The Science and Information (SAI) Organization
  • Home
  • About Us
  • Journals
  • Conferences
  • Contact Us

Publication Links

  • IJACSA
  • Author Guidelines
  • Publication Policies
  • Digital Archiving Policy
  • Promote your Publication
  • Metadata Harvesting (OAI2)

IJACSA

  • About the Journal
  • Call for Papers
  • Editorial Board
  • Author Guidelines
  • Submit your Paper
  • Current Issue
  • Archives
  • Indexing
  • Fees/ APC
  • Reviewers
  • Apply as a Reviewer

IJARAI

  • About the Journal
  • Archives
  • Indexing & Archiving

Special Issues

  • Home
  • Archives
  • Proposals
  • Guest Editors
  • SUSAI-EE 2025
  • ICONS-BA 2025
  • IoT-BLOCK 2025

Future of Information and Communication Conference (FICC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Computing Conference

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Intelligent Systems Conference (IntelliSys)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Future Technologies Conference (FTC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact
  • Home
  • Call for Papers
  • Editorial Board
  • Guidelines
  • Submit
  • Current Issue
  • Archives
  • Indexing
  • Fees
  • Reviewers
  • Subscribe

IJACSA Volume 2 Issue 7

Copyright Statement: This is an open access publication licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.

View Full Issue

Paper 1: An Approach for Teaching of National Languages and Cultures through ICT in Cameroon

Abstract: This article describes the input of ICT to the modernization of teaching national languages and cultures in order to promote cultural diversity as well as dissemination of scientific knowledge through national languages. This will also reinforce the understanding capacities of the population. This project will serve as the guideline towards development of scientific knowledge and know-how. It presents numerous psychological, pedagogic, scientific and social advantages, among which there is a sensitization of our languages and cultures, the deployment of a platform in some schools, the training of teachers in using ICT in language teaching, the distribution self-learning aids, the development of a website for analysis and dissemination of cultural data, of conservation of linguistic and cultural heritage, and worthiness of pre-requisites and local predispositions towards the emergence and development of technology. It will contribute to make concrete the introduction of teaching national languages in the school curricula in Cameroon.

Author 1: Marcellin Nkenlifack
Author 2: Bethin Demsong
Author 3: A. Teko Domche
Author 4: Raoul Nangue

Keywords: Local Languages; Culture; ICT; Learning Platform; TICELaCuN; Management Tools.

PDF

Paper 2: Automatic Queuing Model for Banking Applications

Abstract: Queuing is the process of moving customers in a specific sequence to a specific service according to the customer need. The term scheduling stands for the process of computing a schedule. This may be done by a queuing based scheduler. This paper focuses on the banks lines system, the different queuing algorithms that are used in banks to serve the customers, and the average waiting time. The aim of this paper is to build automatic queuing system for organizing the banks queuing system that can analyses the queue status and take decision which customer to serve. The new queuing architecture model can switch between different scheduling algorithms according to the testing results and the factor of the average waiting time. The main innovation of this work concerns the modeling of the average waiting time is taken into processing, in addition with the process of switching to the scheduling algorithm that gives the best average waiting time.

Author 1: Ahmed S.A AL-Jumaily
Author 2: Dr. Huda K. T. AL-Jobori

Keywords: Queuing Systems; Queuing System models; Queuing System Management; Scheduling Algorithms.

PDF

Paper 3: Error Detection and Correction over Two-Dimensional and Two-Diagonal Model and Five-Dimensional Model

Abstract: In this research paper we discover two different schemes of error detection and correction which are based on parity-check code for optimal error detection and correction utilizing check bits without degrading the data rate too much. The scheme of the first method is obtained by arranging data in rows, to form a square, and then parity bits are added. The second scheme builds upon the first, by forming a square cube and the parity scheme is extended to this shape.

Author 1: Danial Aflakian
Author 2: Dr.Tamanna Siddiqui
Author 3: Najeeb Ahmad Khan
Author 4: Davoud Aflakian

Keywords: component; Data Communication; Error detection and correction; Linear Block Coding; Parity check code.

