The Science and Information (SAI) Organization
  • Home
  • About Us
  • Journals
  • Conferences
  • Contact Us

Publication Links

  • IJACSA
  • Author Guidelines
  • Publication Policies
  • Digital Archiving Policy
  • Promote your Publication
  • Metadata Harvesting (OAI2)

IJACSA

  • About the Journal
  • Call for Papers
  • Editorial Board
  • Author Guidelines
  • Submit your Paper
  • Current Issue
  • Archives
  • Indexing
  • Fees/ APC
  • Reviewers
  • Apply as a Reviewer

IJARAI

  • About the Journal
  • Archives
  • Indexing & Archiving

Special Issues

  • Home
  • Archives
  • Proposals
  • Guest Editors
  • SUSAI-EE 2025
  • ICONS-BA 2025
  • IoT-BLOCK 2025

Future of Information and Communication Conference (FICC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Computing Conference

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Intelligent Systems Conference (IntelliSys)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Future Technologies Conference (FTC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact
  • Home
  • Call for Papers
  • Editorial Board
  • Guidelines
  • Submit
  • Current Issue
  • Archives
  • Indexing
  • Fees
  • Reviewers
  • Subscribe

IJACSA Volume 2 Issue 4

Copyright Statement: This is an open access publication licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.

View Full Issue

Paper 1: Anthropomorphic User Interface Feedback in a Sewing Context and Affordances

Abstract: The aim of the authors' research is to gain better insights into the effectiveness and user satisfaction of anthropomorphism at the user interface. Therefore, this paper presents a between users experiment and the results in the context of anthropomorphism at the user interface and the giving of instruction for learning sewing stitches. Two experimental conditions were used, where the information for learning sewing stitches was the same. However the manner of presentation was varied. Therefore one condition was anthropomorphic and the other was non-anthropomorphic. Also the work is closely linked with Hartson's theory of affordances applied to user interfaces. The results suggest that facilitation of the affordances in an anthropomorphic user interface lead to statistically significant results in terms of effectiveness and user satisfaction in the sewing context. Further some violation of the affordances leads to an interface being less usable in terms of effectiveness and user satisfaction.

Author 1: Dr Pietro Murano
Author 2: Tanvi Sethi

Keywords: anthropomorphism; affordances; user interface evaluation.

PDF

Paper 2: Digital Image Watermarking Technique Based on Different Attacks

Abstract: Digital watermarking is used to hide the information inside a signal, which cannot be easily extracted by the third party. Its widely used application is copyright protection of digital information. It is different from the encryption in the sense that it allows the user to access, view and interpret the signal but protect the ownership of the content. One of the current research areas is to protect digital watermark inside the information so that ownership of the information cannot be claimed by third party. With a lot of information available on various search engines, to protect the ownership of information is a crucial area of research. In recent year, several digital watermarking techniques are presented based on discrete cosine transform (DCT), discrete wavelets transform (DWT) and discrete fourier transforms (DFT). In this paper, we proposed an algorithm for digital image watermarking technique based on singular value decomposition; both of the L and U components are explored for watermarking algorithm. This technique refers to the watermark embedding procedure and watermark extracting procedure. Digital image watermarking techniques for copyright protection is robust. The experimental results prove that the quality of the watermarked image is good and that there is strong resistant against many attacks. The image watermarking techniques help to achieve artificial intelligence. Digital image watermarking is the most effective solution in this area and its use to protect the information is increasingly exponentially day by day.

Author 1: Manjit Thapa
Author 2: Dr. Sandeep Kumar Sood
Author 3: A.P Meenakshi Sharma

Keywords: Digital image watermarkin;, copyright protection; Singular value decomposition; Watermark embedding procedure; Watermark extracting procedure.

