with additional feature: "CTRL - ALT - DEL" key. The previous gaze-based camera mouse systems are only considering how to obtain gaze and making selection. We proposed gaze-based camera mouse with "CTRL - ALT - DEL" key. Infrared camera is put on top of display while user looking ahead. User gaze is estimated based on eye gaze and head pose. Blinking and mouth detections are used to create "CTR - ALT - DEL" key. Pupil knowledge is used to improve robustness of eye gaze estimation against different users. Also, Gabor filter is used to extract face features. Skin color information and face features are used to estimate head pose. The experiments of each method have done and the results show that all methods work perfectly. By implemented this system, troubleshooting of camera mouse can be done by user itself and makes camera mouse be more sophisticated.

Author 1: Kohei Arai
Author 2: Ronny Mardiyanto

Keywords: Camera Mouse; User Gaze; Combination keys function

PDF

Paper 29: Multi-resolution Analysis of Multi-spectral Palmprints using Hybrid Wavelets for Identification

Abstract: Palmprint is a relatively new physiological biometric used in identification systems due to its stable and unique characteristics. The vivid texture information of palmprint present at different resolutions offers abundant prospects in personal recognition. This paper describes a new method to authenticate individuals based on palmprint identification. In order to analyze the texture information at various resolutions, we introduce a new hybrid wavelet, which is generated using two or more component transforms incorporating both their properties. A unique property of this wavelet is its flexibility to vary the number of components at each level of resolution and hence can be made suitable for various applications. Multi-spectral palmprints have been identified using energy compaction of the hybrid wavelet transform coefficients. The scores generated for each set of palmprint images under red, green and blue illuminations are combined using score-level fusion using AND and OR operators. Comparatively low values of equal error rate and high security index have been obtained for all fusion techniques. The experimental results demonstrate the effectiveness and accuracy of the proposed method.

Author 1: Dr. H.B. Kekre
Author 2: Dr. Tanuja Sarode
Author 3: Rekha Vig

Keywords: Hand-based biometrics; Hybrid wavelet; Multi-resolution; Energy compaction, fusion;

PDF

Paper 30: Method for Psychological Status Estimation by Gaze Location Monitoring Using Eye-Based Human- Computer Interaction

Abstract: Method for psychological status estimation by gaze location monitoring using Eye-Based Human-Computer Interaction: EBHCI is proposed. Through the experiment with English book reading of e-learning content, relation between psychological status and the distance between the correct location of English sentence reading points and the corresponding location derived from EBHCI is clarified. Psych9ological status is estimated from peak alpha frequency derived from eeg signals. It is concluded that psychological status can be estimated with gaze location monitoring.

Author 1: Kohei Arai
Author 2: Ronny Mardiyanto

Keywords: psychological status; gaze estimation; computer input by human eyes only

PDF

Paper 31: A Survey of Environment and Demands Along with a Marketing Communications Plan for WatPutthabucha Market to Promote Agricultural Tourism through Main Media and Online Social Network Media

Abstract: This study was aimed to examine the current environment and the demands and to make a marketing communications plan for WatPuttabucha Market to promote agricultural tourism through main media and online social network media. Moreover, it was aimed to build up working experiences for research with communities near the campus through the integration of course instruction and community service. The data were collected in the second term of academic year 2012 between January and February 2013 in WatPuttabucha Market and nearby communities. There were 2 sampling groups as in King Mongkut’s University of Technology Thonburi students (50 persons) and WatPuttabucha Market and nearby community members (50 persons). In total, there were 100 persons for the survey. This collection was based on an accidental basis. According to the data concerning the environment, WatPuttabucha Market had 9 interesting shops for agricultural tourism and 4 major tourist attractions. As for the demands, it was found that 47 students (or 94%) would like WatPuttabucha Market to be open as a site for agricultural tourism mainly on Saturday and Sunday. 47 persons from WatPuttabucha Market and nearby communities (or 94%) also would like it to be open mainly on Saturday and Sunday. As for the communicative plan, it was found that there were 7 kinds of main media. There were 5 kinds of online social network media for check-in special events. The majority of students (mean score of 4.89 and standard deviation of 0.86) agreed with the integration of research in their Marketing Communication course because it allowed them to get more familiar with communities near the campus and recommended continuing this similar project for the next year.

