The Science and Information (SAI) Organization
  • Home
  • About Us
  • Journals
  • Conferences
  • Contact Us

Publication Links

  • IJACSA
  • Author Guidelines
  • Publication Policies
  • Digital Archiving Policy
  • Promote your Publication
  • Metadata Harvesting (OAI2)

IJACSA

  • About the Journal
  • Call for Papers
  • Editorial Board
  • Author Guidelines
  • Submit your Paper
  • Current Issue
  • Archives
  • Indexing
  • Fees/ APC
  • Reviewers
  • Apply as a Reviewer

IJARAI

  • About the Journal
  • Archives
  • Indexing & Archiving

Special Issues

  • Home
  • Archives
  • Proposals
  • Guest Editors
  • SUSAI-EE 2025
  • ICONS-BA 2025
  • IoT-BLOCK 2025

Future of Information and Communication Conference (FICC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Computing Conference

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Intelligent Systems Conference (IntelliSys)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Future Technologies Conference (FTC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact
  • Home
  • Call for Papers
  • Editorial Board
  • Guidelines
  • Submit
  • Current Issue
  • Archives
  • Indexing
  • Fees
  • Reviewers
  • Subscribe

IJACSA Volume 5 Issue 8

Copyright Statement: This is an open access publication licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.

View Full Issue

Paper 1: An Information Hiding Scheme Based on Pixel-Value-Ordering and Prediction-Error Expansion with Reversibility

Abstract: This paper proposes a data hiding scheme based on pixel-value-ordering and predication-error expansion. In a natural image, most neighboring pixels have similar pixel values, i.e. the difference between neighboring pixels is small. Based on the observation, we may predict a pixel’s value according its neighboring pixels. The proposed scheme divides an image into non-overlapping blocks each of which consists of three pixels, and pixels in a block are sorted in a descending order. Messages are embedded into two difference values, where one is between the largest and medium pixels and the other is between the smallest and medium ones. In the embedding process, difference values equal to 0 or greater than 1 are unchanged or increased by 1, respectively, and those equal to 1 are also unchanged or increased by 1 if the message bit to be embedded is equal to 0 or 1, respectively. Calculating the difference value, one may extract a message bit of 0 or 1 if it is equal to 1 or 2, respectively. Recovering pixels is done by decreasing those difference values by 1 if they are equal to or larger than 2. Experimental results demonstrate that the proposed scheme may provide much larger embedding capacity, comparing to existing study, and a satisfied image quality.

Author 1: Ching Chiuan Lin
Author 2: Shih-Chieh Chen
Author 3: Kuo Feng Hwang

Keywords: Reversible data hiding; Pixel-value-ordering; Prediction-error expansion

PDF

Paper 2: Semantic Similarity Calculation of Chinese Word

Abstract: This paper puts forward a two layers computing method to calculate semantic similarity of Chinese word. Firstly, using Latent Dirichlet Allocation (LDA) subject model to generate subject spatial domain. Then mapping word into topic space and forming topic distribution which is used to calculate semantic similarity of word(the first layer computing). Finally, using semantic dictionary "HowNet" to deeply excavate semantic similarity of word (the second layer computing). This method not only overcomes the problem that it’s not specific enough merely using LDA to calculate semantic similarity of word, but also solves the problems such as new words (haven’t been added in dictionary) and without considering specific context when calculating semantic similarity based on semantic dictionary "HowNet". By experimental comparison, this thesis proves feasibility,availability and advantages of the calculation method.

Author 1: Liqiang Pan
Author 2: Pu Zhang
Author 3: Anping Xiong

Keywords: semantic similarity; LDA; subject model; HowNet

PDF

Paper 3: The Impact and Challenges of Cloud Computing Adoption on Public Universities in Southwestern Nigeria

Abstract: This study investigates the impact and challenges of the adoption of cloud computing by public universities in the Southwestern part of Nigeria. A sample size of 100 IT staff, 50 para-IT staff and 50 students were selected in each university using stratified sampling techniques with the aid of well-structured questionnaires. Microsoft excel was used to capture the data while frequency and percentage distributions were used to analyze it. In all, 2, 000 copies of the questionnaire were administered to the ten (10) public universities in the southwestern part of Nigeria while 1742 copies were returned which represents a respondent rate of 87.1%. The result of the findings revealed that the adoption of cloud computing has a significant impact on cost effectiveness, enhanced availability, low environmental impact, reduced IT complexities, mobility, scalability, increased operability and reduced investment in physical asset However, the major challenges confronting the adoption of cloud are data insecurity, regulatory compliance concerns, lock-in and privacy concerns. This paper concludes by recommending strategies to manage the identified challenges in the study area.

