The Science and Information (SAI) Organization
  • Home
  • About Us
  • Journals
  • Conferences
  • Contact Us

Publication Links

  • IJACSA
  • Author Guidelines
  • Publication Policies
  • Digital Archiving Policy
  • Promote your Publication
  • Metadata Harvesting (OAI2)

IJACSA

  • About the Journal
  • Call for Papers
  • Editorial Board
  • Author Guidelines
  • Submit your Paper
  • Current Issue
  • Archives
  • Indexing
  • Fees/ APC
  • Reviewers
  • Apply as a Reviewer

IJARAI

  • About the Journal
  • Archives
  • Indexing & Archiving

Special Issues

  • Home
  • Archives
  • Proposals
  • Guest Editors
  • SUSAI-EE 2025
  • ICONS-BA 2025
  • IoT-BLOCK 2025

Future of Information and Communication Conference (FICC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Computing Conference

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Intelligent Systems Conference (IntelliSys)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Future Technologies Conference (FTC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact
  • Home
  • Call for Papers
  • Editorial Board
  • Guidelines
  • Submit
  • Current Issue
  • Archives
  • Indexing
  • Fees
  • Reviewers
  • Subscribe

IJACSA Volume 2 Issue 8

Copyright Statement: This is an open access publication licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.

View Full Issue

Paper 1: MCMC Particle Filter Using New Data Association Technique with Viterbi Filtered Gate Method for Multi-Target Tracking in Heavy Clutter

Abstract: Improving data association technique in dense clutter environment for multi-target tracking used in Markov chain Monte Carlo based particle filter (MCMC-PF) are discussed in this paper. A new method named Viterbi filtered gate Markov chain Monte Carlo VFG-MCMC is introduced to avoid track swap and to overcome the issue of loosing track to highly maneuvering targets in the presence of more background clutter and false signals. An adaptive search based on Viterbi algorithm is then used to detect the valid filtered data point in each target gate. The detected valid point for each target is applied to the estimation algorithm of MCMC-PF during calculating the sampling weights. This proposed method makes the MCMC interacts only with the valid target that is candidate from the filtered gate and no more calculations are considered for invalid targets. Simulation results demonstrate the effectiveness and better performance when compared to conventional algorithm MCMC-PF.

Author 1: E M Saad
Author 2: El. Bardawiny
Author 3: H.I.ALI
Author 4: N.M.Shawky

Keywords: data association; multi-target tracking; particle filter ;Viterbi algorithm ; Markov chain Monte Carlo; filtering

PDF

Paper 2: Security Provisions in Stream Ciphers Through Self Shrinking and Alternating Step Generator

Abstract: in cryptography stream ciphers used to encrypt plain text data bits one by one. The security of stream ciphers depend upon randomness of key stream, good linear span and low probability of finding the initial states of pseudorandom generators. In this paper we propose a new stream cipher model use Feed back with carry shift registers (FCSRs) as building blocks which are considered as a source of long pseudorandom generator. Proposed model is the combined structure of alternating step generator and self shrinking generators which are commonly used stream ciphers generators. In this research we compare proposed generator against self shrinking generator (SSG), Alternating step generator (ASG) and alternating step self shrinking generator (ASSG) and we concludes that proposed generator architecture is best for encryption because it satisfies all necessary conditions of a good Stream cipher.

Author 1: Hafsa Rafiq
Author 2: Malik Sikandar Hayat Kiyal
Author 3: Aihab Khan

Keywords: component; Alternating step generators , Feed back with carry shift registers, Self shrinking generators.

