The Science and Information (SAI) Organization
  • Home
  • About Us
  • Journals
  • Conferences
  • Contact Us

Publication Links

  • IJACSA
  • Author Guidelines
  • Publication Policies
  • Digital Archiving Policy
  • Promote your Publication
  • Metadata Harvesting (OAI2)

IJACSA

  • About the Journal
  • Call for Papers
  • Editorial Board
  • Author Guidelines
  • Submit your Paper
  • Current Issue
  • Archives
  • Indexing
  • Fees/ APC
  • Reviewers
  • Apply as a Reviewer

IJARAI

  • About the Journal
  • Archives
  • Indexing & Archiving

Special Issues

  • Home
  • Archives
  • Proposals
  • Guest Editors
  • SUSAI-EE 2025
  • ICONS-BA 2025
  • IoT-BLOCK 2025

Future of Information and Communication Conference (FICC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Computing Conference

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Intelligent Systems Conference (IntelliSys)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Future Technologies Conference (FTC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact
  • Home
  • Call for Papers
  • Editorial Board
  • Guidelines
  • Submit
  • Current Issue
  • Archives
  • Indexing
  • Fees
  • Reviewers
  • Subscribe

IJACSA Volume 5 Issue 3

Copyright Statement: This is an open access publication licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.

View Full Issue

Paper 1: Auditing Hybrid IT Environments

Abstract: This paper presents a personal approach of auditing the hybrid IT environments consisting in both on premise and on demand services and systems. The analysis is performed from both safety and profitability perspectives and it aims to offer to strategy, technical and business teams a representation of the value added by the cloud programme within the company’s portfolio. Starting from the importance of the IT Governance in the actual business environments, we presented in the first section the main principles that drive the technology strategy in order to maximize the value added by IT assets in the business products. Section two summarizes the frameworks leveraged by our approach in order to implement the safety and profitability computation algorithms described in the third section. The paper concludes with benefits of our personal frameworks and presents the future developments.

Author 1: Georgiana Mateescu
Author 2: Marius Vladescu

Keywords: audit cloud computing; cloud service safety; cloud governance

PDF

Paper 2: The Throughput Flow Constraint Theorem and its Applications

Abstract: The paper states and proves an important result related to the theory of flow networks with disturbed flows:“the throughput flow constraint in any network is always equal to the throughput flow constraint in its dual network”. After the failure or congestion of several edges in the network, the throughput flow constraint theorem provides the basis of a very efficient algorithm for determining the edge flows which correspond to the optimal throughput flow from sources to destinations which is the throughput flow achieved with the smallest amount of generation shedding from the sources. In the case where a failure of an edge causes a loss of the entire flow through the edge, the throughput flow constraint theorem permits the calculation of the new maximum throughput flow to be done in time, where m is the number of edges in the network.In this case, the new maximum throughput flow is calculated by inspecting the network only locally, in the vicinity of the failed edge, without inspecting the rest of the network. The superior average running time of the presented algorithm, makes it particularly suitable for decongesting overloaded transmission links of telecommunication networks, in real time.In the paper, it is also shown that the deliberate choking of flows along overloaded edges, leading to a generation of momentary excess and deficit flow, provides a very efficient mechanism for decongesting overloaded branches.

Author 1: Michael T. Todinov

Keywords: networks with disturbed flows; congestion; decongestion; maximum throughput flow; telecommunication networks

PDF

Paper 3: New Framework for Improving Big Data Analysis Using Mobile Agent

Abstract: the rising number of applications serving millions of users and dealing with terabytes of data need to a faster processing paradigms. Recently, there is growing enthusiasm for the notion of big data analysis. Big data analysis becomes a very important aspect for growth productivity, reliability and quality of services (QoS). Processing of big data using a powerful machine is not efficient solution. So, companies focused on using Hadoop software for big data analysis. This is because Hadoop designed to support parallel and distributed data processing. Hadoop provides a distributed file processing system that stores and processes a large scale of data. It enables a fault tolerant by replicating data on three or more machines to avoid data loss.Hadoop is based on client server model and used single master machine called NameNode. However, Hadoop has several drawbacks affecting on its performance and reliability against big data analysis. In this paper, a new framework is proposed to improve big data analysis and overcome specified drawbacks of Hadoop. These drawbacks are replication tasks, Centralized node and nodes failure. The proposed framework is called MapReduce Agent Mobility (MRAM). MRAM is developed by using mobile agent and MapReduce paradigm under Java Agent Development Framework (JADE).

