The Science and Information (SAI) Organization
  • Home
  • About Us
  • Journals
  • Conferences
  • Contact Us

Publication Links

  • IJACSA
  • Author Guidelines
  • Publication Policies
  • Digital Archiving Policy
  • Promote your Publication
  • Metadata Harvesting (OAI2)

IJACSA

  • About the Journal
  • Call for Papers
  • Editorial Board
  • Author Guidelines
  • Submit your Paper
  • Current Issue
  • Archives
  • Indexing
  • Fees/ APC
  • Reviewers
  • Apply as a Reviewer

IJARAI

  • About the Journal
  • Archives
  • Indexing & Archiving

Special Issues

  • Home
  • Archives
  • Proposals
  • Guest Editors
  • SUSAI-EE 2025
  • ICONS-BA 2025
  • IoT-BLOCK 2025

Future of Information and Communication Conference (FICC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Computing Conference

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Intelligent Systems Conference (IntelliSys)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Future Technologies Conference (FTC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact
  • Home
  • Call for Papers
  • Editorial Board
  • Guidelines
  • Submit
  • Current Issue
  • Archives
  • Indexing
  • Fees
  • Reviewers
  • Subscribe

IJACSA Volume 2 Issue 9

Copyright Statement: This is an open access publication licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.

View Full Issue

Paper 1: Evaluation of the Segmentation by Multispectral Fusion Approach with Adaptive Operators: Application to Medical Images

Abstract: With the development of acquisition image techniques, more and more image data from different sources of image become available. Multi-modality image fusion seeks to combine information from different images to obtain more inferences than can be derived from a single modality. In medical imaging based application fields, image fusion has emerged as a promising research area since the end of the last century. The paper presents the evaluation of the segmentation of MR images using the multispectral fusion approach in the possibility theory context . Some results are presented and discussed.

Author 1: Lamiche Chaabane
Author 2: Moussaoui Abdelouahab

Keywords: image fusion; possibility theory; segmentation; MR images.

PDF

Paper 2: Towards an Adaptive Learning System Based on a New Learning Object Granularity Approach

Abstract: To achieve the adaptability required in ALS, adaptive learning system (ALS) takes advantage of granular and reusable content. The main goal of this paper is to examine the learning object granularity issue which is directly related with Learning Object (LO) reusability and the adaptability process required in ALS. For that purpose, we present the learning objects approach and the related technologies. Then, we discuss the fine-grained as a fundamental characteristic to reach the adaptability and individualization required in ALS. After that, we present some learning object granularity approaches in the literature before presenting our granularity approach. Finally, we propose an example of implementation of our approach to test its ability to meet the properties associated with fine-grained and adaptability.

Author 1: Amal Battou
Author 2: Ali El Mezouary
Author 3: Chihab Cherkaoui
Author 4: Driss Mammass

Keywords: aaptability; learning Content; adaptive learning systems, learning object; granularit;y learning content.

PDF

Paper 3: An Efficient Scheme for MANET Domain Formation (ESMDF)

Abstract: Mobile Ad hoc Network (MANET) has random topology as MANET devices leaving or joining to the network at anytime. The dynamic nature of MANETs makes achieving secrecy, connectivity and high performance, a big challenge and a complex task. In this paper, we proposed an efficient technique for Dynamic construction of large MANET based on division the network into interoperable domains. This technique is a hybrid of centralized and distributed control of packets forwarding that balances power consumption, minimizes the routing tables and improves the security features. The principles of domain formation based on joining adjacent devices into one group which controlled by one capable device called domain controller. The presented scheme enhances the throughput and the stability of large MANET by minimizing the flooding of messages for keeping track of Devices and during the domain formation.

Author 1: Adwan AbdelFattah

Keywords: MANET; ESMDF; Domain; Domain Router; Domain Formation.

PDF

Paper 4: Backup Communication Routing Through Internet Satellite, WINDS for Transmitting of Disaster Relief Data

Abstract: A countermeasure for round trip delay which occurs in between satellite and ground with network accelerator is investigated together with operating system dependency on effectiveness of accelerator. Also disaster relief data transmission experiments are conducted for mitigation of disaster together with acceleration of disaster related data transmission between local government and disaster prevention center. Disaster relief information including remote sensing satellite images and information from the disaster occurred areas to local government for creation of evacuation information is accelerated so that it becomes possible to send them to the residents in the suffered areas due to disaster through data broadcasting in the digital TV channel.

Author 1: Kohei Arai

Keywords: internet satellite; disaster mitigation; TCP/IP protocol; accerelator.