Author 1: Oyeleye Christopher Akin
Author 2: Fagbola Temitayo Matthew
Author 3: Daramola Comfort Y.

Keywords: cloud computing; cloud adoption; information-communication-technology; public-universities

PDF

Paper 4: WOLF: a Research Platform to Write NFC Secure Applications on Top of Multiple Secure Elements (With an Original SQL-Like Interface)

Abstract: This article presents the WOLF (Wallet Open Library Framework) platform which supports an original interface for NFC developers called “SE-QL”. SE-QL is a SQL-like interface which eases and optimizes NFC secure application development in making the heterogeneity of the Secure Element (SE) transparent. SE implementation could be “embedded” (eSE) in the mobile device, or inside the SIM Card (UICC), or “on-host” software-based, or in the Cloud (e.g. through HCE); every SE implementation has its own interface(s) making NFC secure-application development extremely cumbersome and complex. Proposed SE-QL solves this problem. This article demonstrates the feasibility and attractiveness of our approach based upon an original high-level API.

Author 1: Anne Marie Lesas
Author 2: Benjamin Renaut
Author 3: Pr. Serge Miranda
Author 4: Amosse Edouard

Keywords: Mobiquitous services; Near Field Communication (NFC); Secure Element (SE); Smart card; Structured (English as a) Query Language (SQL); Digital Wallet; TSM / OTA; UICC

PDF

Paper 5: Optimal Network Design for Consensus Formation: Wisdom of Networked Agents

Abstract: The wisdom of crowds refers to the phenomenon in which the collective knowledge of a community is greater than the knowledge of any individual. This paper proposes a network design for the fastest and slowest consensus formation under average node degree restrictions, which is one aspect of the wisdom of crowds concept. Consensus and synchronization problems are closely related to variety of issues such as collective behavior in nature, the interaction among agents as a matter of the robot control, and building efficient wireless sensor networks. However, designing networks with desirable properties is complex and it may pose a multi-constraint and multi-criterion optimization problem. For the purpose of realizing such efficient network topology, this paper presents an optimization approach to design networks for better consensus formation by focusing on the eigenvalue spectral of Laplacian matrix. In both the fastest and slowest networks presented, consensus is formed among local structures first, then on a global scale. This suggests that both local and global topology influence the networks dynamics. These findings are useful for those who seek to manage efficient consensus and synchronization in a setting that can be modeled as a multi-agent system.

Author 1: Eugene S. Kitamura
Author 2: Akira Namatame

Keywords: wisdom of crowds; consensus problem; Laplacian matrix

PDF

Paper 6: Managing Open Educational Resources on the Web of Data

Abstract: In the last few years, the international work on Massive Open On-line Courses (MOOCS) underlined new needs for open educational resources (OER) management within the context of the Web of Data. First, within MOOCs, all (or at least most) resources must be open and available on the Web through URIs, including the MOOCs themselves. Second the evolution of research and practice in the field of OER repositories, notably the focus in international e-learning standards, is moving recently from OER metadata stored in relational databases towards RDF-based descriptions of resources stored in triple stores. Third, new resource management tools like COMETE provide more intelligent search capabilities within the Web of data, both for designers who are building MOOCs, and also for students who should be equipped with friendly tools to personalize their environment. We will present some COMETE use cases to illustrate these new possibilities and advocate for their integration within MOOC platforms.

