The Science and Information (SAI) Organization
  • Home
  • About Us
  • Journals
  • Conferences
  • Contact Us

Publication Links

  • IJACSA
  • Author Guidelines
  • Publication Policies
  • Digital Archiving Policy
  • Promote your Publication
  • Metadata Harvesting (OAI2)

IJACSA

  • About the Journal
  • Call for Papers
  • Editorial Board
  • Author Guidelines
  • Submit your Paper
  • Current Issue
  • Archives
  • Indexing
  • Fees/ APC
  • Reviewers
  • Apply as a Reviewer

IJARAI

  • About the Journal
  • Archives
  • Indexing & Archiving

Special Issues

  • Home
  • Archives
  • Proposals
  • Guest Editors
  • SUSAI-EE 2025
  • ICONS-BA 2025
  • IoT-BLOCK 2025

Future of Information and Communication Conference (FICC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Computing Conference

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Intelligent Systems Conference (IntelliSys)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Future Technologies Conference (FTC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact
  • Home
  • Call for Papers
  • Editorial Board
  • Guidelines
  • Submit
  • Current Issue
  • Archives
  • Indexing
  • Fees
  • Reviewers
  • Subscribe

IJACSA Volume 8 Issue 3

Copyright Statement: This is an open access publication licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.

View Full Issue

Paper 1: Stylometric Techniques for Multiple Author Clustering

Abstract: In 1598-99 printer, William Jaggard named Shakespeare as the sole author of The Passionate Pilgrim even though Jaggard chose a number of non-Shakespearian poems in the volume. Using a neurolinguistics approach to authorship identification, a four-feature technique, RPAS, is used to convert the 21 poems in The Passionate Pilgrim into a multi-dimensional vector. Three complementary analytical techniques are applied to cluster the data and reduce single technique bias before an alternate method, seriation, is used to measure the distances between clusters and test the strength of the connections. The multivariate techniques are found to be robust and able to allocate nine of the 12 unknown poems to Shakespeare. The authorship of one of the Barnfield poems is questioned, and analysis highlights that others are collaborations or works of yet to be acknowledged poets. It is possible that as many as 15 poems were Shakespeare’s and at least five poets were not acknowledged.

Author 1: David Kernot
Author 2: Terry Bossomaier
Author 3: Roger Bradbury

Keywords: Authorship Identification; Principal Component Analysis; Linear Discriminant Analysis; Vector Space Method; Seriation

PDF

Paper 2: ComplexCloudSim: Towards Understanding Complexity in QoS-Aware Cloud Scheduling

Abstract: The cloud is generally assumed to be homogeneous in most of the research efforts related to cloud resource management and the performance of cloud resource can be determined as it is predictable. However, a plethora of complexities are associated with cloud resources in the real world: dynamicity, heterogeneity and uncertainty. For heterogeneous cloud resources experiencing vast dynamic changes in performance, a critical role is played by the statistical characteristics of execution times, related to different cloud resources, to facilitate decision making in management. The cloud’s performance can be considerably influenced by the differences between the estimated and actual execution times, which may affect the robustness of resource management systems. Limitation exists in the study of cloud resource management systems’ complexities even though extensive research has been done on complexity issues in various fields from decision making in economics to computational biology. This paper concentrates on managing the research question regarding the complexity’s role in QoS-aware cloud resource management systems. We present the ComplexCloudSim. Here, CloudSim, a popular simulation tool-kit, is extended through modelling of complexity factors in the cloud, including dynamic changes of run-time performance, resource heterogeneity, and task execution times’ uncertainty. The effects of complexity on performance within cloud environments are examined by comparing four widely used heuristic cloud scheduling algorithms, given that the execution time information is inaccurate. Furthermore, a damage spreading analysis, one amongst the available complex system analysis methods, is applied to the system and simulations are run to reveal the system’s sensitivity to initial conditions within specific parameter regions. Finally, how small of a damage can spread throughout the system within the region is discussed as well as research is done for the potential ways to avoid such chaotic behaviours and develop more robust systems.

Author 1: Huankai Chen
Author 2: Frank Z Wang

Keywords: Cloud Scheduling; Damage Spreading; QoS; Complexity; Chaotic Behaviour; Cloud Simulation

PDF

Paper 3: A Novel Design of Patch Antenna using U-Slot and Defected Ground Structure

Abstract: A novel design of patch antenna is presented with double U slot structure on patch with ground irregularities. As a result tri-band response is achieved with gain reaching 0.785 to 3.75dB respectively and directivity of 5.5 to 5.6dBi. Coaxial cable is mounted with patch as medium of power. The antenna has shown minimum mismatch loss with 0 to 5% with high bandwidth response of 37 to 1200MHZ. The proposed antenna can be used for GSM, W-LAN, GPRS and other radio communication services systems.

Author 1: Saad Hassan Kiani
Author 2: Khalid Mahmood
Author 3: Mehre Munir
Author 4: Alex James Cole

Keywords: multiband frequencies; directivity; gain; slots; Bandwidth; reflection coefficient

PDF

Paper 4: A Preliminary Numerical Simulation Study of Developing Ankle Foot Orthosis to Support Sit-To-Stand Movement in Children with Cerebral Palsy

Abstract: The purpose of this study is to identify an effective method of support for the standing-up motion of children with cerebral palsy (CP). Experiments revealed remarkable differences in the shank and upper-body motions of children with CP compared with normally developed (ND) children. Shank tilt angles of CP children were smaller and their upper-body tilt angles were larger than those of ND children. The large upper-body tilt compensates for the smaller shank tilt but will cause back pain and/or deformation of the hip joint as they grow. It is therefore imperative to find a method of support to help CP children realize more natural motions (similar to those of ND children) to prevent these problems. The standing-up motion of ND children was adopted as the goal. Experiments identified a similarity in the angular variation between ND children’s upper bodies and shanks; the standing-up motion of children with CP under that condition was then simulated using a two-dimensional four-link model of the human body. As a result of the numerical simulation, shank angles of CP children increased and their upper-body angles decreased from those measured during the experiments, which indicates that the proposed method of support is qualitatively effective at allowing CP children to realize a more natural standing-up motion.

Author 1: Chihiro NAKAGAWA
Author 2: Ryo YONETSU
Author 3: Tomohiro ITO
Author 4: Shunsuke KUSADA
Author 5: Atsuhiko SHINTANI

Keywords: Cerebral; palsy; Standing-up motion; Motion analysis; Numerical simulation; Rigid link model

PDF

Paper 5: A Survey of Spam Detection Methods on Twitter

Abstract: Twitter is one of the most popular social media platforms that has 313 million monthly active users which post 500 million tweets per day. This popularity attracts the attention of spammers who use Twitter for their malicious aims such as phishing legitimate users or spreading malicious software and advertises through URLs shared within tweets, aggressively follow/unfollow legitimate users and hijack trending topics to attract their attention, propagating pornography. In August of 2014, Twitter revealed that 8.5% of its monthly active users which equals approximately 23 million users have automatically contacted their servers for regular updates. Thus, detecting and filtering spammers from legitimate users are mandatory in order to provide a spam-free environment in Twitter. In this paper, features of Twitter spam detection presented with discussing their effectiveness. Also, Twitter spam detection methods are categorized and discussed with their pros and cons. The outdated features of Twitter which are commonly used by Twitter spam detection approaches are highlighted. Some new features of Twitter which, to the best of our knowledge, have not been mentioned by any other works are also presented.

Author 1: Abdullah Talha Kabakus
Author 2: Resul Kara

Keywords: Twitter spam; spam detection; spam filtering; mobile security

PDF

Paper 6: Prediction Method for Large Diatom Appearance with Meteorological Data and MODIS Derived Turbidity and Chlorophyll-A in Ariake Bay Area in Japan

Abstract: Prediction method for large diatom appearance in winter with meteorological data and MODIS derived turbidity and chlorophyll-a in Ariake Bay Area in Japan is proposed. Mechanism for large diatom appearance in winter is discussed with the influencing factors, meteorological condition and in-situ data of turbidity, chlorophyll-a data with the measuring instruments equipped at the Saga University own Tower in the Ariake Bay area. Particularly, the method for estimation of turbidity is still under discussion. Therefore, the algorithm for estimation of turbidity with MODIS data is proposed here. Through experiments, it is found that the proposed prediction method for large diatom appearance is validated with the meteorological data and MODIS derived turbidity as well as chlorophyll-a data estimated for the winter (from January to March) in 2012 and 2015.

Author 1: Kohei Arai

Keywords: chlorophyl-a concentration; red tide; diatom; MODIS; satellite remote sensing

PDF

Paper 7: Modeling of High Speed Free Space Optics System to Maintain Signal Integrity in Different Weather Conditions; System Level

Abstract: Free space optical (FSO) also known as free space photonics (FSS) is a technology widely deployed in Local Area Network (LAN), Metro Area Network (MAN), and in Inter & Intra chip communications. However satellite to satellite and other space use of FSO requires further consideration. Although FSO is highly beneficial due to its easy deployment and high security in narrow beam as well as market demand for 10 GB+, some factors especially rain, snow and fog attenuation causes signal integrity problem in FSO. To get better Signal Integrity in FSO we need to consider all components while designing the system. In this paper a comparative analysis has been performed on 10 GB and 40 GB FSO system over 1 Km. Firstly for selecting suitable modulation technique we compared NRZ and RZ modulation and get spectrum analysis. NRZ modulation was found more data efficient. Signal Integrity in FSO system with 10 GB/s was analyzed by eye diagram and Q-Factor of both APD and PIN Photo detector was presented in graph. Same experiment was repeated with 40 GB/s and Bit error rate of both photo detectors were presented.

