The Science and Information (SAI) Organization
  • Home
  • About Us
  • Journals
  • Conferences
  • Contact Us

Publication Links

  • IJACSA
  • Author Guidelines
  • Publication Policies
  • Digital Archiving Policy
  • Promote your Publication
  • Metadata Harvesting (OAI2)

IJACSA

  • About the Journal
  • Call for Papers
  • Editorial Board
  • Author Guidelines
  • Submit your Paper
  • Current Issue
  • Archives
  • Indexing
  • Fees/ APC
  • Reviewers
  • Apply as a Reviewer

IJARAI

  • About the Journal
  • Archives
  • Indexing & Archiving

Special Issues

  • Home
  • Archives
  • Proposals
  • Guest Editors
  • SUSAI-EE 2025
  • ICONS-BA 2025
  • IoT-BLOCK 2025

Future of Information and Communication Conference (FICC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Computing Conference

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Intelligent Systems Conference (IntelliSys)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Future Technologies Conference (FTC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact
  • Home
  • Call for Papers
  • Editorial Board
  • Guidelines
  • Submit
  • Current Issue
  • Archives
  • Indexing
  • Fees
  • Reviewers
  • Subscribe

IJACSA Volume 6 Issue 7

Copyright Statement: This is an open access publication licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.

View Full Issue

Paper 1: Enhancing CRM Business Intelligence Applications by Web User Experience Model

Abstract: several trends are emerging in the field of CRM technology which promises a brighter future of more profitable customers and decreasing costs. One of the most critical trends is enhancing Business Intelligence applications using Web Technologies, Web technologies can improve the CRM BI implementation, but it still need evaluation, The Web has focused the attention of organizations towards the User Experience and the need to learn about their customer, The UX paradigm calls for enhancing CRMBI by Web technologies. This paper deals with this issue and provide a framework for building Web based CRMBI depending on the Process mapping between CRMBI and UX. It provides a conceptual overview of CRM and its relationship to the main disciplines BI, UX and Web.

Author 1: Natheer K. Gharaibeh

Keywords: CRM; Data warehouse; User Experience; Business intelligence; Web

PDF

Paper 2: Mind-Reading System - A Cutting-Edge Technology

Abstract: In this paper, we describe a human-computer interface (HCI) system that includes an enabler for controlling gadgets based on signal analysis of brain activities transmitted from the enabler to the gadgets. The enabler is insertable in a user’s ear and includes a recorder that records brain signals. A processing unit of the system, which is inserted in a gadget, commands the gadget based on decoding the recorded brain signals. The proposed device and system could facilitate a brain-machine interface to control the gadget from electroencephalography signals in the user’s brain.

Author 1: Farhad Shir

Keywords: Brain-machine interface; Bio-signal computer command; mind-reading device; human-computer interface

PDF

Paper 3: Enrichment of Object Oriented Petri Net and Object Z Aiming at Business Process Optimization

Abstract: Software development process is on the basis of two important steps each of which has to be taken seriously, system requirement analysis and system modeling. There have been many different approaches in the literature that has their own strengths and weaknesses to tackle these two important steps, however, there is none comprehensive approach. Among them, formal methods by using their mathematical supporting background could achieve a precise, clear and in detail requirement analysis. However they were not able to illustrate graphically a system for stakeholders. On the other hand, semi-formal methods owning graphically representation of a system’s behavior make it easy for the stakeholders to perceive thoroughly. In this paper we represent an integration of object Z formal language and a graphically modeling tool hierarchical object oriented petri net. The application of business process was used to be modeled by this intergraded language.

Author 1: Aliasghar Ahmadikatouli
Author 2: Homayoon Motameni

Keywords: Object Z; Hierarchical object oriented Petri net; Formal methods integration; Business process; process improvement; process optimization

PDF

Paper 4: FSL-based Hardware Implementation for Parallel Computation of cDNA Microarray Image Segmentation

Abstract: The present paper proposes a FPGA based hardware implementations for microarray image processing algorithms in order eliminate the shortcomings of the existing software platforms: user intervention, increased computation time and cost. The proposed image processing algorithms exclude user intervention from processing. An application-specific architecture is designed aiming microarray image processing algorithms parallelization in order to speed up computation. Hardware architectures for logarithm based image enhancement, profile computation and image segmentation are described. The methodology to integrate the hardware architecture within a microprocessor system is detailed. The Fast Simplex Link (FSL) bus is used to connect the hardware architecture as speed up co-processor of the microarray image processing system. Timing considerations were presented considering the levels of parallelism that can be achieved by using our proposed hardware architectures. The FPGA technology was chosen for implementation, due to its parallel computation capabilities and ease of reconfiguration.