Author 1: Gilbert Paquette
Author 2: Alexis Miara

Keywords: resource management; resource repositories; OER; open resources; MOOCS; RDF; Web of data; Semantic Web; IEEE-LOM; ISO-MLR

PDF

Paper 7: Development of Duck Diseases Expert System with Applying Alliance Method at Bali Provincial Livestock Office

Abstract: Farming is one of the activities that have a business opportunity. One is raising ducks. The main results can be obtained from the breeding duck is a duck meat and eggs for consumption and also means praying ceremony in Bali, as well as duck egg shells that can be used for jewelry. Since the outbreak of avian influenza began in 2008, have an impact on consumer demand of ducks decreased and consumers become more careful in choosing and consuming duck. The avian influenza virus not only spread across the country of China, Thailand and Vietnam, but also in Indonesia, Bali is no exception. This is evidenced by the discovery of cases of death due to bird flu virus in some areas in Bali, among others: the regency of Karangasem, Badung, Tabanan, Klungkung and Jembrana. From this, the Bali Provincial Livestock Office took steps to develop an expert system in the detection of diseases ducks. This expert system uses a alliance method is a combination of forward chaining, backward chaining and weighted product to search the physical symptoms and behavioral symptoms duck by the name of a known disease and to determine the percentage of disease attack level in ducks. In this study, the analytical techniques used to analyze the truth is a alliance method of duck disease expert system. Activity data collection and information to support research conducted by, among others, literature studies, interviews, and observations.

Author 1: Dewa Gede Hendra Divayana

Keywords: Expert System; Forward Chaining; Backward Chaining; Weighted Product; Alliance Method; Duck Diseases

PDF

Paper 8: Toward Accurate Feature Selection Based on BSS-GRF

Abstract: As of late, Feature extraction in email classification assumes a vital part. Many Feature extraction algorithms need more effort in term of accuracy. In order to improve the classifier accuracy and for faster classification, the hybrid algorithm is proposed. This hybrid algorithm combines the Genetics Rough set with blind source separation approach (BSS-GRF). The main aim of proposing this hybrid algorithm is to improve the classifier accuracy for classifying incoming e-mails.

Author 1: S. M. Elseuofi
Author 2: Samy Abd El -Hafeez
Author 3: Wael Awad
Author 4: R. M. El-Awady

Keywords: rough set; Genetic; blind source separation; E-mail Filtering; Machine Learning

PDF

Paper 9: A New Efficient Method for Calculating Similarity Between Web Services

Abstract: Web services allow communication between heterogeneous systems in a distributed environment. Their enormous success and their increased use led to the fact that thousands of Web services are present on the Internet. This significant number of Web services which not cease to increase has led to problems of the difficulty in locating and classifying web services, these problems are encountered mainly during the operations of web services discovery and substitution. Traditional ways of search based on keywords are not successful in this context, their results do not support the structure of Web services and they consider in their search only the identifiers of the web service description language (WSDL) interface elements. The methods based on semantics (WSDLS, OWLS, SAWSDL…) which increase the WSDL description of a Web service with a semantic description allow raising partially this problem, but their complexity and difficulty delays their adoption in real cases. Measuring the similarity between the web services interfaces is the most suitable solution for this kind of problems, it will classify available web services so as to know those that best match the searched profile and those that do not match. Thus, the main goal of this work is to study the degree of similarity between any two web services by offering a new method that is more effective than existing works.

Author 1: T. RACHAD
Author 2: J.Boutahar
Author 3: S.El ghazi

Keywords: web service; semantic similarity; syntactic similarity; WordNet; word sense disambiguation; Hausdorff distance

PDF

Paper 10: Role of Knowledge Reusability in Technological Environment During Learning

Abstract: Role of technology and reusability on the knowledge management and knowledge transformation has been analyzed by considering the extended model of Nonaka and Takeuchi which includes the knowledge reuse in the three dimensional environment. Knowledge transformation has been further refined (and boosted) to get the more qualitative and quantitative knowledge by applying the concept of knowledge reification, indexing and adaption. By extending these concepts and related processes, ADRI quality model on higher education learning has been analyzed. Present work suggest that reusability along with above mentioned concepts during ADRI cycle can boost the qualitative knowledge in higher educational setting and observed that ADRI model has the similar trends as that of Nonaka model in the three dimensional environments. In addition, discussion also prevails that best practices required in a higher educational setting correspond to ADRI model. It has been suggested that time along with reusability supports to the tacit as well as explicit knowledge management during learning. The knowledge transformation achieved this way is more qualitative. Finally it can be concluded that tacit and explicit knowledge required to reuse is an important aspect now days in managing higher educational knowledge in a fast growing contemporary environment provided knowledge is exploited appropriately.