PDF

Paper 4: Developing Digital Control System Centrifugal Pumping Unit

Abstract: Currently, the leading Russian oil companies engaged in the development of automatic control systems (ACS) oil equipment, to improve its efficiency. As an example of an object needed to optimize its work, a centrifugal pumping unit (CPU) can be specified. Frequency actuators provide an opportunity to run CPU in any algorithm, and many industrial controllers, are part of the automatic control system technological process (ACSTP), allow optimizing the operation of the centrifugal pumping unit and help determine the requirements for the development of digital automatic control system for CPU. The development of digital automatic control systems for such a complex nonlinear control object like CPU has several features that should be considered when designing control systems for that object.

Author 1: Safarini Osama

Keywords: ACS - Automatic Control System; CPU- Centrifugal Pumping Unit; PID- A proportional–integral–derivative.

PDF

Paper 5: Image Compression of MRI Image using Planar Coding

Abstract: In this paper a hierarchical coding technique for variable bit rate service is developed using embedded zero block coding approach. The suggested approach enhances the variable rate coding by zero tree based block-coding architecture with Context Modeling for low complexity and high performance. The proposed algorithm utilizes the significance state-table forming the context modeling to control the coding passes with low memory requirement and low implementation complexity with the nearly same performance as compared to the existing coding techniques.

Author 1: Lalitha Y S
Author 2: Mrityunjaya V. Latte

Keywords: image coding; embedded block coding; context modeling; multi rate services.

PDF

Paper 6: A Parallel and Concurrent Implementation of Lin-Kernighan Heuristic (LKH-2) for Solving Traveling Salesman Problem for Multi-Core Processors using SPC3 Programming Model

Abstract: With the arrival of multi-cores, every processor has now built-in parallel computational power and that can be fully utilized only if the program in execution is written accordingly. This study is a part of an on-going research for designing of a new parallel programming model for multi-core processors. In this paper we have presented a combined parallel and concurrent implementation of Lin-Kernighan Heuristic (LKH-2) for Solving Travelling Salesman Problem (TSP) using a newly developed parallel programming model, SPC3 PM, for general purpose multi-core processors. This implementation is found to be very simple, highly efficient, scalable and less time consuming in compare to the existing LKH-2 serial implementations in multi-core processing environment. We have tested our parallel implementation of LKH-2 with medium and large size TSP instances of TSBLIB. And for all these tests our proposed approach has shown much improved performance and scalability.

Author 1: Muhammad Ali Ismail
Author 2: Dr. Shahid H. Mirza
Author 3: Dr. Talat Altaf

Keywords: TSP; Parallel Heuristics; Multi-core processors, parallel programming models.

PDF

Paper 7: Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET’s

Abstract: Multicasting is a challenging task that facilitates group communication among the nodes using the most efficient strategy to deliver the messages over each link of the network. In spite of significant research achievements in recent years, efficient and extendable multicast routing in Mobile Ad Hoc Networks (MANETs) is still a difficult issue. This paper proposes the comparison of ODMR and PUMA protocol. As per the simulation results PUMA is better than ODMR.

Author 1: M Nagaratna
Author 2: V. Kamakshi Prasad
Author 3: Raghavendra Rao

Keywords: MANET; multicast; QoS.

PDF

Paper 8: Characterization of Dynamic Bayesian Network-The Dynamic Bayesian Network as temporal network

Abstract: In this report, we will be interested at Dynamic Bayesian Network (DBNs) as a model that tries to incorporate temporal dimension with uncertainty. We start with basics of DBN where we especially focus in Inference and Learning concepts and algorithms. Then we will present different levels and methods of creating DBNs as well as approaches of incorporating temporal dimension in static Bayesian network.

Author 1: Nabil Ghanmi
Author 2: Mohamed Ali Mahjoub
Author 3: Najoua Essoukri Ben Amara

Keywords: DBN; DAG; Inference; Learning; HMM; EM Algorithm; SEM; MLE; coupled HMMs.

