The Science and Information (SAI) Organization
  • Home
  • About Us
  • Journals
  • Conferences
  • Contact Us

Publication Links

  • IJACSA
  • Author Guidelines
  • Publication Policies
  • Digital Archiving Policy
  • Promote your Publication
  • Metadata Harvesting (OAI2)

IJACSA

  • About the Journal
  • Call for Papers
  • Editorial Board
  • Author Guidelines
  • Submit your Paper
  • Current Issue
  • Archives
  • Indexing
  • Fees/ APC
  • Reviewers
  • Apply as a Reviewer

IJARAI

  • About the Journal
  • Archives
  • Indexing & Archiving

Special Issues

  • Home
  • Archives
  • Proposals
  • Guest Editors
  • SUSAI-EE 2025
  • ICONS-BA 2025
  • IoT-BLOCK 2025

Future of Information and Communication Conference (FICC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Computing Conference

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Intelligent Systems Conference (IntelliSys)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Future Technologies Conference (FTC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact
  • Home
  • Call for Papers
  • Editorial Board
  • Guidelines
  • Submit
  • Current Issue
  • Archives
  • Indexing
  • Fees
  • Reviewers
  • Subscribe

IJACSA Volume 9 Issue 5

Copyright Statement: This is an open access publication licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.

View Full Issue

Paper 1: Cardiotocographic Diagnosis of Fetal Health based on Multiclass Morphologic Pattern Predictions using Deep Learning Classification

Abstract: Medical complications of pregnancy and pregnancy-related deaths continue to remain a major global challenge today. Internationally, about 830 maternal deaths occur every day due to pregnancy-related or childbirth-related complications. In fact, almost 99% of all maternal deaths occur in developing countries. In this research, an alternative and enhanced artificial intelligence approach is proposed for cardiotocographic diagnosis of fetal assessment based on multiclass morphologic pattern predictions, including 10 target classes with imbalanced samples, using deep learning classification models. The developed model is used to distinguish and classify the presence or absence of multiclass morphologic patterns for outcome predictions of complications during pregnancy. The testing results showed that the developed deep neural network model achieved an accuracy of 88.02%, a recall of 84.30%, a precision of 85.01%, and an F-score of 0.8508 in average. Thus, the developed model can provide highly accurate and consistent diagnoses for fetal assessment regarding complications during pregnancy, thereby preventing and/or reducing fetal mortality rate as well as maternal mortality rate during and following pregnancy and childbirth, especially in low-resource settings and developing countries.

Author 1: Julia H. Miao
Author 2: Kathleen H. Miao

Keywords: Activation function; deep learning; deep neural network; dropout; ensemble learning; multiclass; regularization; cardiotocography; complications during pregnancy; fetal heart rate

PDF

Paper 2: Flow-Length Aware Cache Replacement Policy for Packet Processing Cache

Abstract: Recent core routers are required to process packets not only at high throughput but also with low power consumption due to the increase in the network traffic amount. Packet processing cache (PPC) is one of the effective approaches to meet the requirements. PPC enables to process a packet without accessing to a ternary content addressable memory (TCAM) by storing the TCAM lookup results of a flow in a cache. Because the cache miss rate of PPC directly impacts on the packet processing throughput and the power consumption of core routers, it is important for PPC to reduce the number of cache misses. In this study, we focus on characteristics of flows and propose an effective cache replacement policy for PPC. The proposed policy, named Hit Dominance Cache (HDC), divides the cache into two areas and assigns flows to the appropriate area to evict mice flows rapidly and to retain elephant flows preferentially. Simulation results with 15 real network traces show that HDC can reduce the number of cache misses in PPC by up to 29.1% and 12.5% on average when compared to 4-way LRU, conventionally used in PPC. Furthermore, the hardware implementation using Verilog-HDL shows that the hardware costs of HDC is comparable to those of 4-way LRU though HDC performs as if the cache was composed of 8-way set associativity. Finally, we show that HDC can achieve 503 Gbps with 88.8% energy of conventional PPC (20.5% energy of TCAM only architecture).

Author 1: Hayato Yamaki

Keywords: Router; packet processing; cache replacement

PDF

Paper 3: Fuzzy Logic-Controlled 6-DOF Robotic Arm Color-based Sorter with Machine Vision Feedback

Abstract: A demonstration of the application of fuzzy logic-based joint controller (FLJC) to a 6-DOF robotic arm as a color-based sorter system is presented in this study. The robotic arm with FLJC is integrated with a machine vision system that can discriminate different colors. Additionally, the machine vision system composed of Kinect camera and computer were used to extract the coordinates of the gripper and the objects within the image of the workspace. A graphical user interface with an underlying sorting algorithm allows the user to control the sorting process. Once the system is configured, the computed joint angles by FLJC are transmitted serially to the microcontroller. The results show that the absolute error of the gripper coordinates is less than 2 cm and that the machine vision is capable of achieving at least 95% accuracy in proper color discrimination both for first and second level stacked color objects.

Author 1: Alexander C. Abad
Author 2: Dino Dominic Ligutan
Author 3: Elmer P. Dadios
Author 4: Levin Jaeron S. Cruz
Author 5: Michael Carlo D.P. Del Rosario
Author 6: Jho Nathan Singh Kudhal

Keywords: Color-based sorter; degrees of freedom; fuzzy logic; joint controller; machine vision; robotic arm

PDF

Paper 4: Mixed Profile Method of Speed and Location for Robotic Arms Motion used for Precise Positioning

Abstract: The paper describes a new real-time computation method named Mixt Profile of Speed (MPS), which is used to obtain the value of speed, at every sampling period of time, during the acceleration and deceleration stage, whereas the motion has three stages: 1) acceleration, 2) motion with imposed constant speed, and 3) deceleration. The method will determinate the location of a robotic arm for every sampling period of time. The originality of this new computation method refers to the deceleration stage; it determines an accurate positioning at the end of the motion in a well determinate interval of time. During the forced constant motion stage, the trajectory is imposed and it is linear or circular. The ADNIA algorithm (numerical differential analysis interpolation algorithm) can be implemented at this stage (during the motion with imposed constant speed of the robotic arm) in order to ensure the maximum precision of the computation for the waypoints Cartesian coordinates.

Author 1: Liliana Marilena Matica
Author 2: Cornelia Gyorödi
Author 3: Helga Silaghi
Author 4: Andrei Silaghi

Keywords: Sampling period of time; waypoints; location matrix for a robotic arm; acceleration; deceleration; motion stage; mixt profile of speed; trapezoidal profile; parabolic profile

PDF

Paper 5: A Novel E-Mail Network Evolution Model based on user Information

Abstract: E-mail is one of the main means of communication in society today, and it is a typical social network. Studying the evolution of the social network structure by constructing an e-mail network evolution model is of great significance to the literature. In this paper, we first analyze the e-mail network by constructing an e-mail network communication model; this mainly includes analysis of the structure of the e-mail network and analysis of the user information in the e-mail network; then, we propose an e-mail network evolution model based on the characteristics of user information and give the specific evolutionary steps; finally, the simulation experiments are carried out to analyze the characteristics of the model. Experiments show that the nodes are characterized by a power-law distribution, and compared with other models; the model is closer to the real network, so it has important practical significance.

Author 1: Lejun ZHANG
Author 2: Tongxin ZHOU
Author 3: Chunhui ZHAO
Author 4: Zilong JIN

Keywords: Information characteristics; e-mail; network evolution; complex network

PDF

Paper 6: Design of Traffic Flow Simulation System to Minimize Intersection Waiting Time

Abstract: This paper designs a traffic simulation system for minimizing intersection waiting time. We use SUMO simulator which is widely used as a traffic flow simulation tool for traffic flow simulation. Using the SUMO simulator to set the route from the source to the destination and measuring the time required when using the existing intersection signal system. Through this simulation, we want to measure how much the proposed system can minimize the waiting time. In order to minimize the intersection waiting time, it is assumed that there is a loop sensor that can recognize whether there is a waiting vehicle in each direction of the intersection. Using this information, a signal lamp is used as a waiting signal in the case of a direction in which there is no waiting vehicle, and a driving signal is given in the case of a waiting vehicle or an entering vehicle. In this paper, we try to reduce the time required for vehicles to arrive at their destination by making the traffic flow smoothly without any expense such as road expansion through the limited system.

Author 1: Jang Seung-Ju

Keywords: Traffic flow simulation; SUMO simulator; reduce traffic time; intersection traffic flow; simulation design

PDF

Paper 7: Application of the Hierarchy Analysis Method at the Foodstuffs Quality Evaluation

Abstract: In Russia as well as in the other countries of the world national programs are implemented to improve the health of the population. An integral part of those programs are measures of improvement of food processes structure as well as the quality of food itself. New types of functional and specialized food products that meet the physiological needs of specific groups of the population with a therapeutic and therapeutic-prophylactic action spectrum are becoming more widespread. The article proposes the concept of determining the quality of food products through the indicator of “effective functionality” on the basis of a multicriteria approach using the hierarchy analysis method. On the example of gluten-free flour confectionery products, the determination of the organoleptic evaluation of the quality of a food product is shown, as a particular solution for finding one of the complex indicators of the first level. The use of T. Saaty’s method in making technological decisions on a large number of criteria is substantiated. The analysis of the obtained data allows to draw a conclusion that the greatest weight among alternatives was possessed by the sample containing three kinds of flour: buckwheat, amaranth and linen in the ratio 60:30:10.

Author 1: Marina A. Nikitina
Author 2: Igor A. Nikitin
Author 3: Natalya G. Semenkina
Author 4: Igor V. Zavalishin
Author 5: Andrey V. Goncharov

Keywords: Effective functionality; hierarchy analysis method; gluten-free flour confectionery products; organoleptic evaluation of the quality; food product quality

PDF

Paper 8: 3D Visualization of Sentiment Measures and Sentiment Classification using Combined Classifier for Customer Product Reviews

Abstract: The Internet has wide reachability making many users to buy the products online using e-commerce websites. Usually, users provide their opinions, comments, and reviews about the products in social media, e-commerce websites, blogs, etc. The product review comments provided by the customers have rich information about the usage of the products they bought and their sentiments towards those products. In this research, we have collected reviews from Amazon.com and performed sentiment analysis to collect sentiment information. We have proposed 3D visualizations to represent sentiment information, such as sentiment scores and statistics about words used in the reviews. The 3D visualizations are useful to represent large sentiment related information and to have an in-depth understanding of sentiments of users. We have developed a combined classifier using Logistic Regression, Decision Tree and Support Vector Machine. From the reviews, we formed N-gram features using a bag of words and performed sentiment classification using combined classifier. On 10 fold cross-validation, a maximum classification rate for combined classifier of 90.22% is obtained for sentiment classification.

Author 1: Siddhaling Urologin
Author 2: Sunil Thomas

Keywords: Sentiment analysis; 3D visualization; sentiment classification; natural language processing; product reviews

PDF

Paper 9: A Novel Energy Efficient Mobility Aware MAC Protocol for Wireless Sensor Networks

Abstract: Dealing with mobility at the link layer in an efficient and effective way is a formidable challenge in Wireless Sensor Networks due to recent boom in mobile applications and complex network scenarios. Most of the current MAC protocols proposed for WSNs generally focus on stationary network and usually provide feeble network performance in situations where mobile nodes are involved. Many MAC protocols are proposed and techniques are developed to support mobility but they undergo massive energy consumption and latency problems due to frequent connection setup and breakup. In this paper, we propose a new energy efficient mobility aware based MAC protocol (EEMA-MAC), which work efficiently in both stationary and mobile scenarios with less energy consumption. In this protocol the member nodes have sleep and awake time same like existing S-MAC protocol but it expedite the connection setup and efficiency as Cluster Head (CH) has extended wake up time and less sleep time. Simulation results show that this mechanism is effective to avoid frequent disconnection of nodes and performs well in terms of energy consumption, throughput and packet loss as compared with existing protocols, such as S-MAC and MS-MAC.