PDF

Paper 5: Embedded Object Detection with Radar Echo Data by Means of Wavelet Analysis of MRA: Multi-Resolution Analysis

Abstract: A method for embedded object detection with radar echo data by means of wavelet analysis of MRA: Multi-Resolution Analysis, in particular, three dimensional wavelet transformations is proposed. In order to improve embedded object detecting capability, not only one dimensional radar echo data but also three dimensional data are used. Through a comparison between one dimensional edge detection with Sobel operator and three dimensional wavelet transformation based edge detection, it is found that the proposed method is superior to the Sobel operator based method

Author 1: Kohei Arai

Keywords: Three dimensional wavelet transformation; Radar echo data; wavelet MRA; Edge detection.

PDF

Paper 6: An improved Approach for Document Retrieval Using Suffix Trees

Abstract: Huge collection of documents is available at few mouse clicks. The current World Wide Web is a web of pages. Users have to guess possible keywords that might lead through search engines to the pages that contain information of interest and browse hundreds or even thousands of the returned pages in order to obtain what they want. In our work we build a generalized suffix tree for our documents and propose a search technique for retrieving documents based on a sort of phrase called word sequences. Our proposed method efficiently searches for a given phrase (with missing or additional words in between) with better performance.

Author 1: N Sandhya
Author 2: A. Govardhan
Author 3: Y. Sri Lalitha
Author 4: K. Anuradha

Keywords: Document retrieval; Frequent Word Sequences; Suffix tree; Traversal technique.

PDF

Paper 7: Polarimetric SAR Image Classification with High Frequency Component Derived from Wavelet Multi Resolution Analysis: MRA

Abstract: A method for polarimetric Synthetic Aperture Radar: SAR image classification with high frequency component derived from wavelet Multi-Resolution Analysis: MRA is proposed. Although it is well known that polarization signature derived from fully polarized SAR data is useful for SAR image classifications, it is still unknown how to utilize the polarization signature in the image classification. High frequency component of the polarization signature calculated with the fully polarized SAR data is taken as one of the features utilizing in the classification into account. Thus improvement of classification performance is achieved for the proposed classification method of which such feature is included in the feature space for the Maximum Likelihood based classification method.

Author 1: Kohei Arai

Keywords: polarimetric SAR; polarization signature; wavelet MRA.

PDF

Paper 8: A New Reliability Model for Evaluating Trustworthiness of Intelligent Agents in Vertical Handover

Abstract: Our previous works have proposed the deployment of mobile agents to assist vertical handover decisions in 4G. Adding a mobile agent in the 4G could lead to many advantages such as reduced consumption of network bandwidth, delay in network latency and reduction in the time taken to complete a particular task. However, this deployment demands that the deployed collection of agents shall be secure and trustworthy. Security of a mobile agent includes maintaining confidentiality, reality and integrity of not only the agent employed but also the system in which it is deployed. In fact, many conventional security solutions exists, however, very few of them addresses the challenge of introducing trusted computing in mobile agents, deployed in 4G, in particular. This paper proposes a new reliability model by implementing trust certificate for mobile agents in vertical handover.

Author 1: Kailash Chander
Author 2: Dimple Juneja

Keywords: Trust Certificate; Mobile Agents; Vertical Handover; Secure Network.

PDF

Paper 9: Some New Results about The Period of Recurring Decimal

Abstract: This study mainly discusses period problem of recurring decimals.According to Euler theorem, this paper gives the computation formula of period of recurring decimal, relation of the period and least positive period, and the necessary and sufficient condition that the period is eaqual to least positive period.

Author 1: Bo Zhang

Keywords: Recurring decimal;Period;Prime.

PDF

Paper 10: Hierarchical Cellular Structures in High-Capacity Cellular Communication Systems

Abstract: In the prevailing cellular environment, it is important to provide the resources for the fluctuating traffic demand exactly in the place and at the time where and when they are needed. In this paper, we explored the ability of hierarchical cellular structures with inter layer reuse to increase the capacity of mobile communication network by applying total frequency hopping (T-FH) and adaptive frequency allocation (AFA) as a strategy to reuse the macro and micro cell resources without frequency planning in indoor pico cells [11]. The practical aspects for designing macro- micro cellular overlays in the existing big urban areas are also explained [4]. Femto cells are inducted in macro / micro / pico cells hierarchical structure to achieve the required QoS cost effectively.

Author 1: R K Jain
Author 2: Sumit Katiyar
Author 3: N. K. Agrawal Sr Sr M IEEE

Keywords: Hierarchical cellular structures; Total frequency hopping; Adaptive frequency allocation; Communication system traffic; Code division multiple access (CDMA).