Author 1: Rao Kashif
Author 2: Oluwole John
Author 3: Fujiang Lin
Author 4: Abdul Rehman Buzdar

Keywords: Free Space Optical; NRZ; RZ; PIN; APD; Photo Detector; BER; Q-factor

PDF

Paper 8: Qualitative Study of Existing Research Techniques on Wireless Mesh Network

Abstract: Wireless Mesh Network (WMN) is one of the significant forms of the wireless mesh network that assists in creating highly interconnected communication node. Since a decade, there have been various studies towards enhancing the performance of WMN which is successful to a large extent. However, with the upcoming technology of pervasive and dynamic networks WMN suffers from various routing issues, Quality-of-Service (QoS) issue, channel allocation, sustainability of routes which makes the theory contradicting when considering for real-world challenges in wireless networks. This paper, therefore, brief about fundamental information of WMN followed by a discussion of existing research trends and existing research techniques. Finally, the paper also discusses the open research issues after reviewing the existing research techniques.

Author 1: Naveen T.H
Author 2: Vasanth G

Keywords: Access Points; Channel Allocation; Internet Access; Routing Problems; Wireless Mesh Network; QoS

PDF

Paper 9: A Trust and Reputation Model for Quality Assessment of Online Content

Abstract: In recent years, online transactions have become more prevalent than it was. This means that the number of online users to perform such transactions keeps growing, causing an increase in the level of expectations for them. One of those expectations is to enable them to get a better understanding of such transactions before going ahead with it. Consequently, trust and reputation models represent an important milestone to support those users to make their own decisions to facilitate online transactions. Many of the common trust and reputation models used primitive methods to calculate the reputation of online content. These methods are usually inaccurate when there is a divergence in rating. In addition, the lack of predictability through the latter ratings in emerging trends. Others use a probabilistic model or the so-called weighted average, which usually focusing on a single dimension for online user ratings. Even those models that combine multiple dimensions of user ratings are usually not representative on the one hand, and on the other hand are with heterogeneous weights. This paper fills this gap by proposing a model to assess the trust and reputation of online content, relying on three factors namely user behavior, user reliability, and user tendency with homogeneous weights of interest to the user on the Internet. These homogenous weights will be used to measure the reputation of any online content. The proposed model has been validated and compared with some other well-known models, and showed a significant improvement in terms of the Mean Absolute Error (MAE). The proposed model is also good with sparse and dense datasets.

Author 1: Yousef Elsheikh

Keywords: Online content; Quality assessment; Trust and reputation model; User behaviour; User reliability; user tendency

PDF

Paper 10: An Electrical Model to U-Slot Patch Antenna with Circular Polarization

Abstract: The microstrip antenna is one of the best antenna structures, due to its low cost and compact design. In this paper, a coaxial feed circularly polarized square patch antenna is designed using the U-slot. The proposed antenna is suited for the RFID readers in the SHF band. This structure of antenna of FR-4 substrate (dielectric constant = 3.5), is capable to cover the range of frequency of 2.4 to 2.5GHz. The size of patch is 25*25 mm2. An equivalent electrical model of this antenna was proposed and simulated by the ADS software. The simulated gain is 4.189 dBi and S11 bandwidth is about 100 MHz. Analysis and modeling of the proposed antenna was carried out using the CST and HFSS simulator based on the finite element method. The simulation results obtained are presented and discussed.

Author 1: Guesmi Chaouki
Author 2: Necibi Omrane
Author 3: Ghnimi Said
Author 4: Gharsallah Ali

Keywords: RFID; circularly polarization; U-slot antenna; RFID reader antenna; Electrical model

PDF

Paper 11: Modified Hierarchical Method for Task Scheduling in Grid Systems

Abstract: This study aims to increase the productivity of grid systems by an improved scheduling method. A brief overview and analysis of the main scheduling methods in grid systems are presented. A method for increasing efficiency by optimizing the task graph structure considering the grid system node structure is proposed. Task granularity (the ratio between the amount of computation and transferred data) is considered to increase the efficiency of planning. An analysis of the impact on task scheduling efficiency in a grid system is presented. A correspondence of the task graph structure considering the node structure (in which the task is immersed) to the effectiveness of scheduling in a grid system is shown. A modified method for scheduling tasks while considering their granularity is proposed. The relevant algorithm for task scheduling in a grid system is developed. Simulation of the proposed algorithm using the modeling system GridSim is conducted. A comparative analysis between the modified algorithm and the algorithm of the hierarchical scheduler Maui is shown. The general advantages and disadvantages of the proposed algorithm are discussed.

Author 1: Ahmad Ali AlZubi

Keywords: directed acyclic graph (DAG); task granularity; hierarchical method; Maui scheduler; scheduler; scheduling algorithm; task manager; grid; parallelism degree

PDF

Paper 12: Issues and Trends in Satellite Telecommunications

Abstract: In this paper we will discuss a bit about satellite telecommunications. A brief introduction and history of satellite telecommunications will be presented. Then a discussion of certain prevalent satellite orbit types will be given, because this is relevant to understanding how certain satellite applications are employed. Various areas of ongoing research in the field of satellite telecommunications, to include bandwidth allocation, satellite constellation design for remote parts of the world, and power generation, among others will be discussed.

Author 1: David Hiatt
Author 2: Young B. Choi

Keywords: satellite communications; telecommunications; satellite orbit types; bandwidth allocation; constellation design; power generation

PDF

Paper 13: A New Model of Information Systems Efficiency based on Key Performance Indicator (KPI)

Abstract: Any company concerning with information technology considers Automated performance management processes as a key component of its operations as it enables the company get a clear long -term assessment about the performance of employees as well as operating units of the company. One technique that the company could use to evaluate the present performance of both employees and operating units is the utilization of KPI -based management information system. The current study seeks to provide a new model of information system efficiency based on key performance indicator and the extent to which such approach helps the company evaluate the performance within the company. In addition to recognize the requirements and criteria needed to establish an effective system of performance measurement , the axioms that may influence the designing of the Model KPIs and the approaches that We need to be contracted with a fixed set of key performance indicators in order to facilitate hiring.

Author 1: Ahmad AbdulQadir AlRababah

Keywords: Information Systems Management; System performance; Key performance Indicators; Data warehouse; Information Systems Integration

PDF

Paper 14: GIS Utilization for Delivering a Time Condition Products

Abstract: As population is increasing rapidly all over the world, the need for delivering products is being more difficult especially for conditional products (products with life time). Many Customers require conditional products to be delivered to their locations. Distribution center may have multi depots (multi store branches) instead of one depot. Every depot has limited number of vehicles to minimize cost. Capacities of these vehicles are based on two dimensions (weight and volume). Geographic information system (GIS) is used for localizing customers’ destinations. Then OD Cost Matrix is used to assign every customer destination to the least cost depot to be served from it. Finally Network analyst is used to solve the vehicle routing problem generating final route directions for every vehicle and calculating the best time for lunch break of drivers automatically. This case study is applied on Mansoura city in Egypt.

Author 1: Noha I. Sharaf
Author 2: Bahaa T.Shabana
Author 3: Hazem M. El-Bakry

Keywords: conditional products; distribution centers (depots); capacity of vehicle; vehicle routing problems (VRP); geographic information system (GIS); OD Cost Matrix; Network analyst

PDF

Paper 15: Techniques used to Improve Spatial Visualization Skills of Students in Engineering Graphics Course: A Survey

Abstract: Spatial visualization skills are crucial in engineering fields and are required to support the spatial abilities of engineering students. Instructors in engineering colleges indicated that freshmen students faced difficulties when visualizing models in engineering graphics. Students cannot correctly understand and process visual object and mental images of the engineering models. Traditional tools using textbooks, physical models, and modeling techniques is not sufficient for improving the spatial visualization skills of engineering students. This paper is a survey of all techniques used to learn freshmen students in engineering graphics and improve their spatial visualization skills. Also, it presents the method of evaluation the spatial visualization skills. After describing techniques and presented the literature review, this work presents a comparison between methodologies and techniques used in previous studies. Finally, we summarize a road of the map for the techniques and strategies to improve the spatial visualization skills for freshmen engineering students.

Author 1: Asmaa Saeed Alqahtani
Author 2: Lamya Foaud Daghestani
Author 3: Lamiaa Fattouh Ibrahim

Keywords: 3D graphics; virtual reality; spatial visualization skills; mental rotation skill; engineering graphics

PDF

Paper 16: Selection of Mathematical Problems in Accordance with Student’s Learning Style

Abstract: This article describes the implementation and development of an expert system as a support tool to tackle mathematical topics, by using Bayesian networks as engine of inference and a learning styles, as well as the difficulty level of problems and establish the base of the classifier probabilistic. The expert system makes decisions as which element to visualize at a specific moment, gives the student the best resource, and supervises the user progress. The article is divided into three sections, the first one deals with the construction of the expert system, the second one presents the operation of the system through the classification of students consistent with their profile, which is based on the prevailing learning style among them and in the difficulty level that problems have so that the student reaches in solving successfully. It also shows the operability of the system in respect of the allocation of digital resources in accordance with the identified profile and gradually provides more assignments with different difficulty levels, as the student progresses. An experimental study was performed by means of which the system was assessed under 30 students to the level of engineering and those who studied the Applied Calculus course in their second semester of the degree course. This group was named the study group (SG). The SG used the system for one semester. The results at the initial and final evaluation were from 3.58 to 7.37 for CG and SG respectively. Applying the F test, a statistically significant difference in increase was found (p <0.002). These results showed that SG identified the concept of derivative and applied that concept correctly in real problems solving correctly 74% of the final questionnaire, so it is concluded that the system expert opens a new way in educational research.