PDF

Paper 3: A Reliable Security Model Irrespective of Energy Constraints in Wireless Sensor Networks

Abstract: Wireless Sensor Networks (WSNs) are one of the most exciting and challenging research areas. It is an emerging technology that shows various applications both for public and military purpose. In order to operate these applications successfully, it is necessary to maintain privacy and secrecy of the transmitted data. In this paper, we have presented a Reliable Security Model (RSM) for WSNs. To incorporate the security, we are using four keys out of which two are static and remaining two are dynamic. One of the static key is obtained by composition of Q number of keys, and other is real-time MAC ID (RTMAC). Dynamic keys are computed on fly and keep on changing each time when the network is synchronized. In RSM, the synchronization time is less than the time required to compromise any node by an adversary, so that even if some nodes get compromised, the keying materials of the node have already been changed.

Author 1: D Prasad
Author 2: Manik Gupta
Author 3: R. B. Patel

Keywords: Wireless sensor network (WSN); Sensor Node (SN); Base Station (BS); Static Keys; Dynamic Keys; Real-Time MAC ID (RTMAC).

PDF

Paper 4: Annotations, Collaborative Tagging, and Searching Mathematics in E-Learning

Abstract: This paper presents a new framework for adding semantics into e-learning system. The proposed approach relies on two principles. The first principle is the automatic addition of semantic information when creating the mathematical contents. The second principle is the collaborative tagging and annotation of the e-learning contents and the use of an ontology to categorize the e-learning contents. The proposed system encodes the mathematical contents using presentation MathML with RDFa annotations. The system allows students to highlight and annotate specific parts of the e-learning contents. The objective is to add meaning into the e-learning contents, to add relationships between contents, and to create a framework to facilitate searching the contents. This semantic information can be used to answer semantic queries (e.g., SPARQL) to retrieve information request of a user. This work is implemented as an embedded code into Moodle e-learning system.

Author 1: Iyad Abu Doush
Author 2: Faisal Alkhateeb
Author 3: Eslam Al Maghayreh
Author 4: Izzat Alsmadi
Author 5: Samer Samarah

Keywords: Semantic Web; MathML; Adaptive e-learning; Folksonomies; Collaborative tagging.

PDF

Paper 5: Dimensionality Reduction technique using Neural Networks – A Survey

Abstract: A self-organizing map (SOM) is a classical neural network method for dimensionality reduction. It comes under the unsupervised class. SOM is a neural network that is trained using unsupervised learning to produce a low-dimensional, discretized representation of the input space of the training samples, called a map. SOM uses a neighborhood function to preserve the topological properties of the input space. SOM operates in two modes: training and mapping. Using the input examples, training builds the map. It is also called as vector quantization. In this paper, we first survey related dimension reduction methods and then examine their capabilities for face recognition. In this work, different dimensionality reduction techniques such as Principal component analysis [PCA], independent component analysis [ICA] and self-organizing map [SOM] are selected and applied in order to reduce the loss of classification performance due to changes in facial expression. The experiments were conducted on ORL face database and the results show that SOM is a better technique.

Author 1: Shamla Mantri
Author 2: Nikhil S. Tarale
Author 3: Sudip C. Mahajan

Keywords: Principal component analysis [PCA]; Independent component analysis [ICA]; self-organizing map [SOM]; Face recognition.

PDF

Paper 6: A Novel approach for Implementing Security over Vehicular Ad hoc network using Signcryption through Network Grid

Abstract: Security over Vehicular ad hoc network and identifying accurate vehicle location has always been a major challenge over VANET. Even though GPS system can be used to identify the location of the vehicle they too suffer from major drawbacks. A novel approach has been suggested by the author wherein the VANET is made more secured by using Signcryption technique and at the same time unique approach of using Network Grid to flawlessly identify the location of the vehicle has been proposed.

Author 1: Vijayan R
Author 2: Sumitkumar Singh

Keywords: Network Grid; Computation Server; Vehicular Node; Public/Private keys.