PDF

Paper 4: XML Based Representation of DFD

Abstract: In the world of Information Technology, the working of a information system is well explained with the use of Data Flow Diagrams (DFD). DFDs are one of the three essential perspectives of the Structured Systems Analysis and Design Method (SSADM). [3]The sponsor of a project and the end users are briefed and consulted throughout all stages of a system's evolution. With a data flow diagram, users are able to visualize how the system will operate, what the system will accomplish, and how the system will be implemented. But, various practical problems exist with the representation of DFDs. Different tools are available in the market for representing the DFDs. These tools are user friendly and based on the object oriented features. The diagrams drawn using these tools can be sent over the network for communicating with others. On the other hand, the XML is platform independent, textual information and is totally extensible. XML is structured and is an excellent way to transfer the information along with the metadata over the network. XML can be used to transfer the information related to DFDs, there by removing the problems related to understanding the diagrammatic notations and concentrating more on the information flow in the system. This paper is aimed at understanding the problems related to DFDs and representing it in XML[4] format for their storage and communication over the network. The discussion is divided into four main topics – introduction to XML and DFD, problems related to DFD, an XML representation for DFDs and finally the conclusion.

Author 1: Swapna Salil Kolhatkar

Keywords: data flow diagrams; XML; metadata; diagramming tools.

PDF

Paper 5: Some Modification in ID-Based Public key Cryptosystem using IFP and DDLP

Abstract: In 1984, Shamir [1] introduced the concept of an identity-based cryptosystem. In this system, each user needs to visit a key authentication center (KAC) and identify him self before joining a communication network. Once a user is accepted, the KAC will provide him with a secret key. In this way, if a user wants to communicate with others, he only needs to know the “identity” of his communication partner and the public key of the KAC. There is no public file required in this system. However, Shamir did not succeed in constructing an identity based cryptosystem, but only in constructing an identity-based signature scheme. Meshram and Agrawal [5] have proposed an id - based cryptosystem based on integer factoring and double discrete logarithm problem which uses the public key cryptosystem based on integer factoring and double discrete logarithm problem. In this paper, we propose the modification in an id based cryptosystem based on the integer factoring and double discrete logarithm problem and we consider the security against a conspiracy of some entities in the proposed system and show the possibility of establishing a more secure system.

Author 1: Chandrashekhar Meshram
Author 2: S.A. Meshram

Keywords: Public key Cryptosystem, Identity based Cryptosystem, Discrete Logarithm Problem (DLP), Double Discrete Logarithm Problem (DDLP), and Integer Factorization Problem (IFP).

PDF

Paper 6: Simulation of Spectral Subtraction Based Noise Reduction Method

Abstract: Noise reduction is a very meaningful but difficult task and it has been a subject of intense research in recent years. This paper introduces two popular noise reduction techniques and presents our simulation result of a noise reduction system. It is shown that the system reduces the noise almost completely while keeps the enhanced speech signal very similar to the original speech signal.

Author 1: Zhixin Chen

Keywords: Embedded Systems; Digital Signal Processing; Noise Reduction.

PDF

Paper 7: IMPLEMENTATION OF NODE ENERGY BASED ON ENCRYPTION KEYING

Abstract: This paper deals with Designing cost-efficient, secure network protocols for any Networks is a challenging problem because node in a network itself is resource-limited. Since the communication cost is the most dominant factor in any network, we introduce an energy-efficient Node Energy-Based Encryption and Keying (NEBEK) scheme that significantly reduces the number of transmissions needed for rekeying to avoid stale keys. NEBEK is a secure communication framework where sensed data is encoded using a scheme based on a permutation code generated via the RC4 encryption mechanism. The key to the RC4 encryption mechanism dynamically changes as a function of the residual energy of the node. Thus, a one-time dynamic key is employed for one packet only and different keys are used for the successive packets of the stream. The intermediate nodes along the path to the sink are able to verify the authenticity and integrity of the incoming packets using a predicted value of the key generated by the sender’s virtual energy, thus requiring no need for specific reeking messages. NEBEK is able to efficiently detect and filter false data injected into the network by malicious outsiders. We have evaluated NEBEK’s feasibility and performance analytically and through software simulations. Our results show that NEBEK, without incurring transmission overhead (increasing packet size or sending control messages for rekeying), is able to eliminate malicious data from the network in an energy efficient manner.

