The Science and Information (SAI) Organization
  • Home
  • About Us
  • Journals
  • Conferences
  • Contact Us

Publication Links

  • IJACSA
  • Author Guidelines
  • Publication Policies
  • Digital Archiving Policy
  • Promote your Publication
  • Metadata Harvesting (OAI2)

IJACSA

  • About the Journal
  • Call for Papers
  • Editorial Board
  • Author Guidelines
  • Submit your Paper
  • Current Issue
  • Archives
  • Indexing
  • Fees/ APC
  • Reviewers
  • Apply as a Reviewer

IJARAI

  • About the Journal
  • Archives
  • Indexing & Archiving

Special Issues

  • Home
  • Archives
  • Proposals
  • Guest Editors
  • SUSAI-EE 2025
  • ICONS-BA 2025
  • IoT-BLOCK 2025

Future of Information and Communication Conference (FICC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Computing Conference

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Intelligent Systems Conference (IntelliSys)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Future Technologies Conference (FTC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact
  • Home
  • Call for Papers
  • Editorial Board
  • Guidelines
  • Submit
  • Current Issue
  • Archives
  • Indexing
  • Fees
  • Reviewers
  • Subscribe

IJACSA Volume 4 Issue 7

Copyright Statement: This is an open access publication licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.

View Full Issue

Paper 1: Relation Inclusive Search for Hindi Documents

Abstract: Information retrieval (IR) techniques become a challenge to researchers due to huge growth of digital and information retrieval. As a wide variety of Hindi Data and Literature is now available on web, we have developed information retrieval system for Hindi documents. This paper presents a new searching technique that has promising results in terms of F-measure. Historically, there have been two major approaches to IR - keyword based search and concept based search. We have introduced new relation inclusive search which performs searching of documents using case role relation, spatial relation and temporal relation of query terms and gives results better than previously used approaches. In this method we have used new indexing technique which stores information about relation between terms along with its position. We have compared four types of searching: Keyword Based search without Relation Inclusive, Keyword Based search with Relation Inclusive, Concept Based search without Relation Inclusive and Concept Based search with Relation Inclusive. Our proposed searching method gave significant improvement in terms of F-measure. For experiments we have used Hindi document corpus, Gyannidhi from C-DAC. This technique effectively improves search performance for documents in English as well.

Author 1: Pooja Arora
Author 2: Om Vikas

Keywords: Relation inclusive search; RSearch; spatial & temporal prepositions and postpositions; Hindi document retrieval; case roles.

PDF

Paper 2: Applying Genetic Algorithms to Test JUH DBs Exceptions

Abstract: Database represents an essential part of software applications. Many organizations use database as a repository for large amount of current and historical information. With this context testing database applications is a key issue that deserves attention. SQL Exception handling mechanism can increase the reliability of the system and improve the robustness of the software. But the exception handling code that is used to respond to exceptional conditions tends to be the source of the systems failure. It is difficult to test the exception handling by traditional methods. This paper presents a new technique that combines mutation testing and global optimization based search algorithm to test exceptions code in Jordan University Hospital (JUH) database application. Thus, using mutation testing to speed the raising of exception and global optimization technique in order to automatically generate test cases, we used fitness function depends on range of data related to each query. We try to achieve the coverage of three types of PL/SQL exceptions, which are No_Data_Found (NDF), Too_Many_Rows (TMR) and Others exceptions. The results show that TMR exception is not always covered this due to existence of primary key in the query, also uncovered status appear in nested exceptions.

Author 1: Mohammad Alshraideh
Author 2: Ezdehar Jawabreh
Author 3: Basel A. Mahafzah
Author 4: Heba M. AL Harahsheh

Keywords: Database Application; Exception Handling; Mutation Testing; Genetic Algorithms; Select Statement.

PDF

Paper 3: Visual Exploration of Complex Network Data Using Affective Brain-Computer Interface

Abstract: This paper describes the current state of the work aimed towards an affective application of BCI to the task of complex data visual exploration. The developed technological approach exploits the idea of supporting tacit and complex domain-specific knowledge acquisition during the examination of visual images built using large input data sets. The presented experimental research on the complex network data exploration process shows the capabilities of the presented approach through the analysis of a user’s affective state estimation.

Author 1: Sergey V. Kovalchuk
Author 2: Denis M. Terekhov
Author 3: Aleksey A. Bezgodov
Author 4: Alexander V. Boukhanovsky

Keywords: affective brain-computer interface; complex network data; visualisation; virtual reality; domain-specific knowledge; human-computer interaction.