PDF

Paper 9: Triple SV: A Bit Level Symmetric Block-Cipher Having High Avalanche Effect

Abstract: The prolific growth of network communication system entails high risk of breach in information security. This substantiates the need for higher security for electronic information. Cryptography is one of the ways to secure electronic documents. In this paper, we propose a new block cipher, TRIPLE SV (3SV), with 256-bit block size and 112-bit key length. Generally, stream ciphers produce higher avalanche effect but Triple SV shows a substantial rise in avalanche effect with a block cipher implementation. The CBC mode has been used to attain higher avalanche effect. The technique is implemented in C language and has been tested for feasibility

Author 1: Rajdeep Chakraborty
Author 2: Sonam Agarwal
Author 3: Sridipta Misra
Author 4: Vineet Khemka

Keywords: Avalanche Effect; Block Cipher; Cipher Block Chaining (CBC) mode; Cryptography.

PDF

Paper 10: Investigation on Simulation and Measurement of Reverberation for Small Rooms

Abstract: This paper investigates the simulation of reverberation in a small room using image source method, Schroeder model, and Gardner model. It then compares the simulation results with measurement of reverberation in the real measurement room. It shows a large difference between the simulation and the real measurement of reverberation due to the over-simplified representation of the sound source, receiver, and room surfaces in the models. A reverberation simulation model including the real measurement of the source, receiver, and room surfaces will be developed to better match the real measurement of reverberation.

Author 1: Zhixin Chen

Keywords: Digital Signal Processing; Reverberaton; Room Acoustics; Embedded Systems.

PDF

Paper 11: Performance Analysis of Corporate Feed Rectangular Patch Element and Circular Patch Element 4x2 Microstrip Array Antennas

Abstract: This paper present simple, slim, low cost and high gain circular patch and rectangular patch microstrip array antenna, with the details steps of design process, operate in X-band(8 GHz to 12 GHz) and it provides a mean to choose the effective one based on the performance analysis of both of these array antennas. The method of analysis, design and development of these array antennas are explained completely here and analyses are carried out for 4x2 arrays. The simulation has been performed by using commercially available antenna simulator, SONNET version V12.56, to compute the current distribution, return loss response and radiation pattern. The proposed antennas are designed by using Taconic TLY-5 dielectric substrate with permittivity, er = 2.2 and height, h =1.588 mm. In all cases we get return losses in the range -4.96 dB to -25.21 dB at frequencies around 10 GHz. The gain of these antennas as simulated are found above 6 dB and side lobe label is maintained lower than main lobe. Operating frequency of these antennas is 10 GHz so these antennas are suitable for X-band application.

Author 1: Md. Tanvir Ishtaique-ul Huque
Author 2: Md. Al-Amin Chowdhury
Author 3: Md. Kamal Hosain
Author 4: Md. Shah Alam

Keywords: microstrip array antenna; rectangular patch; return loss; X band; circular patch.

PDF

Paper 12: A Comparative Study of various Secure Routing Protocols based on AODV

Abstract: The paper surveyed and compared various secure routing protocols for the mobile ad hoc networks (MANETs). MANETs are vulnerable to various security threats because of its dynamic topology and selfconfigurable nature. Security attacks on ad hoc network routing protocols disrupt network performance and reliability. The paper significantly based on base routing protocol AODV and Secure protocol based on AODV. The comparison between various secure routing protocols has been made on the basis of security services and security attacks. From the survey it is quite clear that these protocols are vulnerable to various routing attacks. A multifence secure routing protocol is still required to fulfill the basic security services and provide solution against various attacks.

Author 1: Dalip Kamboj
Author 2: Pankaj Kumar Sehgal
Author 3:

Keywords: ad hoc network; basic security servieces; security attack.

PDF

Paper 13: The threshold EM algorithm for parameter learning in bayesian network with incomplete data

Abstract: Bayesian networks (BN) are used in a big range of applications but they have one issue concerning parameter learning. In real application, training data are always incomplete or some nodes are hidden. To deal with this problem many learning parameter algorithms are suggested foreground EM, Gibbs sampling and RBE algorithms. In order to limit the search space and escape from local maxima produced by executing EM algorithm, this paper presents a learning parameter algorithm that is a fusion of EM and RBE algorithms. This algorithm incorporates the range of a parameter into the EM algorithm. This range is calculated by the first step of RBE algorithm allowing a regularization of each parameter in bayesian network after the maximization step of the EM algorithm. The threshold EM algorithm is applied in brain tumor diagnosis and show some advantages and disadvantages over the EM algorithm.