PDF

Paper 7: Performance Analysis of MIMO-OFDM System Using Singular Value Decomposition and Water Filling Algorithm

Abstract: In this paper, MIMO is paired up with OFDM to improve the performance of wireless transmission systems. Multiple antennas are employed both at the transmitting as well as receiving ends. The performance of an OFDM system is measured, considering multipath delay spread, channel noise, Rayleigh fading channel and distortion. In this paper, bits are generated and then mapped with modulation schemes such as QPSK, 8PSK, and QAM. Then, the mapped data is divided into blocks of 120 modulated data where a training sequence of the data is inserted both at the beginning and ending parts of the block. The equalization is used to determine the variation to the rest of data. The singular value decomposition (SVD) and water filling algorithm have been employed to measure the performance of the MIMO-OFDM integrated systems. Therefore, the capacity is increased by transmitting different streams of data through different antennas at a same carrier frequency. Any intersymbol interference (ISI) produced after the transmission is recovered by using spatial sampling integrated with the signal processing algorithm. Furthermore, the performance remains the same with different combinations of transmitting and receiving antennas.

Author 1: Md. Noor-A-Rahim
Author 2: Md. Saiful Islam
Author 3: Md. Nashid Anjum
Author 4: Md. Kamal Hosain
Author 5: Abbas Z. Kouzani
Author 6:

Keywords: MIMO; OFDM; ISI; SVD; Water filling algorithm

PDF

Paper 8: FPGA Based Cipher Design & Implementation of Recursive Oriented Block Arithmetic and Substitution Technique (ROBAST)

Abstract: Proposed FPGA based technique considers a message as a binary string on which ROBAST is applied. A block of n-bits is taken as an input stream, where n ranges from 8 to 256 – bit, then ROBAST is applied in each block to generate intermediate stream, any one intermediate stream is considered as a cipher text. The same operation is performed repeatedly on various block sizes. It is a kind of block cipher and symmetric in nature hence decoding is done in similar manner. This paper also presents an efficient hardware realization of the proposed technique using state-of-the-art Field Programmable Gate Array (FPGA). The technique is also coded in C programming language and Very High Speed Integrated Circuit Hardware Description Language (VHDL). Various results and comparisons have been performed against industrially accepted RSA and TDES. A satisfactory results and comparisons are found.

Author 1: Rajdeep Chakraborty
Author 2: JK Mandal, Professor

Keywords: VHDL, FPGA, RTL, Block Cipher, Session key and Private Key, Cryptography, Symmetric/Private key cryptosystem.

PDF

Paper 9: Create a Virtual Mannequin Through the 2-D Image-based Anthropometric Measurement and Radius Distance Free Form Deformation

Abstract: 3-D human body models are used in a wild spectrum of applications, such as film and entertainment industry, that require images of human replicas, but the computer generated models of human body generally do not adequately model the complex human morphology. These models do not reflect the realistic anthropometric data and are not specific enough for commercial use. This paper presents an approach to adjust virtual mannequins through the use of anthropometric measurement data, which are obtained from 2-D image-base measurement. In this approach, a novel method which used the Chinese medicine acupuncture theory for fast position locating and human body slice model to approach circumferences is proposed to 2-D image-based anthropometric measurement. The measurement data are used in grouping 3-D scanned body objects into clusters. The virtual mannequins are then adjusted by using the measurement data of the standard model that belong to its cluster. In this way, the realistic accurate virtual mannequins are created.

Author 1: Sheng Fuu Lin
Author 2: Shih-Che Chien

Keywords: human body; anthropometric measurement; free form deformation deformation

PDF

Paper 10: Coordinate Rotation Digital Computer Algorithm: Design and Architectures

Abstract: COordinate Rotation DIgital Computer (CORDIC) algorithm has potential for efficient and low-cost implementation of a large class of applications which include the generation of trigonometric, logarithmic and transcendental elementary functions, complex number multiplication, matrix inversion, solution of linear systems and general scientific computation. This paper presents a brief overview of the developments in the CORDIC algorithm and its architectures.

Author 1: Naveen Kumar
Author 2: Amandeep Singh Sappal

Keywords: CORDIC Algorithms; CORDIC Architectures; FPGA.

PDF

Paper 11: Managing Knowledge in Development of Agile Software

Abstract: Software development is a knowledge-intensive work and the main attention is how to manage it. The systematic reviews of empirical studies presents, how knowledge management is used in software engineering and development work. This paper presents how knowledge is used in agile software development and how knowledge is transferred to agile software using agile manifesto. It then argues for the need to scale agile development strategies in knowledge management to address the full delivery. The paper explores the eight agile software scaling factors with knowledge management and their implication for successfully scaling of agile software delivery to meet the real world needs of software development organization.