Author 1: S Bhargavi
Author 2: Ranjitha B.T

Keywords: NEBEK; Network; protocol; communication; RC4 encryption; dynamic key; virtual energy; Statistical mode; Operational mode; Forwarding Node Packets.

PDF

Paper 8: Barriers in Adoption of Health Information Technology in Developing Societies

Abstract: This paper develops the conceptual framework of barriers faced by the decision makers and management personnel of health sector. The main theme of this paper is to give a clear understanding about the adaption barriers of health technology faced by developing societies. The information about barriers would be useful for policy makers to decide about the particular technology. So that they can fulfill the defined mission of their organizations. Developing a conceptual framework is the first step in building organizational capacity. Information technology in health sector is spreading globally. Use of health information technology is offering evidence-based practice to endorse health and human prosperity. Globalization of health information system is inevitable for establishment and promotion of healthcare sector in developing societies. Present health systems in developing societies are inadequate to meet the needs of the population. Health sector of developing societies is facing a lot of barriers in establishment and promotion of health information system. These barriers include lack of infrastructure, cost, technical sophistications, lack of skilled human resources and lack of e- readiness of medical professionals. In this paper authors conducted a survey of hospitals in Pakistan to identify and categorized adaption barriers in health information technology. Existing health system should be transformed by using HIT to improve health status of population by eliminating barriers identified in this paper.

Author 1: Fozia Anwar
Author 2: Azra Shamim

Keywords: component; Health Technolog; Health Information System; Barrier in e- Health.

PDF

Paper 9: Implementation of Locally Weighted Projection Regression Network for Concurrency Control In Computer Aided Design

Abstract: This paper presents implementation of locally weighted projection regression (LWPR) network method for concurrency control while developing dial of a fork using Autodesk inventor 2008. The LWPR learns the objects and the type of transactions to be done based on which node in the output layer of the network exceeds a threshold value. Learning stops once all the objects are exposed to LWPR. During testing performance, metrics are analyzed. We have attempted to use LWPR for storing lock information when multi users are working on computer Aided Design (CAD). The memory requirements of the proposed method are minimal in processing locks during transaction.

Author 1: A Muthukumaravel
Author 2: Dr.S.Purushothaman
Author 3: Dr.A.Jothi

Keywords: Concurrency Control, locally weighted projection regression, Transaction Locks, Time Stamping.

PDF

Paper 10: Transforming Higher educational institution administration through ICT

Abstract: The rapid development in Indian higher education sector has increased the focus on reforms in higher educational institution administration. Efficiency and accountability have become important elements, and the integration of Information and Communication Technology (ICT) into the educational administration process has become a necessity. The objective of this study is to know the current extent of ICT integration in Indian higher education institutions. The factors contributing to the successful integration of ICT into higher education administration (i.e., Knowledge administration and Information administration which constitute e-administration) are also discussed.

Author 1: J Meenakumari
Author 2: Dr. R. Krishnaveni

Keywords: Higher education, Information and Communication Technology, Integration, Knowledge administration, Information administration, e-administration.

PDF

Paper 11: Enhanced Architecture of a Web Warehouse based on Quality Evaluation Framework to Incorporate Quality Aspects in Web Warehouse Creation

Abstract: In the recent years, it has been observed that World Wide Web (www) became a vast source of information explosion about all areas of interest. Relevant information retrieval is difficult from the web space as there is no universal configuration and organization of the web data. Taking the advantage of data warehouse functionality and integrating it with the web to retrieve relevant data is the core concept of web warehouse. It is a repository that store relevant web data for business decision making. The basic function of web warehouse is to collect and store the information for analysis of users. The quality of web warehouse data affects a lot on data analysis. To enhance the quality of decision making different quality dimensions must be incorporated in web warehouse architecture. In this paper enhanced web warehouse architecture is proposed and discussed. The enhancement in the existing architecture is based on the quality evaluation framework. The enhanced architecture adds three layers in existing architecture to insure quality at various phases of web warehouse system creation. The source assessment, query evaluation and data quality layers enhance the quality of data store in web warehouse.