Author 1: Elena Fabiola Ruiz Ledesma
Author 2: Juan J. Gutiérrez García

Keywords: technology; research projects; education; learning

PDF

Paper 17: RIN-Sum: A System for Query-Specific Multi-Document Extractive Summarization

Abstract: In paper, we have proposed a novel summarization framework to generate a quality summary by extracting Relevant-Informative-Novel (RIN) sentences from topically related document collection called as RIN-Sum. In the proposed framework, with the aim to retrieve user's relevant informative sentences conveying novel information, ranking of structured sentences has been carried out. For sentence ranking, Relevant-Informative-Novelty (RIN) ranking function is formulated in which three factors, i.e., the relevance of sentence with input query, informativeness of the sentence and the novelty of the sentence have been considered. For relevance measure instead of incorporating existing metrics, i.e., Cosine and Overlap which have certain limitations, a new relevant metric called as C-Overlap has been formulated. RIN ranking is applied on document collection to retrieve relevant sentences conveying significant and novel information about the query. These retrieved sentences are used to generate query-specific summary of multiple documents. The performance of proposed framework have been investigated using standard dataset, i.e., DUC2007 documents collection and summary evaluation tool, i.e., ROUGE.

Author 1: Rajesh Wadhvani
Author 2: Rajesh Kumar Pateriya
Author 3: Manasi Gyanchandani
Author 4: Sanyam Shukla

Keywords: Text summarization; maximum marginal relevance; sentence selection; DUC2007 data collection

PDF

Paper 18: A Bus Arbitration Scheme with an Efficient Utilization and Distribution

Abstract: Computer designers utilize the recent huge advances in Very Large Scale Integration (VLSI) to place several processors on the same chip die to get Chip Multiprocessor (CMP). The shared bus is the most common media used to connect these processors with each other and with the shared resources. Distributing the shared bus among the contention processors represents a critical issue that affects overall performance of the CMP. Optimal utilization with fair distribution of the shared bus represents another challenge. This paper introduces a bus arbitration scheme, which is an Age-Based Lottery (ABL) Arbitration that combines the lottery and age-based algorithms to overcome the shared bus challenges. The results show that the developed bus arbitration scheme maximizes the bus utilization and improves the distribution by at least 13.5% with an acceptable latency time comparing to the traditional bus arbitration schemes.

Author 1: Amin M. A. El-Kustaban
Author 2: Abdullah A. K. Qahtan

Keywords: Chip Multiprocessor; Round Robin; Lottery Algorithms; Latency; VHDL

PDF

Paper 19: A Semantic Interpretation of Unusual Behaviors Extracted from Outliers of Moving Objects Trajectories

Abstract: The increasing use of location-aware devices has led to generate a huge volume of data from satellite images and mobile sensors; these data can be classified into geographical data. And traces generated by objects moving on geographical territory, these traces are usually modeled as streams of spatiotemporal points called trajectories. Integrating trajectory sample points with geographical and contextual data before applying mining techniques can be more gainful for the application users. It contributes to produce significant knowledge about movements and provide applications with richer and more meaningful patterns. Trajectory Outliers are a sort of patterns that can be extracted from trajectories. However, the majority of algorithms proposed for discovering outliers are based on the geometric side of trajectories; our approach extends these works to produce outliers based on semantic trajectories in order to give meaning to the outliers extracted, and to understand the unusual behaviors that can be detected. To prove the efficiency of the approach proposed we show some experimental results.

Author 1: Sana CHAKRI
Author 2: Said RAGHAY
Author 3: Salah EL HADAJ

Keywords: Moving objects analysis; spatial databases; data mining; Semantic clustering; semantic trajectories

PDF

Paper 20: Block Wise Data Hiding with Auxilliary Matrix

Abstract: This paper introduces a novel method based on auxiliary matrix to hide a text data in an RGB plane. To hide the data in RGB planes of image via scanning, encryption and decryption. To enhance the security, the scanning technique combines two different traversals – spiral and snake traversal. The encryption algorithm involves auxiliary matrix as a payload and consider the least significant bits of three planes. To embed the text message would in the form of ASCII values which are similar to the red plane values and least significant value of pixels in blue plane marks the position of pixels. The least significant bit of boundary values of green-plane signifies the message. These three planes are recombined to form the stego-image, to decrypt the message with the help of scanning in the red-plane and blue plane and green plane simultaneously. Performance evaluation is done using PSNR, MSE and entropy calculation and generated results are compared with some earlier proposed work to present its efficiency with respect to others.

Author 1: Jyoti Bharti
Author 2: R.K. Pateriya
Author 3: Sanyam Shukla

Keywords: Steganography; RGB planes; Scanning; Stego-image; ASCII value

PDF

Paper 21: Detection of Edges Using Two-Way Nested Design

Abstract: This paper implements a novel approach of identifying edges in images using a two-way nested design. The test comprises of two steps. First step is based on an F-test. The sums of square (SS) of various effects are used to extract the mean square (MS) effect of respective effects and the unknown effect considered as noise. The mean square value has a chi-square distribution. The ratio of two chi-square distributions has an F-distribution. The final decision is based on testing a hypothesis for the presence or absence of an effect. The second step is based on contrast function (CF). This test identifies the presence or absence of an edge in four directions that are horizontal, vertical, and the two diagonal directions. The test is based on Tukey’s T-test. The performance of nested design is compared with the edge detection using Sobel filter. A rigorous testing reveals that the nested design yields comparable results for images that are either free of noise or corrupted with light noise. The nested design however outperforms the Sobel filter in situations where the images are corrupted with heavy noise.

Author 1: Asim ur Rehman Khan
Author 2: Syed Muhammad Atif Saleem
Author 3: Haider Mehdi

Keywords: Analysis of variance (ANOVA); Edge detection; F-test; nested design; T-test

PDF

Paper 22: oDyRM: Optimized Dynamic Reusability Model for Enhanced Software Consistency

Abstract: Accomplishment of optimization technique on Object Oriented design component is a very challenging task. The prior model DyRM has introduced a technique to perform modeling of design reusability under three real-time constraints. The proposed study extends the DyRM model by incorporating optimization using multilayered perception techniques in neural network. The system takes the similar input as is done by the prior DyRM, which is subjected to Levenberg-Marquardt optimization algorithm using multi-layer perceptron of configuration 4-24-2 to generate the optimal output of consistency factor. The paper discusses the underlying technique elaborately and presents the outcome that shows a good curve fits between experimental and predicted data. The model is therefore termed as optimized DyRM (oDyRM) to evaluate the consistency factor associated with the proposed model.

Author 1: R. Selvarani
Author 2: P. Mangayarkarasi

Keywords: Cost; Back propagation Algorithm; Design Reusability; Object Oriented Design; Optimization; Project management

PDF

Paper 23: A Review of Secure Authentication based e-Payment Protocol

Abstract: The growth of e-commerce platform is increasing rapidly and possesses a higher level of hazard compared to standard applications as well as it requires a more prominent level of safety.Additionally, the transaction and their data about clients are enormously sensitive, security production and privacy is exceptionally crucial. Consequently, the confirmation is generally vital towards security necessities as well as prevents the data from stolen and unauthorized person over the transaction of e-payment. At the same time, privacy strategies are essential to address the client data security. Because of this, the data protection and security ought to be viewed as a central part of e-business framework plan. Particularly enormous consideration is given to cash exchanges assurance. In the past decades, various methods were created to permit secure cash transaction using e-payment frameworks. This study will review and discuss the e-payment scheme. It uses various encryption algorithms and methods to accomplish data integrity, privacy, non-repudiation and authentication.

Author 1: Mr.B. Ratnakanth
Author 2: Prof.P.S.Avadhani

Keywords: Security protocol; smart card; encryption technique; payment protocol; E-commerce

PDF

Paper 24: Design of Frequency Reconfigurable Multiband Meander Antenna Using Varactor Diode for Wireless Communication

Abstract: A compact multiband frequency reconfigurable meander antenna proposed for wireless communication systems is designed and described in this paper. A folded structure has been chosen due its good tradeoff between size, bandwidth and efficiency. The reference antenna is based on a meander patch structure radiating at F1=1, F2=1.94, F3=2.6GHz and optimized to be integrated in the Printed Circuit Board (PCB). In order to sweep the resonance frequencies, a chip capacitor was inserted between the meander patch printed on the top layer and a floating ground plane on the back one, in first case. Than in second case, by inserting a varactor diode to tuning electronically the resonance frequencies over wide bands. The measured results agree with simulations and good radiation properties were obtained. Realized prototype and related results are indeed presented and discussed.