Author 1: Mohammed Abdul Bari
Author 2: Dr. Shahanawaj Ahamad

Keywords: Knowledge management; Agile software; Scaling factor; Agility; Knowledge capturing

PDF

Paper 12: Efficient Retrieval of Text for Biomedical Domain using Data Mining Algorithm

Abstract: Data mining, a branch of computer science [1], is the process of extracting patterns from large data sets by combining methods from statistics and artificial intelligence with database management. Data mining is seen as an increasingly important tool by modern business to transform data into business intelligence giving an informational advantage. Biomedical text retrieval refers to text retrieval techniques applied to biomedical resources and literature available of the biomedical and molecular biology domain. The volume of published biomedical research, and therefore the underlying biomedical knowledge base, is expanding at an increasing rate. Biomedical text retrieval is a way to aid researchers in coping with information overload. By discovering predictive relationships between different pieces of extracted data, data-mining algorithms can be used to improve the accuracy of information extraction. However, textual variation due to typos, abbreviations, and other sources can prevent the productive discovery and utilization of hard-matching rules. Recent methods of soft clustering can exploit predictive relationships in textual data. This paper presents a technique for using soft clustering data mining algorithm to increase the accuracy of biomedical text extraction. Experimental results demonstrate that this approach improves text extraction more effectively that hard keyword matching rules.

Author 1: Sumit Vashishta
Author 2: Dr. Yogendra Kumar Jain

Keywords: Data mining; Biomedical text extraction; Biomedical text mining.

PDF

Paper 13: Design and Performance Analysis of Microstrip Array Antennas with Optimum Parameters for X-band Applications

Abstract: This paper demonstrates simple, low cost and high gain microstrip array antennas with suitable feeding techniques and dielectric substrate for applications in GHz frequency range. The optimum design parameters of the antenna are selected to achieve the compact dimensions as well as the best possible characteristics such as high radiation efficiency, high gain, etc. In this paper different microstrip array antennas such as series feed, corporate feed and corporate- series feed are designed, simulated, analyzed and compared regarding to the antenna performances. The designed antennas are 4x1, 4x1, and 4x2 arrays. The optimum feeding system is decided based on the various antenna parameters that are simulated. The simulation has been performed by using SONNET version V12.56 simulator which is a commercially available antenna simulator. The designed antennas provide return losses in the range of -4.21dB to -25.456dB at frequencies around 10GHz by using Taconic TLY-5 dielectric substrate with permittivity, er= 2.2 and height, h =1.588 mm. The gain of these simulated antennas is found about 15dB and side lobe label is maintained lower than main lobe. Since, the resonance frequency of these antennas is around 10GHz, these antennas are suitable for X-band applications such as satellite communication, radar, medical applications, and other wireless systems.

Author 1: Tanvir Ishtaique ul Huque
Author 2: Md. Kamal Hosain
Author 3: Md. Shihabul Islam
Author 4: Md. Al-Amin Chowdhury

Keywords: microstrip antenna; array antenna; corporate-series feed array; corporate feed array; series feed array

PDF

Paper 14: Backpropagation with Vector Chaotic Learning Rate

Abstract: In Neural Network (NN) training, local minimum is an integrated problem. In this paper, a modification of standard backpropagation (BP) algorithm, called backpropagation with vector chaotic learning rate (BPVL) is proposed to improve the performance of NNs. BPVL method generates a chaotic time series as Vector form of Mackey Glass and logistic map. A rescaled version of these series is used as learning rate (LR). In BP training the weights of NN become inactive, after arrival of local minima in the training session. Using integrated chaotic learning rate, the weight update accelerated in the local minimum region. BPVL is tested on six real world benchmark classification problems such as breast cancer, diabetes, heart disease, australian credit card, horse and glass. The proposed BPVL outperforms the existing BP and BPCL in terms of generalization ability and also convergence rate.