PDF

Paper 4: LED to LED communication with WDM concept for flash light of Mobile phones

Abstract: After observing recent developments in Free Space Optical Communication especially Visible Light Communication, It is clear that LED is main component as a source. LED being solid state device makes endless list of possibilities. But here we will get through its ability to sense light as well, and use of Wavelength Division Multiplexing (WDM) in mobile flash is also suggested, this opens door to many applications.

Author 1: Devendra J Varanva
Author 2: Kantipudi MVV Prasad

Keywords: Free Space Light Communication; Visible Light Communication; Solid State Device; LED as Sensor; LED-LED Communication; WDM; VLC with Mobile handset/Smartphone.

PDF

Paper 5: Rule Based System for Recognizing Emotions Using Multimodal Approach

Abstract: Emotion is assuming increasing importance in human computer interaction (HCI), in general, with the growing feeling that emotion is central to human communication and intelligence. Users expect not just functionality as a factor of usability, but experiences, matched to their expectations, emotional states, and interaction goals. Endowing computers with this kind of intelligence for HCI is a complex task. It becomes more complex with the fact that the interaction of humans with their environment (including other humans) is naturally multimodal. In reality, one uses a combination of modalities and they are not treated independently. In an attempt to render HCI more similar to human-human communication and enhance its naturalness, research on multiple modalities of human expressions has seen ongoing progress in the past few years. As compared to unimodal approaches, various problems arise in case of multimodal emotion recognition especially concerning fusion architecture of multimodal information. In this paper we will be proposing a rule based hybrid approach to combine the information from various sources for recognizing the target emotions. The results presented in this paper shows that it is feasible to recognize human affective states with a reasonable accuracy by combining the modalities together using rule based system.

Author 1: Preeti Khanna
Author 2: Sasikumar M.

Keywords: Human Computer Interaction (HCI); Multimodal emotion recognition; Rule based system; Emotional state; Modalities.

PDF

Paper 6: The SNCD as a Metrics for Image Quality Assessment

Abstract: In our era, when we have a lot of instrument to capture digital images and they go more in more increasing the image resolution; the quality of the images become very important for different application, and the development tool to quality assessment is a current issue. In this paper, we propose to use the Symmetric Normalized Compression Distance (SNCD) as a metrics for the measurement of image quality, especially when we analyze residual errors. We also show performance comparisons of other metrics that we can found in the various research literatures and the SNCD. We also present an analysis about the performance of the SNCD depending to the type of distortion.

Author 1: Avid Roman-Gonzalez

Keywords: Quality metrics; NCD, SNCD; Kolmogorov complexity; image quality.

PDF

Paper 7: The Use of Software Project Management Tools in Saudi Arabia: An Exploratory Survey

Abstract: This paper reports the results of an online survey study, which was conducted to investigate the use of software project management tools in Saudi Arabia. The survey provides insights of project management in the local context of Saudi Arabia from ten different companies which participated in this study. The aim is to explore and specify the project management tools used by software project management teams and their managers, to understand the supported features that might influence their selection. Moreover, the existence of the Arabic interface, the Hijri calendar and the Arabic documentation has been specially considered, due to the nature of the local context in dealing with the Hijri calendar and the prolific use of Arabic as the formal language in communication with clients in the public sector.

Author 1: Nouf AlMobarak
Author 2: Rawan AlAbdulrahman
Author 3: Shahad AlHarbi
Author 4: Wea’am AlRashed

Keywords: project management tools; survey; Hijri calendar; Arabic interface; software engineering; Arabic documentation.

PDF

Paper 8: Communication in Veil: Enhanced Paradigm for ASCII Text Files

Abstract: Digitization has a persuasive impact on information and communication technology (ICT) field which can be realized from the fact that today one seldom think to stand in long awaiting queue just to deposit utility bills, buy movie ticket, or dispatch private letters via post office etc. as these and other such similar activities are now preferably being done electronically over internet which has shattered the geographical boundaries and has tied the people across the world into a single logical unit called global village. The efficacy and precision with which electronic transactions are made is commendable and is one of the reasons why more and more people are switching over to e-commerce for their official and personal usage. Via social networking sites one can interact with family and friends at any time of his/her choice. The darker side of this comforting aspect, however, is that the contents sent on/off-line may be monitored for active or passive intervention by the antagonistic forces for their illicit motives ranging from but not only limited to password, ID and social security number theft to impersonation, compromising personal information, blackmailing etc. This necessitated the need to hide data or information of some significance in an oblivious manner in order to detract the enemy as regards its detection. This paper aims at evolving an avant-garde information hiding scheme for ASCII text files - a research area regarded as the most difficult in contrast to audio, video or image file formats for the said purpose.