Author 1: Bogdan Bot
Author 2: Simina Emerich
Author 3: Sorin Martoiu
Author 4: Bogdan Belean

Keywords: microarray; FPGA; image processing; hardware algorithms

PDF

Paper 5: Indexing of Ears using Radial basis Function Neural Network for Personal Identification

Abstract: This paper elaborates a novel method to recognize persons using ear biometrics. We propose a method to index the ears using Radial Basis Function Neural Networks (RBFNN). In order to obtain the invariant features, an ear has been considered as a planar surface of irregular shape. The shape based features like planar area, moment of inertia with respect to minor and major axes, and radii of gyration with respect to minor and major axes are considered. The indexing equation is generated using the weights, centroids and kernel function of the stabilized RBFN network. The so developed indexing equation was tested and validated. The analysis of the equation revealed 95.4% recognition accuracy. The retrieval rate of personal details became faster by an average of 13.8% when the database was organized as per the indices. Further, the three groups elicited by RBFNN were evaluated for parameters like entropy, precision, recall, specificity and F-measure. And all the parameters are found to be excellent in terms of their values and thus showcase the adequacy of the indexing model.

Author 1: M. A. Jayaram
Author 2: Prashanth G.K
Author 3: M.Anusha

Keywords: RBFNN; kernel function; Indexing equation; Moment of inertia; radii of gyration

PDF

Paper 6: Classification of Premature Ventricular Contraction in ECG

Abstract: Cardiac arrhythmia is one of the most important indicators of heart disease. Premature ventricular contractions (PVCs) are a common form of cardiac arrhythmia caused by ectopic heartbeats. The detection of PVCs by means of ECG (electrocardiogram) signals is important for the prediction of possible heart failure. This study focuses on the classification of PVC heartbeats from ECG signals and, in particular, on the performance evaluation of time series approaches to the classification of PVC abnormality. Moreover, the performance effects of several dimension reduction approaches were also tested. Experiments were carried out using well-known machine learning methods, including neural networks, k-nearest neighbour, decision trees, and support vector machines. Findings were expressed in terms of accuracy, sensitivity, specificity, and running time for the MIT-BIH Arrhythmia Database. Among the different classification algorithms, the k-NN algorithm achieved the best classification rate. The results demonstrated that the proposed model exhibited higher accuracy rates than those of other works on this topic. According to the experimental results, the proposed approach achieved classification accuracy, sensitivity, and specificity rates of 99.63%, 99.29% and 99.89%, respectively.

Author 1: Yasin Kaya
Author 2: Hüseyin Pehlivan

Keywords: ECG; arrhythmia; classification; k-NN; PVC

PDF

Paper 7: Signal Reconstruction with Adaptive Multi-Rate Signal Processing Algorithms

Abstract: Multi-rate digital signal processing techniques have been developed in recent years for a wide range of applications, such as speech and image compression, statistical and adaptive signal processing and digital audio. Multi-rate statistical and adaptive signal processing methods provide solution to original signal reconstruction, using observation signals sampled at different rates. In this study, a signal reconstruction process by using the observation signals which are sampled at different sampling rates is presented. The results are compared with the least mean squares (LMS) and the normalized least mean squares (NLMS) methods. As the results indicate, the signal estimation obtained is much more efficient than the previous studies. Designed multi-rate scheme provides significant advantages in terms of error and estimation accuracy.

Author 1: Korhan Cengiz

Keywords: LMS; Multi-Rate Systems; NLMS; Statistical Signal Processing

PDF

Paper 8: Image Edge Detection based on ACO-PSO Algorithm

Abstract: This survey focuses on the problem of parameters selection in image edge detection by ant colony optimization (ACO) algorithm. By introducing particle swarm optimization (PSO) algorithm to optimize parameters in ACO algorithm, the fitness function based on connectivity of image edge is proposed to evaluate the quality of parameters in ACO algorithm. And the ACO-PSO algorithm is applied to image edge detection. The simulation results show that the parameters have been optimized and the proposed ACO-PSO algorithm presents better edges than traditional methods.

