The Science and Information (SAI) Organization
  • Home
  • About Us
  • Journals
  • Conferences
  • Contact Us

Publication Links

  • IJACSA
  • Author Guidelines
  • Publication Policies
  • Digital Archiving Policy
  • Promote your Publication
  • Metadata Harvesting (OAI2)

IJACSA

  • About the Journal
  • Call for Papers
  • Editorial Board
  • Author Guidelines
  • Submit your Paper
  • Current Issue
  • Archives
  • Indexing
  • Fees/ APC
  • Reviewers
  • Apply as a Reviewer

IJARAI

  • About the Journal
  • Archives
  • Indexing & Archiving

Special Issues

  • Home
  • Archives
  • Proposals
  • Guest Editors
  • SUSAI-EE 2025
  • ICONS-BA 2025
  • IoT-BLOCK 2025

Future of Information and Communication Conference (FICC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Computing Conference

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Intelligent Systems Conference (IntelliSys)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Future Technologies Conference (FTC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact
  • Home
  • Call for Papers
  • Editorial Board
  • Guidelines
  • Submit
  • Current Issue
  • Archives
  • Indexing
  • Fees
  • Reviewers
  • Subscribe

IJACSA Volume 5 Issue 4

Copyright Statement: This is an open access publication licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.

View Full Issue

Paper 1: A Proposed Architectural Model for an Automatic Adaptive E-Learning System Based on Users Learning Style

Abstract: It has been established through literature that, if an e-learning system could adapt to learning characteristics of learners, it will increase learning performance and content knowledge acquisition of learners. This paper is a basic research work for knowledge that lay down a foundation for application and implementation. We reviewed trends in adaptive e-learning system development, make an expository on learning-style models towards learners’ learning character and propose an Architectural model of Automatic Adaptive E-learning System (AAeLS) based on learning-style concept/models. The concept it to model an e-learning system that will automatically adapt to learning preference of users’, the system learn about users’ learning style while the user learn the material content of the system; thus the learning process in two ways, the system is learning when the user is learning. We recommend further work on implementation and testing of the model, in an applied research.

Author 1: Adeniran Adetunji
Author 2: Akande Ademola

Keywords: E-Learning; Learning Style; Adaptation; AAeL

PDF

Paper 2: An Optimized Analogy-Based Project Effort Estimation

Abstract: despite the predictive performance of Analogy-Based Estimation (ABE) in generating better effort estimates, there is no consensus on: (1) how to predetermine the appropriate number of analogies, (2) which adjustment technique produces better estimates. Yet, there is no prior works attempted to optimize both number of analogies and feature distance weights for each test project. Perhaps rather than using fixed number, it is better to optimize this value for each project individually and then adjust the retrieved analogies by optimizing and approximating complex relationships between features and reflects that approximation on the final estimate. The Artificial Bees Algorithm is utilized to find, for each test project, the appropriate number of closest projects and features distance weights that is used to adjust those analogies’ efforts. The proposed technique has been applied and validated to 8 publically datasets from PROMISE repository. Results obtained show that: (1) the predictive performance of ABE has noticeably been improved, (2) the number of analogies was remarkably variable for each test project. While there are many techniques to adjust ABE, Using optimization algorithm provides two solutions in one technique and appeared useful for datasets with complex structure.

Author 1: Mohammad Azzeh
Author 2: Yousef Elsheikh
Author 3: Marwan Alseid

Keywords: Cost Estimation; Effort Estimation by Analogy; Bees Optimization Algorithm

PDF

Paper 3: Impediments of Activating E-Learning in Higher Education Institutions in Saudi Arabia

Abstract: This paper presents the real reasons which constraint the application of the E-learning in higher education institutions in Saudi Arabia (Case study: Qassim University)and some suggested solutions. A questionnaire has been designed for the study include 48 paragraphs, divided into 5 parts, the first include the principle information, the second define how the technology can be used in the E-learning, the third deals with how to support the E-learning idea, the fourth part, asking the difficulties and challenges that face the application of E-learning, the fifth items asking to provide suggestion for solving the problem. The study has 100 samples for faculty members and undergraduate students in Ar-Rass college of Science and Arts, male Departments at Qassim University. The study indicates that the main factors that obstruct the E-learning is the financial support from saving advanced PC's, labs, and establishing strong computer network, adding to the weakness of some faculty members and student to English language. The study focused in the suggested solution for the problem by applying the Electronic subjects, and imposes the whole faculty members to prepare at least one course in Electronic form.

