The Science and Information (SAI) Organization
  • Home
  • About Us
  • Journals
  • Conferences
  • Contact Us

Publication Links

  • IJACSA
  • Author Guidelines
  • Publication Policies
  • Digital Archiving Policy
  • Promote your Publication
  • Metadata Harvesting (OAI2)

IJACSA

  • About the Journal
  • Call for Papers
  • Editorial Board
  • Author Guidelines
  • Submit your Paper
  • Current Issue
  • Archives
  • Indexing
  • Fees/ APC
  • Reviewers
  • Apply as a Reviewer

IJARAI

  • About the Journal
  • Archives
  • Indexing & Archiving

Special Issues

  • Home
  • Archives
  • Proposals
  • Guest Editors
  • SUSAI-EE 2025
  • ICONS-BA 2025
  • IoT-BLOCK 2025

Future of Information and Communication Conference (FICC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Computing Conference

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Intelligent Systems Conference (IntelliSys)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Future Technologies Conference (FTC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact
  • Home
  • Call for Papers
  • Editorial Board
  • Guidelines
  • Submit
  • Current Issue
  • Archives
  • Indexing
  • Fees
  • Reviewers
  • Subscribe

IJACSA Volume 3 Issue 4

Copyright Statement: This is an open access publication licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.

View Full Issue

Paper 1: A New Application Programming Interface and a Fortran-like Modeling Language for Evaluating Functions and Specifying Optimization Problems at Runtime

Abstract: A new application programming interface for evaluating functions and specifying optimization problems at runtime has been developed. The new interface, named FEFAR, uses a simple language named LEFAR. Compared with other modeling languages such as AMPL or OSil, LEFAR is Fortran-like hence easy to learn and use, in particular for Fortran programmers. FEFAR itself is a Fortran subroutine hence easy to be linked to user’s main programs in Fortran language. With FEFAR a developer of optimization solver can provide pre-compiled, self-executable and directly usable software products. FEFAR and LEFAR are already used in some optimization solvers and should be a useful addition to the toolbox of programmers who develop solvers of optimization problems of any type including constrained/unconstrained, linear/nonlinear, smooth/nonsmooth optimization.

Author 1: Fuchun Huang

Keywords: programming language; Fortran computing language; Fortran subroutine; Application programming interface; Runtime function evaluation; Mathematical programming; Optimization problem; Optimization modeling language.

PDF

Paper 2: Wavelet Based Image Retrieval Method

Abstract: A novel method for retrieving image based on color and texture extraction is proposed for improving the accuracy. In this research, we develop a novel image retrieval method based on wavelet transformation to extract the local feature of an image, the local feature consist color feature and texture feature. Once an image taking into account, we transform it using wavelet transformation to four sub band frequency images. It consists of image with low frequency which most same with the source called approximation (LL), image containing high frequency called horizontal detail (LH), image containing high frequency called vertical detail (HL), and image containing horizontal and vertical detail (HH). In order to enhance the texture and strong edge, we combine the vertical and horizontal detail to be other matrix. The next step is we estimate the important point called significant point by threshold the high value. After the significant points have been extracted from image, the coordinate of significant points will be used for knowing the most important information from the image and convert into small regions. Based on these significant point coordinates, we extract the image texture and color locally. The experimental results demonstrate that our method on standard dataset are encouraging and outperform the other existing methods, improved around 11 %.

Author 1: Kohei Arai
Author 2: Cahya Rahmad

Keywords: component; Image retrieval, DWT, Wavelet, Local feature, Color, Texture.

PDF

Paper 3: Analysis Method of Traffic Congestion Degree Based on Spatio-Temporal Simulation

Abstract: The purpose of this research is to design and implement a road traffic congestion and traffic patterns simulation (TPS) model and integrate it with extension-information model (EIM). The problems of road traffic simulation and control are studied according to the method of extension information model, and from the spatio-temporal analysis point of view. The rules of the traffic simulation from existence to evolution are analyzed using theories. Based on this study, the concept of traffic system entropy is introduced, and resulted in the establishment of a fundamental frame work for the road traffic simulation system based on extension spatio-temporal information system. Moreover, a practicable methodology is presented.

Author 1: Shulin He

Keywords: road traffic simulation; extension information model; degree of traffic congestion; traffic congestion entropy; traffic congestion control system.

