The Science and Information (SAI) Organization
  • Home
  • About Us
  • Journals
  • Conferences
  • Contact Us

Publication Links

  • IJACSA
  • Author Guidelines
  • Publication Policies
  • Digital Archiving Policy
  • Promote your Publication
  • Metadata Harvesting (OAI2)

IJACSA

  • About the Journal
  • Call for Papers
  • Editorial Board
  • Author Guidelines
  • Submit your Paper
  • Current Issue
  • Archives
  • Indexing
  • Fees/ APC
  • Reviewers
  • Apply as a Reviewer

IJARAI

  • About the Journal
  • Archives
  • Indexing & Archiving

Special Issues

  • Home
  • Archives
  • Proposals
  • Guest Editors
  • SUSAI-EE 2025
  • ICONS-BA 2025
  • IoT-BLOCK 2025

Future of Information and Communication Conference (FICC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Computing Conference

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Intelligent Systems Conference (IntelliSys)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Future Technologies Conference (FTC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact
  • Home
  • Call for Papers
  • Editorial Board
  • Guidelines
  • Submit
  • Current Issue
  • Archives
  • Indexing
  • Fees
  • Reviewers
  • Subscribe

IJACSA Volume 6 Issue 5

Copyright Statement: This is an open access publication licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.

View Full Issue

Paper 1: A New Bio-Informatics Framework: Research on 3D Sensor Data of Human Activities

Abstract: Due to increasing attraction of motion capture systems technology and the usage of captured data in wide range of research-oriented applications, a framework has developed as an improved version of MOCAP TOOLBOX in Matlab platform. Firstly, we have introduced a faithful script to deal with public motion capture data, which will be friendly for us. Various functions through dynamic programming, by using the Body Segment Parameters (BSP) are edited and they configured the position of markers according to data. It is used to visualize and refine without the MLS view and the C3D editor software. It has opened a valuable way of sensor data in many research aspects as gait movements, marker analysis, compression and motion pattern, bioinformatics, and animation. As a result, performed on CMU and ACCAD public mocap data, and achieved higher corrected configuration scheme of 3D markers when compared with the prior art, especially for C3D file. Another distinction of this work is that it handles the extra markers distortion, and provides the meaningful way to use captured data.

Author 1: Sajid Ali
Author 2: *Wu Zhongke
Author 3: Muhammad Saad Khan
Author 4: Ahmad Tisman Pasha
Author 5: Muhammad Adana Khalid
Author 6: Zhou Mingquan

Keywords: Sensor data; Bioinformtics behavior; Optical actives; BSP domain; Marker Configuration

PDF

Paper 2: A Generic Adaptive Multi-Gene-Set Genetic Algorithm (AMGA)

Abstract: Genetic algorithms have been used extensively in solving complex solution-space search problems. However, certain problems can include multiple sub-problems in which multiple searches through distinct solution-spaces are required before the final solution combining all the sub-solutions is found. This paper presents a generic design of genetic algorithms which can be used for solving complex solution-space search problems that involve multiple sub-solutions. Such problems are very difficult to solve using basic genetic algorithm designs that utilize a single gene-set per chromosome. The suggested algorithm presents a generic solution which utilizes both multi-gene-set chromosomes, and an adaptive gene mutation rate scheme. The results presented from experiments done using an automatic graphical user interface generation case study, show that the suggested algorithm is capable of producing successful solutions where the common single-gene-set design fails.

Author 1: Adi A. Maaita
Author 2: Jamal Zraqou
Author 3: Fadi Hamad
Author 4: Hamza A. Al-Sewadi

Keywords: Genetic algorithm; Multi-gene-set; Single-gene-set; Artificial Intelligence; Generic algorithm; Generic architecture

PDF

Paper 3: Real-Time Digital Image Exposure Status Detection and Circuit Implementation

Abstract: Auto exposure is an important part of digital image signal processing. We studied the detection of the exposure status in this paper, and fast and parallel detection method was presented. The method comprises the following steps: first obtaining the current image, counting the numbers of pixels in bright and dark regions of the image and obtaining these pixels brightness; then determining exposure parameters based on the proportions of the counted numbers of pixels in bright and dark regions with preset value respectively; if the actual proportion is lower than preset value, then continue to adjust exposure parameters until pixel brightness value reaches preset brightness threshold. Experiments show that the computational complexity and operation demand is low, which can quickly determine the exposure status of the image, improving the real-time capability in image exposure control. The proposed method will make the whole digital image signal processing system works smoothly and be reliable. The circuit implementation of this method is simple with high real-time controllability. This method has been applied for China patent successfully.