Author 1: Zain ul Abidin Jaffri
Author 2: Asif Kabir
Author 3: Gohar Rehman Chughtai
Author 4: S. Sabahat H. Bukhari
Author 5: Muhammad Arshad Shehzad Hassan

Keywords: Wireless sensor networks; energy efficiency; Media Access Control (MAC); mobility aware; cluster head

PDF

Paper 10: Routing Optimization in WBAN using Bees Algorithm for Overcrowded Hajj Environment

Abstract: Crowded places like Hajj environment in Makkah which host from 2 to 3 million on specific area and time can pose health challenges for pilgrims who need medical care. One of the solutions to overcome such difficulties is to use Wireless Body Area Networks (WBANs). WBAN is one of the new technology using wireless sensor network to gather data about status of patient then to forward collected data to be proceeded. However, various types of challenges in WBAN should be concerned. Power consumption is critical within WBAN system. Furthermore, delay of data transfer may lead to wrong diagnosis or uncorrected report that may lead to death; therefore, the transferred data must be reliable to ensure accuracy in measurement. In this paper, we propose a framework for routing optimization in medical wireless network. The proposed framework optimize shortest path in different stages of collected data to get less energy consumption, and reduce transmission time. The proposed work is based on Bees Algorithm to overcome such challenges and find shortest path for data within shortest time during overcrowded of Hajj environment. Matlab simulation results show good performance of Bees Algorithm in terms of reducing transmission time, energy consumption, delay, and throughput.

Author 1: Ghassan Ahmed Ali
Author 2: Shah Murtaza Rashid Al Masud

Keywords: Wireless Body Area Network (WBAN); Bees algorithm; routing optimization; Hajj environment

PDF

Paper 11: An Opportunistic Dissemination Protocol for VANETs

Abstract: In this article, we propose an Opportunistic information dissemination protocol by mixing both flooding and an enhanced DHVN (Dissemination protocol for heterogeneous Cooperative Vehicular Network) protocol, allowing them to run opportunistically in a Manhattan plan. Special additional logic is added to the existing version of DHVN protocol in order to efficiently disseminate information in two steps: 1) by adding three tags, Initial Diffusion, Standard DHVN and DHVN Near Intersection; the Initial Diffusion tag is used for the first flooding transmission only and 2) by changing the SNF (Store and Forward) period by making it adaptive depending on the region. Detailed simulation results show that our opportunistic protocol outperforms the DHVN protocol by analyzing its performances using an integrated framework VNS.

Author 1: Amina SEDJELMACI
Author 2: Fedoua DIDI
Author 3: Ahmed ABDUL RAHUMAN

Keywords: Flooding; DHVN; SNF; opportunistic; VANET

PDF

Paper 12: Student Facial Authentication Model based on OpenCV’s Object Detection Method and QR Code for Zambian Higher Institutions of Learning

Abstract: Facial biometrics captures human facial physiological data, converts it into a data item variable so that this stored variable may be used to provide information security services, such as authentication, integrity management or identification that grants privileged access or control to the owner of that data variable. In this paper, we propose a model for student authentication based on facial biometrics. We recommend a secure model that can be used in the authentication and management of student information in the registration and access of resources, such as bursaries, student accommodation and library facilities at the University of Zambia. Since the model is based on biometrics, a baseline study was carried out to collect data from the general public, government entities, commercial banks, students, ICT regulators and schools on their understanding, use and acceptance of biometrics as an authentication tool. Factor analysis has been used to analyze the findings. The study establishes that performance expectancy, effort expectancy, social influence and user privacy are key determinants for application of a biometric multimode authentication. The study further demonstrates that education and work experience are regulating factors on acceptance and expectancy of a biometric authentication system. Based on these results, we then developed a biometric model that can be used to perform authentication for students in higher learning institutions in Zambia. The results of our proposed model show 66% acceptance rate using OpenCV.

Author 1: Lubasi Kakwete Musambo
Author 2: Jackson Phiri

Keywords: Biometrics; authentication; model; integrity

PDF

Paper 13: BLOT: A Novel Phase Privacy Preserving Framework for Location-Based Services

Abstract: The inherent challenge within the domain of location-based services is finding a delicate balance between user privacy and the efficiency of answering queries. Inevitably, security issues can and will arise as the server must be informed about the query location in order to provide accurate responses. Despite the many security advancements in wireless communication, servers may become jeopardized or become infected with malicious software. That said, it is possible to ensure queries do not generate fake responses that appear real; in fact, if a fake response is used, mechanisms can be employed for the user to identify the query’s authenticity. Towards this end, the paper propose BLoom Filter Oblivious Transfer (BLOT), a novel phase privacy preserving framework for LBS that combines a Bloom filter hash function and the oblivious transfer protocol. These methods are shown to be useful in securing a user’s private information. An analysis of the results revealed that BLOT performed markedly better and enhanced entropy when compared to referenced approaches.

Author 1: Abdullah Albelaihy
Author 2: Jonathan Cazalas
Author 3: Vijey Thayananthan

Keywords: Privacy; location-based services (LBS); oblivious transfer; BLoom Filter Oblivious Transfer (BLOT); bloom filter

PDF

Paper 14: Development of Mobile-Interfaced Machine Learning-Based Predictive Models for Improving Students’ Performance in Programming Courses

Abstract: Student performance modelling (SPM) is a critical step to assessing and improving students’ performances in their learning discourse. However, most existing SPM are based on statistical approaches, which on one hand are based on probability, depicting that results are based on estimation; and on the other hand, actual influences of hidden factors that are peculiar to students, lecturers, learning environment and the family, together with their overall effect on student performance have not been exhaustively investigated. In this paper, Student Performance Models (SPM) for improving students’ performance in programming courses were developed using M5P Decision Tree (MDT) and Linear Regression Classifier (LRC). The data used was gathered using a structured questionnaire from 295 students in 200 and 300 levels of study who offered Web programming, C or JAVA at Federal University, Oye-Ekiti, Nigeria between 2012 and 2016. Hidden factors that are significant to students’ performance in programming were identified. The relevant data gathered, normalized, coded and prepared as variable and factor datasets, and fed into the MDT algorithm and LRC to develop the predictive models. The developed models were obtained, validated and afterwards implemented in an Android 1.0.1 Studio environment. Extended Markup Language (XML) and Java were used for the design of the Graphical User Interface (GUI) and the logical implementation of the developed models as a mobile calculator, respectively. However, Mean Absolute Error (MAE), Root Mean Squared Error (RMSE), Relative Absolute Error (RAE) and the Root Relative Squared Error (RRSE) were the metrics used to evaluate the robustness of MDT and LRC models. The evaluation results obtained indicate that the variable-based LRC produced the best model in terms of MAE, RMSE, RAE and the RRSE having yielded the least values in all the evaluations conducted. Further results obtained established the strong significance of attitude of students and lecturers, fearful perception of students, erratic power supply, university facilities, student health and students’ attendance to the performance of students in programming courses. The variable-based LRC model presented in this paper could provide baseline information about students’ performance thereby offering better decision making towards improving teaching/learning outcomes in programming courses.

Author 1: Fagbola Temitayo Matthew
Author 2: Adeyanju Ibrahim Adepoju
Author 3: Oloyede Ayodele
Author 4: Obe Olumide
Author 5: Olaniyan Olatayo
Author 6: Esan Adebimpe
Author 7: Omodunbi Bolaji
Author 8: Egbetola Funmilola

Keywords: Student-performance; predictive-modeling; M5P-Decision-Tree; mobile-interface; linear-regression-classifier; programming-courses

PDF

Paper 15: New Techniques to Enhance Data Deduplication using Content based-TTTD Chunking Algorithm

Abstract: Due to the fast indiscriminate increase of digital data, data reduction has acquired increasing concentration and became a popular approach in large-scale storage systems. One of the most effective approaches for data reduction is Data Deduplication technique in which the redundant data at the file or sub-file level is detected and identifies by using a hash algorithm. Data Deduplication showed that it was much more efficient than the conventional compression technique in large-scale storage systems in terms of space reduction. Two Threshold Two Divisor (TTTD) chunking algorithm is one of the popular chunking algorithm used in deduplication. This algorithm needs time and many system resources to compute its chunk boundary. This paper presents new techniques to enhance TTTD chunking algorithm using a new fingerprint function, a multi-level hashing and matching technique, new indexing technique to store the Metadata. These new techniques consist of four hashing algorithm to solve the collision problem and adding a new chunk condition to the TTTD chunking conditions in order to increase the number of the small chunks which leads to increasing the Deduplication Ratio. This enhancement improves the Deduplication Ratio produced by TTTD algorithm and reduces the system resources needed by this algorithm. The proposed algorithm is tested in terms of Deduplication Ratio, execution time, and Metadata size.

Author 1: Hala AbdulSalam Jasim
Author 2: Assmaa A. Fahad

Keywords: Data deduplication; big data compression; data reduction; Two Threshold Two Divisor (TTTD); chunking algorithm

PDF

Paper 16: Security Improvement in Elliptic Curve Cryptography

Abstract: This paper proposed different approaches to enhance the performance of the Elliptic Curve Cryptography (ECC) algorithm. ECC is vulnerable to attacks by exploiting the public parameters of ECC to solve Discrete Logarithm Problem (DLP). Therefore, these public parameters should be selected safely to obviate all recognized attacks. This paper presents a new generator function to produce the domain parameters for creating the elliptic curve; a secure mechanism is used in the proposed function to avoid all possible known attacks that attempts to solve the Elliptic Curve Discrete Logarithm Problem (ECDLP). Moreover, an efficient algorithm has been proposed for choosing two base points from the curve in order to generate two subgroups in a secure manner. The purpose of the aforementioned algorithm is to offer more confidence for the user since it is not built upon a hidden impairment that it could be subsequently utilized to retrieve user’s private key. The Elliptic Curve Diffie Hellman (ECDH) algorithm is implemented to exchange a session key between the communicating parties in a secure manner. Beside, a preprocessing operation is performed on the message to enhance the diffusion property and consequently leads to increase the strength against cryptanalysis attack. Finally, the dual encryption/decryption algorithm is implemented using different session keys in each stage of the encryption to boost immunity against any attack on the digital audio transmission. The gained results show the positive effect of the dual elliptic curve system in terms of speed and confidentiality without needing any extra time for encryption.