Author 1: A.M. Numan Al Mobin
Author 2: Mobarakol Islam
Author 3: Md. Rihab Rana
Author 4: Md. Masud Rana
Author 5: Kaustubh Dhar
Author 6: Tajul Islam
Author 7: Md. Rezwan
Author 8: M. Hossain

Keywords: Neural network; backpropagation; BPCL; BPVL chaos; generalization ability; convergence rate.

PDF

Paper 15: A study on classification of EEG Data using the Filters

Abstract: In the field of data mining, classification of data is being a difficult task for further analysis. Classifying the EEG data would require more efficient algorithms. In this paper the classification filters such as Fast Hartley Transform (FHT) and Chebyshev filters are used to classify the EEG data signals. In a bulk data set of EEG signals, the signals are classified into many channels. Though various filters are available for classification, FHT with Chebyshev and FT tree only are taken to know the efficiency in classifying the EEG data signals. When these filters are applied to the data instances the percentage of correctly classified instances is high. Based on the experimental result it is suggested that these filters could be used for the enhancement of classification of EEG data.

Author 1: V Baby Deepa
Author 2: Dr. P. Thangaraj

Keywords: EEG (Electro-encephalogram); BCI (Brain Computer Interface; FHT (Fast Hartley Transform); Chebyshev filters; FT tree.

PDF

Paper 16: An Advanced Technology Selection Model using Neuro Fuzzy Algorithm for Electronic Toll Collection System

Abstract: Selecting an optimum advanced technology system for an organization is one of the most crucial issues in any industry. Any technology system which makes business process more efficient and business management more simplified is one of the important Information System (IS) to the organization. The comprehensive framework is a three-phase approach which introduces two main ideas, one is the adopting of the McCall software quality model which is extracted from technology management essentials, and use the factors of McCall software quality model to be some of the technology selection criteria. Another major point is implementing and proposing a model based on this research using Neuro-Fuzzy algorithm to evaluate advance technology selection. This paper includes the concept of a new multi attribute selection process which combines both the Fuzzy logic (linguistic) and Neural network (integral valuation) methodology to evaluate or estimate a technology for Electronic Toll Collection System. Managers will be able to use this model for selecting a new technology in to their organization.

Author 1: D R Kalbande
Author 2: Nilesh Deotale
Author 3: Priyank Singhal
Author 4: Sumiran Shah
Author 5: G.T.Thampi

Keywords: Neural Network; Fuzzy Logic; Technology Integration; Technology Evaluation.

PDF

Paper 17: Energy-Efficient, Noise-Tolerant CMOS Domino VLSI Circuits in VDSM Technology

Abstract: Compared to static CMOS logic, dynamic logic offers good performance. Wide fan-in dynamic logic such as domino is often used in performance critical paths, to achieve high speeds where static CMOS fails to meet performance objectives. However, domino gates typically consume higher dynamic switching and leakage power and display weaker noise immunity as compared to static CMOS gates. Keeping in view of the above stated problems in previous existing designs, novel energy-efficient domino circuit techniques are proposed. The proposed circuit techniques reduced the dynamic switching power consumption; short-circuit current overhead, idle mode leakage power consumption and enhanced evaluation speed and noise immunity in domino logic circuits. Also regarding performance, these techniques minimize the power-delay product (PDP) as compared to the standard full-swing circuits in deep sub micron CMOS technology. Also the noise immunity of the CMOS Domino circuits with various techniques and keepers are analyzed. Various noise sources are considered and noise immune domino logic is proposed.

Author 1: Salendra Govindarajulu
Author 2: Dr.T.Jayachandra Prasad
Author 3: C.Sreelakshmi
Author 4: Chandrakala
Author 5: U.Thirumalesh

Keywords: Dynamic; Domino; Noise Margin; Very Deep submicron technology; High speed; Power consumption; Power delay product (PDP).