PDF

Paper 11: Hybrid Query by Humming and Metadata Search System (HQMS) Analysis over Diverse Features

Abstract: Retrieval of music content over web is one of the toughest job tasks and found some of the significant challenge. Song retrieval over web is the emerging problem from the category of Music Information Retrieval. Several searching techniques related to metadata and content of song are developed and implemented. In this paper we are going to propose and evaluate a new hybrid technique for song retrieval named as “hybrid query by humming and metadata search system” (HQMS).HQMS is a hybrid model that is based on metadata and query by humming. HQMS narrow downs the relevant results thus improve overall accuracy of the system. Two filters, metadata and query by humming work together and enhances overall accuracy. The system is evaluated song wise, metadata wise and Age wise. Issues related to query reformulation are also highlighted as a part of the paper. More over the evaluation validates the hypothesis and the proposed Architecture.

Author 1: Nauman Ali Khan
Author 2: Mubashar Mushtaq

Keywords: Query by humming; Metadata; MIR; Hybrid system; Pipe and Filter; Evaluation.

PDF

Paper 12: Semantic Retrieval Approach for Web Documents

Abstract: Because of explosive growth of resources in the internet, the information retrieval technology has become particularly important. However the current retrieval methods are essentially based on the full text matching of keywords approach lacking of semantic information and can’t understand the user's query intent very well. These methods return a large number of irrelevant information, and are unable to meet the user's request. Systems have been established so far failed to overcome fully the limitations of search based on keywords. Such systems are built from variations of classic models that represent information by keywords. Using Semantic Web is a way to increase the precision of information retrieval systems. In this paper, we propose the semantic information retrieval approach to extract the information from the web documents in certain domain (jaundice diseases) by collecting the domain relevant documents using focused crawler based on domain ontology, and using similar semantic content that is matched with a given user’s query. Semantic retrieval approach aims to discover semantically similar terms in documents and query terms using WordNet.

Author 1: Hany M Harb
Author 2: Khaled M. Fouad
Author 3: Nagdy M. Nagdy

Keywords: Semantic Web; information retrieval; Semantic Retrieval; Semantic Similarity; WordNet.

PDF

Paper 13: Prediction of Users Behavior through Correlation Rules

Abstract: Web usage mining is an application of Web mining which focus on the extraction of useful information from usage data of severs logs. In order to improve the usability of a Web site so that users can more easily find and retrieve information they are looking for, we proposed a recommendation methodology based on correlation rules. A correlation rule is measured not only by its support and confidence but also by the correlation between itemsets. Proposed methodology recommends interesting Web pages to the users on the basis of their behavior discovered from web log data. Association rules are generated using FP growth approach and we used two criteria for selecting interesting rules: Confidence and Cosine measure. We also proposed an algorithm for the recommendation process.

Author 1: Navin Kumar Tyagi
Author 2: A. K. Solanki

Keywords: Web usage mining; FPgrowth; Cosine measure; Usability; Association rules.

PDF

Paper 14: EGovernment Stage Model: Evaluating the Rate of Web Development Progress of Government Websites in Saudi Arabia

Abstract: This paper contributes to the issue of eGovernment implementation in Saudi Arabia by discussing the current situation of ministry websites. It evaluates the rate of web development progress of vital government websites in Saudi Arabia using the eGovernment stage model. In 2010, Saudi Arabia ranked 58th in the world and 4th in the Gulf region in eGovernment readiness according to United Nations reports. In particular, Saudi Arabia has ranked 75th worldwide for its online service index and its components compared to the neighbouring Gulf country of Bahrain, which was ranked 8th for the same index. While this is still modest in relation to the Saudi government’s expectation concerning its vision for eGovernment implementation for 2010, and the results achieved by the neighbouring Gulf countries such as Bahrain and the United Arab Emirates on the eGovernment index, the Saudi government has endeavoured to meet the public needs concerning eGovernment and carry out the implementation of eGovernment properly. Governments may heed the importance of actively launching official government websites – the focus of this study – as the main portals for delivering their online services to all the different categories of eGovernment (including G2C, G2B, and G2G). However, certain Saudi ministries have not given due attention to this vital issue. This is evidenced by the fact that some of their websites are not fully developed or do not yet exist, which clearly impedes that particular ministry from appropriately delivering eServices.

Author 1: Osama Alfarraj
Author 2: Steve Drew
Author 3: Rayed Abdullah AlGhamdi

Keywords: eGovernment; Saudi Arabia government websites; web development progress; eGovernment stage model.

