The Science and Information (SAI) Organization
  • Home
  • About Us
  • Journals
  • Conferences
  • Contact Us

Publication Links

  • IJACSA
  • Author Guidelines
  • Publication Policies
  • Digital Archiving Policy
  • Promote your Publication
  • Metadata Harvesting (OAI2)

IJACSA

  • About the Journal
  • Call for Papers
  • Editorial Board
  • Author Guidelines
  • Submit your Paper
  • Current Issue
  • Archives
  • Indexing
  • Fees/ APC
  • Reviewers
  • Apply as a Reviewer

IJARAI

  • About the Journal
  • Archives
  • Indexing & Archiving

Special Issues

  • Home
  • Archives
  • Proposals
  • Guest Editors
  • SUSAI-EE 2025
  • ICONS-BA 2025
  • IoT-BLOCK 2025

Future of Information and Communication Conference (FICC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Computing Conference

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Intelligent Systems Conference (IntelliSys)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Future Technologies Conference (FTC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact
  • Home
  • Call for Papers
  • Editorial Board
  • Guidelines
  • Submit
  • Current Issue
  • Archives
  • Indexing
  • Fees
  • Reviewers
  • Subscribe

IJACSA Volume 3 Issue 6

Copyright Statement: This is an open access publication licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.

View Full Issue

Paper 1: A Study of FR Video Quality Assessment of Real Time Video Stream

Abstract: To assess the real-time transmission video’s quality, this paper persents a approach which used FR video quality assessment (VQA) model to satisfy the objective and subjective measurement requirement. If we want to get the reference video in the measuring terminal and to make a assessment, there are two problems which are how to certain the reference video frame and how to make the objective score close to the subject assessment. We present in this paper a novel method of computing the order number of the video frame in the test point. In order to establish the relationship between the objective distortion and the subjective score, we used the “best-fit” regressed curve model and the BP neural network to describe prediction formula. This work is the mainly aim to get the high accurency assessment results with the human subjective feeling. So we select huge video sources for testing and training. The experimental results show that the proposed approach is suit to assess the video quality using FR model and the converted subjective score is available.

Author 1: Xinchen Zhang
Author 2: Lihau Wu
Author 3: Yuan Fang
Author 4: Hao Jiang

Keywords: video quailty assessment (VQA); full reference; objective performance; subjective score; BP neural network.

PDF

Paper 2: Effective Listings of Function Stop words for Twitter

Abstract: Many words in documents recur very frequently but are essentially meaningless as they are used to join words together in a sentence. It is commonly understood that stop words do not contribute to the context or content of textual documents. Due to their high frequency of occurrence, their presence in text mining presents an obstacle to the understanding of the content in the documents. To eliminate the bias effects, most text mining software or approaches make use of stop words list to identify and remove those words. However, the development of such top words list is difficult and inconsistent between textual sources. This problem is further aggravated by sources such as Twitter which are highly repetitive or similar in nature. In this paper, we will be examining the original work using term frequency, inverse document frequency and term adjacency for developing a stop words list for the Twitter data source. We propose a new technique using combinatorial values as an alternative measure to effectively list out stop words.

Author 1: Murphy Choy

Keywords: Stop words; Text mining; RAKE; ELFS; Twitter.

PDF

Paper 3: A Comparative Study of White Box, Black Box and Grey Box Testing Techniques

Abstract: Software testing is the process to uncover requirement, design and coding errors in the program. It is used to identify the correctness, completeness, security and quality of software products against a specification. Software testing is the process used to measure the quality of developed computer software. It exhibits all mistakes, errors and flaws in the developed software. There are many approaches to software testing, but effective testing of complex product is essentially a process of investigation, not merely a matter of creating and following route procedure. It is not possible to find out all the errors in the program. This fundamental problem in testing thus throws an open question, as to what would be the strategy we should adopt for testing. In our paper, we have described and compared the three most prevalent and commonly used software testing techniques for detecting errors, they are: white box testing, black box testing and grey box testing.

Author 1: Mohd Ehmer Khan
Author 2: Farmeena Khan

Keywords: Black Box; Grey Box; White Box.

PDF

Paper 4: A Study On OFDM In Mobile Ad Hoc Network

Abstract: Orthogonal Frequency Division Multiplexing (OFDM) is the physical layer in emerging wireless local area networks that are also being targeted for ad hoc networking. OFDM can be also exploited in ad hoc networks to improve the energy performance of mobile devices. It is important in wireless networks because it can be used adaptively in a dynamically changing channel. This study gives a detailed view about OFDM and how it is useful to increase the bandwidth. This paper also gives an idea about how OFDM can be a promising technology for high capacity wireless communication.