Author 1: Ashraf M. H. Abdel Gawad
Author 2: Khalefah A. K. Al-Masaud

Keywords: E-Learning; Internet; curriculum; Saudi Arabia Universities; cultural aspects

PDF

Paper 4: Dynamic Allocation of Abundant Data Along Update Sub-Cycles To Support Update Transactions In Wireless Broadcasting

Abstract: Supporting transactions processing over wireless broadcasting environment has attracted a considerable amount of research in a mobile computing system. To allow more than one conflicting transactions to be committed within the same broadcast cycle, the main broadcast cycle need to be decompose into a sub cycles. This decomposition contains both the original data to be broadcast in Rcast cycle and the updates come from the committed transactions on these data items called Ucast cycle. Allocation of updated data items along Ucast cycles is highly affecting the concurrency among conflicting transactions. Given the conflicting degree of data items, one can design proper data allocation along Ucast Cycles to increase the concurrency among conflicting transactions. We explore in this paper the problem of adjusting abundant data allocations to respond in effective way to the changes of data conflicting probability, and develop an efficient algorithm ADDUcast to solve this problem. Performance of our adjustment algorithms is analyzed and a system simulator is developed to validate our results. It is shown by our results that the ADDUcast is highly increased the average number of committed transactions within the same broadcast cycle.

Author 1: Ahmad al-Qerem

Keywords: data broadcast; Dynamic Allocation; concurrency control; cycle decomposition; Abundant Data

PDF

Paper 5: Exon_Intron Separation Using Amino Acids Groups Frenquency Repartition as Coding Technique

Abstract: this paper presents a new coding technique based on amino acids repartition in chromosome. The signal generated with this coding technique constitutes, after treatment, a new way to separate between exons and introns in a gene. The algorithm proposed is composed of six steps. We convert from ATCG to amino acids. We specify the amino acid order group. We constitute the signal based on group’s repartition. We apply a smoothing technique on resulting signal. We inverse the exons peaks from minima to maxima. We show the separation between exons and introns regions. We present here the results obtained on the gene reference G 56F11.

Author 1: Afef Elloumi Oueslati
Author 2: Noureddine Ellouze

Keywords: exons; introns; amino acid coding technique; amino acid repartition; exons - introns separation

PDF

Paper 6: Methods of Isolation for Application Traces Using Virtual Machines and Shadow Copies

Abstract: To improve the user's experience, almost all applications save usage data: web browsers save history and cookies, chat programs save message archives and so on. However, this data can be confidential and may compromise the user's privacy. There are third party solutions to automatically detect and wipe these traces, but they have two problems: they need a constantly updated database of files to target, and they wipe the data after it has been written to the disk. Our proposed solution does not need a database and it automatically reverts the application to its initial (clean) state, leaving no traces behind. This is done by using a monitoring process developed by us and the Volume Shadow Copy Service that takes snapshots when the application runs and restores them at the end of the run.

Author 1: George Pecherle
Author 2: Cornelia Gyorödi
Author 3: Robert Gyorödi

Keywords: security; privacy; application traces; data wiping; virtual machines; shadow copies; sandbox

PDF

Paper 7: Redesigning Educational Systems Using IJAZA Structure

Abstract: This paper discusses the use of IJAZA in an education system. The IJAZA system was the system used in the earliest Islamic nation for education and accreditation. The system was designed with a few major cultural concepts in mind. The basic principle of the IJAZA system is to give people complete freedom to study what they want, when they want it, from whomever they want, without any restrictions or influence from outside parties. To ensure the effectiveness of the system we think that the IJAZA system needs complete documentation of everything that happens within it, such as IJAZA documentation when it is first established, up to the performance review of the certified by the job market. Therefore, this paper provides a brief methodology, evaluation and implementation of the IJAZA system.

Author 1: Yasser Bahjat
Author 2: Ibrahim Albidewi

Keywords: IJAZA system; Islamic educational system; Apprentice studies

PDF

Paper 8: Towards a Service-Based Framework for Environmental Data Processing

Abstract: Scientists are confronted with significant data management problems due to the huge volume and high complexity of environmental data. An important aspect of environmental data management is that data, needed for a process, are not always in the adequate format. In this contribution, we analyze environmental data structure, and model this data using a semantic-based method. Using this model, we design and implement a framework based on Web services for transformation between massive environmental text-based data and relational databases. We present a mapping model for environmental data transformation to be used in the scenario devoted to the methodology for development of stochastic models for prediction of environmental parameters by application of Gaussian processes.

Author 1: Ivan Madjarov
Author 2: Juš Kocijan
Author 3: Alexandra Grancharova
Author 4: Bogdan Shishedjiev

Keywords: Scientific data; Environmental data; Web services; Data integration; Stochastic model; Gaussian process; Metadata

PDF

Paper 9: Improving the Prediction Accuracy of Multicriteria Collaborative Filtering by Combination Algorithms

Abstract: This study focuses on developing the multicriteria collaborative filtering algorithmfor improving the prediction accuracy. The approaches applied were user-item multirating matrix decomposition, the measurement of user similarity using cosine formula and multidimensional distance, individual criteria weight calculation, and rating prediction for the overall criteria by a combination approach. Results of the study show variation in multicriteria collaborative filtering algorithm, which was used for improving the document recommender system with the two following characteristics. First, the rating prediction for four individual criteria using collaborative filtering algorithm by a cosine-based user similarity and a multidimensional distance-based user similarity. Second, the rating prediction for the overall criteria using a combination algorithms. Based on the results of testing, it can be concluded that a variety of models developed for the multicriteria collaborative filtering systems had much better prediction accuracy than for the classic collaborative filtering, which was characterized by the increasingly smaller values of Mean Absolute Error. The best accuracy was achieved by the multicriteria collaborative filtering system with multidimensional distance-based similarity.