PDF

Paper 4: Separability Detection Cooperative Particle Swarm Optimizer based on Covariance Matrix Adaptation

Abstract: The particle swarm optimizer (PSO) is a population-based optimization technique that can be widely utilized to many applications. The cooperative particle swarm optimization (CPSO) applies cooperative behavior to improve the PSO on finding the global optimum in a high-dimensional space. This is achieved by employing multiple swarms to partition the search space. However, independent changes made by different swarms on correlated variables will deteriorate the performance of the algorithm. This paper proposes a separability detection approach based on covariance matrix adaptation to find non-separable variables so that they can previously be placed into the same swarm to address the difficulty that the original CPSO encounters.

Author 1: Sheng Fuu Lin
Author 2: Yi-Chang Cheng
Author 3: Jyun-Wei Chang
Author 4: Pei-Chia Hung

Keywords: cooperative behavior; particle swarm optimization; covariance matrix adaptation; separability.

PDF

Paper 5: Nearest Neighbor Value Interpolation

Abstract: This paper presents the nearest neighbor value (NNV) algorithm for high resolution (H.R.) image interpolation. The difference between the proposed algorithm and conventional nearest neighbor algorithm is that the concept applied, to estimate the missing pixel value, is guided by the nearest value rather than the distance. In other words, the proposed concept selects one pixel, among four directly surrounding the empty location, whose value is almost equal to the value generated by the conventional bilinear interpolation algorithm. The proposed method demonstrated higher performances in terms of H.R. when compared to the conventional interpolation algorithms mentioned.

Author 1: Olivier Rukundo
Author 2: Hanqiang Cao

Keywords: neighbor value; nearest; bilinear; bicubic; image interpolation.

PDF

Paper 6: A New 3D Model-Based Tracking Technique for Robust Camera Pose Estimation

Abstract: In this paper we present a new robust camera pose estimation approach based on 3D lines features. The proposed method is well adapted for mobile augmented reality applications We used an Extended Kalman Filter (EKF) to incrementally update the camera pose in real-time. The principal contributions of our method include first, the expansion of the RANSAC scheme in order to achieve a robust matching algorithm that associates 2D edges from the image with the 3D line segments from the input model. And second, a new powerful framework for camera pose estimation using only 2D-3D straight-lines within an EKF. Experimental results on real image sequences are presented to evaluate the performances and the feasibility of the proposed approach in indoor and outdoor environments.

Author 1: Fakhreddine Ababsa

Keywords: Pose estimation; Line traking; Kalman filtering; Augmented Reality.

PDF

Paper 7: Multi-input Multi-output Beta Wavelet Network: Modeling of Acoustic Units for Speech Recognition

Abstract: in this paper, we propose a novel architecture of wavelet network called Multi-input Multi-output Wavelet Network MIMOWN as a generalization of the old architecture of wavelet network. This newel prototype was applied to speech recognition application especially to model acoustic unit of speech. The originality of our work is the proposal of MIMOWN to model acoustic unit of speech. This approach was proposed to overcome limitation of old wavelet network model. The use of the multi-input multi-output architecture will allows training wavelet network on various examples of acoustic units.

Author 1: Ridha Ejbali
Author 2: Mourad Zaied
Author 3: Chokri Ben Amar

Keywords: wavelet network; multi-input multi-output wavelet network MIMOWN; speech recognition; modeling of acoustic units; wavelet network.

PDF

Paper 8: Real-Time Fish Observation and Fish Category Database Construction

Abstract: This paper proposes a distributed real-time video stream system for underwater fish observation in the real world. The system, based on a three-tier architecture, includes capture devices unit, stream processor unit, and display devices unit. It supports variety of capture source devices, such as HDV, DV, WebCam, TV Card, Capture Card, and video compression formats, such as WMV, FLV/SWF, MJPEG, MPEG-2/4. The system has been demonstrated in Taiwan for long-term underwater fish observation. CCTV cameras and high-definition cameras are deployed on our system. Video compression methods and image processing methods are implemented to reduce network transfer flow and data storage space. Marine ecologists and end users can browse these real-time video streams via the Internet to understand the ecological changes immediately. These video data is preserved to form a resource base for marine ecologists. Based on the video data, fish detection is implemented. However, it is complicated in the unconstrained underwater environment, due to the water flow causes the water plants sway severely. In this paper, a bounding-surrounding boxes method is proposed to overcome the problem. It efficiently classifies moving fish as the foreground objects and the swaying water plants as the background objects. It enables to remove the irrelevant information (without fish) to reduce the massive amount of video data. Moreover, fish tracking is implemented to acquire multiple species of fish images with varied angles, sizes, shapes, and illumination to construct a fish category database.