Author 1: I. ROUISSI
Author 2: J.M.FLOC’H
Author 3: H.TRABELSI

Keywords: Frequency reconfigurable meander antenna; chip capacitor; Varactor diode; Size reduction; tuning range; wireless communication

PDF

Paper 25: Improving the Control Strategy of a Standalone PV Pumping System by Fuzzy Logic Technique

Abstract: This work aims to develop an accurate model of an existing Photovoltaic Pumping System (PvPS) which is composed of an Ebara Pra-0.50T Asynchronous Moto-Pump (AMP) fed by Kaneka GSA-60 photovoltaic panels via a Moeller DV-51 speed drive. The developed model is then used to compare the performance of the system with its original control strategy based on classical indirect vector control strategy using PI speed controller and the proposed new control strategy based on Fuzzy Logic control technique for speed control and MPPT system. The obtained results of comparative simulations, induced in different dramatic variation of working conditions, show that the developed control strategy brought major enhancements in system performance.

Author 1: Houssem CHAOUALI
Author 2: Hichem OTHMANI
Author 3: Dhafer MEZGHANI
Author 4: Abdelkader MAMI

Keywords: Photovoltaic Pumping System; Asynchronous Moto-Pump; PI Speed Controller; Fuzzy Logic Control Technique; MPPT Tracking System; Simulation

PDF

Paper 26: Enhanced Security for Data Sharing in Multi Cloud Storage (SDSMC)

Abstract: Multiple Cloud storage has become one of the essential services of cloud computing. This Multi-Cloud storage models allow users to store sliced encrypted data in various cloud drives. Thus, it provides support for various cloud storage services using the single interface rather than using single cloud storage services. Cloud security goal primarily focuses on issues that relate to information privacy and security aspects of cloud computing. This latest data storage service and data moderation prototype focus on malicious insider’s access on stored data, protection from malicious files, removal of centralized distribution of data storage and removal of outdated files or downloaded files frequently. Data owner does not necessarily need to worry about the future of the data stored in the Multi-Cloud server may be extracted or depraved. The other is ingress control of data. The proposed method ensures the file or data cannot get access without the knowledge or permission of the owner. Thus, this research aims at offering an architecture which reduces malicious insiders and file threats with an algorithm that improves data sharing security in Multi- Cloud storage services. This technique will offer a secure environment whereby the data owner can store and retrieve data from Multi-Cloud Environment without file merging conflicts and prevents insider attacks to obtain a meaningful information. The experimental results indicate that the suggested model is suitable for decision making process for the data owners in the better adoption of multi-cloud storage service for sharing their information securely.

Author 1: Dr. K. Subramanian
Author 2: F.Leo John

Keywords: Malicious Insiders; privacy; Index based Data slicing; Malicious Files; Multi-Cloud Storage; Data Sharing

PDF

Paper 27: An Empirical Investigation of the Correlation between Package-Level Cohesion and Maintenance Effort

Abstract: The quality of the software design has a considerable impact on software maintainability. Improving software quality can reduce costs and efforts of software maintenance. Cohesion, as one of software quality characteristics, can be used as an early indicator for predicting software maintenance efforts. This paper improves Martin’s cohesion metric, which is one of the well-known and well-accepted cohesion metrics. The strong correlation found between package cohesion, using our proposed metric, and maintenance efforts shows the improvement made on measuring cohesion, and how it would be for predicting maintenance efforts. The experimental study included data from four open source Java software systems. The results show that as good the package cohesion is, as the less maintenance effort will be needed.

Author 1: Waleed Albattah

Keywords: package; cohesion; metric; maintenance effort; maintainability; software; measurements

PDF

Paper 28: Congestion Control using Cross layer and Stochastic Approach in Distributed Networks

Abstract: In recent past, the current Internet architecture has many challenges in supporting the magnificent network traffic. Among the various that affect the quality of communication in the massive architecture the challenge in maintaining congestion free flow of traffic is one of the major concerns. In this paper, we propose a novel technique to address this issue using cross layer paradigm based on stochastic approach with extended markovian model. The cross layer approach will bridge the physical layer, link layer, network layer and transport layer to control congestion. The resource provisioning operation will be carried out over link layer and the mechanism of exploring the congestion using stochastic approach will be implemented over the network layer. The Markov modeling is adopted to identify the best routes amidst of highly congested paths and it is carried out at the transport layer. An analytical research methodology will be adopted to prove that it is feasible to develop a technique that can identify the origination point of congestion and share the same with the entire network. It is found that this approach for congestion control is effective with respect to end to end delay, packet delivery ratio and processing time.

Author 1: Selvarani R
Author 2: Vinodha K

Keywords: Distributed Network System; cross layer; congestion; Traffic Flow; Rate Control Metric

PDF

Paper 29: Electronic Health as a Component of G2C Services

Abstract: This paper explores electronic health as a segment of electronic government. International practice in electronic health field and electronic health strategies adopted in Europe are analysed. Current practices in delivery of electronic health services in G2C are investigated and perspectives are specified.

Author 1: Rasim Alguliyev
Author 2: Farhad Yusifov

Keywords: electronic health; electronic government; Government to Citizen (G2C); electronic services; medical information; Electronic Health Records (EHR)

PDF

Paper 30: On the Dynamic Maintenance of Data Replicas based on Access Patterns in A Multi-Cloud Environment

Abstract: Cloud computing provides services and infrastructures to enable end-users to access, modify and share massive geographically distributed data. There are increasing interests in developing data-intensive (big data) applications in this computing environment that need to access huge datasets. Accessing such data in an efficient way is deterred with factors such as dynamic changes in resource availability, provision of diverse service quality by different cloud providers. Data replication has already been proven to be an effective technique to overcome these challenges. Replication offers reduced response time in data access, higher data availability and improved system load balancing. Once the replicas are created in a multi-cloud environment, it is of utmost importance to continuously support maintenance of these replicas dynamically. This is to ensure that replicas are located in optimal data center locations to minimize replication cost and to meet specific user and system requirements. First, this paper proposes a novel approach to distributed placement of static replicas in appropriate data center locations. Secondly, motivated by the fact that a multi-cloud environment is highly dynamic, the paper presents a dynamic replica maintenance technique that re-allocates replicas to new data center locations upon significant performance degradation. The evaluation results demonstrate the effectiveness of the presented dynamic maintenance technique with static placement decisions in a multi-cloud environment

Author 1: Mohammad Shorfuzzaman

Keywords: Multi-cloud environment; data replication; distributed algorithm; response time; dynamic maintenance; QoS constraint

PDF

Paper 31: Contribution to the Development of A Dynamic Circulation Map using the Multi-Agent Approach

Abstract: Road traffic is considered one of the most difficult domains to manage and one of the fast- growing networks. This environment is geographically distributed and its actors are in continuous interaction in order to be able to succeed in a real-time exchange of the variable data of the road traffic. The modeling of this complex system requires powerful tools to be able to realize precise representations of reality hence the combination of mathematical modeling tools and intelligent systems. This paper presents a model of road traffic using graphs for the representation of the road infrastructure and the multi-agent technology for the management of the data representing the information circulating in the road network. This new approach aims at optimizing traffic paths, minimizing the time of a given journey and developing a dynamic traffic map that will enable the user to reach his destination by following the best possible path.

Author 1: Asmaa ROUDANE
Author 2: Mohamed YOUSSFI
Author 3: Khalifa MANSOURI

Keywords: Road traffic; road traffic management systems; intelligent systems; complex systems; multi-agent systems; graphs; real-time

PDF

Paper 32: Downlink and Uplink Message Size Impact on Round Trip Time Metric in Multi-Hop Wireless Mesh Networks

Abstract: In this paper, the authors propose a novel real-time study metrics of Round Trip Time (RTT) for Multi-Hop Wireless Mesh Networks. They focus on real operational wireless networks with fixed nodes, such as industrial wireless networks. The main aim of the metric is to show the effect of the Downlink and Uplink message size (DMS and UMS) on RTT with and without Forward Error Correction (FEC), user data size without any headers, on RTT path between a source (Supervisory Control and Data Acquisition (SCADA) center) and a destination RTU (Remote Terminal Units). The metric assigns weights to links based on the RTT path of a packet size over the link path. They studied the performance of the metric by implementing it in three wireless scenarios consisting of 3, 4 and 5 nodes; each node represents a wireless radio IP router. They find that in a multi-hops environment, the real-time metric clearly shows the impact of DMS, UMS and FEC on RTT by making judicious use of the number of the hops.

Author 1: Youssra Chatei
Author 2: Maria Hammouti
Author 3: El Miloud Ar-reyouchi
Author 4: Kamal Ghoumid

Keywords: RTT; Remote wireless communications; Wireless radio router; Wireless multi-hop networks; Average message size; FEC; SCADA

PDF

Paper 33: Evaluating Predictive Algorithms using Receiver-Operative Characteristics for Coronary Illness among Diabetic Patients

Abstract: The grouping of information is a typical method in Machine learning. Information mining assumes a crucial part to extract learning from vast databases from operational databases. In medicinal services Data mining is a creating field of high significance, giving expectations and a more profound comprehension of restorative information sets. Most extreme information mining technique relies on an arrangement of elements that characterizes the conduct of the learning calculation furthermore straightforwardly or by implication impact of the multifaceted nature of models. Coronary illness is the main sources of death over the past years. Numerous scientists utilize a few information digging methods for the diagnosing of coronary illness. Diabetes is one of the incessant maladies that emerge when the pancreas does not deliver enough insulin. The vast majority of the frameworks have effectively utilized Machine learning strategies, for example, Naïve Bayes Algorithm, Decision Trees, logistic Regression and Support Vector Machines to name a few. These techniques solely rely on grouping of the information with respect to finding the heart variations from the norm. Bolster vector machine is an advanced strategy has been effectively in the field of machine learning. Utilizing coronary illness determination, the framework presented predicts using characteristics such as, age, sex, cholesterol, circulatory strain, glucose and the odds of a diabetic patient getting a coronary illness using machine learning algorithms.