PDF

Paper 15: Analysis of k-Coverage in Wireless Sensor Networks

Abstract: Recently, a concept of wireless sensor networks has attracted much attention due to its wide-range of potential applications. Wireless sensor networks also pose a number of challenging optimization problems. One of the fundamental problems in sensor networks is the coverage problem, which reflects the quality of service that can be provided by a particular sensor network. The coverage concept is depending from several points of view due to a variety of sensors and a wide-range of their applications. One fundamental issue in sensor networks is the coverage problem, which reflects how well a sensor network is monitored or tracked by sensors. In this paper, we formulate this problem as a decision problem, whose goal is to determine the degree of coverage of a sensor network, which is covered by at least k sensors, where k is a predefined value. The sensing ranges of sensors can be same or different. Performance evaluation of our protocol indicates that degree of coverage of wireless sensor networks can be determined within small period of time. Therefore energy consumption of the sensor networks can be minimized.

Author 1: Rasmi Ranjan Patra
Author 2: Prashanta Kumar Patra

Keywords: Wireless sensor networks; coverage; k-coverage; connectivity.

PDF

Paper 16: PSO Based Short-Term Hydrothermal Scheduling with Prohibited Discharge Zones

Abstract: This paper presents a new approach to determine the optimal hourly schedule of power generation in a hydrothermal power system using PSO technique.. The simulation results reveal that the proposed PSO approach appears to be the powerful in terms of convergence speed, computational time and minimum fuel cost.

Author 1: G Sreenivasan
Author 2: C.H.Saibabu
Author 3: S.Sivanagaraju

Keywords: Hydrothermal scheduling; Particle Swarm Optimization; Valve - point loading effect; Prohibited Discharge Zones.

PDF

Paper 17: mSCTP Based Decentralized Mobility Framework

Abstract: To conceive the full potential of wireless IP services, Mobile Nodes (MNs) must be able to roam seamlessly across different networks. Mobile Stream Control Transmission Protocol (mSCTP) is a transport layer solution, which unlike Mobile IP (MIP), provides seamless mobility with minimum delay and negligible packet loss. However, mSCTP fails to locate the current IP address of the mobile node when Correspondent Node (CN) wants to initiate a session. In this paper, we propose DHT Chord to provide the required location management. Chord is a P2P algorithm, which can efficiently provide the IP address of the called MN by using its key-value mapping. The proposed decentralized mobility framework collectively exploits the multihoming feature of mSCTP, and efficient key-value mapping of chord to provide seamless mobility. Suitability of the framework is analyzed by preliminary analysis of chord lookup efficiency, and mSCTP handover procedure using overlay weaver and NS-2. Performance analysis shows that mSCTP multihoming feature and Chord efficient key-value mapping can provide a non-delayed, reliable, and an efficient IP handover solution.

Author 1: Waqas A Imtiaz
Author 2: M. Afaq
Author 3: Mohammad A.U. Babar

Keywords: mSCTP; Chord; Multihoming; Seamless mobility.

PDF

Paper 18: Audio Watermarking with Error Correction

Abstract: In recent times, communication through the internet has tremendously facilitated the distribution of multimedia data. Although this is indubitably a boon, one of its repercussions is that it has also given impetus to the notorious issue of online music piracy. Unethical attempts can also be made to deliberately alter such copyrighted data and thus, misuse it. Copyright violation by means of unauthorized distribution, as well as unauthorized tampering of copyrighted audio data is an important technological and research issue. Audio watermarking has been proposed as a solution to tackle this issue. The main purpose of audio watermarking is to protect against possible threats to the audio data and in case of copyright violation or unauthorized tampering, authenticity of such data can be disputed by virtue of audio watermarking.

Author 1: Aman Chadha
Author 2: Sandeep Gangundi
Author 3: Rishabh Goel
Author 4: Hiren Dave

Keywords: watermarking; audio watermarking; data hiding; data confidentiality.

PDF

Paper 19: Development of a Computer Aided Transport Monitoring System (CATRAMS) for Manufacturing Organizations

Abstract: Presently, there are different types of monitoring systems and devices being used to monitor vehicles, products, processes and activities in manufacturing organizations. Each of these devices has their unique strengths and weaknesses but one problem that is common to them is that there is no knitted relationship between the devices and parameters necessary for effective and efficient monitoring system. Therefore, there is the need to develop a system that will address this shortcoming. CATRAMS is an integration of computer and communication facilities to monitor and control movement of vehicles and goods. Its objectives are to provide detail information on movement of vehicles and reduce likely operational delays associated with movement of vehicles and goods. The development of the system was carried out by studying some existing devices to know their limitations, designing of road transport database, specifying hardware requirements and integrating the hardware and software resources to make a complete system. The system was tested using data collected from some manufacturing industries and it was found out that detail information about movement of vehicles and goods could be provided by the system.

