The Science and Information (SAI) Organization
  • Home
  • About Us
  • Journals
  • Conferences
  • Contact Us

Publication Links

  • IJACSA
  • Author Guidelines
  • Publication Policies
  • Digital Archiving Policy
  • Promote your Publication
  • Metadata Harvesting (OAI2)

IJACSA

  • About the Journal
  • Call for Papers
  • Editorial Board
  • Author Guidelines
  • Submit your Paper
  • Current Issue
  • Archives
  • Indexing
  • Fees/ APC
  • Reviewers
  • Apply as a Reviewer

IJARAI

  • About the Journal
  • Archives
  • Indexing & Archiving

Special Issues

  • Home
  • Archives
  • Proposals
  • Guest Editors
  • SUSAI-EE 2025
  • ICONS-BA 2025
  • IoT-BLOCK 2025

Future of Information and Communication Conference (FICC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Computing Conference

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Intelligent Systems Conference (IntelliSys)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Future Technologies Conference (FTC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact
  • Home
  • Call for Papers
  • Editorial Board
  • Guidelines
  • Submit
  • Current Issue
  • Archives
  • Indexing
  • Fees
  • Reviewers
  • Subscribe

IJACSA Volume 4 Issue 8

Copyright Statement: This is an open access publication licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.

View Full Issue

Paper 1: Autonomic Computing for Business Applications

Abstract: Autonomic computing, a new deployment technology introduced by IBM a decade ago, to manage the ever increasing complexity of IT systems, has become a part of many large scale deployments today. A lot of inroads have been made by autonomic computing in the areas of networking, data centers, storage, and database management. But few attempts have been exercised in business applications such as ERP, SCM or CRM, and Online Retail. In this paper, we would like to dive deeper to extract and explain where the pioneering autonomic computing paradigm stands today and the varied opportunities and possibilities in this area. A simplistic architecture for deployment of autonomic business applications is introduced and illustrated in this paper. A sample implementation of different management modules from various areas is described in order to invigorate the readers. This should form the basis for a newer and nimbler start, and the ubiquitous application of AC concepts to enable business transformation. This paper represents a solid extension of the paper presented in World Congress on Information and Communication Technologies, 2012[1].

Author 1: Devasia Kurian
Author 2: Pethuru Raj

Keywords: Autonomic Computing Architecture; CRM; Service Oriented Architecture; Multi-Agent Architecture

PDF

Paper 2: Novel MIME Type and Extension Based Packet Classification Algorithm in WiMAX

Abstract: IEEE 802.16 provides quality of service by providing five different service classes. When a packet reaches the MAC layer, the packet classifier has to classify the packet such that the packet is associated with appropriate QoS. In this paper a packet classification algorithm is proposed that exploits the HTTP header of the application layer to determine the type of data and classify the data. The extension and MIME type (content type) headers are used to classify the packets. Further the algorithm is enhanced by considering the type of user as an additional parameter during packet classification. Simulations are done on variable bit rate video data. Based on the type of video the packets are classified as RTPS or nRTPS thereby providing differentiated QoS. Simulation results reveal that high priority video classified as RTPS traffic receive higher throughput compared to video of lower priority. The delay faced by high priority videos is correspondingly less compared to low priority video.

Author 1: Siddu P. Algur
Author 2: Niharika Kumar

Keywords: QoS; WiMAX; MAC; Packet Classification; IEEE802.16e

PDF

Paper 3: Design and Development of AlgoWBIs

Abstract: AlgoWBIs has been developed to support algorithm learning. The goal to develop this tool is to empower educators and learners with an interactive learning tool to improving algorithm’s skills. The paper focuses on how to trim down the challenges ofalgorithm learning andalso discusses how this tool will improve the effectiveness of computer facilitated interactive learning and will support in reducing stress of learning. It will aid computer science graduate and undergraduate learners.Perspective development model has been used for development to enhance the tool’s features.

Author 1: Kavita
Author 2: Dr. Abdul Wahid
Author 3: Dr. G N Purohit

Keywords: Algorithm, Instructional design; Web-Based Instruction system (WBIs); Meta learning; Self-paced learning; Web-Based learning; Interactive learning; computer based learning; personalized learning

PDF

Paper 4: Mining Opinion in Online Messages

Abstract: The number of messages that can be mined from online entries increases as the number of online application users increases. In Malaysia, online messages are written in mixed languages known as ‘Bahasa Rojak’. Therefore, mining opinion using natural language processing activities is difficult. This study introduces a Malay Mixed Text Normalization Approach (MyTNA) and a feature selection technique based on Immune Network System (FS-INS) in the opinion mining process using machine learning approach. The purpose of MyTNA is to normalize noisy texts in online messages. In addition, FS-INS will automatically select relevant features for the opinion mining process. Several experiments involving 1000 positive movies feedback and 1000 negative movies feedback have been conducted. The results show that accuracy values of opinion mining using Naïve Bayes (NB), k-Nearest Neighbor (kNN) and Sequential Minimal Optimization (SMO) increase after the introduction of MyTNA and FS-INS.

Author 1: Norlela Samsudin
Author 2: Abdul Razak Hamda
Author 3: Mazidah Puteh
Author 4: Mohd Zakree Ahmad Nazri

Keywords: Opinion mining; text normalization; feature selection.