Author 1: Chen Tao
Author 2: Sun Xiankun
Author 3: Han Hua
Author 4: You Xiaoming

Keywords: Image edge detection; ant colony optimization; particle swarm optimization; parameter optimization; edge quality evaluation

PDF

Paper 9: Improvement on Classification Models of Multiple Classes through Effectual Processes

Abstract: Classify cases in one of two classes referred to as a binary classification. However, some classification algorithms will allow, of course the use of more than two classes. This research work focuses on improving the results of classification models of multiple classes via some effective techniques. A case study of students’ achievement at Salahadin University is used in this research work. The collected data are pre-processed, cleaned, filtered, normalised, the final data was balanced and randomised, then a combining technique of Naïve Base Classifier and Best First Search algorithms are used to ultimately reduce the number of features in data sets. Finally, a multi-classification task is conducted through some effective classifiers such as K-Nearest Neighbor, Radial Basis Function, and Artificial Neural Network to forecast the students’ performance.

Author 1: Tarik A. Rashid

Keywords: Non-Balanced Data; Feature Selection; Multiple Classification; Machine Learning Techniques; Student Performance Forecasting

PDF

Paper 10: A Modified Clustering Algorithm in WSN

Abstract: Nowadays many applications use Wireless Sensor Networks (WSN) as their fulfill the purpose of collection of data from a particular phenomenon. Their data centric behavior as well as harsh restrictions on energy makes WSN different from many other networks known. During this work the energy management problem of WSN is studied, by using our proposed modified algorithm. It is a clustering algorithm, where nodes are organized in clusters and send their data to a shift selected cluster head. It will provide improvement on energy consumption in terms of member nodes, by making cluster heads static. LEACH already has a good energy saving strategy but our modification will provide an easier approach towards efficiency.

Author 1: Ezmerina Kotobelli
Author 2: Elma Zanaj
Author 3: Mirjeta Alinci
Author 4: Edra Bumçi
Author 5: Mario Banushi

Keywords: energy efficient; algorithm; WSN; clustering; Cluster Head; LEACH

PDF

Paper 11: A Frame Work for Preserving Privacy in Social Media using Generalized Gaussian Mixture Model

Abstract: Social networking sites helps in developing virtual communities for people to share their thoughts, interest activities or to increase their horizon of camaraderie. Social networking sites come under few of the most frequently browsed categories websites in the world. Nevertheless Social Networking sites are also vulnerable to various problems, threats and attacks such as disclosure of information, identity thefts etc. Privacy practice in social networking sites often come into sight, as information sharing stands in conflict with the disclosure-related misuse. Face book is one such most popular and widely used Social Networking sites which have its own robust set of Privacy mechanisms. Yet they are also prone to various privacy issues and attacks. The impulse in this paper lies in proposing a novel approach for improving the privacy among the social networking sites .The article presents the issues by a novel approach based on tagging and a model based technique based on generalized Gaussian Mixture Model.

Author 1: P Anuradha
Author 2: Y.Srinivas
Author 3: MHM Krishna Prasad

Keywords: Privacy; Social Network; Social Relevant Groups; Generalized GMM, Tagging

PDF

Paper 12: Survey on Chatbot Design Techniques in Speech Conversation Systems

Abstract: Human-Computer Speech is gaining momentum as a technique of computer interaction. There has been a recent upsurge in speech based search engines and assistants such as Siri, Google Chrome and Cortana. Natural Language Processing (NLP) techniques such as NLTK for Python can be applied to analyse speech, and intelligent responses can be found by designing an engine to provide appropriate human like responses. This type of programme is called a Chatbot, which is the focus of this study. This paper presents a survey on the techniques used to design Chatbots and a comparison is made between different design techniques from nine carefully selected papers according to the main methods adopted. These papers are representative of the significant improvements in Chatbots in the last decade. The paper discusses the similarities and differences in the techniques and examines in particular the Loebner prize-winning Chatbots.