Author 1: Dipo Theophilus Akomolafe

Keywords: transport; manufacturing; database; hardware; communication, route; goods; passengers.

PDF

Paper 20: The Performance between XEN-HVM, XEN-PV and Open-VZ during live-migration

Abstract: The aim of this paper is to compare the performance between three hypervisors: XEN-PV, XEN-HVM and Open-VZ. We have simulated the migration of a virtual machine by using a warning failure approach. Based on some experiments we have compared CPU Consumption, Memory Utilization, Total Migration Time and Downtime. We have also tested the hypervisor’s performance by changing the packet’s size from 1500 byte to 64 byte. From these tests we have concluded that Open-VZ has a bigger CPU Consumption than XEN-PV, but the Total Migration time is smaller than in XEN-PV. XEN-HVM has a worse performance than XEN-PV, especially regarding to Downtime parameter.

Author 1: Igli Tafa
Author 2: Elinda Kajo
Author 3: Ariana Bejleri
Author 4: Olimpjon Shurdi

Keywords: Hypervisor; XEN-PV; XEN-HVM; Open-VZ; CPU Consumption; Memory Utilization; Downtime.

PDF

Paper 21: An Ontology Based Reuse Algorithm towards Process Planning in Software Development

Abstract: The process planning task for specified design provisions in software development can be significantly developed by referencing the knowledge reuse scheme. Reuse is considered to be one of the most promising techniques to improve software excellence and productivity. Reuse during software development depends much on the existing design knowledge in meta-model, a “read only” repository of information. We have proposed, an ontology based reuse algorithm towards process planning in software development. According to the common conceptual base facilitated by ontology and the characteristics of knowledge, the concepts and the entities are represented into meta-model and endeavor prospects. The relations between these prospects and its linkage knowledge are used to construct an ontology based reuse algorithm. In addition, our experiment illustrates realization of process planning in software development by practicing this algorithm. Subsequently, its benefits are delineated.

Author 1: Shilpa Sharma
Author 2: Maya Ingle

Keywords: Ontological Knowledge Modeling; OntoReuseAlgo; Ontolayering Principle.

PDF

Paper 22: Room Impulse Response Modeling in the Sub-2kHz Band using 3-D Rectangular Digital Waveguide Mesh

Abstract: Digital waveguide mesh has emerged as an efficient and straightforward way to model small room impulse response because it solves the wave equation directly in the time domain. In this paper, we investigate the performance of the 3-D rectangular digital waveguide mesh in modeling the low frequency portion of room impulse response. We find that it has similar performance compared to the popular image source method when modeling the low frequency portion of the early specular reflections of the room impulse responses.

Author 1: Zhixin Chen

Keywords: Embedded Systems; Digital Signal Processing; Room Acoustics.

PDF

Paper 23: E-learning as a Research Area: An Analytical Approach

Abstract: The concept of E-learning is very broad. It was coined in late 90s as the technological enhanced learning mechanism through Internet. Now it captures a broad range of electronic media like Internet, Intranets, Extranets, satellite broadcast, audio/video tape, interactive TV and CD-ROM to make the learning procedure more flexible and user friendly. Because of the flexible nature of E-learning, it has got more demand among the people of our country and the demand is increasing day by day. As the demand is increasing, this is the time to standardize the whole e-learning system in a proper way and the time to increase the quality of existing standards. Though many standards are already there and has accepted by many academia, institutes and organisations, still there are some gaps and works are going on to make them more practicable and more systematic.This paper analyses the current e-learning procedure and showing the new dimension of research work on this area that follows the important and most neglected research areas till today in this domain. It also analyses the importance of e-education system and recent market of e-learning procedure.

Author 1: Sangeeta Kakoty
Author 2: Monohar Lal
Author 3: Shikhar Kr. Sarma

Keywords: E-learning; learning standards; technology enhanced learning procedure; e-education system; dimension of research areas.

PDF

The Science and Information (SAI) Organization
BACK TO TOP

Computer Science Journal

  • About the Journal
  • Call for Papers
  • Submit Paper
  • Indexing

Our Conferences

  • Computing Conference
  • Intelligent Systems Conference
  • Future Technologies Conference
  • Communication Conference

Help & Support

  • Contact Us
  • About Us
  • Terms and Conditions
  • Privacy Policy

© The Science and Information (SAI) Organization Limited. All rights reserved. Registered in England and Wales. Company Number 8933205. thesai.org