Author 1: Tahira Mahboob
Author 2: Saman Sahaheen
Author 3: Nuzhat Tahir
Author 4: Mukhtiar Bano

Keywords: Artificial neural networks (ANN); Decision tree; Naïve Bayes; Logistic Regression and Clustering

PDF

Paper 34: Self-Protection against Insider Threats in DBMS through Policies Implementation

Abstract: In today’s world, information security of an organization has become a major challenge as well as a critical business issue. Managing and mitigating these internal or external security related issues, organizations hire highly knowledgeable security expert persons. Insider threats in database management system (DBMS) are inherently a very hard problem to address. Employees within the organization carry out or harm organization data in a professional manner. To protect and monitor organization information from insider user in DBMS, the organization used different techniques, but these techniques are insufficient to secure their data. We offer an autonomous approach to self-protection architecture based on policy implementation in DBMS. This research proposes an autonomic model for protection that will enforce Access Control policies, Database Auditing policies, Encryption policies, user authentication policies, and database configuration setting policies in DBMS. The purpose of these policies to restrict insider user or Database Administrator (DBA) from malicious activities to protect data.

Author 1: Farukh Zaman
Author 2: Basit Raza
Author 3: Ahmad Kamran Malik
Author 4: Adeel Anjum

Keywords: autonomic; self-protection; insider threats; policies; DBMS

PDF

Paper 35: A Low Complexity based Edge Color Matching Algorithm for Regular Bipartite Multigraph

Abstract: An edge coloring of a graph G is a process of assigning colors to the adjacent edges so that the adjacent edges represents the different colors. In this paper, an algorithm is proposed to find the perfect color matching of the regular bipartite multigraph with low time complexity. For that, the proposed algorithm is divided into two procedures. In the first procedure, the possible circuits and bad edges are extracted from the regular bipartite graph. In the second procedure, the bad edges are rearranged to obtain the perfect color matching. The depth first search (DFS) algorithm is used in this paper for traversing the bipartite vertices to find the closed path, open path, incomplete components, and bad edges. By the proposed algorithm, the proper edge coloring of D – regular bipartite multi-graph can be obtained in O (D.V) time.

Author 1: Rezaul Karim
Author 2: Muhammad Mahbub Hasan Rony
Author 3: Md. Rashedul Islam
Author 4: Md. Khaliluzzaman

Keywords: matching; edge-coloring; complexity; bipartite multigraph; DFS

PDF

Paper 36: AnyCasting In Dual Sink Approach (ACIDS) for WBASNs

Abstract: After successful development in health-care services, WBASN is also being used in other fields where continuous and distant health-care monitoring is required. Various suggested protocols presented in literature work to enhance the performance of WBASN by focusing on delay, energy efficiency and routing. In this research we focus to increase the stability period and throughput, while decreasing end-to-delay. Two sink nodes are utilized and concept of AnyCasting is introduced. In this research, we have presented a scheme AnyCasting In Dual Sink (ACIDS) for WBASN and compared it with existing protocols LAEEBA and DARE. The performance of ACIDS is found to be 51% and 13% efficient than LAEEBA and DARE respectively in throughput. Results show that, the stability period of ACIDS is much greater than LAEEBA and DARE with minimum delay. Energy parameter in ACIDS is in tradeoff with the improved parameters, due to the computation of RSSI which does more processing and utilizes more energy.

Author 1: Muhammad Rahim Baig
Author 2: Najeeb Ullah
Author 3: Fazle Hadi
Author 4: Sheeraz Ahmed
Author 5: Abdul Hanan
Author 6: Imran Ahmed

Keywords: Stability Period; WBASNs; Throughput; End-to-End Delay; Energy Consumption; AnyCasting; RSSI

PDF

Paper 37: Exploreing K-Means with Internal Validity Indexes for Data Clustering in Traffic Management System

Abstract: Traffic Management System (TMS) is used to improve traffic flow by integrating information from different data repositories and online sensors, detecting incidents and taking actions on traffic routing. In general, two decision making systems-weights updating and forecasting are integrated inside the TMS. The models need numerous data sets for making appropriate decisions. To determine the dynamic road weights in TMS, four (4) different environmental attributes are considered, which are directly or indirectly related to increase the traffic jam– rain fall, temperature, wind, and humidity. In addition, peak hour is taken as an additional attribute. Usually, the data sets are classified by instinct method. However, optimum classification on data sets is vital to improve the decision accuracy of the TMS. Collected data sets have no class label and thus, cluster based unsupervised classifications (partitioning, hierarchical, grid-based, density-based) can be used to find optimum number of classifications in each attribute, and expected to improve the performance of the TMS. Two most popular and frequently used classifiers are hierarchical clustering and partition clustering. K-means is simple, easy to implement, and easy to interpret the clustering results. It is also faster, because the order of time complexity is linear with the number of data. Thus, in this paper we are going to demonstrate the performance of partition k-means and hierarchical k-means with their implementations by Davies Boulder Index (DBI), Dunn Index (DI), Silhouette Coefficient (SC) methods to outline the optimal number classifications (features) inside each attribute of TMS data sets. Subsequently, the optimal classes are validated by using WSS (within sum of square) errors and correlation methods. The validation results conclude that k-means with DI performs better in all attributes of TMS data sets and provides more accurate optimum classification numbers. Thereafter, the dynamic road weights for TMS are generated and classified using the combined k-means and DI method.

Author 1: Sadia Nawrin
Author 2: Md Rahatur Rahman
Author 3: Shamim Akhter

Keywords: Traffic Management System (TMS); Data Clustering; K-means; Hierarchical Clustering; Cluster Validation

PDF

Paper 38: An Extensive Survey over Traffic Management/Load Balance in Cloud Computing

Abstract: Cloud Computing (CC) is all about carrying out processing in other's system. There are various vendors who provide CC services. The basic algorithm that should be met to access CC services is a need for steady internet connection. As everything is done online the traffic across the internet is to be managed efficiently so that the transmission delay can be minimized and better quality of service can be given to the customers. The network should not be too congested at any moment of time. Hence the traffic management becomes a crucial factor for the better performance of the CC network. This paper addressed the most valuable terms and topics concerning the load balance/traffic management in cloud computing. Also, the paper is meant to discuss the study analysis of the recent researches in load balance of CC. From the study analysis the current research gap is addressed with a future scope of research to overcome the research gap.

Author 1: Amith Shekhar C
Author 2: Dr. Sharvani. G S

Keywords: Cloud Computing; Load Balance; Traffic Management

PDF

Paper 39: Real-Time H.264/AVC Entropy Encoder Hardware Architecture in Baseline Profile

Abstract: In this paper, we present a new hardware architecture of an entropy encoder for an H.264/AVC video encoder. The proposed design aims to employ a parallel module at a pre-encoding stage to reduce a critical path. Additionally, the arithmetic table elimination method is used to eliminate the memory cost. Besides, the reduction in the size of VLC tables offers area saving. This architecture is synthesized on an FPGA Virtex IV. The simulation results show that this design can operate up to 234 MHz, which allows processing a 4CIF video format in real time.

Author 1: Ben Hamida Asma
Author 2: Dhahri Salah
Author 3: Zitouni Abdelkrim

Keywords: H.264/AVC; CAVLC; Exp-Golomb

PDF

Paper 40: A Comparison of Collaborative Access Control Models

Abstract: Collaborative environments need access control to data and resources to increase working cooperation efficiently yet effectively. Several approaches are proposed and multiple access control models are recommended in this domain. In this paper, four Role-Based Access Control (RBAC) based collaborative models are selected for analysis and comparison. The standard RBAC model, Team-based Access Control (TMAC) model, Privacy-aware Role-Based Access Control (P-RBAC) model and Dynamic Sharing and Privacy-aware RBAC (DySP-RBAC) model are used for experiments. A prototype is developed for each of these models and pros and cons of these models are discussed. Performance and sharing parameters are used to compare these collaborative models. The standard RBAC model is found better by having a quick response time for queries as compared to other RBAC models. The DySP-RBAC model outperforms other models by providing enhanced sharing capabilities.

Author 1: Ahmad Kamran Malik
Author 2: Abdul Mateen
Author 3: Muhammad Anwar Abbasi
Author 4: Basit Raza
Author 5: Malik Ahsan Ali
Author 6: Wajeeha Naeem
Author 7: Yousra Asim
Author 8: Majid Iqbal Khan

Keywords: RBAC; Collaboration; Privacy; Access control; Security; Information sharing

PDF

Paper 41: Measuring the Impact of the Blackboard System on Blended Learning Students

Abstract: With the advantages of using learning management systems (LMS) such as Blackboard in the educational process, assessing the impact of such systems has become increasingly important. This study measures the impact of the Blackboard system on students at Saudi Electronic University (SEU) in order to help improve the quality of existing learning environment. For this assessment and measurement, the IS-Impact Measurement Model is used, since it is the most comprehensive model that is valid in the context of this study. The results of this paper indicate how Blackboard is influencing individual performance. It concludes that the use of the Blackboard system has a positive impact on individuals.