Author 1: Kawther Esaa Abdullah
Author 2: Nada Hussein M. Ali

Keywords: Elliptic curve cryptography; elliptic curve discrete logarithm problem; dual encryption/decryption; Elliptic Curve Diffie Hellman

PDF

Paper 17: Classification of Affective States via EEG and Deep Learning

Abstract: Human emotions play a key role in numerous decision-making processes. The ability to correctly identify likes and dislikes as well as excitement and boredom would facilitate novel applications in neuromarketing, affective entertainment, virtual rehabilitation and forensic neuroscience that leverage on sub-conscious human affective states. In this neuroinformatics investigation, we seek to recognize human preferences and excitement passively through the use of electroencephalography (EEG) when a subject is presented with some 3D visual stimuli. Our approach employs the use of machine learning in the form of deep neural networks to classify brain signals acquired using a brain-computer interface (BCI). In the first part of our study, we attempt to improve upon our previous work, which has shown that EEG preference classification is possible although accuracy rates remain relatively low at 61%-67% using conventional deep learning neural architectures, where the challenge mainly lies in the accurate classification of unseen data from a cohort-wide sample that introduces inter-subject variability on top of the existing intra-subject variability. Such an approach is significantly more challenging and is known as subject-independent EEG classification as opposed to the more commonly adopted but more time-consuming and less general approach of subject-dependent EEG classification. In this new study, we employ deep networks that allow dropouts to occur in the architecture of the neural network. The results obtained through this simple feature modification achieved a classification accuracy of up to 79%. Therefore, this study has shown that the use of a deep learning classifier was able to achieve an increase in emotion classification accuracy of between 13% and 18% through the simple adoption of the use of dropouts compared to a conventional deep learner for EEG preference classification. In the second part of our study, users are exposed to a roller-coaster experience as the emotional stimuli which are expected to evoke the emotion of excitement, while simultaneously wearing virtual reality goggles, which delivers the virtual reality experience of excitement, and an EEG headset, acquires the raw brain signals detected when exposed to this excitement stimuli. Here, a deep learning approach is used to improve the excitement detection rate to well above the 90% accuracy level. In a prior similar study, the use of conventional machine learning approaches involving k-Nearest Neighbour (kNN) classifiers and Support Vector Machines (SVM) only achieved prediction accuracy rates of between 65% and 89%. Using a deep learning approach here, rates of 78%-96% were achieved. This demonstrates the superiority of adopting a deep learning approach over other machine learning approaches for detecting human excitement when immersed in an immersive virtual reality environment.

Author 1: Jason Teo
Author 2: Lin Hou Chew
Author 3: Jia Tian Chia
Author 4: James Mountstephens

Keywords: Neuroinformatics; emotion classification; preference classification; excitement classification; electroencephalography (EEG); deep learning; virtual reality; dropouts.

PDF

Paper 18: Rainfall Prediction using Data Mining Techniques: A Systematic Literature Review

Abstract: Rainfall prediction is one of the challenging tasks in weather forecasting. Accurate and timely rainfall prediction can be very helpful to take effective security measures in advance regarding: ongoing construction projects, transportation activities, agricultural tasks, flight operations and flood situation, etc. Data mining techniques can effectively predict the rainfall by extracting the hidden patterns among available features of past weather data. This research contributes by providing a critical analysis and review of latest data mining techniques, used for rainfall prediction. Published papers from year 2013 to 2017 from renowned online search libraries are considered for this research. This review will serve the researchers to analyze the latest work on rainfall prediction with the focus on data mining techniques and also will provide a baseline for future directions and comparisons.

Author 1: Shabib Aftab
Author 2: Munir Ahmad
Author 3: Noureen Hameed
Author 4: Muhammad Salman Bashir
Author 5: Iftikhar Ali
Author 6: Zahid Nawaz

Keywords: Rainfall prediction; data mining techniques; SLR; systematic literature review

PDF

Paper 19: An Intelligent Bio-Inspired Algorithm for the Faculty Scheduling Problem

Abstract: All universities have faculty members who need to be assigned to teach courses. Those members have various specialties, preferences and different levels of experience. The manual assignment of courses is a very tedious and time-consuming task that the scheduling committee frequently faces in every department. To solve this timetabling problem, we proposed a novel approach using the Bees Algorithm (BA), which is inspired from bees’ foraging behavior, hybridized with Demon algorithm and Hill Climbing for more extensive search. The scheduling process took into consideration all constraints and variables associated with scheduling courses, according to the requirements of the Computer Science department in our college. The results showed that the schedules produced from the algorithm outperformed the manual schedules in terms of achieving the objective function and satisfying the constraints. In addition, the hybridized version produced better results than the standard BA version without hybridization. The hybridized algorithm is designed for faculty scheduling, but can be further generalized to solve various timetabling problems.

Author 1: Sarah Al-Negheimish
Author 2: Fai Alnuhait
Author 3: Hawazen Albrahim
Author 4: Sarah Al-Mogherah
Author 5: Maha Alrajhi
Author 6: Manar Hosny

Keywords: Faculty scheduling; faculty assignment problem; Bees Algorithm; Demon algorithm; timetabling; scheduling

PDF

Paper 20: A Lightweight Multi-Message and Multi-Receiver Heterogeneous Hybrid Signcryption Scheme based on Hyper Elliptic Curve

Abstract: It is a suitable means for multi-messages to use hybrid encryption to make a safe communication. Hybrid encryption confines encryption into two parts: one part uses public key systems to scramble a one-time symmetric key, and the other part uses the symmetric key to scramble the actual message. The quick advancement of the internet technology requires distinctive message communications over the more extensive territory to upgrade the heterogeneous system security. In this paper, we present a lightweight multi-message and multi-receiver Heterogeneous hybrid signcryption scheme based on the hyper elliptic curve. We choose hyper elliptic curve for our scheme, because with 80 bits key give an equivalent level of security as contrasted and different cryptosystems like RSA and Bilinear pairing with 1024 bits key and elliptic curve with 160 bits key, respectively. Further, we validate these security requirements with our scheme, for example, confidentiality, resistance against reply attack, integrity, authenticity, non-repudiation, public verifiability, forward secrecy and unforgeability through a well-known security validation tool called Automated Validation of Internet Security Protocols and Applications (AVISPA). In addition, our approach has low computational costs, which is attractive for low resources devices and heterogeneous environment.

Author 1: Abid ur Rahman
Author 2: Insaf Ullah
Author 3: Muhammad Naeem
Author 4: Rehan Anwar
Author 5: Noor-ul-Amin
Author 6: Hizbullah Khattak
Author 7: Sultan Ullah

Keywords: Multi-receiver heterogeneous hybrid signcryption; multi-message and multi-receiver heterogeneous hybrid signcryption; hyper elliptic curve; Automated Validation of Internet Security Protocols and Applications (AVISPA)

PDF

Paper 21: A Chatbot for Automatic Processing of Learner Concerns in an Online Learning Platform

Abstract: In this article, we present a chatbot model that can automatically respond to learners’ concerns on an online training platform. The proposed chatbot model is based on an adaptation of the similarity of Dice to understand the concerns of learners. The first phase of this approach allows selecting the pre-established concerns that the teacher has in a knowledge base which are closest to those posed by the learner. The second phase consists of selecting among these k most appropriate concerns based on a measure of similarity built on the concept of domain keywords. The experimentation of the prototype of this chatbot makes it possible to find the adequate answers. In the case, where the question refers to a question from the teacher, the learner is asked if the question identified is the one he was referring to. If he answers in the affirmative, the instructions associated with his request are sent to him. If not, the learner’s concern is sent to the human tutor. The hybridization of this chatbot with the human agent comes to enrich the initial knowledge base of the chatbot. The results obtained with the concept based on the keywords of the domain are encouraging. The learner’s comprehension rate is above 50% when applying the concept of domain keywords while the measure of Dice is below 50%.

Author 1: Mamadou BAKOUAN
Author 2: Beman Hamidja KAMAGATE
Author 3: Tiemoman KONE
Author 4: Souleymane OUMTANAGA
Author 5: Michel BABRI

Keywords: Metadata; ontologies; semantic similarity; natural language; semantic web; chatbot

PDF

Paper 22: Formalization of Behavior Change Theories to Accomplish a Health Behavior

Abstract: The objective of this paper is to study theories behind behavior change and adaptation of behavior. Humans often live according to habitual behavior. Changing an existing behavior or adopting a new (healthier) behavior is not an easy task. There are a number of things which are important when considering adapting physical activity behavior. A behavior is affected by various cognitive processes, for example involving beliefs, intentions, goals, impediments. A conceptual and computational model is discussed based on state of the art theories about behavior change. The model combines different theories: the social cognitive theory, and the theory of self-regulation. In addition, health behavior interventions are discussed that may be used in a coaching system. The paper consists of two parts: the first part describes a computational model of behavior change and the second part discusses the formalization of evidence-based techniques for behavior change and questions to measure the various states of mind in order to provide tailored and personalized support.

Author 1: Adnan Manzoor
Author 2: Imtiaz Ali Halepoto
Author 3: Sohail Khokhar
Author 4: Nazar Hussain Phulpoto
Author 5: Muhammad Sulleman Memon

Keywords: Behavior monitoring; healthy lifestyle; behavior change; physical activity; computational model

PDF

Paper 23: Implementation of Winnowing Algorithm with Dictionary English-Indonesia Technique to Detect Plagiarism

Abstract: The ease of obtaining information that is easy, fast, and cheap from all over the world through the internet network can encourage someone to take action plagiarism. Plagiarism is an intellectual crime that often occurs in the writing world where the perpetrators take the work of others without declaring the original source; if it continues to be left it will have a negative impact on the academic community and can be a chronic disease in the progress of a nation. At this time, the process of plagiarism detection is done manually and automatically using the help of technological developments (plagiarism detection), but the automatic checks available now mostly just check every letter character contained in the document, cannot check where the plagiarist takes a quote from a foreign language and changed in plagiarist language. Detection of plagiarism in this study will use a winnowing algorithm that has a function to check every character in two samples by hashing method that can generate fingerprint from two documents. While the dictionary method English-Indonesia change the writing from English to Indonesian language. This research will produce plagiarism detection using winnowing algorithm with English-Indonesian dictionary technique.

Author 1: Anton Yudhana
Author 2: Sunardi
Author 3: Iif Alfiatul Mukaromah

Keywords: Plagiarism; winnowing algorithm; fingerprint; dictionary English-Indonesia

PDF

Paper 24: Multi-Stage Algorithms for Solving a Generalized Capacitated P-median Location Problem

Abstract: The capacitated p-median location problem is one of the famous problems widely discussed in the literature, but its generalization to a multi-capacity case has not. This generalization, called multi-capacitated location problem, is characterized by allowing facilities to use one of several capacity levels. For this purpose, a predefined list of capacity levels supported by all potential facilities is established. In this paper, we will detail the mathematical formulation and propose a new solving method. We try to construct, indeed, a multi-stage heuristic algorithm that will be called BDF (Biggest Demand First). This new method appears in two approaches: Integrated BDF (IBDF) and Hybridized BDF (HBDF) will be improved by using a local search optimization. A valid lower bound to the optimal solution value is obtained by solving a lagrangian relaxation dual of the exact formulation. Computational results are presented at the end using new instances with higher ratio between the number of customers, facilities and capacity levels or adapted from those of p-median drawn from the literature. The obtained results show that the IBDF is much faster with medium quality solution while HBDF is slower but provides very good solutions close to the optimality.