Author 1: Umm-e Mariya Shah
Author 2: Azra Shamim
Author 3: Madiha Kazmi

Keywords: component; Data Warehouse; Web Warehouse; Quality Assessment, Quality Evaluation Framework; Enhanced Web Warehouse Architecture; WWW

PDF

Paper 12: DETECTION OF RELIABLE SOFTWARE USING SPRT

Abstract: In Classical Hypothesis testing volumes of data is to be collected and then the conclusions are drawn which may take more time. But, Sequential Analysis of statistical science could be adopted in order to decide upon the reliable / unreliable of the developed software very quickly. The procedure adopted for this is, Sequential Probability Ratio Test (SPRT). In the present paper, we have proposed the performance of SPRT on Time domain data using exponential imperfect debugging model and analyzed the results by applying on 5 data sets. The parameters are estimated by using Maximum Likelihood Estimation.

Author 1: R Satya Prasad
Author 2: N. Supriya
Author 3: G.Krishna Mohan

Keywords: Exponential imperfect debugging; SequentialProbability Ratio Test; Maximum Likelihood Estimation; Decision lines; Software Reliability; Software failure data.

PDF

Paper 13: Design of an Intelligent Combat Robot for war fields

Abstract: The objective of this paper is to minimize human casualties in terrorist attack such as 26/11. The combat robot [1] has been designed to tackle such a cruel terror attacks. This robot is radio operated, self- powered, and has all the controls like a normal car. A wireless camera has been installed on it, so that it can monitor enemy remotely when required. It can silently enter into enemy area and send us all the information through its’ tiny Camera eyes. This spy robot can be used in star hotels, shopping malls, jewellary show rooms, etc where there can be threat from intruders or terrorists. Since human life is always precious, these robots are the replacement of fighters against terrorist in war areas.

Author 1: S Bhargavi
Author 2: S.Manjunath

Keywords: Combat Robot; Wireless camer; Terror attack; Radio Operated; Self-Powered; Intruders

PDF

Paper 14: Analysis of Guess and Determined Attack on Non Linear Modified SNOW 2.0 Using One LFSR

Abstract: stream ciphers encrypt the data bit by bit. In this research a new model of stream cipher SNOW 2.0 has been proposed i.e. Non linear modified SNOW 2.0 using one Linear Feedback Shift Register (LFSR) with the embedding of non linear function in the model. The analysis of Guess and Determined (GD) attack has been done to check its security with respect to previous versions. The proposed model contains one Linear Feedback Shift Register (LFSR) along with the non linear function which increases the strength of the stream cipher, to make the static nature of modified SNOW 2.0 dynamic. The Experimental analysis show that such a mechanism has been built which provides more security than the previous version of modified SNOW 2.0 in which non linearity was either not introduced or it was introduced using two Linear Feedback Shift Registers (LFSRs). It is concluded that this version is more powerful with respect to the security of plain text against Guess and Determined attack (GD) as compared to the previous versions.

Author 1: Madiha Waris
Author 2: Malik Sikandar Hayat Khiyal
Author 3: Aihab Khan

Keywords: component; Linear Feedback Shift Register , Guess and Determined Attack, Finite State Machine.

PDF

Paper 15: Identification Problem of Source Term of A Reaction Diffusion Equation

Abstract: This paper will give the numerical difference scheme with Dirichlet boundary condition, and prove stability and convergence of the difference scheme, final numerical experiment results also confirm effectiveness of the algorithm.

Author 1: Bo Zhang

Keywords: Fractional derivative; Numerical difference scheme; The gradient regularization method.