PDF

Paper 5: English to Creole and Creole to English Rule Based Machine Translation System

Abstract: Machine translation is the process of translating a text from one language to another, using computer software. A translation system is important to overcome language barriers, and help people communicate between different parts of the world. Most of popular online translation system caters only for the most commonly used languages but no research has been made so far concerning the translation of the Mauritian Creole language. In this paper, we present the first machine translation (MT) system that translates English sentences to Mauritian Creole language and vice-versa. The system uses the rule based machine translation approach to perform translation. It takes as input sentences in the source language either in English or Creole and outputs the translation of the sentences in the target language. The results show that the system can provide translation of acceptable quality. This system can potentially benefit many categories of people, since it allow them to perform their translation quickly and with ease.

Author 1: Sameerchand Pudaruth
Author 2: Lallesh Sookun
Author 3: Arvind Kumar Ruchpaul

Keywords: rule-based; Mauritian Creole; English

PDF

Paper 6: A Hybrid Method to Improve Forecasting Accuracy Utilizing Genetic Algorithm –An Application to the Data of Operating equipment and supplies

Abstract: In industries, how to improve forecasting accuracy such as sales, shipping is an important issue. There are many researches made on this. In this paper, a hybrid method is introduced and plural methods are compared. Focusing that the equation of exponential smoothing method(ESM) is equivalent to (1,1) order ARMA model equation, new method of estimation of smoothing constant in exponential smoothing method is proposed before by us which satisfies minimum variance of forecasting error. Generally, smoothing constant is selected arbitrarily. But in this paper, we utilize above stated theoretical solution. Firstly, we make estimation of ARMA model parameter and then estimate smoothing constants. Thus theoretical solution is derived in a simple way and it may be utilized in various fields. Furthermore, combining the trend removing method with this method, we aim to improve forecasting accuracy. An approach to this method is executed in the following method. Trend removing by the combination of linear and 2nd order non-linear function and 3rd order non-linear function is executed to the data of Operating equipment and supplies for three cases (An injection device and a puncture device, A sterilized hypodermic needle and A sterilized syringe). The weights for these functions are set 0.5 for two patterns at first and then varied by 0.01 increment for three patterns and optimal weights are searched. Genetic Algorithm is utilized to search the optimal weight for the weighting parameters of linear and non-linear function. For the comparison, monthly trend is removed after that. Theoretical solution of smoothing constant of ESM is calculated for both of the monthly trend removing data and the non-monthly trend removing data. Then forecasting is executed on these data. The new method shows that it is useful for the time series that has various trend characteristics and has rather strong seasonal trend. The effectiveness of this method should be examined in various cases.

Author 1: Daisuke Takeyasu
Author 2: Kazuhiro Takeyasu†

Keywords: minimum variance; exponential smoothing method; forecasting; trend; operating equipment and supplies

PDF

Paper 7: User-Based Interaction for Content-Based Image Retrieval by Mining User Navigation Patterns.

Abstract: In Internet, Multimedia and Image Databases image searching is a necessity. Content-Based Image Retrieval (CBIR) is an approach for image retrieval. With User interaction included in CBIR with Relevance Feedback (RF) techniques, the results are obtained by giving more number of iterative feedbacks for large databases is not an efficient method for real- time applications. So, we propose a new approach which converges rapidly and can aptly be called as Navigation Pattern-Based Relevance Feedback (NPRF) with User-based interaction mode. We combined NPRF with RF techniques with three concepts viz., query Re-weighting (QR), Query Expansion (QEX) and Query Point Movement (QPM). By using, these three techniques efficient results are obtained by giving a small number of feedbacks. The efficiency of the proposed method with results is proved by calculating Precision, Recall and Evaluation measures.

Author 1: A. Srinagesh
Author 2: Lavanya Thota
Author 3: G.P.Saradhi Varma
Author 4: A.Govardhan

Keywords: Image Retrieval; CBIR; Relevance Feedback; Navigation Patterns; Query Expansion; Query Reweighting; Query Point Movement.

PDF

Paper 8: A Novel Expert System for Building House Cost Estimation: Design, Implementation, and Evaluation

Abstract: This paper introduces an expert system which demonstrates a new method for accurate estimation of building house cost. This system is simple and decreases the time, the effort, and the money of its beneficiaries. In addition, design and implementation of the proposed expert system are introduced. CLIPS 6.0 and C# are used in implementation phase. Also, this expert system is programmed to be in a standalone package with a platform independency. Furthermore, the developed expert system is tested under several real cases. Finally, an initial evaluation of this expert system is carried out and a positive feedback is received from user’s samples, which makes it robust and efficient.

Author 1: Yasser A. Nada

Keywords: Expert System; Building House; CLIPS

PDF

Paper 9: On Integrating Mobile Applications into the Digital Forensic Investigative Process

Abstract: What if a tool existed that allowed digital forensic investigators to create their own apps that would assist them with the evidence identification and collection process at crime scenes? First responders are responsible for ensuring that digital evidence is examined in such a way that the integrity of the evidence is not jeopardized. Furthermore, they play a pivotal part in preserving evidence during the collection of evidence at the crime scene and transport to the laboratory. This paper proposes the development of a mobile application that can be developed for or created by a first responder to assist in the identification, acquisition, and preservation of digital evidence at a crime scene.