Author 1: Youssef M. ESSA
Author 2: Gamal ATTIYA
Author 3: Ayman EL-SAYED

Keywords: Mobile Agent; JADE; Big Data Analysis; HDFS; Fault Tolerance

PDF

Paper 4: Distributed programming using AGAPIA

Abstract: As distributed applications became more commonplace and more sophisticated, new programming languages and models for distributed programming were created. The main scope of most of these languages was to simplify the process of development by a providing a higher expressivity. This paper presents another programming language for distributed computing named AGAPIA. Its main purpose is to provide an increased expressiveness while keeping the performance close to a core programming language. To demonstrate its capabilities the paper shows the implementations of some well-known patterns specific to distribute programming along with a comparison to the corresponding MPI implementation. A complete application is presented by combining a few patterns. By taking advantage of the transparent communication model and high level statements and patterns intended to simplify the development process, the implementation of distributed programs become modular, easier to write, in clear and closer to the original solution formulation.

Author 1: Ciprian I. Paduraru

Keywords: patterns; parallel; distributed; AGAPIA; fork; join; control; scan; wavefront; map; reduction; pipeline; scatter; decomposition; gather

PDF

Paper 5: Interventional Spasticity Management for Enhancing Patient – Physician Communications

Abstract: Stroke is the third most common cause of death in the Western world, behind heart disease and cancer, and accounts for over half of all neurologic admissions to community hospitals. Spasticity is commonly defined as excessive motor activity characterized by a velocity-dependent increase in tonic stretch reflexes. It is often associated with exaggerated tendon jerks, and is often accompanied by abnormal cutaneous and autonomic reflexes, muscle weakness, lack of dexterity, fatigability, and co-contraction of agonist and antagonist muscles. It is a common complication of central nervous system disorders, including stroke, traumatic brain injury, cerebral palsy, multiple sclerosis, anoxic brain injury, spinal cord injury, primary lateral sclerosis, and hereditary spastic hemiparesis. Leg muscle activation during locomotion is produced by spinal neuronal circuits within the spinal cord, the spinal pattern generator [central pattern generator (CPG)]. For the control of human locomotion, afferent information from a variety of sources within the visual, vestibular, and proprioceptive systems is utilized by the CPGs. Findings of this research can be applied to older adults in longitudinal home care who suffer spasticity caused by stroke.

Author 1: Chiyuri NAGAYAMA

Keywords: Electromyography; Spasticity; Internal Modeling;Viscoelasticity; Stroke Rehabilitation

PDF

Paper 6: A Web Mining Approach for Personalized E-Learning System

Abstract: The Web Mining plays a very important role for the E-learning systems. In personalized E-Learning system, user customize the learning environment based on personal choices. In a general search process ,a hyperlink which is having maximum number of hits will get displayed first . For making a personalized system history of every user need to be saved in the form of user logs. In this paper we present a architecture with the use of Web mining for Web personalization. The proposed system provides a new approach with combination of web usage mining, HITS algorithm and web content mining. It combines hits results on user logs and web page contents with a clustering algorithm called as Lingo clustering algorithm. This proposed system with combined approach gives a better performance than a usage based system. Further the results are computed according to matrices computed from previous and proposed method.

Author 1: Manasi Chakurkar
Author 2: Prof.Deepa Adiga

Keywords: Web usage mining; web content mining; web personalization; e-learning system, Lingo; HITS

PDF

Paper 7: Audio Content Classification Method Research Based on Two-step Strategy

Abstract: Audio content classification is an interesting and significant issue. Audio classification technique has two basic parts: audio feature extraction and classifier. In general the audio content classification method is firstly to identify the original audio into text, then use the identified text to classify. But the text recognition rate is not high, some words that good for classification are identified by mistake causing that the classification effect is not ideal. In order to solve these problems above, this paper proposes a new effective audio classification method based on two-step strategy. In the first step the features are extracted by using the improved mutual information and classified with Naïve Bayes classifier. After classification of the first step, an unreliable area is determined, and samples with features in this area go on to be classified with the second step. In the second step, textual features extracted with CHI statistic method are used to build a text feature space model. Then audio features containing MFCC and frame energy are combined together with the text features to build a new feature vector space model. Finally, the new feature vector space model is classified using Support Vector Machine (SVM) classifier. The experiments show that the two-step strategy classification method for audio classification achieves great classification performance with the accuracy rate of 97.2%.