Author 1: Khan Farhan Rafat
Author 2: Muhammad Sher

Keywords: Embedded Secrets; Hide and Seek; Eccentric way of writing; ASCII Text Steganography; Communication in Veil; Stealth Communication

PDF

Paper 9: Collaborative Spectrum Sensing under Suburban Environments

Abstract: Collaborative spectrum sensing for detection of white spaces helps in realizing reliable and efficient spectrum sensing algorithms, which results in efficient usage of primary spectrum in secondary fashion. Collaboration among cognitive radios improves probability of detecting a spectral hole as well as sensing time. Available literature, in this domain, uses Gudmundson’s exponential correlation model for correlated lognormal shadowing under both urban and suburban environments. However, empirical measurements verify that the suburban environment can better be modeled through double exponential correlation model under suburban environments in comparison to Gudmundson’s exponential correlation model. Collaboration among independent sensors provides diversity gains. Asymptotic detection probability for collaborating users under suburban environments using double exponential correlation model has been derived. Also, the Region of Convergence performance of collaborative detection is presented which agrees well with analytical derivations.

Author 1: Aamir Zeb Shaikh
Author 2: Dr. Talat Altaf

Keywords: collaborative spectrum sensing; suburban environment; asymptotic analysis; cognitive radio; opportunistic access

PDF

Paper 10: On an internal multimodel control for nonlinear multivariable systems - A comparative study

Abstract: An internal multimodel control designed for nonlinear multivariable systems, is proposed in this paper. This approach is based on the multi-modeling of nonlinear systems and the realization of a specific inversion of each model. A comparative study is presented between two structures of the internal multimodel control. The first one is based on switching models and the second on residues techniques as fusion method. The case of a second order nonlinear multivariable system shows the effectiveness of both structures.

Author 1: Nahla Touati Karmani
Author 2: Dhaou Soudani
Author 3: Mongi Naceur
Author 4: Mohamed Benrejeb

Keywords: internal multimodel control; nonlinear multivariable systems; inverse model; switching models; residues techniques.

PDF

Paper 11: Contribution of the Computer Technologies in the Teaching of Physics: Critical Review and Conception of an Interactive Simulation Software

Abstract: In the present research, we will synthesize the main research results about the development of interactive computer environments for physics teaching and learning. We will see that few types of software propose environments that take into account the user's erroneous representations in order to make him become aware of his mistakes. The majority of these softwares present modelling activities that are restricted to the automatic collection of experimental data and their analysis under graphical form. As a consequence, we will present the design of computer environments for the learning of the phenomenona of absorption and diffusion of light which will take into account the user's initial representations. The design of these environments is divided in five steps: (1) diagnostic of the user’s initial representations; (2) confrontation of the user’s initial representations by the simulation; (3) reconstruction by the user of his representations following the completion by the user of the simulation; (4) reconstruction of the user’s representations following the presentation by the software of scientific information related to the case studied and (5) assessment of the current state of understanding of the user by the software.

Author 1: Abdeljalil Métioui
Author 2: Louis Trudel

Keywords: critical review; physical; conception; interactive environments; representations

PDF

Paper 12: A Novel Permutation Based Approach for Effective and Efficient Representation of Face Images under Varying Illuminations

Abstract: Paramount importance for an automated face recognition system is the ability to enhance discriminatory power with a low-dimensional feature representation. Keeping this as a focal point, we present a novel approach for face recognition by formulating the problem of face tagging in terms of permutation. Using a fundamental concept that, dominant pixels of a person will remain dominant under varying illuminations, we develop a Permutation Matrix (PM) based approach for representing face images. The proposed method is extensively evaluated on several benchmark databases under different exemplary evaluation protocols reported in the literature. Experimental results and comparative study with state-of-the-art methods suggest that the proposed approach provides a better representation of face, thereby achieving higher efficacy and lower error rates.