Author 1: April Tanner
Author 2: Soniael Duncan

Keywords: mobile device forensics; digital forensics; forensic process, forensic models; MIT App Inventor

PDF

Paper 10: Development of Social Media GIS for Information Exchange between Regions

Abstract: This study aims to develop a social media GIS (Geographic Information Systems) specially tailored to information exchange between regions. The conclusions of this study are summarized in the following three points.(1) Social media GIS is a geographic information system which integratesWeb-GIS, SNS and Twitter into a single system. A social media GIS was conducted for the collection of regional information in the eastern part of Yamanashi Prefecture. The social media GIS uses a design which displays its usefulness in multi-directional information transmission and in easing the limitations of space, time and continuity, making it possible to redesign systems in accordance with target cases.(2) During the operation of the social media GIS for about two months, most of the users were in their20s. Users exchanged regional information using the comment and button functions.(3)The system was evaluated based on the results of a questionnaire to users and an access analysis oflog data during operationin order to identify measures for improvement of the system. Because of users’ high evaluations of its original functions, the overall operability of the system was highly evaluated. Most of the contributed information was only known to local residents, and it was evident that the system fulfilled its intended role.

Author 1: Syuji YAMADA
Author 2: Kayoko YAMAMOTO

Keywords: Information Exchange;Web-GIS; Social Media; SNS; Twitter

PDF

Paper 11: On The Performance of the Gravitational Search Algorithm

Abstract: Gravitational Search Algorithms (GSA) are heuristic optimization evolutionary algorithms based on Newton's law of universal gravitation and mass interactions. GSAs are among the most recently introduced techniques that are not yet heavily explored. An early work of the authors has successfully adapted this technique to the cell placement problem, and shown its efficiency in producing high quality solutions in reasonable time. We extend this work by fine tuning the algorithm parameters and transition functions towards better balance between exploration and exploitation. To assess its performance and robustness, we compare it with that of Genetic Algorithms (GA), using the standard cell placement problem as benchmark to evaluate the solution quality, and a set of artificial instances to evaluate the capability and possibility of finding an optimal solution. Experimental results show that the proposed approach is competitive in terms of success rate or likelihood of optimality and solution quality. And despite that it is computationally more expensive due to its hefty mathematical evaluations, it is more fruitful on the long run.

Author 1: Taisir Eldos
Author 2: Rose Al Qasim

Keywords: Optimization; Gravitational Search; Genetic Algorithms; Cell Placement

PDF

Paper 12: Evaluation of Human Emotion from Eye Motions

Abstract: The object of this paper is to develop an emotion recognition system that analysis the motion trajectory of the eye and gives the response on appraisal emotion. The emotion recognition solution is based on the data gathering using head mounted eye tracking device. The participants of experimental investigation were provided with a visual stimulus (PowerPoint slides) and the emotional feedback was determined by the combination of eye tracking device and emotion recognition software. The stimulus was divided in four groups by the emotion that should be triggered in the human, i.e., neutral, disgust, exhilaration and excited. Some initial experiments and the data on the recognition accuracy of the emotion from eye motion trajectory are provided along with the description of implemented algorithms.

Author 1: Vidas Raudonis
Author 2: Gintaras Dervinis
Author 3: Andrius Vilkauskas
Author 4: Agne Paulauskaite - Taraseviciene
Author 5: Gintare Kersulyte - Raudone

Keywords: Emotional status; eye tracking; human computer interaction; virtual human

PDF

Paper 13: Bootstrapping Domain Knowledge Exploration using Conceptual Mapping of Wikipedia

Abstract: Wikipedia is one of the largest online encyclopedias that exist in a hypertext form. This nature prevents Wikipedia’s potential to be fully discovered. Therefore the focus of this paper is on the role of domain knowledge in supporting the exploration of classical encyclopedic content, which in this case is Wikipedia. A main contribution provided by the author of this work is a methodology for identifying the nature, the form and the role of domain knowledge expressed in conceptual form. It’s also a method of representation and analysis for describing the domain knowledge and for the extraction of the logical representation of a raw form of the domain knowledge. Such logical representation is of limited value in describing the real nature of domain knowledge. Hence we transform it into an adequate graphical representation, mostly of an arc-node form which is called conceptual representation.

Author 1: Mai Eldefrawi
Author 2: Ahmed Sharaf eldin Ahmed
Author 3: Adel Elsayed

Keywords: Conceptual Mapping; Conceptual Representation; Domain knowledge; Wikipedia; Self-regulated learners

PDF

Paper 14: Dynamic Evaluation and Visualisation of the Quality and Reliability of Sensor Data Sources

Abstract: Before using remote data sources, or those from external organisations, it is important to establish if the source is fit for purpose. We have developed an approach to automatic sensor data annotation and visualisation that evaluates overall sensor network performance and data quality. The CSIRO’s South Esk hydrological sensor web combines data related to water management from five different organisations, which provides a suitable platform to explore the issues of reliability and uncertainty. An environmental gridded surface is generated based on the observations and evaluations of quality and reliability of the sensor node provider.

