The Science and Information (SAI) Organization
  • Home
  • About Us
  • Journals
  • Conferences
  • Contact Us

Publication Links

  • IJACSA
  • Author Guidelines
  • Publication Policies
  • Digital Archiving Policy
  • Promote your Publication
  • Metadata Harvesting (OAI2)

IJACSA

  • About the Journal
  • Call for Papers
  • Editorial Board
  • Author Guidelines
  • Submit your Paper
  • Current Issue
  • Archives
  • Indexing
  • Fees/ APC
  • Reviewers
  • Apply as a Reviewer

IJARAI

  • About the Journal
  • Archives
  • Indexing & Archiving

Special Issues

  • Home
  • Archives
  • Proposals
  • Guest Editors
  • SUSAI-EE 2025
  • ICONS-BA 2025
  • IoT-BLOCK 2025

Future of Information and Communication Conference (FICC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Computing Conference

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Intelligent Systems Conference (IntelliSys)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Future Technologies Conference (FTC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact
  • Home
  • Call for Papers
  • Editorial Board
  • Guidelines
  • Submit
  • Current Issue
  • Archives
  • Indexing
  • Fees
  • Reviewers
  • Subscribe

IJACSA Volume 6 Issue 9

Copyright Statement: This is an open access publication licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.

View Full Issue

Paper 1: Development of Social Media GIS to Support Information Utilization from Normal Times to Disaster Outbreak Times

Abstract: The present study aims to design, develop, operate and evaluate a social media GIS (Geographical Information Systems) specially tailored to mash-up the information that local residents and governments provide to support information utilization from normal times to disaster outbreak times in order to promote disaster reduction. The conclusions of the present study are summarized in the following three points. (1) Social media GIS, an information system which integrates a Web-GIS, an SNS and Twitter in addition to an information classification function, a button function and a ranking function into a single system, was developed. This made it propose an information utilization system based on the assumption of disaster outbreak times when information overload happens as well as normal times. (2) The social media GIS was operated for fifty local residents who are more than 18 years old for ten weeks in Mitaka City of Tokyo metropolis. Although about 32% of the users were in their forties, about 30% were aged fifties, and more than 10% of the users were in their twenties, thirties and sixties or more. (3) The access survey showed that 260 pieces of disaster information were distributed throughout the whole city of Mitaka. Among the disaster information, danger-related information occupied 20%, safety-related information occupied 68%, and other information occupied 12%.

Author 1: Kayoko YAMAMOTO
Author 2: Shun FUJITA

Keywords: Social Media GIS; Web-GIS; SNS; Twitter; Disaster Information; Disaster Reduction; Support for Information Utilization

PDF

Paper 2: Building Safety Road Maps Based on Difference of Judgment of Road Users by their Smartphone

Abstract: Recently, there has been a growing demand and interest in developing methods for analyzing smartphone logs to extract traffic safety information. Because the log is high time resolution and closely related to user activities but fragmentary and myopic, it is difficult for currently available collision probability based quantitative risk assessment methods to create traffic safety maps automatically from the driving log which require all of concrete information about a collision for example, size of vehicle, speed of pedestrian. This paper proposes a computable risk measurement method for building traffic safety maps with the logs of different users' driving, which does not discuss collision probability. The proposal is designed to compute differences in the recognition of the road environment among road users mathematically. Drivers differ in their recognition, judgment, and handling of a given situation. Suppose that a difference in recognition among users in the same situation is a signal of danger. This signal is easy to calculate by Poisson process. Each user's recognition of road environment and the safety map integrated from the collection of the recognition are generated fully automated. A real-world experiment was carried out, and the results show that the assumption and the proposed method succeeded in generating an accurate and effective traffic safety map.

Author 1: Viet Chau Dang
Author 2: Hiroshi Sato
Author 3: Masao Kubo
Author 4: Akira Namatame

Keywords: Traffic Safety Map; Risk Estimation; Occupancy Grid Map; Driving Model; Smartphone Sensing; Collective Intelligence

PDF

Paper 3: The Impact of Learning Styles on Learner's Performance in E-Learning Environment

Abstract: due to growing popularity of E-Learning, personalization has emerged as important need. Differences of learners' abilities and their learning styles have affected the learning outcomes significantly. Meanwhile, with the development of E-Learning technologies, learners can be provided more effective learning environment to optimize their performance. The purpose of this study is to determine the impact of learning styles on learner’s performance in e-learning environment, and use this learning style data to make recommendations for learners, instructors, and contents of online courses. Data analysis in this research represented by user performance gathered from an E-learning platform (Blackboard), where this user performance data is represented by actions performed by platform's users. A 10-fold cross validation was used to create and test the model, and the data was analyzed by the WEKA software. Classification accuracy, MAE, and the ROC area have been observed. The results show that the accuracy of classification by means of NBTree technique had the highest correct value at 69.697% and it could be applied to develop Felder Silverman's learning style while taking into consideration students’ preference. Moreover, students’ performance increased by more than 12%.

Author 1: Manal Abdullah
Author 2: Wafaa H. Daffa
Author 3: Reem M. Bashmail
Author 4: Mona Alzahrani
Author 5: Malak Sadik

Keywords: Learning style; Silverman; E-Learning; online learning; styling model

PDF

Paper 4: Expansion of e-Commerce Coverage to Unreached Community by using Micro-Finance Infrastructure

Abstract: Most people at the BOP (base of the economic pyramid, the largest but the poorest community in the world comprising 69% of world population) do not have access to e-commerce services. The way e-commerce is designed and practiced today does not enable their participation. The reasons are: their purchasing power is low, they do not have any means to make online payments, and there is no infrastructure to deliver the purchased items to their doors. To enable the participation of the people at BOP, we propose an e-commerce framework by engaging MFI resources and our recently developed ePassbook system. This paper shows how the BOP community can enjoy the benefits of the e-commerce service by using the proposed model. The advantages of making e-commerce available to the BOP are discussed, in addition to the challenges involved in implementing the model.