Author 1: Malik Nasereldin Ahmed
Author 2: Abdul Hanan Abdullah
Author 3: Satria Mandala

Keywords: Ad hoc; OFDM; MANET.

PDF

Paper 5: EVALUATION OF SPECTRAL EFFICIENCY, SYSTEM CAPACITY AND INTERFERENCE EFFECTS ON CDMA COMMUNICATION SYSTEM

Abstract: Wireless communication technology have been developed based on exploring new mobile communications frequency bands, reasonable use of frequency resources and minimization, portability and multifunction’s of mobile stations. The technology of wireless communications with duplex transmission is one of the fastest expanding in the world today. A very effective solution in achieving network performance in terms of system capacity and spectral efficiency with respect to the CDMA wireless network is presented in this paper. The effect of how interference grows as the number of users increases is analyzed. Equally, this paper presents the major problems in CDMA as the multiple access interference which arises due to the deviation of the spreading codes from orthogonality.

Author 1: Ifeagwu E N
Author 2: Ekeh j
Author 3: Ohaneme C.O
Author 4: Okezie C.C

Keywords: Bandwidth; Capacity; Interference; Pseudo-noise.

PDF

Paper 6: Modeling of Traffic Accident Reporting System through UML Using GIS

Abstract: Nowadays vehicles are increasing day by day in town and cities roads. It is a well known problem to manage traffics on the roads in towns and cities. A lot of accident occurs on the road due to careless driving and Technical faults in vehicles. The main problem of traffic authorities is to manage the traffic on the road for the smooth functioning of vehicles that can reduce the accident and violation on the road. There is a tremendous demand from traffic authorities to develop a system that can helps to avoid the accident and keep the accident report data and also maintain the accident report data. The main objective of this paper is to model a Traffic Accident Reporting System (TARS) through UML using GIS to solve the above problem. Authors are also proposed the sequence and activity diagram for the above proposed model.

Author 1: Dr. Gufran Ahmad Ansari
Author 2: Dr. M. Al-shabi

Keywords: UML, GIS, TARS, Sequence diagram, Activity Diagram.

PDF

Paper 7: Towards Multi Label Text Classification through Label Propagation

Abstract: Classifying text data has been an active area of research for a long time. Text document is multifaceted object and often inherently ambiguous by nature. Multi-label learning deals with such ambiguous object. Classification of such ambiguous text objects often makes task of classifier difficult while assigning relevant classes to input document. Traditional single label and multi class text classification paradigms cannot efficiently classify such multifaceted text corpus. Through our paper we are proposing a novel label propagation approach based on semi supervised learning for Multi Label Text Classification. Our proposed approach models the relationship between class labels and also effectively represents input text documents. We are using semi supervised learning technique for effective utilization of labeled and unlabeled data for classification .Our proposed approach promises better classification accuracy and handling of complexity and elaborated on the basis of standard datasets such as Enron, Slashdot and Bibtex.

Author 1: Shweta C Dharmadhikari
Author 2: Maya Ingle
Author 3: Parag Kulkarni

Keywords: Label propagation, semi-supervised learning, multi-label text classification.

PDF

Paper 8: Segment, Track, Extract, Recognize and Convert Sign Language Videos to Voice/Text

Abstract: This paper summarizes various algorithms used to design a sign language recognition system. Sign language is the language used by deaf people to communicate among themselves and with normal people. We designed a real time sign language recognition system that can recognize gestures of sign language from videos under complex backgrounds. Segmenting and tracking of non-rigid hands and head of the signer in sign language videos is achieved by using active contour models. Active contour energy minimization is done using signers hand and head skin colour, texture, boundary and shape information. Classification of signs is done by an artificial neural network using error back propagation algorithm. Each sign in the video is converted into a voice and text command. The system has been implemented successfully for 351 signs of Indian Sign Language under different possible video environments. The recognition rates are calculated for different video environments.

Author 1: P V.V Kishore
Author 2: P.Rajesh Kumar

Keywords: Sign Language;Multiple Video object Segmentations and Trackings; Active Contours; skin colour, texture, boundary and shape;Feature Vector; Artificial Neural Network.

PDF

Paper 10: ComEx Miner: Expert Mining in Virtual Communities

Abstract: The utilization of Web 2.0 as a platform to comprehend the arduous task of expert identification is an upcoming trend. An open problem is to assess the level of expertise objectively in the web 2.0 communities formed. We propose the “ComEx Miner System” that realizes Expert Mining in Virtual Communities, as a solution for this by quantifying the degree of agreement between the sentiment of blog and respective comments received and finally ranking the blogs with the intention to mine the expert, the one with the highest rank score. In the proposed paradigm, it is the conformity & proximity of sentimental orientation of community member’s blog & comments received on it, which is used to rank the blogs and mine the expert on the basis of the blog ranks evaluated. The effectiveness of the paradigm is demonstrated giving a partial view of the phenomenon. The initial results show that it is a motivating technique.