Author 1: Sumei Liang
Author 2: Xinhua Fan

Keywords: Two-step Strategy; Audio classification; MFCC; Frame energy; Naive Byes; Support vector machine (SVM)

PDF

Paper 8: Open Vehicle Routing Problem by Ant Colony Optimization

Abstract: Vehicle routing problem (VRP) is real-world combinatorial optimization problem which determine the optimal route of a vehicle. Generally, toprovide the efficientvehicle serving to the customer through different services by visiting the number of cities or stops. The VRP follows the Travelling Salesman Problem (TSP), in which each of vehicle visiting a set of cities such that every city is visited by exactly one vehicle only once. This work proposes the Ant Colony Optimization (ACO)-TSP algorithm to eliminate the tour loop for Open Vehicle routing Problem (OVRP). A key aspect of this algorithm is to plan the routes of buses that must pick up and deliver the school students from various bus stops on time, especially in the case of far distance covered by the vehicle in a rural area and find out the efficient and safe vehicle route.

Author 1: Er. Gurpreet Singh
Author 2: Dr. Vijay Dhir

Keywords: Ant Colony Optimization (ACO); Vehicle routing Problem(VRP);Open Vehicle routing Problem(OVRP); Travelling Salesman Problem(TSP);Swarm Intelligence(SI)

PDF

Paper 9: Feasibility of automated detection of HONcode conformity for health-related websites

Abstract: In this paper, authors evaluate machine learning algorithms to detect the trustworthiness of a website according to HONcode criteria of conduct (detailed in paper). To derive a baseline, we evaluated a Naive Bayes algorithm, using single words as features. We compared the baseline algorithm’s performance to that of the same algorithm employing different feature types, and to the SVM algorithm. The results demonstrate that the most basic configuration (Naive Bayes, single word) could produce a 0.94 precision for “easy” HON criteria such as “Date”. Conversely, for more difficult HON criteria “Justifiability”, we obtained precision of 0.68 by adjusting the system parameters such as algorithm (SVM) and feature types (W2).

Author 1: Célia Boyer
Author 2: Ljiljana Dolamic

Keywords: internet content quality; health; machine learning

PDF

Paper 10: A Students Attendance System Using QR Code

Abstract: Smartphones are becoming more preferred companions to users than desktops or notebooks. Knowing that smartphones are most popular with users at the age around 26, using smartphones to speed up the process of taking attendance by university instructors would save lecturing time and hence enhance the educational process. This paper proposes a system that is based on a QR code, which is being displayed for students during or at the beginning of each lecture. The students will need to scan the code in order to confirm their attendance. The paper explains the high level implementation details of the proposed system. It also discusses how the system verifies student identity to eliminate false registrations.

Author 1: Fadi Masalha
Author 2: Nael Hirzallah

Keywords: Mobile Computing; Attendance System; Educational System; GPS

PDF

Paper 11: An autonomous intelligent gateway for wireless sensor network based on mobile node

Abstract: One of the recent tendencies for Wireless Sensor Networks (WSNs) that significantly increases their performance and functionality is the utilization of mobile nodes. This paper describes the software architecture of an intelligent autonomous gateway, designed to provide the necessary middleware between locally deployed sensor networks based on mobile node and a remote location. The gateway provides hierarchical networking, auto management of the mobile wsn (MWSN), alarm notification and SMS/Internet access capabilities with user authentication. Our architecture includes three multi agent system modules, an interface module, a management module and a treatment module. The management module consists of two agents, a control communication agent, and a learning agent. The control communication agent interacts with the interface module and the treatment module in order to decide which data mule can reach the target. Several factors such as battery status, coverage issues, and communication situations have been taken into consideration.

Author 1: Hajar Mansouri
Author 2: Fouad Moutaouakil
Author 3: Hicham Medromi

Keywords: Mobile Wireless Sensor Network; Multi Agent Systems; gateway; mobile nodes

PDF

Paper 12: Sample K-Means Clustering Method for Determining the Stage of Breast Cancer Malignancy Based on Cancer Size on Mammogram Image Basis

Abstract: Breast cancer is a disease that arises due to the growth of breast tissue cells that are not normal. The detection of breast cancer malignancy level / stage relies heavily on the results of the analysis of the doctor. To assist the analysis, this research aims to develop a software that can determine the stage of breast cancer based on the size of the cancerous tissue. Steps of the research consist of mammogram image acquisition, determining the ROI (Region of Interest), using Region growing segmentation method, measuring the area of suspected cancer, and determine the stage classification of the area on the mammogram image by using Sample K-Means Clustering method. Based on 33 malignant (abnormal) mammogram sample images taken from the mini mammography database of MIAS, the proposed method can detect stage of breast cancer is in malignant group.