Author 1: Shylaja S S
Author 2: K N Balasubramanya Murthy
Author 3: S Natarajan

Keywords: Biometrics; Face Recognition; Independent Component Analysis (ICA); Linear Discriminant Analysis (LDA); Locality Preserving Projections (LPP); Pattern Recognition;ermutation Matrix (PM); Singular Value Decomposition (SVD).

PDF

Paper 13: Effective Performance of Information Retrieval by using Domain Based Crawler

Abstract: World Wide Web continuously introduces new capabilities and attracts many people[1]. It consists of more than 60 billion pages online. Due to this explosion in size, the information retrieval system or Search Engines are being upgraded day by day and it can be used to access the information effectively and efficiently. In this paper, we have addressed Domain Based Information Retrieval (DBIR) System. In this system we crawl the information from the web and added all links to the data base which are related to a specific domain. It simply ignores which are not related to that domain. Because of that we can save the Storage Space (SS) and Searching Time (ST) and as a result it improves the performance of the system. It is an extension of Effective Performance of Web Crawler (EPOW) System [2], in which it has two Crawler modules. The first one is Basic Crawler. It consists of multiple downloaders to achieve parallelization policy . The second one is Master Crawler, which is used to filter the URLs send by the Basic Crawler based on the Domain and sends back to the Basic Crawler to extract the related links. All these related links are collectively stored into the database under a unique domain name.

Author 1: Sk. Abdul Nabi
Author 2: Dr. P. Premchand

Keywords: Domain Based Information Retrieval (DBIR); Storage Space (SS); Searching Time (ST) ; Master Crawler;Basic Crawler ; EPOW.

PDF

Paper 14: An Intelligent Diagnostic System for Congenital Heart Defects

Abstract: Congenital heart disease is the most common birth defect. The article describes detection and classification of congenital heart defect using classification and regressing trees. The ultimate goal of this research can decrease risk of cardiac arrest and mortality in compared with healthy children. The intelligent system proposed in three stages technique for automate diagnosis:(i) pre-processing(ii), feature extraction, and (iii) classification of congenital heart defects (CHD) using data mining tools. The intelligent diagnostic system has been validated with a representative dataset of 110 heart sound signals, taken from healthy and unhealthy medical cases. This system was evaluated in the test dataset with the following performance measurements global accuracy: 98.18%, sensitivity, 96.36% and specificity 100%. This results show the feasibility of classification based on optimized feature extraction and classifier. This paper follows the Association for the recommendations of the Advancement of Medical Instrumentation.

Author 1: Amir Mohammad Amiri
Author 2: Giuliano Armano

Keywords: congenital heart defects; Heart murmurs; newborns; classification and regression trees;

PDF

Paper 15: POSIX.1 conformance For Android Applications

Abstract: Android operating system is designed for use in mobile computing by The Open Handset Alliance. Android market has hundreds of thousands of Android applications and these applications are restricted only to the mobiles. This restriction is mainly because of portability and compatibility issues of Android operating system. So need of employing these countless Android applications on any POISX Desktop operating system without disturbing the internal structure of application is very desirable. Thus we need to resolve these standardization and portability concerns by using POSIX standards (Portable Operating System Interface). The concepts of POSIX conformance for Android applications provide full-scale portability services and Android applications reusability for any POSIX desktop operating system. So Android applications will become usable for all POISX desktop users. This research theme introduces POSIX.1 Android thin layer model that simply provides the POSIX conformance for Android applications. It is using the POSIX.1 APIs for Android applications, which maintains the compatibility between the POISX Desktop operating systems and Android applications. We have analyzed our research work by implementation of the different applications in standard POSIX environment and, have verified its results. The results of POSIX.1 model clearly showed that it will boost up the Android applications market revenue up to 100% plus add real-time standardization and reusability.

Author 1: Tayyaba Nafees
Author 2: Prof. Dr. Shoab Ahmad Khan

Keywords: Portable Operating System Interface (POSIX); Application Programming Interface (API); Operating system (OS); User interface (UI)

PDF

Paper 16: Classification of Image Database Using Independent Principal Component Analysis