Author 1: Ritaban Dutta
Author 2: Claire D’Este
Author 3: Ahsan Morshed
Author 4: Daniel Smith
Author 5: Aruneema Das
Author 6: Jagannath Aryal

Keywords: Dynamic Visualisation; Sensor Web; Weather Station; Time Series Catalogue; Interpolated 3D Surface.

PDF

Paper 15: Virtual Calibration of Cosmic Ray Sensor: Using Supervised Ensemble Machine Learning

Abstract: In this paper an ensemble of supervised machine learning methods has been investigated to virtually and dynamically calibrate the cosmic ray sensors measuring area wise bulk soil moisture. Main focus of this study was to find an alternative to the currently available field calibration method; based on expensive and time consuming soil sample collection methodology. Data from the Australian Water Availability Project (AWAP) database was used as independent soil moisture ground truth and results were compared against the conventionally estimated soil moisture using a Hydroinnova CRS-1000 cosmic ray probe deployed in Tullochgorum, Australia. Prediction performance of a complementary ensemble of four supervised estimators, namely Sugano type Adaptive Neuro-Fuzzy Inference System (S-ANFIS), Cascade Forward Neural Network (CFNN), Elman Neural Network (ENN) and Learning Vector Quantization Neural Network (LVQN) was evaluated using training and testing paradigms. An AWAP trained ensemble of four estimators was able to predict bulk soil moisture directly from cosmic ray neutron counts with 94.4% as best accuracy. The ensemble approach outperformed the individual performances from these networks. This result proved that an ensemble machine learning based paradigm could be a valuable alternative data driven calibration method for cosmic ray sensors against the current expensive and hydrological assumption based field calibration method.

Author 1: Ritaban Dutta
Author 2: Claire D’Este

Keywords: Cosmic Ray sensor; Ensemble supervised machine learning; Area wise bulk soil moisture.

PDF

Paper 16: Debranding in Fantasy Realms: Perceived Marketing Opportunities within the Virtual World

Abstract: This paper discusses the application of the concept of debranding within immersive virtual environments. In particular the issue of the media richness and vividness of experience is considered in these experience realms that may not be conducive to traditional branding invasive strategies. Brand equity is generally seen to be the desired outcome of branding strategies and the authors suggest that unless the virtual domains are considered as sacred spaces then brand equity may be compromised. The application of the above concepts is applied to the differing social spaces that operate within the different experience realms. The ideas of resonance, presence and interactivity are considered here. They lead to the development of a constructed positioning by the participants. Through the process of debranding, marketers may be able to enter these sacred spaces without negative impact to the brand. Perception of these virtual spaces was found to be partially congruent with this approach to branding. It thus presents a number of challenges for the owners of such virtual spaces and also virtual worlds in increasing the commercial utilization of investment in these environments.

Author 1: Kear Andrew
Author 2: Bown Gerald Robin
Author 3: Christidi Sofia

Keywords: component; Fantasy Realms, Debranding; Sacred Space; Marketing; 3D Virtual Worlds; Second Life

PDF

Paper 17: Cross Language Information Retrieval Model for Discovering WSDL Documents Using Arabic Language Query

Abstract: Web service discovery is the process of finding a suitable Web service for a given user’s query through analyzing the web service‘s WSDL content and finding the best match for the user’s query. The service query should be written in the same language of the WSDL, for example English. Cross Language Information Retrieval techniques does not exist in the web service discovery process. The absence of CLIR methods limits the search language to the English language keywords only, which raises the following question “How do people that do not know the English Language find a web service, This paper proposes the application of CLIR techniques and IR methods to support Bilingual Web service discovery process the second language that proposed here is Arabic. Text mining techniques were applied on WSDL content and user’s query to be ready for CLIR methods. The proposed model was tested on a curated catalogue of Life Science Web Services http://www.biocatalogue.org/ and used for solving the research problem with 99.87 % accuracy and 95.06 precision

Author 1: Prof. Dr. Torkey I.Sultan
Author 2: Dr. Ayman E. Khedr
Author 3: Fahad Kamal Alsheref

Keywords: Web services discovery; Cross Language Information Retrieval; WSDL; Text Mining

PDF

Paper 18: Actions for data warehouse success

Abstract: Problem statement: The Data Warehouse is a database dedicated to the storage of all data used in the decision analysis, it meets the customer requirements, to ensure, in time, that a data warehouse complies with the rules of construction and manages the evolutions necessary of the information system (IS). Results: According to the studies carried out, we see that a system based on a data warehouse governed by the best practices of The Information Technology Infrastructure Library (ITIL) and equipped with a multi-agent system will make it possible our direction to ensure governance tending towards the optimization of the exploitation of the data warehouse.

Author 1: Aziza CHAKIR
Author 2: Hicham MEDROMI
Author 3: Adil SAYOUTI

Keywords: Information Technology Infrastructure Library (ITIL); data warehouse; governance; insufficiencies of the data warehouse; multi-agent system.