Author 1: Kuntida Thamwipat
Author 2: Nakorn Thamwipat

Keywords: Environment; Marketing Communications Plan; Demands; Agricultural Tourism; Main Media; Online Social Network Media

PDF

Paper 32: Draft dynamic student learning in design and manufacturing of complex shape parts

Abstract: The contribution deals with the dynamic teaching of students through blended learning and teaching online distance teaching which can be considered nowadays to be a very effective and dynamic education of students. Content of the article is focused on the sphere of programming with CNC machines and use Cax systems for the production of a particular shape complex parts - shearing knife. The article presented also proposed effective teaching resources. The motivation for solution of this project is that dynamic education leads students to gaining experience and skills, individual identification of the issue, creativity, suggestion of problem solving variations. The achieved way of education and its confirmed and verified positive results can be applied for various target groups of students and their fields of study

Author 1: Ivana Kleinedlerová
Author 2: Peter Kleinedler
Author 3: Alexander Janác
Author 4: Ivan Buranský

Keywords: dynamic education blended learning; e-learning; CA systems.

PDF

Paper 33: Genetic algorithms to optimize base station sitting in WCDMA networks

Abstract: In UMTS network, radio planning cannot only be based on signal predictions, but it must also consider the traffic distribution, the power control mechanism as well as the power limits and the signal quality constraints. The present work aims to optimize the number of base stations used in the WCDMA radio network. In this paper, we propose a mathematical programming model for optimizing the base station locations considered for the uplink (mobile to BS) direction, and which considers the typical power control mechanism of WCDMA. The two contrasting objectives of the optimization process are the traffic coverage maximization and the installation costs minimization. A mimetic algorithm (AM) (genetic algorithm+ a local search) is proposed to find good approximate solutions of this NP hard problem. The Numerical results are obtained for reels instances, and generated by using classical propagation models.

Author 1: Najat Erradi
Author 2: Noura Aknin
Author 3: Fadoua Thami Alami
Author 4: Ahmed El Moussaoui

Keywords: Ukumura-Hata model; UMTS; W-CDMA; Genetic Algorithms.

PDF

Paper 34: Algorithm to Match Ontologies on the Semantic Web

Abstract: It has been recognized that semantic data and knowledge extraction will significantly improve the capability of natural language interfaces to the semantic search engine. Semantic Web technology offers a vast scale of sharing and integration of distributed data sources by combining information easily. This will enable the user to find the information easily and efficiently. In this paper, we will explore some issues of developing algorithms for the Semantic Web. The first one to build the semantic contextual meaning by scanning the text, extract knowledge and automatically infer the meaning of the information from text that contains the search words in any sentence and correlate with hierarchical classes defined in the Ontology as a result of input resources. The second to discover the hierarchical relationships among terms (i.e. discover the semantic relations across hierarchical classifications). The proposed algorithm will be relying on a number of resources including Ontology and WordNet.

Author 1: Alaa Qassim Al-Namiy

Keywords: Semantic Web; Ontology matching; WordNet; Information retrieval; web service

PDF

Paper 35: Energy-Aware Fragmented Memory Architecture with a Switching Power Supply for Sensor Nodes

Abstract: The basic sensor node architecture in a wireless sensor network contains sensing, transceiver, processing and memory units along with the power supply module. Because the basic sensor network application nature is surveillance, these networks may be deployed in a remote environment without human intervention. The sensor nodes are also battery-powered tiny devices with limited memory capacity. Because of these sensor node limitations, the architecture can be modified to efficiently utilise energy during memory accesses by dividing the memory into multiple banks and including a memory switching controller unit and a power switching module. This modification conserves energy, so power can be supplied only to the bank or part of the memory being accessed instead of powering the entire memory module, thus leading to efficient energy consumption. Simulations have been performed on fragmented memory architecture by incorporating the M/M/1 queuing model. When the packets get queued up, energy utilisation and a packet drop at the sensor node is observed. The energy consumption is reduced by an average of 70%, and there is significantly less packet drop compared to the normal memory architecture. This leads to increase in node and network lifetime and prevents information loss