Author 1: Yi-Haur Shiau
Author 2: Sun-In Lin
Author 3: Fang-Pang Lin
Author 4: Chaur-Chin Chen

Keywords: Real-time streaming; Fish observation; Fish detection; Distributed architecture.

PDF

Paper 9: Intelligent Joint Admission Control for Next Generation Wireless Networks

Abstract: The Heterogeneous Wireless Network (HWN) integrates different wireless networks into one common network. The integrated networks often overlap coverage in the same wireless service areas, leading to the availability of a great variety of innovative services based on user demands in a cost-efficient manner. Joint Admission Control (JAC) handles all new or handoff service requests in the HWN. It checks whether the incoming service request to the selected Radio Access Network (RAN) by the initial access network selection or the vertical handover module can be admitted and allocated the suitable resources. In this paper, a decision support system is developed to address the JAC problem in the modern HWN networks. This system combines fuzzy logic and the PROMETHEE II multiple criteria decision making system algorithm, to the problem of JAC. This combination decreases the influence of the dissimilar, imprecise, and contradictory measurements for the JAC criteria coming from different sources. A performance analysis is done and the results are compared with traditional algorithms for JAC. These results demonstrate a significant improvement with our developed algorithm.

Author 1: Mohammed M Alkhawlani
Author 2: Fadhl M. Al-Akwaa
Author 3: Abdulqader M. Mohsen

Keywords: Heterogeneous Wireless Network; Radio Access Network; PROMETHEE; Joint Admission Control

PDF

Paper 10: Comparison of OpenMP & OpenCL Parallel Processing Technologies

Abstract: This paper presents a comparison of OpenMP and OpenCL based on the parallel implementation of algorithms from various fields of computer applications. The focus of our study is on the performance of benchmark comparing OpenMP and OpenCL. We observed that OpenCL programming model is a good option for mapping threads on different processing cores. Balancing all available cores and allocating sufficient amount of work among all computing units, can lead to improved performance. In our simulation, we used Fedora operating system; a system with Intel Xeon Dual core processor having thread count 24 coupled with NVIDIA Quadro FX 3800 as graphical processing unit.

Author 1: Krishnahari Thouti
Author 2: S.R.Sathe

Keywords: OpenMP; OpenCL; Multicore;Parallel Computing; Graphical processors.

PDF

Paper 11: An Authentication Protocol Based on Combined RFID-Biometric System

Abstract: Radio Frequency Identification (RFID) and biometric technologies saw fast evolutions during the last years and which are used in several applications, such as access control. Among important characteristics in the RFID tags, we mention the limitation of resources (memory, energy, …). Our work focuses on the design of a RFID authentication protocol which uses biometric data and which confirms the secrecy, the authentication and the privacy. Our protocol requires a PRNG (Pseud-Random Number Generator), a robust hash function and Biometric hash function. The Biometric hash function is used to optimize and to protect biometric data. For Security analysis of protocol proposed, we will use AVISPA and SPAN tools to verify the authentication and the secrecy.

Author 1: Noureddine Chikouche
Author 2: Foudil Cherif
Author 3: Mohamed Benmohammed

Keywords: component; RFID; authentication protocol; biométric; security.

PDF

Paper 12: ATM Security Using Fingerprint Biometric Identifer: An Investigative Study

Abstract: The growth in electronic transactions has resulted in a greater demand for fast and accurate user identification and authentication. Access codes for buildings, banks accounts and computer systems often use personal identification numbers (PIN's) for identification and security clearances. Conventional method of identification based on possession of ID cards or exclusive knowledge like a social security number or a password are not all together reliable. An embedded fingerprint biometric authentication scheme for automated teller machine (ATM) banking systems is proposed in this paper. In this scheme, a fingerprint biometric technique is fused with the ATM for person authentication to ameliorate the security level.

Author 1: Moses Okechukwu Onyesolu
Author 2: Ignatius Majesty Ezeani

Keywords: ATM; PIN; Fingerprint; security; biometric.

PDF

Paper 13: A Globally Convergent Algorithm of Variational Inequality

Abstract: The algorithm of variational inequality is the important and valuable question in real life all the time. In this paper, a globally convergent algorithm of variational inequality is proposed. The method ensures that the corrector step sizes have a uniformly positive bound from below. In order to prove convergence of algorithm, we first establish some definitions, properties and theorem, and then we prove its global convergence under appropriate conditions.