Author 1: O. K. Harsh

Keywords: Knowledge; Reuse; Tacit Knowledge; Explicit Knowledge; Technology; ADRI model; Quality

PDF

Paper 11: Neural Network Based Lna Design for Mobile Satellite Receiver

Abstract: Paper presents a Neural Network Modelling approach to microwave LNA design. To acknowledge the specifications of the amplifier, Mobile Satellite Systems are analyzed. Scattering parameters of the LNA in the frequency range 0.5 to 18 GHz are calculated using a Multilayer Perceptron Artificial Neural Network model and corresponding smith charts and polar charts are plotted as output to the model. From these plots, the microwave scattering parameter description of the LNA are obtained. Model is efficiently trained using Agilent ATF 331M4 InGaAs/InP Low Noise pHEMT amplifier datasheet and the neural model’s output seem to follow the various device characteristic curves with high regression. Next, Maximum Allowable Gain and Noise figure of the device are modelled and plotted for the same frequency range. Finally, the optimized model is utilized as an interpolator and the resolution of the amplifying capability with noise characteristics are obtained for the L Band of MSS operation.

Author 1: Abhijeet Upadhya
Author 2: Prof. P. K. Chopra

Keywords: Satellite; Mobile; Artificial Neural Networks; Scattering Parameters; Noise Figure

PDF

Paper 12: Multi-Agent Architecture for Implementation of ITIL Processes: Case of Incident Management Process

Abstract: ITIL (Information Technology Infrastructure Library) is the most widely accepted approach to IT service management in the world. Upon the adoption of ITIL processes, organizations face many challenges that can lead to increased complexity. In this paper we use the advantages of agent technology to make implementation and use of ITIL processes more efficient, starting by the incident management process.

Author 1: Youssef SEKHARA
Author 2: Hicham MEDROMI
Author 3: Adil SAYOUTI

Keywords: ITIL; Process; Multi-agent system; Incident Management Process

PDF

Paper 13: Path Planning in a Dynamic Environment

Abstract: Path planning is an important area in the control of autonomous mobile robots. Recent work has focused on aspects reductions in processing time than the memory requirements. A dynamic environment uses a lot of memory and hence the processing time increases too. Our approach is to reduce the processing time by the use of a pictorial approach to reduce the number of data used. In this paper, we present a path planning approach that operates in three steps. First, a construction of the visibility tree is performed. The following treatments are not performed on the original image but on the result tree whose elements are specific points of the environment linked by the relationship of visibility. We construct thereafter a visibility graph which one seeks the shortest path. This approach has a great interest because of its fast execution speed. The path search is extended also for the case where obstacles can move. The moving obstacles may be other mobile robots whose trajectories and speeds are known initially. At the end, some applications are provided on solving similar problem such civil aviation in order to guide plane avoiding collisions.

Author 1: Mohamed EL KHAILI

Keywords: component; path planning; navigation; robotics; visibility graph; obstacles contours; moving obstacles; space-time representation

PDF

Paper 14: Online Monitoring System Design of Intelligent Circuit Breaker Based on DSP and ARM

Abstract: In order to accurately analyze the dynamic characteristics of the vacuum circuit breaker, a dual-core master-slave processor structure for online monitoring system based on DSP and ARM is proposed. This structure consists of host computer, lower computer and signal processing modules. The lower computer uses DSP as the core, which completes acquisition and data preprocessing of circuit breaker’s dynamic characteristics through sensors and signal conditioning circuits. The host computer uses ARM as the core which is responsible for task management, analysis, processing and displaying collected data via Ethernet. The communication between DSP and ARM is conducted by HPI. This design improves the reliability of intelligent control unit for the circuit breaker. The experiment showed that this system works steadily and accuracy.

Author 1: Meng Song
Author 2: Liping Zhang
Author 3: Yuchen Chen
Author 4: Weijin Zheng

Keywords: circuit breaker; online monitoring; ARM; DSP

PDF

Paper 15: Evaluating Usability of E-Learning Systems in Universities

Abstract: The use of e-learning systems has increased significantly in the recent times. E-learning systems are supplementing teaching and learning in universities globally. Kenyan universities have adopted e-learning technologies as means for delivering course content. However despite adoption of these systems, there are considerable challenges facing the usability of the systems. Lecturers and students have different perceptions in regard to the usability of e-learning systems. The aim of this study was to evaluate usability attributes that affect e-learning systems in Kenyan universities. The study had two fold objectives; determining status of e-learning platforms and evaluating usability issues affecting e-learning adoption in Kenyan universities. The research took a case study of one of the public universities which has implemented Moodle e-learning system. The usability attributes evaluated were user-friendliness, learnability, technological infrastructure and policy. The research made recommendations which could help universities accelerate the adoption of e-learning systems.

