The Science and Information (SAI) Organization
  • Home
  • About Us
  • Journals
  • Conferences
  • Contact Us

Publication Links

  • IJACSA
  • Author Guidelines
  • Publication Policies
  • Digital Archiving Policy
  • Promote your Publication
  • Metadata Harvesting (OAI2)

IJACSA

  • About the Journal
  • Call for Papers
  • Editorial Board
  • Author Guidelines
  • Submit your Paper
  • Current Issue
  • Archives
  • Indexing
  • Fees/ APC
  • Reviewers
  • Apply as a Reviewer

IJARAI

  • About the Journal
  • Archives
  • Indexing & Archiving

Special Issues

  • Home
  • Archives
  • Proposals
  • Guest Editors
  • SUSAI-EE 2025
  • ICONS-BA 2025
  • IoT-BLOCK 2025

Future of Information and Communication Conference (FICC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Computing Conference

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Intelligent Systems Conference (IntelliSys)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Future Technologies Conference (FTC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact
  • Home
  • Call for Papers
  • Editorial Board
  • Guidelines
  • Submit
  • Current Issue
  • Archives
  • Indexing
  • Fees
  • Reviewers
  • Subscribe

IJACSA Volume 5 Issue 9

Copyright Statement: This is an open access publication licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.

View Full Issue

Paper 1: Cloud Based Public Collaboration System in Developing Countries

Abstract: Governments in developing countries are increasingly making efforts to provide more access to information and services for citizens, businesses, and civil servants through smart devices. However, providing strategically high impact m-services is facing numerous challenges, such as complexity of different mobile technologies, creating secured networks to deliver reliable service, and identifying the types of services that can be easily provided on mobile devices. Those problems could be solved by applying cloud computing model to the business process of E-government to build a government cloud. This research, proposes an environment for citizens to have greater access to their government and, in theory, makes citizen-to-government contact more inclusive. In addition, it examines an application that allows anyone to report and track non-emergency issues via the internet. It can also encourage citizens to become active in improving and taking care of their community by reporting issues in their neighborhood in order to improve the Egyptian e-government development index.

Author 1: Sherif M. Badr
Author 2: Sherif E. Hussein

Keywords: e-government; m-government; cloud computing

PDF

Paper 2: Energy Efficient Cluster-Based Intrusion Detection System for Wireless Sensor Networks

Abstract: Wireless sensor networks (WSNs) are network type where sensors are used to collect physical measurements. It has many application areas such as healthcare, weather monitoring and even military applications. Security in this kind of networks is a big concern especially in the applications that required confidentiality and privacy. Therefore, providing a WSN with an intrusion detection system is essential to protect its security from different types of intrusions, cyber-attacks and random faults. Clustering has proven its efficiency in prolong the node as well as the whole WSN lifetime. In this paper we have designed an Intrusion Detection (ID) system based on Stable Election Protocol (SEP) for clustered heterogeneous WSNs. The benefit of using SEP is that it is a heterogeneous-aware protocol to prolong the time interval before the death of the first node. KDD Cup’99 data set is used as the training data and test data. After normalizing our dataset, we trained the system to detect four types of attacks which are Probe, Dos, U2R and R2L, using 18 features out of the 42 features available in KDD Cup'99 dataset. The research used the K-nearest neighbour (KNN) classifier for anomaly detection. The experiments determine K = 5 for best classification and this reveals recognition rate of attacks as 75%. Results are compared with KNN classifier for anomaly detection without using a clustering algorithm.