Author 1: Mohammed EL AMRANI
Author 2: Youssef BENADADA

Keywords: Location; p-median; multi-capacity; heuristic; LNS; lagrangian relaxation; lower bound

PDF

Paper 25: Communicator for Hearing-Impaired Persons using Pakistan Sign Language (PSL)

Abstract: Communication with a hearing-impaired individual is a big challenge for a normal person. Hearing-impaired people uses hand gesture language (sign language) to communicate with each other, which is not easy to understand by a normal person because he/she is not trained to understand sign language. This communication gap between a hearing-impaired and a normal person created big problem for hearing-impaired individuals during their shopping, hospitalization, at their schools and homes. Especially in case of emergency, it is very difficult to understand the statement of a hearing-impaired one’s who uses sign language. In the last few years researchers and developers from all over the world presented different ideas and works to solve this problem but no such solution is available to resolve this issue and can create two-way communication between hearing-impaired and normal persons. This paper presented a detail description about a two-way communication system based on Pakistan Sign Language (PSL). This duplex system is developed through conversion from the text in simple English into hand gestures and vice versa. However, conversion from hand gestures is available not only in text but also with voice providing more convenience to normal person. Main objective is to facilitate a large population and making hearing-impaired persons, the vital part of our civilization. A normal person can enter the text (sentence) in application, after the checking of spelling and grammar, the text is divided into tokens and sub-tokens. A token is a gesture against each word of the text while sub-tokens are the gestures of each character of the words. The combination of tokens created the gestures of text. On the other hand when gestures were input in to the application, using image processing technique, the nature of hand gesture were recognized and converted into corresponding text or voice.

Author 1: Muhammad Wasim
Author 2: Adnan Ahmed Siddiqui
Author 3: Abdulbasit Shaikh
Author 4: Lubaid Ahmed
Author 5: Syed Faisal Ali
Author 6: Fauzan Saeed

Keywords: Communicator; hearing-impaired; Pakistan Sign Language (PSL); hand gesture; special person; token

PDF

Paper 26: TPACK Adaptation among Faculty Members of Education and ICT Departments in University of Sindh, Pakistan

Abstract: Technological Pedagogical Content Knowledge (TPACK) framework has been to investigate the technological and instructive knowledge of teachers. Many researchers have found this framework a useful tool to explore teachers’ awareness regarding TPACK and how do they are relating it in learning and teaching process in different educational settings. During its first generation time period which was from year 2006 to year 2016, TPACK constructs took a decade to get explained and interpreted by researchers. Now, it has entered in its second generation but still contextual aspect yet not being explored in detail. This study addresses two areas; firstly, to measure the TPACK of faculty members of ICT and Education departments of University of Sindh; and secondly, to unfold the impact of four circumstantial/contextual factors (Technological, Culture of Institute, Interpersonal, and Intrapersonal) on the selected faculty members in using TPACK into their own subject domains. The results showed that both faculties are already taking in technology along with their teaching practices instead of limited technological resources. Besides this, they were found collaborative in teaching and open to the technology. This study reports the TPACK framework adaptation among higher education faculty members at University of Sindh. It also helped in understanding the intrapersonal beliefs of faculty members regarding technology integration with pedagogical and content knowledge.

Author 1: Saira Soomro
Author 2: Arjumand Bano Soomro
Author 3: Najma Imtiaz Ali
Author 4: Tariq Bhatti
Author 5: Nazish Basir
Author 6: Nazia Parveen Gill

Keywords: TPACK; teaching-learning; circumstantial and contextual factors

PDF

Paper 27: Quality Aspects of Continuous Delivery in Practice

Abstract: Continuous Delivery is recently used in software projects to facilitate the process of product delivery in Agile software development. As an Agile practice, this practice is mainly used to achieve better quality of software development process and higher customer satisfaction. However, less attention has been paid on exploring the quality factors related to Continuous Delivery as well as quality model. The main aim of this paper is to figure out the quality aspects and factors of Continuous Delivery. Initial data analysis showed that this practice is impressed by people related factors, organizational issues, tools and process related factors as well.

Author 1: Maryam Shahzeydi
Author 2: Taghi Javdani Gandomani
Author 3: Rasool Sadeghi

Keywords: Continuous delivery; quality model; agile software development; agile methods; agile practice

PDF

Paper 28: Integration of Heterogeneous Requirements using Ontologies

Abstract: Ontology-driven approaches are used to sustain the requirement engineering process. Ontologies can be used to define information and knowledge semantics during the requirements engineering phases, such as analysis, specification, validation and management of requirements. However, requirement analysts face difficulties in using ontologies for requirement engineering. In this study, a framework has been proposed to integrate heterogeneous requirements by using local and global ontologies.

Author 1: Ahmad Mustafa
Author 2: Wan M.N. Wan-Kadir
Author 3: Noraini Ibrahim
Author 4: Muhammad Arif Shah
Author 5: Muhammad Younas

Keywords: Heterogeneous requirements; requirement engineering; local ontologies; global ontologies

PDF

Paper 29: Effect of Service Broker Policies and Load Balancing Algorithms on the Performance of Large Scale Internet Applications in Cloud Datacenters

Abstract: Cloud computing is advancing rapidly. With such advancement, it has become possible to develop and host large scale distributed applications on the Internet more economically and more flexibly. However, the geographical distribution of user bases, the available Internet infrastructure within those geographical areas, and the dynamic nature of usage patterns of the user bases are critical factors that affect the performance of these applications. Therefore, it is necessary to compromise between datacenters, service broker policies, and load balancing algorithms to optimize the performance of the application and the cost to the owners. This paper aims at studying the effect of service broker policies and load balancing algorithms on the performance of large-scale Internet applications under different configurations of datacenters. To achieve this goal, we modeled the behavior of the popular Facebook application with the most recent worldwide users’ statistics. Then, we evaluated the performance of this application under different configurations of datacenters using: 1) two different service broker policies, namely, closest datacenter and optimum response time; and 2) three load-balancing algorithms, namely, round robin, equally spread current execution, and throttled load balancer. The overall average response time of the application and the overall average time spent for processing a user request by a datacenter are measured and the results are discussed. This study would help service providers generate valuable insights on coordination between datacenters, service policies, and load balancing algorithms when designing Cloud infrastructure services in geographically distributed areas. In addition, application designers would benefit greatly from this study in identifying the optimal arrangement for their applications.

Author 1: Ali Meftah
Author 2: Ahmed E. Youssef
Author 3: Mohammad Zakariah

Keywords: Cloud computing; datacenters; load balancing algorithms; service broker policies; CloudAnalyst

PDF

Paper 30: Multiple Trips Pattern Mining

Abstract: In recent years, photograph sharing is one of the most mainstream web service, for example, Flickr, trip advisor and numerous other web services. The photograph sharing web services give capacities to include Geo coordinates, tags, and user ID to photographs to make photograph organizing easily. This study focuses on Geotagged photographs and discusses an approach to recognize user multiple trips pattern, i.e., common arrangements of visits in towns and span of stay and also elucidating labels that describe the multiple trips pattern. First, we segment collection of photos into multiple trips and categorize the photos manually based on photo trips into multiple trips, themes such as Landmark, Nature, Business, Neutral and Event. Our method mines multiple trips pattern for multiple trips theme categories. The experimental result of our technique beats other methods and accurate segmentation of photo collections into numerous trips with the 85% of accuracy. The multiple trips categorize about 91% correctly using tags, photo id, titles of digital photos, user id and visited cities as features. In last, we demonstrate the motivating examples showing an application with which one can find multiple trips pattern from our datasets and other different queries visit duration, destination and multiple trips’ theme on trips.

Author 1: Riaz Ahmed Shaikh
Author 2: Kamelsh Kumar
Author 3: Rafaqat Hussain Arain
Author 4: Hidayatullah Shaikh
Author 5: Imran Memon
Author 6: Safdar Ali Shah

Keywords: Multiple trips pattern mining; multiple trips classification; geo-tagging

PDF

Paper 31: E-shape Multiband Patch Antenna for 4G, C-band and S-band Applications

Abstract: In this study, a new E shape mounted on minowaki island patch antenna on FR4 substrate is presented for communication systems applications. With insertion of shortening pin between patch and ground plane, the proposed structure resonated on 6 frequencies; hence producing Hex-band response with good realized gain and directivity radiation values and patterns. Co axial cable is used as means of excitation to excite proposed structure with minimum impedance mismatch losses. The proposed design is miniaturized up to 60.66% and can be used for GSM, GPRS, 4G, WLAN and other S-band and C-band applications.

Author 1: Mehr e Munir
Author 2: Khalid Mahmood
Author 3: Saad Hassan Kiani

Keywords: Minowaki island patch; miniaturization; E shape; gain; directivity

PDF

Paper 32: An Optimized Inset Feed Circular Cross Strip Antenna Design for C-Band Satellite Links

Abstract: This proposed antenna model and progressing the investigation of an inset fed wideband circular slotted patch antenna is suitable for 5.2 GHz satellite C-band applications. A circularly shaped slot has been chosen to be etched on diminutive square patch (4.4cm*5.64cm) of the inset feed antenna. The object of this work is to develop an efficient and inexpensive transducer system to facilitate its compatibility with monolithic microwave integrated circuits; expenses are minimized for its fabrication and trail low profile for C-band satellite links. This paper focuses on the circular profile of the microstrip patch antenna intended for the proficient gain to enhance the performance of the satellite communication. The return loss of -21.79dB with the directivity 8.22dB and gain of 8.17dB have been estimated. The efficiency of 97% with VSWR of 1.22 compensates each other with better simulation results.

Author 1: Faisal Ahmed Dahri
Author 2: Riaz A. Soomro
Author 3: Sajjad Ali Memon
Author 4: Zeeshan Memon
Author 5: Majid Hussain Memon

Keywords: Circular slot; high gain; C-band; satellite communication; efficiency

PDF

Paper 33: Hybrid Ensemble Framework for Heart Disease Detection and Prediction

Abstract: Data mining techniques have been widely used in clinical decision support systems for detection and prediction of various diseases. As heart disease is the leading cause of death for both men and women, detection and prediction of the heart disease is one of the most important issues in medical domain and many researchers developed intelligent medical decision support systems to improve the ability of the CAD systems in diagnosing heart disease. However, there are almost no studies investigating capabilities of hybrid ensemble methods in building a detection and prediction model for heart disease. In this work, we investigate the use of hybrid ensemble model in which a more reliable ensemble than basic ensemble models is proposed and leads to better performance than other heart disease prediction models. To evaluate the performance of proposed model, a dataset containing 278 samples from SPECT heart disease database is used that after applying the model on the data, 96% of classification accuracy, 80% of sensitivity and 93% of specificity are obtained that indicates acceptable performance of the proposed hybrid ensemble model in comparison with basic ensemble model as well as other state of the art models.

Author 1: Elham Nikookar
Author 2: Ebrahim Naderi

Keywords: Data mining; hybrid ensemble; base classifier; classification accuracy; sensitivity; specificity

PDF

Paper 34: M/M/1/n+Flush/n Model to Enhance the QoS for Cluster Heads in MANETs

Abstract: Clustering in MANET is important to achieve scalability in presence of large networks and high mobility in order to maintain the Quality of Services (QoS) of the network. Improving the QoS is the most important and crucial issue in the area of MANET. Keeping this in mind, the research paper presents an M/M/1/n+Flush/n queueing model to perform better parametric results for cluster heads in MANETs. In an effort to make the M/M/1/n+Flush/n queueing model, the paper establishes the expressions for utilization (Uₜ) of the Cluster Head (CH), mean queue length (Lq), mean busy period (Eᵨ), mean waiting time (Q) and average response time (R) of the CH. The analytical results are further verified using MATLAB simulations which reveal better outcomes.