Author 1: Nicholas Kipkurui Kiget
Author 2: Professor G. Wanyembi
Author 3: Anselemo Ikoha Peters

Keywords: e-learning; moodle; usability; learnability

PDF

Paper 16: Agent Based Personalized Semantc Web Information Retrieval System

Abstract: Every user has an individual background and a precise goal in search of information. The goal of personalized search is to search results to a particular user based on the user’s interests and preferences. Effective personalization of information access involves two important challenges: accurately identifying the user context and organizing the information to match with the particular context. In this paper, the system uses ontology as a knowledge base for the information retrieval process. It is one layer above any one of search engines retrieve by analyzing just the keywords. Here, the query is analyzed both syntactically and semantically. The developed system retrieves the web results more relevant to the users query. The level of accuracy will be enhanced since the query is analyzed semantically. The results are re-ranked and optimized for providing the relevant links. Based on the user’s information access behavior, an ontological profile is created, which is also used for personalization. If the system is deployed for web information gathering, search performance can be improved and accurate results can be retrieved.

Author 1: Dr.M. Thangaraj
Author 2: Mrs.Mchamundeeswari

Keywords: Agent; Personalization; Semantic web; information retrieval; ranking algorithm

PDF

Paper 17: Social Learners’ Profiles in a Distance Learning System Powered by a Social Network

Abstract: This work is integrated into the general problem of the research systems of distance learning; and more particularly in the monitoring and the positioning of social profile learners in a distance learning system powered by a social network. In this article, we propose a model multi-entry to determine the learners’ profile and positioning his social type. This template allows you to exploit the different traces generated by a learner in the platform and produce indicators on his own profile. Our approach leverages the tools of the fuzzy set theory, the modal and temporal logic. The motivation of this research is to create a tool which helps the tutor to better observe and follow the actions of the learners at the level of the learning platform, and to anticipate potential discouragements or abandonment of the learner.

Author 1: HROR Naoual
Author 2: OUMAIRA Ilham/MESSOUSSI Rochdi

Keywords: Distance learning system; Social profile; Traces; fuzzy; social network

PDF

Paper 18: Regression Testing Cost Reduction Suite

Abstract: The estimated cost of software maintenance exceeds 70 percent of total software costs [1], and large portion of this maintenance expenses is devoted to regression testing. Regression testing is an expensive and frequently executed maintenance activity used to revalidate the modified software. Any reduction in the cost of regression testing would help to reduce the software maintenance cost. Test suites once developed are reused and updated frequently as the software evolves. As a result, some test cases in the test suite may become redundant when the software is modified over time since the requirements covered by them are also covered by other test cases. Due to the resource and time constraints for re-executing large test suites, it is important to develop techniques to minimize available test suites by removing redundant test cases. In general, the test suite minimization problem is NP complete. This paper focuses on proposing an effective approach for reducing the cost of regression testing process. The proposed approach is applied on real-time case study. It was found that the reduction in cost of regression testing for each regression testing cycle is ranging highly improved in the case of programs containing high number of selected statements which in turn maximize the benefits of using it in regression testing of complex software systems. The reduction in the regression test suite size will reduce the effort and time required by the testing teams to execute the regression test suite. Since regression testing is done more frequently in software maintenance phase, the overall software maintenance cost can be reduced considerably by applying the proposed approach.

Author 1: Mohamed Alaa El-Din
Author 2: Ismail Abd El-Hamid Taha
Author 3: Hesham El-Deeb

Keywords: Software maintenance cost; reduced test suite; reduced regression test suite; regression testing cost reduction

PDF

Paper 19: Discovering a Secure Path in MANET by Avoiding Black Hole Attack

Abstract: In a mobile ad hoc network (MANET), a source node must rely on intermediate nodes to forward its packets along multi-hop routes to the destination node. Due to the lack of infrastructure in such networks, secure and reliable packet delivery is challenging. The performance of a Mobile Ad hoc Network (MANET) is closely related to the capability of the implemented routing protocol to adapt itself to unpredictable changes of topology network and link status. One of this routing protocol is OLSR [1] (Optimized Link State Routing Protocol) which assumes that all nodes are trusted. However, in hostile environnement, the OLSR is known to be vulnerable to various kinds of malicious attacks. This paper proposes a cooperative black hole attack against MANETs exploiting vulnerabilities of OLSR. In this attack, two attacking nodes cooperate in order to disrupt the topology discovery and prevent routes to a target node from being established in the network.