PDF

Paper 19: Intelligent Ambulance Traffic Assistance System

Abstract: With the increase in traffic road density, several causalities occur due to delay in taking a patient to the hospital in an ambulance. In this paper, we have developed an algorithm to find the shortest path to reach the required destination. As required the software will identify the present location of the vehicle and ask the user for the destination. Then it will show all the available paths, highlighting the shortest one or in several cases the most optimum one. Further we made the traffic signals automated for special vehicles like an ambulance or a fire-engine such that the signals will go green for the ambulance as it comes in the vicinity of the traffic signal, thus providing them with a clear path to reach its destination. The original signal is restored as soon as the ambulance goes undetected by the Bluetooth scanner of the traffic signal.

Author 1: RONOJOY GHOSH
Author 2: VIVEK SHAH
Author 3: HITESH AGARWAL
Author 4: ASHUTOSH BHUSHAN
Author 5: PRASUN KANTI GHOSH

Keywords: python; ambulance; wireless; Bluetooth; cryptography;

PDF

Paper 20: Investigate the Performance of Document Clustering Approach Based on Association Rules Mining

Abstract: The challenges of the standard clustering methods and the weaknesses of Apriori algorithm in frequent termset clustering formulate the goal of our research. Based on Association Rules Mining, an efficient approach for Web Document Clustering (ARWDC) has been devised. An efficient Multi-Tire Hashing Frequent Termsets algorithm (MTHFT) has been used to improve the efficiency of mining association rules by targeting improvement in mining of frequent termset. Then, the documents are initially partitioned based on association rules. Since a document usually contains more than one frequent termset, the same document may appear in multiple initial partitions, i.e., initial partitions are overlapping. After making partitions disjoint, the documents are grouped within the partition using descriptive keywords, the resultant clusters are obtained effectively. In this paper, we have presented an extensive analysis of the ARWDC approach for different sizes of Reuters datasets. Furthermore the performance of our approach is evaluated with the help of evaluation measures such as, Precision, Recall and F-measure compared to the existing clustering algorithms like Bisecting K-means and FIHC. The experimental results show that the efficiency, scalability and accuracy of the ARWDC approach has been improved significantly for Reuters datasets.

Author 1: Noha Negm
Author 2: Mohamed Amin
Author 3: Passent Elkafrawy
Author 4: Abdel Badeeh M. Salem

Keywords: Web Document Clustering; Knowledge Discovery; Association Rules Mining; Frequent termsets; Apriori algorithm; Text Documents; Text Mining; Data Mining

PDF

Paper 21: Directed and Almost-Directed Flow Loops in Real Networks

Abstract: Directed flow loops are highly undesirable because they are associated with wastage of energy for maintaining them and entail big losses to the world economy. It is shown that directed flow loops may appear in networks even if the dispatched commodity does not physically travel along a closed contour. Consequently, a theorem giving the necessary and sufficient condition of a directed flow loop on randomly oriented straight-line flow paths has been formulated and a close-form expression has been derived for the probability of a directed flow loop. The results show that even for a relatively small number of intersecting flow paths, the probability of a directed flow loop is very large, which means that the existence of directed flow loops in real networks is practically inevitable. Consequently, a theorem and an efficient algorithm have been proposed related to discovering and removing directed flow loops in a network with feasible flows. The new concept ‘almost-directed flow loop’ has also been introduced for the first time. It is shown that the removal of an almost-directed flow loop also results in a significant decrease of the losses. It is also shown that if no directed flow loops exist in the network, the removal of an almost-directed flow loop cannot create a directed flow loop.

Author 1: M. Todinov

Keywords: directed flow loops; almost-directed flow loops; flow networks; optimization; classical algorithms; maximising the flow.

PDF

Paper 22: Workshop Session Recordings on Green Volunteering Activities of Students in a Disadvantaged Area According to the Good-Hearted Vocation Teacher to Support Itinerant Junk Buyers

Abstract: This project was aimed to provide workshop session recordings on green volunteering activities of students in one disadvantaged area under the bridge of zone 1, Pracha-Utit Road 76, Toong-kru District, Bangkok where the majority worked as itinerant junk buyers. Therefore, the students held workshop sessions with the aim to provide training on how to repair electrical appliances and engines so that the community members could use this knowledge to increase the value of the unwanted electrical appliances they bought. The project also discussed the risk and danger of certain junk product which might be mixed with rubbish and taught how to classify recyclable products to increase the value of the junk. This project was the first of its own and it was done as green volunteering activities of students. The research team has provided 182 families from the community under the bridge of zone 1 with a number of workshop sessions. The sampling group was chosen out of those who attended at least three times and there were 20 persons. The research results showed that the sampling group achieved high level of knowledge (100.0%). They could fix fans as well as repair and maintain engines. They could classify junk. They expressed high level of satisfaction towards the workshop sessions (mean score of 4.18 with S.D. of 0.27). When the assessment was conducted as regards the operation and the recordings on green volunteering activities of 13 students, it was at the highest level (mean score of 4.68 with S.D. of 0.42). This workshop project was the first runner-up of the national SCB Challenge 2012 Community Project as organized by Siam Commercial Bank PLC.