Author 1: Ashir Ahmed
Author 2: Kazi Mozaher Hossein
Author 3: Md. Asifur Rahman
Author 4: Takuzo Osugi
Author 5: Akira Fukuda
Author 6: Hiroto Yasuura

Keywords: ICT; BoP; microfinance; E-commerce; social services; ePassbook

PDF

Paper 5: Modelling for Forest Fire Evolution Based on the Energy Accumulation and Release

Abstract: Forest fire evolution plays an important role in the decision-making of controlling the forest fire. This paper aims to simulate the dynamics of the forest fire spread using a cellular automaton approach. Having analyzed the characteristics and evolution of forest fires, a simulation model for the forest fire evolution based on the energy accumulation and release is proposed. And, taking Australia's catastrophic forest fire in 2009 as an example, the fire’s evolution closely to the reality is simulated. The results of the experiments are shown that if forest energy is released in a small scale before or during the fire, the fire would be better controlled even if it does not occur. Improving the efficiency of the fire extinguishing procedures and reducing the speed of the fire spread are also effective for controlling the forest fire.

Author 1: Fan Yang
Author 2: Qing Yang
Author 3: Xingxing Liu
Author 4: Pan Wang

Keywords: forest fire evolution; energy accumulation and release; cellular automaton (CA); simulation

PDF

Paper 6: Community Perception of the Security and Acceptance of Mobile Banking Services in Bahrain: An Empirical Study

Abstract: Bahraini banks and financial organizations have applied remote enabled service using the internet and a mobile device to increase efficiency, reduce costs and improve quality of services. There is need for these organizations to identify factors that persuade customers and raise their attitudes towards adoption and usage of these services. This study identifies the most important factors affecting customer attitudes towards mobile banking acceptance in Bahrain. The model formulated in this research presents and empirically examined the factors influencing mobile banking adoption behavior on customers. The model was tested with a survey sample of 300 banking customers. The findings of the study indicate that wireless connection quality, mobile banking awareness, the social influence, mobile self-efficacy, trust, and resistance to change have significant impact on the attitudes towards the likelihood of adopting mobile banking. Model developed is an extension to the Technology Acceptance Model (TAM). Data analysis is based on the Statistical Package for Social Science (SPSS).

Author 1: Ahmad S. Mashhour
Author 2: Zakarya Saleh

Keywords: Adoption factors; Bahrain community; Mobile Banking Services; Perceived Usefulness (PU); Perceived Ease of Use (PEOU); Technology acceptance model (TAM)

PDF

Paper 7: Image Stitching System Based on ORB Feature-Based Technique and Compensation Blending

Abstract: The construction of a high-resolution panoramic image from a sequence of input overlapping images of the same scene is called image stitching/mosaicing. It is considered as an important, challenging topic in computer vision, multimedia, and computer graphics. The quality of the mosaic image and the time cost are the two primary parameters for measuring the stitching performance. Therefore, the main objective of this paper is to introduce a high-quality image stitching system with least computation time. First, we compare many different features detectors. We test Harris corner detector, SIFT, SURF, FAST, GoodFeaturesToTrack, MSER, and ORB techniques to measure the detection rate of the corrected keypoints and processing time. Second, we manipulate the implementation of different common categories of image blending methods to increase the quality of the stitching process. From experimental results, we conclude that ORB algorithm is the fastest, more accurate, and with higher performance. In addition, Exposure Compensation is the highest stitching quality blending method. Finally, we have generated an image stitching system based on ORB using Exposure Compensation blending method.

Author 1: Ebtsam Adel
Author 2: Mohammed Elmogy
Author 3: Hazem Elbakry

Keywords: Image stitching; Image mosaicking; Feature-based approaches; Scale Invariant Feature Transform (SIFT); Speed-up Robust Feature detector (SURF); Oriented FAST and Rotated BRIEF (ORB); Exposure Compensation blending

PDF

Paper 8: Systematic Literature Review of Agile Scalability for Large Scale Projects

Abstract: In new methods, “agile” has come out as the top approach in software industry for the development of the soft wares. With different shapes agile is applied for handling the issues such as low cost, tight time to market schedule continuously changing requirements, Communication & Coordination, team size and distributed environment. Agile has proved to be successful in the small and medium size project, however, it have several limitations when applied on large size projects. The purpose of this study is to know agile techniques in detail, finding and highlighting its restrictions for large size projects with the help of systematic literature review. The systematic literature review is going to find answers for the Research questions: 1) How to make agile approaches scalable and adoptable for large projects?2) What are the existing methods, approaches, frameworks and practices support agile process in large scale projects? 3) What are limitations of existing agile approaches, methods, frameworks and practices with reference to large scale projects? This study will identify the current research problems of the agile scalability for large size projects by giving a detail literature review of the identified problems, existed work for providing solution to these problems and will find out limitations of the existing work for covering the identified problems in the agile scalability. All the results gathered will be summarized statistically based on these finding remedial work will be planned in future for handling the identified limitations of agile approaches for large scale projects.

Author 1: Hina saeeda
Author 2: Hannan Khalid
Author 3: Mukhtar Ahmed
Author 4: Abu Sameer
Author 5: Fahim Arif

Keywords: Agility; large scale projects; agile scalability; SCRUM; XP; DSDM; Crystal; SLR; Statistical Analysis

PDF

Paper 9: The Apsidal Precession for Low Earth Sun Synchronized Orbits

Abstract: By nodal regression and apsidal precession, the Earth flattering at satellite low Earth orbits (LEO) is manifested. Nodal regression refers to the shift of the orbit’s line of nodes over time as Earth revolves around the Sun. Nodal regression is orbit feature utilized for circular orbits to be Sun synchronized. A sun¬-synchronized orbit lies in a plane that maintains a fixed angle with respect to the Earth-Sun direction. In the low Earth Sun synchronized circular orbits are suited the satellites that accomplish their photo imagery missions. Nodal regression depends on orbital altitude and orbital inclination angle. For the respective orbital altitudes the inclination window for the Sun synchronization to be attained is determined. The apsidal precession represents major axis shift, respectively the argument of perigee deviation. The apsidal precession simulation, for inclination window of sun synchronized orbital altitudes, is provided through this paper.