Abstract: The paper presents a modified approach of Principal Component Analysis (PCA) for an automatic classification of image database. Principal components are the distinctive or peculiar features of an image. PCA also holds information regarding the structure of data. PCA can be applied to all training images of different classes together forming universal subspace or to an individual image forming an object subspace . But if PCA is applied independently on the different classes of objects, the main direction will be different for them. Thus, they can be used to construct a classifier which uses them to make decisions regarding the class. Also the dimension reduction of feature vector is possible. Initially training image set is chosen for each class. PCA, using eigen vector decomposition, is applied to an individual class forming an individual and independent eigenspace for that class. If there are n classes of training images, we get n eigenspaces. The dimension of eigenspace depends upon the number of selected eigen vectors. Each training image is projected on the corresponding eigenspace giving its feature vector. Thus n sets of training feature vectors are produced. In testing phase, new image is projected on all eigenspaces forming n feature vectors. These feature vectors are compared with training feature vectors in corresponding eigenspace. Feature vector nearest to new image in each eigenspace is found out. Classification of new image is accomplished by comparing the distances between the nearest feature vector and training image feature vector in each eigenspace. Two distance criteria such as Euclidean and Manhattan distance are used. The system is tested on COIL-100 database. Performance is tested and tabulated for different sizes of training image database.

Author 1: H. B. Kekre
Author 2: Tanuja K. Sarode
Author 3: Jagruti K. Save

Keywords: Image classification; Principal Component Analysis (PCA); Eigen value; Eigen vector; Variance; Nearest neighbor classifier; Orthogonal transform; Feature vector; Covariance matrix.

PDF

Paper 17: Mining Frequent Itemsets from Online Data Streams: Comparative Study

Abstract: Online mining of data streams poses many new challenges more than mining static databases. In addition to the one-scan nature, the unbounded memory requirement, the high data arrival rate of data streams and the combinatorial explosion of itemsets exacerbate the mining task. The high complexity of the frequent itemsets mining problem hinders the application of the stream mining techniques. In this review, we present a comparative study among almost all, as we are acquainted, the algorithms for mining frequent itemsets from online data streams. All those techniques immolate with the accuracy of the results due to the relatively limited storage, leading, at all times, to approximated results.

Author 1: HebaTallah Mohamed Nabil
Author 2: Ahmed Sharaf Eldin
Author 3: Mohamed Abd El-Fattah Belal

Keywords: Data mining; frequent itemsets; data stream; sliding window model; landmark model; fading model.

PDF

Paper 18: SVM Classification of Urban High-Resolution Imagery Using Composite Kernels and Contour Information

Abstract: The classification of remote sensing images has done great forward taking into account the image’s availability with different resolutions, as well as an abundance of very efficient classification algorithms. A number of works have shown promising results by the fusion of spatial and spectral information using Support Vector Machines (SVM) which are a group of supervised classification algorithms that have been recently used in the remote sensing field, however the addition of contour information to both spectral and spatial information still less explored. For this purpose we propose a methodology exploiting the properties of Mercer’s kernels to construct a family of composite kernels that easily combine multi-spectral features and Haralick texture features as data source. The composite kernel that gives the best results will be used to introduce contour information in the classification process. The proposed approach was tested on common scenes of urban imagery. The three different kernels tested allow a significant improvement of the classification performances and a flexibility to balance between the spatial and spectral information in the classifier. The experimental results indicate a global accuracy value of 93.52%, the addition of contour information, described by the Fourier descriptors, Hough transform and Zernike moments, allows increasing the obtained global accuracy by 1.61% which is very promising.

Author 1: Aissam Bekkari
Author 2: Mostafa El yassa
Author 3: Soufiane Idbraim
Author 4: Driss Mammass
Author 5: Azeddine Elhassouny
Author 6: Danielle Ducrot

Keywords: SVM; Contour information; Composite Kernels; Haralick features; Satellite image; Spectral and spatial information; GLCM; Fourier descriptors; Hough transform; Zernike moments.

PDF

Paper 19: Performance Evaluation of Two-Hop Wireless Link under Nakagami-m Fading

Abstract: Now-a-days, intense research is going on two-hop wireless link under different fading conditions with its remedial measures. In this paper work, a two-hop link under three different conditions is considered: (i) MIMO on both hops, (ii) MISO in first hop and SIMO in second hop and finally (iii) SIMO in first hop and MISO in second hop. The three models used here give the flexibility of using STBC (Space Time Block Coding) and combining scheme on any of the source to relay (S-R) and relay to destination (R-D) link. Even incorporation of Transmitting Antenna Selection (TAS) is possible on any link. Here, the variation of SER (Symbol Error Rate) is determined against mean SNR (Signal-to-Noise Ratio) of R-D link for three different modulation schemes: BPSK, 8-PSK and 16-PSK, taking the number of antennas and SNR of S-R link as parameters under Nakagami -m fading condition.