Author 1: Sameera A. Abdul-Kader
Author 2: Dr. John Woods

Keywords: AIML; Chatbot; Loebner Prize; NLP; NLTK; SQL; Turing Test

PDF

Paper 13: Research on Islanding Detection of Grid-Connected System

Abstract: This paper proposed a modified detection based on the point of common coupling (PCC) voltage in the three-phrase inverter, combined over/under frequency protection, to achieve the detection of islanding states rapidly. Islanding detection is an common issue existing in distributed generation system. Compared with active islanding detection ,this method could detect the islanding quickly and effectively .The simulation and experimental results shows that this new method can detect the islanding phenomenon quickly and accurately, which can meet the requirement of islanding detection standard, which ensure the stability of the system and the power quality recycling to the grid.

Author 1: Liu Zhifeng
Author 2: Zhang Liping
Author 3: Chen Yuchen
Author 4: Jia Chunying

Keywords: islanding detection; self-adaptive; active frequency shift; d-q transform

PDF

Paper 14: Using Induced Fuzzy Bi-Model to Analyze Employee Employer Relationship in an Industry

Abstract: The employee-employer relationship is an intricate one. In an industry, the employers expect to achieve performances in quality and production in order to earn profit, on the other side employees need good pay and all possible allowances and best advantages than any other industry. Our main objective of this paper is to analyze the relationship between employee and employer in workplace and discussed how to maintain a strong employee and employer relationship which can produce the ultimate success of an organization using Induced Fuzzy bi-model called Induced Fuzzy Cognitive Relational Maps (IFCRMs). IFCRMs are a directed special fuzzy digraph modelling approach based on expert's opinion. This is a non statistical approach to study the problems with imprecise information.

Author 1: Dhrubajyoti Ghosh
Author 2: Anita Pal

Keywords: Fuzzy Cognitive Map; Fuzzy Relational Maps; Fuzzy Cognitive Relational Maps; Induced Fuzzy Cognitive Relational Maps; Fuzzy bi-model; employee employer relationship

PDF

Paper 15: Analyzing the Changes in Online Community based on Topic Model and Self-Organizing Map

Abstract: In this paper, we propose a new model for two purposes: (1) discovering communities of users on social networks via topics with the temporal factor and (2) analyzing the changes in interested topics and users in communities in each period of time. This model, we use Kohonen network (Self-Organizing Map) combining with the topic model. After discovering communities, results are shown on output layers of Kohonen. Based on the output layer of Kohonen, we focus on analyzing the changes in interested topics and users in online communities. Experimenting the proposed model with 194 online users and 20 topics. These topics are detected from a set of Vietnamese texts on social networks in the higher education field.

Author 1: Thanh Ho
Author 2: Phuc Do

Keywords: SOM; topic model; interested topics; online users; online community; social networks

PDF

Paper 16: Design of Orthonormal Filter Banks based on Meyer Wavelet

Abstract: A new design method for orthonormal FIR filter banks, which can be constructed using the generalized Meyer wavelet by taking into account the effect of time-shift factor, is proposed in this paper. These generalized Meyer wavelets are proved to be of the same basic properties and the time-frequency localization characteristics as the classical Meyer wavelet, furthermore some performances of the Meyer wavelets are improved by change of time-shift factor, which can better satisfy requirements of constructing orthonormal filter banks. The simulation shows that design of orthonormal filter banks based on the generalized Meyer wavelets with maximal symmetrical index is rational and effective.

Author 1: Teng Xudong
Author 2: Dai Yiqing
Author 3: Lu Xinyuan
Author 4: Liang Jianru

Keywords: Meyer wavelet; Time-shift factor; orthonormal FIR filter banks; Symmetrical Index

PDF

Paper 17: An Integrated Architectural Clock Implemented Memory Design Analysis

Abstract: Recently Low power consumption and Custom Memory design is major issue for embedded designer. Micro wind and Xilinx simulator implements SRAM design architecture and performs efficient simulation. These simulators implements high performances and low power consumption of SRAM design. SRAM efficiency analyzed with 6-T architecture design and row/column based architectural design. We have analyzed clock implemented memory design and simulated with specific application. We have implemented clock based SRAM architecture that improves the internal clock efficiency of SRAM. Architectural Clock implemented memory design reduces the propagation delay and access time. Internal semiconductor material design implemented technique also improves the SRAM data transitions scheme. Semiconductor material and clock implemented design improve simulation performance of SRAM and these design implements for recently developed Application Specific Memory Design Architecture and mobile devices.