Author 1: Karmilasari
Author 2: Suryarini Widodo
Author 3: Matrissya Hermita
Author 4: Nur Putri Agustiyani
Author 5: Yuhilza Hanum
Author 6: Lussiana ETP

Keywords: classification; staging; breast cancer; mammogram; k-means clustering

PDF

Paper 13: Bipolar Factor and Systems Analysis skills of Student Computing Professionals at University of Botswana, Gaborone.

Abstract: Temperamental suitability (personality traits) could be a factor to consider in career placement and professional development. It could also be an indicator of professional success or failure in any profession such as Systems Analysis and Design (SAD). However, there is not sufficient empirical evidence in support of the personality traits to which systems analysts and designers may be categorized. The objective of this study is to empirically investigate the main personality traits to which systems analysts and designers may belong, then propose a new approach to composing a personality matrix based on sound computational model. The study employed a quantitative research approach to measure the personality traits of 60 student systems analysts and designers using a human metric tool such as the Myers Briggs Type Indicator (MBTI) and some pre designed additional questionnaires. A mathematical model of the form a_(ij=ß_0+ß_1 x_(1j+ ) ß_2 x_(2j+ ) ß_3 x_(3j+ ) ß_4 x_(4j+ )…ß_n x_nj ) was employed in order to measure achievement in systems analysis and design examination. The Statistical Package for the Social Sciences (SPSS) was used to analyse the data. Using linear regression, the model was not significant, implying that achievement in SAD examination does not depend only on personality traits, motivation variables and study habit variables which were the independent variables. However, the R squared value indicated that these variables account for 52% variation in the dependent variable SAD score (achievement). The best achievers in the personality traits are ENFJ, ENTJ, ISFJ and INFJ all scoring 70% each. Therefore, the best achievers possess the personality traits of extroversion (E), iNtuition (N), Feeling (F), Judging (J), Thinking (T), Introversion (I), Sensing (S). Overall, the highest passes are students of the traits INFJ (11), INTJ (11 passes), ENTJ (10 passes), ENFJ (10 passes), ESFP (3passes), ISFJ (3passes), ISTJ (3 passes), ESFP (2 passes), ENFP (1), ISTP (1), and ISFP (1).

Author 1: Ezekiel U. Okike

Keywords: personality trait; systems analysts; academic achievement; bipolar matrix

PDF

Paper 14: A Machine Learning Tool for Weighted Regressions in Time, Discharge, and Season

Abstract: A new machine learning tool has been developed to classify water stations with similar water quality trends. The tool is based on the statistical method, Weighted Regressions in Time, Discharge, and Season (WRTDS), developed by the United States Geological Survey (USGS) to estimate daily concentrations of water constituents in rivers and streams based on continuous daily discharge data and discrete water quality samples collected at the same or nearby locations. WRTDS is based on parametric survival regressions using a jack-knife cross validation procedure that generates unbiased estimates of the prediction errors. One of the disadvantages of WRTDS is that it needs a large number of samples (n > 200) collected during at least two decades. In this article, the tool is used to evaluate the use of Boosted Regression Trees (BRT) as an alternative to the parametric survival regressions for water quality stations with a small number of samples. We describe the development of the machine learning tool as well as an evaluation comparison of the two methods, WRTDS and BRT. The purpose of the tool is to evaluate the reduction in variability of the estimates by clustering data from nearby stations with similar concentration and discharge characteristics. The results indicate that, using clustering, the predicted concentrations using BRT are in general higher than the observed concentrations. In addition, it appears that BRT generates higher sum of square residuals than the parametric survival regressions.