Author 1: Kuntida Thamwipat
Author 2: Thanakarn Kumphai

Keywords: Recordings; Workshop; Student Activities; Green Volunteering; Disadvantaged Community

PDF

Paper 23: Knowledge Management Strategyfor SMEs

Abstract: In Thailand, as in other developing countries, the focus was on the large industry first, since governments assumed that large enterprises could generate more employment. However, there has been a realization that the SMEs are the biggest group in the country and are significantly important to the process of social and economic development. This realization has prompted Thailand to institute mechanisms to support and protect SMEs consist of manufacturing, merchandising (wholesale & retail) and service businesses. Unfortunately, most of these SMEs lack capability in operational areas such as technology, management, marketing, and finance when compared to large enterprises. In order to adapt and survive SMEs need full and proper support from the government. To aid in their adaptation and survival, SMEs and government must develop their knowledge management framework to effectively harness their past and present experiences, and anticipate the future evolution of their commercial environment. In most countries, SMEs are the biggest source of export even in normal circumstances. Consequently, the state and SMEs have to focus and work hard to their ensure survival.

Author 1: Kitimaporn choochote

Keywords: Knowledge Management; Small and Medium Enterprice; SME;

PDF

Paper 24: A Proposed NFC Payment Application

Abstract: Near Field Communication (NFC) technology is based on a short range radio communication channel which enables users to exchange data between devices. With NFC technology, mobile services establish a contactless transaction system to make the payment methods easier for people. Although NFC mobile services have great potential for growth, they have raised several issues which have concerned the researches and prevented the adoption of this technology within societies. Reorganizing and describing what is required for the success of this technology have motivated us to extend the current NFC ecosystem models to accelerate the development of this business area. In this paper, we introduce a new NFC payment application, which is based on our previous “NFC Cloud Wallet” model [1] to demonstrate a reliable structure of NFC ecosystem. We also describe the step by step execution of the proposed protocol in order to carefully analyse the payment application and our main focus will be on the Mobile Network Operator (MNO) as the main player within the ecosystem.

Author 1: Pardis Pourghomi
Author 2: Muhammad Qasim Saeed
Author 3: Gheorghita Ghinea

Keywords: Near Field Communication; Security; Mobiletransaction; GSM authentication.

PDF

Paper 25: An Analysis of Brand Selection

Abstract: It is often observed that consumers select upper class brand when they buy next time. Suppose that former buying data and current buying data are gathered. Also suppose that upper brand is located upper in the variable array. Then the transition matrix becomes upper triangular matrix under the supposition that former buying variables are set input and current buying variables are set output. Takeyasu et al. analyzed the brand selection and its matrix structure before. In that paper, products of one genre are analyzed. In this paper, brand selection among multiple genre and its matrix structure are analyzed. Taking an automobile for example, customer brand selection from company A to B or company A to C can be made clear utilizing above stated method. We can confirm not only the preference shift among brands but also the preference shift among companies. This enables building marketing strategy for automobile company much easier. Analyzing such structure provides useful applications. Thus, this proposed approach enables to make effective marketing plan and/or establishing new brand.

Author 1: Kazuhiro Takeyasu†
Author 2: Yuki Higuchi

Keywords: brand selection; matrix structure; brand position

PDF

Paper 26: Protein PocketViewer: A Web-Service Based Interface for Protein Pocket Extraction and Visualization

Abstract: One important problem in bioinformatics is to study pockets or tunnels within the protein structure. These pocket or tunnel regions are significant because they indicate areas of ligand binding or enzymatic reactions, and tunnels are often solvent ion conductance areas. The Protein Pocket Viewer (PPV) is a web interface that allows the user to extract and visualize the protein pockets in a browser, based on the algorithm in [1]. The PPV packaged the pocket extraction executable as a web service, and made it accessible to all users with the Internet access and a modern java enabled browser. The PPV employed the Model2design pattern, which led to a loosely coupled implementation that is more robust and easier to maintain. It consists of a client web interface for user inputs and visualization, a middle-layer for controlling the flow, and the backend web services performing the actual CPU-intensive computation. The PPV web client consists of multiple window regions, with each region providing differing views of the protein, pockets and related information. For a more responsive user experience, the PPV web client employs AJAX for asynchronous execution of long running tasks, like protein pocket extraction.

Author 1: Xiaoyu Zhang
Author 2: Martin Gordon

Keywords: protein structure; pockets; Model 2; AJAX; web service; visualization;

PDF

Paper 27: Generating an Educational Domain Checklist through an Adaptive Framework for Evaluating Educational Systems

Abstract: The growth of the Internet and related technologies has enabled the development of a new breed of dynamic websites that is growing rapidly in use and that has had a huge impact on many businesses. One type of websites that have been widely spread and are being widely adopted is the educational websites. There are many forms of educational websites, such as free online websites and Web-based server software. This creates challenges regarding their continuing evaluation and monitoring in order to measure their efficiency and effectiveness, to assess user satisfaction and, ultimately, to improve their quality. The lack of an adaptive usability checklist for improvement of the usability assessment process for educational systems represents a missing piece in ‘usability testing’. This paper presents an adaptive Domain-Specific Inspection (DSI) checklist as a tool for evaluating the usability of educational systems. The results show that the adaptive educational usability checklist helped evaluators to facilitate the evaluation process. It also provides an opportunity for website owners to choose the usability area(s) that they think need to be evaluated. Moreover, this method was more efficient and effective than user testing (UT) and heuristics evaluation (HE) methods.