Author 1: Fradj Ben Lamine
Author 2: Karim Kalti
Author 3: Mohamed Ali Mahjoub

Keywords: bayesian network; parameter learning; missing data; EM algorithm; Gibbs sampling; RBE algorithm; brain tumor.

PDF

Paper 14: Emotion Classification Using Facial Expression

Abstract: Human emotional facial expressions play an important role in interpersonal relations. This is because humans demonstrate and convey a lot of evident information visually rather than verbally. Although humans recognize facial expressions virtually without effort or delay, reliable expression recognition by machine remains a challenge as of today. To automate recognition of emotional state, machines must be taught to understand facial gestures. In this paper we developed an algorithm which is used to identify the person’s emotional state through facial expression such as angry, disgust, happy. This can be done with different age group of people with different situation. We Used a Radial Basis Function network (RBFN) for classification and Fisher’s Linear Discriminant (FLD), Singular Value Decomposition (SVD) for feature selection.

Author 1: Devi Arumugam
Author 2: Dr. S. Purushothaman B.E, M.E

Keywords: Universal Emotions; FLD; SVD; Eigen Values; Eigen Vector; RBF Network.

PDF

Paper 15: Workshare Process of Thread Programming and MPI Model on Multicore Architecture

Abstract: Comparison between OpenMP for thread programming model and MPI for message passing programming model will be conducted on multicore shared memory machine architectures in order to find which has a better performance in terms of speed and throughput. Application used to assess the scalability of the evaluated parallel programming solutions is matrix multiplication with customizable matrix dimension. Many research done on a large scale parallel computing which using high scale benchmark such as NSA Parallel Benchmark (NPB) for their testing standardization [2]. This research will be conducted on a small scale parallel computing that emphasize more on the performance evaluation between MPI and OpenMP parallel programming model using self created benchmark. It also describes how workshare processes done on different parallel programming model. It gives comparative result between message passing and shared memory programming model in runtime and amount of throughput. Testing methodology also simple and has high usability on the available resources.

Author 1: R Refianti
Author 2: A.B. Mutiara
Author 3: D.T Hasta

Keywords: MPI; OpenMP; SMP; Multicore; Multithreading.

PDF

Paper 16: Hybrid Approaches to Image Coding: A Review

Abstract: Now a days, the digital world is most focused on storage space and speed. With the growing demand for better bandwidth utilization, efficient image data compression techniques have emerged as an important factor for image data transmission and storage. To date, different approaches to image compression have been developed like the classical predictive coding, popular transform coding and vector quantization. Several second generation coding schemes or the segmentation based schemes are also gaining popularity. Practically efficient compression systems based on hybrid coding which combines the advantages of different traditional methods of image coding have also being developed over the years. In this paper, different hybrid approaches to image compression are discussed. Hybrid coding of images, in this context, deals with combining two or more traditional approaches to enhance the individual methods and achieve better quality reconstructed images with higher compression ratio. Literature on hybrid techniques of image coding over the past years is also reviewed. An attempt is made to highlight the neuro-wavelet approach for enhancing coding efficiency.

Author 1: Rehna V J
Author 2: Jeya Kumar. M. K

Keywords: Hybrid coding; Predictive coding; Segmentation; Vector Quantization; Compression ratio.

PDF

Paper 17: Software Security Requirements Gathering Instrument

Abstract: Security breaches are largely caused by the vulnerable software. Since individuals and organizations mostly depend on softwares, it is important to produce in secured manner. The first step towards producing secured software is through gathering security requirements. This paper describes Software Security Requirements Gathering Instrument (SSRGI) that helps gather security requirements from the various stakeholders. This will guide the developers to gather security requirements along with the functional requirements and further incorporate security during other phases of software development. We subsequently present case studies that describe the integration of the SSRGI instrument with Software Requirements Specification (SRS) document as specified in standard IEEE 830-1998. Proposed SSRGI will support the software developers in gathering security requirements in detail during requirements gathering phase.