Author 1: Hicham Zougagh
Author 2: Ahmed Toumanari
Author 3: Rachid Latif
Author 4: Y. Elmourabit
Author 5: Noureddine Idboufker

Keywords: MANET; OLSR; Security; Routing Protocol Cooperative black hole attack

PDF

Paper 20: Secure Deletion of Data from SSD

Abstract: The deletion of data from storage is an important component on data security. The deletion of entire disc or special files is well-known on hard drives, but this is quite different on SSDs, because they have a different architecture inside, and the main problem is if they serve the same methods like hard drives for data deletion or erasing. The built-in operations are used to do this on SSDs. The purpose of this review is to analyses some methods which are proposed to erase data form SSDs and their results too, to see which of them offers the best choice. In general we will see that the techniques of erasing data from entire disc from hard drives can be used also on SSDs, but there’s a problem with bugs. On the other hand, we cannot use the same techniques of erasing a file from hard drives and SSDs. To make this possible, there are required changes in FTL layer, which is responsible for mapping between logic addresses and physical addresses.

Author 1: Akli Fundo
Author 2: Aitenka Hysi
Author 3: Igli Tafa

Keywords: deletion-data; SSD; FTL layer; logic address; physical address

PDF

Paper 21: Cost-Effective Smart Metering System for the Power Consumption Analysis of Household

Abstract: This paper deals with design, calibration, experimental implementation and validation of cost-effective smart metering system. Goal was to analyse power consumption of the household with the immediate availability of the measured information utilizing modern networked and mobile technologies. Research paper outlines essential principles of the measurement process, document theoretical and practical aspects which are important for the construction of such smart meter and finally, results from the experimental implementation has been evaluated and validated.

Author 1: Michal Kovalcík
Author 2: Peter Fecilak
Author 3: František Jakab
Author 4: Jozef Dudiak
Author 5: Michal Kolcun

Keywords: electrical voltage; electrical current; active power; measurement principles; intelligent metering system; smart meter; Atmel

PDF

Paper 22: Information Communication Technology Adoption in Higher Education Sector of Botswana: a Case of Botho University

Abstract: Opportunities, benefits and achievements are emerging factors for institutions, lecturers, and learners from the increasing availability of Information Communication Technologies (ICT). These factors are relevant especially for new and growing higher educational institutions (HEI) whose survival depends on, among other factors, the use of ICT to develop new organizational models to enhance their internal and external communication relationship and produce quality graduates. Given the relevance of the topic, the researchers studied positive impact of the adoption of ICT by higher educational institutions in an attempt to justify the use of ICT. In this paper, adoption refers to institutions migrating from traditional modes of paper based school management and student engagement to a computerized environment. This shift is hoped to enhance academic development and flexibility, increase level of student engagement, enhance cost-effectiveness, and create a sustainable environment through interactive learning resources. Although the study was conducted at a single institution (i.e. Botho University), it restricts its focus exclusively to the educational motivations for institutions to adopt ICT. In order to ascertain the current state of knowledge, an extensive review, analysis, and synthesis of the collected data and literature have been undertaken. The authors conclude the paper by identifying and examining potential benefits and achievements of institutions in adopting ICT.

Author 1: Clifford Matsoga Lekopanye
Author 2: Alpheus Mogwe

Keywords: ICT; Adoption; e-learning; Education

PDF

Paper 23: Improving TCP Throughput Using Modified Packet Reordering Technique (MPRT) Over Manets

Abstract: at the beginning of development of network technology TCP transport agent were designed assuming that communication is using wired network, but recently there is huge demand and use of wireless networks for communication. Those TCP variants which are successful in wired networks are neither able to detect exact causes of packet losses nor unnecessary transmission delays over wireless networks. The biggest challenge over MANET is design of robust and reliable TCP variant which should give best performance in different network scenarios. Till date more than dozens of TCP variants designed and modified by researcher and scientist communities even though the level of TCP performance have to be optimum in different scenarios, Such as congestion, link failure, signal loss and interferences. Over rod, grid and bulk network model also. As some of TCP-variant performs well in particular network scenarios but degrades in other scenarios. The objective of this research work, to modify packet reordering technique based TCP variant, implement and compare its performance with other variants. Validation of basic and main network model done using network simulator (NS2) and calculated throughput, delay and packet drop by processing trace files. The simulated result shows that, proposed technique performs outstanding almost in all network scenarios with minimum packet losses and minimum delay.