Author 1: Aleem Ali
Author 2: Neeta Singh
Author 3: Poonam Verma

Keywords: Mobile Ad hoc Network (MANET); Cluster Head (CH); queueing approach; Quality of Services (QoS), flushing technique

PDF

Paper 35: Binary PSOGSA for Load Balancing Task Scheduling in Cloud Environment

Abstract: In cloud environments, load balancing task scheduling is an important issue that directly affects resource utilization. Unquestionably, load balancing scheduling is a serious aspect that must be considered in the cloud research field due to the significant impact on both the back end and front end. Whenever an effective load balance has been achieved in the cloud then good resource utilization will also be achieved. An effective load balance means distributing the submitted workload over cloud VMs in a balanced way, leading to high resource utilization and high user satisfaction. In this paper, we propose a load balancing algorithm, Binary Load Balancing – Hybrid Particle Swarm Optimization and Gravitational Search Algorithm (Bin-LB-PSOGSA), which is a bio-inspired load balancing scheduling algorithm that efficiently enables the scheduling process to improve load balance level on VMs. The proposed algorithm finds the best Task-to-Virtual machine mapping that is influenced by the length of submitted workload and VM processing speed. Results show that the proposed Bin-LB-PSOGSA achieves better VM load average than the pure Bin-LB-PSO and other benchmark algorithms in terms of load balance level.

Author 1: Thanaa S. Alnusairi
Author 2: Ashraf A. Shahin
Author 3: Yassine Daadaa

Keywords: Gravitational search algorithm; load balancing; particle swarm optimization; task scheduling; task-to-virtual machine mapping; virtual machine load

PDF

Paper 36: The P System Design Method based on the P Module

Abstract: Membrane computing is a kind of biocomputing model. At present, the main research areas of membrane computing are computational models and P system design. With the expansion of the P system scale, how to rapidly construct the P system has become a prominent issue. Designing P system based on P module is a P system design method proposed in recent years. This method provides information hiding and can build P system through recursive combination. However, the current P module design lacks a unified design method and lacks the standard process of building P system from P module. This paper studies the structural characteristics of cell-like P systems, and proposes an improved P module design method and a process for assembling P systems through P modules. In order to fully expound the design method of P module, the P system for the square root of the large number was analyzed and designed. And the correctness of the P system based on the P module design method was verified by an instance.

Author 1: Ping Guo
Author 2: Xixi Peng
Author 3: Lian Ye

Keywords: P module; P System; P system design; membrane computing; biocomputing models

PDF

Paper 37: Cascades Neural Network based Segmentation of Fluorescence Microscopy Cell Nuclei

Abstract: The visual extraction of cellular, nuclear and tissue components from medical images is very vital in the diagnosis routine of different health related abnormalities and diseases. The objective of this work is to modify and efficiently combine different image processing methods supported by cascaded artificial neural networks in an automated system to perform segmentation analysis of medical microscopy images to extract nuclei located in either simple or complex clusters. The proposed system is applied on a publicly available data sets of microscopy nuclei cells. A GUI is designed and presented in this work to ease the analysis and screening of these images. The proposed system shows promising performance and reduced computational time cost. It is hoped that thus system and the corresponding GUI will construct platform base for several biomedical studies in the field of cellular imaging where further complex investigations and modelling of microscopy images could take place.

Author 1: Sofyan M. A. Hayajneh
Author 2: Mohammad H. Alomari
Author 3: Bassam Al-Shargabi

Keywords: Artificial neural networks; machine learning, DSP, fluorescence microscopy; biomedical imaging; cell nuclei; image segmentation

PDF

Paper 38: An Automatic Segmentation Algorithm for Solar Filaments in H-Alpha Images using a Context-based Sliding Window

Abstract: There are many features which appear on the surface of the sun. One of these features that appear clearly are the dark threads in the Hydrogen alpha (Hα) spectrum solar images. These ‘filaments’ are found to have a definite correlation with Coronal Mass Ejections (CMEs). A CME is a large release of plasma into space. It can be hazardous to astronauts and the spacecraft if it is being ejected towards the Earth. Knowing the exact attributes of solar filaments may open the way towards predicting the occurrence of CMEs. In this paper, an efficient and fully automated algorithm for solar filament segmentation without compromising accuracy is proposed. The algorithm uses some statistical measures to design the thresholding equations and it is written in the C++ programming language. The square root of the range as a measure of variability of image intensity values is used to determine the size of the sliding window at run time. There are many previous studies in this area, but no single segmentation method that could precisely claim to be fully automatic exists. Samples were taken from several representative regions in low-contrast and high-contrast solar images to verify the viability and efficacy of the method.

Author 1: Ibrahim A. Atoum

Keywords: Solar image processing; solar filament; segmentation; sliding window; Coronal mass ejections

PDF

Paper 39: Relative Humidity Profile Estimation Method with AIRS (Atmospheric Infrared Sounder) Data by Means of SDM (Steepest Descend Method) with the Initial Value Derived from Linear Estimation

Abstract: Relative humidity profile estimation method with AIRS (Atmospheric Infrared Sounder) data by means of SDM (Steepest Descend Method) with the initial value derived from LED: Linear Estimation Method is also proposed. Through experiments, it is found that there is almost 15 (%) of relative humidity estimation error. Therefore, it can be said that the relative humidity is still tough issue for retrieval. It is also found that the estimation error does not depend on the designated atmospheric models, Mid-Latitude Summer/Winter, Tropic. Even if the assigned atmospheric model is not correct, the proposed SDM based method allows almost same estimated relative humidity. In other word, it is robust against atmospheric model.

Author 1: Kohei Arai

Keywords: Atmospheric Infrared Sounder (AIRS); Steepest Descend Method (SDM); LED; MODTRAN; relative humidity; atmospheric model; Infrared sounder

PDF

Paper 40: Tuning of Customer Relationship Management (CRM) via Customer Experience Management (CEM) using Sentiment Analysis on Aspects Level

Abstract: This study proposes a framework that combines a supervised machine learning and a semantic orientation approach to tune Customer Relationship Management (CRM) via Customer Experience Management (CEM). The framework extracts data from social media first and then integrates CRM and CEM by tuning and optimising CRM to reflect the needs and expectations of users on social media. In other words, in order to reduce the gap between the users’ predicted opinions in CRM and their opinions on social media, the existing data from CEM will be applied to determine the similar behavioural patterns of customers towards similar outcomes within CRM. CRM data and extracted data from social media will be consolidated by the unsupervised data mining method (association). The framework will lead to a quantitative approach to uncover relationships between the extracted data from social media and the CRM data. The results show that changing some aspects of the e-learning criteria that were required by students in their social media posts can help to enhance the classification accuracy in the learning management system (LMS) data and to understand more students’ studying statuses. Furthermore, the results show matching between students’ opinions in CRM and CEM, especially in the negative and neutral classes.

Author 1: Hamed AL-Rubaiee
Author 2: Khalid Alomar
Author 3: Renxi Qiu
Author 4: Dayou Li

Keywords: Opinion mining; customer relationship management; customer experience management; sentiment analysis; Twitter

PDF

Paper 41: An Accurate Multi-Biometric Personal Identification Model using Histogram of Oriented Gradients (HOG)

Abstract: Biometrics is the detection and description of individuals’ physiological and behavioral ‎features. ‎Many different systems require reliable personal identification schemes to either prove or ‎find out ‎the identity of an individual demanding their services. Multi-biometrics are required inside the current ‎context of large worldwide biometric databases and to provide new developing security ‎demands. There are some distinctive and measurable features used to distinguish individuals known ‎as Biometric Identifiers. Multi-biometric systems tend to integrate multiple identifiers to increase ‎recognition accuracy. Face ‎and digital signature identifiers are still a challenge in many applications, especially in security systems. The fundamental objective of this paper is to integrate both identifiers in an accurate personal identification model. In this paper, a reliable multi-biometric model based on Histogram of Oriented Gradients (HOG) features of a face and digital signature and is able to identify individuals accurately is proposed. The methodology is to adopt many parameters such as weights of HOG features in merging process, the HOG parameters itself, and the distance method in matching process to gain higher accuracy. The proposed model achieves perfect results in personal identification using HOG features of digital signature and face together. The results show that the HOG ‎feature descriptor significantly performs target matching at an average of 100% accuracy ratio for ‎face recognition together with the digital signature. It outperforms existing feature sets with an accuracy of ‎‎84.25% for face only and 97.42% for digital signature only.‎

Author 1: Mostafa A. Ahmad
Author 2: Ahmed H. Ismail
Author 3: Nadir Omer

Keywords: Biometric identifiers; personal identification; multi-biometric systems; face recognition; digital signature; Histogram of Oriented Gradients (HOG)

PDF

Paper 42: Detection of Mass Panic using Internet of Things and Machine Learning

Abstract: The increase of emergency situations that cause mass panic in mass gatherings, such as terrorist attacks, random shooting, stampede, and fires, sheds light on the fact that advancements in technology should contribute in timely detecting and reporting serious crowd abnormal behaviour. The new paradigm of the ‘Internet of Things’ (IoT) can contribute to that. In this study, a method for real-time detection of abnormal crowd behaviour in mass gatherings is proposed. This system is based on advanced wireless connections, wearable sensors and machine learning technologies. It is a new crowdsourcing approach that considers humans themselves as the surveillance devices that exist everywhere. A sufficient number of the event’s attendees are supposed to wear an electronic wristband which contains a heart rate sensor, motion sensors and an assisted-GPS, and has a wireless connection. It detects the abnormal behaviour by detecting heart rate increase and abnormal motion. Due to the unavailability of public bio-dataset on mass panic, dataset of this study was collected from 89 subjects wearing the above-mentioned wristband and generating 1054 data samples. Two types of data collected were: firstly, the data of normal daily activities and secondly, the data of abnormal activities resembling the behaviour of escape panic. Moreover, another abnormal dataset was synthetically generated to simulate panic with limited motion. In our proposed approach, two-phases of data analysis are done. Phase-I is a deep machine learning model that was used to analyze the sensors’ collected readings of the wristband and detect if the person has indeed panicked in order to send alerting signals. While phase-II data analysis takes place in the monitoring server that receives the alerting signals to conclude if it is a mass panic incident or a false positive case. Our experiments demonstrate that the proposed system can offer a reliable, accurate, and fast solution for panic detection. This experiment uses the Hajj pilgrimage as a case study.

Author 1: Gehan Yahya Alsalat
Author 2: Mohammad El-Ramly
Author 3: Aly Aly Fahmy
Author 4: Karim Said

Keywords: Internet of Things; IoT; Mobile Crowd Sensing (MCS); wearables; mass panic; mass gatherings; accelerometer; Optical Heart Rate (HR) sensor; abnormal crowd behaviour; deep learning; Recurrent Neural Network (RNN); Long Short Term Memory (LSTM); Gated Recurrent Unit (GRU); time series

PDF

Paper 43: Motif Detection in Cellular Tumor p53 Antigen Protein Sequences by using Bioinformatics Big Data Analytical Techniques

Abstract: Due to the rapid growth of data in the field of big data and bioinformatics, the analysis and management of the data is a very difficult task for the scientist and the researchers. Data exists in many formats like in the form of groups and clusters. The data that exist in the group form and have some repetition patterns called Motifs. A lot of tools and techniques are available in the literature to detect the motifs in different fields like neural networks, antigen/antibody protein, metabolic pathways, DNA/RNA sequences and Protein-Protein Interactions (PPI). In this paper, motif detection is done in tumor antigen protein, namely, cellular tumor antigen p53 (Guardian of the protein and genome) that regulate the cell cycle and suppress the tumor growth in the human body. As tumor is a death causing disease and creates a lot of other diseases in human beings like brain stroke, brain hemorrhage, etc. So there needs to investigate the relation of the tumor protein that prevents the human from not only brain tumor but also from a lot of other diseases that is created from it. To find out the gap between the motifs in the tumor antigen the GLAM2 is used that detects the distance between the motifs very efficiently. Same tumor antigen protein is evaluated at different tools like MEME, TOMTOM, Motif Finder and DREME to analyze the results critically. As tumor protein exists in multiple species, so comparison of homo tumor antigen protein is also done in different species to check the diversity level of this protein. Our purposed approach gives better results and less computational time than other approaches for different types of user characteristics.