Author 1: Thamer Alhussain

Keywords: learning management system; IS impact/measurement; Blackboard; blended learning

PDF

Paper 42: Design and Architecture of a Location and Time-based Mobile-Learning System: A Case-Study for Interactive Islamic Content

Abstract: This paper describes a software design, architecture and process of a novel mobile-learning (m-Learning) approach based on smart-phone devices for retrieving relevant content in real-time based on the user’s-location and the current-time and presenting the content to the user in a manner that support portable learning on-the-move. Mobile-learning using Islamic content is used as a case-study of the proposed system, which can easily be adapted for other learning-content. The proposed system is highly interactive and frequently purges the host-device for details of the current user-location and current-time (e.g. the time, day and month in the solar and the lunar calendars) before such details are used to retrieve the most relevant content. In this study, Quranic-verses, corresponding interpretations (Tafseer) and Hadith (Prophetic words or actions) relates to the online content being fetched in this application. For example, a user may be performing some travel/pilgrimage during Ramadan, in which the relevant content/teachings (based on the user’s location and the current time) are presented to the user in a timely manner in order to learn the rituals of that day or location. The information fetched is then presented and displayed in an interactive user-friendly manner. A summary and comparative analysis of some related applications is presented, showing the limitations of other m-Learning applications and demonstrating the new contribution of our architecture design. Finally, the described system allows authorized scholars to upload and report Islamic-decrees made in real-time based on findings/experience at a particular time and/or location-of-interest (e.g. the new rulings/decrees are then published online in real-time). It is anticipated that millions of end-users shall benefit from the proposed system through the benefits of fast, highly-accessible, user-friendly and relevant information retrieved online in real-time. Advantageously, the potential application and large impact of the proposed m-Learning approach for use with other learning-content/courses is notable.

Author 1: Omar Tayan
Author 2: Moulay Ibrahim El-Khalil Ghembaza
Author 3: Khalid Al-Oufi

Keywords: Mobile-Learning; Context-Aware Notifications; Time and Location Based Reporting; Interactive-Knowledge based User-Events and Activities; Design and Architecture

PDF

Paper 43: Computation of QoS While Composing Web Services

Abstract: Composition of web services has emerged as a fast growing field of research since an atomic service in its entirety is not capable to perform a specific task. Composition of web services is a process where a set of web services, heterogeneous in nature, are clubbed together in order to perform a specific task. Individually, Component web services may be performing well as far as Quality of Service (QoS) is concerned but the core issue is that while composing, do they satisfy Users requirements in terms of QoS? Computation of QoS while composing web services appears to be a big challenge. A lot of research work in this regard, has already been undertaken to come out with new, innovative and credible solutions for the same. This Paper presents a thorough review-study of different frameworks, architectures, methodologies and algorithms suggested by different researchers in their efforts to compute the overall QoS while composing web services. Moreover, Effectiveness of different methods in terms of QoS while composing is also presented.

Author 1: Khozema Ali Shabbar
Author 2: Dr. Tarun Shrimali
Author 3: Dr. Mohemmed Sha

Keywords: Web Services; Web Services Selection; Web Services Composition; Composite QoS (CQoS); Quality of Service (QoS)

PDF

Paper 44: Emotion Classification in Arousal Valence Model using MAHNOB-HCI Database

Abstract: Emotion recognition from physiological signals attracted the attention of researchers from different disciplines, such as affective computing, cognitive science and psychology. This paper aims to classify emotional statements using peripheral physiological signals based on arousal-valence evaluation. These signals are the Electrocardiogram, Respiration Volume, Skin Temperature and Galvanic Skin Response. We explored the signals collected in the MAHNOB-HCI multimodal tagging database. We defined the emotion into three different ways: two and three classes using 1-9 discrete self-rating scales and another model using 9 emotional keywords to establish the three defined areas in arousal-valence dimensions. To perform the accuracies, we began by removing the artefacts and noise from the signals, and then we extracted 169 features. We finished by classifying the emotional states using the support vector machine. The obtained results showed that the electrocardiogram and respiration volume were the most relevant signals for human’s feeling recognition task. Moreover, the obtained accuracies were promising comparing to recent related works for each of the three establishments of emotion modeling.

Author 1: Mimoun Ben Henia Wiem
Author 2: Zied Lachiri

Keywords: Emotion Classification; MAHNOB-HCI; Peripheral Physiological Signals; Arousal-Valence Space; Support Vector Machine

PDF

Paper 45: Performance Analysis of Route Redistribution among Diverse Dynamic Routing Protocols based on OPNET Simulation

Abstract: Routing protocols are the fundamental block of selecting the optimal path from a source node to a destination node in internetwork. Due to emerge the large networks in business aspect thus; they operate diverse routing protocols in their infrastructure. In order to keep a large network connected; the implementation of the route redistribution is needed in network routers. This paper creates the four scenarios on the same network topology by using Optimized Network Engineering Tools Modeler (OPNET 14.5) simulator in order to analyze the performance of the route redistribution among three routing protocols by configuring three protocols from a set of Routing Information Protocol (RIPv2), Enhanced Interior Gateway Routing Protocol (EIGRP), Open Shortest Path First (OSPF), and Intermediate System to Intermediate System (IS-IS) dynamic routing protocols on each scenario. The first scenario is EIGRP_OSPF_ISIS, the second scenario is EIGRP_OSPF_RIPv2, the third scenario is RIPv2_EIGRP_ISIS, and the fourth scenario is RIPv2_OSPF_ISIS. The simulation results showed that the RIPv2_EIGRP_ISIS scenario outperforms the other scenarios in terms of network convergence time, the hops number, jitter, packet delay variation, packet end to end delay; therefore, it fits real time applications such as voice and video conferencing. In contrast, the EIGRP_OSPF_ISIS scenario has better results compared with other scenarios in terms of response time in case of using web browsing, database query, and Email services.

Author 1: Zeyad Mohammad
Author 2: Ahmad Abusukhon
Author 3: Adnan A. Hnaif
Author 4: Issa S. Al-Otoum

Keywords: route redistribution; dynamic routing protocols; EIGRP; IS-IS; OSPF; RIPv2

PDF

Paper 46: Automatic Image Annotation based on Dense Weighted Regional Graph

Abstract: Automatic image annotation refers to create text labels in accordance with images' context automatically. Although, numerous studies have been conducted in this area for the past decade, existence of multiple labels and semantic gap between these labels and visual low-level features reduced its performance accuracy. In this paper, we suggested an annotation method, based on dense weighted regional graph. In this method, clustering areas was done by forming a dense regional graph of area classification based on strong fuzzy feature vector in images with great precision, as by weighting edges in the graph, less important areas are removed over time and thus semantic gap between low-level features of image and human interpretation of high-level concepts reduces much more. To evaluate the proposed method, COREL database, with 5,000 samples have been used. The results of the images in this database, show acceptable performance of the proposed method in comparison to other methods.

Author 1: Masoumeh Boorjandi
Author 2: Zahra Rahmani Ghobadi
Author 3: Hassan Rashidi

Keywords: automatic annotation; dense weighted regional graph; segmentation; feature vector

PDF

Paper 47: A New Comment on Reinforcement of Testing Criteria

Abstract: This paper presents the formal aspects of testing criteria for Safety Critical Systems. A brief review of testing strategies i.e. white box and black box is given along with their various criteria’s. Z Notation; a formal specification language is used to sever the purpose of formalization. Initially, the schemas are formed for Statement Coverage (SC), Decision coverage (DC), Path Coverage (PC), Equivalence Partition Class (EPC), Boundary Value Analysis (BV) and Cause & Effect (C&F). The completeness and correctness of test schema are enriched by verifying these with Z/EVES; a Theorem Prover tool for Z specification.

Author 1: Monika Singh
Author 2: Vinod Kumar Jain

Keywords: Formal Methods; Safety Critical System; Z Notation; Schema

PDF

Paper 48: Appraising Research Direction & Effectiveness of Existing Clustering Algorithm for Medical Data

Abstract: The applicability and effectiveness of clustering algorithms had unquestioningly benefitted solving various sectors of real-time problems. However, with the changing time, there is a significant change in forms of the data. This paper briefs about the different taxonomies of the clustering algorithm and highlights the frequently used techniques to understand the research popularity. We also discuss the existing direction of the research work and find that still there is a significant amount of open issues when it comes to clustering medical data. We find that existing techniques are quite symptomatic in nature on local problems in clustering while problems associated with complex medical data are yet to be explored by the researchers. We believe that this manuscript will give a good summary of the effectiveness of existing clustering techniques towards medical data as a contribution.

Author 1: Sudha V
Author 2: Girijamma H A

Keywords: Medical Data; Clustering Algorithm; k-Means Clustering; Fuzzy; Classification

PDF

Paper 50: Water Quality Monitoring based on Small Satellite Technology

Abstract: In order to improve the routine of water quality monitoring and reduce the risk of accidental or deliberate contaminations, this paper presents the development of in-situ water quality monitoring and analysis system based on small satellite technology. A space mission design and analysis was performed in this work. The system consists of three segments; space segment including a constellation of nano-satellites, ground segment entailing the ground station and user-segment containing the in-situ water quality sensors. The authors studied the orbit characteristics and the number of nano-satellites required to cover the Middle East and North Africa (MENA) which presents the most water scarce region of the world. Thus, 9 nano-satellites distributed in 5 low earth orbits (600 km) are needed to cover MENA region continuously for about all the day. Data collected by various sensors such as pH and temperature are sent through Software Defined Radio (SDR) module which is responsible for the satellite communication.