Author 1: Ravi Khatwal
Author 2: Manoj Kumar Jain

Keywords: SRAM Architecture; Simulation; Micro wind; Xilinx; Clock Implemented Memory Design; RTL Design

PDF

Paper 18: Using GIS for Retail Location Assessment at Jeddah City

Abstract: GIS software has different useful tools that can be used for sites, demographic and competitive analysis. These tools enable retail and market researchers to find solutions related to many retail planning issues. The aim of this paper is to use Geographical Information Systems (GIS) for retail location assessment of two retail centers called Al-Dawly and Al-Mahmal centers located at Jeddah city, Saudi Arabia. The first part of the paper presents a review about retail centers classification and about GIS applications in retail planning field. The second part of the paper discuss the outputs of the created application which include a- defining retail catchment area, b- building retail demand profile, and c- analyzing retail catchment area. The results of this application can be used by retail planners for evaluating retail centers location and for identifying the extent of retail market

Author 1: Abdulkader A Murad

Keywords: Retail Planning; Retail Catchment Area; GIS; Market Penetration; Drive Time

PDF

Paper 19: Information Management System based on Principles of Adaptability and Personalization

Abstract: Among the most significant values of a business system that contribute to its competitiveness in comparison with others, the leading point and the highest value, second to the human factor, is the information at the company’s disposal, unified in the company’s know how. Unfortunately, the sole awareness of the importance and significance of information is mostly not enough. It is for this reason that this resource is unfairly neglected and is insufficiently used. What results from this situation is that information is mostly unavailable and insufficiently protected. This paper will show one of the possible models of systems for managing information based on principles of adaptability and personalization which aims towards adequate, fast, efficient and secure access to protected information in the company. The subject of this manuscript is to explore the possibilities of modern information and communication technology application in developing information management system based on principles of adaptability and personalization. The main part of this system is the portal for intelligent document management. The solution proposed in the dissertation is based on integration and implementation of services for adaptation in modern document management systems.

Author 1: Dragan Ðokic
Author 2: Dragana Šarac
Author 3: Dragana Becejski Vujaklija

Keywords: adaptability; personalization; management information system; business process optimization; collaboration; portals; web services; digital identities; electronic document management

PDF

Paper 20: Assessment of High and Low Rate Protocol-based Attacks on Ethernet Networks

Abstract: The Internet and Web have significantly transformed the world’s communication system. The capability of the Internet to instantly access information at anytime from anywhere has brought benefit for a wide variety of areas including business, government, education, institutions, medical, and entertainment services. However, the Internet has also opened up the possibilities for hackers to exploit flaws and limitations in the target networks to attack and break in without gaining physical access to the target systems. The OSI layer protocol-based attacks are among them. In this work we investigate feasibility as well as severity of the attacks against three common layering protocols including TCP, UDP, and ICMP on Ethernet-based networks in the real world through a testbed. Then a simulation environment is designed to implement the exact same attacks under similar conditions using NS2 network simulator. The testbed results and simulation results are compared with each other to explore the accuracy of the findings and measure the damages the attacks caused to the network.

Author 1: Mina Malekzadeh
Author 2: M.A. Beiruti
Author 3: M.H. Shahrokh Abadi

Keywords: protocol attacks; OSI layer attacks; UDP attacks; TCP attacks; ICMP attacks

PDF

Paper 21: A Survey of Emergency Preparedness

Abstract: Emergency preparedness is a discipline that harnesses technology, citizens, and government agencies to handle and potentially avoid natural disasters and emergencies. In this paper, a survey of the use of information technology, including social media, in emergency preparedness is presented. In addition, the current direction of research is identified, and future trends are forecasted that will lead to more effective and efficient methods of preparing for and responding to disasters.