PDF

Paper 16: e-Government Ethics : a Synergy of Computer Ethics, Information Ethics, and Cyber Ethics

Abstract: Ethics has become an important part in the interaction among humans being. This paper specifically discusses applied ethics as one type of ethics. There are three applied ethics that will be reviewed in this paper, i.e. computer ethics, information ethics, and cyber ethics. There are two aspects of the three applied ethics that were reviewed, i.e. their definition and the issues associated with them. The reviewing results of the three applied ethics are then used for defining e-Government ethics and formulating the issues of e-Government ethics. The e-Government ethics position, based on the previous three applied ethics, is also described in this paper. Computer ethics, information ethics and cyber ethics are considered as the foundations of e-Government ethics and several others applied ethics could enrich the e-Government ethics.

Author 1: Arief Ramadhan
Author 2: Dana Indra Sensuse
Author 3: Aniati Murni Arymurthy

Keywords: e-Government; Ethics; Applied Ethics; Computer Ethics; Information Ethics; Cyber Ethics

PDF

Paper 17: CO2 Concentration Change Detection in Time and Space Domains by Means of Wavelet Analysis of MRA: Multi-Resolution Analysis

Abstract: A method for change detection in time and space domains based on wavelet MRA: Multi-Resolution Analysis is proposed. Measuring stations for carbon dioxide concentration are sparsely situated. Also the measuring stations monitor the carbon dioxide concentration in an irregular basis so that some interpolation techniques are required for creation of carbon dioxide concentration with a regular interval in both time and space domains. After all, time and space of MRA is applied to the interpolated carbon dioxide concentration then reconstruction is done without low frequency of LLL component. Thus relatively large change locations and time periods are detected. Through an experiment with 11 years of carbon dioxide concentration data starting from 1990 provided by WDCGG: World Data Center for Greenhouse Gasses, it is found that there exists seasonal change and relatively large changes are occurred in El Nino years. It is also found that the carbon dioxide is concentrated in European continent.

Author 1: Kohei Arai

Keywords: wavelet analysis; carbon di-oxide distribution; change detection.

PDF

Paper 18: Bidirectional WDM-Radio over Fiber System with Sub Carrier Multiplexing Using a Reflective SOA and Cyclic AWGs

Abstract: A bidirectional SCM-WDM RoF network using a reflective semiconductor optical amplifier (RSOA) and cyclic arrayed waveguide gratings (AWGs) was proposed and demonstrated. The purposed RoF network utilizes Sub Carrier Multiplexed (SCM) signals for down-link and an on-off keying (OOK) signals re-modulated for up-link. In this paper, A 50 km range colorless WDM-ROF was demonstrated for both 1 Gbit/s downstream and upstream signals. The BER performance of our scheme shows that our scheme is a practical solution to meet the data rate and cost-efficient of the optical links simultaneously in tomorrow’s ROF access networks.

Author 1: Fady I El-Nahal

Keywords: Radio over Fiber (RoF), wavelength-division multiplexing (WDM), Sub-carrier modulation (SCM), arrayed waveguide grating (AWG).

PDF

Paper 19: AODV Robust (AODVR): An Analytic Approach to Shield Ad-hoc Networks from Black Holes

Abstract: Mobile ad-hoc networks are vulnerable to several types of malicious routing attacks, black hole is one of those, where a malicious node advertise to have the shortest path to all other nodes in the network by the means of sending fake routing reply. As a result the destinations are deprived of desired information. In this paper, we propose a method AODV Robust (AODVR) a revision to the AODV routing protocol, in which black hole is perceived as soon as they emerged and other nodes are alerted to prevent the network of such malicious threats thereby isolating the black hole. In AODVR method, the routers formulate the range of acceptable sequence numbers and define a threshold. If a node exceeds the threshold several times then it is black listed thereby increasing the network robustness.

Author 1: Mohammad Abu Obaida
Author 2: Shahnewaz Ahmed Faisal
Author 3: Md. Abu Horaira
Author 4: Tanay Kumar Roy

Keywords: Ad-hoc Networks; Wireless Networks; MANET; RT; AODV; Ad-hoc Optimal Distance Vector; Black-hole; OPNET.