Author 1: Harish H Kenchannavar
Author 2: M.M.Math
Author 3: Umakant P.Kulkarni

Keywords: modified memory architecture; switching power supply; sensor node; energy conserve; idle energy

PDF

Paper 36: A novel optical network on chip design for future generation of multiprocessors system on chip

Abstract: The paper presents a novel Optical Network on Chip (ONoC) relying on the multi-level optical layer design paradigm and called “OMNoC”. The proposed ONoC relies on multi-level microring resonator allowing efficient light coupling between superposed waveguides. Such microring resonator avoids using waveguide crossing, which contribute to reduce propagation losses. Preliminary experimental results demonstrate the potential of multi-level optical layer for reducing power consumption and increasing scalability in the proposed ONoC.

Author 1: M. Channoufi
Author 2: P. Lecoy
Author 3: S. Le Beux
Author 4: R. Attia
Author 5: B. Delacressonniere

Keywords: 3D-Optical network on chip, multi-level optical layer, optical control.

PDF

Paper 37: Toward Evolution Strategies Application in Automatic Polyphonic Music Transcription using Electronic Synthesis

Abstract: We present in this paper a new approach for polyphonic music transcription using evolution strategies (ES). Automatic music transcription is a complex process that still remains an open challenge. Using an audio signal to be transcribed as target for our ES, information needed to generate a MIDI file can be extracted from this latter one. Many techniques presented in the literature at present exist and a few of them have applied evolutionary algorithms to address this problem in the context of considering it as a search space problem. However, ES have never been applied until now. The experiments showed that by using these machines learning tools, some shortcomings presented by other evolutionary algorithms based approaches for transcription can be solved. They include the computation cost and the time for convergence. As evolution strategies use self-adapting parameters, we show in this paper that by correctly tuning the value of its strategy parameter that controls the standard deviation, a fast convergence can be triggered toward the optima, which from the results performs the transcription of the music with good accuracy and in a short time. In the same context, the computation task is tackled using parallelization techniques thus reducing the computation time and the transcription time in the overall.

Author 1: Herve Kabamba Mbikayi

Keywords: evolution strategy; polyphonic music transcription; FFT; electronic synthesis; MIDI; notes; frequency; audio; signal; fundamental frequency; pitch detection; F0; chords; monophonic; contours

PDF

Paper 38: Hybrid Approach for Detection of Hard Exudates

Abstract: Diabetic Retinopathy is a severe and widely spread eye disease which can lead to blindness. Hence, early detection of Diabetic Retinopathy is a must. Hard Exudates are the primary sign of Diabetic Retinopathy. Early treatment of Diabetic Retinopathy is possible if we detect Hard Exudates at the earliest stage. The main concentration of this paper is to discuss techniques for efficient detection of Hard Exudates. The first technique, discusses Hard Exudates detection using mathematical morphology. The second technique, proposes a Hybrid Approach for Detection of Hard Exudates. This approach consists of three stages: preprocessing, clustering and post processing. In preprocessing stage, we resize the image and apply morphological dilation. The clustering stage applies Linde-Buzo-Gray and k-means algorithm to detect Hard Exudates. In post processing stage, we remove all unwanted feature components from the image to get accurate results. We evaluate the performance of the above mentioned techniques using the DIARETDB1 database which provides ground truth. The optimal results will be obtained when the number of clusters chosen is 8 in both of the clustering algorithms.

Author 1: Dr.H. B. Kekre
Author 2: Dr. Tanuja K. Sarode
Author 3: Ms. Tarannum Parkar

Keywords: Diabetic Retinopathy; Hard Exudates; Clustering; Mathematical Morphology

PDF

Paper 39: Extended Standard Hough Transform for Analytical Line Recognition

Abstract: This paper presents a new method which extends the Standard Hough Transform for the recognition of naive or standard line in a noisy picture. The proposed idea conserves the power of the Standard Hough Transform particularly a limited size of the parameter space and the recognition of vertical lines. The dual of a segment, and the dual of a pixel have been proposed to lead to a new definition of the preimage. Many alternatives of approximation could be established for the sinusoid curves of the dual of a pixel to get new algorithms of line recognition.