Author 1: Chengjiang Yin

Keywords: Infinite The variational inequality; Uniformly positive bound from below; Global convergence.

PDF

Paper 14: Reversible Anonymization of DICOM Images using Cryptography and Digital Watermarking

Abstract: Digital Imaging and Communications in Medicine (DICOM) is a standard for handling, storing, printing, and transmitting information in medical images. The DICOM file contains the image data and a number of attributes such as identified patient data (name, age, insurance ID card,…), and non-identified patient data (doctor’s interpretation, image type,…). Medical images serve not only for examination, but can also be used for research and education purposes. For research they are used to prevent illegal use of information; before authorizing researchers to use these images, the medical staff deletes all the data which would reveal the patient identity to prevent patient privacy. This manipulation is called anonymization. In this paper, we propose a reversible anonymization of DICOM images. Identifying patient data with image digest, computed by the well-known SHA-256 hash function, are encrypted using the proposed probabilistic public key crypto-system. After compressing the Least Significant Bit (LSB) bitplan of the image using Hofmann coding algorithm, the encrypted data is inserted into a liberated zone of the LSB bitplan of the image. The proposed method allows researchers to use anonymous DICOM images and keep to authorized staff -if necessary- the possibility to return to the original image with all related patient data.

Author 1: Youssef ZAZ
Author 2: Lhoussain ELFADIL

Keywords: DICOM images; watermaking; Hofmann coding; reversible anonymization, public key cryptosystem.

PDF

Paper 15: Secure Digital Cashless Transactions with Sequence Diagrams and Spatial Circuits to Enhance the Information Assurance and Security Education

Abstract: Often students have difficulties mastering cryptographic algorithms. For some time we have been developing with methods for introducing important security concepts for both undergraduate and graduate students in Information Systems, Computer Science and Engineering students. To achieve this goal, Sequence diagrams and spatial circuit derivation from equations are introduced to students. Sequence diagrams represent progression of events with time. They learn system security concepts more effectively if they know how to transform equations and high level programming language constructs into spatial circuits or special purpose hardware. This paper describes an active learning module developed to help students understand secure protocols, algorithms and modeling web applications to prevent attacks and both software and hardware implementations related to encryption. These course materials can also be used in computer organization and architecture classes to help students understand and develop special purpose circuitry for cryptographic algorithms.

Author 1: Dr. Yousif AL Bastaki
Author 2: Dr. Ajantha Herath

Keywords: e-cashless; transactions; cryptographic; algorithms; Sequence diagrams, Spatial circuits.

PDF

Paper 16: Comparison of 2D and 3D Local Binary Pattern in Lung Cancer Diagnosis

Abstract: Comparative study between 2D and 3D Local Binary Patter (LBP) methods for extraction from Computed Tomography (CT) imagery data in lung cancer diagnosis is conducted. The lung image classification is performed using probabilistic neural network (PNN) with histogram similarity as distance measure. The technique is evaluated on a set of CT lung images from Japan Society of Computer Aided Diagnosis of Medical Images. Experimental results show that 3D LBP has superior performance in accuracy compare to 2D LBP. The 2D LBP and 3D LBP achieved a classification accuracy of 43% and 78% respectively.

Author 1: Kohei Arai
Author 2: Yeni Herdiyeni
Author 3: Hiroshi Okumura

Keywords: lung cancer detection, local binary pattern, probabilistic neural network.

PDF

Paper 17: Balancing a Sphere in a Linear Oscillatory Movement through Fuzzy Control

Abstract: The following paper describes an intelligent control problem, which depends on the balance of a metallic sphere on a beam, that oscillates in only one point, localized in the middle of the beam, using it for the balance of this fuzzy control system.

Author 1: Gustavo Ozuna
Author 2: German Figueroa
Author 3: Marek Wosniak

Keywords: ball beam system; balancing a metallic sphere; inclination; equilibrium forces.

PDF

Paper 18: E-learning Document Search Method with Supplemental Keywords Derived from Keywords in Meta-Tag and Descriptions which are Included in the Header of the First Search Result

Abstract: Optimization method for e-learning document search with keywords which are derived from the keywords and descriptions in the meta-tag of web search results together with thesaurus engine is proposed. 15 to 20% of improvement on hit rate of search performance is confirmed with the proposed search engine.