Author 1: N. Gallah
Author 2: O. b. Bahri
Author 3: N. Lazreg
Author 4: A. Chaouch
Author 5: Kamel Besbes

Keywords: space mission; nanosatellite; SDR; autonomous; on-line water monitoring

PDF

Paper 51: Crowdsensing: Socio-Technical Challenges and Opportunities

Abstract: With the advancement in mobile technology, the sensing and computational capability of mobile devices is increasing. The sensors in mobile devices are being used in a variety of ways to sense and actuate. Mobile crowdsensing is a paradigm that involves ordinary people to participate in a sensing task. This sensing model has the capability to provide a new vision of people centric sensing as a service. This research work reviewed different domains utilizing mobile crowdsensing for solving different domain specific problems. Mobile crowd sensing model is also posing different socio-technical challenges which needs to be addressed. The research work reviewed and analyzed a variety of socio-technical challenges of mobile crowdsensing and possible solutions presented by different studies. There are different socio-technical challenges but the challenge of privacy in crowdsensing requires extra measures to realize the vision of mobile crowdsensing.

Author 1: Javeria Noureen
Author 2: Muhammad Asif

Keywords: Crowdsensing; sensing devices; privacy; smart phones

PDF

Paper 52: Scalability and Performance of Selected Websites of Universities: An Analytical Study of Punjab (India)

Abstract: Today, education has emerged as a major area of commercial activities. The access to various University websites through Internet has opened up new opportunities for the beneficiaries. The creation of these websites fully serves the purpose of educational institutions in advancing and achieving their goals. The varied information made available on these websites and the minimum transaction response time to address the queries of end-users can go a long way to influence their decision in selecting a particular course and an institution. The issue assumes greater significance especially in a developing country like India where a website development and deployment activity is primarily facing the shortage of formalized website design techniques and testing procedures. The performance of most of the University websites is reasonably well, but when accessed by only a few concurrent users. Thus, the aim of this study is to analyze and compare the scalability and performance of selected University websites of Punjab (India) by means of load testing. Simulation of realistic users’ behavior is achieved through LoadRunner, a software tool for performance testing. Of all the University websites under study, on the basis of their scalability and performance, it has been found that the websites of Deemed and Central universities are the most and least efficient respectively. The findings of this study can be of great significance for the higher educational institutions in improving the performance quality of their websites resulting into their better ranking and satisfaction of the stakeholders. The paper also outlines the scope for further research in the area under study.

Author 1: Bhim Sain Singla
Author 2: Dr. Himanshu Aggarwal

Keywords: Hits per second; scalability; performance; throughput; transaction response time; university websites

PDF

Paper 53: A Proposed Framework to Investigate the User Acceptance of Personal Health Records in Malaysia using UTAUT2 and PMT

Abstract: Personal Health Records (PHRs) can be considered as one of the most important health technologies. PHRs enroll the patients directly to their health decision making through giving them the authority to control and share their health information. Testing the user acceptance toward new technology is a vital process. Over the previous decades many models have been used and the latest one was UTAUT2. UTAUT2 have been widely used in e-business and gaming user acceptance researches, whereas, it has been rarely used in health field. This study proposes a combination of UTAUT2 and PMT in order to investigate the user acceptance of PHRs. Relevant factors may be added at the literature review stage. The final model will be used as a framework to investigate the user acceptance of PHRs in Malaysia.

Author 1: Ali Mamra
Author 2: Abdul Samad Sibghatullah
Author 3: Gede Pramudya Ananta
Author 4: Malik Bader Alazzam
Author 5: Yasir Hamad Ahmed
Author 6: Mohamed Doheir

Keywords: PHRs; User Acceptance; UTAUT2; PMT; Malaysia

PDF

Paper 54: A Multi-Level Process Mining Framework for Correlating and Clustering of Biomedical Activities using Event Logs

Abstract: Cost, time and resources are major factors affecting the quality of hospitals business processes. Bio-medical processes are twisted, unstructured and based on time series making it difficult to do proper process modeling for them. On other hand, Process mining can be used to provide an accurate view of biomedical processes and their execution. Extracting process models from biomedical code sequenced data logs is a big challenge for process mining as it doesn’t provide business entities for workflow modeling. This paper explores application of process mining in biomedical domain through real-time case study of hepatitis patients. To generate event logs from big datasets, preprocessing techniques and LOG Generator tool is designed. To reduce complexity of generated process model, a multilevel process mining framework including text similarity clustering algorithm based on Levenshtein Distance is proposed for event logs to eliminate spaghetti processes. Social network models and four distinct types of sub workflow models are evaluated using specific process mining algorithms.

Author 1: Muhammad Rashid Naeem
Author 2: Hamad Naeem
Author 3: Muhammad Aamir
Author 4: Waqar Ali
Author 5: Waheed Ahmed Abro

Keywords: biomedical event data; business process modeling; Levenshtein similarity clustering; multilevel process mining; spaghetti process models

PDF

Paper 55: Area and Energy Efficient Viterbi Accelerator for Embedded Processor Datapaths

Abstract: Viterbi algorithm is widely used in communication systems to efficiently decode the convolutional codes. This algorithm is used in many applications including cellular and satellite communication systems. Moreover, Serializer-deserializers (SERDESs) having critical latency constraint also use viterbi algorithm for hardware implementation. We present the integration of a mixed hardware/software viterbi accelerator unit with an embedded processor datapath to enhance the processor performance in terms of execution time and energy efficiency. Later we investigate the performance of viterbi accelerated embedded processor datapath in terms of execution time and energy efficiency. Our evaluation shows that the viterbi accelerated Microblaze soft-core embedded processor datapath is three times more cycle and energy efficient than a datapath lacking a viterbi accelerator unit. This acceleration is achieved at the cost of some area overhead.

Author 1: Abdul Rehman Buzdar
Author 2: Liguo Sun
Author 3: Muhammad Waqar Azhar
Author 4: Muhammad Imran Khan
Author 5: Rao Kashif

Keywords: Viterbi decoder; Codesign; FPGA; MicroBlaze; Embedded Processor

PDF

Paper 56: Comparison of Localization Free Routing Protocols in Underwater Wireless Sensor Networks

Abstract: Underwater Wireless Sensor Network (UWSN) is newly developed branch of Wireless Sensor network (WSN). UWSN is used for exploration of underwater resources, oceanographic data collection, flood or disaster prevention, tactical surveillance system and unmanned underwater vehicles. UWSN uses sensors of small size with a limited energy, memory and allows limited range for communication. Due to multiple differences from terrestrial sensor network, radio waves cannot be used over here. Acoustic channel are used for communication in deep water, which has many limitations like low bandwidth, high end to end delay and path loss. With the above limitations while using acoustic waves, it is very important to develop energy efficient and reliable protocols. Energy efficient communication in underwater networks has become uttermost need of UWSN technology. The main aim nowadays is to operate sensor with smaller battery for a longer time. This paper will analyse various routing protocols in the area of UWSN through simulation. This paper will analyse Depth Based Routing (DBR), Energy Efficient Depth Based Routing (EEDBR) and Hop by Hop Dynamic Addressing Based (H2-DAB) protocol through simulation. This comparison is carried out on the basis of total consumed energy, end to end delay, path loss and data delivery ratio.

Author 1: Muhammad Khalid
Author 2: Awais Adnan
Author 3: Zahid Ullah
Author 4: Waqar Khalid
Author 5: Naveed Ahmad
Author 6: Ahsan Ashfaq

Keywords: Underwater Networks; Sensor; Wireless Communication; Survey; Localization Based; Routing; Protocols

PDF

Paper 57: Dynamic Gesture Classification for Vietnamese Sign Language Recognition

Abstract: This paper presents an approach of feature extraction and classification for recognizing continuous dynamic gestures corresponding to Vietnamese Sign Language (VSL). Input data are captured by the depth sensor of a Microsoft Kinect, which is almost not affected by the light of environment. In detail, each gesture is represented by a volume corresponding to a sequence of depth images. The feature extraction stage is performed by dividing such volume into a 3D grid of same-size blocks in which each one is then converted into a scalar value. This step is followed by the process of classification. The wellknown method Support Vector Machine (SVM) is employed in this work, and the Hidden Markov Model (HMM) technique is also applied in order to provide a comparison on recognition accuracy. Besides, a dataset of 3000 samples corresponding to 30 dynamic gestures in VSL was created by 5 volunteers. The experiments on this dataset to validate the approach and that shows the promising results with average accuracy up to 95%.

Author 1: Duc-Hoang Vo
Author 2: Huu-Hung Huynh
Author 3: Phuoc-Mien Doan
Author 4: Jean Meunier

Keywords: Dynamic gesture; feature extraction; depth information; Vietnamese Sign Language

PDF

Paper 58: High Performance of Hash-based Signature Schemes

Abstract: Hash-based signature schemes, whose security is based on properties of the underlying hash functions, are promising candidates to be quantum-safe digital signatures schemes. In this work, we present a software implementation of two recent standard proposals for hash-based signature schemes, Leighton and Micali Signature (LMS) scheme and Extended Merkle Signature Scheme (XMSS), using a set of AVX2 instructions on Intel processors. The implementation uses several optimization techniques for speeding up the underlying hash functions SHA2 or SHA3, and other building block functions which lead to high performance for signature operations on both schemes. On an Intel Skylake processor, using a tree of height 60 with 12 layers, the signing operation for XMSS takes 3,841,199 cycles (1,043 signatures per second) at 128-bit security level (against quantum attacks). For an equivalent security, the LMS system computes a signature in 1,307,376 cycles (3,065 signatures per second). We also provide the first comparative performance results for signing and verification of both schemes using different parameters. The results of our implementation indicate that both schemes LMS and XMSS can achieve high performance using vector instructions on modern processors.