Author 1: Prakash B. Khelage
Author 2: Dr. Uttam D. Kolekar

Keywords: TCP; MANET; RTT; RTO; Congestion; Network validation model

PDF

Paper 24: Local and Semi-Global Feature-Correlative Techniques for Face ?Recognition

Abstract: Face recognition is an interesting field of computer vision with many commercial and ?scientific applications. It is considered as a very hot topic and challenging problem at the ?moment. Many methods and techniques have been proposed and applied for this purpose, ?such as neural networks, PCA, Gabor filtering, etc. Each approach has its weaknesses as ?well as its points of strength. This paper introduces a highly efficient method for the ?recognition of human faces in digital images using a new feature extraction method that ?combines the global and local information in different views (poses) of facial images. ?Feature extraction techniques are applied on the images (faces) based on Zernike moments ?and structural similarity measure (SSIM) with local and semi-global blocks. Pre-processing ?is carried out whenever needed, and numbers of measurements are derived. More ?specifically, instead of the usual approach for applying statistics or structural methods ?only, the proposed methodology integrates higher-order representation patterns extracted ?by Zernike moments with a modified version of SSIM (M-SSIM). Individual measurements and metrics resulted from mixed SSIM and Zernike-based approaches give a powerful ?recognition tool with great results. Experiments reveal that correlative Zernike vectors give ?a better discriminant compared with using 2D correlation of the image itself. The ?recognition rate using ORL Database of Faces reaches 98.75%, while using FEI ??(Brazilian) Face Database we got 96.57%. The proposed approach is robust against ?rotation and noise.?

Author 1: Asaad Noori Hashim
Author 2: Zahir M. Hussain

Keywords: Zernike Moments; Face Recognition; Structural Similarity

PDF

Paper 25: Activity Based Learning Kits for Children in a Disadvantaged Community According to the Project “Vocational Teachers Teach Children to Create Virtuous Robots from Garbage”

Abstract: This research was aimed to develop and evaluate the activity based learning kits for children in a disadvantaged community according to the project “Vocational Teachers Teach Children to Create Virtuous Robots from Garbage”, to examine the learning achievement, to measure the satisfaction and to do an authentic assessment of children as regards the learning kits. The researchers chose the sampling group purposively out of children aged 4-14 years in the community under bridge zone 1 who could participate in the summer activity in the academic year 2013. The sampling group consisted of 40 children. Statistical tools in this research included mean and standard deviation. The results showed that the content quality was good (x ¯ = 4.40, S.D. = 0.55), the presentation quality was good (x ¯ = 4.46, S.D. = 0.68). After learning with the learning kits , the children in the disadvantaged community could achieve higher post-test score than pre-test score with statistical significance at a .05 level. The children expressed the highest level of satisfaction towards the learning kits (x ¯ = 4.57, S.D. = 0.58). The authentic assessment of children as regards the learning kits was at a good level (x ¯ = 4.43, S.D. = 0.51 and this complied with the hypotheses. Therefore, the activity based learning kits are useful and could be used in other nearby communities.

Author 1: Kuntida Thamwipat
Author 2: Pornpapatsorn Princhankol
Author 3: Thanakarn Khumphai
Author 4: Vitsanu Sudsangket

Keywords: Activity Based Learning Kits; Children in a Disadvantaged Community; Virtuous Robots; Garbage

PDF

Paper 26: Reconsideration of Potential Problems of Applying EMIM for Text Analysis

Abstract: It seems that the term dependence methods developed using the expected mutual information measure (EMIM) have not achieved their potential in many areas of science, involving statistical text analysis or document processing. This study examines the reasons for the failure and highlights potential problems of applications. Several interesting questions are arisen, including, does a term provide any information if it occurs in all the sample documents? how the mutual information of two terms, under their status values, makes contribution to EMIM? are two terms highly dependent for their co-occurrence if they receive a high positive EMIM value? what may imply for dependence of two term pairs when they receive the same EMIM value? how can properly verify two terms to be high dependent for their cooccurrence? how can properly apply EMIM? does the size of the sample set matter? This study attempts to answer these questions in order to clarify confusions caused by the problems and/or suggest solutions to the problems. Some interesting examples are provided to clarify our viewpoints.