Author 1: Tariq Ali
Author 2: Sana Yasin
Author 3: Umar Draz
Author 4: M. Ayaz Arshad
Author 5: Tayyaba Tariq
Author 6: Sarah Javaid

Keywords: Bio-informatics; motif detection; guardian protein Tp53; DNA; tumor antigen; cancer; un-gapped motifs; MEME

PDF

Paper 44: Investigating Methods of Resource Provisioning Mechanisms in Cloud: A Review

Abstract: Delivering information through cloud computing become a modern computation. For this purpose, electronic device is required to access with an active web server. For delivering different resources, the cloud supplier provides computing power for the cloud users to organize their multiple type of application at any time on different platforms. In cloud computing, the main drawback is relevant to the best use of resources as well as resource provisioning. In cloud computing there is a lack of desired resources that is why the cloud resource provision becomes a daring work. To maintain the quality of services, the provisioning of reasonable resources is need of workloads. The main problem is to find the appropriate workload that depends on the cloud user that is related to resource pair application requirements. This paper reveals the cloud resource provisioning and identification in general and in specific, respectively. In this paper, a methodical analysis of resource provisioning in cloud computing is presented, in which resource provisioning, different types of resource provisioning mechanisms and their comparisons, and benefits are described.

Author 1: Babur Hayat Malik
Author 2: Talia Anwar
Author 3: Sadaf Ilyas
Author 4: Farheen Jafar
Author 5: Munazza Iftikhar
Author 6: Maryam Malik
Author 7: Noreen Islam Deen

Keywords: Resource provisioning; resource provisioning mechanisms; cloud computing; systematic review; comparison between resource provisioning

PDF

Paper 45: University Notification Subscription System using Amazon Web Service

Abstract: Publish-Subscribe (Pub-Sub) system is an asynchronous communication service widely used in server-less and micro-services architecture. In a Pub-Sub system, publisher publish message to a topic that is immediately received by all of the subscribers of that topic. Nowadays, students face number of problems regarding admission details, assignments, offered courses, fee schedule, etc. Many a times, they missed the deadlines and it affects their studies. This paper is focused on issues faced by students regarding message delivery, duplication of data and heavy traffic, etc. It should be overcome by using amazon web services to make optimize product and to make it flexible for university Pub-Sub system. Implement the cloud services by using hybrid technique, i.e., content based and topic based architecture. It also explained the multitude use-case of university notification system which leads to make it more adaptable as subscriptions are identified with particular data content.

Author 1: Babur Hayat Malik
Author 2: Zaheer Mehmood Dar
Author 3: Sabah Mubarik Kayani
Author 4: Mahnoor Dar
Author 5: Muhammad Hassan Shafiq
Author 6: Imran Kabir
Author 7: Fatima Masood
Author 8: Hamna Zakriya
Author 9: Asad Ali

Keywords: Publish-Subscribe system; content and topic-based; university notification; Amazon web services

PDF

Paper 46: Performance Measurement Model of Mobile User Connectivity in Femtocell/Macrocell Networks using Fractional Frequency Re-use Scheme

Abstract: Technologies are traversing to its new dimensions every day. As part of this progression, mobile cellular system is at the summit of its constant advancement. The usage of Femtocells in mobile cellular system has created a massive impact on its architecture. Likewise, the incorporation of femtocells in macrocells for 4G mobile network communication services (like-voice calls, data services, etc.) among mobile stations within few meters has been one of the promising approaches. There is a femto access point (FAP) in Femtocell which handles the authorization of the user around it. Among the three various access methods, FAP allows only the authorized users except the macro cell users in Closed Access Method (CAM). But for Open Access Method (OAM), any type of crossing macrocell user within the radio coverage of femtocell and the femtocell users can get FAP access. To reduce the cross-tier interferences OAM is more efficient, because it deals with both type of users within the femtocell coverage. This paper proposes a performance measurement model for mobile connection probability depending on the mobility factor of mobile users and the communication range in femtocell/ macrocell networks. Furthermore, a derivation has been done to get the optimum result from the outage and connectivity probability under different number of femtocells and mobile users. Finally, to maximum the spectral efficiency for the probable frequency allocation, a Fractional Frequency Re-use scheme among the networks has been proposed.

Author 1: Mehrin Anannya
Author 2: Riad Mashrub Shourov

Keywords: Femtocell; macrocell; cross-tier interferences; co-tier interferences; closed access methods; open access methods; connectivity probability; mobility factor; outage probability; fractional frequency re-use scheme

PDF

Paper 47: Heart Failure Prediction Models using Big Data Techniques

Abstract: Big Data technologies have a great potential in transforming healthcare, as they have revolutionized other industries. In addition to reducing the cost, they could save millions of lives and improve patient outcomes. Heart Failure (HF) is the leading death cause disease, both nationally and internally. The Social and individual burden of this disease can be reduced by its early detection. However, the signs and symptoms of HF in the early stages are not clear, so it is relatively difficult to prevent or predict it. The main objective of this research is to propose a model to predict patients with HF using a multi-structure dataset integrated from various resources. The underpinning of our proposed model relies on studying the current analytical techniques that support heart failure prediction, and then build an integrated model based on Big Data technologies using WEKA analytics tool. To achieve this, we extracted different important factors of heart failure from King Saud Medical City (KSUMC) system, Saudi Arabia, which are available in structured, semi-structured and unstructured format. Unfortunately, a lot of information is buried in unstructured data format. We applied some pre-processing techniques to enhance the parameters and integrate different data sources in Hadoop Distributed File System (HDFS) using distributed-WEKA-spark package. Then, we applied data-mining algorithms to discover patterns in the dataset to predict heart risks and causes. Finally, the analyzed report is stored and distributed to get the insight needed from the prediction. Our proposed model achieved an accuracy and Area under the Curve (AUC) of 93.75% and 94.3%, respectively.

Author 1: Heba F. Rammal
Author 2: Ahmed Z. Emam

Keywords: Big data; hadoop; healthcare; heart failure; prediction model

PDF

Paper 48: Towards Privacy Preserving Commutative Encryption-Based Matchmaking in Mobile Social Network

Abstract: The last decade or so has witnessed a sharp rise in the growth of mobile devices. These mobile devices and wireless communication technologies enable people around the globe to instantaneously communicate with each other. This leads to the emergence of a new type of social networking known as Mobile Social Network (MSN). MSN offers a wide range of useful applications, such as group text services, social gaming, location-based services (to name a few). One of the popular applications of MSN is matchmaking where people match their interests/hobbies to find the like-minded people for a possible friendship. However, revealing personal hobbies can pose significant threats on a user’s privacy. Therefore, a privacy preserving evaluation method is needed to find the similarity between users’ interests. There are various techniques to achieve privacy preserving matchmaking, such as commutative encryption, oblivious transfer and homomorphic encryption. This paper discusses the feasibility of commutative encryption by evaluating recently proposed schemes. The paper attempts to identify various shortcomings in the present work and discusses future directions.

Author 1: Fizza Abbas
Author 2: Ubaidullah Rajput
Author 3: Adnan Manzoor
Author 4: Imtiaz Ali Halepoto
Author 5: Ayaz Hussain

Keywords: Privacy; security; matchmaking; interests; mobile social network

PDF

Paper 49: Towards Security as a Service to Protect the Critical Resources of Mobile Computing Devices

Abstract: Mobile computing is fast replacing the traditional computing paradigms by offering its users to exploit portable computations and context-aware communications. Despite the benefits of mobile computing, such as portability and context-sensitivity, there are some critical challenges, such as resource poverty of mobile devices and security of mobile user’s data that must be addressed. Implementing the security mechanisms to execute on mobile devices can be challenging as mobile devices lack the required processor, memory and battery resources to support continuous and long-term execution of computation intensive tasks. Cloud computing model can provide virtually unlimited hardware, software, and service resources to compensate for the resource poverty of mobile devices. In recent years, there is a lot of research and development of solutions and frameworks that preserve the security and privacy of mobile devices and their data. However, there has been little effort to secure mobile devices while also supporting an efficient utilization of the limited resources available on mobile devices. In this paper, we propose Security as a Service for mobile devices (SeaaS for mobile) that integrates mobile computing and cloud computing technologies to secure the critical resources of mobile devices. The proposed solution aims to support 1) security for the data critical resources of mobile devices, and 2) security as a service by cloud servers for an efficient utilization of the mobile device resources. We demonstrate the security as a service based on a practical scenario for the security of mobile devices. The evaluation results show that the proposed solution is 1) accurate to detect the potential security threats, and is 2) computationally efficient for mobile devices. The proposed solution as part of ongoing research provides the foundations to develop a framework to address SeaaS for mobile. The proposed solution aims to advance the research state-of-the-art on software engineering, mobile cloud computing, while it specifically focuses exploiting cloud-based services to secure mobile devices.

Author 1: Abdulrahman Alreshidi

Keywords: Software engineering; mobile computing; cloud computing; computer security; mobile cloud computing; security as a service

PDF

Paper 50: Comparison of Task Scheduling Algorithms in Cloud Environment

Abstract: The enhanced form of client-server, cluster and grid computing is termed as Cloud Computing. The cloud users can virtually access the resources over the internet. Task submitted by cloud users are responsible for efficiency and performance of cloud computing services. One of the most essential factors which increase the efficiency and performance of cloud environment by maximizing the resource utilization is termed as Task Scheduling. This paper deals with the survey of different scheduling algorithms used in cloud providers. Different scheduling algorithms are available to achieve the quality of service, performance and minimize execution time. Task scheduling is an essential downside within the cloud computing that has to be optimized by combining different parameter. This paper explains the comparison of several job scheduling techniques with respect to several parameters, like response time, load balance, execution time and makespan of job to find the best and efficient task scheduling algorithm under these parameters. The comparison of scheduling algorithms is also discussed in tabular form in this paper which helps in finding the best algorithms.

Author 1: Babur Hayat Malik
Author 2: Mehwashma Amir
Author 3: Bilal Mazhar
Author 4: Shehzad Ali
Author 5: Rabiya Jalil
Author 6: Javaria Khalid

Keywords: Task scheduling; algorithms; cloud computing; min-max; genetic algorithm; load balancing; resource utilization

PDF

Paper 51: Technical and Perceived Usability Issues in Arabic Educational Websites

Abstract: Educational websites are often used as effective communication mediums to provide useful information for students and course instructors. The current study explores the perceived usability of three top-ranked Arabic educational websites across seven key usability components: effectiveness, efficiency, learnability, memorability, errors, satisfaction, and content. Moreover, the study also identifies the key technical and usability issues that currently exist within Arabic educational websites. A two-phase process encompassing automated tools and user testing was adopted to evaluate the technical performance and student acceptance of Arabic educational websites. In the automatic evaluation, two tools, namely, Web Page Analyser and GTMetrix, assessed the websites against a number of well-known performance guidelines and criteria. The student evaluation entailed 150 students completing three interaction tasks and evaluating the sites using the CSUQ questionnaire. The findings indicate that Arabic educational websites suffered from various technical issues, such as a high number of HTML objects and their large size and, consequently, slow loading speed. Moreover, the websites failed to satisfy all usability components, and students rated them negatively. Relevant guidelines for the effective design of Arabic educational websites are also discussed in this paper.