Author 1: Manal Abdullah
Author 2: Ebtesam Alsanee
Author 3: Nada Alseheymi

Keywords: wireless sensor networks WSN; intrusion detection ID; clustering protocols; stable election protocol SEP; KDD cup’99; KKN

PDF

Paper 3: A Study of Multi-Signal Monitoring System Establishment for Hemodynamic Energy Detection

Abstract: Deaths due to cardiovascular diseases are increasing worldwide, and multi-signal monitoring systems to diagnose such diseases are under development. However, only a few researches are underway for devices that monitor hemodynamic energy, which is a marker for pulsatile flow generated by the contraction and relaxation of the heart. Therefore, this study aimed to integrate multiple monitoring devices into a single device, while also incorporating hemodynamic energy monitoring. Blood pressure and flow were measured with two channels each, while electrocardiogram (ECG), photoplethysmography (PPG), and temperature were measured with one channel each. All signals were processed at hardware level, and then converted into analog voltage. The seven signals were then converted into digital signals with a data acquisition board (DAQ). The software was developed with Labview™ (National Instruments, U.S.A) to form a graphic user interface (GUI) on a tablet computer (ACER, U.S.A) through USB 2.0, to allow for monitoring and analysis of the signals obtained. Development of this system successfully formed a multi-signal monitoring system that integrates multiple signals into one device. Future directions include development of cardiovascular diagnosis algorithm and evaluation of the system via preclinical animal experiments.

Author 1: YeonSoo Shin
Author 2: DuckHee Lee
Author 3: ChiBum Ahn
Author 4: SeungJoon Song
Author 5: Kyung Sun

Keywords: Cardiovascular disease; hemodynamic energy; monitoring system; Electrocardiogram; Photoplethysmography; Pressure; Flow

PDF

Paper 4: Numerical Simulation on Damage Mode Evolution in Composite Laminate

Abstract: The present work follows numerous numerical simulation on the stress field analysis in a cracked cross-ply laminate. These results lead us to elaborate an energy criterion. This criterion is based on the computation of the partial strain energy release rate associated with all the three damage types: transverse cracking, longitudinal cracking and delamination. The related criterion, linear fracture based approach, is used to predict and describe the initiation of the different damage mechanisms. With this approach the influence of the nature of the material constituent on the damage mechanism is computed. We also give an assessment of the strain energy release rates associated with each damage mode. This criterion checked on glass-epoxy and graphite-epoxy composite materials will now be used in future research on new bio-based composite in the laboratory.

Author 1: Jean-Luc Rebière

Keywords: numerical simulation; damage mechanism; transverse cracking;longitudinal cracking; delamination; criterion

PDF

Paper 5: A Study on Relationship between Modularity and Diffusion Dynamics in Networks from Spectral Analysis Perspective

Abstract: Modular structure is a typical structure that is observed in most of real networks. Diffusion dynamics in network is getting much attention because of dramatic increasing of the data flows via the www. The diffusion dynamics in network have been well analysed as probabilistic process, but the proposed frameworks still shows the difference from the real observations. In this paper, we analysed spectral properties of the networks and diffusion dynamics. Especially, we focus on studying the relationship between modularity and diffusion dynamics. Our analysis as well as simulation results show that the relative influences from the non-largest eigenvalues and the corresponding eigenvectors increase when modularity of network increases. These results have the implication that, although network dynamics have been often analysed with the approximation manner utilizing only the largest eigenvalue, the consideration of the other eigenvalues is necessary for the analysis of the network dynamics on real networks. We also investigated Node-level Eigenvalue Influence Index (NEII) which can quantify the relative influence from each eigenvalues on each node. This investigation indicates that the influence from each eigenvalue is confined within the modular structures in the network. These findings should be made consideration by researchers interested in diffusion dynamics analysis on real networks for deeper analysis.

Author 1: Kiyotaka Ide
Author 2: Akira Namatame
Author 3: Loganathan Ponnambalam
Author 4: Fu Xiuju
Author 5: Rick Siow Mong Goh

Keywords: complex network; modularity; diffusion; SIS model; graph spectra; eigenvalue and eigenvector

PDF

Paper 6: Hardware Segmentation on Digital Microscope Images for Acute Lymphoblastic Leukemia Diagnosis Using Xilinx System Generator

Abstract: Image segmentation is considered the most critical step in image processing and helps to analyze, infer and make decisions especially in the medical field. Analyzing digital microscope images for earlier acute lymphoblastic leukemia diagnosis and treatment require sophisticated software and hardware systems. These systems must provide both highly accurate and extremely fast processing of large amounts of image data. In this work, the hardware segmentation framework for Acute Lymphoblastic Leukemia (ALL) images based color histogram of Hue channel of HSV color space is proposed to segment each leukemia image into blasts and background using Field Programmable Gate Array (FPGA). The main purpose of this work is to implement image segmentation framework in a FPGA with minimum hardware resources and low execution time to be suitable enough for medical applications. Hardware framework of segmentation is designed using Xilinx System Generator (XSG) as DSP design tool that enables the use of Simulink models, implemented in VHDL and synthesized for Xilinx SPARTAN-3E Starter kit (XC3S500E-FG320) FPGA.