Author 1: Alexander Maestre
Author 2: Eman El-Sheikh
Author 3: Derek Williamson
Author 4: Amelia Ward

Keywords: Machine Learning; Boosted Regression Trees; Survival Parametric Regression; Water Quality Modeling; Weighted Regressions in Time; Discharge; and Season

PDF

Paper 15: Collaborative Pharmacy Student Learning Outline for Mobile Atmosphere

Abstract: the idea of this research is for the concern of Collaborative learning based mobile factors by applying via pharmacy students of the college. We focus on three features, computer mutual learning, learning process module, and student learning mode. In this paper, student-focused instruct module, student edge section, teacher interface section, learner section, solution problem section, curriculum section, control section, and diagnose section are planned. This system permits students to be sustained with a real time approach, non-real time approach, mixture approach. The devices used contain smart phone, PDAs, mobile devices, transportable computers and tablet PDAs. This system is to become a more capable student learning environment so that student can get student’s learning done more efficiently. The development of a collaborative learning combines the advantages of an adaptive learning environment with the advantages of mobile telecommunication and the suppleness of mobile devices.

Author 1: Dr. Mohamed F. AlAjmi
Author 2: Shakir Khan

Keywords: collaborative learning; mobile environment; real time approach; non-real time approach; mixture approach; lecture section; interface section; learner section; diagnose section

PDF

Paper 16: Arabic Natural Language Processing Laboratory serving Islamic Sciences

Abstract: Arabic Natural Language Processing (ANLP) has a great attention as a new research topic in the last few years. In this paper an ANLP laboratory has been created to serve the Islamic Sciences, especially the science of Hadith. The main tasks of this laboratory are creating and using the necessary linguistic resources (Corpora, Lexicon, etc) in developing or adapting the basic tools (Parser, POS-tagger, etc), developing Arabic Natural Language Processing system’s evaluation framework and defining research areas and services for universities. The laboratory can also adapt the important theories, resources, tools and applications of other natural language processing such as English and French.

Author 1: Moath M. Najeeb
Author 2: Abdelkarim A. Abdelkader
Author 3: Musab B. Al-Zghoul

Keywords: Natural Language Processing; Arabic Language; Islamic Sciences; Framework; Laboratory

PDF

Paper 17: Improved Generalization in Recurrent Neural Networks Using the Tangent Plane Algorithm

Abstract: The tangent plane algorithm for real time recurrent learning (TPA-RTRL) is an effective online training method for fully recurrent neural networks. TPA-RTRL uses the method of approaching tangent planes to accelerate the learning processes. Compared to the original gradient descent real time recurrent learning algorithm (GD-RTRL) it is very fast and avoids problems like local minima of the search space. However, the TPA-RTRL algorithm actively encourages the formation of large weight values that can be harmful to generalization. This paper presents a new TPA-RTRL variant that encourages small weight values to decay to zero by using a weight elimination procedure built into the geometry of the algorithm. Experimental results show that the new algorithm gives good generalization over a range of network sizes whilst retaining the fast convergence speed of the TPA-RTRL algorithm.

Author 1: P May
Author 2: E Zhou
Author 3: C. W. Lee

Keywords: real time recurrent learning; tangent plane; generalization; weight elimination; temporal pattern recognition; non-linear process control

PDF

Paper 18: Development of a Local Entomological Database for Education and Research using Simulation (Virtual) Methods

Abstract: Bioinformatics has been regarded as one of the rapidly-evolving fields with enormous impact on the history of life and biomedical sciences. It is an interdisciplinary science that integrates life sciences, mathematics and computer science in order to extract meaningful biological insights from large data sets of raw DNA and protein sequences. Our objective was the development of an entomogenomics database (provisionally named EntomDB) for education and research in entomology (entomology is the science of insects). This DB includes DNA/protein sequence data selected from genomes of major insect models of importance in biology and biomedical research. EntomDB will represent a customized easy, interactive and self-learning resource tool for beginner users in poor-resource settings. This will enable the users to learn basic skills in bioinformatics and genomics, needlessly to search through the numerous databases currently available on the World-Wide Web with their complex interfaces and contents. EntomDB will help students and young researchers in studying the primary structure, splicing, and translation and predict function of different genes by using simple simulation methods. It is also designed to be adaptable to work off-line, in case no internet connection is available. EntomDB is primarily designed for entomology discipline; however, it can easily be adapted for other disciplines in life and biomedical sciences. EntomDB will have important educational and developmental outcomes in promoting bioinformatics learning in the developing world and provide affordable first-level training for advanced degree and research levels.