Author 1: Mohamed Benaida
Author 2: Abdallah Namoun

Keywords: Arabic educational websites; perceived usability; automatic evaluation; student perception

PDF

Paper 52: Automatic Sign Language Recognition: Performance Comparison of Word based Approach with Spelling based Approach

Abstract: Evolution of computer based interaction has been through a number of phases. From command line interface to menu driven environment to Graphics User Interface, the communication has evolved to a better user friendly environment. A new form of communication is on the rise and that is Gesture Based Communication, which is a touch free environment basically. Although its applications are mainly for deaf community but smart mobiles, laptops and other similar devices are encouraging this new kind of communication. Sign languages all over the world have a dictionary of signs of several thousand words. Mostly these signs are word based which means that these signs do not make use of basic alphabet signs, rather a new sign has to be designed for every new word added to the dictionary. This paper suggests use of spelling-based gestures especially while communicating with smart phones and laptops.

Author 1: Shazia Saqib
Author 2: Syed Asad Raza Kazmi
Author 3: Khalid Masood
Author 4: Saleh Alrashed

Keywords: Feature extraction; human computer interaction; image segmentation; object recognition

PDF

Paper 53: Geographical Distance and Communication Challenges in Global Software Development: A Review

Abstract: Due to innumerous advantages the Global software engineering is trending now a days in software development industry. Basic drivers for this trend are flexibility, faster development and expected cost saving. Software development has moved from traditional development to the global software development (GSD). Global software development is very important and ordinary practice in the software industry. In GSD, the developers are distributed across different sites and different countries, and lots of problems arise due to the physical social and cultural barriers. Global Software development is facing a number of challenges including Geographical distance, Communication and collaboration, time, culture, trust, tasks distribution, requirements gathering and collaboration. In this paper, authors conducted a detailed study on geographical distances and communication challenges in GSD, their inter dependencies, and also the proposed solutions and guidelines to address these challenges that are very critical in the success of GSD projects. Also in this paper a detailed literature review is provided, combined results are summarized and on the basis of these studies, a comparative study is made. This research will be helpful for other researchers to draw new strategies to tackle these challenges.

Author 1: Babur Hayat Malik
Author 2: Saeed Faroom
Author 3: Muhammad Nauman Ali
Author 4: Nasir Shehzad
Author 5: Sheraz Yousaf
Author 6: Hammad Saleem

Keywords: Global Software Development (GSD); distributed software development; geographical distance challenges; communication and collaboration

PDF

Paper 54: Gaze Direction based Mobile Application for Quadriplegia Wheelchair Control System

Abstract: People with quadriplegia recruit the interest of researchers in introducing automated movement systems for adopted special purpose wheelchairs. These systems were introduced for easing the movement of such type of disabled people independently. This paper proposed a comprehensive control system that can control the movement of Quadriplegia wheelchairs using gaze direction and blink detection. The presented system includes two main parts. The first part consists of a smartphone that applies the propose gaze direction detection based mobile application. It then sends the direction commands to the second part via Wi-Fi connection. The second part is a prototype representing the quadriplegia wheelchair that contains robotic car (two-wheel driving car), Raspberry Pi III and ultrasound sensors. The gaze direction commands, sent from the smartphone, are received by the Raspberry Pi for processing and producing the control signals. The ultrasound sensors are fixed at the front and back of the car for performing the emergency stop when obstacles are detected. The proposed system is based on gaze tracking and direction detection without the requirement of calibration with additional sensors and instruments. The obtained results show the superior performance of the proposed system that proves the claim of authors. The accuracy ratio is ranged between 66% and 82% depending on the environment (indoor and outdoor) and surrounding lighting as well as the smart phone type.

Author 1: Muayad Sadik Croock
Author 2: Salih Al-Qaraawi
Author 3: Rawan Ali Taban

Keywords: Gaze direction detection; mobile application; obstacle detection; quadriplegia; Raspberry Pi microcomputer

PDF

Paper 55: A Study on Usability Awareness in Local IT Industry

Abstract: Usability awareness receives more consideration by industry professionals and researchers throughout the world, but it is limited in Pakistan. This study reports survey results of the current state of usability awareness in the local Information Technology (IT) industry. Forty participants – IT practitioners from IT industry – were involved in the study. We used Usability Maturity Model (UMM) and content analysis methodology to discover the current status of usability awareness. The results indicate that 1) almost half (18 out of 40) of the participants were unaware of the term usability and related concepts, 2) there is shortage of HCI/Usability professionals in organizations, 3) most of the software companies were at unrecognized level of UMM and 4) they were also not interested in usability because of limited or no budget for it. The study also reveals a gap between usability awareness and its perceived usefulness among IT professionals.

Author 1: Mahmood Ashraf
Author 2: Lal Khan
Author 3: Muhammad Tahir
Author 4: Ahmed Alghamdi
Author 5: Mohammed Alqarni
Author 6: Thabit Sabbah
Author 7: Muzafar Khan

Keywords: Usability; usability awareness; human-computer interaction (HCI); HCI practitioners; Pakistan IT industry

PDF

Paper 56: Monitoring Vaccine Cold Chain Model with Coloured Petri Net

Abstract: To protect and prevent vaccines from excessively high or low temperatures throughout the supply chain, from manufacturing to administration, it is necessary to monitor and evaluate vaccine cold chain performance in real time. Therefore, today, the need for smart tracking is a requirement that is accentuated with critical systems, such as the vaccine supply chain. In this article, we propose a model for instant cold chain monitoring using a colored Petri net (CPN). This model focuses on the central storage of vaccines and takes into account certain WHO (World Health Organization) recommendations. The simulation and the key performance indicators obtained can be useful for decision-makers in order to measure the effectiveness and efficiency of vaccine storage.

Author 1: Fatima Ouzayd
Author 2: Hajar Mansouri
Author 3: Manal Tamir
Author 4: Raddouane Chiheb
Author 5: Zied Benhouma

Keywords: Vaccine cold chain; monitoring; World Health Organization (WHO); colored Petri net (CPN); performance

PDF

Paper 57: Framework for Rumors Detection in Social Media

Abstract: The development of social networks has led the public in general to find easy accessibility for communication with respect to rapid communication to each other at any time. Such services provide the quick transmission of information which is its positive side but its negative side needs to be kept in mind thereby misinformation can spread. Nowadays, in this era of digitalization, the validation of such information has become a real challenge, due to lack of information authentication method. In this paper, we design a framework for the rumors detection from the Facebook events data, which is based on inquiry comments. The proposed Inquiry Comments Detection Model (ICDM) identifies inquiry comments utilizing a rule-based approach which entails regular expressions to categorize the sentences as an inquiry into those starting with an intransitive verb (like is, am, was, will, would and so on) and also those sentences ending with a question mark. We set the threshold value to compare with the ratio of Inquiry to English comments and identify the rumors. We verified the proposed ICDM on labeled data, collected from snopes.com. Our experiments revealed that the proposed method achieved considerably well in comparison to the existing machine learning techniques. The proposed ICDM approach attained better results of 89% precision, 77% recall, and 82% 𝐹-measure. We are of the opinion that our experimental findings of this study will be useful for the worldwide adoption.

Author 1: Rehana Moin
Author 2: Zahoor-ur-Rehman
Author 3: Khalid Mahmood
Author 4: Mohammad Eid Alzahrani
Author 5: Muhammad Qaiser Saleem

Keywords: Social networks; rumors; inquiry comments; question identification

PDF

Paper 58: Modeling of Arduino-based Prepaid Energy Meter using GSM Technology

Abstract: It is realized that one of the defective subsystems adding to the tremendous budgetary loss in Power Supply Company is the conventional metering and charging framework. Mistakes get presented at each phase of charging the energy rates, similar to blunders with conventional meters, reading errors by human while noticing the consumed energy; and blunder during the preparation of paid and the due bills. The solution for this downside is a prepaid charging or billing framework of consumed energy. Most of the developing countries are shifting their conventional energy management practices to the modern one by replacing the old and conventional energy meters with the smart meters outfitted with the prepaid facility to quantify the power consumption so as to decrease the income deficits looked by utilities because of customer unwillingness to make consumed energy payments on time. Our proposed design embedded with Arduino and GSM technology is advancement over conventional energy meter, which enables consumer to effectively manage their electricity usage. The system performance is good with the acquired results. An earlier charging will undoubtedly get rid of the issues of unpaid bills and human mistakes in meter readings, along these lines guaranteeing justified income for the utility.

Author 1: Uzair Ahmed Rajput
Author 2: Khalid Rafique
Author 3: Abdul Sattar Saand
Author 4: Mujtaba Shaikh
Author 5: Muhammad Tarique

Keywords: Arduino; energy meter; smart meters; RFID; GSM

PDF

Paper 59: Koch Island Fractal Patch Antenna (KIFPA) for Wideband Applications

Abstract: In this paper, a new modified printed Koch Island Fractal Patch Antenna (KIFPA) is studied. The conception of such antenna is based on the combination of different techniques. The first, concerns the fractal geometry of the patch, while the second comprises modified ground-plane. The patch is etched according to Koch Island geometry with different iteration number (n = 1, 2 and 3) as inductive loading. It is proximity fed by a 50Ω micro strip line. The proposed antenna operates in the frequency band [6.03–12.62 GHz] with 70.7% for S 11 ≤ −10 dB. The antenna gain and radiation patterns within the operating band are simulated. The design was performed using the CST Microwave Studio Software and the results are presented, compared and discussed. Finally, the proposed antenna is fabricated and the reflection coefficient parameter is measured to validate simulation results.

Author 1: Meryem HADJI
Author 2: Sidi Mohammed MERIAH
Author 3: Djamila ZIANI

Keywords: Fractal antenna; Koch Island fractal-shape; microstrip patch antenna; wideband antenna

PDF

Paper 60: Investigating Saudi Parents’ Intention to Adopt Technical Mediation Tools to Regulate Children’s Internet Usage

Abstract: The adverse and harmful effects of Internet on young children have become a global concern. Parents tend to use different strategies to ensure their children’s online safety. Many studies have suggested that parental mediation may play a positive role in controlling children’s online behavior. The purpose of this study is to identify the factors that shape Saudi parents’ intention to regulate their children’s online practices using technical mediation tools. An integrated model has been proposed based on famous Information System theories and models to investigate parental intention to adopt technical mediation tools. A questionnaire-based survey is conducted for data collection. Basic descriptive statistical analysis, reliability, and validity assessments were used to analyze the data at the preliminary stage, followed by advanced analysis using Structural Equation Modeling to test the research hypotheses. Research results indicate that effort expectancy, performance expectancy, general computer self-efficacy, perceived severity, and perceived vulnerability are the main predictors of Saudi parent’s intention to regulate their children’s online behaviors using technical mediation tools.