Author 1: Akshi Kumar
Author 2: Nazia Ahmad

Keywords: expert; web 2.0; virtual community; sentiment analysis.

PDF

Paper 11: Identification of the Strong Factor that Influence the Improvement of the Primary Education using the Evidential Reasoning

Abstract: Primary education is one of the important social sectors in the developing countries. It plays a gigantic role in promoting the social development of the concerned countries. More specifically, not the only education but the quality primary education which depends on such factors will contribute a lot for its smooth acceleration. In primary education, if the quality will maintain then automatically all the problems in primary education i.e. enrollment, completion, drop-out and so on will be robotic and gradually solved. The improvement primary education is influenced by both multiple qualitative and quantitative factors. This paper presents evidential reasoning(ER) approach to find out significant factors that are aggregated in assessment of performance of primary education. A case study of Dhaka, Chittagong, Rajshahi and Khulna districts in Bangladesh is provided to illustrate the implementation process of the ER approach for finding strong factors of primary education. For that reason, firstly we assess the performance of four districts then we determine the weakness and strength of specific factors of particular district. In this paper we also show the relation of lowest or best performing districts to its specific factors.

Author 1: Mohammad Salah Uddin Chowdury
Author 2: Smita Sarker

Keywords: Assessment; evidential reasoning; district-wise primary education; factors; key performance indicator (KPI); multiple attribute decision analysis (MADA); uncertainty; utility interval.

PDF

Paper 12: Automated Biometric Voice-Based Access Control in Automatic Teller Machine (ATM)

Abstract: An automatic teller machine requires a user to pass an identity test before any transaction can be granted. The current method available for access control in ATM is based on smartcard. Efforts were made to conduct an interview with structured questions among the ATM users and the result proofed that a lot of problems was associated with ATM smartcard for access control. Among the problems are; it is very difficult to prevent another person from attaining and using a legitimate persons card, also conventional smartcard can be lost, duplicated, stolen or impersonated with accuracy. To address the problems, the paper proposed the use of biometric voice-based access control system in automatic teller machine. In the proposed system, access will be authorized simply by means of an enroll user speaking into a microphone attached to the automatic teller machine. There are 2 phases in implementation of the proposed system: first training phase, second testing or operational phase as discussed in section 4 of this paper.

Author 1: Yekini N A
Author 2: Itegboje A.O
Author 3: Oyeyinka I.K.
Author 4: Akinwole A.K.

Keywords: Automatic Teller Machine (ATM), Biometric, Microphone, Voiced-Based Access Control, Smartcard Access Control, Voiced-Based Verification System

PDF

Paper 13: Resolution Enhancement by Incorporating Segmentation-based Optical Flow Estimation

Abstract: In this paper, the problem of recovering a high-resolution frame from a sequence of low-resolution frames is considered. High-resolution reconstruction process highly depends on image registration step. Typical resolution enhancement techniques use global motion estimation technique. However, in general, video frames cannot be related through global motion due to the arbitrary individual pixel movement between frame pairs. To overcome this problem, we propose to employ segmentation-based optical flow estimation technique for motion estimation with a modified model for frame alignment. To do that, we incorporate the segmentation with the optical flow estimation in two-stage optical flow estimation. In the first stage, a reference image is segmented into homogeneous regions. In the second stage, the optical flow is estimated for each region rather than pixels or blocks. Then, the frame alignment is accomplished by optimizing the cost function that consists of L1-norm of the difference between the interpolated low-resolution (LR) frames and the simulated LR frames. The experimental results demonstrate that using segmentation-based optical flow estimation in motion estimation step with the modified alignment model works better than other motion models such as affine, and conventional optical flow motion models.

Author 1: Osama A Omer

Keywords: Optical flow; image segmentation; Horn-Schunck; super resolution; resolution enhancement.

PDF

Paper 14: Monte Carlo Ray Tracing Simulation of Polarization Characteristics of Sea Water Which Contains Spherical and Non-Spherical Particles of Suspended Solid and Phytoplankton

Abstract: Simulation method of sea water which contains spherical and non-spherical particles of suspended solid and phytoplankton based on Monte Carlo Ray Tracing: MCRT is proposed for identifying non-spherical species of phytoplankton. From the simulation results, it is found that the proposed MCRT model is validated. Also some possibility of identification of spherical and non-spherical shapes of particles which are contained in sea water is shown. Meanwhile, simulations with the different shape of particles, Prolate and Oblate show that Degree of Polarization: DP depends on shapes. Therefore, non-spherical shape of phytoplankton can be identified with polarization characteristics measurements of the ocean.