Author 1: Shkelzen Cakaj
Author 2: Bexhet Kamo
Author 3: Algenti Lala
Author 4: Ilir Shinko
Author 5: Elson Agastra

Keywords: LEO; satellite; orbit; apsidal precession

PDF

Paper 10: Developing Computer Network Based on EIGRP Performance Comparison and OSPF

Abstract: One of the computer network systems technologies that are growing rapidly at this time is internet. In building the networks, a routing mechanism is needed to integrate the entire computer with a high degree of flexibility. Routing is a major part in giving a performance to the network. With many existing routing protocols, network administrators need a reference comparison of the performance of each type of the routing protocol. One such routing is Enhanced Interior Gateway Routing Protocol (EIGRP) and Open Shortest Path First (OSPF). This paper only focuses on the performance of both the routing protocol on the network topology hybrid. Network services existing internet access speeds average of 8.0 KB/sec and 2 MB bandwidth. A backbone network is used by two academies, they are Academy of Information Management and Computer (AIMC) and Academy of Secretary and Management (ASM), with 2041 clients and it caused slow internet access. To solve the problems, the analysis and comparison of performance between the Enhanced Interior Gateway Routing Protocol (EIGRP) and Open Shortest Path First (OSPF) will be applied. Simulation software Cisco Packet Tracer 6.0.1 is used to get the value and to verify the results of its use.

Author 1: Lalu Zazuli Azhar Mardedi
Author 2: Abidarin Rosidi

Keywords: Network; EIGRP; OSPF; based; simulator; performance

PDF

Paper 11: A New Algorithm for Balancing Group Population in Collaborative Leaning Sessions

Abstract: Proper group formation is essential in conducting a productive collaborative learning session. It specifies the internal structure that the collaborating groups should have based on roles. The Group formation is a dynamic and a challenging component. In some cases, more than one group formation is made during a single session and more than one role a single participant undertakes. Group population is another essential process that follows group formation. Group population is concerned with the process of assigning participants to groups and roles. There are several group population methods that are used in Computer Support for Collaborative Learning environment. The main challenge in group population is the partial filling situation. Partial filling is happened when some participants fail to attend their assigned groups at the start of a session. Partial filling could be caused by various reasons. It could be caused by human’s mistakes or by technical faults. In this paper, a correction algorithm is described to balance back the groups’ participation levels. This algorithm is based on three main phases: Group Elimination, External Transfer, and Internal Transfer phase. The algorithms of these phases are fully described in this paper.

Author 1: Aiman Turani
Author 2: Jawad Alkhatib

Keywords: Group formation; Group Population; CSCL; Collaboration Techniques

PDF

Paper 12: An Approach to Calculate the Efficiency for an N-Receiver Wireless Power Transfer System

Abstract: A wireless power transfer system with more than one receiver is a realistic proposition for charging multiple devices such as phones and a tablets. Therefore, it is necessary to consider systems with single transmitters and multiple receivers in terms of efficiency. Current offerings only consider single device charging systems. A problem encountered is the efficiency of one receiver can be affected by another because of the mutual inductance between them. In this paper, an efficiency calculation method is presented for a wireless power transfer system with one to N-receivers. The mutual inductance between coils is implicitly calculated for different spatial positions and verified by practical experimentation. The effect of changing parameters, such as resonant frequency, coil size and distance between coils, on the efficiency has been studied. A clarification of the special performance of a wireless power transfer system at a specific point has been presented.

Author 1: Thabat Thabet
Author 2: Dr. John Woods

Keywords: wireless power transfer; multiple receivers

PDF

Paper 13: Grid Color Moment Features in Glaucoma Classification

Abstract: Automated diagnosis of glaucoma disease is focused on the analysis of the retinal images to localize, perceive and evaluate the optic disc. Clinical decision support system (CDSS) is used for glaucoma classification in human eyes. This process depends mainly on the feature type that can be morphological or non-morphological. It is originated in the retinal image analysis technique that used color feature, texture features, extract structure, or contextual. This work proposes an empirical study on a narrative automated glaucoma diagnosis classification system based on both Grid Color Moment method as a feature vector to extract the color features (non-morphological) and neural network classifier. Consequently, these features are fed to the back propagation neural network (BPNN) classifier for automated diagnosis. The proposed system was tested using an open RIM-ONE database with accurate gold standards of the optic nerve head. This work classifies both normal and abnormal defected retina with glaucoma images. The experimental results achieved an accuracy of 87.47%. Thus, the proposed system can detect the early glaucoma stage with good accuracy.

Author 1: Abir Ghosh
Author 2: Anurag Sarkar
Author 3: Amira S. Ashour
Author 4: Dana Balas-Timar
Author 5: Nilanjan Dey
Author 6: Valentina E. Balas

Keywords: Glaucoma; Clinical decision support system; RIM-ONE image database; Classifier; Back Propagation Neural Network; color feature extraction; Grid Color Moment

PDF

Paper 14: Hybrid Method and Similarity to Recognize Javanese Keris

Abstract: this paper describes Hybrid method and Similarity for recoginizing Javanese Keris. Javanese Keris is one of traditional javanese weapon. It is one of the Indonesia Cultural Heritage. Keris is famous for its distinctive wavy blade. But some of the keris has straight blades. There are many kinds of Keris and every Keris has its own unique pattern. The algorithm to recognize several types of Javanese Keris is made by using Edge Detection method with Image Segmentation and combine with Similarity. By using these three methods, it will bring more exact result. The method combines Canny Algorithm and Basic Morphological for image segmentation. The result of edge detection and image segmentation are compared with the sample pictures using similarity. Ten (10) images of traditional javanese keris are being used as samples. The final result for this study is recognizing the kind of keris. These techniques is carried out with an experiment by using MATLAB 6.0.1 software.