Author 1: Aaron Malveaux
Author 2: A. Nicki Washington

Keywords: emergency preparedness; natural disasters; emergencies

PDF

Paper 22: Integrating Service Design and Eye Tracking Insight for Designing Smart TV User Interfaces

Abstract: This research proposes a process that integrate service design method and eye tracking insight for designing a Smart TV user interface. The Service Design method, which is utilized for leading the combination of the quality function deployment (QFD) and the analytic hierarchy process (AHP), is used to analyze the features of three Smart TV user interface design mockups. Scientific evidences, which include the effectiveness and efficiency testing data obtained from eye tracking experiments with six participants, are provided the information for analysing the affordance of these design mockups. The results of this research demonstrate a comprehensive methodology that can be used iteratively for redesigning, redefining and evaluating of Smart TV user interfaces. It can also help to make the design of Smart TV user interfaces relate to users' behaviors and needs. So that to improve the affordance of design. Future studies may analyse the data that are derived from eye tracking experiments to improve our understanding of the spatial relationship between designed elements in a Smart TV user interface.

Author 1: Sheng-Ming Wang

Keywords: Smart TV; User Interface Design; Eye Tracking; Design Affordance; Service Design

PDF

Paper 23: Investigating on Mobile Ad-Hoc Network to Transfer FTP Application

Abstract: Mobile Ad-hoc Network (MANET) is the collection of mobile nodes without requiring of any infrastructure. Mobile nodes in MANET are operating as a router and MANET network topology can change quickly. Due to nodes in the network are mobile and thus can move randomly and organize arbitrarily regardless of the directions that generate great complexity in routing traffic from source to destination. To communicate with other nodes MANET nodes contain multiple applications and it needs the different level of data traffic. While data communicate different routing protocols require whereas every node must act as a router. Nowadays, different routing protocols have available for MANET. MANET protocols designed and implemented at the network layer have vital roles that affect the application running at the application layer. In this paper, the performance of On Demand Distance Vector (AODV), Dynamic Source Routing (DSR) and Geographic Routing Protocol (GRP) will be evaluated. The main purpose of this research is to analyze the performance of MANET routing protocols to identify “Which routing protocol has ability to provide the best performance to transfer FTP Application in high mobility case under low, medium and high density scenario?”. The performance analyze with respect to Average End-to-End Delay, Media Access Delay, Network Load, Retransmission Attempt and Throughput. All simulations have been done using OPNET. On the basis of results show that the GRP gives better performance in End-to-End Delay, Media Access Delay, and Retransmission Attempt when varying network size and provide the best Throughput in small and medium network size. Simulation results verify that AODV gives better Throughput in a large network and lower Network Load in small and medium network size compared to GRP. DSR produces low Average Network load as compared to other protocols. The overall study of the FTP application shows that the performance of theses routing protocols differences by varying number of nodes and node speed. This paper results will produce enough information to identify the best routing protocol for MANET to transfer FTP application.

Author 1: Ako Muhammad Abdullah

Keywords: MANET; AODV; DSR; GRP; FTP Application

PDF

Paper 24: Load Balancing for Improved Quality of Service in the Cloud

Abstract: Due to the advancement in technology and the growth of human society, it is necessary to work in an environment that reduces costs, resource-efficient, reduces man power and minimizes the use of space. This led to the emergence of cloud computing technology. Load balancing is one of the central issues in the cloud, it is the process of distributing the load and optimally balanced between different servers. ; Balanced load in the Cloud improves the performance of the QoS parameters such as resource utilization, response time, processing time, scalability, throughput, system stability and power consumption. Research in this area has led to the development of algorithms called load balancing algorithms. In this paper, we present the performance analysis of different load balancing algorithms based on different metrics such like response time, processing time, etc.... The main purpose of this article is to help us to propose a new algorithm by studying the behavior of the various existing algorithms.

Author 1: AMAL ZAOUCH
Author 2: FAOUZIA BENABBOU

Keywords: Cloud Computing; Load Balancing; Cluster; Virtual Machines; Quality of Service

PDF

Paper 25: An Improved Brain Mr Image Segmentation using Truncated Skew Gaussian Mixture

Abstract: A novel approach for segmenting the MRI brain image based on Finite Truncated Skew Gaussian Mixture Model using Fuzzy C-Means algorithm is proposed. The methodology is presented evaluated on bench mark images. The obtained results are compared with various other techniques and the performance evaluation is performed using Image quality metrics and Segmentation metrics.