Author 1: Wiranto
Author 2: Edi Winarko
Author 3: Sri Hartati
Author 4: Retantyo Wardoyo

Keywords: Algorithm; multicriteria collaborative filtering; document; recommendation; system; similarity; multidimensional distance; decomposition; combination; prediction; accuracy

PDF

Paper 10: Real-Time Simulation and Analysis of the Induction Machine Performances Operating at Flux Constant

Abstract: In this paper, we are interested, in a first time, at the study and the implementation of a V/f control for induction machine in real time. After, We are attached to a comparison of the results by simulation and experiment for, speed responses, flux and currents of the real machine, with a DSPACE card and model established by classical identification (Direct Current test , blocked-rotor test, no-load test , synchronous test), to ensure the validity of the established model. The scalar controlled induction motor allows operation of the motor with the maximum torque by simultaneous action on the frequency and amplitude of the stator voltage, with conservation of the ratio V/f. Speed reference imposes a frequency at the inverter supplying the voltages needed to power the motor, which determines the speed of rotation. The maximum torque of the machine is proportional to the square of the supply voltage and inversely proportional to the frequency voltage. So, Keep V/f constant implies a operating with maximum constant torque. The results obtained for the rotor flux and the stator currents are especially satisfactory steady.

Author 1: Aziz Derouich
Author 2: Ahmed Lagrioui

Keywords: Induction Machine Modeling; Scalar-controlled induction machine; Experimental identification; Environment Matlab/Simulink/DSPACE

PDF

Paper 11: On the Performance of the Predicted Energy Efficient Bee-Inspired Routing (PEEBR)

Abstract: The Predictive Energy Efficient Bee Routing PEEBR is a swarm intelligent reactive routing algorithm inspired from the bees food search behavior. PEEBR aims to optimize path selection in the Mobile Ad-hoc Network MANET based on energy consumption prediction. It uses Artificial Bees Colony ABC Optimization model and two types of bee agents: The scout bee for exploration phase and the forager bee for evaluation and exploitation phases. PEEBR considers the predicted mobile nodes battery residual power and the expected energy consumption for packet reception and relaying of these nodes along each of the potential routing paths between a source and destination pair. In this research paper, the performance of the proposed and improved PEEBR algorithm is evaluated in terms of energy consumption efficiency and throughput compared to two state-of-art ad-hoc routing protocols: The Ad-hoc On-demand Distance Vector AODV and the Destination Sequenced Distance Vector DSDV for various MANET sizes.

Author 1: Imane M. A. Fahmy
Author 2: Laila Nassef
Author 3: Hesham A. Hefny

Keywords: PEEBR; Reactive protocol; path selection; MANET; ABC; energy consumption; battery residual power; AODV; DSDV

PDF

Paper 12: Study on Method of Feature Selection in Speech Content Classification

Abstract: Information communication is developing rapidly now, Voice communication from a distance is more and more popular. In order to evaluate and classify the content correctly, the acoustic features is used to analyze first in this paper, Orthogonal experiment[1] method is used to find out characteristic of voice that has contribution to the speech content classification then make it and the textual characteristic together. The result of experiments shows that the feature combination of voice and content has better effect on voice content classification, the effectiveness has been improved.

Author 1: Si An
Author 2: Xinghua Fan

Keywords: acoustic features; orthogonal experiment; the SVM classifier; CHI statistical methods; features level fusion; LBS vector quantization algorithm

PDF

Paper 13: Comparative Performance Analysis of Wireless Communication Protocols for Intelligent Sensors and Their Applications

Abstract: The systems based on intelligent sensors are currently expanding, due to theirs functions and theirs performances of intelligence: transmitting and receiving data in real-time, computation and processing algorithms, metrology remote, diagnostics, automation and storage measurements…The radio frequency wireless communication with its multitude offers a better solution for data traffic in this kind of systems. The mains objectives of this paper is to present a solution of the problem related to the selection criteria of a better wireless communication technology face up to the constraints imposed by the intended application and the evaluation of its key features. The comparison between the different wireless technologies (Wi-Fi, Wi-Max, UWB, Bluetooth, ZigBee, ZigBeeIP, GSM/GPRS) focuses on their performance which depends on the areas of utilization. Furthermore, it shows the limits of their characteristics. Study findings can be used by the developers/ engineers to deduce the optimal mode to integrate and to operate a system that guarantees quality of communication, minimizing energy consumption, reducing the implementation cost and avoiding time constraints.