Author 1: Li Hongqin
Author 2: Wu Jianzhen
Author 3: Zhang Liping
Author 4: Ning Jun

Keywords: real-time; auto exposure; fast and parallel method

PDF

Paper 4: Quantifying the Relationship between Hit Count Estimates and Wikipedia Article Traffic

Abstract: This paper analyzes the relationship between search engine hit counts and Wikipedia article views by evaluating the cross correlation between them. We observe the hit count estimates of three popular search engines over a month and compare them with the Wikipedia page views. The strongest cross correlations are recorded with their delays in days. We present the results in both graphs and quantitative data among different search engines. We also investigate the predicting trends between the hit counts and Wikipedia article traffic.

Author 1: Tina Tian
Author 2: Ankur Agrawal

Keywords: hit count estimations; search engines; Wikipedia article traffic; cross correlation; positive delay, negative delay; prediction of Web hosting trend

PDF

Paper 5: Applying Linked Data Technologies for Online Newspapers

Abstract: The constantly growing data volume at the companies along with the necessity for finding information for the shortest possible time span involves methods of information search different from the ones conventionally used. The semantic technologies, developed in the late 90s and the beginning of the new century, are viewed as a new generation of databases and as text analyzing technologies. The present paper deals with researching the opportunities and examining the advantages of applying the semantic web technologies and the linked data for online newspapers. Besides, a RDF-based ontology for the purposes of a system for study and evaluation of online editions of regional daily newspapers is proposed. SPARQL endpoint is implemented to access the RDF data.

Author 1: Tsvetanka Georgieva-Trifonova
Author 2: Tihomir Stefanov

Keywords: semantic web; ontology; linked data; SPARQL endpoint; RDF dataset; online newspaper

PDF

Paper 6: Fall Monitoring Device for Old People based on Tri-Axial Accelerometer

Abstract: To be able to timely and effective judgment of the elderly fall, a fall monitoring device based on tri-axis accelerometer for elderly is designed. The device collects acceleration and the angle between elderly and horizontal plane of elderly people by MPU6050 tri-axial accelerometer, comparing the acceleration and angle that people and horizontal plane with threshold value to determine whether the old people fell. Delay for a period of time compared the angle and threshold again to judge the elderly in the fall still, finally send text messages to a mobile phone of guardian by GPRS module so that elderly can be helped.

Author 1: Jing Luo
Author 2: Bocheng Zhong
Author 3: Dinghao Lv

Keywords: Fall monitoring; tri-axis acceleration sensor; threshold; GPRS module

PDF

Paper 7: The Fir Digital Filter Design based on Iwpso

Abstract: The essence of finite impulse response (FIR) digital filter design is the problem of the parameter optimization. Namely the optimal parameters of FIR digital filter are the core of the design. In due to the traditional design method of FIR digital filter is not only accuracy not high but also sideband frequency is difficult to determine. Improve Weight Particle Swarm Optimization (IWPSO) to design FIR digital filter has less calculation and fast convergence speed. The simulation results also demonstrate that the IWPSO has better appro-ximation properties and band-pass characteristics. what’s more, the convergence of IWPSO algorithm made good results in filter design efficiency.

Author 1: Xinnan Hu
Author 2: Yujia Wang
Author 3: Kun Su

Keywords: FIR filter design; parameter optimization; improve weight particle swarm optimization

PDF

Paper 8: Analysis and Research of Communication Interrupt Fault for Shanghai Metro Data Transmission System

Abstract: A line of Shanghai metro has been put into use for nearly fifteen years. There are three times extended during this time. The existing line’s data transmission system was modified over the last decades and has adopted many kinds of data transmission technology. By the analysis and research of communication interrupt of certain line’s data transmission system, which usually occurred in some site, the maintainers can find various security hidden danger in time and take corresponding measures, which has improved the quality of metro operation.

Author 1: Jianru Liang
Author 2: Xinyuan Lu
Author 3: Cong Shi
Author 4: Minglai Yang

Keywords: Data Transmission System (DTS); L3 Ethernet switch; Terminal Server; interlock

PDF

Paper 9: A Fuzzy PI Speed Controller based on Feedback Compensation Strategy for PMSM

Abstract: in order to solve the problem of robustness or anti-disturbance of the traditional PI speed controller in the permanent magnet synchronous motor. A fuzzy PI speed controller based on load torque feedback compensation is proposed for the permanent magnet synchronous motor. The combination of fuzzy PI control strategy and load feedback compensation method can enhance the robustness and disturbance rejection of the speed loop. According to the validated results of simulation and experiments, by using this PMSM speed controller, the robustness of the system speed control was enhanced markedly, and the capacity of anti-disturbance was also improved significantly.