Author 1: D. Cai

Keywords: text analysis; term dependence; term co-occurrence; the expected mutual information measure (EMIM).

PDF

Paper 27: Multilabel Learning for Automatic Web Services Tagging

Abstract: Recently, some web services portals and search engines as Biocatalogue and Seekda!, have allowed users to manually annotate Web services using tags. User Tags provide meaningful descriptions of services and allow users to index and organize their contents. Tagging technique is widely used to annotate objects in Web 2.0 applications. In this paper we propose a novel probabilistic topic model (which extends the CorrLDA model - Correspondence Latent Dirichlet Allocation-) to automatically tag web services according to existing manual tags. Our probabilistic topic model is a latent variable model that exploits local correlation labels. Indeed, exploiting label correlations is a challenging and crucial problem especially in multi-label learning context. Moreover, several existing systems can recommend tags for web services based on existing manual tags. In most cases, the manual tags have better quality. We also develop three strategies to automatically recommend the best tags for web services. We also propose, in this paper, WS-Portal; An Enriched Web Services Search Engine which contains 7063 providers, 115 sub-classes of category and 22236 web services crawled from the Internet. In WS-Portal, severals technologies are employed to improve the effectiveness of web service discovery (i.e. web services clustering, tags recommendation, services rating and monitoring). Our experiments are performed out based on real-world web services. The comparisons of Precision@n, Normalised Discounted Cumulative Gain (NDCGn) values for our approach indicate that the method presented in this paper outperforms the method based on the CorrLDA in terms of ranking and quality of generated tags.

Author 1: Mustapha AZNAG
Author 2: Mohamed QUAFAFOU
Author 3: Zahi JARIR

Keywords: Web services, Tags, Automatic, Recommendation, Machine Learning, Topic Models.

PDF

Paper 28: cFireworks: a Tool for Measuring the Communication Costs in Collective I/O

Abstract: Nowadays, many HPC systems use the multi-core system as a computational node. Predicting the communication performance of multi-core cluster systems is complicated job, but finding out it is important to use multi-core system efficiently. In the previous study, we introduced the simple linear regression models for predicting the communication costs in collective I/O. In the models, however, because it is important to get the communication characteristics of the given system, we designed cFireworks, an MPI application to measure the communication costs of HPC systems. In this paper, we explain the detail concept and experimental results of cFireworks. The performance evaluation showed that the expected communication costs with the linear regression models generated by using the output of cFireworks are reasonable to use.

Author 1: Kwangho Cha

Keywords: Collective I/O; Communication Costs; Parallel Computing; Parallel I/O

PDF

Paper 29: Measuring Term Specificity Information for Assessing Sentiment Orientation of Documents in a Bayesian Learning Framework

Abstract: The assessment of document sentiment orientation using term specificity information is advocated in this study. An interpretation of the mathematical meaning of term specificity information is given based on Shannon’s entropy. A general form of a specificity measure is introduced in terms of the interpretation. Sentiment classification using the specificity measures is proposed within a Bayesian learning framework, and some potential problems are clarified and solutions are suggested when the specificity measures are applied to estimation of posterior probabilities for the NB classifier. A novel method is proposed which allows each document to have multiple representations, each of which corresponds to a sentiment class. Our experimental results show, while both the proposed method and IR techniques can produce high performance for sentiment classification, that our method outperforms the IR techniques.

Author 1: D. Cai

Keywords: term specificity information; specificity measure; naive Bayes classifier; sentiment classification.

PDF

The Science and Information (SAI) Organization
BACK TO TOP

Computer Science Journal

  • About the Journal
  • Call for Papers
  • Submit Paper
  • Indexing

Our Conferences

  • Computing Conference
  • Intelligent Systems Conference
  • Future Technologies Conference
  • Communication Conference

Help & Support

  • Contact Us
  • About Us
  • Terms and Conditions
  • Privacy Policy

© The Science and Information (SAI) Organization Limited. All rights reserved. Registered in England and Wales. Company Number 8933205. thesai.org