Author 1: Chakkor Saad
Author 2: Baghouri Mostafa
Author 3: El Ahmadi Cheikh
Author 4: Hajraoui Abderrahmane

Keywords: Wireless communications; Performances; Energy; Protocols; Intelligent sensors; Applications

PDF

Paper 14: Multi-Domain Modeling and Simulation of an Aircraft System for Advanced Vehicle-Level Reasoning Research and Development

Abstract: In this paper, we describe a simulation based health monitoring system test-bed for aircraft systems. The purpose of the test-bed is to provide a technology neutral basis for implementing and evaluation of reasoning systems on vehicle level and software architecture in support of the safety and maintenance process. This simulation test-bed will provide the sub-system level results and data which can be fed to the VLRS to generate vehicle level reasoning to achieve broader level diagnoses. This paper describes real-time system architecture and concept of operations for the aircraft major sub-systems. The four main components in the real-time test-bed are the aircraft sub-systems (e.g. battery, fuel, engine, generator, heating and lighting system) simulation model, fault insertion unit, health monitoring data processing and user interface. In this paper, we adopted a component based modelling paradigm for the implementation of the virtual aircraft systems. All of the fault injections are currently implemented via software. The fault insertion unit allows for the repeatable injection of faults into the system. The simulation test-bed has been tested with many different faults which were undetected on system level to process and detect on the vehicle level reasoning. This article also shows how one system fault can affect the overall health of the vehicle.

Author 1: F. Khan
Author 2: O. F. Eker
Author 3: T. Sreenuch
Author 4: A. Tsourdos

Keywords: Intelligent Reasoning; Finite State Machines; Aircraft System Simulation; Multi-Physics; Real-Time Simulation, VLRS (Vehicle Level Reasoning System); HM (Health Management)

PDF

Paper 15: Selection of Touch Gestures for Children’s Applications: Repeated Experiment to Increase Reliability

Abstract: This paper discusses the selection of touch gestures for children’s applications. This research investigates the gestures that children aged between 2 to 4 years old can manage on the iPad device. Two experiments were conducted for this research. The first experiment was carried out in United Kingdom. The second experiment was carried out in Malaysia. The two similar experiments were carried out to increase the reliability and refine the result. This study shows that children aged 4 years have no problem using the 7 common gestures found in iPad applications. Some children aged 3 years have problem with two of the gestures. A high percentage of children aged 2 years struggled with the free rotate, drag & drop, pinch and spread gestures. This paper also discusses the Additional Criteria for the use of Gestures, Interface Design Components and Research on Children using iPad and Applications.

Author 1: Nor Azah Abdul Aziz
Author 2: Nur Syuhada Mat Sin
Author 3: Firat Batmaz
Author 4: Roger Stone
Author 5: Paul Wai Hing Chung

Keywords: Children; Gesture; Applications (Apps)

PDF

Paper 16: A web based Publish-Subscribe framework for mobile computing

Abstract: The growing popularity of mobile devices is permanently changing the Internet user’s computing experience. Smartphones and tablets begin to replace the desktop as the primary means of interacting with various information technology and web resources. While mobile devices facilitate in consuming web resources in the form of web services, the growing demand for consuming services on mobile device is introducing a complex ecosystem in the mobile environment. This research addresses the communication challenges involved in mobile distributed networks and proposes an event-driven communication approach for information dissemination. This research investigates different communication techniques such as polling, long-polling and server-side push as client-server interaction mechanisms and the latest web technologies standard WebSocket , as communication protocol within a Publish/Subscribe paradigm. Finally, this paper introduces and evaluates the proposed framework, that is a hybrid approach of WebSocket and event-based publish/subscribe for operating in mobile environments.

Author 1: Cosmina Ivan

Keywords: mobile computing; Websockets; publish-subscribe; REST

PDF

Paper 17: A Coding Technique Based on the Frequency Evolution Creates with a Time Frequency Analysis a New Genome's Landscape

Abstract: In recent years, considerable effort has been devoted to study the biological data sets within the framework of the genomic signal processing field. However, the enormous amount of data deposited into public databases makes the search for useful information a difficult task. Effectively, the choice for a convenient analysis approach is not at all obvious at all. In this work, we provide a new way to map the genomes within the form of images. The mapping uses the Complex Morlet wavelet as analysis technique and the Frequency Chaos Game Signal (FCGS) as digital dataset. Before processing the wavelet analysis, we build the FCGS in such a way that we can follow the frequency evolution of nucleotides’ occurrence along the genome. The time-frequency analysis of the FCGS signals constitutes a pertinent tool for exploring the DNA structures in the C.elegans genome-wide landscape.