Author 1: Ou Sheng
Author 2: Liu Haishan
Author 3: Liu Guoying
Author 4: Zeng Guohui
Author 5: Zhan Xing
Author 6: Wang Qingzhen
Author 7: Liu Haishan

Keywords: permanent magnet synchronous motor(PMSM); Fuzzy PI; torque feedback compensation; anti-disturbance

PDF

Paper 10: CPLD-Based Circuit Design of IGBT Dead-Time Compensation

Abstract: IGBT (insulated-gate bipolar transistors) dead-time compensation circuit has a very important significant for improving the output voltage waveform of the inverter, reducing the harmonic output current. Thus, many compensation strategies are reported in literatures and have been implemented in industrial drives recently. Overall, the method of dead-time compensation can be divided into hardware compensation and software compensation. Hardware compensation method needs additional hardware circuits, which means additional space and cost. Still more, the additional circuit is easy to interfere with others, which can reduce the compensation accuracy. While the software compensation method takes up a lot of memory space and additional input-output ports of processor, which often result to the added operation and heat dissipation of controller. In this paper, CPLD (complex programmable logic device)-based circuit design of dead-time compensation is presented to solve these existed drawbacks. It is verified that not only can the circuit simplify existed inverter dead-time compensation design, but also it has the advantages of small volume, strong anti-interference ability, and high compensation precision. The simulation results validate that this method is feasible and effective.

Author 1: Qing-zhen WANG
Author 2: Guo-hui ZENG
Author 3: Jin LIU
Author 4: Xing ZHAN

Keywords: Dead-time compensation; inverter; compensation method; circuit design; CPLD; IGBT

PDF

Paper 11: Detection and Removal of Gray, Black and Cooperative Black Hole Attacks in AODV Technique

Abstract: Mobile ad hoc network (MANET) is an autonomous self-configuring infrastructure-less wireless network. MANET is vulnerable to a lot of routing security threats due to unreliability of its nodes that are highly involved in the routing process. In this paper, a new technique is proposed to enhance the security of one of the most popular MANET routing protocols that is called Ad hoc on Demand Distance Vector (AODV) with minimum routing overhead and high packet delivery ratio. The proposed technique intends to detect and remove black, gray, and cooperative black hole AODV attacks depending on a mobile backbone network constructed from randomly moving regular MANET nodes based on their trust value, location, and power. The backbone network monitors regular nodes as well as each other to periodically estimate monitoring trust values which represent the reliability of each node in the network. The drop in the monitoring trust value of any node is used as a clue to its malicious behavior. The backbone network also tries to bait the malicious nodes to reply to a request for a route to fake destination address. The proposed technique uses the control packets of the AODV to exchange its control information which highly reduces the overhead. The simulation results show that the performance of the proposed technique is more secure than AODV and the other recently introduced techniques.

Author 1: Hosny M. Ibrahim
Author 2: Nagwa M. Omar
Author 3: Ebram K. William

Keywords: MANET; AODV; Black Hole Attack; Gray Hole Attack; Cooperative Black Hole Attack

PDF

Paper 12: Adoption of e-Government in Pakistan: Demand Perspective

Abstract: The reason for this paper is to investigate the variables that empower citizen adoption of e-Government driven organizations in Pakistan, where these offices are at a simple stage. Comprehension citizen’s adoption of electronic-government is an essential topic, as the utilization of e-Government has turned into an integral part of administration. Achievement of such activities depends generally on the productive utilization of e-taxpayer supported organizations. Inclusive e-Government is the gateway to the efficiency promised by the Electronic Government. This study utilizes the Unified Theory of Acceptance and Use of Technology (UTAUT) model to inspect the powerful elements of the adoption and utilization of e-Government services in Pakistan from a national point of view. An online survey was led and a factual spellbinding examination was performed on the reactions got from 200 Pakistani nationals. The embraced model can be utilized as a rule for the execution of e-Government services in Pakistan. This study recommends that government ought to run broad publicizing battles to guarantee that individuals are mindful of the services and utilization them. This infers that government ought to place accentuation on expanding familiarity with the services, show the profits of citizens, and empowering confidence in the framework.