Author 1: Ala’a Bassam Al-Naim
Author 2: Md Maruf Hasan

Keywords: Child and family safety online; parental control and mediation; technology mediation; Unified Theory of Acceptance and Use of Technology (UTAUT); Saudi Arabia

PDF

Paper 61: Control of Industrial Systems to Avoid Failures: Application to Electrical System

Abstract: We resolve the control problem for a class of dynamic hybrid systems (DHS) considering electrical systems as case study. The objective is to guarantee that the plan never reaches unsafe states. We consider a subclass class of DHS called Cumulative Preemptive Event-driven DHS (CPE-DHS). This class is distinguished by the dominance of its discrete aspect characterized by features as cumulative continuous variables combined with actions behavior that may be interrupted and restarted. We utilize a subclass of Rectangular Hybrid Automata (RHA), named Constant Slope RHA (CSRHA), as a solution framework to resolve the control problem. The main contribution is a control Algorithm for the class of systems described above. This algorithm ensures that the system meet the requirement specifications by forcing some events. The forcing action is given in the form of restrictions on the transition guards of the CSRHA. The termination/decidability as well as correctness of the algorithm is given by theorems and formal proofs. This contribution ensures that the system will always be safe states and avoid failure due to the reachability of unsafe states. Our approach can be applied to a large category of industrial systems, especially electrical systems that we consider as case study.

Author 1: Yamen EL TOUATI
Author 2: Saleh ALTOWAIJRI
Author 3: Mohamed AYARI

Keywords: Dynamic hybrid systems; supervisory control; hybrid automata; electrical systems; safety

PDF

Paper 62: Mobility Management Using the IP Protocol

Abstract: Time critical applications, such as VoIP and video conferencing require Internet connectivity all of the time for better performance. Moreover, in case of vehicular networks, it is very common for mobile devices to move from one network to another. In such scenarios the sudden changes in the network connectivity may cause problems, which affects the data transmission rate. The movement of a mobile node from one network to another is also a challenge for the routers to maintain the routing information as well as to forward the data to the corresponding node. In all of the aforementioned scenarios, the switching between the networks with minimum latency improves the performance, i.e. in terms of mobility and availability of the network. The Mobile IP protocol serves the purpose of seamless handover of mobile devices from one network to another. A mobile node maintains its permanent IP address using the Mobile IP protocol while moving to a foreign network. When a mobile node establishes the connection with the foreign network the data packets transmitted from the home network are redirected to the foreign network. The Mobile IP protocol establishes a tunnel between the home network and the foreign network. The process of tunneling continues until the mobile node moves back to the home network or when the foreign network advertises the new IP address of the mobile node. With the increasing number of wireless devices the mobility is the key challenge. The devices with multiple interfaces such as mobile phone which uses 4G as well as WiFi, the urge for the availability of the Internet is also high. This paper provides a deep discussion about the Mobile IP protocol and its implementation. A network scenario is proposed with the configuration of the Mobile IP. According to the obtained results of the simulations, the Mobile IP protocol increases the availability of the network connection as well as it achieves the larger throughput when compared with the scenario without using the Mobile IP.

Author 1: Imtiaz A. Halepoto
Author 2: Adnan Manzoor
Author 3: Nazar H. Phulpoto
Author 4: Sohail A. Memon
Author 5: Muzamil Hussain

Keywords: Mobility; Mobile IP; 4G; foreign network; permanent IP

PDF

Paper 63: Experimental Results on Agent-Based Indoor Localization using WiFi Signaling

Abstract: This paper discusses experimental results on the possibility of accurately estimating the position of smart devices in known indoor environments using agent technology. Discussed localization approaches are based on WiFi signaling, which can be considered as an ubiquitous technology in the large majority of indoor environments. The use of WiFi signaling ensures that no specific infrastructures nor special on-board sensors are required to support localization. Localization is performed using range estimates from the fixed access points of the WiFi network, which are assumed to have known positions. The performance of two range-based localization algorithms are discussed. The first, called Two-Stage Maximum-Likelihood algorithm, is well-known in the literature, while the second is a recent optimization-based algorithm that uses particle swarm techniques. Results discussed in the last part of the paper show that a proper processing of WiFi-based range estimates allows obtaining accurate position estimates, especially if the optimization-based algorithm is used.

Author 1: Stefania Monica
Author 2: Federico Bergenti

Keywords: WiFi-based localization; indoor localization; particle swarm optimization; agent technology

PDF

Paper 64: Divide and Conquer Approach for Solving Security and Usability Conflict in User Authentication

Abstract: Knowledge based authentication schemes are divided into textual password schemes and graphical password schemes. Textual password schemes are easy to use but have well known security issues, such as weak against online security attacks. Graphical password schemes are generally weak against shoulder surfing attacks. Usability is another issue with most of the graphical password schemes. For improving security of knowledge-based authentication schemes complex password entry procedures are used, which improve security but weakens useability of the authentication schemes. In order to resolve this security and usability conflict, a user authentication scheme is proposed, which contains one registration and two login screens called easy and secure login screens. Easy login screen provides easy and quick way of authentication while secure login screen is resilient to different online security attacks. A user has to decide based upon the authentication environment, which login screen to be used for authentication. For secure environment, where chances of security attacks are less easy login screen is recommended. For insecure environments where chances of security attacks are high, secure login screen is recommended for authentication. In the proposed scheme, image based passwords can also be set along with alphanumeric passwords. Results suggest that proposed scheme improves security against offline and online attacks.

Author 1: Shah Zaman Nizamani
Author 2: Waqas Ali Sahito
Author 3: Shafique Awan

Keywords: Authentication; alphanumeric passwords; security; passwords memorability

PDF

Paper 65: A High-Performing Similarity Measure for Categorical Dataset with SF-Tree Clustering Algorithm

Abstract: Tasks such as clustering and classification assume the existence of a similarity measure to assess the similarity (or dissimilarity) of a pair of observations or clusters. The key difference between most clustering methods is in their similarity measures. This article proposes a new similarity measure function called PWO “Probability of the Weights between Overlapped items ”which could be used in clustering categorical dataset; proves that PWO is a metric; presents a framework implementation to detect the best similarity value for different datasets; and improves the F-tree clustering algorithm with Semi-supervised method to refine the results. The experimental evaluation on real categorical datasets, such as “Mushrooms, KrVskp, Congressional Voting, Soybean-Large, Soybean-Small, Hepatitis, Zoo, Lenses, and Adult-Stretch” shows that PWO is more effective in measuring the similarity between categorical data than state-of-the-art algorithms; clustering based on PWO with pre-defined number of clusters results a good separation of classes with a high purity of average 80% coverage of real classes; and the overlap estimator perfectly estimates the value of the overlap threshold using a small sample of dataset of around 5% of data size.

Author 1: Mahmoud A. Mahdi
Author 2: Samir E. Abdelrahman
Author 3: Reem Bahgat

Keywords: Algorithm; clustering; similarity; measurement; categorical; F-Tree; SF-Tree

PDF

Paper 66: Efficient Community Detection Algorithm with Label Propagation using Node Importance and Link Weight

Abstract: Community detection is a principle tool for analysing and studying of a network structure. Label Propagation Algorithm (LPA) is a simple and fast community detection algorithm which is not accurate enough because of its randomness. However, some advanced versions of LPA have been presented in recent years, but their accuracy need to be improved. In this paper, an improved version of label propagation algorithm for community detection called WILPAS is presented. The proposed algorithm for community detection considers both nodes and links important. WILPAS is a parameter-free algorithm and so requires no prior knowledge. Experiments and benchmarks demonstrate that WILPAS is a pretty fast algorithm and outperforms other representative methods in community detection on both synthetic and real-world networks. More specifically, experiments show that the proposed method can detect the true community structure of real-world networks with higher accuracy than other representative label propagation-based algorithms. Finally, experimental results on the networks with millions of links reveal that the proposed algorithm preserve nearly linear time complexity of traditional LPA. Therefore, the proposed algorithm can efficiently detect communities of large-scale social networks.

Author 1: Mohsen Arab
Author 2: Mahdieh Hasheminezhad

Keywords: Label propagation; node importance; link weight

PDF

Paper 67: An Indefinite Cycle Traffic Light Timing Strategy

Abstract: Intelligent transportation signal control plays an important role in reducing traffic congestion and improving road capacity. The key of signal control is to adjust the traffic lights appropriately according to the traffic flow, which is an adaptive control. In this paper, we propose a new timing strategy. This strategy includes green time optimization and lane combination calculation. According to the real-time traffic flow, we optimize green time and calculate lane combination to adjust the cycle and then we can get the timing plan. The simulation results of random data and actual traffic data show that the strategy we proposed can increase traffic efficiency by more than 15% at intersections, reduce vehicle detention, and relieve traffic congestion.

Author 1: Ping Guo
Author 2: Daiwen Lei
Author 3: Lian Ye

Keywords: Traffic light; timing strategy; adaptive control; signal control; intelligent transportation

PDF

Paper 68: Search Manager: A Framework for Hybridizing Different Search Strategies

Abstract: In the last decade, many of the metaheuristic search methods have been proposed for solving tough optimization problems. Each of these algorithms uses its own learn-by-example mechanism in terms of “movement strategy” to evolve the candidate solutions. In this paper, a framework, called Search Manager, is proposed for hybridizing different learn-by-example methods in one algorithm, which is inspired by the organizational management system in which managers change their management method by viewing performance reduction in their managerial organization. The proposed framework is verified using standard benchmark functions and real-world optimization problems. Further, it is compared with some well-known heuristic search methods. The obtained results indicate not only the optimization capability of the proposed framework, but also its ability to obtain accurate solutions and to achieve higher convergence precision.

Author 1: Yousef Abdi
Author 2: Yousef Seyfari

Keywords: Global optimization; metaheuristic; organization management; hybridizing search methods

PDF

Paper 69: A Study of Feature Selection Algorithms for Predicting Students Academic Performance

Abstract: The main aim of all the educational organizations is to improve the quality of education and elevate the academic performance of students. Educational Data Mining (EDM) is a growing research field which helps academic institutions to improve the performance of their students. The academic institutions are most often judged by the grades achieved by the students in examination. EDM offers different practices to predict the academic performance of students. In EDM, Feature Selection (FS) plays a vital role in improving the quality of prediction models for educational datasets. FS algorithms eliminate unrelated data from the educational repositories and hence increase the performance of classifier accuracy used in different EDM practices to support decision making for educational settings. The good quality of educational dataset can produce better results and hence the decisions based on such quality dataset can increase the quality of education by predicting the performance of students. In the light of this mentioned fact, it is necessary to choose a feature selection algorithm carefully. This paper presents an analysis of the performance of filter feature selection algorithms and classification algorithms on two different student datasets. The results obtained from different FS algorithms and classifiers on two student datasets with different number of features will also help researchers to find the best combinations of filter feature selection algorithms and classifiers. It is very necessary to put light on the relevancy of feature selection for student performance prediction, as the constructive educational strategies can be derived through the relevant set of features. The results of our study depict that there is a 10% difference of prediction accuracies between the results of datasets with different number of features.

Author 1: Maryam Zaffar
Author 2: Manzoor Ahmed Hashmani
Author 3: K.S. Savita
Author 4: Syed Sajjad Hussain Rizvi

Keywords: Educational data mining; feature selection algorithms; classifiers; CFS; relief feature selection algorithm

PDF

The Science and Information (SAI) Organization
BACK TO TOP

Computer Science Journal

  • About the Journal
  • Call for Papers
  • Submit Paper
  • Indexing

Our Conferences

  • Computing Conference
  • Intelligent Systems Conference
  • Future Technologies Conference
  • Communication Conference

Help & Support

  • Contact Us
  • About Us
  • Terms and Conditions
  • Privacy Policy

© The Science and Information (SAI) Organization Limited. All rights reserved. Registered in England and Wales. Company Number 8933205. thesai.org