Author 1: Kohei Arai
Author 2: Yasunori Terayama

Keywords: Monte Carlo Ray Tracing; Phytoplankton; Polarization characteristics.

PDF

Paper 15: Power Analysis Attacks on ECC: A Major Security Threat

Abstract: Wireless sensor networks (WSNs) are largely deployed in different sectors and applications, and Elliptic Curve Cryptography (ECC) is proven to be the most feasible PKC for WSN security. ECC is believed to provide same level of security such as RSA with a much shorter key length, and thus they seem to be ideal for applications with small resources such a sensor network, smartcard, RFID, etc. However, like any other cryptographic primitive, ECC implementations are vulnerable to Power Analysis Attacks (PAAs) that may reveal the secret keys by exploiting leaked power consumption from running cryptographic devices (e.g. smart cards, mobile phones etc.). In this paper, we present a comprehensive study of major PAAs and its countermeasures on ECC cryptosystems. In addition, this paper describes critical concerns to be considered in designing PAAs on ECC particular for WSNs, and illustrates the need to conduct, in the near future, intensive researches for the development of these specific PAAs.

Author 1: Hilal Houssain
Author 2: Mohamad Badra
Author 3: Turki F. Al-Somani

Keywords: Wireless Sensor Networks (WSNs); Elliptic curve cryptosystems (ECC); Side-channel attacks (SCA); Scalar multiplication.

PDF

Paper 16: A Survey on Resource Allocation Strategies in Cloud Computing

Abstract: Cloud computing has become a new age technology that has got huge potentials in enterprises and markets. Clouds can make it possible to access applications and associated data from anywhere. Companies are able to rent resources from cloud for storage and other computational purposes so that their infrastructure cost can be reduced significantly. Further they can make use of company-wide access to applications, based on pay-as-you-go model. Hence there is no need for getting licenses for individual products. However one of the major pitfalls in cloud computing is related to optimizing the resources being allocated. Because of the uniqueness of the model, resource allocation is performed with the objective of minimizing the costs associated with it. The other challenges of resource allocation are meeting customer demands and application requirements. In this paper, various resource allocation strategies and their challenges are discussed in detail. It is believed that this paper would benefit both cloud users and researchers in overcoming the challenges faced.

Author 1: V V.Vinothina,
Author 2: Dr.R.Sridaran
Author 3: Dr.Padmavathi Ganapathi

Keywords: Cloud Computing; Cloud Services; Resource Allocation; Infrastructure.

PDF

Paper 17: Cluster-based Communication Protocol for Load-Balancing in Wireless Sensor Networks

Abstract: One of the main problems in wireless sensor networks is information collection. How the sensor nodes can send efficiently the sensed information to the sink since their number is very large and their resources are limited? Clustering provides a logical view, much more effective than the physical view, which extends the lifetime of the network and achieves the scalability objective. Although the assumption that all sensor nodes can communicate directly with each other or with the sink is not always valid because of the limited transmission range of the sensor nodes and the remoteness of the sink. In this paper, we introduce a cluster-based communication protocol that uses a multi-hop communication mode between the cluster-heads. The protocol aims to reduce and evenly distribute the energy consumption among the sensor nodes, and cover a large area of interest. The simulations show that the proposed protocol is efficient in terms of energy consumption, maximization of the network lifetime, data delivery to the sink and scalability.

Author 1: Mohammed A Merzoug
Author 2: Abdallah Boukerram

Keywords: wireless sensor networks; clustering; load-balancing.

PDF

Paper 18: Semantic Searching and Ranking of Documents using Hybrid Learning System and WordNet

Abstract: Semantic searching seeks to improve search accuracy of the search engine by understanding searcher’s intent and the contextual meaning of the terms present in the query to retrieve more relevant results. To find out the semantic similarity between the query terms, WordNet is used as the underlying reference database. Various approaches of Learning to Rank are compared. A new hybrid learning system is introduced which combines learning using Neural Network and Support Vector Machine. As the size of the training set highly affects the performance of the Neural Network, we have used Support Vector Machine to reduce the size of the data set by extracting support vectors that are critical for the learning. The data set containing support vectors is then used for learning a ranking function using Neural Network. The proposed system is compared with RankNet. The experimental results demonstrated very promising performance improvements. For experiments, we have used English-Hindi parallel corpus, Gyannidhi from CDAC. F-measure and Average Interpolated Precision are used for evaluation.