Author 1: Nagesh Vadaparthi
Author 2: Srinivas Yerramalle
Author 3: Suresh Varma Penumatsa

Keywords: Truncated Skew Gaussian Mixture model; Segmentation; Image quality metrics; Segmentation metrics; Fuzzy C-Means clustering

PDF

Paper 26: Research on the UHF RFID Channel Coding Technology based on Simulink

Abstract: In this letter, we propose a new UHF RFID channel coding method, which improves the reliability of the system by using the excellent error correcting performance of the convolutional code. We introduce the coding principle of convolutional code, and compare with the cyclic codes used in the past. Finally, we analyze the error correcting performance of convolutional codes. The analysis results show that the results show that the transmission rate of the system is guaranteed, and the bit error rate can be reduced by 2.561%.

Author 1: Changzhi Wang
Author 2: Zhicai Shi
Author 3: Dai Jian
Author 4: Li Meng

Keywords: UHF RFID; channel coding; convolution code; bit error rate

PDF

Paper 27: Artificial Intelligence in Performance Analysis of Load Frequency Control in Thermal-Wind-Hydro Power Systems

Abstract: In this article, Load Frequency Control (LFC) of three area unequal interconnected thermal, wind and Hydro power generating units has been developed with Proportional-Integral (PI) controller under MATLAB/SIMULINK environment. Further, the PI controller gains values that optimized using trial and error method with two different objective functions, namely the Integral Time Square Error (ITSE) and the Integral Time Absolute Error (ITAE). The performance of ITAE objective function based PI controller is compared with the ITSE objective function optimized PI controller. Analysis reveals that the ITSE optimized controller gives more superior performance than ITAE based controller during one percent Step Load Perturbation (1% SLP) in area 1 (thermal area). In addition, Proportional–Integral –Derivative (PID) controller is employed to improve the same power system performance. The controller gain values are optimized using Artificial Intelligence technique based Ant Colony Optimization (ACO) algorithm. The simulation performance compares the ACO-PID controller to the conventional PI. The results proved that the proposed optimization technique based the ACO-PID controller provides a superior control performance compared to the PI controller. As the system using the ACO-PID controller yield minimum overshoot, undershoot and settling time compared to the conventional PI controlled equipped system performance.

Author 1: K. Jagatheesan
Author 2: B. Anand
Author 3: Nilanjan Dey
Author 4: Amira S. Ashour

Keywords: Cost curve; Interconnected Power system; Load Frequency Control (LFC); Objective Function; Performance Index; Proportional-Integral controller

PDF

Paper 28: New 2-D Adaptive K-Best Sphere Detection for Relay Nodes

Abstract: Relay nodes are the main players of cooperative networks that used to improve the system performance and to offer virtual multiple antennas for limited antenna devices in a multi-user environment. However, employing relaying strategies requires considerable resources at the relay side and places a large burden on the relay helping node especially when considering the power consumption. Partial detection at the relay is one strategy that reduces the computational load and power consumption. In this paper, we propose a new 2-D Adaptive K-Best Sphere Decoder (2-D AKBSD) for partial detection to be used MISO relays in cooperative networks. Simulation results show that 2-D AKBSD is capable of improving the system performance and also reduces its complexity.

Author 1: Ahmad El-Banna

Keywords: Sphere Detection; K-Best; Relay; MIMO; MISO; Cooperative Communication

PDF

Paper 29: Geographic Routing Using Logical Levels in Wireless Sensor Networks for Sensor Mobility

Abstract: In this paper we propose an improvement to the GRPW algorithm for wireless sensor networks called GRPW-M , which collects data in a wireless sensor network (WSN) using a mobile nodes. Performance of GRPW algorithm algorithm depends heavily on the immobile sensor nodes . This prediction can be hard to do. For that reason, we propose a modified algorithm that is able to adapt to the current situation in the network in which the sensor node considered mobile. The goal of the proposed algorithm is to decrease the reconstruction cost and increase the data delivery ratio. In comparing the GRPW-M protocol with GRPW protocol in simulation, this paper demonstrates that adjustment process executed by GRPW-M does in fact decrease the reconstruction cost and increase the data delivery ratio . Simulations were performed on GRPW as well as on the proposed Routing algorithm. The efficiency factors that were evaluated was total number of transmissions in the network and total delivery rate. And in general the proposed Routing algorithm may perform reasonable well for a large number network setups.