Author 1: Imen MESSAOUDI
Author 2: Afef ELLOUMI
Author 3: Zied LACHIRI

Keywords: C.elegans; Complex Morlet wavelet; Frequency Chaos Game Signal; Genome exploration

PDF

Paper 18: On the Parallel Design and Analysis for 3-D ADI Telegraph Problem with MPI

Abstract: In this paper we describe the 3-D Telegraph Equation (3-DTEL) with the use of Alternating Direction Implicit (ADI) method on Geranium Cadcam Cluster (GCC) with Message Passing Interface (MPI) parallel software. The algorithm is presented by the use of Single Program Multiple Data (SPMD) technique. The implementation is discussed by means of Parallel Design and Analysis with the use of Domain Decomposition (DD) strategy. The 3-DTEL with ADI scheme is implemented on the GCC cluster, with an objective to evaluate the overhead it introduces, with ability to exploit the inherent parallelism of the computation. Results of the parallel experiments are presented. The Speedup and Efficiency from the experiments on different block sizes agree with the theoretical analysis.

Author 1: Simon Uzezi Ewedafe
Author 2: Rio Hirowati Shariffudin

Keywords: 3-DTEL; ADI; MPI; SPMD; DD; Parallel Design

PDF

Paper 19: Estimating Traffic Intensity at Toll Gates Using Qeueueing Networks

Abstract: Traffic information generation is a routine-like operation that is done on a daily basis at any public gate. A toll gate is a public roadway by which people enter and leave a public organisation. The existing models give premium consideration to security over prompt services and as such associated with processes that have high cost of implementation, inaccuracy from complex method as well pose other technical problems such as delay. This research presents an automated procedure for monitoring traffic at toll gates to give the best compromise among the conflicting objectives of payment, security and good services. The system gathers information about the traffic situation with respect to the license plate number captured from each vehicle that passes through the toll gate and as well captures data such as arrival speed, arrival time and date and uses this data as input to generate traffic report/information on a daily basis. Experimentally the system shows that it can effectively capture the vehicle video and detect the license plate in day time, showing accuracy of about 85% to 90%, practical results based on actual data are included.

Author 1: Vincent O. R
Author 2: Olayiwola O. E.
Author 3: Kosemani O. O.

Keywords: Toll Gates; Queueing Networks; Traffic intensity; Delay and Image detection

PDF

Paper 20: Performance Analysis of Faults Detection in Wind Turbine Generator Based on High-Resolution Frequency Estimation Methods

Abstract: Electrical energy production based on wind power has become the most popular renewable resources in the recent years because it gets reliable clean energy with minimum cost. The major challenge for wind turbines is the electrical and the mechanical failures which can occur at any time causing prospective breakdowns and damages and therefore it leads to machine downtimes and to energy production loss. To circumvent this problem, several tools and techniques have been developed and used to enhance fault detection and diagnosis to be found in the stator current signature for wind turbines generators. Among these methods, parametric or super-resolution frequency estimation methods, which provides typical spectrum estimation, can be useful for this purpose. Facing on the plurality of these algorithms, a comparative performance analysis is made to evaluate robustness based on differents metrics: accuracy, dispersion, computation cost, perturbations and faults severity. Finally, simulation results in Matlab with most occurring faults indicate that ESPRIT and R-MUSIC algorithms have high capability of correctly identifying the frequencies of fault characteristic components, a performance ranking had been carried out to demonstrate the efficiency of the studied methods in faults detecting.

Author 1: CHAKKOR SAAD
Author 2: Baghouri Mostafa
Author 3: Hajraoui Abderrahmane

Keywords: Wind turbine Generator; Fault diagnosis; Frequency Estimation; Monitoring; Maintenance; High Resolution Methods; Current Signature Analysis

PDF

Paper 21: A Survey of Unstructured Text Summarization Techniques

Abstract: Due to the explosive amounts of text data being created and organizations increased desire to leverage their data corpora, especially with the availability of Big Data platforms, there is not usually enough time to read and understand each document and make decisions based on document contents. Hence, there is a great demand for summarizing text documents to provide a representative substitute for the original documents. By improving summarizing techniques, precision of document retrieval through search queries against summarized documents is expected to improve in comparison to querying against the full spectrum of original documents. Several generic text summarization algorithms have been developed, each with its own advantages and disadvantages. For example, some algorithms are particularly good for summarizing short documents but not for long ones. Others perform well in identifying and summarizing single-topic documents but their precision degrades sharply with multi-topic documents. In this article we present a survey of the literature in text summarization. We also surveyed some of the most common evaluation methods for the quality of automated text summarization techniques. Last, we identified some of the challenging problems that are still open, in particular the need for a universal approach that yields good results for mixed types of documents.