Author 1: Ana Karina D. S. de Oliveira
Author 2: Julio L´opez
Author 3: Roberto Cabral

Keywords: post-quantum cryptography; digital signature; Merkle signature; LMS; XMSS

PDF

Paper 59: JSEA: A Program Comprehension Tool Adopting LDA-based Topic Modeling

Abstract: Understanding a large number of source code is a big challenge for software development teams in software maintenance process. Using topic models is a promising way to automatically discover feature and structure from textual software assets, and thus support developers comprehending programs on software maintenance. To explore the application of applying topic modeling to software engineering practice, we proposed JSEA (Java Software Engineers Assistant), an interactive program comprehension tool adopting LDA-based topic modeling, to support developers during performing software maintenance tasks. JSEA utilizes essential information automatically generated from Java source code to establish a project overview and to bring search capability for software engineers. The results of our preliminary experimentation suggest the practicality of JSEA.

Author 1: Tianxia Wang
Author 2: Yan Liu

Keywords: Java program comprehension; Topic models; Interactive tool

PDF

Paper 60: Missing Data Imputation using Genetic Algorithm for Supervised Learning

Abstract: Data is an important asset for any organization to successfully run its business. When we collect data, it contains data with low qualities such as noise, incomplete, missing values etc. If the quality of data is low then mining results of any data mining algorithm will also below. In this paper, we propose a technique to deal with missing values. Genetic algorithm (GA) is used for the estimation of missing values in datasets. GA is introduced to generate optimal sets of missing values and information gain (IG) is used as the fitness function to measure the performance of an individual solution. Our goal is to impute missing values in a dataset for better classification results. This technique works even better when there is a higher rate of missing values or incomplete information along with a greater number of distinct values in attributes/features having missing values. We compare our proposed technique with single imputation techniques and multiple imputations (MI) statistically based approaches on various benchmark classification techniques on different performance measures. We show that our proposed methods outperform when compare with another state of the art missing data imputation techniques.

Author 1: Waseem Shahzad
Author 2: Qamar Rehman
Author 3: Ejaz Ahmed

Keywords: genetic algorithm; information gain; missing data; supervised learning

PDF

Paper 61: Multitaper MFCC Features for Acoustic Stress Recognition from Speech

Abstract: Ameliorating the performances of speech recognition system is a challenging problem interesting recent researchers. In this paper, we compare two extraction methods of Mel Frequency Cepstral Coefficients used to represent stressed speech utterances in order to obtain best performances. The first method known as traditional is based on single window (taper) generally the Hamming window and the second one is a novel technique developed with multitapers instead of a single taper. The extracted features are then classified using the multiclass Support Vector Machines. Experimental results on the SUSAS database have shown that the multitaper MFCC features outperform the conventional MFCCs.

Author 1: Salsabil Besbes
Author 2: Zied Lachiri

Keywords: Mel Frequency Cepstral Coefficients (MFCC); Multitapering; Multiclass SVM; Stress recognition

PDF

Paper 62: Rule Adaptation in Collaborative Working Environments using RBAC Model

Abstract: Collaborative Working Environments (CWEs) are getting prominence these days. With the increase in the use of collaboration tools and technologies, a lot of sharing and privacy issues have also emerged. Due to its dynamic nature, a CWE needs to adapt the changes into accordingly. In this paper, we have implemented the Adaptive Dynamic Sharing and Privacy-aware Role Based Access Control (Adaptive DySP-RBAC) model which provides user’s information privacy to dynamically adapt the changes occurring in the system at any time. The proposed model has been implemented as a prototype and tested. Results have shown that our system efficiently and effectively adapts access rules according to the changes happening in a CWE along with preserving the user’s information privacy in the system.

Author 1: Ahmad Kamran Malik
Author 2: Abdul Mateen
Author 3: Yousra Asim
Author 4: Basit Raza
Author 5: Muhammad Anwar
Author 6: Wajeeha Naeem
Author 7: Malik Ahsan Ali

Keywords: Dynamic Adaptation; RBAC; Privacy; Collaboration

PDF

Paper 63: Autonomous Software Installation using a Sequence of Predictions from Bayesian Networks

Abstract: The idea of automated installation/un-installation is a direct consequence of the tedious and time consuming manual efforts put into installing or uninstalling multiple software over hundreds of machines. In this work we propose what is to the best of our knowledge the first learnable method of autonomous software installation/un-installation. The method leverages text classification using as data textual guidelines given for users on the installation window. This is used to arrive at the Next/Pause/Abort decisions for each installation window using multiple classifier schemes. We report the best results using a full Bayesian Network with accuracy level of 94%, while Na¨ive Bayes and rule-based inference accuracy was 42% and 88%. We attribute this to the sequential nature of the Bayesian network that corresponds to the sequential nature of natural language data.

Author 1: Behraj Khan
Author 2: Umar Manzoor
Author 3: Tahir Syed

Keywords: Multiagent System; Machine Learning; Software installation/un-installation

PDF

Paper 64: Generation of Sokoban Stages using Recurrent Neural Networks

Abstract: Puzzles and board games represent several important classes of AI problems, but also represent difficult complexity classes. In this paper, we propose a deep learning based alternative to train a neural network model to find solution states of the popular puzzle game Sokoban. The network trains against a classical solver that uses theorem proving as the oracle of valid and invalid games states, in a setup that is similar to the popular adversarial training framework. Using our approach, we have been able to verify the validity of a Sokoban puzzle up to an accuracy of 99% on the test set. We have also been able to train our network to generate the next possible state of the puzzle board up to an accuracy of 99% on the validation set. We hope that through this approach, a trained neural network will be able to replace human experts and classical rule-based AI in generating new instances and solutions for such games.

Author 1: Muhammad Suleman
Author 2: Farrukh Hasan Syed
Author 3: Tahir Q. Syed
Author 4: Saqib Arfeen
Author 5: Sadaf I. Behlim
Author 6: Behroz Mirza

Keywords: Stepwise Cooperative Training; Generative Networks; Recurrent Neural Networks; Sokoban; Puzzles; Deep Learning

PDF

Paper 65: Automatic Conditional Switching (ACS), an Incremental Enhancement to TCP-Reno/RTP to Improve the VoIPv6 Performance

Abstract: In this research work an Automatic Conditional Switching Protocol (ACSP) is proposed, which is a conditional switching method between Delay based TCP-Reno and RTP (Real-Time Transport Protocol). It is a delay constrained method based on the VoIPv6 delay limit stated by the Internet Engineering Task Forth (IETF), which is 150 milliseconds in accordance with the ITU G.114 standard recommendation (G.114 International Telecommunication Union, 1994) which recommended that the permissible amount of delay in VoIP to be less than or equal to 150 milliseconds in order to maintain the voice quality. This proposed Automatic Control Switching (ACS) should be implemented in the routers and switches in the protocol layer of the VoIPv6 network to improve VoIPv6 performance. The system can be defined simply as combination of TCP Reno/UDP (RTP) with Automatic Conditional Switching. This Automatic Conditional Switching is based on Delay based Congestion Avoidance (DCA)

Author 1: Asaad Abdallah Yousif Malik Abusin
Author 2: Junaidi Abdullah
Author 3: Tan Saw Chin

Keywords: TCP Reno; VoIPv6 Performance; VoIPv6 improvements

PDF

Paper 66: Design of 1-bit Comparator using 2 Dot 1 Electron Quantum-Dot Cellular Automata

Abstract: In nanotechnologies, quantum-dot cellular automata (QCA) offer promising and attractive features for nano-scale computing. QCA effectively overcomes the scaling shortfalls of CMOS technology. One of the variants of QCA is 4 Dot 2 Electron QCA which is well explored and researched. The main concentration of this study is on 2 Dot 1 Electron QCA, an emerging variant of QCA. A novel and efficient XOR gate based on 2 Dot 1 Electron QCA is designed. Moreover a comparator using the proposed novel XOR gate is presented in this present scope. The proposed architecture is justified using a well-accepted standard mathematical function based on Coulomb’s law. Energy and power dissipation of the architecture are analyzed using different energy parameters. AS the compactness of proposed design is 76.4% the design met high degree of compactness and better efficiency.

Author 1: Angona Sarker
Author 2: Md. Badrul Alam Miah
Author 3: Ali Newaz Bahar

Keywords: QCA; 2 Dot 1 Electron QCA; Comparator; Coulomb’s principle

PDF

The Science and Information (SAI) Organization
BACK TO TOP

Computer Science Journal

  • About the Journal
  • Call for Papers
  • Submit Paper
  • Indexing

Our Conferences

  • Computing Conference
  • Intelligent Systems Conference
  • Future Technologies Conference
  • Communication Conference

Help & Support

  • Contact Us
  • About Us
  • Terms and Conditions
  • Privacy Policy

© The Science and Information (SAI) Organization Limited. All rights reserved. Registered in England and Wales. Company Number 8933205. thesai.org