Author 1: Smriti Jain
Author 2: Maya Ingle

Keywords: Software Requirements Specification; Security Policy; Security Objectives; Security Requirements.

PDF

Paper 18: The Development Process of the Semantic Web and Web Ontology

Abstract: This paper deals with the semantic web and web ontology. The existing ontology development processes are not catered towards casual web ontology development, a notion analogous to standard web page development. Ontologies have become common on the World-Wide Web[2]. Key features of this process include easy and rapid creation of ontological skeletons, searching and linking to existing ontologies and a natural language-based technique to improve presentation of ontologies[6]. Ontologies, however, vary greatly in size, scope and semantics. They can range from generic upper-level ontologies to domain-specific schemas. The success of the Semantic Web is based on the existance of numerous distributed ontologies, using which users can annotate their data, thereby enabling shared machine readable content. This paper elaborates the stages in a casual ontology development process.

Author 1: K Vanitha
Author 2: M.Sri Venkatesh
Author 3: K.Ravindra
Author 4: S.Venkata Lakshmi

Keywords: Toolkits; ontology; semantic web; language-based; web ontology.

PDF

Paper 19: Solving the Vehicle Routing Problem using Genetic Algorithm

Abstract: he main goal of this research is to find a solution of Vehicle Routing Problem using genetic algorithms. The Vehicle Routing Problem (VRP) is a complex combinatorial optimization problem that belongs to the NP-complete class. Due to the nature of the problem it is not possible to use exact methods for large instances of the VRP. Genetic algorithms provide a search technique used in computing to find true or approximate solution to optimization and search problems. However we used some heuristic in addition during crossover or mutation for tuning the system to obtain better result.

Author 1: Abdul Kadar Muhammad Masum
Author 2: Mohammad Shahjalal
Author 3: Md. Faisal Faruque
Author 4: Md. Iqbal Hasan Sarker

Keywords: Vehicle Routing Problem (VRP); Genetic Algorithm; NP-complete; Heuristic.

PDF

Paper 20: Reconfigurable Efficient Design of Viterbi Decoder for Wireless Communication Systems

Abstract: Viterbi Decoders are employed in digital wireless communication systems to decode the convolution codes which are the forward correction codes. These decoders are quite complex and dissipate large amount of power. With the proliferation of battery powered devices such as cellular phones and laptop computers, power dissipation, along with speed and area, is a major concern in VLSI design. In this paper, a low power and high speed viterbi decoder has been designed. The proposed design has been designed using Matlab, synthesized using Xilinx Synthesis Tool and implemented on Xilinx Virtex-II Pro based XC2vpx30 FPGA device. The results show that the proposed design can operate at an estimated frequency of 62.6 MHz by consuming fewer resources on target device.

Author 1: Swati Gupta
Author 2: Rajesh mehra

Keywords: Clock Gating; FPGA; VHDL; Trace Back; Viterbi Decoder.

PDF

Paper 21: Survey of Contrast Enhancement Techniques based on Histogram Equalization

Abstract: This Contrast enhancement is frequently referred to as one of the most important issues in image processing. Histogram equalization (HE) is one of the common methods used for improving contrast in digital images. Histogram equalization (HE) has proved to be a simple and effective image contrast enhancement technique. However, the conventional histogram equalization methods usually result in excessive contrast enhancement, which causes the unnatural look and visual artifacts of the processed image. This paper presents a review of new forms of histogram for image contrast enhancement. The major difference among the methods in this family is the criteria used to divide the input histogram. Brightness preserving Bi-Histogram Equalization (BBHE) and Quantized Bi-Histogram Equalization (QBHE) use the average intensity value as their separating point. Dual Sub-Image Histogram Equalization (DSIHE) uses the median intensity value as the separating point. Minimum Mean Brightness Error Bi-HE (MMBEBHE) uses the separating point that produces the smallest Absolute Mean Brightness Error (AMBE). Recursive Mean-Separate Histogram Equalization (RMSHE) is another improvement of BBHE. The Brightness preserving dynamic histogram equalization (BPDHE) method is actually an extension to both MPHEBP and DHE. Weighting mean-separated sub-histogram equalization (WMSHE) method is to perform the effective contrast enhancement of the digital image.