Author 1: Kohei Arai
Author 2: Herman Tolle

Keywords: Search engine, e-learning content, thesaurus engine.

PDF

Paper 19: The Construction of a Web-Based Learning Platform from the Perspective of Computer Support for Collaborative Design

Abstract: The purpose of this study is to construct a web-based learning platform of Computer Support for Collaborative Design (CSCD) based on theories related to a constructivist learning environment model, mind mapping and computer-supported collaborative learning. The platform conforms to the needs of design students and provides effective tools for interaction and collaborative learning by integrating the tools of mind mapping into a learning environment that utilizes CSCD, a computer-assisted support system that can support and enhance group collaboration. The establishment of the CSCD learning platform represents a significant advance from the fixed functions and existing models of current online learning platforms and is the only learning platform in the world that focuses on learners in design departments. The platform is outstanding for its excellence, user-friendly functions, and innovative technology. In terms of funding, technical ability, human resources, organizational strategies, and risk analysis and evaluations, the learning platform is also worthy of expansion and implementation.

Author 1: Hsu Cheng Mei

Keywords: computer support for collaborative design, computer support for collaborative learning, design education, mind-map, web-based learning platform.

PDF

Paper 20: Knowledge Discovery in Health Care Datasets Using Data Mining Tools

Abstract: Non communicable diseases (NCDs) are the biggest global killers today. Sixty-three percent of all deaths in 2008 – 36 million people – were caused by NCDs. Nearly 80% of these deaths occurred in low- and middle-income countries, where the highest proportion of deaths under the age of 70 from NCDs occur [1]. The commonness of NCDs, and the resulting number of related deaths, are expected to increase substantially in the future, particularly in low and middle-income countries, due to population growth and ageing, in conjunction with economic transition and resulting changes in behavioral, occupational and environmental risk factors. NCDs already disproportionately affect low and middle-income countries. Current projections indicate that by 2020 the largest increases in NCD mortality will occur in Africa, India and other low and middle-income countries [2]. Computer-based support in healthcare is becoming ever more important. No other domain has so many innovative changes that have such a high social impact. There has already been a long standing tradition for computer-based decision support, dealing with complex problems in medicine such as diagnosing disease, managerial decisions and assisting in the prescription of appropriate treatment. As we know that “Research is for the people not for yourself” so we are pleased to work for the healthcare and hence for the society and ultimately the MANKIND.

Author 1: MD. Ezaz Ahmed
Author 2: Dr. Y.K. Mathur
Author 3: Dr Varun Kumar

Keywords: NCDs, Web, Web Data, Web Mining, data Mining Healthcare.

PDF

Paper 21: Mining Scientific Data from Pub-Med Database

Abstract: The continuous, rapidly growing volume of scientific literature and increasing diversification of inter-disciplinary fields of science and their answers to unsolved problems in medical and allied fields of science present a major problem to scientists and librarians. It should be recalled in this aspect that today as many as 4800 scientific journals exist in the internet of which some are online only. The list of journals located in subject citation indexes in Thomson Reuters can be obtained from the website. From researchers’ point of view, the problem is amplified when we consider today’s competition where we may not be able to spend time on experimental work merely because of already published information. Therefore, considering these facts partly and the volume of serials on the other, a study has been initiated in evaluating the scientific literature published in various journal sources. The scope of the study does not permit inclusion of all periodicals in the extensive fields of biology and hence a text mining routine was employed to extract data based on keywords such as bioinformatics, algorithms, genomics and proteomics. The wide availability of genome sequence data has created abundant opportunities, most notably in the realm of functional genomics and proteomics. This quiet revolution in biological sciences has been enabled by our ability to collect, manage, analyze, and integrate large quantities of data.

Author 1: G Charles Babu
Author 2: Dr. A.GOVARDHAN

PDF

The Science and Information (SAI) Organization
BACK TO TOP

Computer Science Journal

  • About the Journal
  • Call for Papers
  • Submit Paper
  • Indexing

Our Conferences

  • Computing Conference
  • Intelligent Systems Conference
  • Future Technologies Conference
  • Communication Conference

Help & Support

  • Contact Us
  • About Us
  • Terms and Conditions
  • Privacy Policy

© The Science and Information (SAI) Organization Limited. All rights reserved. Registered in England and Wales. Company Number 8933205. thesai.org