Author 1: Sherif Elfayoumy
Author 2: Jenny Thoppil

Keywords: text summarization; unstructured data; text mining; unstructured data analytics

PDF

Paper 22: DUT Verification Through an Efficient and Reusable Environment with Optimum Assertion and Functional Coverage in SystemVerilog

Abstract: Verification is the most integral part of chip manufacturing and testing and is as important as the designing. Verification provides with the actual implementation and functionality of a Design under Test (DUT) and checks if it meets the specifications or not. In this paper, a communication protocol has been verified as per the design specifications. The environment so created completely wraps the design under verification and observes an optimum functional and assertion based coverage. The coverage so obtained is 100% assertion based coverage and 83.3% functional coverage using SV (SystemVerilog). The total coverage so obtained is 91.66%.

Author 1: Deepika Ahlawat
Author 2: Neeraj Kr. Shukla

Keywords: Assertions; Coverage; Environment; Mailbox; Randomization;SystemVerilog; Threads; Transactions

PDF

Paper 23: Towards a Modular Recommender System for Research Papers written in Albanian

Abstract: In the recent years there has been an increase in scientific papers publications in Albania and its neighboring countries that have large communities of Albanian speaking researchers. Many of these papers are written in Albanian. It is a very time consuming task to find papers related to the researchers’ work, because there is no concrete system that facilitates this process. In this paper we present the design of a modular intelligent search system for articles written in Albanian. The main part of it is the recommender module that facilitates searching by providing relevant articles to the users (in comparison with a given one). We used a cosine similarity based heuristics that differentiates the importance of term frequencies based on their location in the article. We did not notice big differences on the recommendation results when using different combinations of the importance factors of the keywords, title, abstract and body. We got similar results when using only the title and abstract in comparison with the other combinations. Because we got fairly good results in this initial approach, we believe that similar recommender systems for documents written in Albanian can be build also in contexts not related to scientific publishing.

Author 1: Klesti Hoxha
Author 2: Alda Kika
Author 3: Eriglen Gani
Author 4: Silvana Greca

Keywords: recommender system; Albanian; information retrieval; intelligent search; digital library

PDF

Paper 24: On an Overlaid Hybrid Wire/Wireless Interconnection Architecture for Network-on-chip

Abstract: Network-on-Chip (NoC) built upon metal low-k interconnect wires, are to meet the ever stringent performance requirements in the future technology nodes. In response to this interconnection crisis, the wireless network-on-chip (WNoC), enabled by the availability of miniaturized on-chip antennas and transceivers, is envisioned one of the most revolutionary promising approach alternatives. In this paper, we present a new WNoC architecture with a layered topology, where a metal/low-k based wired network is partitioned into several subnetworks, and these subnetworks are connected through a wireless network that is overlaid on top of them. Due to limited transmission range, the wireless nodes in the wireless network actually communicate with each other in a multiple-hop fashion. As a large volume of traffic will go through the wireless nodes, a contention avoidance routing algorithm is adopted. In addition, two virtual channels have been introduced into the wireless router design to avoid any possible deadlocks that otherwise may occur. Experiment results have shown that throughput of the proposed architecture, on average, is about 20% higher than that of the existing WNoC architectures. And delay of the proposed architecture is about 30% less than the existing WNoC architectures.

Author 1: Ling Wang
Author 2: Zhihai Guo
Author 3: Peng Lv
Author 4: Yingtao Jiang

Keywords: Network-on-Chip; wireless; subnet; 2-Level Hybrid Mesh topology

PDF

Paper 25: Image Sharpness Metric Based on Algebraic Multi-grid Method

Abstract: In order to improve Mean Square Error of its reliance on reference images when evaluating image sharpness, the no-reference metric based on algebraic multi-grid is proposed. The proposed metric first reconstructs the original image by Algebraic Multi-grid (AMG), then compute the Mean Square Error between original image and reconstructed image, the result represents image sharpness. Experiments show that the proposed sharpness metric has better practicability and monotonicity, correlates well with the perceived sharpness. The algorithm has superiority in image sharpness metric.

Author 1: Qian Ying
Author 2: Ren Xue-mei
Author 3: Huang Ying
Author 4: Meng Li

Keywords: image sharpness mean square error; algebraic multigrid method; sharpness metric; image reconstruction

PDF

Paper 26: Investigating Students’ Achievements in Computing Science Using Human Metric

Abstract: This study investigates the role of personality traits, motivation for career choice and study habits in students’ academic achievements in the computing sciences. A quantitative research method was employed. Data was collected from 60 computing science students using the Myer Briggs Type indicator (MBTI) with additional questionnaires. A model of the form y_(ij=ß_0+ß_1 x_(1j+ ) ß_2 x_(2j+ ) ß_3 x_(3j+ ) ß_4 x_(4j+ )…ß_n x_nj ) was used, where y_ij represents a dependent variable, ß_0+ß_1 x_(1j+ ) ß_2 x_(2j+ ) ß_3 x_(3j+ ) ß_4 x_(4j+ )…ß_n x_nj the independent variables. Data analysis was performed on the data using the Statistical Package for the social sciences (SPSS). Linear regression was done in order to fit the model and justify its significance or none significance at the 0.05 level of significance. Result of regression model was also used to determine the impact of the independent variable on students’ performance. Results from this study suggests that the strongest motivator for a choice of career in the computing sciences is the desire to become a computing professional. Students’ achievements especially in the computing sciences do not depend only on students temperamental ability or personality traits, motivations for choice of course of study and reading habit, but also on the use of Internet based sources more than going to the university library to read book materials available in all areas