Author 1: Halim Budi Santoso
Author 2: Ryan Peterzon Hadjon

Keywords: Edge Detection; Similarity; Canny Algorithm; Basic Morphological; Image Recognition; Javanese Keris

PDF

Paper 15: Cryptocurrency Mining – Transition to Cloud

Abstract: Cryptocurrency, a form of digital currency that has an open and decentralized system and uses cryptography to enhance security and control the creation of new units, is touted to be the next step from conventional monetary transactions. Many cryptocurrencies exist today, with Bitcoin being the most prominent of them. Cryptocurrencies are generated by mining, as a fee for validating any transaction. The rate of generating hashes, which validate any transaction, has been increased by the use of specialized machines such as FPGAs and ASICs, running complex hashing algorithms like SHA-256 and Scrypt, thereby leading to faster generation of cryptocurrencies. This arms race for cheaper-yet-efficient machines has been on since the day the first cryptocurrency, Bitcoin, was introduced in 2009. However, with more people venturing into the world of virtual currency, generating hashes for this validation has become far more complex over the years, with miners having to invest huge sums of money on employing multiple high performance ASICs. Thus the value of the currency obtained for finding a hash did not justify the amount of money spent on setting up the machines, the cooling facilities to overcome the enormous amount of heat they produce and electricity required to run them. The next logical step in this is to utilize the power of cloud computing. Miners leasing super computers that generate hashes at astonishing rates that have a high probability of profits, with the same machine being leased to more than one person on a time bound basis is a win-win situation to both the miners, as well as the cloud service providers. This paper throws light on the nuances of cryptocurrency mining process, the traditional machines used for mining, their limitations, about how cloud based mining is the logical next step and the advantage that cloud platform offers over the traditional machines.

Author 1: Hari Krishnan R.
Author 2: Sai Saketh Y.
Author 3: Venkata Tej Vaibhav M.

Keywords: Cryptocurrency; Bitcoin mining; Cloud mining; Double Spending; Profitability

PDF

Paper 16: Development of Prediction Model for Endocrine Disorders in the Korean Elderly Using CART Algorithm

Abstract: The aim of the present cross-sectional study was to analyze the factors that affect endocrine disorders in the Korean elderly. The data were taken from the A Study of the Seoul Welfare Panel Study 2010. The subjects were 2111 people (879 males, 1,232 females) aged 60 and older living in the community. The dependent variable was defined as the prevalence of endocrine disorders. The explanatory variables were gender, level of education, household income, employment status, marital status, drinking, smoking, BMI, subjective health status, physical activity, experience of stress, and depression. In the Classification and Regression Tree (CART) algorithm analysis, subjective health status, BMI, education level, and household income were significantly associated with endocrine disorders in the Korean elderly. The most preferentially involved predictor was subjective health status. The development of guidelines and health education to prevent endocrine disorders is required for taking multiple risk factors into account.

Author 1: Haewon Byeon

Keywords: data-mining; CART; elderly; health behavior; endocrine disorders

PDF

Paper 17: An Approach to Improve Classification Accuracy of Leaf Images using Dorsal and Ventral Features

Abstract: This paper proposes to improve the classification accuracy of the leaf images by extracting texture and statistical features by utilizing the presence of striking features on the dorsal and ventral sides of the leaves, which on other types of objects may not be that prominent. The texture features have been extracted from dorsal, ventral and a combination of dorsal-ventral sides of leaf images using Gray level co-occurrence matrix. In addition to this, this work also uses certain general statistical features for discriminating them into various classes. The feature selection work has been performed separately for the dorsal, ventral and combined data sets (for both texture and statistical features) using the most common feature selection algorithms. After selecting the relevant features, the classification has been done using the classification algorithms: K-Nearest Neighbor, J48, Naïve Bayes, Partial Least Square (PLS), Classification and Regression Tree (CART), Classification Tree(CT). The classification accuracy has been calculated and compared to find which side of the leaf image (dorsal or ventral) gives better results with which type of features(texture or statistical). This study reveals that the ventral leaf features can be another alternative in discriminating the leaf images into various classes.

Author 1: Arun Kumar
Author 2: Vinod Patidar
Author 3: Deepak Khazanachi
Author 4: Poonam Saini

Keywords: Leaf image; Leaf classification; Texture features; Statistical features; Dorsal and ventral sides of leaves; Gray level co-occurrence matrix

PDF

Paper 18: Electrooculogram Signals Analysis for Process Control Operator Based on Fuzzy c-Means

Abstract: Biomedical signals of human can reflect the body's task load, fatigue and other psychological information. Compared with other biomedical signals, electrooculogram (EOG) has higher amplitude, less interference, and is easy to detect. In this paper, the EOG signals of operator’s were analyzed. Wavelet transform was used to remove the high-frequency artifacts. Then fuzzy c-means was adopted to detect the eye blink peak points of EOG. After that, eye blink interval (EBI) of operator was calculated. Four EOG features (the average of EBI, variance of EBI, standard deviation of EBI and variation coefficient of EBI) were extracted. Finally, the relationship between EOG features and operator’s fatigue, effort, anxiety and task load were analyzed. The experimental results illustrate that EOG features had some relation to the operator’s fatigue, effort, anxiety and task load respectively.

Author 1: Jiangwen Song
Author 2: Raofen Wang
Author 3: Guanghua Zhang
Author 4: Chaoxing Xiong
Author 5: Leyan Zhang
Author 6: Cunbang Sun

Keywords: electrooculogram; fuzzy c-means; operator functional state; fatigue

PDF

Paper 19: How to Model a Likely Behavior of a Pedagogical Agent from a Real Situation

Abstract: The aim of this work is to model the behavior verbal and nonverbal behavior of a Pedagogical Agent (PA) can be integrated into an Intelligent Tutoring System. The following research questions were posed: what is the nonverbal component of an educational communication? How to study this component for a computational model of plausible behavior of a virtual agent? What correlations between educational actions and the direction of gaze of a human agent? To carry out exploratory work, a methodological approach based on multi-modal video corpus study was adopted. Within a multidisciplinary team consisting of computer scientists and didactics of mathematics, an educational situation in which a virtual pedagogical agent is likely was developed. Dyadic interactions between teachers and learners late second early third (15-16 years) in a skills assessment interview in mathematics following the resolution of exercises by students with a mathematics software was filmed. A multi-level annotation scheme to annotate the observed behavior was proposed. The multidisciplinary research subject (ITS, Human-Machine Interfaces, Educational sciences, educational, linguistic etc.) due to the development of the coding scheme a delicate but important work given the wealth of knowledge from different disciplines. After a portion of the collected work annotation corpus statistical measures derived from annotations carried out suggest different strategies for teachers in terms of gaze direction depending on the learner profile and pedagogical actions. These measures have enabled to extract rules to control the nonverbal behavior of a PA.