Author 1: Prof. Kamal A. ElDahshan
Author 2: Dr. Emad H. Masameer
Author 3: Prof. Mohammed I. Youssef
Author 4: Mohammed A. Mustafa

Keywords: Medical Image Processing; FPGA; Image Segmentation; Xilinx System Generator

PDF

Paper 7: Sensitive Data Protection on Mobile Devices

Abstract: Nowadays, many mobile devices such as phones and tablets are used in the workplace. A large amount of data is being transferred from one person to another. Data transfer is used for several different fields. Many companies and institutions are focusing on research and development on the way to further protect sensitive data. However, sensitive data still get leaks on mobile devices. To analyze how sensitive data get leak, a simulation on transferring sensitive data is developed. In this paper, we present the analysis of mobile security problem dealing with sensitive data from getting out. The goals in our research are for users to have a greater understanding on how data is being transferred and prevention sensitive data from being stolen. Our work will benefit mobile device users and help to prevent sensitive data from being stolen. Our experiments show different ways to safely transfer information on mobile devices by testing three methods types, which are back-up, encryption, and lock plus wipe data.

Author 1: Fan Wu
Author 2: Chung-han Chen
Author 3: Dwayne Clarke

Keywords: Mobile Security; Sensitive Data; Data Protection

PDF

Paper 8: Architecture of a Mediation System for Mobile Payment

Abstract: Nowadays, the mobile phone has become an indispensable part of our daily. Exceeding the role of a communication apparatus, and benefitting from the evolution of technology, it could be used for several uses other than telephony, energy of photography, the geolocation, until the control of the health condition and the quality of the air, by measuring the cardiac pulsations, the temperature and the ambient content water. In this context, financial institutions wishing to take advantage of this wave of technological change and taking advantage of the telecom infrastructure robust and secure existing began to innovate to offer a new range of payment services based on mobile phone. Thus, in this article we present a proposal for an implementation of a mediation system of payment per mobile based on the technology of the Webservices.

Author 1: Boutahar Jaouad
Author 2: El Hillali Wadii
Author 3: El Ghazi El Houssaïni Souhaïl

Keywords: M-paiement; M-Commerce; Android; Webservices; NFC; Rfid

PDF

Paper 9: Using Social Signal of Hesitation in Multimedia Content Retrieval

Abstract: This paper presents the graphical analysis of selection traces in matrix-factorization space of multimedia items. A trace consists of links (lines) between points that present a selected item during interaction between user and video-on-demand (VoD) system. User used gestures to select from among video on screen (VoD service), while additional user-produced social signal (SS) information was used to recommend more suitable new videos in the process of selection. We used a sample of 42 users, equally split into test (SS considered) and control and random (SS not considered) user groups. We assumed, for each user, there are areas of multimedia items in the matrix-factorization space that include preferred user items, called preferred areas. The results showed that user selection traces in the space of multimedia items (matrix-factorization space) better covered the user’s preferred areas of items if the SS of hesitation was considered.

Author 1: Tomaž Vodlan
Author 2: Andrej Košir

Keywords: Human-computer Interaction; Social Signals; Hesitation; Matrix Factorization; Video-on-Demand; Graphical Analysis

PDF

Paper 10: Study of Chaos in the Traffic of Computer Networks

Abstract: Development of telecommunications technology currently determines the growth of research with an aim to find new solutions and innovative approaches to the mathematical description of the processes. One of the directions in the description of traffic in computer networks is focused on studying the properties of chaotic traffic. We offer a complex method for the dynamic chaos determination. It is suggested to introduce additional indicators based on the absence of trivial conservation laws and weak symmetry breaking. The conclusion is made that dynamic chaos in the example of computer network traffic.