Author 1: Zulfiqar Haider
Author 2: Chen Shuwen
Author 3: Zareen Abbassi

Keywords: E-government; adoption; demand perspective; Pakistan

PDF

Paper 13: Applying Topology-Shape-Metric and FUZZY Genetic Algorithm for Automatic Planar Hierarchical and Orthogonal Graphs

Abstract: The graphs appear in many applications such as computer networks, data networks, and PERT networks, when the network includes a small number of devices, it can be drawn easily by hand, as the number of devices increases, drawing becomes a very difficult task. For this problem we will develop a new method for automatic graph drawing based on two steps, the first is applying the topology –shape –metric that is approaching to orthogonal drawings for the grid and the second step is applying the fuzzy genetic algorithm that is directed, in the topology –shape –metric the final drawing is achieved through three sequential steps: planarization, orthogonalization, and compaction. Each of these steps is responsible for the quality of the final drawing. Then the genetic algorithm applied at the planarization step of the topology-shape-metric to find the geometric position of each vertex to minimize bending in the graph. The developed technique generates a greater number of planar embedding by varying the order of edges’ insertion. This is achieved clearly in the Results given in the paper.

Author 1: Nahla F. Omran
Author 2: Sara F. Abd-el ghany

Keywords: graph drawing; hierarchical graphs; topology-shape-metric; fuzzy genetic algorithms

PDF

Paper 14: Performance Enhancement of Scheduling Algorithm in Heterogeneous Distributed Computing Systems

Abstract: Efficient task scheduling is essential for obtaining high performance in heterogeneous distributed computing systems. Some algorithms have been proposed for both homogeneous and heterogeneous distributed computing systems. In this paper, a new static scheduling algorithm is proposed called Node Duplication in Critical Path (NDCP) algorithm to schedule the tasks efficiently on the heterogeneous distributed computing systems. The NDCP algorithm focuses on reducing the makespan and provides better performance than the other algorithms in metrics of speedup and efficiency. It consists of two phases, priority phase and processor selection phase. From the theoretical analysis of the NDCP algorithm with other algorithms for a Directed Acyclic Graph (DAG), the better performance is observed.

Author 1: Aida A. NASR
Author 2: Nirmeen A. EL-BAHNASAWY
Author 3: Ayman EL-SAYED

Keywords: static task scheduling; heterogeneous distributed computing systems; Meta-heuristic algorithms

PDF

Paper 15: Numerical Evaluation of the Effect of Gradient on Reflection Coefficient of Continuously Graded Layer

Abstract: This paper presents a numerical model, based on transfer matrix method, for modeling the propagation of surface acoustic waves at the interface formed by the coupling liquid and a continuously inhomogeneous thin layer on a semi-infinite substrate. The tow-dimensional spectrum of reflection coefficient computed by this model, allows determining the modes which propagate at the studied interface, this model treats different profile of gradients, and the numerical results obtained show that the reflection coefficient is sensitive to the variation of these gradients.

Author 1: Ahmed Markou
Author 2: Hassan Nounah

Keywords: surface acoustic waves; nondestructive testing; functionally graded materials; dispersion curve; Lamb modes

PDF

Paper 16: Automatic Ferrite Content Measurement based on Image Analysis and Pattern Classification

Abstract: The existing manual point counting technique for ferrite content measurement is a difficult time consuming method which has limited accuracy due to limited human perception and error induced by points on boundaries of grid spacing. In this paper, we present a novel algorithm, based on image analysis and pattern classification, to evaluate the volume fraction of ferrite in microstructure containing ferrite and austenite. The prime focus of the proposed algorithm is to solve the problem of ferrite content measurement using automatic binary classification approach. Classification of image data into two distinct classes, using optimum threshold finding method, is the key idea behind the new algorithm. Automation of the process to measure the ferrite content and to speed up specimen’s testing procedure is the main feature of the newly developed algorithm. Improved performance index by reducing error sources is reflected from obtained results and validated through the comparison with a well-known method of Ohtsu.

Author 1: Hafiz Muhammad Tanveer
Author 2: Hafiz Muhammad Tahir Mustafa
Author 3: Waleed Asif
Author 4: Munir Ahmad
Author 5: Muhammad Anjum Javed
Author 6: Maqsood Ahmad

Keywords: Pattern classification; Decision threshold; Machine learning; Microstructure

PDF

Paper 17: Development of Eye-Blink and Face Corpora for Research in Human Computer Interaction

Abstract: A major requirement in face recognition research and coded voluntary eye-blink based sign language communication research is a robust face and eye-blink image corpora. The effectiveness, confidence level, and acceptability level of developed algorithms for face recognition and eye-blink based sign language communication depend largely on availability of relevant corpora in these fields of international standard. The wave of security challenges with attendant wanton destruction to lives and properties particularly in our country makes deployment of appropriate information technology to curb it imperative. Hence, the motivation of this work in provision of face and eye-blink image corpora with local contents to serve as input dataset to our developed face recognition authenticated driven coded eye-blink triggered actionable alert.