Author 1: Afsana Nadia
Author 2: Arifur Rahim Chowdhury
Author 3: Md. Shoayeb Hossain
Author 4: Md. Imdadul Islam
Author 5: M. R. Amin

Keywords: MIMO; MISO; SIMO; TAS; MRC; SER; SNR.

PDF

Paper 20: Segmentation on the Dental Periapical X-Ray Images for Osteoporosis Screening

Abstract: Segmentation on the trabecular of dental periapical X-Ray images is very important for osteoporosis screening. Existing methods do not perform well in segmenting the trabecular of dental periapical in X-Ray images due to the presence of large amount of spurious edges. This paper presents a combination of tophat-bothat filtering, histogram equalization contrasting and local adaptive thresholding approach for automatic segmentation of dental periapical in X-Ray images. The qualitative evaluation is done by a dentist and shows that the proposed segmentation algorithm performed well the porous of trabecular features of dental periapical. The quantitative evaluation used fuzzy classification based on neural network to classify these features. It were found accuracy rate to be 99,96% for training set and around 65% for testing set for a dataset of 60 subjects.

Author 1: Enny Itje Sela
Author 2: Sri Hartati
Author 3: Agus Harjoko
Author 4: Retantyo Wardoyo
Author 5: Munakhir MS

Keywords: dental periapical X-Ray; osteoporosis; porous trabeculae; segmentation.

PDF

Paper 21: A Hybrid Approach for Co-Channel Speech Segregation based on CASA, HMM Multipitch Tracking, and Medium Frame Harmonic Model

Abstract: This paper proposes a hybrid approach for co-channel speech segregation. HMM (hidden Markov model) is used to track the pitches of 2 talkers. The resulting pitch tracks are then enriched with the prominent pitch. The enriched tracks are correctly grouped using pitch continuity. Medium frame harmonics are used to extract the second pitch for frames with only one pitch deduced using the previous steps. Finally, the pitch tracks are input to CASA (computational auditory scene analysis) to segregate the mixed speech. The center frequency range of the gamma tone filter banks is maximized to reduce the overlap between the channels filtered for better segregation. Experiments were conducted using this hybrid approach on the speech separation challenge database and compared to the single (non-hybrid) approaches, i.e. signal processing and CASA. Results show that using the hybrid approach outperforms the single approaches.

Author 1: Ashraf M. Mohy Eldin
Author 2: Aliaa A. A. Youssif

Keywords: CASA (computational auditory scene analysis); co-channel speech segregation; HMM (hidden Markov model) tracking; hybrid speech segregation approach; medium frame nic model; multipitch tracking; prominent pitch.

PDF

Paper 22: An Adaptive Multimodal Biometrics System using PSO

Abstract: Multimodal biometric systems which fuse information from a number of biometrics, are gaining more attentions lately because they are able to overcome limitations in unimodal biometric systems. These systems are suited for high security applications. Most of the proposed multibiometric systems offer one level of security. In this paper a new approach for adaptive combination of multiple biometrics has been proposed to ensure multiple levels of security. The score level fusion rule is adapted using (PSO) Particle Swarm Optimization to ensure the desired system performance corresponding to the desired level of security. The experimental results prove that the proposed multimodal biometric system is appropriate for applications that require different levels of security.

Author 1: Ola M. Aly
Author 2: Tarek A. Mahmoud
Author 3: Gouda I. Salama
Author 4: Hoda M. Onsi

Keywords: multibiometric; match score fusion; PSO; Irsi; Palmprint; Finger_Knuckle

PDF

Paper 23: Interaction Protocols in Multi-Agent Systems based on Agent Petri Nets Model

Abstract: This paper deals with the modeling of interaction between agents in Multi Agents System (MAS) based on Agent Petri Nets (APN). Our models are created based on communicating agents. Indeed, an agent initiating a conversation with other can specify the interaction protocol wishes to follow. The combination of APN and FIPA Protocols schemes leads to a set of deployment formal rules for points where model interaction can be successfully implemented. We introduce some models FIPA standard protocols.

Author 1: Borhen Marzougui
Author 2: Kamel Barkaoui

Keywords: Interaction; MAS; APN; Model; formalism; FIFA; Protocols.