Author 1: Yassine SABRI
Author 2: Najib EL KAMOUN

Keywords: WSN ; Routing ; Ad hoc ; Localization ; Scalability

PDF

Paper 30: Cost-Effective, Cognitive Undersea Network for Timely and Reliable Near-Field Tsunami Warning

Abstract: The focus of this paper is on developing an early detection and warning system for near-field tsunami to mitigate its impact on communities at risk. This a challenging task, given the stringent reliability and timeliness requirements, the development of such an infrastructure entails. To address this challenge, we propose a hybrid infrastructure, which combines cheap but unreliable undersea sensors with expensive but highly reliable fiber optic, to meet the stringent constraints of this warning system. The derivation of a low-cost tsunami detection and warning infrastructure is cast as an optimization problem, and a heuristic approach is used to determine the minimum cost network configuration that meets the targeted reliability and timeliness requirements. To capture the intrinsic properties of the environment and model accurately the main characteristics of the sound wave propagation undersea, the proposed optimization framework incorporates the Bellhop propagation model and accounts for significant environment factors, including noise, varying undersea sound speed and sea floor profile. We apply our approach to a region which is prone to near-field tsunami threats to derive a cost-effective under sea infrastructure for detection and warning. For this case study, the results derived from the proposed framework show that a feasible infrastructure, which operates with a carrier frequency of 12-KHz, can be deployed in calm, moderate and severe environments and meet the stringent reliability and timeliness constraints, namely 20 minutes warning time and 99 % data communication reliability, required to mitigate the impact of a near-field tsunami. The proposed framework provides useful insights and guidelines toward the development of a realistic detection and warning system for near-field tsunami.

Author 1: X. Xerandy
Author 2: Taieb Znati
Author 3: Louise K Comfort

Keywords: near field tsunami, undersea, sensor, fiber optic, detection, optimization, cost, reliable, timeliness

PDF

Paper 31: Exploiting SCADA vulnerabilities using a Human Interface Device

Abstract: SCADA (Supervisory Control and Data Acquisition) systems are used to control and monitor critical national infras-tructure functions like electricity, gas, water and railways. Field devices such as PLC’s (Programmable Logic Controllers) are one of the most critical components of a control system. Cyber-attacks usually target valuable infrastructures assets, taking advantage of architectural/technical vulnerabilities or even weaknesses in the defense systems. Even though novel intrusion detection systems are being implemented and used for defending cyber-attacks, certain vulnerabilities of SCADA systems can still be exploited. In this article we present an attack scenario based on a Human Interface Device (HID) device which is used as a means of communication/exploitation tool to compromise SCADA systems. The attack, which is a normal series of commands that are sent from the HID to the PLC cannot be detected through current intrusion detection mechanisms. Finaly we provide possible counter measures and defense mechanisms against this kind of cyber attacks.

Author 1: Grigoris Tzokatziou
Author 2: Helge Janicke
Author 3: Leandros A. Maglaras
Author 4: Ying He

Keywords: SCADA; Cyber Security; HID; PLC

PDF

Paper 32: Image Mining: Review and New Challenges

Abstract: Besides new technology, a huge volume of data in various form has been available for people. Image data represents a keystone of many research areas including medicine, forensic criminology, robotics and industrial automation, meteorology and geography as well as education. Therefore, obtaining specific in-formation from image databases has become of great importance. Images as a special category of data differ from text data as in terms of their nature so in terms of storing and retrieving. Image Mining as a research field is an interdisciplinary area combining methodologies and knowledge of many branches including data mining, computer vision, image processing, image retrieval, statis-tics, recognition, machine learning, artificial intelligence etc. This review focuses researching the current image mining approaches and techniques aiming at widening the possibilities of facial image analysis. This paper aims at reviewing the current state of the IM as well as at describing challenges and identifying directions of the future research in the field.

Author 1: Barbora Zahradnikova
Author 2: Sona Duchovicova
Author 3: Peter Schreiber

Keywords: image mining; image classification; indexing; image retrieval;

PDF

The Science and Information (SAI) Organization
BACK TO TOP

Computer Science Journal

  • About the Journal
  • Call for Papers
  • Submit Paper
  • Indexing

Our Conferences

  • Computing Conference
  • Intelligent Systems Conference
  • Future Technologies Conference
  • Communication Conference

Help & Support

  • Contact Us
  • About Us
  • Terms and Conditions
  • Privacy Policy

© The Science and Information (SAI) Organization Limited. All rights reserved. Registered in England and Wales. Company Number 8933205. thesai.org