Author 1: Mohamedade Farouk NANNE

Keywords: pedagogical agent; nonverbal communication; behavior; corpus analysis

PDF

Paper 20: An Analysis of Information Technology on Data Processing by using Cobit Framework

Abstract: Information technology and processes is inter connected, directing and controlling the company in achieving corporate goals through value-added and balancing the risks and benefits of information technology. This study is aimed to analyze the level of maturity (maturity level) on the data process and produced information technology recommendations that can be made as regards the management of IT to support the academic performance of the service to be better. Maturity level calculation was done by analyzing questionnaires on the state of information technology. The results of this study obtainable that the governance of information technology in data processing in Mataram ASM currently quite good. Current maturity value for the data processing has the value 2.69. This means that the company / organization already has a pattern of repeatedly done in managing the activities related to data management processes. Based on the data analysis, there is an effect on the current conditions and expected conditions can be taken solution or corrective actions to improve IT governance in the process of data management at ASM Mataram gradually.

Author 1: Surni Erniwati
Author 2: Nina Kurnia Hikmawati

Keywords: Cobit; Data Processing; Information Technology; Level of Maturity; Management Awareness

PDF

Paper 21: MCIP Client Application for SCADA in Iiot Environment

Abstract: Modern automation systems architectures which include several subsystems for which an adequate burden sharing is required. These subsystems must work together to fulfil the tasks imposed by the common function, given by the business purpose to be fulfilled. These subsystems or components, in order to perform these tasks, must communicate with each other, this being the critical function of the architecture of such a system. This article presents a MCIP (Monitoring and Control of the Industrial Processes) client application which allows the monitoring and control of the industrial processes and which is object-oriented. As a novelty, the paper presents the architecture of the user object, which is actually a wrapper that allows the connection to Communication Standard Interface bus, the characteristics of the IIoT (Industrial Internet of Things) object and the correspondence between a server’s address space and the address space of MCIP.

Author 1: Nicoleta Cristina GAITAN

Keywords: SCADA; OPC DA; OPC.NET; OPC UA; DDS

PDF

Paper 22: Intrusion Detection Techniques in Wireless Sensor Network using Data Mining Algorithms: Comparative Evaluation Based on Attacks Detection

Abstract: Wireless sensor network (WSN) consists of sensor nodes. Deployed in the open area, and characterized by constrained resources, WSN suffers from several attacks, intrusion and security vulnerabilities. Intrusion detection system (IDS) is one of the essential security mechanism against attacks in WSN. In this paper we present a comparative evaluation of the most performant detection techniques in IDS for WSNs, the analyzes and comparisons of the approaches are represented technically, followed by a brief. Attacks in WSN also are presented and classified into several criteria. To implement and measure the performance of detection techniques we prepare our dataset, based on KDD'99, into five step, after normalizing our dataset, we determined normal class and 4 types of attacks, and used the most relevant attributes for the classification process. We propose applying CfsSubsetEval with BestFirst approach as an attribute selection algorithm for removing the redundant attributes. The experimental results show that the random forest methods provide high detection rate and reduce false alarm rate. Finally, a set of principles is concluded, which have to be satisfied in future research for implementing IDS in WSNs. To help researchers in the selection of IDS for WSNs, several recommendations are provided with future directions for this research.

Author 1: YOUSEF EL MOURABIT
Author 2: AHMED TOUMANARI
Author 3: ANOUAR BOUIRDEN
Author 4: NADYA EL MOUSSAID

Keywords: Keyword: Wireless sensor network; Anomaly Detection; Intrusion detection system; classification; KDD’99; Weka

PDF

Paper 23: A Multi-Attribute Decision Making for Electrician Selection using Triangular Fuzzy Numbers Arithmetic Approach

Abstract: This study uses an approach of fuzzy multi attribute decision making in determining alternatives to solve the selection problem of the electrician through a competency test. Competency test consists of several tests of knowledge, skills and work attitude. The parameters of decision making is used to choose the best alternative written test, test of theoretical knowledge, practice knowledge test and oral test. Linguistic values expressed by triangular fuzzy numbers is used to represent the preferences of decision makers so that the uncertainty and imprecision in the selection process can be minimized. Aggregation results are represented using triangular fuzzy numbers. The output of this selection process is the best alternative obtained using triangular fuzzy numbers arithmetic approach.

Author 1: Wiwien Hadikurniawati
Author 2: Retantyo Wardoyo

Keywords: multi-attribute decision making; triangular fuzzy number; fuzzy arithmetic; electrician

PDF

Paper 24: A Modified Heuristic-Block Protocol Model for Privacy and Concurrency in Cloud

Abstract: With boost in the figure of cloud users and the magnitude of sensitive data on cloud, shielding of cloud has become more important. Competent methods are consistently desirable to ensure the information privacy and load management of outsource data on un-trusted cloud servers. The base of our proposed idea is the chronological display of metaheuristic firefly algorithm and blocks based Merkle hash tree protocol. This pool of combination significantly reduces the communication delay and I/O costs. The projected scheme in addition considers the dynamic data operations at block level while maintaining the equivalent security assurance. Our method makes use of third party auditor to periodically verify the data stored at cloud provider side. Our elucidation removes the burden of verification from the user side and alleviates both the user’s and storage service’s fear about data outburst and data corruptions.

Author 1: Akhilesh Kumar Bhardwaj
Author 2: Dr. Surinder
Author 3: Dr. Rajiv Mahajan

Keywords: Cloud Computing; TPA; Firefly; MHT; NTRU; LZW

PDF

Paper 25: Modeling Knowledge Bases for Automated Decision Making Systems – A Literature Review

Abstract: Developing automated decision making systems means dealing with knowledge in every possible manner. One of the most important points of developing artificial intelligent systems is developing a precise knowledge base with integrating self-learning mechanisms. Moreover using knowledge in expert systems or decision support systems it is necessary to document knowledge and make it visible for managing it. Main goal of this work is finding a suitable solution for modeling knowledge bases in automated decision making systems concerning both illustrating specific knowledge and learning mechanisms. There are a lot of different terms describing this kind of research, such as knowledge modeling, knowledge engineering or ontology engineering. For that reason this paper provides a comparison of the technical terms in this domain by illustrating similarities, specifics and how they are used in literature.