PDF

Paper 24: Analysis of Child Computer Interaction in Edutainment and Simulation Games Application on Android Platform in Indonesia

Abstract: Child Computer Interaction (CCI) has become a challenge in utilizing the technology as education media. The increasing number of children, who use advanced gadgets in Indonesia such as smartphones and tablet PCs, provides a new space for developing interactive educational game application for kids. Indonesia is a country with the biggest number of Android-based game application downloaders in the world of service providers. Modeling serious game that has been chosen to deliver the concept is Edutainment and Simulation Games. This paper will analyze and review the application of the two concepts of the game, using data on the ranking from one of the top application service providers in analytic applications. The game application developers are expected to understand CCI and develop applications concepts that suit the needs of children in Indonesia. This will create market opportunities in the Indonesian game industry in the future.

Author 1: Setia Wirawan
Author 2: Dewi Agushinta R.
Author 3: Faris Fajar Muhammad
Author 4: Lutfi Dwi Saifudin
Author 5: Mustafa Ibrahim

Keywords: Child Computer Interaction; Edutainment; Game application; Simulation Games

PDF

Paper 25: Security Concerns in E-payment and the Law in Jordan

Abstract: Recently communications and information technology became widely used in various aspects of life. The internet becomes the main network for information support. Using of internet enabled public and private organizations to develop its business and expand its activities. Private organizations applied the principles of e-commerce to improve the quality of services which provided to customers. While public sector organizations started to apply the principles of e-government in an effort to increase efficiency and effectiveness and achieve maximum equality among citizens. One of the major challenges raised by widespread use of e-government and e-commerce application is security issues especially e-payment. This paper discusses the present law in Kingdom of Jordan which deal with the problem of frauds and violation of consumers’ rights and privacy when they making e-payment. In addition this paper tries to make comprehensive study on e-payments and the law to decide if there more legislation is needed.

Author 1: Mohammad Atwah Al-ma'aitah

Keywords: E-payment systems; Cyber crime; Web security; Law.

PDF

Paper 26: Identification–Oriented Control Designs with Application to a Wind Turbine Benchmark

Abstract: Wind turbines are complex dynamic systems forced by stochastic wind disturbances, gravitational, centrifugal, and gyroscopic loads. Since their aerodynamics are nonlinear, wind turbine modelling is thus challenging. Therefore, the design of control algorithms for wind turbines must account for these complexities, but without being too complex and unwieldy. Therefore, the main contribution of this study consists of providing two examples of robust and viable control designs with application to a wind turbine simulator. Due to the description of the considered process, extensive simulations of this test case and Monte–Carlo analysis are the tools for assessing experimentally the achieved features of the suggested control schemes, in terms of reliability, robustness, and stability, in the presence of modelling and measurement errors. These developed control methods are finally compared with different approaches designed for the same benchmark, in order to evaluate the properties of the considered control techniques.

Author 1: Silvio Simani
Author 2: Paolo Castaldi

Keywords: control algorithms; fuzzy modelling and control; recursive estimation; adaptive PI controllers; wind turbine model.

PDF

Paper 27: Multimodal Biometric Technology System Framework and E-Commerce in Emerging Markets

Abstract: It is self-evident that the game changer of our modern world – the “internet” has endowed the twenty first century man with enormous potentials and possibilities. Ranging from enhanced capabilities in business (e-business), governance (e-governance), politics, social interaction and information exchange. The internet has indeed shrinked the global distance that once posed a great barrier and limited man’s endeavours in the preceding centuries. Amidst the great advantages derivable from the use of internet for various purposes lie inherent security threats. To a large extent, these security hindrances have been addressed in advanced nations of the world, as a result, internet phenomenon has pervaded all aspects of the advanced nations economy. This is evident in different electronic platforms that are available for the delivery of various products and services. On the contrary, the application of internet in various aspects of commerce has been hampered by the challenges of security limitations due to identity issues in the developing/emerging economies. Due to these security threats, business owners and the general public in less-developed world demonstrate great sense of apathy in the use of available electronic options for the purpose of commerce. Against the backdrop of the above, and the poor infrastructure basis of the developing nations, this research paper analyses and proposes the implementation of multimodal biometric technology frameworks with novel server architecture to tackle the security threats inherent with e-commerce in the developing world.