Author 1: Emad I. Khater
Author 2: Mona G. Mahmoud
Author 3: Enas H. Ghallab
Author 4: Magdi G. Shehata
Author 5: Yasser M. Abd El-Latif

Keywords: Bioinformatics; local database; entomology

PDF

Paper 19: Evaluating the Impact of Critical Factors in Agile Continuous Delivery Process: A System Dynamics Approach

Abstract: Continuous Delivery is aimed at the frequent delivery of good quality software in a speedy, reliable and efficient fashion – with strong emphasis on automation and team collaboration. However, even with this new paradigm, repeatability of project outcome is still not guaranteed: project performance varies due to the various interacting and inter-related factors in the Continuous Delivery 'system'. This paper presents results from the investigation of various factors, in particular agile practices, on the quality of the developed software in the Continuous Delivery process. Results show that customer involvement and the cognitive ability of the QA have the most significant individual effects on the quality of software in continuous delivery.

Author 1: Olumide Akerele
Author 2: Muthu Ramachandran
Author 3: Mark Dixon

Keywords: Agile software development; Continuous Delivery; Delivery Pipeline; System Dynamics

PDF

Paper 20: Extending Access Management to maintain audit logs in cloud computing

Abstract: Considering the most often talked about security risks in cloud computing, like, security and compliance, viability, lack of transparency, reliability and performance issues. Bringing strong auditability in cloud services can reduce these risks to a great extent. Also, auditing, both internally and externally is generally required and sometimes unavoidable looking into the present day competition in the business arena. Auditing in web based and cloud based usage environments focuses mainly on cost of a service which determines the overall expenditure of the user organization. However, the expenditure can be controlled by a collaborative approach between the provider company and the user organization by constantly monitoring the end user access and usage of subscribed cloud services. Though, many cloud providers will claim of having a robust auditable feature, the generic verifiability with sustainable long term recording of usage logs do not exist at all. Certain access management models can be perfectly extended to maintain audit logs for long terms. However, maintaining long term logs certainly has storage implications, especially with larger organizations. The storage implications need to be studied.

Author 1: Ajay Prasad
Author 2: Prasun Chakrabarti

Keywords: Cloud Computing; Access Management; Audit logs

PDF

Paper 21: LPA Beamformer for Tracking Nonstationary Accelerated Near-Field Sources

Abstract: In this paper, a computationally very efficient algorithm for direction of arrival (DOA) as well as range parameter estimation is proposed for near-field narrowband nonstationary accelerated moving sources. The proposed algorithm based on the local polynomial approximation (LPA) beamformer, which proves its efficiency with far-field applications. The LPA estimates the instantaneous values of the direction of arrival, angular velocity, acceleration as well as the range parameters of near-field sources using weighted least squares approach which based on Taylor series. The performance efficiency of the LPA beamformer to estimate the DOAs of near-field sources is evaluated and compared with the Recursive Expectation-Maximization (REM) method. The comparison is done using standard deviation of DOA estimation error as well as for range versus signal to noise ratio (SNR). The simulation results show that LPA beamformer outperform REM1 in signal-to-noise ratio requirements.

Author 1: Amira S. Ashour

Keywords: Near-field; range and DOA estimation, moving source tracking; LPA beamformer; REM (Recursive Expectation Maximization)

PDF

Paper 22: Survey of Error Correction Mechanisms for Video Streaming over the Internet

Abstract: This overview is targeted at determining state-of-the-art on Error control mechanisms for video streaming over the Internet. The aims of error control mechanisms are to provide and protect the data from errors caused by packet loss due to congestion and link failure. The error control classified into two categories: Error correction coding and Error detection coding. Error control mechanisms for video applications can be classified into four types: forward error correction (FEC), retransmission, error resilience, and error concealment. In this paper, we provide a survey on the existing error control mechanisms. Representative error mechanisms systems. We describe the challenges and solutions of each error control mechanisms. Finally we show the Factors effect in the video quality through transmission over Internet.