Author 1: Franz Felix Füssl
Author 2: Detlef Streitferdt
Author 3: Anne Triebel

Keywords: Knowledge Base; Knowledge Modeling; Knowledge Engineering; Ontology Engineering; Artificial Neural Network; Expert System

PDF

Paper 26: Developing a New Integrated Model to improve the using of Classical Approach in Designing Management Information Systems

Abstract: Management information system (MIS) is used to solve management problems in the practical life, the designing and building of the management information systems is done by using one of the systems development methodologies. Classical approach is one of these methodologies which still suffer from some critical problems when it is used in designing and building the management information systems, it consumes more time and cost during its life cycle. This paper develops a new integrated model to minimize the classical approach life cycle in designing and building the management information systems in order to avoid the additional consume in time and cost.

Author 1: Mohammad M M Abu Omar
Author 2: Khairul Anuar Abdullah

Keywords: Management Information System; MIS; Systems Development Methodologies; Classical Approach; Information System Life Cycle; ISLC

PDF

Paper 27: Scrum Method Implementation in a Software Development Project Management

Abstract: To maximize the performance, companies conduct a variety of ways to increase the business profit. The work management between one company and the other company is different, so the differences in the management may cause the software to have a different business process. Software development can be defined as creating a new software or fixing the existing one. Technology developments led to increasing demand for software, Industrial Technology (IT) Companies should be able to project well maintenance. The methodology in software development is used in accordance with the company's needs based on the SDLC (Software Development Life Cycle). Scrum method is a part of the Agile method that is expected to increase the speed and flexibility in software development project management.

Author 1: Putu Adi Guna Permana

Keywords: Metode Scrum; Agile; SDLC; Software

PDF

Paper 28: Texture Analysis on Image Motif of Endek Bali using K-Nearest Neighbor Classification Method

Abstract: Endek fabric Bali is one form of craft woven fabric of Balinese society. Endek fabric has a variety of motifs or designs, a lot of people does not know that Endek have the type based on the design motif. In this research will be carried out an analysis texture on the Image Motif of Endek Bali and then classify them into several classes based on the type pattern motif of Endek Bali. The first step in this research is to collect some Image of Endek with different motif, then transform image into a gray level image using Edge Detection and do the extraction using GLCM, after that performed data classification using K-NN. Based on the analysis of all the grades K that have been tested, the value K with the most excellent level accuracy is on K = 15 and on Correlation component, with an accuracy percentage of 43.33%. Overall, the Cemplong motif is a motif that has recognition accuracy levels better than most other motifs, that with a percentage of 57.50%. There are quite a lot of motifs that are less precise Endek recognized at the time of classification. It’s because among the Endek motifs may have the similar texture. The purpose of this study is to analyze texture and classify image motif of Endek Bali so that later can be developed into an application or program that can help to recognize the type of fabric Endek Bali. And even better if the program is implemented on the mobile phone, so can facilitate the process of image acquisition and subsequent directly extracted and classified from the mobile phone and can produce accurate classification results.

Author 1: I Gede Surya Rahayuda

Keywords: Analysis; Texture; Image; Endek Bali; Edge Detection; GLCM; K-NN

PDF

Paper 29: Content-Based Image Retrieval using Local Features Descriptors and Bag-of-Visual Words

Abstract: Image retrieval is still an active research topic in the computer vision field. There are existing several techniques to retrieve visual data from large databases. Bag-of-Visual Word (BoVW) is a visual feature descriptor that can be used successfully in Content-based Image Retrieval (CBIR) applications. In this paper, we present an image retrieval system that uses local feature descriptors and BoVW model to retrieve efficiently and accurately similar images from standard databases. The proposed system uses SIFT and SURF techniques as local descriptors to produce image signatures that are invariant to rotation and scale. As well as, it uses K-Means as a clustering algorithm to build visual vocabulary for the features descriptors that obtained of local descriptors techniques. To efficiently retrieve much more images relevant to the query, SVM algorithm is used. The performance of the proposed system is evaluated by calculating both precision and recall. The experimental results reveal that this system performs well on two different standard datasets.

Author 1: Mohammed Alkhawlani
Author 2: Mohammed Elmogy
Author 3: Hazem Elbakry

Keywords: Content-based Image Retrieval (CBIR); Scale Invariant Feature Transform (SIFT); Speeded Up Robust Features (SURF); K-Means Algorithm; Support Vector Machine (SVM); Bag-of-Visual Word (BoVW)

PDF

Paper 30: Online Paper Review Analysis

Abstract: Sentiment analysis or opinion mining is used to automate the detection of subjective information such as opinions, attitudes, emotions, and feelings. Hundreds of thousands care about scientific research and take a long time to select suitable papers for their research. Online reviews on papers are the essential source to help them. The reviews save reading time and save papers cost. This paper proposes a new technique to analyze online reviews. It is called sentiment analysis of online papers (SAOOP). SAOOP is a new technique used for enhancing bag-of-words model, improving the accuracy and performance. SAOOP is useful in increasing the understanding rate of review's sentences through higher language coverage cases. SAOOP introduces solutions for some sentiment analysis challenges and uses them to achieve higher accuracy. This paper also presents a measure of topic domain attributes, which provides a ranking of total judging on each text review for assessing and comparing results across different sentiment techniques for a given text review. Finally, showing the efficiency of the proposed approach by comparing the proposed technique with two sentiment analysis techniques. The comparison terms are based on measuring accuracy, performance and understanding rate of sentences.