Author 1: Abdoulaye SERE
Author 2: Oumarou SIE
Author 3: Eric ANDRES

Keywords: hough; transform; recognition; discrete

PDF

Paper 40: k-Modulus Method for Image Transformation

Abstract: In this paper, we propose a new algorithm to make a novel spatial image transformation. The proposed approach aims to reduce the bit depth used for image storage. The basic technique for the proposed transformation is based of the modulus operator. The goal is to transform the whole image into multiples of predefined integer. The division of the whole image by that integer will guarantee that the new image surely less in size from the original image. The k-Modulus Method could not be used as a stand alone transform for image compression because of its high compression ratio. It could be used as a scheme embedded in other image processing fields especially compression. According to its high PSNR value, it could be amalgamated with other methods to facilitate the redundancy criterion.

Author 1: Firas A. Jassim

PDF

Paper 41: Analytical Solution of the Perturbed Oribt-Attitude Motion of a Charged Spacecraft in the Geomagnetic Field

Abstract: In this work we investigate the orbit-attitude perturbations of a rigid spacecraft due to the effects of several forces and torques. The spacecraft is assumed to be of a cylindrical shape and equipped with a charged screen with charge density s. Clearly the main force affecting the motion of the spacecraft is the gravitational force of the Earth with uniform spherical mass. The effect of oblate Earth up to J2 is considered as perturbation on both the orbit and attitude of the spacecraft, where the attitude of the spacecraft is acted upon by what is called gravity gradient torque. Another source of perturbation on the attitude of the spacecraft comes from the motion of the charged spacecraft in the geomagnetic field. This motion generates a force known as the Lorentz force which is the source of the Lorentz force torque influencing the rotational motion of the spacecraft. In this work we give an analytical treatment of the orbital-rotational dynamics of the spacecraft. We first use the definitions of Delaunay and Andoyer variables in order to formulate the Hamiltonian of the orbit-attitude motion under the effects of forces and torques of interest. Since the Lorentz force is a non-conservative force, a potential like function is introduced and added to the Hamiltonian. We solve the canonical equations of the Hamiltonian system by successive transformations using a technique proposed by Lie and modified by Deprit and Kamel to solve the problem. In this technique we make two successive transformations to eliminate the short and long periodic terms from the Hamiltonian.

Author 1: Hani M. Mohmmed
Author 2: Mostafa K. Ahmed
Author 3: Ashraf Owis
Author 4: Hany Dwidar

PDF

Paper 42: Automatic Skin Cancer Images Classification

Abstract: Early detection of skin cancer has the potential to reduce mortality and morbidity. This paper presents two hybrid techniques for the classification of the skin images to predict it if exists. The proposed hybrid techniques consists of three stages, namely, feature extraction, dimensionality reduction, and classification. In the first stage, we have obtained the features related with images using discrete wavelet transformation. In the second stage, the features of skin images have been reduced using principle component analysis to the more essential features. In the classification stage, two classifiers based on supervised machine learning have been developed. The first classifier based on feed forward back-propagation artificial neural network and the second classifier based on k-nearest neighbor. The classifiers have been used to classify subjects as normal or abnormal skin cancer images. A classification with a success of 95% and 97.5% has been obtained by the two proposed classifiers and respectively. This result shows that the proposed hybrid techniques are robust and effective.

Author 1: Mahmoud Elgamal

Keywords: Skin cancer images; wavelet transformation; principle component analysis; feed forward back-propagation network; knearest neighbor classification.

PDF

The Science and Information (SAI) Organization
BACK TO TOP

Computer Science Journal

  • About the Journal
  • Call for Papers
  • Submit Paper
  • Indexing

Our Conferences

  • Computing Conference
  • Intelligent Systems Conference
  • Future Technologies Conference
  • Communication Conference

Help & Support

  • Contact Us
  • About Us
  • Terms and Conditions
  • Privacy Policy

© The Science and Information (SAI) Organization Limited. All rights reserved. Registered in England and Wales. Company Number 8933205. thesai.org