Author 1: Evgeny Nikulchev
Author 2: Evgeniy Pluzhnik

Keywords: chaos; traffic of computer networks; nonlinear dynamics

PDF

Paper 11: Case Study: the Use of Agile on Mortgage Application: Evidence from Thailand

Abstract: This paper presents a case study of a mortgage loan origination project using SCRUM Agile model and Business Process Management and Business Rule Management System (BPMS and BRMS). From the Waterfall model (Stage 1), a web-based self-developed had been developed using opensource frameworks: Spring and Sarasvati. But, several problems were detected and the project failed due to insufficient project management, rapid requirement changes and developer coding skills. The project was continued (Stage 2) selecting a BPMS and BRMS tool. Later, Stage 3 SCRUM was executed with proper project management and the new tool, which suited better for rapid business needs, and minimum coding. An efficient team communication and the frequent delivery of code releases increasingly contributed to the sponsor and user’s satisfaction. However, due to political influenced timeline, inexperienced project management and requirement changes, the budget exceeds and SCRUM is not favored. Nonetheless, Open-end questionnaire and interview results with core team members both business users and developers as well as software usability measurement inventory (SUMI) conducted with 14 users, it shows that SCRUM and the new tool rescue the project. Empirically, this paper demonstrates a method to evaluate the use of Agile augmented with usability measurement to Agile development community.

Author 1: Kreecha Puphaiboon

Keywords: SCRUM; BPM; BRE; Mortgage Loan; LOS; Usability

PDF

Paper 12: XML Schema-Based Minification for Communication of Security Information and Event Management (SIEM) Systems in Cloud Environments

Abstract: XML-based communication governs most of today’s systems communication, due to its capability of representing complex structural and hierarchical data. However, XML document structure is considered a huge and bulky data that can be reduced to minimize bandwidth usage, transmission time, and maximize performance. This contributes to a more efficient and utilized resource usage. In cloud environments, this affects the amount of money the consumer pays. Several techniques are used to achieve this goal. This paper discusses these techniques and proposes a new XML Schema-based Minification technique. The proposed technique works on XML Structure reduction using minification. The proposed technique provides a separation between the meaningful names and the underlying minified names, which enhances software/code readability. This technique is applied to Intrusion Detection Message Exchange Format (IDMEF) messages, as part of Security Information and Event Management (SIEM) system communication hosted on Microsoft Azure Cloud. Test results show message size reduction ranging from 8.15% to 50.34% in the raw message, without using time-consuming compression techniques. Adding GZip compression to the proposed technique produces 66.1% shorter message size compared to original XML messages.

Author 1: Bishoy Moussa
Author 2: Mahmoud Mostafa
Author 3: Mahmoud El-Khouly

Keywords: XML; JSON; Minification; XML Schema; Cloud; Log; Communication; Compression; XMill; GZip; Code Generation; Code Readability

PDF

Paper 13: Designing and Building a Framework for DNA Sequence Alignment Using Grid Computing

Abstract: Deoxyribonucleic acid (DNA) is a molecule that encodes unique genetic instructions used in the development and functioning of all known living organisms and many viruses. This Genetic information is encoded as a sequence of nucleotides (adenine, cytosine, guanine, and thymine) recorded using the letters A, C, G, and T.DNA querying or alignment of these sequences required dynamic programming tools and very complex matrices and some heuristic methods like FASTA and BLAST that use massive force of processing and highly time consuming. We present a parallel solution to reduce the processing time. Smith waterman algorithm, Needleman-Wunsch, some weighting matrices and a grid of computers are used to find field of similarity between these sequences in large DNA datasets. This grid consists of master computer and unlimited number of agents. The master computer is the user interface for insert the queried sequence and coordinates the processing between the grid agents.