Author 1: Roobaea S. AlRoobaea
Author 2: Ali H. Al-Badi
Author 3: Pam J. Mayhew

Keywords: Heuristic evaluation (HE);User Testing (UT);Domain Specific Inspection (DSI); Adaptive Framework; Adaptive Checklist

PDF

Paper 28: Semantic, Automatic Image Annotation Based on Multi-Layered Active Contours and Decision Trees

Abstract: In this paper, we propose a new approach for automatic image annotation (AIA) in order to automatically and efficiently assign linguistic concepts to visual data such as digital images, based on both numeric and semantic features. The presented method first computes multi-layered active contours. The first-layer active contour corresponds to the main object or foreground, while the next-layers active contours delineate the object’s subparts. Then, visual features are extracted within the regions segmented by these active contours and are mapped into semantic notions. Next, decision trees are trained based on these attributes, and the image is semantically annotated using the resulting decision rules. Experiments carried out on several standards datasets have demonstrated the reliability and the computational effectiveness of our AIA system.

Author 1: Joanna Isabelle OLSZEWSKA

Keywords: automatic image annotation; natural language tags; decision trees; semantic attributes; visual features; active contours; segmentation; image retrieval

PDF

Paper 29: Representation Modeling Persona by using Ontologies: Vocabulary Persona

Abstract: Semantic Web is then to add to all these resources semantics that allow computer systems to "understand" the meaning by accessing structured collections of information and inference rules that can be used to drive reasoning automated to better satisfy user requirements. Standard description of Web resources proposed by the W3C, as the name implies, RDF (Resource Description Framework) is a meta-data used to guide the description of resources, to make it more "structured" information necessary for engines research and, more generally, to all necessary computer automated tool for analyzing web pages. The web is a new web sematique or all Web resources are described by metadata, which allows machines better use of these resources. Considering as a foundation specification FOAF (Friend Of A Friend), we use semantic structures (RDFa) to create an ontology and technologies in which it is implemented.Create a conceptual model (eg, an ontology) for personas and their uses in the context of human-computer interaction we will present some screenshots of execution of application.

Author 1: GAOU Salma
Author 2: EL KADIRI Kamal Eddine
Author 3: CORNELIU BURAGA Sabin

Keywords: Semantic Web; FOAF; Persona; Vocabulary; Ontology; Persona;

PDF

Paper 30: A Study on the Conception of Generic Fuzzy Expert System for Surveillance

Abstract: This paper deals with using fuzzy logic to minimize uncertainty effects in surveillance. It studies the conception of an efficient fuzzy expert system that had two characteristics: generic and robust to uncertainties. Analyzing distance between variables optimal and real values is the main idea of the research. Fuzzy inference system decides, then, about significant variables state: normal or abnormal. A comparison between three proposed fuzzy expert systems is presented to highlight the effect of membership number and type. Beside, being generic this system could also be applied in three fields: industrial surveillance, camera surveillance and medical surveillance. To expose results in these fields, matlab is used to realize this approach and to simulate systems responses which revealed interested conclusions.

Author 1: Najar Yousra
Author 2: Ketata Raouf
Author 3: Ksouri Mekki

Keywords: Generic Fuzzy expert system; surveillance, uncertainty'error analysis,;three tanks; ECG

PDF

Paper 31: The Determination of Affirmative and Negative Intentions for Indirect Speech Acts by a Recommendation Tree

Abstract: For context-based recommendation systems, it is necessary to detect affirmative and negative intentions from answers. However, traditional studies can not determine these intentions from indirect speech acts. In order to determine these intentions from indirect speech acts, this paper defines a recommendation tree and proposes an algorithm of deriving intentions of indirect speech acts by the tree. In the proposed method, a recommendation condition (RC) is introduced and it is classified into a required RC, a selectable RC, and a not-selectable RC. The recommendation tree is constructed by nodes and edges corresponding to these three conditions. The deriving algorithm determines affirmative and negative intentions of indirect speech acts by tracing the trees. From experimental results, it is verified that the accuracy of the proposed method is about 40 points higher than the traditional method.

Author 1: Takuki Ogawa
Author 2: Kazuhiro Morita
Author 3: Masao Fuketa
Author 4: Jun-ichi Aoe

Keywords: recommendation system; indirect speech acts; affirmative intention; negative intention

PDF

Paper 32: Performance Analysis of Keccak f-[1600]

Abstract: Keccak is the latest Hash Function selected as the winner of NIST Hash Function Competition. SHA-3 is not meant to replace SHA-2 as no significant attacks on SHA-2 have been demonstrated. But it is designed in response to the need to find an alternative and dissimilar construct for Cryptographic Hash that is more fortified to attacks. In this paper we have tried to depict an analysis of the software implementation of Keccak-f[1600] based on the disk space utilization and time required to compute digest of desired sizes.