Author 1: Jafar Ababneh
Author 2: Omar Almomani

Keywords: Forward Error Correction (FEC; Retransmission; Error Resilience; Error Concealment; video quality; Video Streaming over the Internet; networking quality of service

PDF

Paper 23: Variational Formulation of the Template-Based Quasi-Conformal Shape-from-Motion from Laparoscopic Images

Abstract: One of the current limits of laparosurgery is the absence of a 3D sensing facility for standard monocular laparoscopes. Significant progress has been made to acquire 3D from a single camera using Visual SLAM (Simultaneous Localization And Mapping), however most of the current approaches rely on the assumption that the observed tissue is rigid or undergoes periodic deformations. In laparoscopic surgery, these assumptions do not apply due to the unpredictable and elastic deformation of the tissues. We propose a new sequential 3D reconstruction method adapted to reconstructing organs in the abdominal cavity. We draw on recent computer vision methods exploiting a known 3D view of the environment at rest position called a template. However, no such method has ever been attempted in-vivo. State-of-the-art methods assume that the environment can be modeled as an isometric developable surface: one which deforms isometrically to a plane. While this assumption holds for paper and cloth-like surfaces, it certainly does not fit human organs and tissue in general. Our method tackles these limits: it uses a nondevelopable template and copes with natural 3D deformations by introducing quasi-conformal prior. Our method adopts a new two-phase approach. First the 3D template is reconstructed invivo using RSfM (Rigid Shape-from-Motion) while the surgeon is exploring – but not deforming – structures in the abdominal cavity. Second, the surgeon manipulates and deforms the environment. Here, the 3D template is quasi-conformally deformed to match the 2D image data provided by the monocular laparoscope. This second phase only relies on a single image. Therefore it copes with both sequential processing and self-recovery from tracking failures. The proposed approach has been validated using: (i) in-vivo animal data with ground-truth, and (ii) in-vivo laparoscopic videos of a real patient’s uterus. Our experimental results illustrate the ability of our method to reconstruct natural 3D deformations typical in real surgery.

Author 1: Abed Malti

Keywords: Laparoscopy, monocular 3D reconstruction, extensible surface.

PDF

Paper 24: Mobile Web Services: State of the Art and Challenges

Abstract: For many years mobile devices were commonly recognized as Web consumers. However, the advancements in mobile device manufacturing, coupled with the latest achievements in wireless communication developments are both key enablers for shifting the role of mobile devices from service consumers to service providers. This paradigm shift is a major step towards the realization of pervasive and ubiquitous computing. Mobile Web service provisioning is the art of hosting and offering Web services from mobile devices, which actively contributes towards the direction of Mobile Internet. In this paper, we provide the state of the art of mobile service provisioning as it currently stands. We focus our discussions on its applicability, reliability, and challenges of mobile environments and resource constraints. We study the different provisioning architectures, enabler technologies, publishing and discovery mechanisms, and maintenance of up-to-date service registries. We point out the major open research issues in each provisioning aspect. Performance issues due to the resource constraints of mobile devices are also discussed.

Author 1: Khalid Elgazzar
Author 2: Patrick Martin

Keywords: Mobile Web services, service provisioning, mobile devices, ubiquitous computing, mobile computing.

PDF

Paper 25: Inverted Pendulum-type Personal Mobility Considering Human Vibration Sensitivity

Abstract: An inverted pendulum-type PM (personal mobility) has been attracting attention as a low-carbon vehicle. For many people who like to use the PM, ride comfort is important. However, ride comfort of PM has not been focused on in previous studies. The vibration is one of causes that make riders feel uncomfortable. The PM is unstable system and horizontal vibration may be caused by a stabilizing control. Additionally, vertical vibration may also be caused by road disturbances. This study analyzes the vibration of the rider’s head in these two directions when the PM runs on a road with disturbances in numerical simulations, and evaluates ride comfort with the frequency characteristics of the vibration. To consider human vibration sensitivity, the frequency weighting proposed in ISO 2631-1 is used as an evaluation standard. The improvement methods are proposed from both software and hardware, and it is confirmed that the proposed method can improve ride comfort.

Author 1: Misaki Masuda
Author 2: Takuma Suzuki
Author 3: Kazuto Yokoyama
Author 4: Masaki Takahashi

Keywords: Inverted Pendulum-Type Personal Mobility; Ride Comfort; Human Vibration; Frequency Analysis; Vibration Control; Frequency Shaped LQG

PDF

The Science and Information (SAI) Organization
BACK TO TOP

Computer Science Journal

  • About the Journal
  • Call for Papers
  • Submit Paper
  • Indexing

Our Conferences

  • Computing Conference
  • Intelligent Systems Conference
  • Future Technologies Conference
  • Communication Conference

Help & Support

  • Contact Us
  • About Us
  • Terms and Conditions
  • Privacy Policy

© The Science and Information (SAI) Organization Limited. All rights reserved. Registered in England and Wales. Company Number 8933205. thesai.org