Author 1: EL-Sayed Orabi
Author 2: Mohamed A. Assal
Author 3: Mustafa Abdel Azim
Author 4: Yasser Kamal

Keywords: DNA fingerprint; Smith waterman algorithm; Needleman-Wunsch; Grid computing; Coordinator and Agent computers

PDF

Paper 14: A High Performance Biometric System Based on Image Morphological Analysis

Abstract: At present, many of the algorithms used and proposed for digital imaging biometric systems are based on mathematical complex models, and this fact is directly related to the performance of any computer implementation of these algorithms. On the other hand, as they are conceived for general purpose digital imaging, these algorithms do not take advantage of any common morphological features from its given domains. In this paper we developed a novel algorithm for the segmentation of the pupil and iris in human eye images, whose improvement’s hope lies in the use of morphological features of the images of the human eye. Based on the basic structure of a standard biometric system we developed and implemented an innovation for each phase of the system, avoiding the use of mathematical complex models and exploiting some common features in any digital image of the human eye from the dataset that we used. Finally, we compared the testing results against other known state of the art works developed over the same dataset.

Author 1: Marco Augusto Rocchietti
Author 2: Alejandro Luis Angel Scerbo
Author 3: Silvia M. Ojeda

Keywords: Biometric System; Digital Image Processing; Pupil and Iris Segmentation; Iris Matching

PDF

Paper 15: A Text Classifier Model for Categorizing Feed Contents Consumed by a Web Aggregator

Abstract: This paper presents a method of using a Text Classifier to automatically categorize the content of web feeds consumed by a web aggregator. The pre-defined category of the feed to be consumed by the aggregator does not always match the content being consumed and categorizing the content using the pre-defined category of the feed curtails user experience as users would not see all the contents belonging to their category of interest. A web aggregator was developed and this was integrated with the SVM classifier to automatically categorize feed content being consumed. The experimental results showed that the text classifier performs well in categorizing the content of feed being consumed and it also affirmed the disparity in the pre-defined category of the source feed and appropriate category of the consumed content.

Author 1: H.O.D. Longe
Author 2: Fatai Salami

Keywords: feed; aggregator; text classifier; svm

PDF

Paper 16: Frequency Estimation of Single-Tone Sinusoids Under Additive and Phase Noise

Abstract: We investigate the performance of main frequency estimation methods for a single-component complex sinusoid under complex additive white Gaussian noise (AWGN) as well as phase noise (PN). Two methods are under test: Maximum Likelihood (ML) method using Fast Fourier Transform (FFT), and the autocorrelation method (Corr). Simulation results showed that FFT-method has superior performance as compared to the Corr-method in the presence of additive white Gaussian noise (affecting the amplitude) and phase noise, with almost 20dB difference.

Author 1: Asmaa Nazar Almoosawy
Author 2: Zahir M. Hussain
Author 3: Fadel A. Murad

Keywords: Frequency Estimation; Correlation; Cramer-Rao Bound; Phase Noise; Maximum Likelihood Estimator

PDF

Paper 17: Literature Survey of previous research work in Models and Methodologies in Project Management

Abstract: This paper provides a survey of the existing literature and research carried out in the area of project management using different models, methodologies, and frameworks. Project Management (PM) broadly means programme management, portfolio management, practice management, project management office, etc. A project management system has a set of processes, procedures, framework, methods, tools, methodologies, techniques, resources, etc. which are used to manage the full life cycle of projects. This also means to create risk, quality, performance, and other management plans to monitor and manage the projects efficiently and effectively.

Author 1: Ravinder Singh
Author 2: Dr. Kevin Lano

Keywords: Programme/ Program Management; Project Management; Maturity Models; Onshore-offshore Management; Leadership and Management; Global Distributed Projects

PDF

Paper 18: E-mail use by the faculty members, students and staff of Saudi Arabian and Gulf states Universities