Author 1: Ananya Chowdhury
Author 2: Utpal Kumar Ray

Keywords: Sponge Construction; State; Rounds; Bitrate(r); Capacity(c); Diversifier(d); Plane; Slice; Sheet; Row; Column; Lane; Bit

PDF

Paper 33: Software Ecosystem: Features, Benefits and Challenges

Abstract: Software Ecosystem (SECO) is a new and rapidly evolving phenomenon in the field of software engineering. It is an approach through which many variables can resolve complex relationships among companies in the software industry. SECOs are gaining importance with the advent of the Google Android, Apple iOS, Microsoft and Salesforce.com ecosystems. It is a co-innovation approach by developers, software organisations, and third parties that share common interest in the development of the software technology. There are limited researches that have been done on SECOs hence researchers and practitioners are still eager to elucidate this concept. A systematic study was undertaken to present a review of software ecosystems to address the features, benefits and challenges of SECOs. This paper showed that open source development model and innovative process development were key features of SECOs and the main challenges of SECOs were security, evolution management and infrastructure tools for fostering interaction. Finally SECOs fostered co-innovation, increased attractiveness for new players and decreased costs

Author 1: J. V. Joshua
Author 2: D.O. Alao
Author 3: S.O. Okolie
Author 4: O. Awodele

Keywords: Software ecosystem; Open source; closed system

PDF

Paper 34: Improved QO-STBC OFDM System Using Null Interference Elimination

Abstract: The quasi-orthogonal space time block coding (QO-STBC) over orthogonal frequency division multiplexing (OFDM) is investigated. Traditionally, QO-STBC does not achieve full diversity since the detection matrix of QO-STBC scheme is not a diagonal matrix. In STBC, the decoding matrix is a diagonal matrix which enables linear decoding whereas the decoding matrix in traditional QO-STBC does not enable linear decoding. In this paper it is shown that there are some interfering terms in terms of non-diagonal elements that result from the decoding process which limit the linear decoding. As a result, interference from the application of the QO-STBC decoding matrix depletes the performance of the scheme such that full diversity is not attained. A method of eliminating this interference in QO-STBC is investigated by nulling the interfering terms towards full diversity for an OFDM system. It was found that the interference reduction technique permits circa 2dB BER performance gain in QO-STBC. The theoretical and simulation results are presented, for both traditional QO-STBC and interference-free QO-STBC applying OFDM

Author 1: K. O. O. Anoh
Author 2: R. A. Abd-Alhameed
Author 3: Y. A. S. Dama
Author 4: S. M. R. Jones
Author 5: T. S. Ghazaany
Author 6: J. Rodrigues
Author 7: K. N. Voudouris

Keywords: QO-STBC; STBC; OFDM; Decoding matrix; Null-Interference; Interference;

PDF

Paper 35: Pilot Study of Industry Perspective on Requirement Engineering Education: Measurement of Rasch Analysis

Abstract: Software development industry identifies that human-based give a significant problem in Requirement Engineering. To that reason, education gives a substantial impact in delivering a skill worker and should be a medium to reduce the problem. Survey question was distributed among ICT for this pilot study to the organization of MSC status in Malaysia for pilot study. 15.53% (N = 32) respondent successfully return their respond back. The result shows that only 27 person is analyzed regarding to misfit data provided by Rasch Measurement Model. The unidimensionality, person-item map and misfit data are discussed. Research objective to identify the undergraduate problem in Requirement Engineering education is achieved. Future work will be discussed on further analysis on actual survey to improve employability skill among software engineering undergraduate students.

Author 1: NOR AZLIANA AKMAL JAMALUDIN
Author 2: SHAMSUL SAHIBUDDIN

Keywords: Higher Learning Education; Requirement Engineering; Education; Rasch Measurement Model; Employability Skill; Undergraduate Problem; Rasch Analysis; Unidimensionality; Human-based Problem.

PDF

Paper 36: A Novel Steganography Method for Hiding BW Images into Gray Bitmap Images via k-Modulus Method

Abstract: This paper is to create a pragmatic steganographic implementation to hide black and white image which is known as stego image inside another gray bitmap image that known as cover image. First of all, the proposed technique uses k-Modulus Method (K-MM) to convert all pixels within the cover image into multiples of positive integer named k. Since the black and white images can be represented using binary representation, i.e. 0 or 1. Then, in this article, the suitable value for the positive integer k is two. Therefore, each pixel inside the cover image is divisible by two and this produces a reminder which is either 0 or 1. Subsequently, the black and white representation of the stego image could be hidden inside the cover image. The ocular differences between the cover image before and after adding the stego image are insignificant. The experimental results show that the PSNR values for the cover image are very high with very small Mean Square Error.

Author 1: Firas A. Jassim

Keywords: Image steganography, Information hiding, Security, k-Modulus Method.

PDF

The Science and Information (SAI) Organization
BACK TO TOP

Computer Science Journal

  • About the Journal
  • Call for Papers
  • Submit Paper
  • Indexing

Our Conferences

  • Computing Conference
  • Intelligent Systems Conference
  • Future Technologies Conference
  • Communication Conference

Help & Support

  • Contact Us
  • About Us
  • Terms and Conditions
  • Privacy Policy

© The Science and Information (SAI) Organization Limited. All rights reserved. Registered in England and Wales. Company Number 8933205. thesai.org