Author 1: Ezekiel U. Okike

Keywords: academic achievement; personality traits; computing science; study habits

PDF

Paper 27: Malware Detection in Cloud Computing

Abstract: Antivirus software is one of the most widely used tools for detecting and stopping malicious and unwanted files. However, the long term effect of traditional host based antivirus is questionable. Antivirus software fails to detect many modern threats and its increasing complexity has resulted in vulnerabilities that are being exploited by malware. This paper advocates a new model for malware detection on end hosts based on providing antivirus as an in-cloud network service. This model enables identification of malicious and unwanted software by multiple detection engines Respectively,This approach provides several important benefits including better detection of malicious software, enhanced forensics capabilities and improved deployability. Malware detection in cloud computing includes a lightweight, cross-Storge host agent and a network service. In this paper Combines detection techniques, static signatures analyze and Dynamic analysis detection. Using this mechanism we find that cloud- malware detection provides 35% better detection coverage against recent threats compared to a single antivirus engine and a 98% detection rate across the cloud environment.

Author 1: Safaa Salam Hatem
Author 2: Dr. Maged H. wafy
Author 3: Dr. Mahmoud M. El-Khouly

Keywords: Malware; Security; Cloud Computing

PDF

Paper 28: EEG Mouse:A Machine Learning-Based Brain Computer Interface

Abstract: The main idea of the current work is to use a wireless Electroencephalography (EEG) headset as a remote control for the mouse cursor of a personal computer. The proposed system uses EEG signals as a communication link between brains and computers. Signal records obtained from the PhysioNet EEG dataset were analyzed using the Coif lets wavelets and many features were extracted using different amplitude estimators for the wavelet coefficients. The extracted features were inputted into machine learning algorithms to generate the decision rules required for our application. The suggested real time implementation of the system was tested and very good performance was achieved. This system could be helpful for disabled people as they can control computer applications via the imagination of fists and feet movements in addition to closing eyes for a short period of time.

Author 1: Mohammad H. Alomari
Author 2: Ayman AbuBaker
Author 3: Aiman Turani
Author 4: Ali M. Baniyounes
Author 5: Adnan Manasreh

Keywords: EEG; BCI; Data Mining; Machine Learning; SVMs; NNs; DWT; Feature Extraction

PDF

Paper 29: Modeling and Forecasting the Number of Pilgrims Coming from Outside the Kingdom of Saudi Arabia Using Bayesian and Box-Jenkins Approaches

Abstract: Pilgrimage has received a great attention by the government of Saudi Arabia. Of special interest is the yearly series of the Number of Pilgrims coming from Outside the kingdom (NPO) since it is one of the most important indicators in determining the planning mechanism for future hajj seasons. This study approaches the problems of identification, estimation, diagnostic checking and forecasting of the NPO series using Bayesian and Box - Jenkins approaches. The accuracy of Bayesian and Box- Jenkins techniques have been checked for forecasting the future observations and the results were very satisfactory. Moreover, it has been shown that Bayesian technique gives more accurate results than Box-Jenkins technique.

Author 1: SAMEER M. SHAARAWY
Author 2: ESAM A. KHAN
Author 3: MAHMOUD A. ELGAMAL

Keywords: autoregressive processes; identification; estimation; diagnostic checking; forecasting; Jeffreys' prior; and posterior probability mass function

PDF

Paper 30: A new Hierarchical Group Key Management based on Clustering Scheme for Mobile Ad Hoc Networks

Abstract: The migration from wired network to wireless network has been a global trend in the past few decades because they provide anytime-anywhere networking services. The wireless networks are rapidly deployed in the future, secure wireless environment will be mandatory. As well, The mobility and scalability brought by wireless network made it possible in many applications. Among all the contemporary wireless networks,Mobile Ad hoc Networks (MANET) is one of the most important and unique applications. MANET is a collection of autonomous nodes or terminals which communicate with each other by forming a multihop radio network and maintaining connectivity in a decentralized manner. Due to the nature of unreliable wireless medium data transfer is a major problem in MANET and it lacks security and reliability of data. The most suitable solution to provide the expected level of security to these services is the provision of a key management protocol. A Key management is vital part of security. This issue is even bigger in wireless network compared to wired network. The distribution of keys in an authenticated manner is a difficult task in MANET. When a member leaves or joins the group, it needs to generate a new key to maintain forward and backward secrecy. In this paper, we propose a new group key management schemes namely a Hierarchical, Simple, Efficient and Scalable Group Key (HSESGK) based on clustering management scheme for MANETs and different other schemes are classified. Group members deduce the group key in a distributed manner.