Author 1: Emmanuel Jadesola Adejoke.
Author 2: Ibiyemi Tunji Samuel

Keywords: Face Recognition; Coded Voluntary Eye Blink; Sign Language Communication; Authenticated driven; corpora

PDF

Paper 18: Comparison Fractal Color Image Compression using YIQ and YUV Color Model

Abstract: The principle of fractal image coding is that the image converges to a stable image by iterating the contractive transformations on an arbitrary initial image. This algorithm Partition the image into a number of range blocks and domain blocks. For every range block, the best matching domain block is searched for among all domain blocks by performing a set of transformations on each block. For color image compression, the Fractal coding is applied on different planes of color image independently by treating each plane as gray level image. The coordinate systems used for color image are RGB, YIQ and YUV. To encode a color image the main idea is to divide the image into its three different layers or components (RGB, YIQ and YUV). It is then possible to compress each of these layers separately, handle each of the layers as an independent image. In this paper the data of the color component (R,G,B) are transformed two times in two program separately, ones for YIQ and other for YUV color space. The results show that using (YUV) color space is more useful and efficient than using YIQ in fractal image compression, where PSNR increase 0.1% , CR increase 0.31% and ET decrease 2.321%.

Author 1: Eman A. Al-Hilo
Author 2: Rusul Zehwar

Keywords: Compression image; fractal color image compression and iterated function system

PDF

Paper 19: A ’Cognitive Driving Framework’ for Collision Avoidance in Autonomous Vehicles

Abstract: The Cognitive Driving Framework is a novel method for forecasting the future states of a multi-agent system that takes into consideration both the intentions of the agents as well as their beliefs about the environment. This is partic-ularly useful for autonomous vehicles operating in an urban environment. The algorithm maintains a posterior probability distribution over agent intents and beliefs in order to more accurately forecast their future behavior. This allows an agent navigating the environment to recognize dangerous situations earlier and more accurately than competing algorithms, therefore allowing the agent take actions in order to prevent collisions. This paper presents the Cognitive Driving Framework in detail and describes its application to intersection navigation for au-tonomous vehicles. The effects of different parameter choices on the performance of the algorithm are analyzed and experiments are conducted demonstrating the ability of the algorithm to predict and prevent automobile collisions caused by human error in multiple intersection navigation scenarios. The results are compared to the performance of prevailing methods; namely reactionary planning and constant velocity forecasting.

Author 1: Alan J. Hamlet
Author 2: Carl D. Crane

Keywords: Multi-agent systems; autonomous vehicles; intent prediction; non-linear filtering; Bayesian filtering;

PDF

Paper 20: Denoising CT Images using wavelet transform

Abstract: Image denoising is one of the most significant tasks especially in medical image processing, where the original images are of poor quality due the noises and artifacts introduces by the acquisition systems. In this paper, we propose a new image denoising scheme by modifying the wavelet coefficients using soft-thresholding method, we present a comparative study of different wavelet denoising techniques for CT images and we discuss the obtained results. The denoising process rejects noise by thresholding in the wavelet domain. The performance is evaluated using Peak Signal-to-Noise Ratio (PSNR) and Mean Squared Error (MSE). Finally, Gaussian filter provides better PSNR and lower MSE values. Hence, we conclude that this filter is an efficient one for preprocessing medical images.

Author 1: Lubna Gabralla
Author 2: Hela Mahersia
Author 3: Marwan Zaroug

Keywords: Computed Tomography; Discrete wavelet transform; Lung cancer; Thresholding

PDF

The Science and Information (SAI) Organization
BACK TO TOP

Computer Science Journal

  • About the Journal
  • Call for Papers
  • Submit Paper
  • Indexing

Our Conferences

  • Computing Conference
  • Intelligent Systems Conference
  • Future Technologies Conference
  • Communication Conference

Help & Support

  • Contact Us
  • About Us
  • Terms and Conditions
  • Privacy Policy

© The Science and Information (SAI) Organization Limited. All rights reserved. Registered in England and Wales. Company Number 8933205. thesai.org