Author 1: Doaa Mohey El-Din
Author 2: Hoda M.O. Mokhtar
Author 3: Osama Ismael

Keywords: Sentiment analysis; Opinion Mining; Reviews; Text analysis; Bag of words; sentiment analysis challenges

PDF

Paper 31: Towards Agile Implementation of Test Maturity Model Integration (TMMI) Level 2 using Scrum Practices

Abstract: the software industry has invested the substantial effort to improve the quality of its products like ISO, CMMI and TMMI. Although applying of TMMI maturity criteria has a positive impact on product quality, test engineering productivity, and cycle-time effort. But it requires heavy software development processes and large investments in terms of cost and time that medium/small companies do not deal with it. At the same time, agile methods deal with changing requirements and continuous delivery of valuable software by short time iterations. So that the aim of this paper is to improve the testing process by applying a detailed mapping between TMMI and Scrum practices and verifying this mapping with a study providing empirical evidence of the obtained results. The research has been evaluated on a sample of 2 large-sized TMMI certified companies. In conclusion, the experimental results show the effectiveness of using this integrated approach compared to other existing approaches.

Author 1: Ahmed B. Farid
Author 2: Enas M. Fathy
Author 3: Mahmoud Abd Ellatif

Keywords: Agile software development; Scrum; TMMI; Software Testing; CMMI

PDF

Paper 32: Ontology-Based Textual Emotion Detection

Abstract: Emotion Detection from text is a very important area of natural language processing. This paper shows a new method for emotion detection from text which depends on ontology. This method is depending on ontology extraction from the input sentence by using a triplet extraction algorithm by the OpenNLP parser, then make an ontology matching with the ontology base that we created by similarity and word sense disambiguation. This ontology base consists of ontologies and the emotion label related to each one. We choose the emotion label of the sentence with the highest score of matching. If the extracted ontology doesn’t match any ontology from the ontology base we use the keyword-based approach. This method doesn’t depend only on keywords like previous approaches; it depends on the meaning of sentence words and the syntax and semantic analysis of the context.

Author 1: Mohamed Haggag
Author 2: Samar Fathy
Author 3: Nahla Elhaggar

Keywords: emotion detection; ontology; ontology matching; natural language processing

PDF

Paper 33: Osteoporosis Detection using Important Shape-Based Features of the Porous Trabecular Bone on the Dental X-Ray Images

Abstract: Osteoporosis screening using dental X-Ray images has been growing an interesting research. Existing methods for osteoporosis screening have been performed using the dental periapical or panoramic in X-Ray images. There was limited research using both the periapical and panoramic due to the expensive cost of obtaining data. This paper presents a combination of the periapical and panoramic images for osteoporosis detection. The images processing was performed to obtain the shape-based features of the porous trabecular bone on both the dental radiograph images. The important features were selected from the extracted features. These selected features were chosen for osteoporosis detection using the decision tree. The quantitative evaluation used confusion matrix. It was found accuracy rate to be 73.33%, sensitivity rate to be 72.23, and specificity rate to be 72.23% for data testing.

Author 1: Enny Itje Sela
Author 2: Rini Widyaningrum

Keywords: dental X-Ray; feature selection; osteoporosis Detection; porous trabecular bone

PDF

Paper 34: AATCT: Anonymously Authenticated Transmission on the Cloud with Traceability

Abstract: In Cloud computing, anonymous authentication is an important service that must be available to users in the Cloud. Users have the right to remain anonymous as long as they behave honestly. However, in case a malicious behavior is detected, the system – under court order – must be able to trace the user to his clear identity. Most of the proposed authentication schemes for the Cloud are either password-based authentication schemes that are vulnerable to offline dictionary attacks, or biometric-based authentication schemes that take a long time of execution specially in case of high security requirements. In this paper, we propose an efficient and secure scheme to non-interactively authenticate the users on the Cloud to the remote servers while preserving their anonymity. In case of accusations, the registration authority is able to trace any user to his clear identity. We avoid using low entropy passwords or biometric mechanisms, instead, we employ pseudonym systems in our design. The computation complexity and storage requirements are efficient and suitable to be implemented on smart cards/devices. Our proposed scheme withstands challenging adversarial attacks such as, stolen databases attacks, databases insertion attacks, impersonation attacks, replay attacks and malicious users/servers collaboration attacks.

Author 1: Maged Hamada Ibrahim

Keywords: Cloud computing; anonymous transmission; pseudonym systems; smart cards; mobile devices; authentication; IT security

PDF

Paper 35: Resistance to Statistical Attacks of Parastrophic Quasigroup Transformation

Abstract: The resistance to statistical kind of attacks of encrypted messages is a very important property for designing cryptographic primitives. In this paper, the parastrophic quasigroup PE-transformation, proposed elsewhere, is considered and the proof that it has this cryptographic property is given. Namely, it is proven that if PE-transformation is used for design of an encryption function then after n applications of it on arbitrary message the distribution of m-tuples (m = 1; 2; : : : ; n) is uniform. These uniform distributions imply the resistance to statistical attack of the encrypted messages. For illustration of theoretical results, some experimental results are presented as well.

Author 1: Verica Bakeva
Author 2: Aleksandra Popovska-Mitrovikj
Author 3: Vesna Dimitrova

Keywords: uniform distribution; cryptographic properties; sta-tistical attack; encrypted message; quasigroup; parastrophic quasi-group transformation

PDF

Paper 36: Fuzzy Based Evaluation of Software Quality Using Quality Models and Goal Models

Abstract: Software quality requirements are essential part for the success of software development. Defined and guaranteed quality in software development requires identifying, refining, and predicting quality properties by appropriate means. Goal models of goal oriented requirements engineering (GORE) and quality models are useful for modelling of functional goals as well as for quality goals. Once the goal models are obtained representing the functional requirements and integrated quality goals, there is need to evaluate each functional requirement arising from functional goals and quality requirement arising from quality goals. The process consist of two main parts. In first part, the goal models are used to evaluate functional goals. The leaf level goals are used to establish the evaluation criteria. Stakeholders are also involved to contribute their opinions about the importance of each goal (functional and/or quality goal). Stakeholder opinions are then converted into quantifiable numbers using triangle fuzzy numbers (TFN). After applying the defuzzification process on TFN, the scores (weights) are obtained for each goal. In second part specific quality goals are identified, refined/tailored based on existing quality models and their evaluation is performed similarly using TFN and by applying defuzzification process. The two step process helps to evaluate each goal based on stakeholder opinions and to evaluate the impact of quality requirements. It also helps to evaluate the relationships among functional goals and quality goals. The process is described and applied on ’cyclecomputer’ case study.