PDF

Paper 18: E-Shape Micro strip Patch Antenna on Different Thickness for pervasive Wireless Communication

Abstract: In this Paper Presents the result for different standard thickness values, and the result is performed by thickness of 31 mile, Ku- band frequency 12GHz are gives the best result. The antenna has become a necessity for many applications in recent wireless communications, such as Radar, Microwave and space communication. The proposed antenna design on different thickness and analyzed result of all thickness between 1GHz to 15GHz frequency, When the proposed antenna design on a 31 mil RT DUROID 5880 substrate from Rogers-Corp with dielectric constant of 2.2 and loss tangent of 0.0004. At 12GHz the verify and tested result on IE3D SIMULATOR are Return loss = -23.08dB, VSWR = 1.151, Directivity = 11dBi, Gain = 4dBi, 3 dB beam width = 35.5575 degrees, Mismatch loss= -0.0289842dB is very low, Efficiency= 65.3547%, All results shown in Simulation results. The Return losses and VSWR results shown in Table 1, Table2 respectively.

Author 1: Neenansha Jain
Author 2: Anubhuti Khare
Author 3: Rajesh Nema

Keywords: Micro strip antenna; IE3D SIMULATOR; Dielectric; Patch width; Patch Length; Losses; strip width; strip length.

PDF

Paper 19: ICT for Education

Abstract: This paper presents the modeling, design and implementation of a learning platform in Cameroon. This platform contains structured knowledge acquisition modules as well as teaching, learning and assessment modules to promote a constructive learning. The objective of this project is to show how ICT can be used to improve teaching and learning with modern digital tools. This will result into enabling teaching of the official computer curriculum in secondary schools at the national level. A second objective of the project is to put in place a set of ICT based administrative and managerial tools that will guide the day-to-day activities of a secondary school. This will aid in generating informations accessible from all levels of the educational system and all its related departments and partners. This project will aim at promoting ICT accessibility in the educational system while contributing to reducing the digital divide.

Author 1: Marcellin Nkenlifack
Author 2: Raoul Nangue
Author 3: Bethin Demsong
Author 4: Victor Kuate Fotso

Keywords: Elearning, ICT; Management Tools; Secondary school; Platform

PDF

Paper 20: Application Of Extended Kalman Filter For A Free Falling Body Towards Earth

Abstract: State estimation theory is one of the best mathematical approaches to analyze variants in the states of the system or process. The state of the system is defined by a set of variables that provide a complete representation of the internal condition at any given instant of time. Filtering of Random processes is referred to as Estimation, and is a well-defined statistical technique. There are two types of state estimation processes, Linear and Nonlinear. Linear estimation of a system can easily be analyzed by using Kalman Filter (KF) and is used to compute the target state parameters with a priori information under noisy environment. But the traditional KF is optimal only when the model is linear and its performance is well defined under the assumptions that the system model and noise statistics are well known. Most of the state estimation problems are nonlinear, thereby limiting the practical applications of the KF. The modified KF, aka EKF, Unscented Kalman filter and Particle filter are best known for nonlinear estimates. Extended Kalman filter (EKF) is the nonlinear version of the Kalman filter which linearizes about the current mean and covariance. The estimation can be linearised around the current estimate using the partial derivatives to compute estimates even in the face of nonlinear relationships.. The EKF has been considered the standard in the theory of nonlinear state estimation. This paper deals with how to estimate a nonlinear model with Extended Kalman filter (EKF). The approach in this paper is to analyze Extended Kalman filter where EKF provides better probability of state estimation for a free falling body towards earth.

Author 1: Leela Kumari. B
Author 2: Padma Raju. K
Author 3: Chandan .V.Y.V
Author 4: Sai Krishna. R
Author 5: V.M.J. Rao

Keywords: Kalman filter; Extended Kalman filter; free fall body; apriori information.

PDF

The Science and Information (SAI) Organization
BACK TO TOP

Computer Science Journal

  • About the Journal
  • Call for Papers
  • Submit Paper
  • Indexing

Our Conferences

  • Computing Conference
  • Intelligent Systems Conference
  • Future Technologies Conference
  • Communication Conference

Help & Support

  • Contact Us
  • About Us
  • Terms and Conditions
  • Privacy Policy

© The Science and Information (SAI) Organization Limited. All rights reserved. Registered in England and Wales. Company Number 8933205. thesai.org