Author 1: Manpreet Kaur
Author 2: Jasdeep Kaur
Author 3: Jappreet Kaur

Keywords: component image processing; contrast enhancement; histogram equalization; minimum mean brightness error; brightness preserving enhancement, histogram partition.

PDF

Paper 22: Status of Wireless Technologies Used For Designing Home Automation System - A Review

Abstract: The concept of “Automation” have just started flourishing, companies have developed automated systems of their own to control alarms, sensors, actuators and video cameras and moving further the concept of automated buildings is being recognized. This Paper attempts to study standards / technologies which are used for Home Automation. In brief, concern of this Paper is to cover the detail Technical aspects of the Home Automation Standard/ Technology.

Author 1: Ashish J Ingle
Author 2: Bharti W. Gawali

Keywords: Automation; Technology; Reliable.

PDF

Paper 23: Image Compression Techniques Using Modified high quality Multi wavelets

Abstract: over the past decade, the success of wavelets in solving many different problems has contributed to its unprecedented popularity. For best performance in image compression, wavelet transforms require filters that combine a number of desirable properties, such as orthogonality and symmetry. Advances in wavelet transforms and quantization methods have produced algorithms capable of surpassing the existing image compression standards like the Joint Photographic Experts Group (JPEG) algorithm. For best performance in image compression, wavelet transforms require filters that combine a number of desirable properties, such as orthogonality and symmetry. This paper presents new multi wavelet transform and quantization methods and introduces multi wavelet packets. Extensive experimental results demonstrate that our techniques exhibit performance equal to, or in several cases superior to, the current wavelet filters.

Author 1: M Ashok
Author 2: Dr.T.BhaskaraReddy

Keywords: Multi wavelets; DWT; Image coding; Quantizers; ANN.

PDF

Paper 24: On Algebraic Spectrum of Ontology Evaluation

Abstract: Ontology evaluation remains an important open problem in the area of its application. The ontology structure evaluation framework for benchmarking the internal graph structures was proposed. The framework was used in transport and biochemical ontology. The corresponding adjacency, incidence matrices and other structural properties due to the class hierarchical structure of the transport and biochemical ontology were computed using MATLAB. The results showed that the choice of suitable choice must depend on the purpose of ontology structure evaluation.

Author 1: Adekoya Adebayo Felix
Author 2: Akinwale Adio Taofiki
Author 3: Sofoluwe Adetokunbo

Keywords: Ontology evaluation; adjacency matrix; graph; algebraic spectrum.

PDF

Paper 25: Evaluation of SIGMA and SCTPmx for High Handover Rate Vehicle

Abstract: Rapid technological advance in wireless mobile communication offered Internet accessibility at anytime and anywhere including high speed wireless environment such as in high speed trains, fast moving cars etc. However, wireless Quality of Service (QoS) provisioning in such high speed movement is more difficult and challenging to be tackled than in a fixed-wired environment. This paper discussed transport layer protocol, SCTP to support seamless handover that can guarantees and maintain high QoS in high speed vehicle. The comparison of the selected protocol have been identified and analysed in two handover techniques SIGMA and SCTPmx to optimize its performance in high speed vehicular environment.

Author 1: Hala Eldaw Idris Jubara
Author 2: Sharifah Hafizah Syed Ariffin

Keywords: handover latency; speed; SCTP; mobility management; vehicle.

PDF

The Science and Information (SAI) Organization
BACK TO TOP

Computer Science Journal

  • About the Journal
  • Call for Papers
  • Submit Paper
  • Indexing

Our Conferences

  • Computing Conference
  • Intelligent Systems Conference
  • Future Technologies Conference
  • Communication Conference

Help & Support

  • Contact Us
  • About Us
  • Terms and Conditions
  • Privacy Policy

© The Science and Information (SAI) Organization Limited. All rights reserved. Registered in England and Wales. Company Number 8933205. thesai.org