Author 1: Arfan Mansoor
Author 2: Detlef Streitferdt
Author 3: Franz-Felix Fußl

Keywords: Decision making; Goal Models; Quality Models; NFR; Fuzzy numbers

PDF

Paper 37: Skill Evaluation for Newly Graduated Students Via Online Test

Abstract: Every year in each university many students are graduated holding a first university degree. For example Bachelor degree in Computer Science. Most of those students have a motivation to continue with further studies to get higher education level degree in universities. However, some other students may have enthusiasm towards working based on their skills that they got during their life of studies in university. In both cases, it is required that applicant must pass a test that comprise the entire subject that they learned before. For this reasons, this research is proposing a new technique to evaluate graduate students skills.

Author 1: Mahdi Mohammed Younis
Author 2: Miran Hikmat Mohammed Baban

Keywords: LAN-Network; Database; Online Test; Skills evaluation; feedback

PDF

Paper 38: Secure Clustering in Vehicular Ad Hoc Networks

Abstract: A vehicular Ad-hoc network is composed of moving cars as nodes without any infrastructure. Nodes self-organize to form a network over radio links. Security issues are commonly observed in vehicular ad hoc networks; like authentication and authorization issues. Secure Clustering plays a significant role in VANETs. In recent years, various secure clustering techniques with distinguishing feature have been newly proposed. In order to provide a comprehensive understanding of these techniques are designed for VANETs and pave the way for the further research, a survey of the secure clustering techniques is discussed in detail in this paper. Qualitatively, as a result of highlighting various techniques of secure clustering certain conclusions are drawn which will enhance the availability and security of vehicular ad hoc networks. Nodes present in the clusters will work more efficiently and the message passing within the nodes will also get more authenticated from the cluster heads.

Author 1: Zainab Nayyar
Author 2: Dr. Muazzam Ali Khan Khattak
Author 3: Dr. Nazar Abass Saqib
Author 4: Nazish Rafique

Keywords: Vehicular ad hoc networks; secure clustering; wireless technologies; certification authority; cluster heads

PDF

Paper 39: An Analysis of Encryption and Decryption Application by using One Time Pad Algorithm

Abstract: Security of data in a computer is needed to protect critical data and information from other parties. One way to protect data is to apply the science of cryptography to perform data encryption. There are wide variety of algorithms used for encryption of data, this study used a one-time pad algorithm for encrypting data. Algorithm One Time Pad uses the same key in the encryption process and a decryption of the data. An encrypted data will be transformed into cipher text so that the only person who has the key can open that data. Therefore, analysis will be done for an application that implements a one-time pad algorithm for encrypting data. The application that implements the one time pad algorithm can help users to store data securely.

Author 1: Zaeniah
Author 2: Bambang Eka Purnama

Keywords: cryptography; algorithms One Time pad; encryption; Decryption

PDF

Paper 40: Competence Making on Computer Engineering Program by Using Analytical Hierarchy Process (AHP)

Abstract: This paper shows competence election for the students of the Academy of Information Management and Computer (AIMC) Mataram on computer engineering courses who completed the study in semester 1, 2 and 3 and choose lesson competence. The competence election on computer engineering courses is intended to make students get easier in choosing the appropriate competence and professional expertise of students in an effort to steer students to the ability and the students' academic achievement. It is an uneasy thing for the students. Limited information make the students find it difficult to choose the competence of determining the best based on the academic achievement and interest. To solve the problems, standard decision support system is required to help and provide a solution or an alternative based on the accurate data by using Analytical Hierarchy Process (AHP) that is computerized.

Author 1: Ahmad Yani
Author 2: Lalu Darmawan Bakti

Keywords: Decision Support System; AHP; Competence; Criteria

PDF

Paper 41: A Survey on Smart use of BBM and its Influence on Academic Achievement in SMK Health PGRI Denpasar

Abstract: Black Berry Messenger chat facility is very popular in the process of communicating through text messages, pictures and videos, so that the process of communication in the interaction between users can be carried out actively in virtual world. In this study, it will be examined as to whether the Black Berry Messenger has a significant influence on academic achievement in SMK Health PGRI Denpasar. This study will show the effect of the BBM in the improvement of academic achievement, using quantitative methods by distributing questionnaires from a random sample of the student population of SMK health PGRI Denpasar. The correlation analysis uses the correlation coefficient Kendall's tau which managed to deliver the results that the BBM is very influential with the increase of academic achievement.

Author 1: I Wayan Gede Narayana

Keywords: Black Berry Messenger; Academic Achievement; Correlation; Simple Random Sampling; Kendall’s Tau

PDF

Paper 42: The Use of Programming Languages on the Final Project Report by Using Analytical Hierarchy Process (AHP)

Abstract: The development in information technology provides a lot of convenience for everyone. Academy of Information Management and Computer (AIMC) students of the fourth semester, implementing the Job Training must specify the type of programming that will be used as a Final Project Report. The study assessed five types of programming language by using the approach of Analytical Hierarchy Process (AHP) to obtain information on the programming language that has the quality or better rating than 5 programming languages is based on the parameters. Analytical Hierarchy Process (AHP) is one way in determining or making a decision that are multi-criteria or multi-objective such as choosing the programming language for the Student Information Management at the Academy of Information Management and Computer (AIMC). Programming language based on five criteria consisting of Clarity, Simplicity, and unity; Orthogonality; Fairness for Applications; Supports Abstraction; Environment Program; and Portability Program.

Author 1: Juhartini
Author 2: Muhammad Suyanto

Keywords: programming language; parameters; AHP

PDF

The Science and Information (SAI) Organization
BACK TO TOP

Computer Science Journal

  • About the Journal
  • Call for Papers
  • Submit Paper
  • Indexing

Our Conferences

  • Computing Conference
  • Intelligent Systems Conference
  • Future Technologies Conference
  • Communication Conference

Help & Support

  • Contact Us
  • About Us
  • Terms and Conditions
  • Privacy Policy

© The Science and Information (SAI) Organization Limited. All rights reserved. Registered in England and Wales. Company Number 8933205. thesai.org