Author 1: Pooja Arora
Author 2: Om Vikas

Keywords: Learning to Rank; English-Hindi Parallel Corpus; Hybrid Learning; Support Vector Machine (SVM); Neural Network (NN); Semantic Searching; WordNet; Search Engine.

PDF

Paper 19: Evaluation of Perception and Performance in ICT Related Courses

Abstract: Some teaching methods adopted for disseminating Information Communication Technology Related Courses (ICTRC) in institutions of learning have been observed to be inadequate in bringing about the right perception and performance in students. In order to qualitatively establish the efficiency of tutoring ICTRC, this study investigates the effect of ICT resources on students’ perception and performance in ICTRC. Two hundred and forty-eight (248) students in the Department of Computer Science/ICT from two universities: a Federal and a Private University from the South-South region of Nigeria were used. A pre-test, post-test control group and quasi experimental design were utilized. Findings revealed that teaching ICTRC without using ICT resources are not effective at empowering the students with the right perception and the students are not enabled to perform to the best of their ability. Some recommendations are proffered encouraging ICT aided teaching strategies in Nigeria.

Author 1: Annie O EGWALI
Author 2: Efosa C. IGODAN

Keywords: Learning, ICT, Education, Perception, Performance, Examination.

PDF

Paper 20: Effects of Pronunciation Practice System Based on Personalized CG Animations of Mouth Movement Model

Abstract: Pronunciation practice system based on personalized Computer Graphics: CG animation of mouth movement model is proposed. The system enables a learner to practice pronunciation by looking at personalized CG animations of mouth movement model , and allows him/her to compare them with his/her own mouth movements. In order to evaluate the effectiveness of the system by using personalized CG animation of mouth movement model, Japanese vowel and consonant sounds were read by 8 infants before and after practicing with the proposed system, and their pronunciations were examined. Remarkable improvement on their pronunciations is confirmed through a comparison to their pronunciation without the proposed system based on identification test by subjective basis

Author 1: Kohei Arai
Author 2: Mariko Oda

Keywords: Pronunciation practice; mouth movement model; CG animation.

PDF

Paper 21: An Application of Intuitionistic Fuzzy in Routing Networks

Abstract: Routing is an important functional aspect of networks to transport packets from source to destination. A router sets up optimized paths among the different nodes in the network. In this paper the authors proposed a new type of routing algorithm which includes exchange of routing information for small amount of time and then halts for few hours but this information is used by each router to make its own routing decisions based on intuitionistic fuzzy logic during these hours.

Author 1: Ashit Kumar Dutta
Author 2: Abdul Rahaman Wahab Sait

Keywords: component; Intuitionistic fuzzy set; fuzzy set; intuitionistic fuzzy routing; fuzzy routing; GV; IFV; MEO; IMEV;, IFLED.

PDF

Paper 22: An SMS-SQL based On-board system to manage and query a database

Abstract: Technological advances of recent years have facilitated the use of embedded systems. They are part of our everyday life. Thanks to them, electronic devices are increasingly present in our lives in many forms: Mobile phones, music players and managers have become the essential of modern life. Access to information anywhere at any time is increasingly a daily challenge of embedded system technology. Following an innovative idea, this paper describes an embedded system that can query any database through SMS commands to extend the consultation of data to mobile networks early generations. Based on a UNIX embedded system, the result of this work can serve as a standard consultation of databases through SQL-SMS Gateway which converts an SMS command in an SQL query. This system will open the database to the consultation via mobile without having to expose them to risks of online publication. While in the first part of this article we will discuss the state of the art of multi-agent systems and input systems onboard, the second part presents the architecture of our target system. In the third part we describe in detail the realized prototype. This article ends with a conclusion and an outlook.

Author 1: Ahmed Sbaa
Author 2: Rachid El Bejjet
Author 3: Hicham Medromi

Keywords: SMS, SQL, UNIX, LINUX, Embedded System, Perl, GSM.

PDF

The Science and Information (SAI) Organization
BACK TO TOP

Computer Science Journal

  • About the Journal
  • Call for Papers
  • Submit Paper
  • Indexing

Our Conferences

  • Computing Conference
  • Intelligent Systems Conference
  • Future Technologies Conference
  • Communication Conference

Help & Support

  • Contact Us
  • About Us
  • Terms and Conditions
  • Privacy Policy

© The Science and Information (SAI) Organization Limited. All rights reserved. Registered in England and Wales. Company Number 8933205. thesai.org