PDF

Paper 20: Control Systems application in Java based Enterprise and Cloud Environments – A Survey

Abstract: The classical feedback control systems has been a successful theory in many engineering applications like electrical power, process, and manufacturing industries. For more than a decade there is active research in exploring feedback control systems applications in computing and some of the results are applied to the commercial software products. There are good number of research review papers on this subject exist, giving high level overview, explaining specific applications like load balancing or CPU utilization power management in data centers. We observe that majority of the control system applications are in Web and Application Server environments. We attempt to discuss on how control systems is applied to Web and Application(JEE) Servers that are deployed in Enterprise and cloud environments. Our paper presents this review with a specific emphasis on Java based Web, Application and Enterprise Server Bus environments. We conclude with the future reserach in applying control systems to Enterprise and Cloud environments.

Author 1: Ravi Kumar Gullapalli
Author 2: Dr. Chelliah Muthusamy
Author 3: Dr.A.Vinaya Babu

Keywords: Control Systems, Java, Web Servers, Application Servers, Web Services, Enterprise Service Bus

PDF

Paper 21: Multimodal Optimization using Self-Adaptive Real Coded Genetic Algorithm with K-means & Fuzzy C-means Clustering

Abstract: Many engineering optimization tasks involve finding more than one optimum solution. These problems are considered as Multimodal Function Optimization Problems. Genetic Algorithm can be used to search Multiple optimas, but some special mechanism is required to search all optimum points. Different genetic algorithms are proposed, designed and implemented for the multimodal Function Optimization. In this paper, we proposed an innovative approach for Multimodal Function Optimization. Proposed Genetic algorithm is a Self Adaptive Genetic Algorithm and uses Clustering Algorithm for finding Multiple Optimas. Experiments have been performed on various Multimodal Optimization Functions. The Results has shown that the Proposed Algorithm given better performance on some Multimodal Functions.

Author 1: Vrushali K Bongirwar
Author 2: Rahila Patel

Keywords: Genetic Algorithm (GA); self-adaptation; Multimodal Function Optimization; K-Means Clustering; Fuzzy C-Means Clustering.

PDF

Paper 22: Neutrosophic Relational Database Decomposition

Abstract: In this paper we present a method of decomposing a neutrosophic database relation with Neutrosophic attributes into basic relational form. Our objective is capable of manipulating incomplete as well as inconsistent information. Fuzzy relation or vague relation can only handle incomplete information. Authors are taking the Neutrosophic Relational database [8],[2] to show how imprecise data can be handled in relational schema.

Author 1: Meena Arora
Author 2: Ranjit Biswas
Author 3: Dr. U.S.Pandey

Keywords: Neutrosophic Logic, Ranking of intervals, ß-value of an interval, Neutrosophic set, Neutrosophic Relation, Rank Neutrosophic 1NF.

PDF

Paper 23: A rule-based Afan Oromo Grammar Checker

Abstract: Natural language processing (NLP) is a subfield of computer science, with strong connections to artificial intelligence. One area of NLP is concerned with creating proofing systems, such as grammar checker. Grammar checker determines the syntactical correctness of a sentence which is mostly used in word processors and compilers. For languages, such as Afan Oromo, advanced tools have been lacking and are still in the early stages. In this paper a rule based grammar checker is presented. The rule base is entirely developed and dependent on the morphology of the language . The checker is evaluated and shown a promising result.

Author 1: Debela Tesfaye

Keywords: Afan oromo grammar checker; rule based grammar checker.

PDF

The Science and Information (SAI) Organization
BACK TO TOP

Computer Science Journal

  • About the Journal
  • Call for Papers
  • Submit Paper
  • Indexing

Our Conferences

  • Computing Conference
  • Intelligent Systems Conference
  • Future Technologies Conference
  • Communication Conference

Help & Support

  • Contact Us
  • About Us
  • Terms and Conditions
  • Privacy Policy

© The Science and Information (SAI) Organization Limited. All rights reserved. Registered in England and Wales. Company Number 8933205. thesai.org