Author 1: Ayman EL-SAYED

Keywords: Group Key management; Mobile Ad hoc network; MANET security; Unicast/Multicast protocols in MANET.

PDF

Paper 31: Human Recognition System using Cepstral Information

Abstract: This paper presents a new method for human recognition using the cepstral information. The proposed method consists in extracting the Linear Frequency Cepstral Coefficients (LFCC) from each heartbeat in the homomorphic domain. Thus, the Hidden Markov Model (HMM) under Hidden Markov Model Toolkit (HTK) is used for electrocardiogram (ECG) classification. To evaluate the performance of the classifier, the number of coefficients and the number of frequency bands are varied. Concerning the HMM topology, the number of Gaussians and states are also varied. The best rate is obtained with 32 coefficients, 24 frequency bands, 1 Gaussian and 5 states. Further, the method is improved by adding dynamic features: the first order delta (?) and energy (E) to the coefficients. The approach is evaluated on 18 healthy signals of the MIT_BIH database. The obtained results reveal which LFCC with energy that make a 33 dimensional feature vector leads to the best human recognition rate which is 99.33%.

Author 1: Emna RABHI
Author 2: Zied Lachiri

Keywords: Electrocardiogram(ECG); Linear Frequency Cepstral Coefficients( LFCC); Hidden Markov Model (HMM).

PDF

Paper 32: Incorporating Auxiliary Information in Collaborative Filtering Data Update with Privacy Preservation

Abstract: Online shopping has become increasingly popular in recent years. More and more people are willing to buy products through Internet instead of physical stores. For promotional purposes, almost all online merchants provide product recommendations to their returning customers. Some of them ask professional recommendation service providers to help develop and maintain recommender systems while others need to share their data with similar shops for better product recommendations. There are two issues, (1) how to protect customers’ privacy while retaining data utility before they release the data to the third parties; (2) based on (1), how to handle data growth efficiently. In this paper, we propose a NMF (Nonnegative Matrix Factorization)-based data update approach in collaborative filtering (CF) that solves the problems. The proposed approach utilizes the intrinsic property of NMF to distort the data for protecting user’s privacy. In addition, the user and item auxiliary information is taken into account in incremental nonnegative matrix tri-factorization to help improve the data utility. Experiments on three different datasets (MovieLens, Sushi and LibimSeTi) are conducted to examine the proposed approach. The results show that our approach can quickly update the new data and provide both high level privacy protection and good data utility.

Author 1: Xiwei Wang
Author 2: Jun Zhang
Author 3: Pengpeng Lin
Author 4: Nirmal Thapa
Author 5: Yin Wang
Author 6: Jie Wang

Keywords: auxiliary information; collaborative filtering; data growth; nonnegative matrix factorization; privacy

PDF

Paper 33: Surface Texture Synthesis and Mixing Using Differential Colors

Abstract: In neighborhood-based texture synthesis, adjacent local regions need to satisfy color continuity constraints in order to avoid visible seams. Such continuity constraints seriously restrict the variability of synthesized textures, making it impossible to generate new textures by mixing multiple input textures with very different base colors. In this paper, we propose to relax such restrictions and decompose synthesis into two relatively disjoint stages. In the first stage, an intermediate synthesized texture is generated by only considering the high frequency details during region search and matching. Such a scheme broadens the search space during texture synthesis, but may produce obvious seams due to large discontinuities in low frequency components. In the second stage, instead of performing local feathering along these discontinuities, we perform Laplacian texture reconstruction, which retains the high frequency details but computes new consistent low frequency components to eliminate the seams. It does not only affect texels close to the discontinuities, but also modifies the rest of the texels. Therefore, it can be viewed as a global feature-preserving smoothing step, and is more effective than local feathering. Experiments indicate that our twostage synthesis can produce desirable results for regular texture synthesis as well as texture mixing from multiple sources.

Author 1: Qing Wu
Author 2: Lin Shi
Author 3: Stephen Bond
Author 4: Yizhou Yu

PDF

The Science and Information (SAI) Organization
BACK TO TOP

Computer Science Journal

  • About the Journal
  • Call for Papers
  • Submit Paper
  • Indexing

Our Conferences

  • Computing Conference
  • Intelligent Systems Conference
  • Future Technologies Conference
  • Communication Conference

Help & Support

  • Contact Us
  • About Us
  • Terms and Conditions
  • Privacy Policy

© The Science and Information (SAI) Organization Limited. All rights reserved. Registered in England and Wales. Company Number 8933205. thesai.org