Abstract: Electronic mail systems (Email) constitute one of the most important communication and business tools that people employ. Email in the workplace can help a business improve its productivity. Many organisations now rely on email to manage internal communications as well as other communication and business processes and procedures. This paper compares email use by university stakeholders (i.e. faculty members, staff and students) between Saudi Arabia on one hand, and the Gulf States - Qatar, Oman, United Arab Emirates (UAE) and Bahrain – on the other. A questionnaire that was expertreviewed and pilot-tested, was used to collect data from ten universities in Saudi Arabia and five universities in the Gulf States. Slight differences emerged in the Saudi Arabia and Gulf States universities’ stakeholders’ use of email in terms of having email, frequency of checking email, and skills in using email. The Saudi Arabian universities must improve their IT infrastructure, including the provision of suitable connection networks and formal training of staff in utilising IT resources. This study’s findings aim to advise the Saudi Arabian and Gulf States’ universities on their plans and programmes for e-learning and the consolidation of required resources.

Author 1: Fahad Alturise
Author 2: Paul R. Calder
Author 3: Brett Wilkinson

Keywords: Email; Saudi Arabia; Gulf States

PDF

Paper 19: Privacy Preserving Data Publishing: A Classification Perspective

Abstract: The concept of privacy is expressed as release of information in a controlled way. Privacy could also be defined as privacy decides what type of personal information should be released and which group or person can access and use it. Privacy Preserving Data Publishing (PPDP) is a way to allow one to share anonymous data to ensure protection against identity disclosure of an individual. Data anonymization is a technique for PPDP, which makes sure the published data, is practically useful for processing (mining) while preserving individuals sensitive information. Most works reported in literature on privacy preserving data publishing for classification task handle numerical data. However, most real life data contains both numerical and non-numerical data. Another shortcoming is that use of distributed model called Secure Multiparty Computation (SMC). For this research, a centralized model is used for independent data publication by a single data owner. The key challenge for PPDP is to ensure privacy as well as to keep the data usable for research. Differential privacy is a technique that ensures the highest level of privacy for a record owner while providing actual information of the data set. The aim of this research is to develop a framework that satisfies differential privacy standards and to ensure maximum data usability for a classification tasks such as patient data classification in terms of blood pressure.

Author 1: A N K Zaman
Author 2: Charlie Obimbo

Keywords: privacy preserving data publishing; differential privacy

PDF

Paper 20: Reducing Shared Cache Misses via dynamic Grouping and Scheduling on Multicores

Abstract: Multicore technology enables the system to perform more tasks with higher overall system performance.However, this performance can’t be exploited well due to the high miss rate in the second level shared cache among the cores which represents one of the multicore’s challenges. This paper addresses the dynamic co-scheduling of tasks in multicore real-time systems. The focus is on the basic idea of the megatask technique for grouping the tasks that may affect the shared cache miss rate ,and the Pfair scheduling that is then used for reducing the concurrency within the grouped tasks while ensuring the real time constrains. Consequently the shared cache miss rate is reduced.The dynamic co-scheduling is proposed through the combination of the symbiotic technique with the megatask technique for co-scheduling the tasks based on the collected information using two schemes. The first scheme is measuring the temporal working set size of each running task at run time, while the second scheme is collecting the shared cache miss rate of each running task at run time. Experiments show that the proposed dynamic coscheduling can decrease the shared cache miss rate compared to the static one by 52%.This indicates that the dynamic coscheduling is important to achieve high performance with shared cache memory for running high workloads like multimedia applications that require real-time response and continuousmedia data types.

Author 1: Wael Amr Hossam El Din
Author 2: Hany Mohamed ElSayed
Author 3: Ihab ElSayed Talkhan

Keywords: Shared Cache Miss Rate; Dynamic Scheduling; Multicore; Symbiosis

PDF

The Science and Information (SAI) Organization
BACK TO TOP

Computer Science Journal

  • About the Journal
  • Call for Papers
  • Submit Paper
  • Indexing

Our Conferences

  • Computing Conference
  • Intelligent Systems Conference
  • Future Technologies Conference
  • Communication Conference

Help & Support

  • Contact Us
  • About Us
  • Terms and Conditions
  • Privacy Policy

© The Science and Information (SAI) Organization Limited. All rights reserved. Registered in England and Wales. Company Number 8933205. thesai.org