Author 1: Chike Obed-Emeribe

Keywords: Biometrics; Multimodal; Frameworks; e-commerce; Emerging Markets

PDF

Paper 28: Analysis of MIMO Systems used in planning a 4G-WiMAX Network in Ghana

Abstract: with the increasing demand for mobile data services, Broadband Wireless Access (BWA) is emerging as one of the fastest growing areas within mobile communications. Innovative wireless communication systems, such as WiMAX, are expected to offer highly reliable broadband radio access in order to meet the increasing demands of emerging high speed data and multimedia services. In Ghana, deployment of WiMAX technology has recently begun. Planning these high capacity networks in the presence of multiple interferences in order to achieve the aim of enabling users enjoy cheap and reliable internet services is a critical design issue. This paper has used a deterministic approach for simulating the Bit-Error-Rate (BER) of initial MIMO antenna configurations which were considered in deploying a high capacity 4G-WiMAX network in Ghana. The radiation pattern of the antenna used in the deploying the network has been simulated with Genex-Unet and NEC and results presented. An adaptive 4x4 MIMO antenna configuration with optimally suppressed sidelobes has been suggested for future network deployment since the adaptive 2x2 MIMO antenna configuration, which was used in the initial network deployment provides poor estimates for average BER performance as compared to 4x4 antenna configuration which seem less affected in the presence of multiple interferers.

Author 1: E. T. Tchao
Author 2: K. Diawuo
Author 3: W.K. Ofosu
Author 4: E. Affum

Keywords: WiMAX; Performance; BER; MIMO; Interference

PDF

Paper 29: A Hybrid Model for Secure Data Transfer in Audio Signals using HCNN and DD DWT

Abstract: In today’s world, there are a number of cryptographic and steganography techniques used in order to have secured data transfer between a sender and a receiver. In this paper a new hybrid approach that integrates the merits of cryptography and audio steganography is presented. First, the original message is encrypted using chaotic neural network and the resultant cipher text is embedded into a cover audio using Double Density Discrete Wavelet Transform (DD DWT). The resultant stego audio is transmitted to the receiver and the reverse process is done in order to get back the original plain text. The proposed method presents a Steganography scheme along with the cryptography scheme which enhances the security of the algorithm.

Author 1: B. Geetha vani
Author 2: Prof. E. V. Prasad

Keywords: Cryptography; Hopfield Chaotic Neural Network; Audio Steganography; Double Density Discrete Wavelet Transform.

PDF

Paper 30: Physical Activity Identification using Supervised Machine Learning and based on Pulse Rate

Abstract: Physical activity is one of the key components for elderly in order to be actively ageing. Pulse rate is a convenient physiological parameter to identify elderly’s physical activity since it increases with activity and decreases with rest. However, analysis and classification of pulse rate is often difficult due to personal variation during activity. This paper proposed a Case-Based Reasoning (CBR) approach to identify physical activity of elderly based on pulse rate. The proposed CBR approach has been compared with the two popular classification techniques, i.e. Support Vector Machine (SVM) and Neural Network (NN). The comparison has been conducted through an empirical experimental study where three experiments with 192 pulse rate measurement data are used. The experiment result shows that the proposed CBR approach outperforms the other two methods. Finally, the CBR approach identifies physical activity of elderly 84% accurately based on pulse rate.

Author 1: Mobyen Uddin Ahmed
Author 2: Amy Loutfi

Keywords: Physical activity; Elderly; Pulse rate; Case-based Reasoning (CBR); Support Vector Machine (SVM) and Neural Network (NN)

PDF

Paper 31: Exact Output Rate of Generalized Peres Algorithm for Generating Random Bits from Loaded Dice

Abstract: We report a computation of the exact output rate of recently-discovered generalization of Peres algorithm for generating random bits from loaded dice. Instead of resorting to brute-force computation for all possible inputs, which becomes quickly impractical as the input size increases, we compute the total output length on equiprobable sets of inputs by dynamic programming using a recursive formula.

Author 1: Sung-il Pae

Keywords: Random number generation; Peres algorithm; exact output rate; random bits; loaded dice.

PDF

The Science and Information (SAI) Organization
BACK TO TOP

Computer Science Journal

  • About the Journal
  • Call for Papers
  • Submit Paper
  • Indexing

Our Conferences

  • Computing Conference
  • Intelligent Systems Conference
  • Future Technologies Conference
  • Communication Conference

Help & Support

  • Contact Us
  • About Us
  • Terms and Conditions
  • Privacy Policy

© The Science and Information (SAI) Organization Limited. All rights reserved. Registered in England and Wales. Company Number 8933205. thesai.org